{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T03:46:23Z","timestamp":1772509583725,"version":"3.50.1"},"reference-count":83,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T00:00:00Z","timestamp":1695686400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T00:00:00Z","timestamp":1695686400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16873-x","type":"journal-article","created":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T11:02:51Z","timestamp":1695726171000},"page":"34537-34579","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A novel image encryption scheme based on a new hyperchaotic map"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0920-7983","authenticated-orcid":false,"given":"Tarek","family":"Farah","sequence":"first","affiliation":[]},{"given":"Badr M","family":"Alshammari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,26]]},"reference":[{"issue":"4","key":"16873_CR1","doi-asserted-by":"crossref","first-page":"1372","DOI":"10.35378\/gujs.884880","volume":"35","author":"PN Srnvasu","year":"2021","unstructured":"Srnvasu PN, Norwawi N, Amiripalli SS, Deepalakshmi P (2021) Secured compression for 2D medical images through the manifold and fuzzy trapezoidal correlation function. Gazi Univ J Sci 35(4):1372\u20131391","journal-title":"Gazi Univ J Sci"},{"key":"16873_CR2","doi-asserted-by":"crossref","unstructured":"Lalitha RVSS, Srinivasu PN (2017) An efficient data encryption through image via prime order symmetric key and bit shuffle technique. In: Computer Communication, Networking and Internet Security: Proceedings of IC3T 2016 pp 261-270. Springer Singapore","DOI":"10.1007\/978-981-10-3226-4_26"},{"issue":"6","key":"16873_CR3","first-page":"3878","volume":"34","author":"K Kumar","year":"2022","unstructured":"Kumar K, Ramkumar KR, Kaur A (2022) A lightweight AES algorithm implementation for encrypting voice messages using field programmable gate arrays. J King Saud Univ, Comp Info 34(6):3878\u20133885","journal-title":"J King Saud Univ, Comp Info"},{"key":"16873_CR4","doi-asserted-by":"crossref","unstructured":"Rahul B, Kuppusamy K, Senthilrajan A (2023) Dynamic DNA cryptography-based Image Encryption Scheme using Multiple Chaotic Maps and SHA-256 hash function. Optik, 171253","DOI":"10.1016\/j.ijleo.2023.171253"},{"key":"16873_CR5","doi-asserted-by":"crossref","unstructured":"Zhang B, Rahmatullah B, Wang SL, Almutairi HM, Xiao Y, Liu X, Liu Z (2023). A variable dimensional chaotic map-based medical image encryption algorithm with multi-mode. Med Biol Eng Comput, 1-32","DOI":"10.1007\/s11517-023-02874-3"},{"key":"16873_CR6","doi-asserted-by":"crossref","unstructured":"Tong H, Li T, Xu Y, Su X, Qiao G (2023) Chaotic coyote optimization algorithm for image encryption and steganography. Multimed Tools Appl, 1\u201327","DOI":"10.1007\/s11042-023-16240-w"},{"issue":"10","key":"16873_CR7","doi-asserted-by":"crossref","first-page":"878","DOI":"10.1007\/s11082-023-05131-x","volume":"55","author":"P Rakheja","year":"2023","unstructured":"Rakheja P, Khurana M (2023) Multiple iris image encryption using phase retrieval mask, QZ algorithm and umbrella map in hybrid transform domain. Opt Quantum Electron 55(10):878","journal-title":"Opt Quantum Electron"},{"issue":"5","key":"16873_CR8","doi-asserted-by":"crossref","first-page":"6943","DOI":"10.1007\/s11042-022-13612-6","volume":"82","author":"H Khan","year":"2023","unstructured":"Khan H, Hazzazi MM, Jamal SS, Hussain I, Khan M (2023) New color image encryption technique based on three-dimensional logistic map and Grey wolf optimization based generated substitution boxes. Multimed Tools Appl 82(5):6943\u20136964","journal-title":"Multimed Tools Appl"},{"key":"16873_CR9","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1007\/s10773-018-3932-y","volume":"58","author":"J Wang","year":"2019","unstructured":"Wang J, Geng YC, Han L et al (2019) Quantum Image Encryption Algorithm Based on Quantum Key Image. Int J Theor Phys 58:308\u2013322","journal-title":"Int