{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:09:14Z","timestamp":1764785354416,"version":"3.40.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T00:00:00Z","timestamp":1713744000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T00:00:00Z","timestamp":1713744000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Natural Science Basic Research Program of Shaanxi","award":["2024JC-YBMS-480"],"award-info":[{"award-number":["2024JC-YBMS-480"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62076200","62273273"],"award-info":[{"award-number":["62076200","62273273"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007128","name":"Natural Science Foundation of Shaanxi Province","doi-asserted-by":"publisher","award":["2023-YBGY-149"],"award-info":[{"award-number":["2023-YBGY-149"]}],"id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19114-x","type":"journal-article","created":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T09:02:25Z","timestamp":1713776545000},"page":"6873-6897","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A plaintext-related image encryption scheme based on key generation using generative adversarial networks"],"prefix":"10.1007","volume":"84","author":[{"given":"Ruihu","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2537-639X","authenticated-orcid":false,"given":"Xiaobing","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Qiao","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Yalin","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Yajun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,22]]},"reference":[{"key":"19114_CR1","doi-asserted-by":"crossref","first-page":"63027","DOI":"10.1109\/ACCESS.2023.3287858","volume":"11","author":"KM Hosny","year":"2023","unstructured":"Hosny KM, Zaki MA, Lashin NA et al (2023) Multimedia security using encryption: a survey. IEEE Access 11:63027\u201363056","journal-title":"IEEE Access"},{"key":"19114_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/15599612.2019.1588930","volume":"5","author":"XC Zhang","year":"2019","unstructured":"Zhang XC, Wang LF, Cui GZ, Niu Y (2019) Entropy-based block scrambling image encryption using DES structure and chaotic systems. Int J Optomechatronics 5:1\u201313","journal-title":"Int J Optomechatronics"},{"issue":"10","key":"19114_CR3","doi-asserted-by":"crossref","first-page":"6663","DOI":"10.1007\/s11227-019-02878-7","volume":"75","author":"A Arab","year":"2019","unstructured":"Arab A, Rostami MJ, Ghavami B (2019) An image encryption method based on chaos system and AES algorithm. J Supercomput 75(10):6663\u20136682","journal-title":"J Supercomput"},{"key":"19114_CR4","doi-asserted-by":"crossref","first-page":"917","DOI":"10.1007\/s10207-022-00588-5","volume":"21","author":"U Zia","year":"2022","unstructured":"Zia U, McCartney M, Scotney B et al (2022) Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains. Int J Inf Secur 21:917\u2013935","journal-title":"Int J Inf Secur"},{"key":"19114_CR5","doi-asserted-by":"crossref","first-page":"9896","DOI":"10.1109\/ACCESS.2019.2963717","volume":"8","author":"Y Guo","year":"2020","unstructured":"Guo Y, Jing S, Zhou Y et al (2020) An image encryption algorithm based on logistic-fibonacci cascade chaos and 3D bit scrambling. IEEE Access 8:9896\u20139912","journal-title":"IEEE Access"},{"issue":"5","key":"19114_CR6","first-page":"88","volume":"8","author":"YG Yang","year":"2022","unstructured":"Yang YG, Cao GD (2022) New image encryption algorithm based on double chaotic system and compressive sensing. Chin J Netw Inform Secur 8(5):88\u201397","journal-title":"Chin J Netw Inform Secur"},{"key":"19114_CR7","volume":"157","author":"S Xu","year":"2022","unstructured":"Xu S, Wang X, Ye X (2022) A new fractional-order chaos system of Hopfield neural network and its application in image encryption. Chaos Solit Fractals 157:111889","journal-title":"Chaos Solit Fractals"},{"key":"19114_CR8","doi-asserted-by":"crossref","first-page":"103662","DOI":"10.1109\/ACCESS.2019.2931052","volume":"7","author":"X Wang","year":"2019","unstructured":"Wang X, Gao S, Yu L et al (2019) Chaotic image encryption algorithm based on bit-combination scrambling in decimal system and dynamic diffusion. IEEE Access 7:103662\u2013103677","journal-title":"IEEE Access"},{"key":"19114_CR9","volume":"213","author":"Q Lai","year":"2023","unstructured":"Lai Q, Hu G, Erkan U et al (2023) A novel pixel-split image encryption scheme based on 2D Salomon map. Expert Syst Appl 213:118845","journal-title":"Expert