{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T06:14:16Z","timestamp":1772000056986,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T00:00:00Z","timestamp":1714176000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T00:00:00Z","timestamp":1714176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19016-y","type":"journal-article","created":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T07:03:00Z","timestamp":1714201380000},"page":"7957-7985","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Medical images encryption using two improved Vigen\u00e8re laps separated by genetic crossover"],"prefix":"10.1007","volume":"84","author":[{"given":"Abdellah","family":"Abid","sequence":"first","affiliation":[]},{"given":"Mariem","family":"Jarjar","sequence":"additional","affiliation":[]},{"given":"Mourad","family":"Kattass","sequence":"additional","affiliation":[]},{"given":"Hicham","family":"Rrghout","sequence":"additional","affiliation":[]},{"given":"Abdellatif","family":"JarJar","sequence":"additional","affiliation":[]},{"given":"Abdellhamid","family":"Benazzi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,27]]},"reference":[{"key":"19016_CR1","doi-asserted-by":"crossref","unstructured":"Qobbi Y, Jarjar A, Essaid M, Benazzi A (2022) New image encryption scheme based on dynamic substitution and hill cipher. In: WITS 2020: Proceedings of the 6th international conference on wireless technologies, embedded, and\u00a0intelligent systems. Springer, Singapore, pp 797\u2013808","DOI":"10.1007\/978-981-33-6893-4_72"},{"key":"19016_CR2","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1016\/j.procs.2019.01.048","volume":"148","author":"S Hraoui","year":"2019","unstructured":"Hraoui S, Gmira F, Abbou MF, Oulidi AJ, Jarjar A (2019) A new cryptosystem of color image using a dynamic-chaos hill cipher algorithm. Procedia Comput Sci 148:399\u2013408","journal-title":"Procedia Comput Sci"},{"key":"19016_CR3","volume":"19","author":"Y Qobbi","year":"2023","unstructured":"Qobbi Y, Abid A, Jarjar M, El Kaddouhi S, Jarjar A, Benazzi A (2023) Adaptation of a genetic operator and a dynamic S-box for chaotic encryption of medical and color images. Sci African 19:e01551","journal-title":"Sci African"},{"issue":"6","key":"19016_CR4","doi-asserted-by":"crossref","first-page":"1209","DOI":"10.1049\/iet-ipr.2019.0042","volume":"14","author":"M Boussif","year":"2020","unstructured":"Boussif M, Aloui N, Cherif A (2020) Securing DICOM images by a new encryption algorithm using Arnold transform and Vigen\u00e8re cipher. IET Image Proc 14(6):1209\u20131216","journal-title":"IET Image Proc"},{"key":"19016_CR5","doi-asserted-by":"crossref","unstructured":"Jarjar M, Hraoui S, Najah S, Zenkouar K (2022) New technology of color image encryption based on chaos and two improved Vigen\u00e8re steps. Multimed Tools Appl 81(17):24665\u201324689","DOI":"10.1007\/s11042-022-12750-1"},{"issue":"2","key":"19016_CR6","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1007\/s11277-021-08295-5","volume":"119","author":"N Uniyal","year":"2021","unstructured":"Uniyal N, Dobhal G, Rawat A, Sikander A (2021) A Novel Encryption Approach Based on Vigen\u00e8re Cipher for Secure Data Communication. Wireless Pers Commun 119(2):1577\u20131587","journal-title":"Wireless Pers Commun"},{"key":"19016_CR7","doi-asserted-by":"crossref","unstructured":"JarJar A (2022) Vigenere and genetic cross-over acting at the restricted ASCII code level for color image encryption.\u00a0Med Biol Eng Comput\u00a060(7):2077\u20132093","DOI":"10.1007\/s11517-022-02566-4"},{"key":"19016_CR8","doi-asserted-by":"crossref","first-page":"145459","DOI":"10.1109\/ACCESS.2021.3123571","volume":"9","author":"W Feng","year":"2021","unstructured":"Feng W, Qin Z, Zhang J, Ahmad M (2021) Cryptanalysis and improvement of the image encryption scheme based on Feistel network and dynamic DNA encoding. IEEE Access 9:145459\u2013145470","journal-title":"IEEE Access"},{"key":"19016_CR9","first-page":"1","volume":"2021","author":"P Fang","year":"2021","unstructured":"Fang P, Liu H, Wu C, Liu M (2021) A secure chaotic block image encryption algorithm using generative adversarial networks and DNA sequence coding. Math Problems Eng 2021:1\u201326","journal-title":"Math Problems Eng"},{"issue":"13","key":"19016_CR10","doi-asserted-by":"publisher","first-page":"20191","DOI":"10.1007\/s11042-021-10587-8","volume":"80","author":"A Razaq","year":"2021","unstructured":"Razaq A, Iqra M. Ahmad, Yousaf MA, Masood S (2021) A novel finite rings based algebraic scheme of evolving secure S-boxes for images encryption. Multimed Tools Appl Flight 80(13):20191\u201320215. https:\/\/doi.org\/10.1007\/s11042-021-10587-8","journal-title":"Multimed