{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T20:12:03Z","timestamp":1776283923265,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"28","license":[{"start":{"date-parts":[[2024,2,7]],"date-time":"2024-02-07T00:00:00Z","timestamp":1707264000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,7]],"date-time":"2024-02-07T00:00:00Z","timestamp":1707264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-18393-8","type":"journal-article","created":{"date-parts":[[2024,2,7]],"date-time":"2024-02-07T06:02:20Z","timestamp":1707285740000},"page":"71203-71233","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing security for document exchange using authentication and GAN encryption"],"prefix":"10.1007","volume":"83","author":[{"given":"Arkan M.","family":"Radhi","sequence":"first","affiliation":[]},{"given":"Tarek M.","family":"Hamdani","sequence":"additional","affiliation":[]},{"given":"Habib","family":"Chabchoub","sequence":"additional","affiliation":[]},{"given":"Adel M.","family":"Alimi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,7]]},"reference":[{"key":"18393_CR1","doi-asserted-by":"crossref","unstructured":"Fang P, Liu H, Wu C (2020) A novel chaotic block image encryption algorithm based on deep convolutional generative adversarial networks. IEEE Access 9(18):497\u201318,517","DOI":"10.1109\/ACCESS.2020.3040573"},{"key":"18393_CR2","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. Advances in neural information processing systems 27"},{"key":"18393_CR3","doi-asserted-by":"crossref","unstructured":"AprilPyone M, Sirichotedumrong W, Kiya H (2019) Adversarial test on learnable image encryption. In: 2019 IEEE 8th global conference on consumer electronics (GCCE). IEEE, pp 667\u2013669","DOI":"10.1109\/GCCE46687.2019.9015447"},{"issue":"3","key":"18393_CR4","doi-asserted-by":"publisher","first-page":"1504","DOI":"10.1109\/JIOT.2020.3012452","volume":"8","author":"Y Ding","year":"2020","unstructured":"Ding Y, Wu G, Chen D, Zhang N, Gong L, Cao M, Qin Z (2020) DeepEDN: a deep-learning-based image encryption and decryption network for internet of medical things. IEEE Internet Things J 8(3):1504\u20131518","journal-title":"IEEE Internet Things J"},{"key":"18393_CR5","doi-asserted-by":"crossref","unstructured":"Sirichotedumrong W, Kiya H (2020) A GAN-based image transformation scheme for privacy-preserving deep neural networks. In: 2020 28th European signal processing conference (EUSIPCO). IEEE, pp 745\u2013749","DOI":"10.23919\/Eusipco47968.2020.9287532"},{"issue":"18","key":"18393_CR6","doi-asserted-by":"publisher","first-page":"28,265","DOI":"10.1007\/s11042-021-11043-3","volume":"80","author":"Z Bao","year":"2021","unstructured":"Bao Z, Xue R, Jin Y (2021) Image scrambling adversarial autoencoder based on the asymmetric encryption. Multimed Tools Appl 80(18):28,265-28,301","journal-title":"Multimed Tools Appl"},{"key":"18393_CR7","first-page":"1","volume":"2021","author":"P Fang","year":"2021","unstructured":"Fang P, Liu H, Wu C, Liu M (2021) A secure chaotic block image encryption algorithm using generative adversarial networks and DNA sequence coding. Math Probl Eng 2021:1\u201326","journal-title":"Math Probl Eng"},{"key":"18393_CR8","doi-asserted-by":"publisher","first-page":"27,445","DOI":"10.1007\/s11042-021-10979-w","volume":"80","author":"Z Man","year":"2021","unstructured":"Man Z, Li J, Di X, Liu X, Zhou J, Wang J, Zhang X (2021) A novel image encryption algorithm based on least squares generative adversarial network random number generator. Multimed Tools Appl 80:27,445-27,469","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"18393_CR9","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.3390\/e24081103","volume":"24","author":"J Ye","year":"2022","unstructured":"Ye J, Deng X, Zhang A, Yu H (2022) A novel image encryption algorithm based on improved Arnold transform and chaotic pulse-coupled neural network. Entropy 24(8):1103","journal-title":"Entropy"},{"issue":"4","key":"18393_CR10","doi-asserted-by":"publisher","first-page":"4733","DOI":"10.1007\/s10489-022-03730-x","volume":"53","author":"K