{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T00:43:16Z","timestamp":1768524196747,"version":"3.49.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T00:00:00Z","timestamp":1694822400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T00:00:00Z","timestamp":1694822400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16401-x","type":"journal-article","created":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T15:01:35Z","timestamp":1694876495000},"page":"31465-31503","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Multilayer symmetric and asymmetric technique for audiovisual cryptography"],"prefix":"10.1007","volume":"83","author":[{"given":"Aryan","family":"Parekh","sequence":"first","affiliation":[]},{"given":"Mayav","family":"Antani","sequence":"additional","affiliation":[]},{"given":"Kartik","family":"Suvarna","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9020-0713","authenticated-orcid":false,"given":"Ramchandra","family":"Mangrulkar","sequence":"additional","affiliation":[]},{"given":"Meera","family":"Narvekar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,16]]},"reference":[{"key":"16401_CR1","doi-asserted-by":"publisher","unstructured":"Abed S, Waleed L, Aldamkhi G, Hadi K (2021) Enhancement in data security and integrity using the minhash technique. Indonesian Journal of Electrical Engineering and Computer Science 21. https:\/\/doi.org\/10.11591\/ijeecs.v21.i3.pp1739-1750","DOI":"10.11591\/ijeecs.v21.i3.pp1739-1750"},{"key":"16401_CR2","doi-asserted-by":"publisher","unstructured":"Albahrani EA, Alshekly TK, Lafta SH (2022) A Review on Audio Encryption Algorithms Using Chaos Maps-Based Techniques. https:\/\/doi.org\/10.13052\/jcsm2245-1439.1113","DOI":"10.13052\/jcsm2245-1439.1113"},{"key":"16401_CR3","doi-asserted-by":"publisher","unstructured":"Ali M, Baloch A, Waheed A, Zareei M, Manzoor R, Sajid H, Alanazi F (2021) A simple and secure reformation-based password scheme. IEEE Access 9. https:\/\/doi.org\/10.1109\/ACCESS.2020.3049052","DOI":"10.1109\/ACCESS.2020.3049052"},{"key":"16401_CR4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAIS48893.2020.9096809","author":"DM Alsaffar","year":"2020","unstructured":"Alsaffar DM, Almutiri AS, Alqahtani B, Alamri RM, Alqahtani HF, Alqahtani NN, Alshammari GM, Ali AA (2020). Image encryp- tion based on AES and RSA algorithms. https:\/\/doi.org\/10.1109\/ICCAIS48893.2020.9096809","journal-title":"Image encryp- tion based on AES and RSA algorithms."},{"key":"16401_CR5","doi-asserted-by":"publisher","unstructured":"Al-Zubaidie M, Zhang Z, Zhang J (2019) Ramhu: A new robust, lightweight scheme for mutual user authentication in healthcare applications. Security and Communication Networks 2019. https:\/\/doi.org\/10.1155\/2019\/3263902","DOI":"10.1155\/2019\/3263902"},{"key":"16401_CR6","doi-asserted-by":"publisher","unstructured":"Cheng H (2000) Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing. https:\/\/doi.org\/10.1109\/78.852023","DOI":"10.1109\/78.852023"},{"issue":"7","key":"16401_CR7","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1211","volume":"5","author":"L Cheng","year":"2017","unstructured":"Cheng L, Liu F, Yao D (2017) Enterprise Data Breach: Causes, Challenges, Prevention, and Future Directions. WIREs Data Mining Knowl Discov 5(7):e1211. https:\/\/doi.org\/10.1002\/widm.1211","journal-title":"WIREs Data Mining Knowl Discov"},{"key":"16401_CR8","doi-asserted-by":"publisher","unstructured":"Cheng S, Wang L, Ao N, Han Q (2020) A selective video encryption scheme based on coding characteristics. Symmetry 12. https:\/\/doi.org\/10.3390\/sym12030332","DOI":"10.3390\/sym12030332"},{"key":"16401_CR9","unstructured":"Chepuri S (2017) An RGB image encryption using RSA algorithm. International Journal of Current Trends in Engineering Research (IJCTER) 3"},{"key":"16401_CR10","doi-asserted-by":"publisher","DOI":"10.1080\/19361610.2022.2124589","author":"M Dhruv","year":"2022","unstructured":"Dhruv M, Manish J, Hartik S, Ramchandra M (2022) DieRoll: A Unique Key Generation and Encryption Technique. Journal of Applied Security Research. https:\/\/doi.org\/10.1080\/19361610.2022.2124589","journal-title":"Journal of Applied Security Research"},{"key":"16401_CR11","doi-asserted-by":"publisher","unstructured":"Elkamchouchi