J Theor Phys"},{"key":"16873_CR10","doi-asserted-by":"crossref","first-page":"128834","DOI":"10.1016\/j.optcom.2022.128834","volume":"525","author":"J Wang","year":"2022","unstructured":"Wang J, Chen J, Wang F, Ni R (2022) Optical image encryption scheme based on quantum s-box and meaningful ciphertext generation algorithm. Opt Commun 525:128834","journal-title":"Opt Commun"},{"key":"16873_CR11","doi-asserted-by":"crossref","first-page":"128834","DOI":"10.1016\/j.optcom.2022.128834","volume":"525","author":"J Wang","year":"2022","unstructured":"Wang J, Chen J, Wang F, Ni R (2022) Optical image encryption scheme based on quantum s-box and meaningful ciphertext generation algorithm. Opt Commun 525:128834","journal-title":"Opt Commun"},{"key":"16873_CR12","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1016\/j.compeleceng.2017.01.015","volume":"62","author":"B Wang","year":"2017","unstructured":"Wang B, Xu J, Song H (2017) Research on the improved algorithm for image quantum encryption in multimedia networks. Comput Electr Eng 62:414\u2013428","journal-title":"Comput Electr Eng"},{"key":"16873_CR13","doi-asserted-by":"crossref","unstructured":"Xiao X, He X, Zhang Y, Dong X, Yang LX, Xiang Y (2023) Blockchain-based reliable image copyright protection. IET Blockchain","DOI":"10.1049\/blc2.12027"},{"key":"16873_CR14","doi-asserted-by":"crossref","first-page":"102048","DOI":"10.1016\/j.phycom.2023.102048","volume":"58","author":"I Keshta","year":"2023","unstructured":"Keshta I, Aoudni Y, Sandhu M, Singh A, Xalikovich PA, Rizwan A, Lalar S (2023) Blockchain aware proxy re-encryption algorithm-based data sharing scheme. Phys Commun 58:102048","journal-title":"Phys Commun"},{"key":"16873_CR15","doi-asserted-by":"crossref","first-page":"108883","DOI":"10.1016\/j.compeleceng.2023.108883","volume":"110","author":"S Qamar","year":"2023","unstructured":"Qamar S (2023) Federated convolutional model with cyber blockchain in medical image encryption using Multiple Rossler lightweight Logistic sine mapping. Comput Electr Eng 110:108883","journal-title":"Comput Electr Eng"},{"key":"16873_CR16","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1016\/j.procs.2017.09.150","volume":"115","author":"AM Vengadapurvaja","year":"2017","unstructured":"Vengadapurvaja AM, Nisha G, Aarthy R, Sasikaladevi N (2017) An efficient homomorphic medical image encryption algorithm for cloud storage security. Procedia Comput Sci 115:643\u2013650","journal-title":"Procedia Comput Sci"},{"key":"16873_CR17","doi-asserted-by":"crossref","first-page":"102587","DOI":"10.1016\/j.dsp.2019.102587","volume":"95","author":"D Xie","year":"2019","unstructured":"Xie D, Chen F, Luo Y, Li L (2019) One-to-many image encryption with privacy-preserving homomorphic outsourced decryption based on compressed sensing. Digit Signal Process 95:102587","journal-title":"Digit Signal Process"},{"key":"16873_CR18","first-page":"78","volume":"47","author":"L Xiong","year":"2019","unstructured":"Xiong L, Dong D (2019) Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion. J Inf Secur Appl 47:78\u201385","journal-title":"J Inf Secur Appl"},{"key":"16873_CR19","doi-asserted-by":"crossref","first-page":"108580","DOI":"10.1016\/j.compeleceng.2023.108580","volume":"106","author":"X Zhang","year":"2023","unstructured":"Zhang X, Li C, Tian L (2023) Advanced audio coding steganography algorithm with distortion minimization model based on audio beat. Comput Electr Eng 106:108580","journal-title":"Comput Electr Eng"},{"key":"16873_CR20","doi-asserted-by":"crossref","unstructured":"Li Z, Yang X, Shen K, Jiang F, Jiang J, Ren H, Li Y (2023) Adversarial feature hybrid framework for steganography with shifted window local loss. Neural Networks","DOI":"10.1016\/j.neunet.2023.05.053"},{"key":"16873_CR21","doi-asserted-by":"crossref","unstructured":"Ma B, Li K, Xu J, Wang C, Li J, Zhang L (2023) Enhancing the security of image steganography via multiple adversarial networks and channel attention