Neela","year":"2023","unstructured":"Neela K, Kavitha V (2023) Blockchain based chaotic deep GAN encryption scheme for securing medical images in a cloud environment. Appl Intell 53(4):4733\u20134747","journal-title":"Appl Intell"},{"key":"18393_CR11","doi-asserted-by":"crossref","unstructured":"Zenati A, Ouarda W, Alimi AM (2020) CDISS-BEMOS: a new color document image steganography system based on beta elliptic modeling of the online signature. In: Risks and security of internet and systems: 14th international conference, CRiSIS 2019, Hammamet, Tunisia, October 29\u201331, 2019. Proceedings. Springer 2020, pp 293\u2013307","DOI":"10.1007\/978-3-030-41568-6_19"},{"key":"18393_CR12","doi-asserted-by":"publisher","first-page":"14,739","DOI":"10.1109\/ACCESS.2022.3147201","volume":"10","author":"MA Jimale","year":"2022","unstructured":"Jimale MA, Z\u2019aba MR, Kiah MLBM, Idris MYI, Jamil N, Mohamad MS, Rohmad MS (2022) Authenticated encryption schemes: a systematic review. IEEE Access 10:14,739-14,766","journal-title":"IEEE Access"},{"key":"18393_CR13","doi-asserted-by":"publisher","first-page":"18,653","DOI":"10.1007\/s11042-020-10376-9","volume":"80","author":"A Zenati","year":"2021","unstructured":"Zenati A, Ouarda W, Alimi AM (2021) A new digital steganography system based on hiding online signature within document image data in YUV color space. Multimed Tools Appl 80:18,653-18,676","journal-title":"Multimed Tools Appl"},{"issue":"19","key":"18393_CR14","doi-asserted-by":"publisher","first-page":"27,089","DOI":"10.1007\/s11042-021-11460-4","volume":"81","author":"RR Suman","year":"2022","unstructured":"Suman RR, Mondal B, Mandal T (2022) A secure encryption scheme using a composite logistic sine map (CLSM) and SHA-256. Multimed Tools Appl 81(19):27,089-27,110","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"18393_CR15","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.3390\/math10081333","volume":"10","author":"NE El-Meligy","year":"2022","unstructured":"El-Meligy NE, Diab TO, Mohra AS, Hassan AY, El-Sobky WI (2022) A novel dynamic mathematical model applied in hash function based on DNA algorithm and chaotic maps. Mathematics 10(8):1333","journal-title":"Mathematics"},{"key":"18393_CR16","doi-asserted-by":"publisher","first-page":"61,768","DOI":"10.1109\/ACCESS.2021.3071501","volume":"9","author":"J Wang","year":"2021","unstructured":"Wang J, Liu G, Chen Y, Wang S (2021) Construction and analysis of SHA-256 compression function based on chaos S-box. IEEE Access 9:61,768-61,777","journal-title":"IEEE Access"},{"issue":"2","key":"18393_CR17","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/s12553-021-00632-9","volume":"12","author":"M Hussan","year":"2022","unstructured":"Hussan M, Parah SA, Jan A, Qureshi G (2022) Hash-based image watermarking technique for tamper detection and localization. Heal Technol 12(2):385\u2013400","journal-title":"Heal Technol"},{"key":"18393_CR18","doi-asserted-by":"crossref","unstructured":"Liu H, Kadir A, Ma C, Xu C (2020) Constructing keyed hash algorithm using enhanced chaotic map with varying parameter. Mathematical Problems in Engineering 2020","DOI":"10.1155\/2020\/4071721"},{"key":"18393_CR19","unstructured":"Ilaiyaraja R, Vanitha M (2017) Secured message transfer through QR code process for document authentication systems. International Journal of Emerging Technology in Computer Science and Electronics (IJETCSE) ISSN, pp 0976\u20131353"},{"key":"18393_CR20","doi-asserted-by":"crossref","unstructured":"Benyoucef A, Hamaouche M (2023) Region-based medical image watermarking approach for secure EPR transmission applied to e-Health. Arabian Journal for Science and Engineering, pp 1\u201313","DOI":"10.1007\/s13369-023-08263-0"},{"key":"18393_CR21","doi-asserted-by":"publisher","first-page":"23,507","DOI":"10.1007\/s11042-020-09134-8","volume":"79","author":"S Tariq","year":"2020","unstructured":"Tariq S, Khan M, Alghafis A, Amin M (2020) A novel hybrid encryption scheme based on chaotic Lorenz system and logarithmic key generation. Multimed Tools Appl 79:23,507-23,529","journal-title":"Multimed