{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:45:47Z","timestamp":1764175547201},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"32","license":[{"start":{"date-parts":[[2024,2,23]],"date-time":"2024-02-23T00:00:00Z","timestamp":1708646400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,23]],"date-time":"2024-02-23T00:00:00Z","timestamp":1708646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17755-y","type":"journal-article","created":{"date-parts":[[2024,2,23]],"date-time":"2024-02-23T09:02:22Z","timestamp":1708678942000},"page":"77137-77163","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Designing a novel image encryption algorithm based on a 2D-SCLC hyperchaotic map"],"prefix":"10.1007","volume":"83","author":[{"given":"Qianqian","family":"Chen","sequence":"first","affiliation":[]},{"given":"Xiaoying","family":"Lv","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,23]]},"reference":[{"key":"17755_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-16706-x","author":"B Madhushree","year":"2023","unstructured":"Madhushree B, Kumar H, Chennamma H (2023) An exhaustive review of authentication, tamper detection with localization and recovery techniques for medical images. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-023-16706-x","journal-title":"Multimed Tools Appl"},{"key":"17755_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-16953-y","author":"Y Kumar","year":"2023","unstructured":"Kumar Y, Guleria V (2023) Mixed-multiple image encryption algorithm using RSA cryptosystem with fractional discrete cosine transform and 2D-Arnold Transform. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-023-16953-y","journal-title":"Multimed Tools Appl"},{"key":"17755_CR3","doi-asserted-by":"publisher","first-page":"36973","DOI":"10.1007\/s11042-023-14873-5","volume":"82","author":"Y Zhang","year":"2023","unstructured":"Zhang Y, Huang Y, Chen D, Zhang Q (2023) Verifiable speech retrieval algorithm based on diversity security template and biohashing. Multimed Tools Appl 82:36973\u201337002","journal-title":"Multimed Tools Appl"},{"key":"17755_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-17150-7","author":"U Gera","year":"2023","unstructured":"Gera U, Agrawal S (2023) Image encryption using combination of 4D discrete hyperchaotic map and DNA encoding. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-023-17150-7","journal-title":"Multimed Tools Appl"},{"key":"17755_CR5","doi-asserted-by":"publisher","first-page":"15477","DOI":"10.1007\/s11071-023-08647-9","volume":"111","author":"X Ye","year":"2023","unstructured":"Ye X, Wang X (2023) Hidden oscillation and chaotic sea in a novel 3d chaotic system with exponential function. Nonlinear Dyn 111:15477\u201315486","journal-title":"Nonlinear Dyn"},{"key":"17755_CR6","doi-asserted-by":"publisher","first-page":"2250035","DOI":"10.1142\/S0218127422500353","volume":"32","author":"X Li","year":"2022","unstructured":"Li X, Mou J, Banerjee S, Cao Y (2022) An optical image encryption algorithm based on fractional-order laser hyperchaotic system. Int J Bifur Chaos 32:2250035","journal-title":"Int J Bifur Chaos"},{"key":"17755_CR7","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1007\/s11071-021-07198-1","volume":"108","author":"X Liu","year":"2022","unstructured":"Liu X, Tong X, Wang Z, Zhang M (2022) Uniform non-degeneracy discrete chaotic system and its application in image encryption. Nonlinear Dyn 108:653\u2013682","journal-title":"Nonlinear Dyn"},{"key":"17755_CR8","doi-asserted-by":"publisher","first-page":"105905","DOI":"10.1016\/j.optlaseng.2019.105905","volume":"127","author":"X Ye","year":"2020","unstructured":"Ye X, Wang X, Gao S et al (2020) A new random diffusion algorithm based on the multi-scroll Chua\u2019s chaotic circuit system. Opt Lasers Eng 127:105905","journal-title":"Opt Lasers Eng"},{"key":"17755_CR9","doi-asserted-by":"publisher","first-page":"1914","DOI":"10.1109\/TIFS.2016.2566261","volume":"11","author":"B Ma","year":"2016","unstructured":"Ma B, Shi Y (2016) A reversible data hiding scheme based on code division multiplexing. IEEE Trans Infor Foren Sec 11:1914\u20131927","journal-title":"IEEE