modules. Digit Signal Process, 104121","DOI":"10.1016\/j.dsp.2023.104121"},{"key":"16873_CR22","doi-asserted-by":"crossref","first-page":"113383","DOI":"10.1016\/j.chaos.2023.113383","volume":"170","author":"KU Shahna","year":"2023","unstructured":"Shahna KU (2023) Novel chaos based cryptosystem using four-dimensional hyper chaotic map with efficient permutation and substitution techniques. Chaos Solit Fractals 170:113383","journal-title":"Chaos Solit Fractals"},{"key":"16873_CR23","doi-asserted-by":"crossref","first-page":"112519","DOI":"10.1016\/j.chaos.2022.112519","volume":"163","author":"W Cao","year":"2022","unstructured":"Cao W, Cai H, Hua Z (2022) n-Dimensional Chaotic Map with application in secure communication. Chaos Solit Fractals 163:112519","journal-title":"Chaos Solit Fractals"},{"key":"16873_CR24","doi-asserted-by":"crossref","first-page":"113841","DOI":"10.1016\/j.chaos.2023.113841","volume":"174","author":"D Ding","year":"2023","unstructured":"Ding D, Wang W, Yang Z, Hu Y, Wang J, Wang M, Zhu H (2023) An n-dimensional modulo chaotic system with expected Lyapunov exponents and its application in image encryption. Chaos Solit Fractals 174:113841","journal-title":"Chaos Solit Fractals"},{"key":"16873_CR25","doi-asserted-by":"crossref","first-page":"171132","DOI":"10.1016\/j.ijleo.2023.171132","volume":"287","author":"B Sun","year":"2023","unstructured":"Sun B, Zhang C, Peng Q, Du B (2023) Color image encryption algorithm based on 5D memristive chaotic system and group scrambling. Optik 287:171132","journal-title":"Optik"},{"key":"16873_CR26","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"X Chai","year":"2019","unstructured":"Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44\u201362","journal-title":"Signal Process"},{"key":"16873_CR27","doi-asserted-by":"crossref","first-page":"109033","DOI":"10.1016\/j.optlastec.2022.109033","volume":"160","author":"Q Liang","year":"2023","unstructured":"Liang Q, Zhu C (2023) A new one-dimensional chaotic map for image encryption scheme based on random DNA coding. Opt Laser Technol 160:109033","journal-title":"Opt Laser Technol"},{"key":"16873_CR28","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.sigpro.2019.02.016","volume":"160","author":"M Alawida","year":"2019","unstructured":"Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45\u201358","journal-title":"Signal Process"},{"key":"16873_CR29","doi-asserted-by":"crossref","first-page":"109712","DOI":"10.1016\/j.chaos.2020.109712","volume":"135","author":"AA Jalal","year":"2020","unstructured":"Jalal AA, Amen AI, Sulaiman NA (2020) Darboux integrability of the simple chaotic flow with a line equilibria differential system. Chaos Solit Fractals 135:109712","journal-title":"Chaos Solit Fractals"},{"key":"16873_CR30","doi-asserted-by":"crossref","first-page":"112794","DOI":"10.1016\/j.chaos.2022.112794","volume":"165","author":"VY Ostrovskii","year":"2022","unstructured":"Ostrovskii VY, Rybin VG, Karimov AI, Butusov DN (2022) Inducing multistability in discrete chaotic systems using numerical integration with variable symmetry. Chaos Solit Fractals 165:112794","journal-title":"Chaos Solit Fractals"},{"key":"16873_CR31","doi-asserted-by":"crossref","first-page":"108745","DOI":"10.1016\/j.sigpro.2022.108745","volume":"202","author":"S Gao","year":"2023","unstructured":"Gao S, Wu R, Wang X, Wang J, Li Q, Wang C, Tang X (2023) A 3D model encryption scheme based on a cascaded chaotic system. Signal Process 202:108745","journal-title":"Signal Process"},{"issue":"7","key":"16873_CR32","doi-asserted-by":"crossref","first-page":"1746","DOI":"10.1016\/j.cnsns.2012.11.003","volume":"18","author":"Y He","year":"2013","unstructured":"He Y, Yang S, Xu Q (2013) Short-term cascaded hydroelectric system scheduling based on chaotic particle swarm optimization using improved logistic map. Commun Nonlinear Sci Numer Simul 18(7):1746\u20131756","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"3","key":"16873_CR33","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1007\/s00371-020-02048-4","volume":"38","author":"X