{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T18:39:18Z","timestamp":1778611158641,"version":"3.51.4"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"35","license":[{"start":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T00:00:00Z","timestamp":1710374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T00:00:00Z","timestamp":1710374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Selcuk University"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This study introduces a cutting-edge image encryption algorithm aimed at elevating security standards. The Pan-Tompkins Algorithm (PTA) for key generation is proposed for the first time in this study. Additionally, employing steganography through the Least Significant Bit (LSB) method for embedding keys within the encrypted image enhances secure key distribution, thereby fortifying the encryption process. On the other hand, the integration of advanced algorithms, such as Zigzag scanning, the Affine Image Encryption Algorithm (AA), and the Vigenere Image Encryption Algorithm (VA), constitutes the fundamental innovation of the proposed image encryption algorithm. The proposed algorithm is named PanAAVA:Affine Algorithm and Vigenere Algorithm Encryption with PTA-Based Key Generation. The PanAAVA algorithm ensures unparalleled security by encrypting the positions and values of pixels using AA and VA. Notably, using PTA for key generation marks a distinctive and new key generation method feature of the algorithm. To assess the effectiveness of the PanAAVA, a comprehensive comparative analysis is conducted against well-established encryption methodologies, including Lena, Baboon, Airplane, and Pepper.<\/jats:p><jats:p>The PanAAVA demonstrates exceptional proficiency in histogram analysis. The PanAAVA demonstrates a Unified Average Changing Intensity (UACI) of 33.4044%. Additionally, the Number of Pixels Change Rate (NPCR) is measured at 99.7442%, showcasing the algorithm\u2019s effectiveness in inducing significant pixel changes. The proposed algorithm\u2019s Mean Square Error (MSE) is calculated at 3.20679E5%. The proposed algorithm\u2019s Peak Signal to Noise Ratio (PSNR) is recorded at 9.512475. The Key Space Size of the proposed algorithm is measured at 2<jats:sup>209<\/jats:sup>. Regarding correlation analysis, the PanAAVA achieves a high correlation score of 7.9996. The proposed algorithm successfully passes the National Institute of Standards and Technology (NIST) analysis, demonstrating a remarkably strong correlation close to 0 and a Structural Similarity Index Measure (SSIM) of 0.9977. Furthermore, regarding quantum communication, the proposed algorithm maintains stable key rates of 47.5\u2009\u00b1\u20090.8\u00a0kHz during the day and 50.9\u2009\u00b1\u20090.7\u00a0kHz at night. Additionally, PanAAVA achieves low Quantum Bit Error Rate (QBER) values of 4.77\u2009\u00b1\u20090.02, ensuring reliable and secure communication. The PanAAVA also demonstrates robust asymmetries at 49.81\u2009\u00b1\u20090.02 and 50.14\u2009\u00b1\u20090.03 for a crystal length of 20\u00a0mm. highlighting PanAAVA\u2019s adaptability and effectiveness in different scenarios. PanAAVA outperforms other encryption algorithms concerning performance measurements and comparisons. In conclusion, the PanAAVA emerges as a beacon of superior security capabilities and innovation in image encryption, showcasing the potential to redefine standards in the field.<\/jats:p>","DOI":"10.1007\/s11042-024-18722-x","type":"journal-article","created":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T08:45:39Z","timestamp":1710405939000},"page":"82589-82619","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["An innovative image encryption algorithm enhanced with the Pan-Tompkins Algorithm for optimal security"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2829-9660","authenticated-orcid":false,"given":"Ay\u015feg\u00fcl","family":"\u0130hsan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8267-8469","authenticated-orcid":false,"given":"Nurettin","family":"Do\u011fan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,3,14]]},"reference":[{"key":"18722_CR1","doi-asserted-by":"publisher","unstructured":"Li