Trans Infor Foren Sec"},{"key":"17755_CR10","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.ins.2018.08.028","volume":"470","author":"C Wang","year":"2019","unstructured":"Wang C, Wang X, Xia Z et al (2019) Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Inf Sci 470:109\u2013120","journal-title":"Inf Sci"},{"key":"17755_CR11","doi-asserted-by":"publisher","first-page":"2117","DOI":"10.3390\/e17042117","volume":"17","author":"B Stoyanov","year":"2015","unstructured":"Stoyanov B, Kordov K (2015) Image encryption using Chebyshev map and rotation equation. Entropy 17:2117\u20132139","journal-title":"Entropy"},{"key":"17755_CR12","doi-asserted-by":"publisher","first-page":"2911","DOI":"10.1007\/s11071-021-07131-6","volume":"107","author":"L Xiong","year":"2022","unstructured":"Xiong L, Yang F, Mou J et al (2022) A memristive system and its applications in red-blue 3D glasses and image encryption algorithm with DNA variation. Nonlinear Dyn 107:2911\u20132933","journal-title":"Nonlinear Dyn"},{"key":"17755_CR13","doi-asserted-by":"publisher","first-page":"1945","DOI":"10.1140\/epjs\/s11734-021-00133-w","volume":"203","author":"C Ma","year":"2021","unstructured":"Ma C, Mou J, Li P, Liu T (2021) Dynamic analysis of a new two-dimensional map in three forms: integer-order, fractional-order and improper fractional-order. Europ Phys Jour Spec Top 203:1945\u20131957","journal-title":"Europ Phys Jour Spec Top"},{"key":"17755_CR14","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.ins.2020.06.030","volume":"539","author":"X Wang","year":"2020","unstructured":"Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf Sci 539:195\u2013214","journal-title":"Inf Sci"},{"key":"17755_CR15","doi-asserted-by":"publisher","first-page":"035209","DOI":"10.1088\/1402-4896\/ab8eec","volume":"95","author":"X Ye","year":"2020","unstructured":"Ye X, Wang X (2020) Characteristic analysis of a simple fractional-order chaotic system with infinitely many coexisting attractors and its DSP implementation. Physica Scr 95:035209","journal-title":"Physica Scr"},{"key":"17755_CR16","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1080\/17517575.2018.1557256","volume":"13","author":"U Bhatti","year":"2019","unstructured":"Bhatti U, Huang M, Wu D et al (2019) Recommendation system using feature extraction and pattern recognition in clinical care systems. Enter Infor Sys 13:329\u2013351","journal-title":"Enter Infor Sys"},{"key":"17755_CR17","doi-asserted-by":"publisher","first-page":"132569","DOI":"10.1016\/j.chemosphere.2021.132569","volume":"288","author":"U Bhatti","year":"2022","unstructured":"Bhatti U, Zeeshan Z, Nizamani M et al (2022) Assessing the change of ambient air quality patterns in Jiangsu Province of China pre-to post-COVID-19. Chemosphere 288:132569","journal-title":"Chemosphere"},{"key":"17755_CR18","doi-asserted-by":"publisher","first-page":"76386","DOI":"10.1109\/ACCESS.2020.2988298","volume":"8","author":"U Bhatti","year":"2020","unstructured":"Bhatti U, Yu Z, Li J et al (2020) Hybrid watermarking algorithm using clifford algebra with arnold scrambling and chaotic encryption. IEEE Access 8:76386\u201376398","journal-title":"IEEE Access"},{"key":"17755_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TGRS.2021.3090410","volume":"60","author":"U Bhatti","year":"2022","unstructured":"Bhatti U, Yu Z, Chanussot J et al (2022) Local similarity-based spatial-spectral fusion hyperspectral image classification with deep CNN and gabor filtering. IEEE Trans Geos Rem Sens 60:1\u201315","journal-title":"IEEE Trans Geos Rem Sens"},{"key":"17755_CR20","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1080\/21645515.2017.1379639","volume":"14","author":"U Bhatti","year":"2018","unstructured":"Bhatti U, Huang M, Wang H et al (2018) Recommendation system for immunization coverage and monitoring. Hum Vaccin Immunother 14:165\u2013171","journal-title":"Hum Vaccin Immunother"},{"key":"17755_CR21","doi-asserted-by":"publisher","first-page":"18762","DOI":"10.1109\/ACCESS.2021.3054250","volume":"9","author":"J Tamang","year":"2021","unstructured":"Tamang J, Nkapkop J, Ijaz et al (2021) Dynamical