Wang","year":"2022","unstructured":"Wang X, Liu P (2022) Image encryption based on roulette cascaded chaotic system and alienated image library. Vis Comput 38(3):763\u2013779","journal-title":"Vis Comput"},{"key":"16873_CR34","doi-asserted-by":"crossref","first-page":"112161","DOI":"10.1016\/j.chaos.2022.112161","volume":"160","author":"M Yan","year":"2022","unstructured":"Yan M, Jie J (2022) Fractional-order multiwing switchable chaotic system with a wide range of parameters. Chaos Solit Fractals 160:112161","journal-title":"Chaos Solit Fractals"},{"key":"16873_CR35","doi-asserted-by":"crossref","first-page":"112741","DOI":"10.1016\/j.chaos.2022.112741","volume":"164","author":"R Vadivel","year":"2022","unstructured":"Vadivel R, Sabarathinam S, Wu Y, Chaisena K, Gunasekaran N (2022) New results on T-S fuzzy sampled-data stabilization for switched chaotic systems with its applications. Chaos Solit Fractals 164:112741","journal-title":"Chaos Solit Fractals"},{"issue":"2","key":"16873_CR36","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1007\/s40435-021-00816-1","volume":"10","author":"X Zhang","year":"2022","unstructured":"Zhang X, Xiao J (2022) Complex compound-combination multi switching anti-synchronization of fractional-order complex chaotic systems and integer-order complex chaotic systems. Int J Dyn Control 10(2):525\u2013542","journal-title":"Int J Dyn Control"},{"key":"16873_CR37","doi-asserted-by":"crossref","first-page":"109033","DOI":"10.1016\/j.optlastec.2022.109033","volume":"160","author":"Q Liang","year":"2023","unstructured":"Liang Q, Zhu C (2023) A new one-dimensional chaotic map for image encryption scheme based on random DNA coding. Opt Laser Technol 160:109033","journal-title":"Opt Laser Technol"},{"issue":"4","key":"16873_CR38","doi-asserted-by":"crossref","first-page":"3041","DOI":"10.1007\/s11071-019-05413-8","volume":"99","author":"MB Farah","year":"2020","unstructured":"Farah MB, Farah A, Farah T (2020) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dynamics 99(4):3041\u20133064","journal-title":"Nonlinear Dynamics"},{"key":"16873_CR39","first-page":"103289","volume":"69","author":"D Zhu","year":"2022","unstructured":"Zhu D, Tong X, Wang Z, Zhang M (2022) A novel lightweight block encryption algorithm based on combined chaotic system. J Inf Secur Appl 69:103289","journal-title":"J Inf Secur Appl"},{"key":"16873_CR40","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","volume":"128","author":"A Belazi","year":"2016","unstructured":"Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155\u2013170","journal-title":"Signal Process"},{"key":"16873_CR41","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1016\/j.matcom.2022.12.025","volume":"207","author":"S Zhu","year":"2023","unstructured":"Zhu S, Deng X, Zhang W, Zhu C (2023) Secure image encryption scheme based on a new robust chaotic map and strong S-box. Math Comput Simul 207:322\u2013346","journal-title":"Math Comput Simul"},{"issue":"16","key":"16873_CR42","doi-asserted-by":"crossref","first-page":"23899","DOI":"10.1007\/s11042-022-12069-x","volume":"82","author":"H Liu","year":"2023","unstructured":"Liu H, Liu J, Ma C (2023) Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption. Multimed Tools Appl 82(16):23899\u201323914","journal-title":"Multimed Tools Appl"},{"key":"16873_CR43","first-page":"125153","volume":"376","author":"H Liu","year":"2020","unstructured":"Liu H, Kadir A, Xu C (2020) Cryptanalysis and constructing S-box based on chaotic map and backtracking. Appl Math Comput 376:125153","journal-title":"Appl Math Comput"},{"issue":"10","key":"16873_CR44","doi-asserted-by":"crossref","first-page":"2150146","DOI":"10.1142\/S0218127421501467","volume":"31","author":"Y Si","year":"2021","unstructured":"Si Y, Liu H, Chen Y (2021) Constructing keyed strong S-Box using an enhanced quadratic map. Int J Bifurc Chaos 31(10):2150146","journal-title":"Int