{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:41:15Z","timestamp":1775666475958,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,7,11]],"date-time":"2023-07-11T00:00:00Z","timestamp":1689033600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,11]],"date-time":"2023-07-11T00:00:00Z","timestamp":1689033600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16215-x","type":"journal-article","created":{"date-parts":[[2023,7,11]],"date-time":"2023-07-11T07:02:06Z","timestamp":1689058926000},"page":"12627-12650","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["A hybrid color image encryption method based on extended logistic map"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9898-6925","authenticated-orcid":false,"given":"Hidayet","family":"\u00c7elik","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8267-8469","authenticated-orcid":false,"given":"Nurettin","family":"Do\u011fan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,7,11]]},"reference":[{"issue":"3","key":"16215_CR1","first-page":"216","volume":"10","author":"DS Abd Elminaam","year":"2010","unstructured":"Abd Elminaam DS, Abdual-Kader HM, Hadhoud MM (2010) Evaluating the performance of symmetric encryption algorithms. Int J Netw Secur 10(3):216\u2013222","journal-title":"Int J Netw Secur"},{"issue":"21","key":"16215_CR2","doi-asserted-by":"publisher","first-page":"13951","DOI":"10.1007\/s11042-015-2973-y","volume":"75","author":"J Ahmad","year":"2016","unstructured":"Ahmad J, Hwang SO (2016) A secure image encryption scheme based on chaotic maps and affine transformation. Multimed Tools Appl 75(21):13951\u201313976. https:\/\/doi.org\/10.1007\/s11042-015-2973-y","journal-title":"Multimed Tools Appl"},{"issue":"08","key":"16215_CR3","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 16(08):2129\u20132151. https:\/\/doi.org\/10.1142\/S0218127406015970","journal-title":"Int J Bifurcat Chaos"},{"issue":"2","key":"16215_CR4","doi-asserted-by":"publisher","first-page":"2081","DOI":"10.1007\/s11042-020-09775-9","volume":"80","author":"M Benssalah","year":"2021","unstructured":"Benssalah M, Rhaskali Y, Drouiche K (2021) An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography. Multimed Tools Appl 80(2):2081\u20132107. https:\/\/doi.org\/10.1007\/s11042-020-09775-9","journal-title":"Multimed Tools Appl"},{"issue":"09","key":"16215_CR5","doi-asserted-by":"publisher","first-page":"1950115","DOI":"10.1142\/S0218127419501153","volume":"29","author":"G Cheng","year":"2019","unstructured":"Cheng G, Wang C, Chen H (2019) A novel color image encryption algorithm based on hyperchaotic system and permutation-diffusion architecture. Int J Bifurcat Chaos 29(09):1950115. https:\/\/doi.org\/10.1142\/S0218127419501153","journal-title":"Int J Bifurcat Chaos"},{"issue":"2","key":"16215_CR6","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/s00542-018-3980-5","volume":"27","author":"AK Das","year":"2021","unstructured":"Das AK, Hajra S, Mandal MK (2021) RGB image encryption using microcontroller ATMEGA 32. Microsyst Technol 27(2):409\u2013417. https:\/\/doi.org\/10.1007\/s00542-018-3980-5","journal-title":"Microsyst Technol"},{"key":"16215_CR7","doi-asserted-by":"publisher","first-page":"334","DOI":"10.31590\/ejosat.487931","volume":"14","author":"N Demir","year":"2018","unstructured":"Demir N, Do\u011fan S, Toka\u00e7 F (2018) The knapsack cryptography with bell number using python programming. Avrupa Bilim ve Teknoloji Dergisi 14:334\u2013336. https:\/\/doi.org\/10.31590\/ejosat.487931","journal-title":"Avrupa Bilim ve Teknoloji