Tools Appl Flight"},{"issue":"8","key":"19016_CR11","doi-asserted-by":"publisher","first-page":"790","DOI":"10.3390\/E21080790","volume":"21","author":"S Zhu","year":"2019","unstructured":"Zhu S, Wang G, Zhu C (2019) A secure and fast image encryption scheme based on double chaotic s-boxes. Entropy 21(8):790. https:\/\/doi.org\/10.3390\/E21080790","journal-title":"Entropy"},{"key":"19016_CR12","doi-asserted-by":"publisher","unstructured":"Brahim AH, Pacha AA, Said NHADJ (2021) A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes. Inf Secur J 1\u201317. https:\/\/doi.org\/10.1080\/19393555.2021.1943572","DOI":"10.1080\/19393555.2021.1943572"},{"issue":"1","key":"19016_CR13","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s11071-016-3046-0","volume":"87","author":"A Belazi","year":"2017","unstructured":"Belazi A, Khan M, El-Latif AAA, Belghith S (2017) Efficient cryptosystem approaches: S-boxes and permutation\u2013substitution-based encryption. Nonlinear Dyn 87(1):337\u2013361. https:\/\/doi.org\/10.1007\/s11071-016-3046-0","journal-title":"Nonlinear Dyn"},{"issue":"4","key":"19016_CR14","doi-asserted-by":"publisher","first-page":"2757","DOI":"10.1007\/s11071-017-3409-1","volume":"88","author":"A Ullah","year":"2017","unstructured":"Ullah A, Jamal SS, Shah T (2017) A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn 88(4):2757\u20132769. https:\/\/doi.org\/10.1007\/s11071-017-3409-1","journal-title":"Nonlinear Dyn"},{"key":"19016_CR15","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.ins.2018.03.055","volume":"450","author":"Y Zhang","year":"2018","unstructured":"Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic S-Box. Inf Sci (NY) 450:361\u2013377. https:\/\/doi.org\/10.1016\/j.ins.2018.03.055","journal-title":"Inf Sci (NY)"},{"key":"19016_CR16","doi-asserted-by":"crossref","unstructured":"Qobbi Y, Jarjar A, Essaid M, Benazzi A (2021) Development of large chaotic S-boxes for image encryption. In: International conference on digital technologies and applications. Springer International Publishing,\u00a0Cham, pp 847\u2013858","DOI":"10.1007\/978-3-030-73882-2_77"},{"key":"19016_CR17","doi-asserted-by":"crossref","first-page":"12966","DOI":"10.1109\/ACCESS.2022.3146792","volume":"10","author":"J Arif","year":"2022","unstructured":"Arif J, Khan MA, Ghaleb B, Ahmad J, Munir A, Rashid U, Al-Dubai AY (2022) A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution. IEEE Access 10:12966\u201312982","journal-title":"IEEE Access"},{"issue":"12","key":"19016_CR18","doi-asserted-by":"crossref","first-page":"18941","DOI":"10.1007\/s11042-020-10325-6","volume":"80","author":"M Kumar","year":"2021","unstructured":"Kumar M, Gupta P (2021) A new medical image encryption algorithm based on the 1D logistic map associated with pseudo-random numbers. Multimedia Tools Appl 80(12):18941\u201318967","journal-title":"Multimedia Tools Appl"},{"key":"19016_CR19","doi-asserted-by":"publisher","unstructured":"Khan J, Ahmad J, Hwang SO (2015) An efficient image encryption scheme based on: henon map, skew tent map and S-Box. In: 2015 6th International conference on modeling, simulation, and applied optimization (ICMSAO), Istanbul, Turkey,\u00a0pp 1\u20136. https:\/\/doi.org\/10.1109\/ICMSAO.2015.7152261","DOI":"10.1109\/ICMSAO.2015.7152261"},{"key":"19016_CR20","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.neucom.2017.12.048","volume":"283","author":"P Ping","year":"2018","unstructured":"Ping P, Xu F, Mao Y, Wang Z (2018) Designing permutation\u2013substitution image encryption networks with Henon map. Neurocomputing 283:53\u201363","journal-title":"Neurocomputing"},{"key":"19016_CR21","doi-asserted-by":"crossref","unstructured":"Umbarkar AJ, Sheth PD (2015) Crossover operators in genetic algorithms: a review. ICTACT J Soft Comput 6(01):1083\u20131092","DOI":"10.21917\/ijsc.2015.0150"},{"issue":"1","key":"19016_CR22","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/s11831-018-9298-8","volume":"27","author":"M Kaur","year":"2020","unstructured":"Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods Eng 27(1):15\u201343","journal-title":"Arch Comput Methods Eng"},{"issue":"4","key":"19016_CR23","first-page":"186","volume":"2","author":"L Abraham","year":"2013","unstructured":"Abraham L, Daniel N (2013) Secure image encryption algorithms: A review. Int J Sci Technol Res 2(4):186\u2013189","journal-title":"Int J Sci Technol Res"},{"issue":"2","key":"19016_CR24","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. J Selected Areas Telecommun (JSAT) 1(2):31\u201338","journal-title":"J Selected Areas Telecommun (JSAT)"},{"key":"19016_CR25","first-page":"57","volume":"15","author":"F