SY, Lee CH, Tam LM (2023) A smart image encryption technology via applying personal information and speaker-verification system. Sensors (Basel) 23(13). https:\/\/doi.org\/10.3390\/s23135906","DOI":"10.3390\/s23135906"},{"issue":"2","key":"18722_CR2","first-page":"87","volume":"18","author":"M Mi\u0307lani\u0307","year":"2022","unstructured":"Mi\u0307lani\u0307 M, Ceyhan S (2022) An efficient method for digital image encryption based on improved chaotic map. Electron Lett Sci Eng 18(2):87\u201396","journal-title":"Electron Lett Sci Eng"},{"key":"18722_CR3","unstructured":"Yadav SS, Singh Y, Sriwas SK (2017) Gray code ( N , K , P ) based pixel substitution and affine transform based gray code bit plane permutation technique for secure image encryption. https:\/\/api.semanticscholar.org\/CorpusID:25019453"},{"issue":"2","key":"18722_CR4","doi-asserted-by":"publisher","first-page":"330","DOI":"10.3390\/app9020330","volume":"9","author":"H Chen","year":"2019","unstructured":"Chen H et al (2019) Optical hyperspectral image cryptosystem based on affine transform and fractional fourier transform. Appl Sci 9(2):330","journal-title":"Appl Sci"},{"key":"18722_CR5","doi-asserted-by":"publisher","first-page":"27829","DOI":"10.1007\/s11042-021-11003-x","volume":"80","author":"S Sabir","year":"2021","unstructured":"Sabir S, Guleria V (2021) Multi-layer color image encryption using random matrix affine cipher, RP2DFrHT and 2D Arnold map. Multimed Tools Appl 80:27829\u201327853. https:\/\/doi.org\/10.1007\/s11042-021-11003-x","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"18722_CR6","doi-asserted-by":"publisher","first-page":"7621","DOI":"10.1007\/s11042-022-13727-w","volume":"82","author":"A Ihsan","year":"2023","unstructured":"Ihsan A, Do\u011fan N (2023) Improved affine encryption algorithm for color images using LFSR and XOR encryption. Multimed Tools Appl 82(5):7621\u20137637","journal-title":"Multimed Tools Appl"},{"key":"18722_CR7","doi-asserted-by":"publisher","first-page":"5919","DOI":"10.1007\/s11071-022-07995-2","volume":"111","author":"MA Lone","year":"2023","unstructured":"Lone MA, Qureshi S (2023) Encryption scheme for RGB images using chaos and affine hill cipher technique. Nonlinear Dyn 111:5919\u20135939. https:\/\/doi.org\/10.1007\/s11071-022-07995-2","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"18722_CR8","first-page":"65","volume":"7","author":"B Firmanto","year":"2021","unstructured":"Firmanto B, Devita Putri Kusuma N, Arief Bramanto Wicaksono P (2021) Perbandingan Hasil Performa Optimasi Transposisi Hill Cipher dan Vigenere Cipher pada Citra Digital. SMARTICS J 7(2):65\u201371","journal-title":"SMARTICS J"},{"key":"18722_CR9","doi-asserted-by":"publisher","first-page":"954","DOI":"10.11591\/ijeecs.v28.i2.pp954-961","volume":"28","author":"T Hameed","year":"2022","unstructured":"Hameed T, Sadeeq H (2022) Modified Vigen\u00e8re cipher algorithm based on new key generation method. Indones J Electr Eng Comput Sci 28:954\u2013961","journal-title":"Indonesian Journal of Electrical Engineering and Computer Science"},{"key":"18722_CR10","first-page":"2951","volume":"34","author":"Z Younus","year":"2022","unstructured":"Younus Z, Hussain M (2022) Image steganography using exploiting modification direction for compressed encrypted data. J King Saud Univ - Comput Info Sci 34:2951\u20132963","journal-title":"J King Saud Univ - Comput Info Sci"},{"issue":"1","key":"18722_CR11","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1080\/13682199.2023.2175436","volume":"71","author":"UH Mir","year":"2023","unstructured":"Mir UH, Lone PN, Singh D, Mishra DC (2023) A public and private key image encryption by modified approach of Vigener cipher and the chaotic maps. Imaging Sci J 71(1):82\u201396. https:\/\/doi.org\/10.1080\/13682199.2023.2175436","journal-title":"Imaging Sci J"},{"key":"18722_CR12","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1007\/s11045-019-00689-w","volume":"31","author":"D Shah","year":"2020","unstructured":"Shah D, Shah T, Jamal SS (2020) A novel efficient image encryption algorithm based on affine transformation combine with linear fractional transformation. Multidimension Syst Signal Process 31:885\u2013905","journal-title":"Multidimension Syst Signal Process"},{"key":"18722_CR13","doi-asserted-by":"publisher","unstructured":"Voleti L, Balajee RM, Vallepu SK, Bayoju K, Srinivas D (2021) A secure image steganography using improved Lsb technique and vigenere cipher algorithm. 