{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:19:49Z","timestamp":1764782389167,"version":"3.37.3"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Ministry of Education of Humanities and Social Science Project","award":["19YJAZH047"],"award-info":[{"award-number":["19YJAZH047"]}]},{"DOI":"10.13039\/501100018561","name":"Sichuan Education and Scientific Research Grant Project","doi-asserted-by":"publisher","award":["17ZB0433"],"award-info":[{"award-number":["17ZB0433"]}],"id":[{"id":"10.13039\/501100018561","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11042-023-15284-2","type":"journal-article","created":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T10:03:38Z","timestamp":1684317818000},"page":"3473-3496","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Hyper-chaotic color image encryption based on 3D orthogonal Latin cubes and RNA diffusion"],"prefix":"10.1007","volume":"83","author":[{"given":"Duzhong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Lexing","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1546-8015","authenticated-orcid":false,"given":"Taiyong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,17]]},"reference":[{"key":"15284_CR1","doi-asserted-by":"crossref","first-page":"106465","DOI":"10.1016\/j.optlastec.2020.106465","volume":"132","author":"AA Abbasi","year":"2020","unstructured":"Abbasi AA, Mazinani M, Hosseini R (2020) Chaotic evolutionary-based image encryption using rna codons and amino acid truth table. Opt, Laser Technol 132:106465","journal-title":"Opt, Laser Technol"},{"issue":"3","key":"15284_CR2","doi-asserted-by":"crossref","first-page":"443","DOI":"10.3390\/sym14030443","volume":"14","author":"W Alexan","year":"2022","unstructured":"Alexan W, ElBeltagy M, Aboshousha A (2022) Rgb image encryption through cellular automata, s-box and the lorenz system. Symmetry 14(3):443","journal-title":"Symmetry"},{"issue":"08","key":"15284_CR3","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 16(08):2129\u20132151","journal-title":"Int J Bifurcat Chaos"},{"issue":"23","key":"15284_CR4","doi-asserted-by":"crossref","first-page":"30841","DOI":"10.1007\/s11042-018-5997-2","volume":"77","author":"H Bouslehi","year":"2018","unstructured":"Bouslehi H, Seddik H (2018) Innovative image encryption scheme based on a new rapid hyperchaotic system and random iterative permutation. Multimed Tools Appl 77(23):30841\u201330863","journal-title":"Multimed Tools Appl"},{"key":"15284_CR5","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"X Chai","year":"2019","unstructured":"Chai X, Fu X, Gan Z, Lu Y, Yiran C (2019) A color image cryptosystem based on dynamic dna encryption and chaos. Signal Process 155:44\u201362","journal-title":"Signal Process"},{"key":"15284_CR6","doi-asserted-by":"crossref","first-page":"108041","DOI":"10.1016\/j.sigpro.2021.108041","volume":"183","author":"X Chai","year":"2021","unstructured":"Chai X, Zhi X, Gan Z, Zhang Y, Chen Y, Fu J (2021) Combining improved genetic algorithm and matrix semi-tensor product (stp) in color image encryption. Signal Process 183:108041","journal-title":"Signal Process"},{"issue":"8","key":"15284_CR7","doi-asserted-by":"crossref","first-page":"8457","DOI":"10.1007\/s12652-020-02580-0","volume":"12","author":"G Dhiman","year":"2021","unstructured":"Dhiman G, Garg M, Nagar A, Kumar V, Dehghani M (2021) A novel algorithm for global optimization: Rat swarm optimizer. J Ambient Intell Humaniz Comput 12(8):8457\u20138482","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"15284_CR8","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.engappai.2019.03.021","volume":"82","author":"G Dhiman","year":"2019","unstructured":"Dhiman G, Kaur A (2019) Stoa: a bio-inspired based optimization algorithm for industrial engineering problems. Eng Appl Artif Intell 82:148\u2013174","journal-title":"Eng Appl Artif Intell"},{"key":"15284_CR9","doi-asserted-by":"crossref","first-page":"106560","DOI":"10.1016\/j.knosys.2020.106560","volume":"211","author":"G Dhiman","year":"2021","unstructured":"Dhiman G, Oliva D, Kaur A, Singh KK, Vimal S, Sharma A, Cengiz K (2021) Bepo: a novel binary emperor penguin optimizer for automatic feature selection. Knowl-Based Syst 