Tools Appl"},{"issue":"17","key":"18393_CR22","doi-asserted-by":"publisher","first-page":"8724","DOI":"10.3390\/app12178724","volume":"12","author":"PV Sanivarapu","year":"2022","unstructured":"Sanivarapu PV, Rajesh KN, Hosny KM, Fouda MM (2022) Digital watermarking system for copyright protection and authentication of images using cryptographic techniques. Appl Sci 12(17):8724","journal-title":"Appl Sci"},{"key":"18393_CR23","doi-asserted-by":"crossref","unstructured":"Purswani J, Rajagopal R, Khandelwal R, Singh A (2020) Chaos theory on generative adversarial networks for encryption and decryption of data. In: Advances in bioinformatics, multimedia, and electronics circuits and signals: Proceedings of GUCON 2019. Springer, pp 251\u2013260","DOI":"10.1007\/978-981-15-0339-9_20"},{"key":"18393_CR24","unstructured":"Abadi M, Andersen DG (2016) Learning to protect communications with adversarial neural cryptography. arXiv:1610.06918"},{"key":"18393_CR25","doi-asserted-by":"crossref","unstructured":"Zhu JY, Park T, Isola P, Efros AA (2017) Unpaired image-to-image translation using cycle-consistent adversarial networks. Proceedings of the IEEE international conference on computer vision, pp 2223\u20132232","DOI":"10.1109\/ICCV.2017.244"},{"key":"18393_CR26","doi-asserted-by":"publisher","first-page":"24,801","DOI":"10.1007\/s11042-021-10695-5","volume":"80","author":"TA Al-Maadeed","year":"2021","unstructured":"Al-Maadeed TA, Hussain I, Anees A, Mustafa MT (2021) A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes. Multimed Tools Appl 80:24,801-24,822","journal-title":"Multimed Tools Appl"},{"key":"18393_CR27","doi-asserted-by":"publisher","first-page":"11,541","DOI":"10.1109\/ACCESS.2023.3242311","volume":"11","author":"W Alexan","year":"2023","unstructured":"Alexan W, Elkandoz M, Mashaly M, Azab E, Aboshousha A (2023) Color image encryption through chaos and KAA Map. IEEE Access 11:11,541-11,554","journal-title":"IEEE Access"},{"key":"18393_CR28","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1007\/s10586-018-2870-z","volume":"22","author":"JS Teh","year":"2019","unstructured":"Teh JS, Tan K, Alawida M (2019) A chaos-based keyed hash function based on fixed point representation. Clust Comput 22:649\u2013660","journal-title":"Clust Comput"},{"issue":"3","key":"18393_CR29","first-page":"470","volume":"23","author":"A Zenati","year":"2020","unstructured":"Zenati A, Ouarda W, Alimi AM (2020) SSDIS-BEM: a new signature steganography document image system based on beta elliptic modeling. Eng Sci Technol Int J 23(3):470\u2013482","journal-title":"Eng Sci Technol Int J"},{"key":"18393_CR30","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.jvcir.2015.09.002","volume":"33","author":"L Feng","year":"2015","unstructured":"Feng L, Wu J, Liu S, Zhang H (2015) Global correlation descriptor: a novel image representation for image retrieval. J Vis Commun Image Represent 33:104\u2013114","journal-title":"J Vis Commun Image Represent"},{"key":"18393_CR31","doi-asserted-by":"publisher","first-page":"1721","DOI":"10.1007\/s10462-019-09717-4","volume":"53","author":"C Yinka-Banjo","year":"2020","unstructured":"Yinka-Banjo C, Ugot OA (2020) A review of generative adversarial networks and its application in cybersecurity. Artif Intell Rev 53:1721\u20131736","journal-title":"Artif Intell Rev"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18393-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-18393-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18393-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T17:16:16Z","timestamp":1722359776000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-18393-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,7]]},"references-count":31,"journal-issue":{"issue":"28","published-online":{"date-parts":[[2024,8]]}},"alternative-id":["18393"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-18393-8","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,7]]},"assertion":[{"value":"4 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 October 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}