J Bifurc Chaos"},{"key":"16873_CR45","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.vlsi.2023.05.006","volume":"92","author":"M Zhao","year":"2023","unstructured":"Zhao M, Liu H, Niu Y (2023) Batch generating keyed strong S-Boxes with high nonlinearity using 2D hyper chaotic map. Integration 92:91\u201398","journal-title":"Integration"},{"key":"16873_CR46","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/j.future.2020.02.029","volume":"107","author":"M Kaur","year":"2020","unstructured":"Kaur M, Singh D, Sun K, Rawat U (2020) Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map. Future Gener Comput Sys 107:333\u2013350","journal-title":"Future Gener Comput Sys"},{"issue":"7","key":"16873_CR47","doi-asserted-by":"crossref","first-page":"2943","DOI":"10.1016\/j.cnsns.2011.11.030","volume":"17","author":"A Kanso","year":"2012","unstructured":"Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3D chaotic map. Commun Nonlinear Sci Numer Simul 17(7):2943\u20132959","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"2","key":"16873_CR48","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1109\/81.904880","volume":"48","author":"G Jakimoski","year":"2001","unstructured":"Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers. IEEE Trans Circuits Syst I, Fundam Theory Appl 48(2):163\u2013169","journal-title":"IEEE Trans Circuits Syst I, Fundam Theory Appl"},{"key":"16873_CR49","doi-asserted-by":"crossref","unstructured":"Dawson M, Tavares S (1991) An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. In: Advances in Cryptology: Proceedings of EURO-CRYPT_91. Lecture Notes in Computer Science, pp 352\u2013367","DOI":"10.1007\/3-540-46416-6_30"},{"key":"16873_CR50","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1109\/ECBI.2009.15","volume-title":"2009 International Conference on Electronic Commerce and Business Intelligence","author":"Y Wang","year":"2009","unstructured":"Wang Y, Xie Q, Wu Y, Du B (2009) A software for S-box performance analysis and test. 2009 International Conference on Electronic Commerce and Business Intelligence. Beijing, China, pp 125\u2013128"},{"issue":"1","key":"16873_CR51","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s11071-016-3030-8","volume":"87","author":"C Li","year":"2017","unstructured":"Li C, Luo G, Qin K, Li C (2017) An image encryption scheme based on chaotic tent map[J]. Nonlinear Dyn 87(1):127\u2013133","journal-title":"Nonlinear Dyn"},{"key":"16873_CR52","doi-asserted-by":"crossref","unstructured":"Dawson M, Tavares S (1991) An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. In: Advances in Cryptology: Proceedings of EURO-CRYPT_91. Lecture Notes in Computer Science, pp. 352\u2013367","DOI":"10.1007\/3-540-46416-6_30"},{"key":"16873_CR53","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1109\/ECBI.2009.15","volume-title":"2009 International Conference on Electronic Commerce and Business Intelligence","author":"Y Wang","year":"2009","unstructured":"Wang Y, Xie Q, Wu Y, Du B (2009) A software for S-box performance analysis and test. 2009 International Conference on Electronic Commerce and Business Intelligence. Beijing, China, pp 125\u2013128"},{"key":"16873_CR54","unstructured":"Adams C, Tavares S (1989) Chapter-4.In: Advances in Cryptology: Proccedings of CRYPTO_89. Lecture Notes in Computer Science, pp 612-615"},{"key":"16873_CR55","doi-asserted-by":"crossref","unstructured":"Webster A, Tavares S (1986) On the design of S-boxes. In: Advances in Cryptology: Proc. of Crypto\u201985, Santa Barbara, USA. Lecture Notes in Computer Science vol. 218, pp 523\u2013534","DOI":"10.1007\/3-540-39799-X_41"},{"key":"16873_CR56","first-page":"325","volume":"135","author":"J Pieprzyk","year":"1988","unstructured":"Pieprzyk J, Finkelsten G (1988) Towards effective nonlinear cryptosystem design. In: IEE Proc Part E Computers Digital Techn 135:325\u201335","journal-title":"In: IEE Proc Part E Computers Digital