{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:09:53Z","timestamp":1772726993771,"version":"3.50.1"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T00:00:00Z","timestamp":1691971200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T00:00:00Z","timestamp":1691971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16359-w","type":"journal-article","created":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T05:02:01Z","timestamp":1691989321000},"page":"24361-24381","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["A hybrid crypto-compression model for secure brain mri image transmission"],"prefix":"10.1007","volume":"83","author":[{"given":"Sasmita","family":"Padhy","sequence":"first","affiliation":[]},{"given":"Sachikanta","family":"Dash","sequence":"additional","affiliation":[]},{"given":"T. N.","family":"Shankar","sequence":"additional","affiliation":[]},{"given":"Venubabu","family":"Rachapudi","sequence":"additional","affiliation":[]},{"given":"Sandeep","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Anand","family":"Nayyar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,14]]},"reference":[{"key":"16359_CR1","doi-asserted-by":"crossref","unstructured":"Agustsson E, Tschannen M, Mentzer F, Timofte R, Gool LV (2019) Generative adversarial networks for extreme learned image compression. In: Proceedings of the IEEE\/CVF International conference on computer vision, pp 221\u2013231","DOI":"10.1109\/ICCV.2019.00031"},{"key":"16359_CR2","first-page":"116418","volume":"98","author":"I Ahmad","year":"2021","unstructured":"Ahmad I, Shin S (2021) A novel hybrid image encryption-compression scheme by combining chaos theory and number theory. Signal Process: Image Commun 98:116418","journal-title":"Signal Process: Image Commun"},{"key":"16359_CR3","doi-asserted-by":"publisher","first-page":"6663","DOI":"10.1007\/s11227-019-02878-7","volume":"75","author":"A Arab","year":"2019","unstructured":"Arab A, Rostami MJ, Ghavami B (2019) An image encryption method based on chaos system and aes algorithm. J Supercomput 75:6663\u20136682","journal-title":"J Supercomput"},{"issue":"12","key":"16359_CR4","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MC.2017.4451227","volume":"50","author":"H Berghel","year":"2017","unstructured":"Berghel H (2017) Equifax and the latest round of identity theft roulette. Comput 50(12):72\u201376","journal-title":"Comput"},{"issue":"1","key":"16359_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1748-5908-9-24","volume":"9","author":"A Boivin","year":"2014","unstructured":"Boivin A, Lehoux P, Lacombe R, Burgers J, Grol R (2014) Involving patients in setting priorities for healthcare improvement: a cluster randomized trial. Implement Sci 9(1):1\u201310","journal-title":"Implement Sci"},{"issue":"10","key":"16359_CR6","doi-asserted-by":"publisher","first-page":"2803","DOI":"10.1016\/j.sigpro.2006.02.022","volume":"86","author":"AJ Calder\u00f3n","year":"2006","unstructured":"Calder\u00f3n AJ, Vinagre BM, Feliu V (2006) Fractional order control strategies for power electronic buck converters. Signal Process 86(10):2803\u20132819","journal-title":"Signal Process"},{"key":"16359_CR7","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.sigpro.2016.10.003","volume":"132","author":"W Cao","year":"2017","unstructured":"Cao W, Zhou Y, Chen CP, Xia L (2017) Medical image encryption using edge maps. Signal Process 132:96\u2013109","journal-title":"Signal Process"},{"issue":"1","key":"16359_CR8","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s00521-017-2993-9","volume":"31","author":"X Chai","year":"2019","unstructured":"Chai X, Gan Z, Yuan K, Chen Y, Liu X (2019) A novel image encryption scheme based on dna sequence operations and chaotic systems. Neural