2021 International conference on artificial intelligence and smart systems (ICAIS). Coimbatore, India, pp 1005\u20131010. https:\/\/doi.org\/10.1109\/ICAIS50930.2021.9395794","DOI":"10.1109\/ICAIS50930.2021.9395794"},{"key":"18722_CR14","doi-asserted-by":"publisher","unstructured":"Harjo B, Ignatius Moses Setiadi DR (2021) Improved color image encryption using hybrid modulus substitution cipher and chaotic method. Int J Intell Eng Syst 14:157\u2013166. https:\/\/doi.org\/10.22266\/ijies2021.0430.14","DOI":"10.22266\/ijies2021.0430.14"},{"issue":"17","key":"18722_CR15","doi-asserted-by":"publisher","first-page":"24665","DOI":"10.1007\/s11042-022-12750-1","volume":"81","author":"M Jarjar","year":"2022","unstructured":"Jarjar M et al (2022) New technology of color image encryption based on chaos and two improved Vigen\u00e8re steps. Multimed Tools Appl 81(17):24665\u201324689","journal-title":"Multimed Tools Appl"},{"key":"18722_CR16","unstructured":"Bagane P et al (2024) Securing data in images using cryptography and steganography algorithms. Int J Intell Syst App Eng 12(15s):17\u201325"},{"issue":"3","key":"18722_CR17","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ad224b","volume":"99","author":"S Yan","year":"2024","unstructured":"Yan S, Wang J, Li L (2024) A color image encryption scheme based on cellular neural networks and linear feedback shift registers. Phys Scr 99(3):035212","journal-title":"Phys Scr"},{"key":"18722_CR18","doi-asserted-by":"publisher","unstructured":"Islam Y, Li C, Sun K et al (2024) Enhancing image security through an advanced chaotic system with free control and zigzag scrambling encryption. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-024-18107-0","DOI":"10.1007\/s11042-024-18107-0"},{"issue":"1","key":"18722_CR19","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1515\/nleng-2016-0010","volume":"6","author":"A Moumen","year":"2017","unstructured":"Moumen A, Sissaoui H (2017) Images encryption method using steganographic LSB method, AES and RSA algorithm. Nonlinear Eng 6(1):53\u201359. https:\/\/doi.org\/10.1515\/nleng-2016-0010","journal-title":"AES and RSA algorithm. Nonlinear Eng"},{"key":"18722_CR20","first-page":"259","volume":"8","author":"S Singh","year":"2015","unstructured":"Singh S, Attri V (2015) Dual Layer Security of data using LSB Image Steganography Method and AES Encryption Algorithm. Int J Signal Process Image Process Pattern Recognition 8:259\u2013266","journal-title":"Int J Signal Process Image Process Pattern Recognition"},{"issue":"1","key":"18722_CR21","doi-asserted-by":"publisher","first-page":"41","DOI":"10.21609\/jiki.v12i1.646","volume":"12","author":"S Christy Atika","year":"2019","unstructured":"Christy Atika S, EkoHari R, Edi Jaya K (2019) Good performance images encryption using selective bit t-des on inverted lsb steganography. Jurnal Ilmu Komputer dan Informasi 12(1):41\u201349","journal-title":"Jurnal Ilmu Komputer dan Informasi"},{"issue":"2","key":"18722_CR22","doi-asserted-by":"publisher","first-page":"3397","DOI":"10.1007\/s11042-023-15707-0","volume":"83","author":"A Durdu","year":"2024","unstructured":"Durdu A (2024) Image transfer with secure communications application using a new reversible chaotic image encryption. Multimed Tools Appl 83(2):3397\u20133424","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"18722_CR23","doi-asserted-by":"publisher","first-page":"4133","DOI":"10.1007\/s11042-023-14921-0","volume":"83","author":"H Wen","year":"2024","unstructured":"Wen H et al (2024) Security analysis of a color image encryption based on bit-level and chaotic map. Multimed Tools Appl 83(2):4133\u20134149","journal-title":"Multimed Tools Appl"},{"key":"18722_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121514","volume":"237","author":"H