properties of ion-acoustic waves in space plasma and its application to image encryption. IEEE Access 9:18762\u201318782","journal-title":"IEEE Access"},{"key":"17755_CR22","doi-asserted-by":"publisher","first-page":"5162","DOI":"10.3390\/s20185162","volume":"20","author":"C Chowdhary","year":"2020","unstructured":"Chowdhary C, Patel P, Kathrotia K et al (2020) Analytical study of hybrid techniques for image encryption and decryption. Sensors 20:5162","journal-title":"Sensors"},{"key":"17755_CR23","doi-asserted-by":"publisher","first-page":"7493","DOI":"10.3390\/sym14030493","volume":"14","author":"C Etoundi","year":"2022","unstructured":"Etoundi C, Nkapkop J, Ngono J et al (2022) A novel compound-coupled hyperchaotic map for image encryption. Symmetry 14:7493","journal-title":"Symmetry"},{"key":"17755_CR24","doi-asserted-by":"publisher","first-page":"111889","DOI":"10.1016\/j.chaos.2022.111889","volume":"157","author":"S Xu","year":"2022","unstructured":"Xu S, Wang X, Ye X (2022) A new fractional-order chaos system of Hopfield neural network and its application in image encryption. Chaos, Solitons Fractals 157:111889","journal-title":"Chaos, Solitons Fractals"},{"key":"17755_CR25","doi-asserted-by":"publisher","first-page":"108745","DOI":"10.1016\/j.sigpro.2022.108745","volume":"202","author":"S Gao","year":"2023","unstructured":"Gao S, Wu R, Wang X et al (2023) A 3D model encryption scheme based on a cascaded chaotic system. Signal Process 202:108745","journal-title":"Signal Process"},{"key":"17755_CR26","doi-asserted-by":"publisher","first-page":"119166","DOI":"10.1016\/j.ins.2023.119166","volume":"642","author":"C Wang","year":"2023","unstructured":"Wang C, Song L et al (2023) An image encryption scheme based on chaotic system and compressed sensing for multiple application scenarios. Inform Sci 642:119166","journal-title":"Inform Sci"},{"key":"17755_CR27","doi-asserted-by":"publisher","first-page":"782","DOI":"10.1016\/j.ins.2022.11.104","volume":"621","author":"S Zhou","year":"2023","unstructured":"Zhou S, Wang X, Zhang Y et al (2023) Novel image encryption scheme based on chaotic signals with finite-precision error. Inf Sci 621:782\u2013798","journal-title":"Inf Sci"},{"key":"17755_CR28","doi-asserted-by":"publisher","first-page":"2714","DOI":"10.1103\/PhysRevLett.70.2714","volume":"70","author":"J Gallas","year":"1993","unstructured":"Gallas J (1993) Structure of the parameter space of the H\u00e9non map. Phys Rev Let 70:2714","journal-title":"Phys Rev Let"},{"key":"17755_CR29","doi-asserted-by":"publisher","first-page":"1950094","DOI":"10.1142\/S0218127419500949","volume":"29","author":"H Jiang","year":"2019","unstructured":"Jiang H, Liu Y, Wei Z, Zhang L (2019) A new class of two-dimensional chaotic maps with closed curve fixed points. Inter Jour Bifur Chaos 29:1950094","journal-title":"Inter Jour Bifur Chaos"},{"key":"17755_CR30","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun C et al (2015) 2D Sine Logistic modulation map for image encryption. Inf Sci 297:80\u201394","journal-title":"Inf Sci"},{"key":"17755_CR31","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.1007\/s11071-019-05370-2","volume":"99","author":"X Ye","year":"2020","unstructured":"Ye X, Wang X, Gao S et al (2020) A new chaotic circuit with multiple memristors and its application in image encryption. Non Dyn 99:1489\u20131506","journal-title":"Non Dyn"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17755-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17755-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17755-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T04:18:08Z","timestamp":1725423488000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17755-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,23]]},"references-count":31,"journal-issue":{"issue":"32","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["17755"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17755-y","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,2,23]]},"assertion":[{"value":"10 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 November 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}