{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:26:00Z","timestamp":1764937560096,"version":"3.37.3"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11042-023-15707-0","type":"journal-article","created":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T05:01:27Z","timestamp":1684299687000},"page":"3397-3424","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Image transfer with secure communications application using a new reversible chaotic image encryption"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5347-4491","authenticated-orcid":false,"given":"Ali","family":"Durdu","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,17]]},"reference":[{"key":"15707_CR1","doi-asserted-by":"publisher","first-page":"18043","DOI":"10.1007\/s11042-020-10288-8","volume":"80","author":"NR Babu","year":"2021","unstructured":"Babu NR, Kalpana M, Balasubramaniam P (2021) A novel audio encryption approach via finite-time synchronization of fractional order hyperchaotic system. Multimed Tools Appl 80:18043\u201318067. https:\/\/doi.org\/10.1007\/s11042-020-10288-8","journal-title":"Multimed Tools Appl"},{"key":"15707_CR2","doi-asserted-by":"publisher","unstructured":"Cheng C, Bin, Cheng CJ (2012) Robust synchronization of chaotic systems subject to noise and its application to secure communication. Proceedings \u2013 2012 4th International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN. https:\/\/doi.org\/10.1109\/CICSyN.2012.46","DOI":"10.1109\/CICSyN.2012.46"},{"issue":"3","key":"15707_CR3","doi-asserted-by":"publisher","first-page":"271","DOI":"10.5755\/j01.itc.44.3.7720","volume":"44","author":"A Durdu","year":"2015","unstructured":"Durdu A, \u00d6zcerit AT, Uyaro\u011flu Y (2015) A novel chaotic system for secure communication applications. Inform Technol Control 44(3):271\u2013278. https:\/\/doi.org\/10.5755\/j01.itc.44.3.7720","journal-title":"Inform Technol Control"},{"key":"15707_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16699-0_4","volume-title":"Advances in Information Technology. IAIT 2010. Communications in Computer and Information Science","author":"O Findik","year":"2010","unstructured":"Findik O, Kahramanli \u015e (2010) Using chaotic system in encryption. In: Papasratorn B, Lavangnananda K, Chutimaskul W, Vanijja V (eds) Advances in Information Technology. IAIT 2010. Communications in computer and information science, vol 114. Springer, Berlin. https:\/\/doi.org\/10.1007\/978-3-642-16699-0_4"},{"key":"15707_CR5","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s11082-021-03406-9","volume":"54","author":"IA Hamadi","year":"2022","unstructured":"Hamadi IA, Jamal RK, Mousa SK (2022) Image encryption based on computer generated hologram and Rossler chaotic system. Opt Quant Electron 54:33. https:\/\/doi.org\/10.1007\/s11082-021-03406-9","journal-title":"Opt Quant Electron"},{"issue":"1","key":"15707_CR6","first-page":"58","volume":"53","author":"R Hasimoto-Beltran","year":"2007","unstructured":"Hasimoto-Beltran R (2007) Low-complexity chaotic encryption system. Rev Mex Fis 53(1):58\u201365","journal-title":"Rev Mex Fis"},{"key":"15707_CR7","doi-asserted-by":"publisher","unstructured":"Hore A, Ziou D (2010) Image quality, metrics PSNR vs. SSIM. 20th international conference on pattern recognition, Istanbul, Turkey, 2366\u20132369, August 23\u201326. https:\/\/doi.org\/10.1109\/ICPR.2010.579","DOI":"10.1109\/ICPR.2010.579"},{"key":"15707_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2003.11.027","author":"L Huang","year":"2004","unstructured":"Huang L, Feng R, Wang M (2004) Synchronization of chaotic systems via nonlinear control. Phys Lett Sect A Gen At Solid State Phys. https:\/\/doi.org\/10.1016\/j.physleta.2003.11.027","journal-title":"Phys Lett Sect A Gen At Solid State Phys"},{"issue":"1","key":"15707_CR9","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/45.747237","volume":"18","author":"T