H, Salama WM, Abouelseoud Y (2020) New video encryption schemes based on chaotic maps. IET Image Processing 14. https:\/\/doi.org\/10.1049\/iet-ipr.2018.5250","DOI":"10.1049\/iet-ipr.2018.5250"},{"key":"16401_CR12","doi-asserted-by":"publisher","unstructured":"Elrefaey A, Sarhan A, El-Shennawy NM (2021) Parallel approaches to improve the speed of chaotic-maps-based encryption using GPU. Journal of Real-Time Image Processing 18. https:\/\/doi.org\/10.1007\/s11554-020-01064-w","DOI":"10.1007\/s11554-020-01064-w"},{"key":"16401_CR13","unstructured":"Farik M, Nisha S (2017) RSA public key cryptography algorithm-a review. Article in International Journal of Scientific Technology Research 6"},{"key":"16401_CR14","doi-asserted-by":"crossref","unstructured":"Guleria V, Mishra DC (2021) Multiple RGB image encryption algorithm with multilayers by affine hill cipher with FRDCT and Arnold transform. Fractals 29. https:\/\/doi.org\/10.1142\/S0218348X21501516","DOI":"10.1142\/S0218348X21501516"},{"key":"16401_CR15","doi-asserted-by":"crossref","unstructured":"Hosny KM, Zaki MA, Lashin NA, Fouda MM, Hamza HM (2023) Multimedia Security Using Encryption: A Survey 2023. https:\/\/doi.org\/10.1109\/ACCESS.2023.3287858","DOI":"10.1109\/ACCESS.2023.3287858"},{"key":"16401_CR16","doi-asserted-by":"publisher","DOI":"10.9790\/2834-0516064","author":"GI Ighalo","year":"2013","unstructured":"Ighalo GI (2013) Using mono-alphabetic substitution to secure against threats and risk in information technology. IOSR Journal of Electronics and Communication Engineering. https:\/\/doi.org\/10.9790\/2834-0516064","journal-title":"IOSR Journal of Electronics and Communication Engineering"},{"key":"16401_CR17","doi-asserted-by":"publisher","DOI":"10.1080\/24751839.2023.2183802","author":"D Kanaad","year":"2023","unstructured":"Kanaad D, Junaid G, Ramchandra M (2023) Security enhancement and analysis of images using a novel Sudoku-based encryption algorithm. Journal of Information and Telecommunication. https:\/\/doi.org\/10.1080\/24751839.2023.2183802","journal-title":"Journal of Information and Telecommunication"},{"key":"16401_CR18","doi-asserted-by":"publisher","unstructured":"Khlif N, Amor MB, Masmoudi N, Kammoun F (2020) A new evaluation of video encryption security with a perceptual metric. J Test Eval 48. https:\/\/doi.org\/10.1520\/JTE20160456","DOI":"10.1520\/JTE20160456"},{"key":"16401_CR19","doi-asserted-by":"publisher","unstructured":"Kota CM, Aissi C (2022) Implementation of the RSA algorithm and its cryptanalysis. https:\/\/doi.org\/10.18260\/1-2-620-38785","DOI":"10.18260\/1-2-620-38785"},{"key":"16401_CR20","doi-asserted-by":"publisher","unstructured":"Li X, Yu H, Zhang H, Jin X, Sun H, Liu J (2020) Video encryption based on hyperchaotic system. Multimedia Tools and Applications 79. https:\/\/doi.org\/10.1007\/s11042-020-09200-1","DOI":"10.1007\/s11042-020-09200-1"},{"key":"16401_CR21","doi-asserted-by":"publisher","unstructured":"Lin R, Li S (2021) An image encryption scheme based on Lorenz hyperchaotic system and RSA algorithm. Security and Communication Networks 2021. https:\/\/doi.org\/10.1155\/2021\/5586959","DOI":"10.1155\/2021\/5586959"},{"key":"16401_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.06.004","author":"F Liu","year":"2010","unstructured":"Liu F, Koenig H (2010). A Survey of Video Encryption Algorithms. https:\/\/doi.org\/10.1016\/j.cose.2009.06.004","journal-title":"A Survey of Video Encryption Algorithms."},{"key":"16401_CR23","doi-asserted-by":"publisher","unstructured":"Lone MA, Qureshi S (2022) RGB image encryption based on symmetric keys using Arnold transform, 3d chaotic map, and Affine Hill cipher. Optik 260. https:\/\/doi.org\/10.1016\/j.ijleo.2022.168880","DOI":"10.1016\/j.ijleo.2022.168880"},{"key":"16401_CR24","doi-asserted-by":"publisher","unstructured":"Lone PN, Singh D, Mir UH (2021) A novel image encryption using random matrix Affine cipher and the chaotic maps. Journal of Modern Optics 68. https:\/\/doi.org\/10.1080\/09500340.2021.1924885","DOI":"10.1080\/09500340.2021.1924885"},{"key":"16401_CR25","doi-asserted-by":"publisher","unstructured":"Masood F, Driss M, Boulila W, Ahmad J, Rehman SU, Jan SU, Qayyum A, Buchanan WJ (2021) A lightweight chaos-based med- ical image encryption scheme using random shuffling