Wen","year":"2024","unstructured":"Wen H, Lin Y (2024) Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Syst Appl 237:121514","journal-title":"Expert Syst Appl"},{"issue":"2","key":"18722_CR25","doi-asserted-by":"publisher","first-page":"3681","DOI":"10.1007\/s11042-023-15810-2","volume":"83","author":"R Chen","year":"2024","unstructured":"Chen R et al (2024) An image encryption algorithm based on the LSCMM chaotic map and bidirectional dynamic diffusion. Multimed Tools Appl 83(2):3681\u20133706","journal-title":"Multimed Tools Appl"},{"key":"18722_CR26","volume":"462","author":"A Toktas","year":"2024","unstructured":"Toktas A et al (2024) A robust bit-level image encryption based on Bessel map. Appl Math Comput 462:128340","journal-title":"Appl Math Comput"},{"key":"18722_CR27","doi-asserted-by":"publisher","unstructured":"Nag A et al (2011) Image encryption using affine transform and XOR operation. 2011 International conference on signal processing, communication, computing and networking technologies. Thuckalay, India, pp 309\u2013312. https:\/\/doi.org\/10.1109\/ICSCCN.2011.6024565","DOI":"10.1109\/ICSCCN.2011.6024565"},{"key":"18722_CR28","first-page":"741","volume":"3","author":"S Wulandari","year":"2020","unstructured":"Wulandari S (2020) Cryptography: A Combination of Caesar and Affine Cipher to Conceal the Message. Proc Int Conf Sci Eng 3:741\u2013744","journal-title":"Proc Int Conf Sci Eng"},{"key":"18722_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13319-017-0148-5","volume":"8","author":"M Kumari","year":"2017","unstructured":"Kumari M, Gupta S, Sardana P (2017) A survey of image encryption algorithms. 3D Res 8:1\u201335","journal-title":"3D Res"},{"issue":"2","key":"18722_CR30","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MC.1998.4655281","volume":"31","author":"NF Johnson","year":"1998","unstructured":"Johnson NF, Jajodia S (1998) Exploring steganography: Seeing the unseen. Computer 31(2):26\u201334","journal-title":"Computer"},{"key":"18722_CR31","doi-asserted-by":"publisher","first-page":"7063","DOI":"10.1007\/s11042-014-1952-z","volume":"74","author":"MM Sadek","year":"2015","unstructured":"Sadek MM, Khalifa AS, Mostafa MGM (2015) Video steganography: a comprehensive review. Multimed Tools Appl 74:7063\u20137094. https:\/\/doi.org\/10.1007\/s11042-014-1952-z","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"18722_CR32","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1109\/TBME.1985.325532","volume":"BME-32","author":"J Pan","year":"1985","unstructured":"Pan J, Tompkins WJ (1985) A real-time QRS detection algorithm. IEEE Trans Biomed Eng BME-32(3):230\u2013236","journal-title":"IEEE Trans Biomed Eng"},{"key":"18722_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-022-13012-w","volume":"81","author":"X Wang","year":"2022","unstructured":"Wang X, Du X (2022) Chaotic image encryption method based on improved zigzag permutation and DNA rules. Multimed Tools Appl 81:1\u201327","journal-title":"Multimed Tools Appl"},{"key":"18722_CR34","doi-asserted-by":"publisher","first-page":"25","DOI":"10.55524\/ijircst.2023.11.1.6","volume":"11","author":"E Showkat","year":"2023","unstructured":"Showkat E, Sodhi D (2023) Image enhancement in wavelet domain using histogram equalization and median filters. Int J Innov Res Comput Sci Technol 11:25\u201331","journal-title":"Int J Innov Res Comput Sci Technol"},{"issue":"5","key":"18722_CR35","doi-asserted-by":"publisher","first-page":"8091","DOI":"10.1007\/s11042-020-10139-6","volume":"80","author":"S Katoch","year":"2021","unstructured":"Katoch S, Chauhan SS, Kumar V (2021) A review on genetic algorithm: past, present, and future. Multimed Tools Appl 80(5):8091\u20138126","journal-title":"Multimed Tools Appl"},{"key":"18722_CR36","first-page":"806","volume":"66","author":"H Abdullah","year":"2012","unstructured":"Abdullah H, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU-Int J Electron C 66:806\u2013816","journal-title":"AEU-Int J Electron C"},{"key":"18722_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-019-07818-4","volume":"78","author":"M