Dergisi"},{"issue":"5","key":"16215_CR8","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1016\/j.image.2013.09.006","volume":"29","author":"CE Dong","year":"2014","unstructured":"Dong CE (2014) Color image encryption using one-time keys and coupled chaotic systems. Signal Process Image Commun 29(5):628\u2013640. https:\/\/doi.org\/10.1016\/j.image.2013.09.006","journal-title":"Signal Process Image Commun"},{"key":"16215_CR9","doi-asserted-by":"publisher","first-page":"1937","DOI":"10.1109\/TSP.2020.2979596","volume":"68","author":"Z Hua","year":"2020","unstructured":"Hua Z, Zhang Y, Zhou Y (2020) Two-dimensional modular chaotification system for improving chaos complexity. IEEE Trans Signal Process 68:1937\u20131949. https:\/\/doi.org\/10.1109\/TSP.2020.2979596","journal-title":"IEEE Trans Signal Process"},{"key":"16215_CR10","doi-asserted-by":"publisher","first-page":"107998","DOI":"10.1016\/j.sigpro.2021.107998","volume":"183","author":"Z Hua","year":"2021","unstructured":"Hua Z, Zhang K, Li Y, Zhou Y (2021) Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing. Signal Process 183:107998. https:\/\/doi.org\/10.1016\/j.sigpro.2021.107998","journal-title":"Signal Process"},{"issue":"1","key":"16215_CR11","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1007\/s11071-021-06308-3","volume":"104","author":"Z Hua","year":"2021","unstructured":"Hua Z, Li J, Chen Y, Yi S (2021) Design and application of an S-box using complete Latin square. Nonlinear Dyn 104(1):807\u2013825. https:\/\/doi.org\/10.1007\/s11071-021-06308-3","journal-title":"Nonlinear Dyn"},{"key":"16215_CR12","doi-asserted-by":"publisher","first-page":"4505","DOI":"10.1007\/s11071-021-06472-6","volume":"104","author":"Z Hua","year":"2021","unstructured":"Hua Z, Zhu Z, Chen Y, Li Y (2021) Color image encryption using orthogonal Latin squares and a new 2D chaotic system. Nonlinear Dyn 104:4505\u20134522. https:\/\/doi.org\/10.1007\/s11071-021-06472-6","journal-title":"Nonlinear Dyn"},{"key":"16215_CR13","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.optlaseng.2018.11.015","volume":"115","author":"L Huang","year":"2019","unstructured":"Huang L, Cai S, Xiong X, Xiao M (2019) On symmetric color image encryption system with permutation-diffusion simultaneous operation. Opt Lasers Eng 115:7\u201320. https:\/\/doi.org\/10.1016\/j.optlaseng.2018.11.015","journal-title":"Opt Lasers Eng"},{"issue":"1","key":"16215_CR14","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s11071-012-0440-0","volume":"70","author":"I Hussain","year":"2012","unstructured":"Hussain I, Shah T, Gondal MA (2012) Image encryption algorithm based on PGL (2, GF (2 8)) S-boxes and TD-ERCS chaotic sequence. Nonlinear Dynamics 70(1):181\u2013187. https:\/\/doi.org\/10.1007\/s11071-012-0440-0","journal-title":"Nonlinear Dynamics"},{"key":"16215_CR15","unstructured":"IEEE Computer Society. (1985) Standards Committee. Working group of the Microprocessor Standards Subcommittee, & American National Standards Institute. IEEE standard for binary floating-point arithmetic. IEEE. (Vol. 754)"},{"key":"16215_CR16","doi-asserted-by":"publisher","first-page":"178167","DOI":"10.1109\/ACCESS.2020.3025241","volume":"8","author":"N Iqbal","year":"2020","unstructured":"Iqbal N, Hanif M, Abbas S, Khan MA, Almotiri SH, Al Ghamdi MA (2020) DNA strands level scrambling based color image encryption scheme. IEEE Access 8:178167\u2013178182. https:\/\/doi.org\/10.1109\/ACCESS.2020.3025241","journal-title":"IEEE Access"},{"key":"16215_CR17","doi-asserted-by":"publisher","first-page":"102428","DOI":"10.1016\/j.jisa.2019.102428","volume":"50","author":"KC