211:106560","journal-title":"Knowl-Based Syst"},{"key":"15284_CR10","doi-asserted-by":"crossref","unstructured":"Gadicha AB, Gupta VBB, Gadicha VB, Kumar K, Ghonge MM (2021) Multimode approach of data encryption in images through quantum steganography. In: Gupta M, Pramanik S, Ghonge MM, Ravi RV, Cengiz K (eds) Multidisciplinary approach to modern digital Steganography, Advances in information security, privacy, and ethics, pp 99\u2013124. IGI Global","DOI":"10.4018\/978-1-7998-7160-6.ch005"},{"issue":"9","key":"15284_CR11","doi-asserted-by":"crossref","first-page":"1535","DOI":"10.1049\/iet-ipr.2019.0051","volume":"13","author":"M Guan","year":"2019","unstructured":"Guan M, Yang X, Hu W (2019) Chaotic image encryption algorithm using frequency-domain dna encoding. IET Image Process 13(9):1535\u20131539","journal-title":"IET Image Process"},{"key":"15284_CR12","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1016\/j.sigpro.2016.12.008","volume":"134","author":"T Hu","year":"2017","unstructured":"Hu T, Liu Y, Gong L-H, Guo S-F, Yuan H-M (2017) Chaotic image cryptosystem using dna deletion and dna insertion. Signal Process 134:234\u2013243","journal-title":"Signal Process"},{"issue":"1","key":"15284_CR13","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/s11071-016-3024-6","volume":"87","author":"T Hu","year":"2017","unstructured":"Hu T, Liu Y, Gong L-H, Ouyang C-J (2017) An image encryption scheme combining chaos with cycle operation for dna sequences. Nonlinear Dyn 87(1):51\u201366","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"15284_CR14","doi-asserted-by":"crossref","first-page":"1305","DOI":"10.1007\/s11071-016-3311-2","volume":"88","author":"G Hu","year":"2017","unstructured":"Hu G, Xiao D, Wang Y, Li X (2017) Cryptanalysis of a chaotic image cipher using latin square-based confusion and diffusion. Nonlinear Dyn 88 (2):1305\u20131316","journal-title":"Nonlinear Dyn"},{"key":"15284_CR15","first-page":"45","volume":"34","author":"F-G Jeng","year":"2015","unstructured":"Jeng F-G, Huang W-L, Chen T-H (2015) Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes. Signal Process: Image Commun 34:45\u201351","journal-title":"Signal Process: Image Commun"},{"key":"15284_CR16","first-page":"102428","volume":"50","author":"KC Jithin","year":"2020","unstructured":"Jithin KC, Sankar S (2020) Colour image encryption algorithm combining arnold map, dna sequence operation, and a mandelbrot set. J Inf Secur Appli 50:102428","journal-title":"J Inf Secur Appli"},{"key":"15284_CR17","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/j.ijleo.2016.10.036","volume":"129","author":"A Kadir","year":"2017","unstructured":"Kadir A, Aili M, Sattar M (2017) Color image encryption scheme using coupled hyper chaotic system with multiple impulse injections. Optik - Int J Light Electron Opt 129:231\u2013238","journal-title":"Optik - Int J Light Electron Opt"},{"issue":"4","key":"15284_CR18","doi-asserted-by":"crossref","first-page":"3167","DOI":"10.1007\/s00366-020-00989-x","volume":"37","author":"S Kaur","year":"2021","unstructured":"Kaur S, Awasthi LK, Sangal AL (2021) Hmoshssa: a hybrid meta-heuristic approach for solving constrained optimization problems. Eng Comput 37 (4):3167\u20133203","journal-title":"Eng Comput"},{"issue":"5","key":"15284_CR19","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MCE.2020.3003127","volume":"10","author":"RK Koppanati","year":"2021","unstructured":"Koppanati RK, Kumar K (2021) P-mec: Polynomial congruence-based multimedia encryption technique over cloud. IEEE Consum Electron Mag 10(5):41\u201346","journal-title":"IEEE Consum Electron Mag"},{"key":"15284_CR20","doi-asserted-by":"crossref","unstructured":"Koppanati RK, Qamar S, Kumar K (2018) Small: Secure multimedia technique using logistic and lfsr. In: 2018 2nd International conference on intelligent computing and control systems (ICICCS), pp 1820\u20131825. IEEE","DOI":"10.1109\/ICCONS.2018.8662840"},{"issue":"7","key":"15284_CR21","doi-asserted-by":"crossref","first-page":"11079","DOI":"10.1007\/s11042-020-10157-4","volume":"80","author":"K Kumar","year":"2021","unstructured":"Kumar K (2021) Text query based summarized event searching interface system using deep learning