{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T14:13:01Z","timestamp":1764079981282},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"31","license":[{"start":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T00:00:00Z","timestamp":1708560000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T00:00:00Z","timestamp":1708560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-18245-5","type":"journal-article","created":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T11:06:19Z","timestamp":1708599979000},"page":"76301-76340","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["ECC based novel color image encryption methodology using primitive polynomial"],"prefix":"10.1007","volume":"83","author":[{"given":"P. L.","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Shalini","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Anand","family":"Nayyar","sequence":"additional","affiliation":[]},{"given":"Mansi","family":"Harish","sequence":"additional","affiliation":[]},{"given":"Kritika","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Arun Kumar","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,22]]},"reference":[{"issue":"2","key":"18245_CR1","first-page":"91","volume":"29","author":"PT Akkasaligar","year":"2020","unstructured":"Akkasaligar PT, Biradar S (2020) Selective medical image encryption using DNA cryptography. Inform Secur J: Glob Perspect 29(2):91\u2013101","journal-title":"Inform Secur J: Glob Perspect"},{"doi-asserted-by":"crossref","unstructured":"Kiran, Parameshachari BD, Panduranga HT (2022) Medical image encryption using SCAN technique and chaotic tent map system. In: Recent advances in artificial intelligence and data engineering: select proceedings of AIDE 2020, Springer, Singapore, pp 181\u2013193","key":"18245_CR2","DOI":"10.1007\/978-981-16-3342-3_15"},{"key":"18245_CR3","doi-asserted-by":"crossref","first-page":"71974","DOI":"10.1109\/ACCESS.2020.2987615","volume":"8","author":"TS Ali","year":"2020","unstructured":"Ali TS, Ali R (2020) A novel medical image signcryption scheme using TLTS and Henon chaotic map. IEEE Access 8:71974\u201371992","journal-title":"IEEE Access"},{"key":"18245_CR4","first-page":"1","volume":"2021","author":"M Kaur","year":"2021","unstructured":"Kaur M, Singh S, Kaur M (2021) Computational image encryption techniques: a comprehensive review. Math Prob Eng 2021:1\u201317","journal-title":"Math Prob Eng"},{"doi-asserted-by":"crossref","unstructured":"Suneja K, Dua S, Dua M (2019, Mar) A review of chaos based image encryption. Paper presented at the 2019 3rd international conference on computing methodologies and communication (ICCMC), pp 693\u2013698","key":"18245_CR5","DOI":"10.1109\/ICCMC.2019.8819860"},{"doi-asserted-by":"crossref","unstructured":"Kumar M, Saxena A, Vuppala SS (2020) A survey on chaos based image encryption techniques. In: Multimedia security using chaotic maps: principles and methodologies, pp 1\u201326","key":"18245_CR6","DOI":"10.1007\/978-3-030-38700-6_1"},{"issue":"3","key":"18245_CR7","doi-asserted-by":"crossref","first-page":"2556","DOI":"10.1007\/s10489-021-02508-x","volume":"52","author":"CM Kumar","year":"2022","unstructured":"Kumar CM, Vidhya R, Brindha M (2022) An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function. Appl Intell 52(3):2556\u20132585","journal-title":"Appl Intell"},{"key":"18245_CR8","first-page":"1","volume":"2021","author":"Z Li","year":"2021","unstructured":"Li Z, Peng C, Tan W, Li L (2021) An effective chaos-based image encryption scheme using imitating jigsaw method. Complexity 2021:1\u201318","journal-title":"Complexity"},{"key":"18245_CR9","doi-asserted-by":"crossref","first-page":"99470","DOI":"10.1109\/ACCESS.2019.2927415","volume":"7","author":"R