Budiman","year":"2022","unstructured":"Budiman F, Andono PN, Setiadi DRIM (2022) Image encryption using double layer chaos with dynamic iteration and rotation pattern. Int J Intel Eng Syst 15:57\u201367","journal-title":"Int J Intel Eng Syst"},{"issue":"1","key":"19016_CR26","first-page":"1","volume":"100","author":"FMS Ali","year":"2014","unstructured":"Ali FMS, Sarhan FH (2014) Enhancing security of vigenere cipher by stream cipher. Int J Comput Appl 100(1):1\u20134","journal-title":"Int J Comput Appl"},{"issue":"5","key":"19016_CR27","first-page":"053034","volume":"32","author":"G Xie","year":"2023","unstructured":"Xie G, Tang Z, Liang X, Yu C, Zhang X (2023) Image encryption based on chaotic maps and random scan patterns. J Electron Imaging 32(5):053034\u2013053034","journal-title":"J Electron Imaging"},{"key":"19016_CR28","doi-asserted-by":"crossref","first-page":"8257","DOI":"10.1007\/s11042-016-3476-1","volume":"76","author":"Z Tang","year":"2017","unstructured":"Tang Z, Wang F, Zhang X (2017) Image encryption based on random projection partition and chaotic system. Multimedia Tools Appl 76:8257\u20138283","journal-title":"Multimedia Tools Appl"},{"key":"19016_CR29","doi-asserted-by":"publisher","unstructured":"Tang Z, Yang Y, Xu S, Yu C, Zhang X (2019) Image encryption with double spiral scans and chaotic maps. Security Commun Networks 2019:15. https:\/\/doi.org\/10.1155\/2019\/8694678","DOI":"10.1155\/2019\/8694678"},{"key":"19016_CR30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.optlaseng.2015.12.004","volume":"80","author":"Z Tang","year":"2016","unstructured":"Tang Z, Song J, Zhang X, Sun R (2016) Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt Lasers Eng 80:1\u201311","journal-title":"Opt Lasers Eng"},{"issue":"5","key":"19016_CR31","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1049\/iet-ipr.2016.0040","volume":"11","author":"H Liu","year":"2017","unstructured":"Liu H, Kadir A, Sun X (2017) Chaos-based fast colour image encryption scheme with true random number keys from environmental noise. IET Image Proc 11(5):324\u2013332","journal-title":"IET Image Proc"},{"key":"19016_CR32","doi-asserted-by":"crossref","first-page":"943","DOI":"10.1007\/s11045-018-0589-x","volume":"30","author":"JS Khan","year":"2019","unstructured":"Khan JS, Ahmad J (2019) Chaos based efficient selective image encryption. Multidimension Syst Signal Process 30:943\u2013961","journal-title":"Multidimension Syst Signal Process"},{"key":"19016_CR33","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.ijleo.2017.08.028","volume":"147","author":"DS Laiphrakpam","year":"2017","unstructured":"Laiphrakpam DS, Khumanthem MS (2017) Medical image encryption based on improved ElGamal encryption technique. Optik 147:88\u2013102","journal-title":"Optik"},{"key":"19016_CR34","doi-asserted-by":"crossref","DOI":"10.1016\/j.optlastec.2019.105818","volume":"121","author":"M Mahmud","year":"2020","unstructured":"Mahmud M, Lee M, Choi JY (2020) Evolutionary-based image encryption using RNA codons truth table. Opt Laser Technol 121:105818","journal-title":"Opt Laser Technol"},{"issue":"25\u201326","key":"19016_CR35","doi-asserted-by":"crossref","first-page":"17497","DOI":"10.1007\/s11042-019-08352-z","volume":"79","author":"B Mondal","year":"2020","unstructured":"Mondal B, Mandal T (2020) A secure image encryption scheme based on genetic operations and a new hybrid pseudo random number generator. Multimedia Tools Appl 79(25\u201326):17497\u201317520","journal-title":"Multimedia Tools Appl"},{"key":"19016_CR36","volume":"16","author":"M Es-Sabry","year":"2022","unstructured":"Es-Sabry M, El Akkad N, Merras M, Saaidi A, Satori K (2022) A new color image encryption algorithm using multiple chaotic maps with the intersecting planes method. Sci African 16:e01217","journal-title":"Sci African"},{"key":"19016_CR37","unstructured":"The USC-SIPI database: http:\/\/sipi.usc.edu\/database. Accessed 25 Jan 2024"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19016-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19016-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19016-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T12:27:47Z","timestamp":1743424067000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19016-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,27]]},"references-count":37,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["19016"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19016-y","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,27]]},"assertion":[{"value":"3 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 April 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}