over cloud. Multimed Tools Appl 80(7):11079\u201311094","journal-title":"Multimed Tools Appl"},{"key":"15284_CR22","doi-asserted-by":"crossref","unstructured":"Li Y, Li X, Jin X, Zhao G, Ge S, Tian Y, Zhang X, Zhang K, Wang Z (2015) An image encryption algorithm based on zigzag transformation and 3-dimension chaotic logistic map. In: Niu W, Li G, Liu J, Tan J, Guo Li, Han Z, Batten L (eds) Applications and Techniques in Information Security, volume 557 of Communications in Computer and Information Science, pp 3\u201313. Springer Berlin Heidelberg, Berlin, Heidelberg","DOI":"10.1007\/978-3-662-48683-2_1"},{"key":"15284_CR23","doi-asserted-by":"crossref","first-page":"108032","DOI":"10.1016\/j.asoc.2021.108032","volume":"113","author":"T Li","year":"2021","unstructured":"Li T, Qian Z, Deng W, Zhang D, Lu H, Wang S (2021) Forecasting crude oil prices based on variational mode decomposition and random sparse bayesian learning. Appl Soft Comput 113:108032","journal-title":"Appl Soft Comput"},{"key":"15284_CR24","doi-asserted-by":"crossref","unstructured":"Li T, Shi J, Li X, Wu J, Pan F (2019) Image encryption based on pixel-level diffusion with dynamic filtering and DNA-Level permutation with 3D Latin cubes. Entropy, 21(3): 319","DOI":"10.3390\/e21030319"},{"issue":"1","key":"15284_CR25","first-page":"013008","volume":"30","author":"T Li","year":"2021","unstructured":"Li T, Shi J, Zhang D (2021) Color image encryption based on joint permutation and diffusion. J Electron Imaging 30(1):013008","journal-title":"J Electron Imaging"},{"key":"15284_CR26","first-page":"9010251","volume":"2017","author":"T Li","year":"2017","unstructured":"Li T, Yang M, Wu J, Jing X (2017) A novel image encryption algorithm based on a fractional-order hyperchaotic system and dna computing. Complexity 2017:9010251","journal-title":"Complexity"},{"issue":"5","key":"15284_CR27","doi-asserted-by":"crossref","first-page":"510","DOI":"10.3390\/e23050510","volume":"23","author":"T Li","year":"2021","unstructured":"Li T, Zhang D (2021) Hyperchaotic image encryption based on multiple bit permutation and diffusion. Entropy 23(5):510","journal-title":"Entropy"},{"issue":"4","key":"15284_CR28","doi-asserted-by":"crossref","first-page":"2383","DOI":"10.1007\/s11071-012-0626-5","volume":"70","author":"C Li","year":"2012","unstructured":"Li C, Zhang LY, Ou R, Wong K-W, Shu S (2012) Breaking a novel colour image encryption algorithm based on chaos. Nonlinear Dyn 70(4):2383\u20132388","journal-title":"Nonlinear Dyn"},{"key":"15284_CR29","doi-asserted-by":"crossref","unstructured":"Li Z, Zhang F, Zhang X, Zhao Y (2021) A new hyperchaotic complex system and its synchronization realization. Physica Scripta 96(4):045208","DOI":"10.1088\/1402-4896\/abdf0c"},{"issue":"8","key":"15284_CR30","doi-asserted-by":"crossref","first-page":"4363","DOI":"10.1007\/s11042-015-2479-7","volume":"75","author":"Y Liu","year":"2016","unstructured":"Liu Y, Wang J, Fan J, Gong L (2016) Image encryption algorithm based on chaotic system and dynamic s-boxes composed of dna sequences. Multimed Tools Appl 75(8):4363\u20134382","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"15284_CR31","doi-asserted-by":"crossref","first-page":"869","DOI":"10.1049\/iet-spr.2016.0709","volume":"11","author":"L Liu","year":"2017","unstructured":"Liu L, Wang YN, Hou L, Feng XR (2017) Easy encoding and low bit\u2013error\u2013rate chaos communication system based on reverse\u2013time chaotic oscillator. IET Signal Process 11(7):869\u2013876","journal-title":"IET Signal Process"},{"key":"15284_CR32","doi-asserted-by":"crossref","first-page":"185796","DOI":"10.1109\/ACCESS.2019.2961164","volume":"7","author":"L Liu","year":"2019","unstructured":"Liu L, Zhang L, Jiang D, Guan Y, Zhang Z (2019) A simultaneous scrambling and diffusion color image encryption algorithm based on hopfield chaotic neural network. IEEE Access 7:185796\u2013185810","journal-title":"IEEE Access"},{"issue":"2","key":"15284_CR33","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1016\/j.cnsns.2014.05.022","volume":"20","author":"Y Luo","year":"2015","unstructured":"Luo Y, Du M, Liu J (2015) A symmetrical image encryption scheme in wavelet and time domain. Commun Nonlinear