Ge","year":"2019","unstructured":"Ge R, Yang G, Wu J, Chen Y, Coatrieux G, Luo L (2019) A novel chaos-based symmetric image encryption using bit-pair level process. IEEE Access 7:99470\u201399480","journal-title":"IEEE Access"},{"issue":"5","key":"18245_CR10","first-page":"2000","volume":"34","author":"R Vidhya","year":"2022","unstructured":"Vidhya R, Brindha M (2022) A chaos based image encryption algorithm using Rubik\u2019s cube and prime factorization process (CIERPF). J King Saud Univ-Comput Inform Sci 34(5):2000\u20132016","journal-title":"J King Saud Univ-Comput Inform Sci"},{"key":"18245_CR11","doi-asserted-by":"crossref","first-page":"4655","DOI":"10.1007\/s11042-013-1828-7","volume":"74","author":"A Rehman","year":"2015","unstructured":"Rehman A, Liao X, Kulsoom A, Abbas SA (2015) Selective encryption for gray images based on chaos and DNA complementary rules. Multimed Tools Appl 74:4655\u20134677","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"18245_CR12","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1049\/iet-ipr.2016.0906","volume":"12","author":"SS Askar","year":"2018","unstructured":"Askar SS, Karawia AA, Alammar FS (2018) Cryptographic algorithm based on pixel shuffling and dynamical chaotic economic map. IET Image Process 12(1):158\u2013167","journal-title":"IET Image Process"},{"doi-asserted-by":"crossref","unstructured":"Askar SS, Karawia AA, Alshamrani A (2015) Image encryption algorithm based on chaotic economic model. Math Prob Eng 2015","key":"18245_CR13","DOI":"10.1155\/2015\/341729"},{"key":"18245_CR14","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"Z Hua","year":"2018","unstructured":"Hua Z, Jin F, Xu B, Huang H (2018) 2D Logistic-Sine-coupling map for image encryption. Signal Process 149:148\u2013161","journal-title":"Signal Process"},{"issue":"1","key":"18245_CR15","doi-asserted-by":"crossref","first-page":"44","DOI":"10.3390\/e21010044","volume":"21","author":"SS Askar","year":"2019","unstructured":"Askar SS, Karawia AA, Al-Khedhairi A, Al-Ammar FS (2019) An algorithm of image encryption using logistic and two-dimensional chaotic economic maps. Entropy 21(1):44","journal-title":"Entropy"},{"key":"18245_CR16","doi-asserted-by":"crossref","first-page":"14413","DOI":"10.1007\/s00500-021-06225-y","volume":"25","author":"B Bharadwaj","year":"2021","unstructured":"Bharadwaj B, Saira Banu J, Madiajagan M, Ghalib MR, Castillo O, Shankar A (2021) GPU-Accelerated implementation of a genetically optimized image encryption algorithm. Soft Comput 25:14413\u201314428","journal-title":"Soft Comput"},{"key":"18245_CR17","doi-asserted-by":"crossref","first-page":"12413","DOI":"10.1007\/s00500-020-04683-4","volume":"24","author":"L You","year":"2020","unstructured":"You L, Yang E, Wang G (2020) A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation. Soft Comput 24:12413\u201312427","journal-title":"Soft Comput"},{"issue":"2","key":"18245_CR18","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1109\/TPDS.2020.3021238","volume":"32","author":"A Al Badawi","year":"2020","unstructured":"Al Badawi A, Veeravalli B, Lin J, Xiao N, Kazuaki M, Mi AKM (2020) Multi-GPU design and performance evaluation of homomorphic encryption on GPU clusters. IEEE Trans Parallel Distrib Syst 32(2):379\u2013391","journal-title":"IEEE Trans Parallel Distrib Syst"},{"doi-asserted-by":"crossref","unstructured":"Heidarpur M, Mirhassani M (2021) An efficient and high-speed overlap-free karatsuba-based finite-field multiplier for FGPA implementation. IEEE Trans Very Large Scale Integr (VLSI) Syst 