{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T06:51:28Z","timestamp":1767423088877,"version":"3.37.3"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"40","license":[{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17663-1","type":"journal-article","created":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T05:02:45Z","timestamp":1704258165000},"page":"88447-88467","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Image encryption algorithm based on factorial decomposition"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1520-9814","authenticated-orcid":false,"given":"Muath","family":"AlShaikh","sequence":"first","affiliation":[]},{"given":"Malek","family":"Alzaqebah","sequence":"additional","affiliation":[]},{"given":"Nabil","family":"Gmati","sequence":"additional","affiliation":[]},{"given":"Nashat","family":"Alrefai","sequence":"additional","affiliation":[]},{"given":"Mutasem K.","family":"Alsmadi","sequence":"additional","affiliation":[]},{"given":"Ibrahim","family":"Almarashdeh","sequence":"additional","affiliation":[]},{"given":"Rami Mustafa A.","family":"Mohammad","sequence":"additional","affiliation":[]},{"given":"Sultan","family":"Alamri","sequence":"additional","affiliation":[]},{"given":"Mostefa","family":"Kara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,3]]},"reference":[{"issue":"12","key":"17663_CR1","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1353-4858(10)70006-4","volume":"2009","author":"S Heron","year":"2009","unstructured":"Heron S (2009) Advanced encryption standard (AES). Netw Secur 2009(12):8\u201312","journal-title":"Netw Secur"},{"key":"17663_CR2","doi-asserted-by":"crossref","unstructured":"Dhany HW et al. (2017) Encryption and decryption using password based encryption, MD5, and DES. International Conference on Public Policy, Social Computing and Development 2017 (ICOPOSDev 2017). Atlantis Press","DOI":"10.2991\/icoposdev-17.2018.57"},{"issue":"6","key":"17663_CR3","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1109\/TIT.1980.1056264","volume":"26","author":"H Williams","year":"1980","unstructured":"Williams H (1980) A modification of the RSA public-key encryption procedure (Corresp.). IEEE Trans Inf Theory 26(6):726\u2013729","journal-title":"IEEE Trans Inf Theory"},{"issue":"1-2","key":"17663_CR4","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/S0375-9601(98)00086-3","volume":"240","author":"MS Baptista","year":"1998","unstructured":"Baptista MS (1998) Cryptography with chaos. Phys Lett A 240(1-2):50\u201354","journal-title":"Phys Lett A"},{"key":"17663_CR5","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","volume":"128","author":"A Belazi","year":"2016","unstructured":"Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155\u2013170","journal-title":"Signal Process"},{"issue":"1","key":"17663_CR6","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s11071-016-3046-0","volume":"87","author":"A Belazi","year":"2017","unstructured":"Belazi A et al (2017) Efficient cryptosystem approaches: S-boxes and permutation\u2013substitution-based encryption. Nonlinear Dynam 87(1):337\u2013361","journal-title":"Nonlinear Dynam"},{"key":"17663_CR7","doi-asserted-by":"crossref","unstructured":"Kaliswaran S, Parvees MYM (2022) War Optimization Method for Image Encryption Algorithm Based on A Chaotic Bit-Plane Decomposition. J Pharmaceut Negative Results 2657-2671","DOI":"10.47750\/pnr.2022.13.S06.343"},{"key":"17663_CR8","doi-asserted-by":"crossref","unstructured":"Li S, Chen G, Zheng X. (2006) Chaos-based encryption for digital image and video. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publications. 129-163","DOI":"10.1201\/9781420013450-4"},{"key":"17663_CR9","unstructured":"El-Khamyl S, Abou El-Nasr M, and El-Zein A (2009) An encryption scheme for images based on the DWT and a chaotic cipher. 