Jithin","year":"2020","unstructured":"Jithin KC, Sankar S (2020) Colour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot set. J Inf Secur Appl 50:102428. https:\/\/doi.org\/10.1016\/j.jisa.2019.102428","journal-title":"J Inf Secur Appl"},{"issue":"5","key":"16215_CR18","doi-asserted-by":"publisher","first-page":"1671","DOI":"10.1016\/j.ijleo.2013.09.040","volume":"125","author":"A Kadir","year":"2014","unstructured":"Kadir A, Hamdulla A, Guo WQ (2014) Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik 125(5):1671\u20131675. https:\/\/doi.org\/10.1016\/j.ijleo.2013.09.040","journal-title":"Optik"},{"key":"16215_CR19","doi-asserted-by":"publisher","first-page":"107326","DOI":"10.1016\/j.optlastec.2021.107326","volume":"143","author":"N Khalil","year":"2021","unstructured":"Khalil N, Sarhan A, Alshewimy MA (2021) An efficient color\/grayscale image encryption scheme based on hybrid chaotic maps. Opt Laser Technol 143:107326. https:\/\/doi.org\/10.1016\/j.optlastec.2021.107326","journal-title":"Opt Laser Technol"},{"key":"16215_CR20","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.vlsi.2021.05.007","volume":"81","author":"M Khan","year":"2021","unstructured":"Khan M, Jamal SS, Hazzazi MM, Ali KM, Hussain I, Asif M (2021) An efficient image encryption scheme based on double affine substitution box and chaotic system. Integration. 81:108\u2013122. https:\/\/doi.org\/10.1016\/j.vlsi.2021.05.007","journal-title":"Integration."},{"issue":"7","key":"16215_CR21","doi-asserted-by":"publisher","first-page":"2701","DOI":"10.1007\/s11128-016-1304-1","volume":"15","author":"HR Liang","year":"2016","unstructured":"Liang HR, Tao XY, Zhou NR (2016) Quantum image encryption based on generalized affine transform and logistic map. Quantum Inf Process 15(7):2701\u20132724. https:\/\/doi.org\/10.1007\/s11128-016-1304-1","journal-title":"Quantum Inf Process"},{"issue":"5","key":"16215_CR22","doi-asserted-by":"publisher","first-page":"1240","DOI":"10.1016\/j.compeleceng.2012.02.007","volume":"38","author":"L Liu","year":"2012","unstructured":"Liu L, Zhang Q, Wei X (2012) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38(5):1240\u20131248. https:\/\/doi.org\/10.1016\/j.compeleceng.2012.02.007","journal-title":"Comput Electr Eng"},{"issue":"18","key":"16215_CR23","doi-asserted-by":"publisher","first-page":"3527","DOI":"10.1016\/j.ijleo.2012.10.068","volume":"124","author":"H Liu","year":"2013","unstructured":"Liu H, Wang X, Kadir A (2013) Color image encryption using Choquet fuzzy integral and hyper chaotic system. Optik-Int J Light and Electron Optics 124(18):3527\u20133533. https:\/\/doi.org\/10.1016\/j.ijleo.2012.10.068","journal-title":"Optik-Int J Light and Electron Optics"},{"key":"16215_CR24","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.optcom.2014.10.021","volume":"338","author":"H Liu","year":"2015","unstructured":"Liu H, Kadir A, Gong P (2015) A fast color image encryption scheme using one-time S-Boxes based on complex chaotic system and random noise. Opt Commun 338:340\u2013347. https:\/\/doi.org\/10.1016\/j.optcom.2014.10.021","journal-title":"Opt Commun"},{"key":"16215_CR25","doi-asserted-by":"publisher","first-page":"165155","DOI":"10.1016\/j.ijleo.2020.165155","volume":"218","author":"PN Lone","year":"2020","unstructured":"Lone PN, Singh D (2020) Application of algebra and chaos theory in security of color images. Optik 218:165155. https:\/\/doi.org\/10.1016\/j.ijleo.2020.165155","journal-title":"Optik"},{"issue":"10","key":"16215_CR26","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1080\/09500340.2021.1924885","volume":"68","author":"PN