29(4):667\u2013676","key":"18245_CR19","DOI":"10.1109\/TVLSI.2021.3058509"},{"issue":"2","key":"18245_CR20","doi-asserted-by":"crossref","first-page":"444","DOI":"10.3390\/electronics12020444","volume":"12","author":"C Garc\u00eda-Grimaldo","year":"2023","unstructured":"Garc\u00eda-Grimaldo C, Bermudez-Marquez CF, Tlelo-Cuautle E, Campos-Cant\u00f3n E (2023) FPGA implementation of a chaotic map with no fixed point. Electronics 12(2):444","journal-title":"Electronics"},{"issue":"3","key":"18245_CR21","doi-asserted-by":"crossref","first-page":"1027","DOI":"10.1007\/s00371-021-02382-1","volume":"39","author":"KM Hosny","year":"2023","unstructured":"Hosny KM, Kamal ST, Darwish MM (2023) A novel color image encryption based on fractional shifted Gegenbauer moments and 2D logistic-sine map. Vis Comput 39(3):1027\u20131044","journal-title":"Vis Comput"},{"key":"18245_CR22","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1007\/s11042-021-11384-z","volume":"81","author":"KM Hosny","year":"2022","unstructured":"Hosny KM, Kamal ST, Darwish MM (2022) A color image encryption technique using block scrambling and chaos. Multimed Tools Appl 81:505\u2013525","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"18245_CR23","doi-asserted-by":"crossref","first-page":"973","DOI":"10.1007\/s12652-021-03675-y","volume":"13","author":"KM Hosny","year":"2022","unstructured":"Hosny KM, Kamal ST, Darwish MM (2022) Novel encryption for color images using fractional-order hyperchaotic system. J Ambient Intell Human Comput 13(2):973\u2013988","journal-title":"J Ambient Intell Human Comput"},{"doi-asserted-by":"crossref","unstructured":"Hosny KM, Zaki MA, Lashin NA, Fouda MM, Hamza HM (2023) Multimedia security using encryption: a survey. IEEE Access","key":"18245_CR24","DOI":"10.1109\/ACCESS.2023.3287858"},{"issue":"4","key":"18245_CR25","doi-asserted-by":"crossref","first-page":"917","DOI":"10.1007\/s10207-022-00588-5","volume":"21","author":"U Zia","year":"2022","unstructured":"Zia U, McCartney M, Scotney B, Martinez J, AbuTair M, Memon J, Sajjad A (2022) Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains. Int J Inform Secur 21(4):917\u2013935","journal-title":"Int J Inform Secur"},{"issue":"4","key":"18245_CR26","doi-asserted-by":"crossref","first-page":"1372","DOI":"10.35378\/gujs.884880","volume":"35","author":"PN Srinivasu","year":"2021","unstructured":"Srinivasu PN, Norwawi N, Amiripalli SS, Deepalakshmi P (2021) Secured compression for 2D medical images through the manifold and fuzzy trapezoidal correlation function. Gazi Univ J Sci 35(4):1372\u20131391","journal-title":"Gazi Univ J Sci"},{"doi-asserted-by":"crossref","unstructured":"Lalitha RVSS, Srinivasu PN (2017) An efficient data encryption through image via prime order symmetric key and bit shuffle technique. In: Computer communication, networking and internet security: proceedings of IC3T 2016, Springer, Singapore, pp 261\u2013270","key":"18245_CR27","DOI":"10.1007\/978-981-10-3226-4_26"},{"issue":"2","key":"18245_CR28","first-page":"1293","volume":"11","author":"ZK Obaid","year":"2021","unstructured":"Obaid ZK, Al Saffar NFH (2021) Image encryption based on elliptic curve cryptosystem. Int J Electr Comput Eng 11(2):1293","journal-title":"Int J Electr Comput Eng"},{"key":"18245_CR29","doi-asserted-by":"crossref","first-page":"126793","DOI":"10.1016\/j.physa.2021.126793","volume":"591","author":"LH Gong","year":"2022","unstructured":"Gong LH, Luo HX, Wu RQ, Zhou NR (2022) New 4D chaotic system with hidden attractors and self-excited attractors and its application in image encryption based on RNG. Phys A: Statist Mechan Appl 591:126793","journal-title":"Phys A: Statist Mechan