Comput Appl 31(1):219\u2013237","journal-title":"Neural Comput Appl"},{"key":"16359_CR9","unstructured":"Cheng K, Wang L, Shen Y, Wang H, Wang Y, Jiang X, Zhong H () Secure k-nn query on encrypted cloud data with multiple keys. IEEE Transactions on Big Data"},{"key":"16359_CR10","doi-asserted-by":"publisher","first-page":"74361","DOI":"10.1109\/ACCESS.2019.2919982","volume":"7","author":"S Chenthara","year":"2019","unstructured":"Chenthara S, Ahmed K, Wang H, Whittaker F (2019) Security and privacy-preserving challenges of e-health solutions in cloud computing. IEEE Access 7:74361\u201374382","journal-title":"IEEE Access"},{"issue":"1","key":"16359_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJISP.303669","volume":"16","author":"S Dash","year":"2022","unstructured":"Dash S, Padhy S, Parija B, Rojashree T, Patro KAK (2022) A simple and fast medical image encryption system using chaos-based shifting techniques. International Journal of Information Security and Privacy (IJISP) 16(1):1\u201324","journal-title":"International Journal of Information Security and Privacy (IJISP)"},{"key":"16359_CR12","doi-asserted-by":"publisher","first-page":"80813","DOI":"10.1109\/ACCESS.2019.2922196","volume":"7","author":"S Dong","year":"2019","unstructured":"Dong S, Abbas K, Jain R (2019) A survey on distributed denial of service (ddos) attacks in sdn and cloud computing environments. IEEE Access 7:80813\u201380828","journal-title":"IEEE Access"},{"key":"16359_CR13","doi-asserted-by":"publisher","first-page":"163524","DOI":"10.1109\/ACCESS.2020.3022398","volume":"8","author":"H Dong","year":"2020","unstructured":"Dong H, Bai E, Jiang X-Q, Wu Y (2020) Color image compression-encryption using fractional-order hyperchaotic system and dna coding. IEEE Access 8:163524\u2013163540","journal-title":"IEEE Access"},{"issue":"2","key":"16359_CR14","doi-asserted-by":"publisher","first-page":"180","DOI":"10.3390\/e22020180","volume":"22","author":"DH ElKamchouchi","year":"2020","unstructured":"ElKamchouchi DH, Mohamed HG, Moussa KH (2020) A bijective image encryption system based on hybrid chaotic map diffusion and dna confusion. Entropy 22(2):180","journal-title":"Entropy"},{"key":"16359_CR15","doi-asserted-by":"publisher","first-page":"23319","DOI":"10.1007\/s11042-021-10527-6","volume":"80","author":"SE El-Khamy","year":"2021","unstructured":"El-Khamy SE, Mohamed AG (2021) An efficient dna-inspired image encryption algorithm based on hyper-chaotic maps and wavelet fusion. Multimed Tools Appl 80:23319\u201323335","journal-title":"Multimed Tools Appl"},{"key":"16359_CR16","doi-asserted-by":"crossref","unstructured":"Gafsi M, Hajjaji MA, Malek J, Mtibaa A (2020) Efficient encryption system for numerical image safe transmission. Journal of Electrical and Computer Engineering","DOI":"10.1155\/2020\/8937676"},{"issue":"22","key":"16359_CR17","doi-asserted-by":"publisher","first-page":"8554","DOI":"10.1002\/ange.202001162","volume":"132","author":"RN Grass","year":"2020","unstructured":"Grass RN, Heckel R, Dessimoz C, Stark WJ (2020) Genomic encryption of digital data stored in synthetic dna. Angew Chem 132(22):8554\u20138558","journal-title":"Angew Chem"},{"issue":"11","key":"16359_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-1072-9","volume":"42","author":"T Iqbal","year":"2018","unstructured":"Iqbal T, Ali H (2018) Generative adversarial network for medical images (mi-gan). J Med Syst 42(11):1\u201311","journal-title":"J Med Syst"},{"issue":"1","key":"16359_CR19","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1109\/JETCAS.2018.2886642","volume":"9","author":"C Jia","year":"2018","unstructured":"Jia C, Zhang X, Wang S, Wang S, Ma S (2018) Light field image compression using generative adversarial network-based view