Techn"},{"issue":"1","key":"16873_CR57","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3\u201372","journal-title":"J Cryptol"},{"key":"16873_CR58","first-page":"386","volume-title":"Advances in Cryptology, Proc. Eurocrypt\u201993. LNCS","author":"M Matsui","year":"1994","unstructured":"Matsui M (1994) Linear cryptanalysis method of DES cipher. Advances in Cryptology, Proc. Eurocrypt\u201993. LNCS. Springer, Berlin, pp 386\u2013397"},{"key":"16873_CR59","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/ar.20407","volume":"290","author":"PR Hof","year":"2007","unstructured":"Hof PR, Van Der Gucht E (2007) Structure of the cerebral cortex of the humpback whale, Megaptera novaeangliae (Cetacea, Mysticeti, Balaenopteridae). Anat Rec 290:1\u201331","journal-title":"Anat Rec"},{"key":"16873_CR60","doi-asserted-by":"crossref","unstructured":"Watkins WA, Schevill WE (1979) Aerial observation of feeding behavior in four baleen whales: Eubalaena glacialis, Balaenoptera borealis, Megaptera novaean-gliae, and Balaenoptera physalus. J Mammal 155-63","DOI":"10.2307\/1379766"},{"key":"16873_CR61","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun CM, Philip Chen CL (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80\u201394","journal-title":"Inf Sci"},{"key":"16873_CR62","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1016\/j.chaos.2004.04.023","volume":"23","author":"G Tang","year":"2005","unstructured":"Tang G, Liao X, Chen Y (2005) A novel method for designing S-boxes based on chaotic maps. Chaos Solit Fractals. 23:413\u2013419","journal-title":"Chaos Solit Fractals."},{"key":"16873_CR63","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1016\/j.chaos.2005.10.022","volume":"31","author":"G Chen","year":"2007","unstructured":"Chen G, Chen Y, Liao X (2007) An extended method for obtaining S-boxes based on 3-dimensional chaotic baker maps. Chaos Solit Fractals 31:571\u2013579","journal-title":"Chaos Solit Fractals"},{"key":"16873_CR64","doi-asserted-by":"crossref","first-page":"3733","DOI":"10.1016\/j.physleta.2010.07.019","volume":"374","author":"F zkaynak","year":"2010","unstructured":"zkaynak F, zer AB (2010) A method for designing strong S-boxes based on chaotic Lorenz system. Phys Lett A 374:3733\u20133738","journal-title":"Phys Lett A"},{"key":"16873_CR65","doi-asserted-by":"crossref","first-page":"2303","DOI":"10.1007\/s11071-012-0621-x","volume":"70","author":"M Khan","year":"2012","unstructured":"Khan M, Shah T, Mahmood H, Gondal MA, Hussain I (2012) A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dyn 70:2303\u20132311","journal-title":"Nonlinear Dyn"},{"key":"16873_CR66","doi-asserted-by":"crossref","first-page":"1791","DOI":"10.1007\/s11071-012-0573-1","volume":"70","author":"I Hussain","year":"2012","unstructured":"Hussain I, Shah T, Gondal MA (2012) A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm. Nonlinear Dyns 70:1791\u20131794","journal-title":"Nonlinear Dyns"},{"key":"16873_CR67","doi-asserted-by":"crossref","first-page":"1438","DOI":"10.1016\/j.ijleo.2016.11.152","volume":"130","author":"A Belazi","year":"2017","unstructured":"Belazi A, El-Latif AAA (2017) A simple yet efficient S-box method based on chaotic sine map. Optik-Int J Light and Elect Optics 130:1438\u20131444","journal-title":"Optik-Int J Light and Elect Optics"},{"issue":"2","key":"16873_CR68","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/s11760-014-0741-5","volume":"10","author":"K Majid","year":"2016","unstructured":"Majid K, Tariq S, Syeda Iram B (2016) A new implementation of chaotic S-boxes in CAPTCHA. Signal Image Video Process. 10(2):293\u2013300","journal-title":"Signal Image Video Process."