2009 National Radio Science Conference. IEEE"},{"key":"17663_CR10","doi-asserted-by":"crossref","unstructured":"Morankar G (2022) Robust Image Encryption Scheme for Biometric Finger Print Images using Bit Planes, DWT and Cubic Map. Intl J Next-Gen Comput 13.5","DOI":"10.47164\/ijngc.v13i5.946"},{"key":"17663_CR11","doi-asserted-by":"crossref","unstructured":"Li M et al. (2019) Cryptanalysis of permutation\u2013diffusion-based lightweight chaotic image encryption scheme using CPA. Appl Sci 9.3 494","DOI":"10.3390\/app9030494"},{"key":"17663_CR12","doi-asserted-by":"crossref","unstructured":"Alanezi A et al. (2021) Securing digital images through simple permutation-substitution mechanism in cloud-based smart city environment. Secur Commun Netw (2021): 1-17","DOI":"10.1155\/2021\/6615512"},{"key":"17663_CR13","doi-asserted-by":"publisher","first-page":"12966","DOI":"10.1109\/ACCESS.2022.3146792","volume":"10","author":"J Arif","year":"2022","unstructured":"Arif J et al (2022) A novel chaotic permutation-substitution image encryption scheme based on logistic map and random substitution. IEEE Access 10:12966\u201312982","journal-title":"IEEE Access"},{"issue":"10","key":"17663_CR14","doi-asserted-by":"publisher","first-page":"1344","DOI":"10.3390\/e24101344","volume":"24","author":"Y Alghamdi","year":"2022","unstructured":"Alghamdi Y, Munir A, Ahmad J (2022) A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution. Entropy 24(10):1344","journal-title":"Entropy"},{"key":"17663_CR15","doi-asserted-by":"crossref","unstructured":"Shen H et al. (2022) A new chaotic image encryption algorithm based on transversals in a Latin square. Entropy 24.11 1574","DOI":"10.3390\/e24111574"},{"key":"17663_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11220-014-0092-x","volume":"15","author":"I Sam","year":"2014","unstructured":"Sam I, Shatheesh PD, Bhuvaneswaran RS (2014) An efficient quasigroup based image encryption using modified nonlinear chaotic maps. Sens Imaging 15:1\u201321","journal-title":"Sens Imaging"},{"key":"17663_CR17","doi-asserted-by":"crossref","unstructured":"Zhang X et al. (2021) A novel chaotic image encryption algorithm based on latin square and random shift. Comput Intell Neurosci 2021","DOI":"10.1155\/2021\/2091053"},{"key":"17663_CR18","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.ins.2013.11.027","volume":"264","author":"Y Wu","year":"2014","unstructured":"Wu Y et al (2014) Design of image cipher using latin squares. Inf Sci 264:317\u2013339","journal-title":"Inf Sci"},{"issue":"1","key":"17663_CR19","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1007\/s11071-021-06308-3","volume":"104","author":"Z Hua","year":"2021","unstructured":"Hua Z et al (2021) Design and application of an S-box using complete Latin square. Nonlinear Dynam 104(1):807\u2013825","journal-title":"Nonlinear Dynam"},{"key":"17663_CR20","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1016\/j.ijleo.2018.06.112","volume":"171","author":"M Xu","year":"2018","unstructured":"Xu M, Tian Z (2018) A novel image encryption algorithm based on self-orthogonal Latin squares. Optik 171:891\u2013903","journal-title":"Optik"},{"key":"17663_CR21","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.1007\/s11071-021-07017-7","volume":"107","author":"X Wang","year":"2022","unstructured":"Wang X et al (2022) A new image encryption algorithm based on Latin square matrix. Nonlinear Dynam 107:1277\u20131293","journal-title":"Nonlinear Dynam"},{"key":"17663_CR22","doi-asserted-by":"publisher","first-page":"4505","DOI":"10.1007\/s11071-021-06472-6","volume":"104","author":"Z Hua","year":"2021","unstructured":"Hua Z et al (2021) Color image encryption using orthogonal Latin squares and a new 2D chaotic system. Nonlinear Dynam 104:4505\u20134522","journal-title":"Nonlinear Dynam"},{"key":"17663_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2018.11.010","volume":"478","author":"M Xu","year":"2019","unstructured":"Xu M, Tian Z (2019) A novel image cipher based on 3D bit matrix and latin cubes. Inf Sci 478:1\u201314","journal-title":"Inf Sci"},{"key":"17663_CR24","doi-asserted-by":"publisher","first-page":"106437","DOI":"10.1016\/j.optlastec.2020.106437","volume":"131","author":"J Zhou","year":"2020","unstructured":"Zhou J, Zhou N-R, Gong L-H (2020) Fast color image encryption scheme based on 3D orthogonal Latin squares and matching matrix. Opt Laser Technol 131:106437","journal-title":"Opt Laser Technol"},{"key":"17663_CR25","doi-asserted-by":"crossref","unstructured":"Li T et al. (2019) Image encryption based on pixel-level diffusion with dynamic filtering and DNA-level permutation with 3D Latin cubes. Entropy 21.3: 319","DOI":"10.3390\/e21030319"},{"issue":"4","key":"17663_CR26","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656\u2013715","journal-title":"Bell Syst Tech J"},{"key":"17663_CR27","doi-asserted-by":"crossref","unstructured":"Liu JL et al. (2022) Image compression and