Appl"},{"issue":"10","key":"18245_CR30","doi-asserted-by":"crossref","first-page":"2050142","DOI":"10.1142\/S0218127420501424","volume":"30","author":"L Gong","year":"2020","unstructured":"Gong L, Wu R, Zhou N (2020) A new 4D chaotic system with coexisting hidden chaotic attractors. Int J Bifurc Chaos 30(10):2050142","journal-title":"Int J Bifurc Chaos"},{"key":"18245_CR31","doi-asserted-by":"crossref","first-page":"107879","DOI":"10.1016\/j.optlastec.2022.107879","volume":"149","author":"ZW Huang","year":"2022","unstructured":"Huang ZW, Zhou NR (2022) Image encryption scheme based on discrete cosine Stockwell transform and DNA-level modulus diffusion. Opt Laser Technol 149:107879","journal-title":"Opt Laser Technol"},{"key":"18245_CR32","doi-asserted-by":"crossref","first-page":"22082","DOI":"10.1109\/ACCESS.2020.2970103","volume":"8","author":"Y Niu","year":"2020","unstructured":"Niu Y, Zhang X (2020) A novel plaintext-related image encryption scheme based on chaotic system and pixel permutation. IEEE Access 8:22082\u201322093","journal-title":"IEEE Access"},{"key":"18245_CR33","doi-asserted-by":"crossref","first-page":"18479","DOI":"10.1007\/s11042-021-10631-7","volume":"80","author":"CL Li","year":"2021","unstructured":"Li CL, Zhou Y, Li HM, Feng W, Du JR (2021) Image encryption scheme with bit-level scrambling and multiplication diffusion. Multimed Tools Appl 80:18479\u201318501","journal-title":"Multimed Tools Appl"},{"key":"18245_CR34","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Bao L, Chen CP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172\u2013182","journal-title":"Signal Process"},{"key":"18245_CR35","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.optlaseng.2018.11.010","volume":"115","author":"XY Wang","year":"2019","unstructured":"Wang XY, Li ZM (2019) A color image encryption algorithm based on Hopfield chaotic neural network. Opt Lasers Eng 115:107\u2013118","journal-title":"Opt Lasers Eng"},{"issue":"13","key":"18245_CR36","doi-asserted-by":"crossref","first-page":"3234","DOI":"10.1016\/j.optcom.2011.02.065","volume":"284","author":"N Zhou","year":"2011","unstructured":"Zhou N, Wang Y, Gong L (2011) Novel optical image encryption scheme based on fractional Mellin transform. Opt Commun 284(13):3234\u20133242","journal-title":"Opt Commun"},{"issue":"2","key":"18245_CR37","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1016\/j.sigpro.2011.08.010","volume":"92","author":"JB Lima","year":"2012","unstructured":"Lima JB, De Souza RC (2012) The fractional Fourier transform over finite fields. Signal Process 92(2):465\u2013476","journal-title":"Signal Process"},{"issue":"8","key":"18245_CR38","doi-asserted-by":"crossref","first-page":"3217","DOI":"10.1016\/j.laa.2012.12.021","volume":"438","author":"JB Lima","year":"2013","unstructured":"Lima JB, De Souza RC (2013) Fractional cosine and sine transforms over finite fields. Linear Algebra Appl 438(8):3217\u20133230","journal-title":"Linear Algebra Appl"},{"key":"18245_CR39","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1016\/j.sigpro.2013.07.020","volume":"94","author":"JB Lima","year":"2014","unstructured":"Lima JB, Novaes LFG (2014) Image encryption based on the fractional Fourier transform over finite fields. Signal Process 94:521\u2013530","journal-title":"Signal Process"},{"issue":"10","key":"18245_CR40","first-page":"1537","volume":"28","author":"JB Lima","year":"2013","unstructured":"Lima JB, Lima EAO, Madeiro F (2013) Image encryption based on the finite field cosine transform. Signal Process: Image Commun 28(10):1537\u20131547","journal-title":"Signal Process: Image Commun"},{"key":"18245_CR41","first-page":"130","volume":"54","author":"JB