},{"issue":"7","key":"16873_CR69","first-page":"1717","volume":"25","author":"K Majid","year":"2014","unstructured":"Majid K, Tariq S (2014) A novel image encryption technique based on H\u00e9non chaotic map and S8 symmetric group. Neural Comput Appl 25(7):1717\u20131722","journal-title":"Neural Comput Appl"},{"issue":"4","key":"16873_CR70","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1007\/s11760-016-1007-1","volume":"11","author":"F \u00d6zkaynak","year":"2017","unstructured":"\u00d6zkaynak F, \u00c7elik V, \u00d6zer AB (2017) A new S-box construction method based on the fractional-order chaotic Chen system. Signal, Image and Video Process 11(4):659\u2013664","journal-title":"Signal, Image and Video Process"},{"key":"16873_CR71","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.optlaseng.2017.04.009","volume":"96","author":"R Zahmoul","year":"2017","unstructured":"Zahmoul R, Ejbali R, Zaied M (2017) Image encryption based on new Beta chaotic maps. Opt Lasers Eng 96:39\u201349","journal-title":"Opt Lasers Eng"},{"key":"16873_CR72","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","volume":"128","author":"A Belazi","year":"2016","unstructured":"Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155\u201370 (ISSN 0165-1684)","journal-title":"Signal Process"},{"issue":"4","key":"16873_CR73","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"X Wang","year":"2012","unstructured":"Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101\u20138","journal-title":"Signal Process"},{"key":"16873_CR74","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10\u20138","journal-title":"Opt Lasers Eng"},{"issue":"3","key":"16873_CR75","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1007\/s11071-010-9749-8","volume":"62","author":"XY Wang","year":"2010","unstructured":"Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62(3):615\u201321","journal-title":"Nonlinear Dyn"},{"key":"16873_CR76","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656\u2013715","journal-title":"Bell Syst Tech J"},{"key":"16873_CR77","volume-title":"Differential cryptanalysis of the data encryption standard","author":"E Biham","year":"2012","unstructured":"Biham E, Shamir A (2012) Differential cryptanalysis of the data encryption standard. Springer Sci Business Media"},{"issue":"3","key":"16873_CR78","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"GR Chen","year":"2004","unstructured":"Chen GR, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solit Fractals 21(3):749\u2013761","journal-title":"Chaos Solit Fractals"},{"key":"16873_CR79","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16:2129\u20132151","journal-title":"Int J Bifurc Chaos"},{"key":"16873_CR80","doi-asserted-by":"crossref","first-page":"5415","DOI":"10.1016\/j.optcom.2011.08.013","volume":"284","author":"C Fu","year":"2011","unstructured":"Fu C, Lin B, Miao Y, Liu X, Chen J (2011) A novel chaos-based bit-level permutation scheme for digital image encryption. Opt Commun 284:5415\u20135423","journal-title":"Opt Commun"},{"key":"16873_CR81","unstructured":"IEEE Computer Society (2015) IEEE Standard for Binary Floating-Point Arithmetic. Available online: http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp= &arnumber=30711 accessed on 14-Oct-2015"},{"key":"16873_CR82","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.asoc.2014.09.039","volume":"26","author":"YQ Zhang","year":"2015","unstructured":"Zhang YQ, Wang XY (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10\u201320","journal-title":"Appl Soft Comput"},{"key":"16873_CR83","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf Sci 273:329\u2013351","journal-title":"Inf Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16873-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16873-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16873-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T13:24:28Z","timestamp":1712064268000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16873-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,26]]},"references-count":83,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2024,4]]}},"alternative-id":["16873"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16873-x","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,26]]},"assertion":[{"value":"29 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}