Jamil","year":"1999","unstructured":"Jamil T (1999) Steganography: the art of hiding information in plain sight. Potentials IEEE 18(1):10\u201312","journal-title":"Potentials IEEE"},{"key":"15707_CR10","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.jisa.2014.11.003","volume":"21","author":"M Kumar","year":"2015","unstructured":"Kumar M, Powduri P, Reddy A (2015) An RGB image encryption using diffusion process associated with chaotic map. J Inf Secur Appl 21:20\u201330. https:\/\/doi.org\/10.1016\/j.jisa.2014.11.003","journal-title":"J Inf Secur Appl"},{"key":"15707_CR11","doi-asserted-by":"publisher","first-page":"28025","DOI":"10.1007\/s11042-019-07893-7","volume":"78","author":"M Kumar","year":"2019","unstructured":"Kumar M, Sathish G, Alphonse M, Lahcen RAM (2019) A new RGB image encryption using generalized heat equation associated with generalized Vigen \u00e8 re-type table over symmetric group. Multimed Tools Appl 78:28025\u201328061. https:\/\/doi.org\/10.1007\/s11042-019-07893-7","journal-title":"Multimed Tools Appl"},{"key":"15707_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-38700-6_1","volume-title":"Multimedia Security using chaotic maps: principles and methodologies. Studies in Computational Intelligence","author":"M Kumar","year":"2020","unstructured":"Kumar M, Saxena A, Vuppala SS (2020) A Survey on Chaos based image encryption techniques. In: Hosny K (ed) Multimedia Security using chaotic maps: principles and methodologies. Studies in computational intelligence, vol 884. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-38700-6_1"},{"key":"15707_CR13","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.sigpro.2018.01.026","volume":"147","author":"R Lan","year":"2018","unstructured":"Lan R, He J, Wang S, Gu T, Luo X (2018) Integrated chaotic systems for image encryption. Sig Process 147:133\u2013145. https:\/\/doi.org\/10.1016\/j.sigpro.2018.01.026","journal-title":"Sig Process"},{"key":"15707_CR14","doi-asserted-by":"publisher","unstructured":"Li W, Zhang Q, Ding Q (2015) Digital encryption method based on lorenz continuous chaotic system. 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC), pp 262\u2013266. https:\/\/doi.org\/10.1109\/IMCCC.2015.62","DOI":"10.1109\/IMCCC.2015.62"},{"key":"15707_CR15","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s11071-016-3030-8","volume":"87","author":"C Li","year":"2017","unstructured":"Li C, Luo G, Qin K et al (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87:127\u2013133. https:\/\/doi.org\/10.1007\/s11071-016-3030-8","journal-title":"Nonlinear Dyn"},{"key":"15707_CR16","doi-asserted-by":"publisher","unstructured":"Li C, Luo G, Qin K, Li C (2017) Chaotic image encryption schemes: a review. In: Proceedings of the 2017 2nd International Conference on Electrical, Automation and Mechanical Engineering (EAME 2017). Atlantis Press, pp 261\u2013263. https:\/\/doi.org\/10.2991\/eame-17.2017.61","DOI":"10.2991\/eame-17.2017.61"},{"issue":"2","key":"15707_CR17","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1109\/TDSC.2020.3004708","volume":"19","author":"X Liao","year":"2022","unstructured":"Liao X, Yin J, Chen M, Qin Z (2022) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Trans Dependable Secur Comput 19(2):897\u2013911. https:\/\/doi.org\/10.1109\/TDSC.2020.3004708","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"15707_CR18","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1016\/S0016-0032(99)00010-1","volume":"336","author":"TL Liao","year":"1999","unstructured":"Liao TL, Lin SH (1999) Adaptive control and synchronization of Lorenz systems. J Frankl Inst 336:925","journal-title":"J Frankl Inst"},{"issue":"5","key":"15707_CR19","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1109\/JSTSP.2020.3002391","volume":"14","author":"X