Sci Numer Simul 20(2):447\u2013460","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"15284_CR34","doi-asserted-by":"crossref","first-page":"105818","DOI":"10.1016\/j.optlastec.2019.105818","volume":"121","author":"M Mahmud","year":"2020","unstructured":"Mahmud M, Rahman AU, Lee M, Choi J-Y (2020) Evolutionary-based image encryption using rna codons truth table. Opt, Laser Technol 121:105818","journal-title":"Opt, Laser Technol"},{"key":"15284_CR35","doi-asserted-by":"crossref","unstructured":"Manupriya P, Sinha S, Kumar K (2017) V\u2295see: Video secret sharing encryption technique. In: 2017 Conference on information and communication technology (CICT), pp 1\u20136. IEEE","DOI":"10.1109\/INFOCOMTECH.2017.8340639"},{"key":"15284_CR36","doi-asserted-by":"crossref","unstructured":"Mohamed HG, ElKamchouchi DH, Moussa KH (2020) A novel color image encryption algorithm based on hyperchaotic maps and mitochondrial dna sequences. Entropy (Basel, Switzerland), 22(2)","DOI":"10.3390\/e22020158"},{"key":"15284_CR37","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak C, Huang L (2017) A new color image encryption using combination of the 1d chaotic map. Signal Process 138:129\u2013137","journal-title":"Signal Process"},{"issue":"5","key":"15284_CR38","doi-asserted-by":"crossref","first-page":"1202","DOI":"10.1016\/j.sigpro.2011.11.004","volume":"92","author":"SM Seyedzadeh","year":"2012","unstructured":"Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92(5):1202\u20131215","journal-title":"Signal Process"},{"key":"15284_CR39","doi-asserted-by":"crossref","unstructured":"Sharma S, Kumar K (2018) Guess: Genetic uses in video encryption with secret sharing. In: Chaudhuri BB, Kankanhalli MS, Raman B (eds) Proceedings of 2nd International conference on computer vision & image processing, vol 703 of Advances in intelligent systems and computing, pp 51\u201362. Springer Singapore, Singapore","DOI":"10.1007\/978-981-10-7895-8_5"},{"issue":"3","key":"15284_CR40","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1007\/s12652-019-01385-0","volume":"11","author":"PS Sneha","year":"2020","unstructured":"Sneha PS, Sankar S, Kumar AS (2020) A chaotic colour image encryption scheme combining walsh\u2013hadamard transform and arnold\u2013tent maps. J Ambient Intell Humaniz Comput 11(3):1289\u20131308","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"15284_CR41","doi-asserted-by":"crossref","unstructured":"Sri\u0307ni\u0307vasu NP, Norwawi\u0307 N, Ami\u0307ri\u0307palli\u0307 SS, Deepalakshmi\u0307 P (2021) Secured compression for 2d medical images through the manifold and fuzzy trapezoidal correlation function. GAZI UNIVERSITY JOURNAL OF SCIENCE","DOI":"10.35378\/gujs.884880"},{"key":"15284_CR42","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.sigpro.2017.06.010","volume":"141","author":"S Toughi","year":"2017","unstructured":"Toughi S, Fathi MH, Sekhavat YA (2017) An image encryption scheme based on elliptic curve pseudo random and advanced encryption system. Signal Process 141:217\u2013227","journal-title":"Signal Process"},{"key":"15284_CR43","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1016\/j.sigpro.2017.11.005","volume":"144","author":"H Wang","year":"2018","unstructured":"Wang H, Di X, Chen X, Huang H (2018) Cryptanalysis and enhancements of image encryption using combination of the 1d chaotic map. Signal Process 144:444\u2013452","journal-title":"Signal Process"},{"key":"15284_CR44","doi-asserted-by":"crossref","first-page":"106366","DOI":"10.1016\/j.optlastec.2020.106366","volume":"131","author":"X Wang","year":"2020","unstructured":"Wang X, Guan N (2020) A novel chaotic image encryption algorithm based on extended zigzag confusion and rna operation. Opt, Laser Technol 131:106366","journal-title":"Opt, Laser Technol"},{"key":"15284_CR45","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.asoc.2015.08.008","volume":"37","author":"X Wu","year":"2015","unstructured":"Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on dna sequences and multiple improved 1d chaotic maps. Appl Soft Comput 37:24\u201339","journal-title":"Appl Soft Comput"},{"key":"15284_CR46","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/j.ins.2013.11.027","volume":"264","author":"Y