encryption algorithm based on 2D compressive sensing and hyperchaotic system. Multimedia Systems 1-16","DOI":"10.1007\/s00530-021-00859-6"},{"issue":"10","key":"17663_CR28","doi-asserted-by":"publisher","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","volume":"59","author":"H Liu","year":"2010","unstructured":"Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320\u20133327","journal-title":"Comput Math Appl"},{"key":"17663_CR29","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.optlaseng.2016.03.019","volume":"84","author":"W Liu","year":"2016","unstructured":"Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26\u201336","journal-title":"Opt Lasers Eng"},{"key":"17663_CR30","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/s11071-015-1893-8","volume":"80","author":"S Som","year":"2015","unstructured":"Som S et al (2015) Confusion and diffusion of color images with multiple chaotic maps and chaos-based pseudorandom binary number generator. Nonlinear Dynam 80:615\u2013627","journal-title":"Nonlinear Dynam"},{"key":"17663_CR31","doi-asserted-by":"publisher","first-page":"2067","DOI":"10.1007\/s11071-015-2465-7","volume":"83","author":"G Ye","year":"2016","unstructured":"Ye G, Zhao H, Chai H (2016) Chaotic image encryption algorithm using wave-line permutation and block diffusion. Nonlinear Dynam 83:2067\u20132077","journal-title":"Nonlinear Dynam"},{"issue":"18","key":"17663_CR32","doi-asserted-by":"publisher","first-page":"3680","DOI":"10.1016\/j.optcom.2009.06.014","volume":"282","author":"W Chen","year":"2009","unstructured":"Chen W, Quan C, Tay CJ (2009) Optical color image encryption based on Arnold transform and interference method. Opt Commun 282(18):3680\u20133685","journal-title":"Opt Commun"},{"key":"17663_CR33","doi-asserted-by":"publisher","first-page":"2333","DOI":"10.1007\/s11071-016-2648-x","volume":"84","author":"X-J Tong","year":"2016","unstructured":"Tong X-J et al (2016) A joint color image encryption and compression scheme based on hyper-chaotic system. Nonlinear Dynam 84:2333\u20132356","journal-title":"Nonlinear Dynam"},{"key":"17663_CR34","doi-asserted-by":"publisher","first-page":"13995","DOI":"10.1007\/s11042-016-3775-6","volume":"76","author":"X-J Tong","year":"2017","unstructured":"Tong X-J, Chen P, Zhang M (2017) A joint image lossless compression and encryption method based on chaotic map. Multimed Tools Appl 76:13995\u201314020","journal-title":"Multimed Tools Appl"},{"issue":"6-7","key":"17663_CR35","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/0375-9601(90)90136-C","volume":"144","author":"K Aihara","year":"1990","unstructured":"Aihara K, Takabe T, Toyoda M (1990) Chaotic neural networks. Phys Lett A 144(6-7):333\u2013340","journal-title":"Phys Lett A"},{"issue":"8","key":"17663_CR36","doi-asserted-by":"publisher","first-page":"2554","DOI":"10.1073\/pnas.79.8.2554","volume":"79","author":"JJ Hopfield","year":"1982","unstructured":"Hopfield JJ (1982) Neural networks and physical systems with emergent collective computational abilities. Proc Natl Acad Sci 79(8):2554\u20132558","journal-title":"Proc Natl Acad Sci"},{"issue":"10","key":"17663_CR37","doi-asserted-by":"publisher","first-page":"3088","DOI":"10.1073\/pnas.81.10.3088","volume":"81","author":"JJ Hopfield","year":"1984","unstructured":"Hopfield JJ (1984) Neurons with graded response have collective computational properties like those of two-state neurons. Proc Natl Acad Sci 81(10):3088\u20133092","journal-title":"Proc Natl Acad Sci"},{"key":"17663_CR38","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.dsp.2013.11.004","volume":"25","author":"A Kassem","year":"2014","unstructured":"Kassem A et al (2014) Efficient neural chaotic generator for image encryption. Digital Signal Process 25:266\u2013274","journal-title":"Digital Signal Process"},{"key":"17663_CR39","doi-asserted-by":"publisher","first-page":"185796","DOI":"10.1109\/ACCESS.2019.2961164","volume":"7","author":"L Liu","year":"2019","unstructured":"Liu L et al (2019) A simultaneous scrambling and diffusion color image encryption algorithm based on Hopfield chaotic neural network. IEEE Access 7:185796\u2013185810","journal-title":"IEEE Access"},{"issue":"15","key":"17663_CR40","doi-asserted-by":"publisher","first-page":"11477","DOI":"10.1007\/s00521-019-04637-4","volume":"32","author":"C Lakshmi","year":"2020","unstructured":"Lakshmi C et al (2020) Hopfield