synthesis. IEEE J Emerg Sel Top Circ Syst 9(1):177\u2013189","journal-title":"IEEE J Emerg Sel Top Circ Syst"},{"issue":"1","key":"16359_CR20","first-page":"1045","volume":"14","author":"R Kaur","year":"2021","unstructured":"Kaur R, Ali A (2021) A novel blockchain model for securing iot based data transmission. Int J Grid Distrib Comput 14(1):1045\u20131055","journal-title":"Int J Grid Distrib Comput"},{"issue":"35","key":"16359_CR21","doi-asserted-by":"publisher","first-page":"26369","DOI":"10.1007\/s11042-020-09264-z","volume":"79","author":"OA Khashan","year":"2020","unstructured":"Khashan OA, AlShaikh M (2020) Edge-based lightweight selective encryption scheme for digital medical images. Multimed Tools Appl 79(35):26369\u201326388","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"16359_CR22","doi-asserted-by":"publisher","first-page":"415","DOI":"10.4218\/etrij.2018-0473","volume":"41","author":"D-W Kim","year":"2019","unstructured":"Kim D-W, Chung J-R, Kim J, Lee DY, Jeong SY, Jung S-W (2019) Constrained adversarial loss for generative adversarial network-based faithful image restoration. ETRI J 41(4):415\u2013425","journal-title":"ETRI J"},{"issue":"3","key":"16359_CR23","doi-asserted-by":"publisher","first-page":"e35","DOI":"10.2196\/medinform.7958","volume":"5","author":"CS Kruse","year":"2017","unstructured":"Kruse CS, Mileski M, Vijaykumar AG, Viswanathan SV, Suskandla U, Chidambaram Y (2017) Impact of electronic health records on long-term care facilities: systematic review. JMIR Med Inf 5(3):e35","journal-title":"JMIR Med Inf"},{"issue":"2","key":"16359_CR24","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1007\/s11071-014-1533-8","volume":"78","author":"C Li","year":"2014","unstructured":"Li C, Xie T, Liu Q, Cheng G (2014) Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn 78(2):1545\u20131551","journal-title":"Nonlinear Dyn"},{"key":"16359_CR25","doi-asserted-by":"publisher","first-page":"107074","DOI":"10.1016\/j.optlastec.2021.107074","volume":"140","author":"X Li","year":"2021","unstructured":"Li X, Mou J, Xiong L, Wang Z, Xu J (2021) Fractional-order double-ring erbium-doped fiber laser chaotic system and its application on image encryption. Opt Laser Technol 140:107074","journal-title":"Opt Laser Technol"},{"issue":"5","key":"16359_CR26","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu H, Wang X et al (2012) Image encryption using dna complementary rule and chaotic maps. Appl Soft Comput 12(5):1457\u20131466","journal-title":"Appl Soft Comput"},{"issue":"5","key":"16359_CR27","doi-asserted-by":"publisher","first-page":"1240","DOI":"10.1016\/j.compeleceng.2012.02.007","volume":"38","author":"L Liu","year":"2012","unstructured":"Liu L, Zhang Q, Wei X (2012) A rgb image encryption algorithm based on dna encoding and chaos map. Comput Electric Eng 38(5):1240\u20131248","journal-title":"Comput Electric Eng"},{"issue":"17","key":"16359_CR28","doi-asserted-by":"publisher","first-page":"22787","DOI":"10.1007\/s11042-017-5534-8","volume":"77","author":"J Liu","year":"2018","unstructured":"Liu J, Ma Y, Li S, Lian J, Zhang X (2018) A new simple chaotic system and its application in medical image encryption. Multimed Tools Appl 77(17):22787\u201322808","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"16359_CR29","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s12650-018-0519-x","volume":"22","author":"Y Liu","year":"2019","unstructured":"Liu Y, Wang Y, Deng L, Wang F, Liu F, Lu Y, Li S (2019) A novel in situ compression method for cfd data based on generative adversarial network. J Vis 22(1):95\u2013108","journal-title":"J Vis"},{"key":"16359_CR30","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.ins.2020.07.073","volume":"545","author":"D Liu","year":"2021","unstructured":"Liu