Khan","year":"2019","unstructured":"Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed Tools Appl 78:1\u201320","journal-title":"Multimed Tools Appl"},{"key":"18722_CR38","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.sigpro.2018.06.008","volume":"153","author":"J Wu","year":"2018","unstructured":"Wu J, Liao X, Yang B (2018) Image encryption using 2D H\u00e9non-Sine map and DNA approach. Signal Process 153:11\u201323. https:\/\/doi.org\/10.1016\/j.sigpro.2018.06.008","journal-title":"Signal Process"},{"issue":"5","key":"18722_CR39","doi-asserted-by":"publisher","first-page":"2751","DOI":"10.1007\/s40747-021-00460-4","volume":"7","author":"M Khan","year":"2021","unstructured":"Khan M et al (2021) An efficient image encryption scheme based on fractal Tromino and Chebyshev polynomial. Complex Intell Syst 7(5):2751\u20132764","journal-title":"Complex Intell Syst"},{"issue":"3","key":"18722_CR40","doi-asserted-by":"publisher","first-page":"443","DOI":"10.3390\/sym14030443","volume":"14","author":"W Alexan","year":"2022","unstructured":"Alexan W, ElBeltagy M, Aboshousha A (2022) Rgb image encryption through cellular automata, s-box and the lorenz system. Symmetry 14(3):443","journal-title":"Symmetry"},{"key":"18722_CR41","doi-asserted-by":"publisher","first-page":"78367","DOI":"10.1109\/ACCESS.2019.2922376","volume":"7","author":"Z Liu","year":"2019","unstructured":"Liu Z et al (2019) A color image encryption using dynamic DNA and 4-D memristive hyper-chaos. IEEE Access 7:78367\u201378378","journal-title":"IEEE Access"},{"issue":"13","key":"18722_CR42","doi-asserted-by":"publisher","first-page":"17719","DOI":"10.1007\/s11042-018-7129-4","volume":"78","author":"S Kang","year":"2019","unstructured":"Kang S et al (2019) Color image encryption method based on 2D-variational mode decomposition. Multimed Tools Appl 78(13):17719\u201317738","journal-title":"Multimed Tools Appl"},{"key":"18722_CR43","doi-asserted-by":"publisher","first-page":"73924","DOI":"10.1109\/ACCESS.2021.3081362","volume":"9","author":"M Tanveer","year":"2021","unstructured":"Tanveer M et al (2021) Multi-images encryption scheme based on 3D chaotic map and substitution box. IEEE Access 9:73924\u201373937. https:\/\/doi.org\/10.1109\/ACCESS.2021.3081362","journal-title":"IEEE Access"},{"issue":"6","key":"18722_CR44","doi-asserted-by":"publisher","first-page":"1961","DOI":"10.1007\/s10773-017-3341-7","volume":"56","author":"P Li","year":"2017","unstructured":"Li P, Zhao Y (2017) A simple encryption algorithm for quantum color image. Int J Theor Phys 56(6):1961\u20131982","journal-title":"Int J Theor Phys"},{"issue":"2","key":"18722_CR45","first-page":"525","volume":"52","author":"S EtemadiBorujeni","year":"2013","unstructured":"EtemadiBorujeni S, Eshghi M (2013) Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommun Syst 52(2):525\u2013537","journal-title":"Telecommun Syst"},{"issue":"24","key":"18722_CR46","doi-asserted-by":"publisher","first-page":"35001","DOI":"10.1007\/s11042-021-10594-9","volume":"81","author":"H Mittal","year":"2022","unstructured":"Mittal H et al (2022) A comprehensive survey of image segmentation: clustering methods, performance parameters, and benchmark datasets. Multimed Tools Appl 81(24):35001\u201335026","journal-title":"Multimed Tools Appl"},{"key":"18722_CR47","doi-asserted-by":"publisher","unstructured":"Khalaf A (2016) Fast image encryption based on random image key. https:\/\/doi.org\/10.13140\/RG.2.1.3107.4327","DOI":"10.13140\/RG.2.1.3107.4327"},{"key":"18722_CR48","doi-asserted-by":"publisher","first-page":"11541","DOI":"10.1109\/ACCESS.2023.3242311","volume":"11","author":"W Alexan","year":"2023","unstructured":"Alexan W, Elkandoz M, Mashaly M, Azab E, Aboshousha A (2023) Color image encryption through chaos and KAA map. IEEE Access 11:11541\u201311554. https:\/\/doi.org\/10.1109\/ACCESS.2023.3242311","journal-title":"IEEE Access"},{"key":"18722_CR49","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1016\/j.procs.2020.01.007","volume":"165","author":"V Sangavi","year":"2019","unstructured":"Sangavi V, Thangavel P (2019) An Image Encryption Algorithm Based On Fractal Geometry. Procedia Comput