Liao","year":"2020","unstructured":"Liao X, Li K, Zhu X, Liu KJR (2020) Robust detection of Image Operator Chain with Two-Stream Convolutional neural network. IEEE J Selec Topics Signal Process 14(5):955\u2013968. https:\/\/doi.org\/10.1109\/JSTSP.2020.3002391","journal-title":"IEEE J Selec Topics Signal Process"},{"issue":"3","key":"15707_CR20","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2020","unstructured":"Liao X, Yu Y, Li B, Li Z, Qin Z (2020) A new payload partition strategy in color image steganography. IEEE Trans Circuits Syst Video Technol 30(3):685\u2013696. https:\/\/doi.org\/10.1109\/TCSVT.2019.2896270","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"15707_CR21","doi-asserted-by":"publisher","first-page":"3895","DOI":"10.1016\/J.OPTCOM.2011.04.001","volume":"284","author":"H Liu","year":"2011","unstructured":"Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284:3895\u20133903. https:\/\/doi.org\/10.1016\/J.OPTCOM.2011.04.001","journal-title":"Opt Commun"},{"key":"15707_CR22","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1016\/J.ASOC.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12:1457\u20131466. https:\/\/doi.org\/10.1016\/J.ASOC.2012.01.016","journal-title":"Appl Soft Comput"},{"key":"15707_CR23","unstructured":"Matlab Code.\u00a0https:\/\/drive.google.com\/file\/d\/11p4axhfV9w7KQ9cjepfEmqT4D2IxPXCi\/view?usp=sharing"},{"key":"15707_CR24","first-page":"57984","volume":"25","author":"JH Park","year":"2005","unstructured":"Park JH (2005) Chaos synchronization of a chaotic system via nonlinear control. Chaos Solitons Fractals 25:57984","journal-title":"Chaos Solitons Fractals"},{"key":"15707_CR25","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1103\/PhysRevLett.64.821","volume":"64","author":"LM Pecora","year":"1990","unstructured":"Pecora LM, Carroll TL (1990) Synchronization in chaotic systems. Phys Rev Lett 64:821\u2013824. https:\/\/doi.org\/10.1103\/PhysRevLett.64.821","journal-title":"Phys Rev Lett"},{"issue":"4","key":"15707_CR26","doi-asserted-by":"publisher","first-page":"2374","DOI":"10.1103\/PhysRevA.44.2374","volume":"44","author":"LM Pecora","year":"1991","unstructured":"Pecora LM, Carroll TL (1991) Driving systems with chaotic signals. Phys Rev A 44(4):2374\u20132383. https:\/\/doi.org\/10.1103\/PhysRevA.44.2374","journal-title":"Phys Rev A"},{"key":"15707_CR27","unstructured":"Pehlivan \u0130, Uyaro\u011flu Y, Yal\u00e7\u0131n MA, Feriko\u011flu A (2007) Sprott_94_A Kaotik Sisteminin Senkronizasyonu ve Bilgi Gizlemede Kullan\u0131lmas\u0131. Information security and cryptology conference with international participation"},{"key":"15707_CR28","volume-title":"Digital communications","author":"JG Proakis","year":"2007","unstructured":"Proakis JG, Salehi M (2007) Digital communications. McGraw-Hill Education, New York"},{"key":"15707_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-06567-7","author":"Y Qobbi","year":"2022","unstructured":"Qobbi Y, Jarjar A, Essaid M et al (2022) Image encryption algorithm based on genetic operations and chaotic DNA encoding. Soft Comput. https:\/\/doi.org\/10.1007\/s00500-021-06567-7","journal-title":"Soft Comput"},{"key":"15707_CR30","doi-asserted-by":"publisher","first-page":"3616","DOI":"10.1088\/1009-1963\/16\/12\/011","volume":"16","author":"FY Sun","year":"2007","unstructured":"Sun FY, Liu ST, L\u00fc ZW (2007) Image encryption using high-dimension chaotic system. Chin Phys 16:3616\u20133623. https:\/\/doi.org\/10.1088\/1009-1963\/16\/12\/011","journal-title":"Chin Phys"},{"key":"15707_CR31","doi-asserted-by":"publisher","first-page":"12927","DOI":"10.1016\/j.chaos.2005.04.104","volume":"27","author":"A U\u00e7ar","year":"2006","unstructured":"U\u00e7ar A, Lonngren KE, Bai EW (2006) Synchronization of the unified chaotic systems via active control. Chaos Solitons Fractals 27:12927","journal-title":"Chaos