D, Huang X, Zhan W, Ai L, Zheng X, Cheng S (2021) View synthesis-based light field image compression using a generative adversarial network. Inf Sci 545:118\u2013131","journal-title":"Inf Sci"},{"issue":"5","key":"16359_CR31","doi-asserted-by":"publisher","first-page":"395","DOI":"10.4103\/0256-4602.103173","volume":"29","author":"MK Mandal","year":"2012","unstructured":"Mandal MK, Banik GD, Chattopadhyay D, Nandi D (2012) An image encryption process based on chaotic logistic map. IETE Tech Rev 29(5):395\u2013404","journal-title":"IETE Tech Rev"},{"key":"16359_CR32","unstructured":"Mentzer F, Toderici G, Tschannen M, Agustsson E (2020) High-fidelity generative image compression. arXiv:2006.09965"},{"key":"16359_CR33","doi-asserted-by":"crossref","unstructured":"Mousa HM (2016) Dna-genetic encryption technique. International Journal of Computer Network & Information Security 8(7)","DOI":"10.5815\/ijcnis.2016.07.01"},{"key":"16359_CR34","doi-asserted-by":"publisher","first-page":"22082","DOI":"10.1109\/ACCESS.2020.2970103","volume":"8","author":"Y Niu","year":"2020","unstructured":"Niu Y, Zhang X (2020) A novel plaintext-related image encryption scheme based on chaotic system and pixel permutation. IEEE Access 8:22082\u201322093","journal-title":"IEEE Access"},{"issue":"3","key":"16359_CR35","doi-asserted-by":"publisher","first-page":"757","DOI":"10.3390\/pr11030757","volume":"11","author":"S Padhy","year":"2023","unstructured":"Padhy S, Alowaidi M, Dash S, Alshehri M, Malla PP, Routray S, Alhumyani H (2023) Agrisecure: A fog computing-based security framework for agriculture 4.0 via blockchain. Processes 11(3):757","journal-title":"Processes"},{"key":"16359_CR36","doi-asserted-by":"crossref","unstructured":"Padhy S, Shankar T, Dash S (2022) A comparison among fast point multiplication algorithms in elliptic curve cryptosystem","DOI":"10.21203\/rs.3.rs-862241\/v1"},{"issue":"15","key":"16359_CR37","doi-asserted-by":"publisher","first-page":"19209","DOI":"10.1007\/s11042-017-5378-2","volume":"77","author":"R Ponuma","year":"2018","unstructured":"Ponuma R, Amutha R (2018) Compressive sensing based image compression-encryption using novel 1d-chaotic map. Multimed Tools Appl 77(15):19209\u201319234","journal-title":"Multimed Tools Appl"},{"key":"16359_CR38","doi-asserted-by":"crossref","unstructured":"Pranitha G, Rukmini T, Shankar T, Sah B, Kumar N, Padhy S (2022) Utilization of blockchain in e-voting system. In: 2022 2nd International Conference on Intelligent Technologies (CONIT), IEEE, pp 1\u20135","DOI":"10.1109\/CONIT55038.2022.9847995"},{"key":"16359_CR39","doi-asserted-by":"crossref","unstructured":"Roy M, Chakraborty S, Mali K, Swarnakar R, Ghosh K, Banerjee A, Chatterjee S (2019) Data security techniques based on dna encryption. In: International ethical hacking conference, Springer, pp 239\u2013249","DOI":"10.1007\/978-981-15-0361-0_19"},{"key":"16359_CR40","doi-asserted-by":"publisher","first-page":"25650","DOI":"10.1109\/ACCESS.2020.2970981","volume":"8","author":"M Samiullah","year":"2020","unstructured":"Samiullah M, Aslam W, Nazir H, Lali MI, Shahzad B, Mufti MR, Afzal H (2020) An image encryption scheme based on dna computing and multiple chaotic systems. IEEE Access 8:25650\u201325663","journal-title":"IEEE Access"},{"key":"16359_CR41","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.patrec.2021.11.025","volume":"153","author":"Y Sang","year":"2022","unstructured":"Sang Y, Sang J, Alam MS (2022) Image encryption based on logistic chaotic systems and deep autoencoder. Pattern Recognit Lett 153:59\u201366","journal-title":"Pattern Recognit Lett"},{"key":"16359_CR42","doi-asserted-by":"crossref","unstructured":"Shakir HR (2019) A color-image encryption scheme using a 2d chaotic system and dna coding. Advances in Multimedia","DOI":"10.1155\/2019\/7074264"},{"key":"16359_CR43","doi-asserted-by":"crossref","unstructured":"Shankar T, Padhy S, Ch SM, Ravella H, Varun M, Kumar N (2022) Development of 6g web by multilayer perceptron in c-ran for vanets. 