{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:48:55Z","timestamp":1773514135051,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T00:00:00Z","timestamp":1687046400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T00:00:00Z","timestamp":1687046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001412","name":"Council of Scientific and Industrial Research, India","doi-asserted-by":"publisher","award":["F.No.09\/107(0385)\/2017-EMR-I"],"award-info":[{"award-number":["F.No.09\/107(0385)\/2017-EMR-I"]}],"id":[{"id":"10.13039\/501100001412","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11042-023-15698-y","type":"journal-article","created":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T02:01:21Z","timestamp":1687053681000},"page":"6803-6828","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A novel method of digital image encryption using graph theory"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0227-4032","authenticated-orcid":false,"given":"Anand B.","family":"Joshi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6725-4772","authenticated-orcid":false,"given":"Dhanesh","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Sachin","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Sonali","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,18]]},"reference":[{"issue":"1","key":"15698_CR1","first-page":"14","volume":"1","author":"B Acharya","year":"2007","unstructured":"Acharya B, Rath GS, Patra SK, Panigrahy SK (2007) Novel method of generating self invertible matrix for hill cipher algorithm. Int J Security 1(1):14\u201321","journal-title":"Int J Security"},{"key":"15698_CR2","doi-asserted-by":"publisher","unstructured":"Yu SS, Zhou NR, Gong LH, Nie Z (2020) Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system. Opt Lasers Eng 124:105816\u2013105826. https:\/\/doi.org\/10.1016\/j.optlaseng.2019.105816","DOI":"10.1016\/j.optlaseng.2019.105816"},{"key":"15698_CR3","doi-asserted-by":"publisher","first-page":"106901","DOI":"10.1016\/j.optlastec.2020.106901","volume":"138","author":"H Chen","year":"2021","unstructured":"Chen H, Liu Z, Tanougast C, Blondel W (2021) Comment on \u201cA novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation.\u2019\u2019. Opt Laser Technol 138:106901. https:\/\/doi.org\/10.1016\/j.optlastec.2020.106901","journal-title":"Opt Laser Technol"},{"issue":"19","key":"15698_CR4","doi-asserted-by":"crossref","first-page":"2519","DOI":"10.9734\/JSRR\/2014\/11804","volume":"3","author":"WMA Etaiwi","year":"2014","unstructured":"Etaiwi WMA (2014) Encryption using graph theory. J Sci Res Rep 3(19):2519\u20132527","journal-title":"J Sci Res Rep"},{"key":"15698_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2019.105777","volume":"121","author":"MAB Farah","year":"2020","unstructured":"Farah MAB, Guesmi R, Kachouri A, Samet M (2020) A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt Laser Technol 121:105777. https:\/\/doi.org\/10.1016\/j.optlastec.2019.105777","journal-title":"Opt Laser Technol"},{"key":"15698_CR6","first-page":"352","volume-title":"Image encryption through using chaotic function and graph","author":"S Faridnia","year":"2010","unstructured":"Faridnia S, Fae\u2019z K (2010) Image encryption through using chaotic function and graph. Int Conf Comput Vision Graphics, Warsaw, Poland, pp 352\u2013359"},{"key":"15698_CR7","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1155\/2014\/910106","volume":"2014","author":"N Goel","year":"2014","unstructured":"Goel N, Raman B, Gupta I (2014) Chaos based joint compression and encryption framework for end-to-end communication systems. Advances in Multimedia, Article ID 2014:14. https:\/\/doi.org\/10.1155\/2014\/910106","journal-title":"Advances in Multimedia, Article ID"},{"issue":"6","key":"15698_CR8","doi-asserted-by":"publisher","first-page":"2150151","DOI":"10.1142\/S0218348X21501516","volume":"29","author":"V Guleria","year":"2021","unstructured":"Guleria V, Mishra DC (2021) Multiple RGB image encryption algorithm with multilayers by Affine Hill Cipher with FrDCT and Arnold Transform. Fractals 29(6):2150151\u20131308","journal-title":"Fractals"},{"key":"15698_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106139","volume":"133","author":"AB