Syst Appl"},{"key":"19114_CR10","first-page":"1","volume":"2020","author":"Y Niu","year":"2020","unstructured":"Niu Y, Sun X, Zhang C et al (2020) Anticontrol of a fractional-order chaotic system and its application in color image encryption. Math Probl Eng 2020:1\u201312","journal-title":"Math Probl Eng"},{"issue":"1\u20132","key":"19114_CR11","first-page":"1497","volume":"79","author":"YN Abolfazl","year":"2020","unstructured":"Abolfazl YN, Mohammad HM (2020) Color image encryption based on hybrid chaotic system and DNA sequences. Multimedia Tools Appl 79(1\u20132):1497\u20131518","journal-title":"Multimedia Tools Appl"},{"issue":"12","key":"19114_CR12","doi-asserted-by":"crossref","first-page":"2050173","DOI":"10.1142\/S0218127420501734","volume":"30","author":"HJ Liu","year":"2020","unstructured":"Liu HJ, Kadir A, Xu C (2020) Color image encryption with Cipher Feedback and Coupling Chaotic Map. Int J Bifurcat Chaos 30(12):2050173","journal-title":"Int J Bifurcat Chaos"},{"issue":"16","key":"19114_CR13","doi-asserted-by":"crossref","first-page":"23899","DOI":"10.1007\/s11042-022-12069-x","volume":"82","author":"HJ Liu","year":"2023","unstructured":"Liu HJ, Liu J, Ma C (2023) Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption. Multim Tools Appl 82(16):23899\u201323914","journal-title":"Multim Tools Appl"},{"key":"19114_CR14","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.optlaseng.2019.05.027","volume":"122","author":"H Liu","year":"2019","unstructured":"Liu H, Kadir A, Liu J (2019) Color pathological image encryption algorithm using arithmetic over Galois field and coupled hyper chaotic system. Opt Lasers Eng 122:123\u2013133","journal-title":"Opt Lasers Eng"},{"key":"19114_CR15","doi-asserted-by":"crossref","first-page":"11541","DOI":"10.1109\/ACCESS.2023.3242311","volume":"11","author":"W Alexan","year":"2023","unstructured":"Alexan W, Elkandoz M, Mashaly M et al (2023) Color image encryption through chaos and KAA map. IEEE Access 11:11541\u201311554","journal-title":"IEEE Access"},{"key":"19114_CR16","volume":"223","author":"Q Lai","year":"2023","unstructured":"Lai Q, Liu Y (2023) A cross-channel color image encryption algorithm using two-dimensional hyperchaotic map. Expert Syst Appl 223:119923","journal-title":"Expert Syst Appl"},{"key":"19114_CR17","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.apm.2023.03.038","volume":"120","author":"XD Liu","year":"2023","unstructured":"Liu XD, Tong XJ, Zhu W et al (2023) A novel devaney chaotic map with uniform trajectory for color image encryption. Appl Math Model 120:153\u2013174","journal-title":"Appl Math Model"},{"key":"19114_CR18","volume":"196","author":"C Wang","year":"2022","unstructured":"Wang C, Zhang Y (2022) A novel image encryption algorithm with deep neural network. Sig Process 196:108536","journal-title":"Sig Process"},{"key":"19114_CR19","doi-asserted-by":"crossref","first-page":"18497","DOI":"10.1109\/ACCESS.2020.3040573","volume":"9","author":"P Fang","year":"2020","unstructured":"Fang P, Liu H, Wu C (2020) A novel chaotic block image encryption algorithm based on deep convolutional generative adversarial networks. IEEE Access 9:18497\u201318517","journal-title":"IEEE Access"},{"issue":"2","key":"19114_CR20","first-page":"337","volume":"43","author":"J Li","year":"2022","unstructured":"Li J, Liu Z, Man Z (2022) Key generation method based on generative adversarial network and its application in low-light-level image encryption. Acta Armamentarii 43(2):337\u2013344","journal-title":"Acta Armamentarii"},{"key":"19114_CR21","doi-asserted-by":"crossref","first-page":"7365","DOI":"10.1007\/s11042-021-11803-1","volume":"81","author":"U Erkan","year":"2022","unstructured":"Erkan U, Toktas A, Engino\u011flu S et al (2022) An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN. Multimed Tools Appl 81:7365\u20137391","journal-title":"Multimed Tools Appl"},{"issue":"01","key":"19114_CR22","doi-asserted-by":"crossref","first-page":"93","DOI":"10.3991\/ijoe.v19i01.36901","volume":"19","author":"SJ Abeer","year":"2023","unstructured":"Abeer SJ, Raghad AA, Nidaa FH (2023) An image feature extraction to generate a key for encryption in Cyber Security Medical environments. Int J Online Biomedical Eng (iJOE) 19(01):93\u2013106","journal-title":"Int J Online Biomedical Eng (iJOE)"},{"key":"19114_CR23","doi-asserted-by":"crossref","first-page":"19693","DOI":"10.1007\/s11042-022-14000-w","volume":"82","author":"OD Singh","year":"2023","unstructured":"Singh OD, Dhall S, Malik A