Solitons Fractals"},{"issue":"3","key":"15707_CR32","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/TIP.2003.819861","volume":"9","author":"Z Wang","year":"2002","unstructured":"Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Process Lett 9(3):81\u201384. https:\/\/doi.org\/10.1109\/TIP.2003.819861","journal-title":"IEEE Signal Process Lett"},{"key":"15707_CR33","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.physd.2006.09.038","volume":"225","author":"F Wang","year":"2007","unstructured":"Wang F, Liu C (2007) Synchronization of unified chaotic system based on passive control. Phys D 225:55\u201360","journal-title":"Phys D"},{"key":"15707_CR34","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/J.INS.2020.06.030","volume":"539","author":"X Wang","year":"2020","unstructured":"Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a boolean network. Inf Sci (Ny) 539:195\u2013214. https:\/\/doi.org\/10.1016\/J.INS.2020.06.030","journal-title":"Inf Sci (Ny)"},{"key":"15707_CR35","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/J.INS.2019.08.041","volume":"507","author":"X Wang","year":"2020","unstructured":"Wang X, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci (Ny) 507:16\u201336. https:\/\/doi.org\/10.1016\/J.INS.2019.08.041","journal-title":"Inf Sci (Ny)"},{"key":"15707_CR36","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/J.INS.2021.04.013","volume":"569","author":"X Wang","year":"2021","unstructured":"Wang X, Yang J (2021) A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Inf Sci (Ny) 569:217\u2013240. https:\/\/doi.org\/10.1016\/J.INS.2021.04.013","journal-title":"Inf Sci (Ny)"},{"key":"15707_CR37","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.ins.2021.07.096","volume":"579","author":"X Wang","year":"2021","unstructured":"Wang X, Zhang M (2021) An image encryption algorithm based on new chaos and diffusion values of a truth table. Inf Sci (Ny) 579:128\u2013149. https:\/\/doi.org\/10.1016\/j.ins.2021.07.096","journal-title":"Inf Sci (Ny)"},{"key":"15707_CR38","doi-asserted-by":"publisher","first-page":"1291","DOI":"10.1109\/TCSI.2021.3133318","volume":"69","author":"X Wang","year":"2022","unstructured":"Wang X, Liu PA (2022) New full Chaos coupled Mapping Lattice and its application in privacy image encryption. IEEE Trans Circuits Syst 69:1291\u20131301. https:\/\/doi.org\/10.1109\/TCSI.2021.3133318","journal-title":"IEEE Trans Circuits Syst"},{"issue":"4","key":"15707_CR39","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"15707_CR40","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/s11071-010-9749-8","volume":"62","author":"XY Wang","year":"2010","unstructured":"Wang XY, Yang L, Liu R et al (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62:615\u2013621. https:\/\/doi.org\/10.1007\/s11071-010-9749-8","journal-title":"Nonlinear Dyn"},{"key":"15707_CR41","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"X Wang","year":"2012","unstructured":"Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Sig Process 92:1101\u20131108. https:\/\/doi.org\/10.1016\/j.sigpro.2011.10.023","journal-title":"Sig Process"},{"key":"15707_CR42","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"XY Wang","year":"2015","unstructured":"Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53\u201361. https:\/\/doi.org\/10.1016\/j.optlaseng.2015.03.022","journal-title":"Opt Lasers Eng"},{"key":"15707_CR43","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10\u201318. https:\/\/doi.org\/10.1016\/j.optlaseng.2014.08.005","journal-title":"Opt Lasers Eng"},{"key":"15707_CR44","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/J.INS.2019.02.049","volume":"486","author":"X Wang","year":"2019","unstructured":"Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci (Ny) 486:340\u2013358. https:\/\/doi.org\/10.1016\/J.INS.2019.02.049","journal-title":"Inf