Lone","year":"2021","unstructured":"Lone PN, Singh D, Mir UH (2021) A novel image encryption using random matrix affine cipher and the chaotic maps. J Mod Opt 68(10):507\u2013521. https:\/\/doi.org\/10.1080\/09500340.2021.1924885","journal-title":"J Mod Opt"},{"issue":"15","key":"16215_CR27","doi-asserted-by":"publisher","first-page":"22023","DOI":"10.1007\/s11042-019-7453-3","volume":"78","author":"Y Luo","year":"2019","unstructured":"Luo Y, Yu J, Lai W, Liu L (2019) A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimed Tools Appl 78(15):22023\u201322043. https:\/\/doi.org\/10.1007\/s11042-019-7453-3","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"16215_CR28","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/s11042-015-3064-9","volume":"76","author":"M Mollaeefar","year":"2017","unstructured":"Mollaeefar M, Sharif A, Nazari M (2017) A novel encryption scheme for colored image based on high level chaotic maps. Multimed Tools Appl 76(1):607\u2013629. https:\/\/doi.org\/10.1007\/s11042-015-3064-9","journal-title":"Multimed Tools Appl"},{"key":"16215_CR29","doi-asserted-by":"publisher","unstructured":"Munir R (2012, October) Security analysis of selective image encryption algorithm based on chaos and CBC-like mode. In: 2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), IEEE, pp. 142\u2013146. https:\/\/doi.org\/10.1109\/TSSA.2012.6366039","DOI":"10.1109\/TSSA.2012.6366039"},{"issue":"4","key":"16215_CR30","doi-asserted-by":"publisher","first-page":"1883","DOI":"10.1007\/s11071-014-1583-y","volume":"80","author":"P Muthukumar","year":"2015","unstructured":"Muthukumar P, Balasubramaniam P, Ratnavelu K (2015) Fast projective synchronization of fractional order chaotic and reverse chaotic systems with its application to an affine cipher using date of birth (DOB). Nonlinear Dyn 80(4):1883\u20131897. https:\/\/doi.org\/10.1007\/s11071-014-1583-y","journal-title":"Nonlinear Dyn"},{"key":"16215_CR31","doi-asserted-by":"publisher","unstructured":"Naveenkumar SK, Panduranga HT (2013, July) Triple image encryption based on integer transform and chaotic map. In: 2013 International Conference on Optical Imaging Sensor and Security (ICOSS). IEEE. pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICOISS.2013.6678416","DOI":"10.1109\/ICOISS.2013.6678416"},{"issue":"1","key":"16215_CR32","doi-asserted-by":"publisher","first-page":"1409","DOI":"10.1007\/s11042-019-08103-0","volume":"79","author":"C Pak","year":"2020","unstructured":"Pak C, Kim J, An K, Kim C, Kim K, Pak C (2020) A novel color image LSB steganography using improved 1D chaotic map. Multimed Tools Appl 79(1):1409\u20131425. https:\/\/doi.org\/10.1007\/s11042-019-08103-0","journal-title":"Multimed Tools Appl"},{"key":"16215_CR33","unstructured":"Palathingal AG, George A, Thomas BA, Paul AR (2018) Enhanced cloud data security using combined encryption and steganography. Int Res J Eng Technol (IRJET) 5(03)"},{"key":"16215_CR34","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.procs.2015.07.552","volume":"59","author":"B Purnama","year":"2015","unstructured":"Purnama B, Rohayani AH (2015) A new modified caesar cipher cryptography method with legibleciphertext from a message to be encrypted. Procedia Comput Sci 59:195\u2013204. https:\/\/doi.org\/10.1016\/j.procs.2015.07.552","journal-title":"Procedia Comput Sci"},{"key":"16215_CR35","doi-asserted-by":"publisher","unstructured":"Ray A, Potnis A, Dwivedy P, Soofi S, Bhade U (2017, October) Comparative study of AES, RSA, genetic, affine transform with XOR operation, and