2022 IEEE Global Conference on Computing. Power and Communication Technologies (GlobConPT), IEEE, pp 1\u20136","DOI":"10.1109\/GlobConPT57482.2022.9938284"},{"key":"16359_CR44","doi-asserted-by":"crossref","unstructured":"Shankar T, Padhy S, Dash S, Teja MB, Yashwant S (2022) Induction of secure data repository in blockchain over ipfs. In: 2022 6th International Conference on Trends in Electronics and Informatics (ICOEI), IEEE, pp 738\u2013743","DOI":"10.1109\/ICOEI53556.2022.9776967"},{"issue":"1","key":"16359_CR45","first-page":"235","volume":"14","author":"J Shu","year":"2018","unstructured":"Shu J, Jia X, Yang K, Wang H (2018) Privacy-preserving task recommendation services for crowdsourcing. IEEE Trans Serv Comput 14(1):235\u2013247","journal-title":"IEEE Trans Serv Comput"},{"key":"16359_CR46","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.comcom.2022.07.049","volume":"193","author":"KN Singh","year":"2022","unstructured":"Singh KN, Singh OP, Singh AK (2022) Ecis: encryption prior to compression for digital image security with reduced memory. Comput Commun 193:410\u2013417","journal-title":"Comput Commun"},{"issue":"8","key":"16359_CR47","doi-asserted-by":"publisher","first-page":"2243","DOI":"10.1007\/s11263-020-01305-2","volume":"128","author":"J Song","year":"2020","unstructured":"Song J, He T, Gao L, Xu X, Hanjalic A, Shen HT (2020) Unified binary generative adversarial network for image retrieval and compression. Int J Comput Vis 128(8):2243\u20132264","journal-title":"Int J Comput Vis"},{"key":"16359_CR48","doi-asserted-by":"crossref","unstructured":"Suri S, Vijay R (2017) An aes\u2013chaos-based hybrid approach to encrypt multiple images. In: Recent developments in intelligent computing, communication and devices, Springer, pp 37\u201343","DOI":"10.1007\/978-981-10-3779-5_6"},{"issue":"1","key":"16359_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.15171\/hpr.2019.01","volume":"4","author":"M Vatandsoost","year":"2019","unstructured":"Vatandsoost M, Litkouhi S (2019) The future of healthcare facilities: how technology and medical advances may shape hospitals of the future. Hosp Pract Res 4(1):1\u201311","journal-title":"Hosp Pract Res"},{"key":"16359_CR50","doi-asserted-by":"publisher","first-page":"106355","DOI":"10.1016\/j.optlastec.2020.106355","volume":"132","author":"T Wang","year":"2020","unstructured":"Wang T, Wang M-h (2020) Hyperchaotic image encryption algorithm based on bit-level permutation and dna encoding. Opt Laser Technol 132:106355","journal-title":"Opt Laser Technol"},{"key":"16359_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.optlaseng.2017.11.009","volume":"103","author":"X Wang","year":"2018","unstructured":"Wang X, Wang S, Zhang Y, Luo C (2018) A one-time pad color image cryptosystem based on sha-3 and multiple chaotic systems. Opt Lasers Eng 103:1\u20138","journal-title":"Opt Lasers Eng"},{"key":"16359_CR52","doi-asserted-by":"publisher","first-page":"105995","DOI":"10.1016\/j.optlaseng.2019.105995","volume":"128","author":"S Wang","year":"2020","unstructured":"Wang S, Wang C, Xu C (2020) An image encryption algorithm based on a hidden attractor chaos system and the knuth-durstenfeld algorithm. Opt Lasers Eng 128:105995","journal-title":"Opt Lasers Eng"},{"key":"16359_CR53","first-page":"116521","volume":"99","author":"W Wang","year":"2021","unstructured":"Wang W, Ma X, Liu H, Li Y, Liu W (2021) Multi-focus image fusion via joint convolutional analysis and synthesis sparse