Sci (Ny)"},{"key":"15707_CR45","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/J.INS.2021.06.032","volume":"574","author":"X Wang","year":"2021","unstructured":"Wang X, Liu C, Jiang D (2021) A novel triple-image encryption and hiding algorithm based on chaos, compressive sensingand 3D DCT. Inf Sci (Ny) 574:505\u2013527. https:\/\/doi.org\/10.1016\/J.INS.2021.06.032","journal-title":"Inf Sci (Ny)"},{"key":"15707_CR46","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1016\/J.INS.2020.09.055","volume":"547","author":"Y Xian","year":"2021","unstructured":"Xian Y, Wang X (2021) Fractal sorting matrix and its application on chaotic image encryption. Inf Sci (Ny) 547:1154\u20131169. https:\/\/doi.org\/10.1016\/J.INS.2020.09.055","journal-title":"Inf Sci (Ny)"},{"key":"15707_CR47","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3108767","author":"Y Xian","year":"2021","unstructured":"Xian Y, Wang X, Teng L (2021) Double parameters Fractal sorting Matrix and its application in image encryption. IEEE Trans Circuits Syst Video Technol. https:\/\/doi.org\/10.1109\/TCSVT.2021.3108767","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"15707_CR48","doi-asserted-by":"crossref","unstructured":"Xiao HP, Zhang GJ (2006) An image encryption scheme based on chaotic systems. 5th International Conference on Machine Learning and Cybernetics, Dalian, Peoples R, China","DOI":"10.1109\/ICMLC.2006.258930"},{"key":"15707_CR49","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-319-12286-1_15","volume":"329","author":"CY Yang","year":"2015","unstructured":"Yang CY, Wang WF (2015) Block-based colour image steganography using smart pixel-adjustment. Adv Intell Syst Comput 329:145\u2013154. https:\/\/doi.org\/10.1007\/978-3-319-12286-1_15","journal-title":"Adv Intell Syst Comput"},{"key":"15707_CR50","doi-asserted-by":"crossref","first-page":"27183","DOI":"10.1016\/S0960-0779(01)00251-X","volume":"15","author":"MT Yassen","year":"2003","unstructured":"Yassen MT (2003) Chaos synchronization between two different chaotic systems using active control. Chaos Solitons Fractals 15:27183","journal-title":"Chaos Solitons Fractals"},{"key":"15707_CR51","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf Sci (Ny) 273:329\u2013351. https:\/\/doi.org\/10.1016\/j.ins.2014.02.156","journal-title":"Inf Sci (Ny)"},{"key":"15707_CR52","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.asoc.2014.09.039","volume":"26","author":"YQ Zhang","year":"2015","unstructured":"Zhang YQ, Wang XY (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10\u201320. https:\/\/doi.org\/10.1016\/j.asoc.2014.09.039","journal-title":"Appl Soft Comput"},{"key":"15707_CR53","doi-asserted-by":"publisher","unstructured":"Zhao M, Tong X (2010) A multiple chaotic encryption scheme for image. 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), pp 1\u20134. https:\/\/doi.org\/10.1109\/WICOM.2010.5601297","DOI":"10.1109\/WICOM.2010.5601297"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15707-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15707-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15707-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,6]],"date-time":"2024-01-06T05:06:31Z","timestamp":1704517591000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15707-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,17]]},"references-count":53,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["15707"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15707-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,5,17]]},"assertion":[{"value":"21 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 May 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 April 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There are no conflicts of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest\/Competing interests"}}]}}