Joshi","year":"2020","unstructured":"Joshi AB, Kumar D, Gaffar A, Mishra DC (2020) Triple color image encryption based on 2D multiple parameter fractional discrete Fourier transform and 3D Arnold transform. Opt Lasers Eng 133:106139. https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106139","journal-title":"Opt Lasers Eng"},{"issue":"10","key":"15698_CR10","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1080\/09500340.2020.1789233","volume":"67","author":"AB Joshi","year":"2020","unstructured":"Joshi AB, Kumar D, Mishra DC, Guleria V (2020) Colour-image encryption based on 2D discrete wavelet transform and 3D logistic chaotic map. J Mod Opt 67(10):933\u2013949. https:\/\/doi.org\/10.1080\/09500340.2020.1789233","journal-title":"J Mod Opt"},{"issue":"1","key":"15698_CR11","doi-asserted-by":"publisher","first-page":"2150006","DOI":"10.1142\/S0219467821500066","volume":"21","author":"AB Joshi","year":"2021","unstructured":"Joshi AB, Kumar D, Mishra DC (2021) Security of Digital Images Based on 3D Arnold Cat Map and Elliptic Curve. Int J Image Graphics 21(1):2150006\u201321500026. https:\/\/doi.org\/10.1142\/S0219467821500066","journal-title":"Int J Image Graphics"},{"key":"15698_CR12","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.optlaseng.2019.06.005","volume":"122","author":"S Liansheng","year":"2019","unstructured":"Liansheng S, Cong D, Xiao Z, Ailing T, Anand A (2019) Double-image encryption based on interference and logistic map under the framework of double random phase encoding. Opt Lasers Eng 122:113\u2013122. https:\/\/doi.org\/10.1016\/j.optlaseng.2019.06.005","journal-title":"Opt Lasers Eng"},{"issue":"3","key":"15698_CR13","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2019","unstructured":"Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A new payload partition strategy in color image steganography. IEEE Trans Circuits Syst Video Technol 30(3):685\u2013696","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"2","key":"15698_CR14","first-page":"897","volume":"19","author":"X Liao","year":"2020","unstructured":"Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Trans Dependable Secure Comput 19(2):897\u2013911","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"5","key":"15698_CR15","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1109\/JSTSP.2020.3002391","volume":"14","author":"X Liao","year":"2020","unstructured":"Liao X, Li K, Zhu X, Liu KJR (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Sel Top Signal Process 14(5):955\u2013968","journal-title":"IEEE J Sel Top Signal Process"},{"key":"15698_CR16","unstructured":"Tokareva N (2014) Connections between graph theory and cryptography. Graphs and Groups, Cycles and Coverings, Novosibirsk, Russia, pp. 23-26"},{"issue":"3","key":"15698_CR17","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1080\/09720529.2013.878819","volume":"18","author":"PLK Priyadarsini","year":"2015","unstructured":"Priyadarsini PLK (2015) Survey on some applications of graph theory in cryptography. J Discret Math Sci Cryptogr 18(3):209\u2013217. https:\/\/doi.org\/10.1080\/09720529.2013.878819","journal-title":"J Discret Math Sci Cryptogr"},{"key":"15698_CR18","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.optcom.2016.11.002","volume":"388","author":"SK Rajput","year":"2017","unstructured":"Rajput SK, Nishchal NK (2017) Optical double image security using random phase fractional Fourier domain encoding and phase-retrieval algorithm. Opt Commun 388:38\u201346. https:\/\/doi.org\/10.1016\/j.optcom.2016.11.002","journal-title":"Opt Commun"},{"issue":"14","key":"15698_CR19","doi-asserted-by":"publisher","first-page":"21979","DOI":"10.1007\/s11042-021-10692-8","volume":"80","author":"A Rehman","year":"2021","unstructured":"Rehman A, Liao X, Wang H (2021) An innovative technique for image encryption using tri-partite graph and chaotic maps. Multimed Tools Appl 80(14):21979\u201322005. https:\/\/doi.org\/10.1007\/s11042-021-10692-8","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"15698_CR20","doi-asserted-by":"publisher","first-page":"2243","DOI":"10.1007\/s11277-020-07680-w","volume":"115","author":"A