{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T08:43:37Z","timestamp":1759826617290,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","license":[{"start":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T00:00:00Z","timestamp":1714694400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T00:00:00Z","timestamp":1714694400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100014718","name":"Innovative Research Group Project of the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.62262062"],"award-info":[{"award-number":["No.62262062"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19157-0","type":"journal-article","created":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T06:01:53Z","timestamp":1714716113000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A dual image encryption method based on improved Henon mapping and improved Logistic\u00a0mapping"],"prefix":"10.1007","author":[{"given":"Shiming","family":"Niu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2830-1731","authenticated-orcid":false,"given":"Ru","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Cong","family":"Ding","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,3]]},"reference":[{"key":"19157_CR1","first-page":"104","volume":"18","author":"WC Liu","year":"2020","unstructured":"Liu WC (2020) Digital image encryption technology and its security analysis [J]. Sci Technol Innov 18:104\u2013105 (in Chinese)","journal-title":"Sci Technol Innov"},{"issue":"2","key":"19157_CR2","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1109\/TNSE.2021.3139671","volume":"9","author":"J Tan","year":"2021","unstructured":"Tan J, Liao X, Liu J et al (2021) Channel attention image steganography with generative adversarial networks[J]. IEEE Trans Netw Sci Eng 9(2):888\u2013903","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"3","key":"19157_CR3","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2019","unstructured":"Liao X, Yu Y, Li B et al (2019) A new payload partition strategy in color image steganography [J]. IEEE Trans Circuits Syst Video Technol 30(3):685\u2013696","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"2","key":"19157_CR4","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1109\/TCSVT.2022.3204753","volume":"33","author":"J Chen","year":"2022","unstructured":"Chen J, Liao X, Wang W et al (2022) Snis: a signal noise separation-based network for post-processed image forgery detection[J]. IEEE Trans Circuits Syst Video Technol 33(2):935\u2013951","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"09","key":"19157_CR5","first-page":"7","volume":"5","author":"FY Zhao","year":"2014","unstructured":"Zhao FY (2014) Research on Digital Image Encryption Technology[J]. Inf Secur Technol 5(09):7\u20138+13 (in Chinese)","journal-title":"Inf Secur Technol"},{"key":"19157_CR6","first-page":"656","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy system [J]. BellSyst Tech J 28:656\u2013715","journal-title":"BellSyst Tech J"},{"issue":"10","key":"19157_CR7","first-page":"1429","volume":"32","author":"Y Zhang","year":"2013","unstructured":"Zhang Y, Yang Y (2013) Image encryption algorithm based on double scrambling of Arnold transformation [J]. J Liaoning Tech Univ (Nat Sci Ed) 32(10):1429\u20131432 (in Chinese)","journal-title":"J Liaoning Tech Univ (Nat Sci Ed)"},{"issue":"11","key":"19157_CR8","first-page":"249","volume":"39","author":"JG Sun","year":"2012","unstructured":"Sun JG, Wang J, Meng XF (2012) Improved image encryption algorithm based on double scrambling of Fibonacci transforms [J]. Comput Sci 39(11):249\u2013253 (in Chinese)","journal-title":"Comput Sci"},{"issue":"05","key":"19157_CR9","first-page":"123","volume":"22","author":"B Lin","year":"2012","unstructured":"Lin B, Jiang GP (2012) An image encryption algorithm based on image block and key feedback mechanism[J]. Comput Technol Dev 22(05):123\u2013126 (in Chinese)","journal-title":"Comput Technol Dev"},{"key":"19157_CR10","first-page":"68","volume":"08","author":"MW Li","year":"2007","unstructured":"Li MW, Feng Y, Li LJ (2007) A