representation. Signal Process: Image Commun 99:116521","journal-title":"Signal Process: Image Commun"},{"key":"16359_CR54","doi-asserted-by":"publisher","first-page":"106837","DOI":"10.1016\/j.optlastec.2020.106837","volume":"138","author":"X Wang","year":"2021","unstructured":"Wang X, Chen S, Zhang Y (2021) A chaotic image encryption algorithm based on random dynamic mixing. Opt Laser Technol 138:106837","journal-title":"Opt Laser Technol"},{"issue":"8","key":"16359_CR55","doi-asserted-by":"publisher","first-page":"085206","DOI":"10.1088\/1402-4896\/ab0033","volume":"94","author":"F Yang","year":"2019","unstructured":"Yang F, Mou J, Luo C, Cao Y (2019) An improved color image encryption scheme and cryptanalysis based on a hyperchaotic sequence. Physica Scripta 94(8):085206","journal-title":"Physica Scripta"},{"key":"16359_CR56","doi-asserted-by":"publisher","first-page":"50513","DOI":"10.1109\/ACCESS.2019.2910859","volume":"7","author":"C-H Yang","year":"2019","unstructured":"Yang C-H, Wu H-C, Su S-F (2019) Implementation of encryption algorithm and wireless image transmission system on fpga. IEEE Access 7:50513\u201350523","journal-title":"IEEE Access"},{"key":"16359_CR57","doi-asserted-by":"publisher","first-page":"107563","DOI":"10.1016\/j.sigpro.2020.107563","volume":"172","author":"G Ye","year":"2020","unstructured":"Ye G, Pan C, Dong Y, Shi Y, Huang X (2020) Image encryption and hiding algorithm based on compressive sensing and random numbers insertion. Signal Process 172:107563","journal-title":"Signal Process"},{"key":"16359_CR58","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.ins.2020.07.058","volume":"547","author":"Y Zhang","year":"2021","unstructured":"Zhang Y (2021) A new unified image encryption algorithm based on a lifting transformation and chaos. Inf Sci 547:307\u2013327","journal-title":"Inf Sci"},{"issue":"23","key":"16359_CR59","doi-asserted-by":"publisher","first-page":"6276","DOI":"10.1016\/j.ijleo.2013.05.009","volume":"124","author":"Q Zhang","year":"2013","unstructured":"Zhang Q, Wei X (2013) A novel couple images encryption algorithm based on dna subsequence operation and chaotic system. Optik 124(23):6276\u20136281","journal-title":"Optik"},{"issue":"3","key":"16359_CR60","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1016\/j.chaos.2004.09.035","volume":"24","author":"L Zhang","year":"2005","unstructured":"Zhang L, Liao X, Wang X (2005) An image encryption approach based on chaotic maps. Chaos, Solitons Fractals 24(3):759\u2013765","journal-title":"Chaos, Solitons Fractals"},{"key":"16359_CR61","doi-asserted-by":"publisher","first-page":"1001","DOI":"10.1016\/j.ins.2022.06.011","volume":"607","author":"L Zhu","year":"2022","unstructured":"Zhu L, Jiang D, Ni J, Wang X, Rong X, Ahmad M (2022) A visually secure image encryption scheme using adaptive-thresholding sparsification compression sensing model and newly-designed memristive chaotic map. Inf Sci 607:1001\u20131022","journal-title":"Inf Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16359-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16359-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16359-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,25]],"date-time":"2024-02-25T14:04:41Z","timestamp":1708869881000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16359-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,14]]},"references-count":61,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["16359"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16359-w","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,14]]},"assertion":[{"value":"10 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest to report regarding the present study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}