Shafique","year":"2020","unstructured":"Shafique A, Ahmed F (2020) Image encryption using dynamic S-box substitution in the wavelet domain. Wirel Pers Commun 115(3):2243\u20132268","journal-title":"Wirel Pers Commun"},{"issue":"3","key":"15698_CR21","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379\u2013423","journal-title":"Bell Syst Tech J"},{"issue":"10","key":"15698_CR22","doi-asserted-by":"publisher","first-page":"15825","DOI":"10.1007\/s11042-021-10550-7","volume":"80","author":"X Sun","year":"2021","unstructured":"Sun X, Shao Z, Shang Y, Liang M, Yang F (2021) Multiple-image encryption based on cascaded gyrator transforms and high-dimensional chaotic system. Multimed Tools Appl 80(10):15825\u201315848","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"15698_CR23","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/j.aeue.2010.04.011","volume":"65","author":"N Taneja","year":"2011","unstructured":"Taneja N, Raman B, Gupta I (2011) Selective image encryption in fractional wavelet domain. Int J Electron Commun 65(4):338\u2013344","journal-title":"Int J Electron Commun"},{"issue":"02","key":"15698_CR24","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1142\/S0219691311004092","volume":"09","author":"N Taneja","year":"2011","unstructured":"Taneja N, Raman B, Gupta I (2011) Chaos based partial encryption of spiht compressed images. Int J Wavelets Multiresolut Inf Process 09(02):317\u2013331","journal-title":"Int J Wavelets Multiresolut Inf Process"},{"issue":"3","key":"15698_CR25","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1007\/s11042-011-0775-4","volume":"59","author":"N Taneja","year":"2012","unstructured":"Taneja N, Raman B, Gupta I (2012) Combinational domain encryption for still visual data. Multimed Tools Appl 59(3):775\u2013793. https:\/\/doi.org\/10.1007\/s11042-011-0775-4","journal-title":"Multimed Tools Appl"},{"key":"15698_CR26","first-page":"23","volume-title":"Connections between graph theory and cryptography","author":"N Tokareva","year":"2014","unstructured":"Tokareva N (2014) Connections between graph theory and cryptography. Graphs and Groups, Cycles and Coverings, Novosibirsk, Russia, pp 23\u201326"},{"issue":"4","key":"15698_CR27","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612. https:\/\/doi.org\/10.1109\/TIP.2003.819861","journal-title":"IEEE Trans Image Process"},{"issue":"2","key":"15698_CR28","first-page":"128","volume":"4","author":"M Yamuna","year":"2015","unstructured":"Yamuna M, Karthika K (2015) Data transfer using bipartite graphs. Int J Advance Research Sci Eng 4(2):128\u2013131","journal-title":"Int J Advance Research Sci Eng"},{"key":"15698_CR29","doi-asserted-by":"publisher","first-page":"105816","DOI":"10.1016\/j.optlaseng.2019.105816","volume":"124","author":"SS Yu","year":"2020","unstructured":"Yu SS, Zhou NR, Gong LH, Nie Z (2020) Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system. Opt Lasers Eng 124:105816\u2013105826. https:\/\/doi.org\/10.1016\/j.optlaseng.2019.105816","journal-title":"Opt Lasers Eng"},{"issue":"1","key":"15698_CR30","doi-asserted-by":"publisher","first-page":"73","DOI":"10.3390\/e22010073","volume":"22","author":"W Zhang","year":"2020","unstructured":"Zhang W, Wang S, Han W, Yu H, Zhu Z (2020) An image encryption algorithm based on random hamiltonian path. Entropy 22(1):73. https:\/\/doi.org\/10.3390\/e22010073","journal-title":"Entropy"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15698-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15698-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15698-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T14:02:01Z","timestamp":1729605721000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15698-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,18]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["15698"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15698-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,18]]},"assertion":[{"value":"29 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 April 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 April 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 June 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}