Sci 165:462\u2013469","journal-title":"Procedia Comput Sci"},{"issue":"27","key":"18722_CR50","doi-asserted-by":"publisher","first-page":"41943","DOI":"10.1007\/s11042-023-14844-w","volume":"82","author":"J Kunhoth","year":"2023","unstructured":"Kunhoth J et al (2023) Video steganography: recent advances and challenges. Multimed Tools Appl 82(27):41943\u201341985","journal-title":"Multimed Tools Appl"},{"key":"18722_CR51","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. I J Bifurcat Chaos 16:2129\u20132151","journal-title":"I J Bifurcat Chaos"},{"issue":"12","key":"18722_CR52","doi-asserted-by":"publisher","first-page":"17801","DOI":"10.1007\/s11042-022-14074-6","volume":"82","author":"P Muthukumar","year":"2023","unstructured":"Muthukumar P, Khan N (2023) The large key space image encryption algorithm based on modulus synchronization between real and complex fractional-order dynamical systems. Multimed Tools Appl 82(12):17801\u201317825","journal-title":"Multimed Tools Appl"},{"key":"18722_CR53","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.optlaseng.2017.06.015","volume":"107","author":"X Wang","year":"2018","unstructured":"Wang X, Zhu X, Wu X, Zhang Y (2018) Image encryption algorithm based on multiple mixed hash functions and cyclic shift. Opt Lasers Eng 107:370\u2013379. https:\/\/doi.org\/10.1016\/j.optlaseng.2017.06.015","journal-title":"Opt Lasers Eng"},{"key":"18722_CR54","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/940276","volume":"2012","author":"D-I Curiac","year":"2012","unstructured":"Curiac D-I, Volosencu C (2012) Chaotic trajectory design for monitoring an arbitrary number of specified locations using points of interest. Math Probl Eng 2012:940276","journal-title":"Math Probl Eng"},{"key":"18722_CR55","doi-asserted-by":"publisher","first-page":"5499538","DOI":"10.1155\/2021\/5499538","volume":"2021","author":"S Kanwal","year":"2021","unstructured":"Kanwal S et al (2021) Analytic study of a novel color image encryption method based on the chaos system and color codes. Complexity 2021:5499538","journal-title":"Complexity"},{"key":"18722_CR56","doi-asserted-by":"publisher","first-page":"2708532","DOI":"10.1155\/2018\/2708532","volume":"2018","author":"C Fu","year":"2018","unstructured":"Fu C et al (2018) A new chaos-based color image encryption scheme with an efficient substitution keystream generation strategy. Security and Communication Networks 2018:2708532","journal-title":"Security and Communication Networks"},{"key":"18722_CR57","doi-asserted-by":"publisher","first-page":"18317","DOI":"10.1007\/s11042-020-08742-8","volume":"79","author":"Y Wang","year":"2020","unstructured":"Wang Y, Wu C, Kang S et al (2020) Multi-channel chaotic encryption algorithm for color image based on DNA coding. Multimed Tools Appl 79:18317\u201318342. https:\/\/doi.org\/10.1007\/s11042-020-08742-8","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"18722_CR58","doi-asserted-by":"publisher","first-page":"2639","DOI":"10.1162\/0899766042321814","volume":"16","author":"DR Hardoon","year":"2004","unstructured":"Hardoon DR, Szedmak S, Shawe-Taylor J (2004) Canonical correlation analysis: An overview with application to learning methods. Neural Comput 16(12):2639\u20132664","journal-title":"Neural Comput"},{"key":"18722_CR59","first-page":"116495","volume":"99","author":"KU Shahna","year":"2021","unstructured":"Shahna KU, Mohamed A (2021) Novel hyper chaotic color image encryption based on pixel and bit level scrambling with diffusion. Signal Process: Image Commun 99:116495","journal-title":"Signal Process: Image Commun"},{"key":"18722_CR60","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/s11042-021-11384-z","volume":"81","author":"KM Hosny","year":"2022","unstructured":"Hosny KM, Kamal ST, Darwish MM (2022) A color image encryption technique using block scrambling and chaos. Multimed Tools Appl 81:505\u2013525. https:\/\/doi.org\/10.1007\/s11042-021-11384-z","journal-title":"Multimed Tools Appl"},{"key":"18722_CR61","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106040","volume":"128","author":"Y He","year":"2020","unstructured":"He Y, Li P, Wang X-Y (2020) A new color image encryption scheme based on 2DNLCML system and genetic operations. Opt Lasers Eng 128:106040","journal-title":"Opt Lasers Eng"},{"key":"18722_CR62","doi-asserted-by":"publisher","first-page":"52609","DOI":"10.1109\/ACCESS.2020.2978083","volume":"8","author":"T Shah","year":"2020","unstructured":"Shah T, Haq TU, Farooq G (2020) Improved SERPENT algorithm: Design to RGB image encryption implementation. IEEE Access 8:52609\u201352621","journal-title":"IEEE Access"},{"issue":"1","key":"18722_CR63","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s11277-019-06393-z","volume":"108","author":"AK Sahu","year":"2019","unstructured":"Sahu AK, Swain G (2019) An optimal information hiding approach based on pixel value differencing and modulus function. Wireless Pers Commun 108(1):159\u2013174","journal-title":"Wireless Pers Commun"},{"key":"18722_CR64","doi-asserted-by":"publisher","unstructured":"Rafrastara FA, Vega Hadinata A, Ignatius Moses Setiadi DR, Hari Rachmawanto E, Sari CA (2019) Copyright embedding analysis in color image channel based on non-blind DCT method. In: 2019 International conference on information and communications technology (ICOIACT). Yogyakarta, Indonesia, pp 185\u2013190. https:\/\/doi.org\/10.1109\/ICOIACT46704.2019.8938427","DOI":"10.1109\/ICOIACT46704.2019.8938427"},{"key":"18722_CR65","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11071-019-04901-1","volume":"95","author":"X Wang","year":"2019","unstructured":"Wang X et al (2019) A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model. Nonlinear Dyn 95:1\u201328","journal-title":"Nonlinear Dyn"},{"key":"18722_CR66","doi-asserted-by":"publisher","first-page":"7236","DOI":"10.1109\/TCSVT.2023.3278310","volume":"33","author":"X Liao","year":"2023","unstructured":"Liao X et al (2023) FAMM: Facial muscle motions for detecting compressed deepfake videos over social networks. IEEE Trans Circuits Syst Video Technol 33:7236\u20137251","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"2","key":"18722_CR67","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1109\/TNSE.2021.3139671","volume":"9","author":"J Tan","year":"2022","unstructured":"Tan J, Liao X, Liu J, Cao Y, Jiang H (2022) Channel attention image steganography with generative adversarial networks. IEEE Transactions on Network Science and Engineering 9(2):888\u2013903. https:\/\/doi.org\/10.1109\/TNSE.2021.3139671","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"1","key":"18722_CR68","doi-asserted-by":"publisher","first-page":"19788","DOI":"10.1038\/srep19788","volume":"6","author":"Y-G Yang","year":"2016","unstructured":"Yang Y-G et al (2016) Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption. Sci Rep 6(1):19788","journal-title":"Sci Rep"},{"key":"18722_CR69","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100419","volume":"41","author":"K Kadian","year":"2021","unstructured":"Kadian K, Garhwal S, Kumar A (2021) Quantum walk and its application domains: A systematic review. Comput Sci Rev 41:100419","journal-title":"Comput Sci Rev"},{"key":"18722_CR70","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-018-1923-9","volume":"17","author":"W-F Cao","year":"2018","unstructured":"Cao W-F et al (2018) Constructing quantum Hash functions based on quantum walks on Johnson graphs. Quantum Inf Process 17:1\u201311","journal-title":"Quantum Inf Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18722-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-18722-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18722-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T07:22:21Z","timestamp":1728631341000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-18722-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,14]]},"references-count":70,"journal-issue":{"issue":"35","published-online":{"date-parts":[[2024,10]]}},"alternative-id":["18722"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-18722-x","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,14]]},"assertion":[{"value":"9 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the study reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}