Lima","year":"2017","unstructured":"Lima JB, da Silva ES, de Souza RC (2017) Cosine transforms over fields of characteristic 2: fast computation and application to image encryption. Signal Process: Image Commun 54:130\u2013139","journal-title":"Signal Process: Image Commun"},{"key":"18245_CR42","doi-asserted-by":"crossref","first-page":"21803","DOI":"10.1007\/s11042-017-5590-0","volume":"77","author":"B Yang","year":"2018","unstructured":"Yang B, Liao X (2018) A new color image encryption scheme based on logistic map over the finite field $$Z_{N}$$. Multimed Tools Appl 77:21803\u201321821","journal-title":"Multimed Tools Appl"},{"key":"18245_CR43","first-page":"417","volume-title":"Use of elliptic curves in cryptography","author":"VS Miller","year":"1986","unstructured":"Miller VS (1986) Use of elliptic curves in cryptography. Springer, Berlin Heidelberg, pp 417\u2013426"},{"issue":"177","key":"18245_CR44","first-page":"203","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203\u2013209","journal-title":"Elliptic curve cryptosystems. Math Comput"},{"key":"18245_CR45","doi-asserted-by":"crossref","first-page":"70025","DOI":"10.1109\/ACCESS.2018.2879844","volume":"6","author":"X Zhang","year":"2018","unstructured":"Zhang X, Wang X (2018) Digital image encryption algorithm based on elliptic curve public cryptosystem. IEEE Access 6:70025\u201370034","journal-title":"IEEE Access"},{"key":"18245_CR46","doi-asserted-by":"crossref","first-page":"76191","DOI":"10.1109\/ACCESS.2021.3072075","volume":"9","author":"P Parida","year":"2021","unstructured":"Parida P, Pradhan C, Gao XZ, Roy DS, Barik RK (2021) Image encryption and authentication with elliptic curve cryptography and multidimensional chaotic maps. IEEE Access 9:76191\u201376204","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Habek M, Gene Y, Aytas N, Akkoc A, Afacan E, Yazgan E (2022, Jun) Digital image encryption using elliptic curve cryptography: a review. Paper presented at the 2022 international congress on human-computer interaction, optimization and robotic applications (HORA), pp 1\u20138","key":"18245_CR47","DOI":"10.1109\/HORA55278.2022.9800074"},{"key":"18245_CR48","doi-asserted-by":"crossref","first-page":"194289","DOI":"10.1109\/ACCESS.2020.3032403","volume":"8","author":"S Ibrahim","year":"2020","unstructured":"Ibrahim S, Alharbi A (2020) Efficient image encryption scheme using Henon map, dynamic S-boxes and elliptic curve cryptography. IEEE Access 8:194289\u2013194302","journal-title":"IEEE Access"},{"key":"18245_CR49","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/j.sigpro.2016.01.017","volume":"125","author":"M Kumar","year":"2016","unstructured":"Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography. Signal Process 125:187\u2013202","journal-title":"Signal Process"},{"key":"18245_CR50","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.optlastec.2013.07.009","volume":"56","author":"H Liu","year":"2014","unstructured":"Liu H, Liu Y (2014) Cryptanalyzing an image encryption scheme based on hybrid chaotic system and cyclic elliptic curve. Opt Laser Technol 56:15\u201319","journal-title":"Opt Laser Technol"},{"key":"18245_CR51","doi-asserted-by":"crossref","first-page":"103639","DOI":"10.1016\/j.dsp.2022.103639","volume":"129","author":"A Banik","year":"2022","unstructured":"Banik A, Laiphrakpam DS, Agrawal A, Patgiri R (2022) Secret image encryption based on chaotic system and elliptic curve cryptography. Digital Signal Process 129:103639","journal-title":"Digital Signal Process"},{"doi-asserted-by":"crossref","unstructured":"Wu J, Liu H, Zhu X (2020) Image encryption based on permutation polynomials over finite fields. Optica