and xor operations. Wireless Personal Communications. https:\/\/doi.org\/10.1007\/s11277-021-08584-z","DOI":"10.1007\/s11277-021-08584-z"},{"key":"16401_CR26","doi-asserted-by":"publisher","unstructured":"Massoudi A, Lefebvre F, Vleeschouwer CD, MacQ B, Quisquater JJ (2008) Overview on selective encryption of image and video: Challenges and perspectives. Eurasip Journal on Information Security 2008. https:\/\/doi.org\/10.1155\/2008\/179290","DOI":"10.1155\/2008\/179290"},{"key":"16401_CR27","unstructured":"Nilesh AL, (2017) A review of encryption algorithms-RSA and diffie-hellman. INTERNATIONAL JOURNAL OF SCIENTIFIC TECHNOLOGY RESEARCH"},{"key":"16401_CR28","doi-asserted-by":"publisher","unstructured":"PD, Babu SS, Vijayalakshmi Y, (2020) Enhancement of e-commerce security through asymmetric key algorithm. Computer Communications 153. https:\/\/doi.org\/10.1016\/j.comcom.2020.01.033","DOI":"10.1016\/j.comcom.2020.01.033"},{"key":"16401_CR29","doi-asserted-by":"publisher","unstructured":"Saeed B, Majid N (2012) Image encryption using a lightweight stream encryption algorithm. Advances in Multimedia. https:\/\/doi.org\/10.1155\/2012\/767364","DOI":"10.1155\/2012\/767364"},{"key":"16401_CR30","doi-asserted-by":"publisher","unstructured":"Setiadi, De Rosal Igantius Moses Setiadi (2021).: PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimed Tools Appl 80:8423\u20138444. https:\/\/doi.org\/10.1007\/s11042-020-10035-z","DOI":"10.1007\/s11042-020-10035-z"},{"key":"16401_CR31","doi-asserted-by":"publisher","unstructured":"Shiguo L, Zhongxuan L, Zhen R, Haila W (2006) Secure advanced video coding based on selective encryption algorithms. IEEE Transactions on Consumer Electronics. https:\/\/doi.org\/10.1109\/TCE.2006.1649688","DOI":"10.1109\/TCE.2006.1649688"},{"key":"16401_CR32","doi-asserted-by":"publisher","unstructured":"Simon B (2020) Document Fraud: Will Your Identity Be Secure in the Twenty-first Century?.: European Journal on Criminal Policy and Research 2020. https:\/\/doi.org\/10.1007\/s10610-020-09441-8","DOI":"10.1007\/s10610-020-09441-8"},{"key":"16401_CR33","doi-asserted-by":"publisher","unstructured":"Simon Singh.(2003). The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Queue(1) 2003. https:\/\/doi.org\/10.1145\/966789.966797","DOI":"10.1145\/966789.966797"},{"key":"16401_CR34","doi-asserted-by":"publisher","unstructured":"Telem ANK, Feudjio C, Ramakrishnan B, Fotsin HB, Rajagopal K (2022) A simple image encryption based on binary image Affine transformation and zigzag process. Complexity. https:\/\/doi.org\/10.1155\/2022\/3865820","DOI":"10.1155\/2022\/3865820"},{"key":"16401_CR35","doi-asserted-by":"publisher","unstructured":"Venkatesh K, Narasimhan D (2022) Mlpd: a multilayer protection with deduplication technique to preserve audio file transmission over the public domain. Soft Computing 26. https:\/\/doi.org\/10.1007\/s00500-022-06801-w","DOI":"10.1007\/s00500-022-06801-w"},{"key":"16401_CR36","doi-asserted-by":"publisher","unstructured":"Xie D, Kuo CCJ (2007) Multimedia encryption with joint randomized entropy coding and rotation in partitioned bitstream. Eurasip Journal on Information Security 2007. https:\/\/doi.org\/10.1155\/2007\/35262","DOI":"10.1155\/2007\/35262"},{"key":"16401_CR37","doi-asserted-by":"publisher","first-page":"12413","DOI":"10.1007\/s00500-020-04683-4","volume":"24","author":"L You","year":"2020","unstructured":"You L, Yang E (2020) Wang GA (2020) novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation. Soft Comput 24:12413\u201312427. https:\/\/doi.org\/10.1007\/s00500-020-04683-4","journal-title":"Soft Comput"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16401-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16401-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16401-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T06:40:15Z","timestamp":1709880015000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16401-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,16]]},"references-count":37,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["16401"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16401-x","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,16]]},"assertion":[{"value":"29 November 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}