watermarking for image encryption. In 2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE). IEEE. pp. 274\u2013278. https:\/\/doi.org\/10.1109\/RISE.2017.8378166","DOI":"10.1109\/RISE.2017.8378166"},{"key":"16215_CR36","doi-asserted-by":"publisher","first-page":"27829","DOI":"10.1007\/s11042-021-11003-x","volume":"80","author":"S Sabir","year":"2021","unstructured":"Sabir S, Guleria V (2021) Multi-layer color image encryption using random matrix affine cipher, RP2DFrHT and 2D Arnold map. Multimed Tools Appl 80:27829\u201327853. https:\/\/doi.org\/10.1007\/s11042-021-11003-x","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"16215_CR37","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/MAP.2010.5723276","volume":"52","author":"S \u015eahin","year":"2010","unstructured":"\u015eahin S, G\u00fczelis C (2010) \u201cChaotification\u201d of real systems by dynamic state feedback. IEEE Antennas and Propag Mag 52(6):222\u2013233. https:\/\/doi.org\/10.1109\/MAP.2010.5723276","journal-title":"IEEE Antennas and Propag Mag"},{"key":"16215_CR38","doi-asserted-by":"publisher","unstructured":"Sari RN, Hayati RS (2018, August) Beaufort cipher algorithm analysis based on the power lock-Blum Blum Shub in securing data. In: 2018 6th International Conference on Cyber and IT Service Management (CITSM). IEEE, pp. 1\u20134. https:\/\/doi.org\/10.1109\/CITSM.2018.8674368","DOI":"10.1109\/CITSM.2018.8674368"},{"issue":"2","key":"16215_CR39","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.eij.2020.07.002","volume":"22","author":"WS Sayed","year":"2021","unstructured":"Sayed WS, Radwan AG, Fahmy HA, Elsedeek A (2021) Trajectory control and image encryption using affine transformation of Lorenz system. Egypt Inform J 22(2):155\u2013166. https:\/\/doi.org\/10.1016\/j.eij.2020.07.002","journal-title":"Egypt Inform J"},{"issue":"3","key":"16215_CR40","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1007\/s11045-019-00689-w","volume":"31","author":"D Shah","year":"2020","unstructured":"Shah D, Shah T, Jamal SS (2020) A novel efficient image encryption algorithm based on affine transformation combine with linear fractional transformation. Multidim Syst Sign Process 31(3):885\u2013905. https:\/\/doi.org\/10.1007\/s11045-019-00689-w","journal-title":"Multidim Syst Sign Process"},{"issue":"3","key":"16215_CR41","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379\u2013423. https:\/\/doi.org\/10.1002\/j.1538-7305.1948.tb01338.x","journal-title":"Bell Syst Tech J"},{"key":"16215_CR42","doi-asserted-by":"crossref","unstructured":"Singh G (2013) A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int J Comput Appl 67(19)","DOI":"10.5120\/11507-7224"},{"issue":"4","key":"16215_CR43","doi-asserted-by":"publisher","first-page":"521","DOI":"10.17654\/EC018040521","volume":"18","author":"AA Taha","year":"2018","unstructured":"Taha AA, Elminaam DSA, Hosny KM (2018) An improved security schema for mobile cloud computing using hybrid cryptographic algorithms. Far East Journal of. Electron Commun 18(4):521\u2013546. https:\/\/doi.org\/10.17654\/EC018040521","journal-title":"Electron Commun"},{"issue":"7","key":"16215_CR44","doi-asserted-by":"publisher","first-page":"1725","DOI":"10.1016\/j.cnsns.2012.11.002","volume":"18","author":"XJ Tong","year":"2013","unstructured":"Tong XJ (2013) Design of an image encryption scheme based on a multiple chaotic map. Commun Nonlinear Sci Numer Simul 18(7):1725\u20131733. https:\/\/doi.org\/10.1016\/j.cnsns.2012.11.002","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"16215_CR45","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.optlaseng.2015.12.006","volume":"82","author":"X