Wu","year":"2014","unstructured":"Wu Y, Zhou Y, Noonan JP, Agaian Sos (2014) Design of image cipher using latin squares. Inf Sci 264:317\u2013339","journal-title":"Inf Sci"},{"key":"15284_CR47","doi-asserted-by":"crossref","first-page":"299","DOI":"10.4028\/www.scientific.net\/AMR.171-172.299","volume":"171-172","author":"ZH Xian","year":"2010","unstructured":"Xian ZH, Sun SL (2010) Image encryption algorithm based on chaos and s-boxes scrambling. Adv Mater Res 171-172:299\u2013304","journal-title":"Adv Mater Res"},{"key":"15284_CR48","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2018.11.010","volume":"478","author":"M Xu","year":"2019","unstructured":"Xu M, Tian Z (2019) A novel image cipher based on 3d bit matrix and latin cubes. Inf Sci 478:1\u201314","journal-title":"Inf Sci"},{"key":"15284_CR49","first-page":"102505","volume":"53","author":"M Yadollahi","year":"2020","unstructured":"Yadollahi M, Enayatifar R, Nematzadeh H, Lee M, Choi J-Y (2020) A novel image security technique based on nucleic acid concepts. J Inf Secur Appli 53:102505","journal-title":"J Inf Secur Appli"},{"key":"15284_CR50","doi-asserted-by":"crossref","first-page":"106553","DOI":"10.1016\/j.optlastec.2020.106553","volume":"133","author":"Y Yang","year":"2021","unstructured":"Yang Y, Wang L, Duan S, Li L (2021) Dynamical analysis and image encryption application of a novel memristive hyperchaotic system. Opt, Laser Technol 133:106553","journal-title":"Opt, Laser Technol"},{"issue":"3","key":"15284_CR51","doi-asserted-by":"crossref","first-page":"361","DOI":"10.3390\/e23030361","volume":"23","author":"D Zhang","year":"2021","unstructured":"Zhang D, Chen L, Li T (2021) Hyper-chaotic color image encryption based on transformed zigzag diffusion and rna operation. Entropy 23(3):361","journal-title":"Entropy"},{"issue":"3","key":"15284_CR52","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1016\/j.chaos.2004.09.035","volume":"24","author":"L Zhang","year":"2005","unstructured":"Zhang L, Liao X, Wang X (2005) An image encryption approach based on chaotic maps. Chaos Solit Fractals 24(3):759\u2013765","journal-title":"Chaos Solit Fractals"},{"issue":"4","key":"15284_CR53","doi-asserted-by":"crossref","first-page":"1562","DOI":"10.1016\/j.ijleo.2013.09.018","volume":"125","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Wen W, Su M, Li M (2014) Cryptanalyzing a novel image fusion encryption algorithm based on dna sequence operation and hyper-chaotic system. Optik 125(4):1562\u20131564","journal-title":"Optik"},{"key":"15284_CR54","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Bao L, Chen CP (2014) A new 1d chaotic system for image encryption. Signal Process 97:172\u2013182","journal-title":"Signal Process"},{"issue":"9","key":"15284_CR55","doi-asserted-by":"crossref","first-page":"2001","DOI":"10.1109\/TCYB.2014.2363168","volume":"45","author":"Y Zhou","year":"2015","unstructured":"Zhou Y, Hua Z, Pun C-M, Chen CP (2015) Cascade chaotic system with applications. IEEE Trans Cybern 45(9):2001\u20132012","journal-title":"IEEE Trans Cybern"},{"key":"15284_CR56","doi-asserted-by":"crossref","first-page":"106437","DOI":"10.1016\/j.optlastec.2020.106437","volume":"131","author":"J Zhou","year":"2020","unstructured":"Zhou J, Zhou N-R, Gong L-H (2020) Fast color image encryption scheme based on 3d orthogonal latin squares and matching matrix. Opt, Laser Technol 131:106437","journal-title":"Opt, Laser Technol"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15284-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15284-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15284-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,6]],"date-time":"2024-01-06T05:08:03Z","timestamp":1704517683000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15284-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,17]]},"references-count":56,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["15284"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15284-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,5,17]]},"assertion":[{"value":"2 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 April 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}