Applicata:50(3)","key":"18245_CR52","DOI":"10.37190\/oa200303"},{"key":"18245_CR53","doi-asserted-by":"crossref","first-page":"24801","DOI":"10.1007\/s11042-021-10695-5","volume":"80","author":"T Al-Maadeed","year":"2021","unstructured":"Al-Maadeed T, Hussain I, Anees A, Mustafa MT (2021) A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes. Multimed Tools Appl 80:24801\u201324822","journal-title":"Multimed Tools Appl"},{"key":"18245_CR54","doi-asserted-by":"crossref","first-page":"164725","DOI":"10.1016\/j.ijleo.2020.164725","volume":"224","author":"X Zhu","year":"2020","unstructured":"Zhu X, Liu H, Liang Y, Wu J (2020) Image encryption based on Kronecker product over finite fields and DNA operation. Optik 224:164725","journal-title":"Optik"},{"issue":"11","key":"18245_CR55","first-page":"8","volume":"3","author":"F Amounas","year":"2014","unstructured":"Amounas F, El Kinani EH (2014) Security enhancement of image encryption based on matrix approach using elliptic curve. Int J Eng Invent 3(11):8\u201316","journal-title":"Int J Eng Invent"},{"key":"18245_CR56","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1016\/j.procs.2015.04.182","volume":"48","author":"S Nagaraj","year":"2015","unstructured":"Nagaraj S, Raju GSVP, Rao KK (2015) Image encryption using elliptic curve cryptograhy and matrix. Procedia Comput Sci 48:276\u2013281","journal-title":"Procedia Comput Sci"},{"key":"18245_CR57","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/978-981-10-1651-6_7","volume-title":"Algebra and its applications: ICAA, Aligarh, India, December 2014","author":"RA Rao","year":"2016","unstructured":"Rao RA, Jose S (2016) A study of Suslin matrices: their properties and uses. Algebra and its applications: ICAA, Aligarh, India, December 2014. Springer, Singapore, pp 89\u2013121"},{"issue":"2","key":"18245_CR58","doi-asserted-by":"crossref","first-page":"186","DOI":"10.3390\/e24020186","volume":"24","author":"J Xu","year":"2022","unstructured":"Xu J, Zhao B, Wu Z (2022) Research on color image encryption algorithm based on bit-plane and Chen Chaotic System. Entropy 24(2):186","journal-title":"Entropy"},{"key":"18245_CR59","doi-asserted-by":"crossref","first-page":"1413","DOI":"10.1007\/s42835-020-00393-x","volume":"15","author":"B Arpac\u0131","year":"2020","unstructured":"Arpac\u0131 B, Kurt E, \u00c7elik K, Ciylan B (2020) Colored image encryption and decryption with a new algorithm and a hyperchaotic electrical circuit. J Electr Eng Technol 15:1413\u20131429","journal-title":"J Electr Eng Technol"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18245-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-18245-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18245-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T08:43:22Z","timestamp":1725353002000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-18245-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,22]]},"references-count":59,"journal-issue":{"issue":"31","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["18245"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-18245-5","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,2,22]]},"assertion":[{"value":"29 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest to report regarding the present study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"No Human subject or animals are involved in the research.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All authors have mutually consented to participate.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All the authors have consented the Journal to publish this paper.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}]}}