Wang","year":"2016","unstructured":"Wang X, Zhao Y, Zhang H, Guo K (2016) A novel color image encryption scheme using alternate chaotic mapping structure. Opt Lasers Eng 82:79\u201386. https:\/\/doi.org\/10.1016\/j.optlaseng.2015.12.006","journal-title":"Opt Lasers Eng"},{"issue":"2","key":"16215_CR46","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1016\/j.jss.2011.08.017","volume":"85","author":"X Wei","year":"2012","unstructured":"Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290\u2013299. https:\/\/doi.org\/10.1016\/j.jss.2011.08.017","journal-title":"J Syst Softw"},{"key":"16215_CR47","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.asoc.2015.08.008","volume":"37","author":"X Wu","year":"2015","unstructured":"Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24\u201339. https:\/\/doi.org\/10.1016\/j.asoc.2015.08.008","journal-title":"Appl Soft Comput"},{"key":"16215_CR48","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.sigpro.2018.02.028","volume":"148","author":"X Wu","year":"2018","unstructured":"Wu X, Wang K, Wang X, Kan H, Kurths J (2018) Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process 148:272\u2013287. https:\/\/doi.org\/10.1016\/j.sigpro.2018.02.028","journal-title":"Signal Process"},{"issue":"22","key":"16215_CR49","doi-asserted-by":"publisher","first-page":"31035","DOI":"10.1007\/s11042-018-7081-3","volume":"78","author":"Z Xiong","year":"2019","unstructured":"Xiong Z, Wu Y, Ye C, Zhang X, Xu F (2019) Color image chaos encryption algorithm combining CRC and nine palace map. Multimed Tools Appl 78(22):31035\u201331055. https:\/\/doi.org\/10.1007\/s11042-018-7081-3","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"16215_CR50","first-page":"263","volume":"1","author":"BB Zaidan","year":"2009","unstructured":"Zaidan BB, Zaidan AA, Mwafak H (2009) New comprehensive study to assess comparatively the QKD, XKMS, KDM in the PKI encryption algorithms. Int J Comput Sci Eng 1(3):263\u2013268","journal-title":"Int J Comput Sci Eng"},{"key":"16215_CR51","doi-asserted-by":"publisher","first-page":"106437","DOI":"10.1016\/j.optlastec.2020.106437","volume":"131","author":"J Zhou","year":"2020","unstructured":"Zhou J, Zhou NR, Gong LH (2020) Fast color image encryption scheme based on 3D orthogonal Latin squares and matching matrix. Opt Laser Technol 131:106437. https:\/\/doi.org\/10.1016\/j.optlastec.2020.106437","journal-title":"Opt Laser Technol"},{"issue":"22","key":"16215_CR52","doi-asserted-by":"publisher","first-page":"6672","DOI":"10.1016\/j.ijleo.2014.06.149","volume":"125","author":"H Zhu","year":"2014","unstructured":"Zhu H, Zhao C, Zhang X, Yang L (2014) An image encryption scheme using generalized Arnold map and affine cipher. Optik 125(22):6672\u20136677. https:\/\/doi.org\/10.1016\/j.ijleo.2014.06.149","journal-title":"Optik"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16215-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16215-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16215-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T10:39:55Z","timestamp":1706265595000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16215-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,11]]},"references-count":52,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2024,2]]}},"alternative-id":["16215"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16215-x","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,11]]},"assertion":[{"value":"12 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}