attractor-trusted neural network: an attack-resistant image encryption. Neural Comput & Applic 32(15):11477\u201311489","journal-title":"Neural Comput & Applic"},{"key":"17663_CR41","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.optlaseng.2018.11.010","volume":"115","author":"X-Y Wang","year":"2019","unstructured":"Wang X-Y, Li Z-M (2019) A color image encryption algorithm based on Hopfield chaotic neural network. Opt Lasers Eng 115:107\u2013118","journal-title":"Opt Lasers Eng"},{"issue":"2","key":"17663_CR42","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1109\/TIFS.2015.2489178","volume":"11","author":"A Jolfaei","year":"2015","unstructured":"Jolfaei A, Wu X-W, Muthukkumarasamy V (2015) On the security of permutation-only image encryption schemes. IEEE Trans Inform Forens Secur 11(2):235\u2013246","journal-title":"IEEE Trans Inform Forens Secur"},{"key":"17663_CR43","doi-asserted-by":"crossref","unstructured":"Tirdad K, Sadeghian A (2010) Hopfield neural networks as pseudo random number generators. 2010 Annual meeting of the North American fuzzy information processing society. IEEE","DOI":"10.1109\/NAFIPS.2010.5548182"},{"key":"17663_CR44","doi-asserted-by":"crossref","unstructured":"Tlelo-Cuautle E et al. (2020) Chaotic image encryption using hopfield and hindmarsh\u2013rose neurons implemented on FPGA. Sensors 20.5: 1326","DOI":"10.3390\/s20051326"},{"key":"17663_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/4047957","volume":"2019","author":"F Yu","year":"2019","unstructured":"Yu F et al (2019) Analysis and FPGA realization of a novel 5D hyperchaotic four-wing memristive system, active control synchronization, and secure communication application. Complexity 2019:1\u201318","journal-title":"Complexity"},{"key":"17663_CR46","doi-asserted-by":"crossref","unstructured":"Yu F et al. (2022) FPGA implementation and image encryption application of a new PRNG based on a memristive Hopfield neural network with a special activation gradient. Chinese Physics B 31.2: 020505","DOI":"10.1088\/1674-1056\/ac3cb2"},{"issue":"1","key":"17663_CR47","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.1007\/s11071-021-07017-7","volume":"107","author":"X Wang","year":"2022","unstructured":"Wang X et al (2022) A new image encryption algorithm based on Latin square matrix. Nonlinear Dynam 107(1):1277\u20131293","journal-title":"Nonlinear Dynam"},{"issue":"09","key":"17663_CR48","doi-asserted-by":"publisher","first-page":"1950115","DOI":"10.1142\/S0218127419501153","volume":"29","author":"G Cheng","year":"2019","unstructured":"Cheng G, Wang C, Chen H (2019) A novel color image encryption algorithm based on hyperchaotic system and permutation-diffusion architecture. Intl J Bifurcation Chaos 29(09):1950115","journal-title":"Intl J Bifurcation Chaos"},{"key":"17663_CR49","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.ijleo.2017.09.099","volume":"153","author":"X Liao","year":"2018","unstructured":"Liao X, Hahsmi MA, Haider R (2018) An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos. Optik-Intl J Light Electron Optics 153:117\u2013134","journal-title":"Optik-Intl J Light Electron Optics"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17663-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17663-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17663-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T10:11:45Z","timestamp":1734084705000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17663-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,3]]},"references-count":49,"journal-issue":{"issue":"40","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["17663"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17663-1","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,1,3]]},"assertion":[{"value":"10 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Our manuscript does not report on or involve the use of any animal or human data or tissue, \u201cNot applicable\u201d.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and consent to participate"}},{"value":"Our manuscript does not contain data from any individual person, please state \u201cNot applicable\u201d","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.The authors declare that there is no financial interests\/personal relationships which may be considered as potential competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}