et al (2023) A robust and secure immensely random GAN based image encryption mechanism. Multimed Tools Appl 82:19693\u201319743","journal-title":"Multimed Tools Appl"},{"key":"19114_CR24","first-page":"1","volume":"2021","author":"P Fang","year":"2021","unstructured":"Fang P, Liu H, Wu C, Liu M (2021) A secure chaotic block image encryption algorithm using generative adversarial networks and DNA sequence coding. Math Probl Eng 2021:1\u201326","journal-title":"Math Probl Eng"},{"issue":"9","key":"19114_CR25","doi-asserted-by":"crossref","first-page":"4915","DOI":"10.1109\/TNNLS.2021.3062754","volume":"33","author":"Y Ding","year":"2022","unstructured":"Ding Y, Tan F, Qin Z, Cao M, Choo K, Qin Z (2022) DeepKeyGen: a deep learning-based Stream Cipher Generator for medical image encryption and decryption. IEEE Trans Neural Networks Learn Syst 33(9):4915\u20134929","journal-title":"IEEE Trans Neural Networks Learn Syst"},{"key":"19114_CR26","doi-asserted-by":"crossref","first-page":"27445","DOI":"10.1007\/s11042-021-10979-w","volume":"80","author":"Z Man","year":"2021","unstructured":"Man Z, Li J, Di X et al (2021) A novel image encryption algorithm based on least squares generative adversarial network random number generator. Multimed Tools Appl 80:27445\u201327469","journal-title":"Multimed Tools Appl"},{"key":"19114_CR27","doi-asserted-by":"crossref","first-page":"21811","DOI":"10.1007\/s11042-022-12092-y","volume":"81","author":"P Fang","year":"2022","unstructured":"Fang P, Liu H, Wu C et al (2022) A block image encryption algorithm based on a hyperchaotic system and generative adversarial networks. Multimed Tools Appl 81:21811\u201321857","journal-title":"Multimed Tools Appl"},{"key":"19114_CR28","doi-asserted-by":"crossref","first-page":"972","DOI":"10.1109\/LSP.2022.3163685","volume":"29","author":"X Chai","year":"2022","unstructured":"Chai X, Wang Y, Chen X, Gan Z, Zhang Y (2022) TPE-GAN: Thumbnail preserving encryption based on GAN with Key. IEEE Signal Process Lett 29:972\u2013976","journal-title":"IEEE Signal Process Lett"},{"issue":"24","key":"19114_CR29","doi-asserted-by":"crossref","first-page":"240502","DOI":"10.7498\/aps.69.20201019","volume":"69","author":"W Chen","year":"2020","unstructured":"Chen W, Guo Y, Jing S (2020) General image encryption algorithm based on deep learning compressed sensing and compound chaotic system. Acta Phys Sin 69(24):240502","journal-title":"Acta Phys Sin"},{"key":"19114_CR30","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S et al (2016) Deep residual learning for image recognition. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"issue":"11","key":"19114_CR31","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"IJ Goodfellow","year":"2020","unstructured":"Goodfellow IJ, Pouget-Abadie J, Mirza M et al (2020) Generative adversarial networks. Commun ACM 63(11):139\u2013144","journal-title":"Commun ACM"},{"key":"19114_CR32","doi-asserted-by":"crossref","unstructured":"Ronneberger O, Fischer P, Brox T (2015) U-net: convolutional networks for biomedical image segmentation. International Conference on Medical image computing and computer-assisted intervention (MICCAI), pp 234\u2013241","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"19114_CR33","doi-asserted-by":"crossref","unstructured":"Isola P, Zhu JY, Zhou T et al (2017) Image-to-image translation with conditional adversarial networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 1125\u20131134","DOI":"10.1109\/CVPR.2017.632"},{"key":"19114_CR34","unstructured":"Google Universal Image 256\u00d7256 GUIE JPGCSV. Available:\u00a0 https:\/\/www.kaggle.com\/datasets\/saberghaderi\/google-universal-image-256x256-guie-jpgcsv. Accessed 2023-3-13"},{"key":"19114_CR35","unstructured":"The USC-SIPI image database Available:\u00a0http:\/\/sipi.usc.edu\/database\/. Accessed 2023-3-14"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19114-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19114-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19114-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T04:21:23Z","timestamp":1743394883000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19114-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,22]]},"references-count":35,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["19114"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19114-x","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,4,22]]},"assertion":[{"value":"27 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}]}}