new image encryption algorithm based on pixel scrambling [J]. Heilongjiang Sci Technol Inf 08:68\u201369 (in Chinese)","journal-title":"Heilongjiang Sci Technol Inf"},{"key":"19157_CR11","unstructured":"Min LQ (2006) Image encryption algorithm based on double scrambling[J]. Sci Surv Mapp (03):71\u201372+139+5 (in Chinese)"},{"issue":"04","key":"19157_CR12","first-page":"988","volume":"42","author":"Y Guo","year":"2020","unstructured":"Guo Y, Xu X, Jing SW et al (2020) Optical image encryption based on spiral phase transform and generalized Fibonacci chaos [J]. J Electron Inf Technol 42(04):988\u2013996 (in Chinese)","journal-title":"J Electron Inf Technol"},{"key":"19157_CR13","doi-asserted-by":"crossref","unstructured":"Zhang T, Li S, Ge R et al (2016) A fast 1d chaotic map-based image encryption using generalized Fibonacci-Lucas transform and bidirectional diffusion[C]\/\/Eighth International Conference on Digital Image Processing (ICDIP 2016). SPIE 10033:553\u2013561","DOI":"10.1117\/12.2245273"},{"key":"19157_CR14","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1016\/j.optcom.2011.11.044","volume":"285","author":"YC Zhou","year":"2012","unstructured":"Zhou YC, Panetta K, Agaian S et al (2012) Image encryption using P-Fibonacci transform and decomposition [J]. Opt Commun 285:594\u2013608","journal-title":"Opt Commun"},{"key":"19157_CR15","first-page":"105","volume":"4","author":"SK Du","year":"2022","unstructured":"Du SK, Zhang AH (2022) An encryption algorithm for Arnold transformation images based on Frobenius normal form [J]. J Nanjing Univ Posts Telecommun (Nat Sci Ed) 4:105\u2013110","journal-title":"J Nanjing Univ Posts Telecommun (Nat Sci Ed)"},{"key":"19157_CR16","first-page":"49","volume":"11","author":"LJ Zhang","year":"2021","unstructured":"Zhang LJ, Li WJ (2021) Image encryption algorithm combining mersenne twister and Arnold transformation [J]. J Inf Technol 11:49\u201354 (in Chinese)","journal-title":"J Inf Technol"},{"issue":"14","key":"19157_CR17","doi-asserted-by":"publisher","first-page":"15561","DOI":"10.1007\/s11042-016-3858-4","volume":"76","author":"XL Chai","year":"2017","unstructured":"Chai XL, Gan ZH, Zhang ZH (2017) A fast chaos based image encryption scheme with a novel plain image-related swapping block permutation and block diffusion [J]. Multimedia Tools Appl 76(14):15561\u201315585","journal-title":"Multimedia Tools Appl"},{"issue":"12","key":"19157_CR18","first-page":"92","volume":"31","author":"M Fei","year":"2021","unstructured":"Fei M, Li GD (2021) Image encryption algorithm based on chaotic system and bidirectional diffusion [J]. Comput Technol Dev 31(12):92\u201397 (in Chinese)","journal-title":"Comput Technol Dev"},{"issue":"10","key":"19157_CR19","first-page":"2680","volume":"48","author":"Y Wang","year":"2017","unstructured":"Wang Y, Tu L (2017) A new image encryption algorithm based on improved Lorenz chaotic system[J]. J Cent South Univ 48(10):2680\u20132687 (in Chinese)","journal-title":"J Cent South Univ"},{"key":"19157_CR20","first-page":"595","volume":"03","author":"T Li","year":"2008","unstructured":"Li T, Liu J (2008) Image scrambling method Based on bit-plane and Chaotic System [J]. J Southwest Univ National 03:595\u2013599 (in Chinese)","journal-title":"J Southwest Univ National"},{"issue":"12","key":"19157_CR21","first-page":"3374","volume":"38","author":"L Sun","year":"2017","unstructured":"Sun L, Huang ZQ, Liang L (2017) Image encryption algorithm based on compound chaotic maps and continuous diffusion [J]. Comput Eng Des 38(12):3374\u20133379+3451 (in Chinese)","journal-title":"Comput Eng Des"},{"issue":"12","key":"19157_CR22","first-page":"11","volume":"37","author":"QY Zhang","year":"2021","unstructured":"Zhang QY, Song YJ (2021) A dual speech encryption algorithm based on improved Henon mapping and hyperchaotic [J]. Telecommun Sci 37(12):11\u201324 (in Chinese)","journal-title":"Telecommun Sci"},{"issue":"08","key":"19157_CR23","first-page":"955","volume":"60","author":"CY Chu","year":"2020","unstructured":"Chu CY, Gao YX, Xie JF et al (2020) Improved chaotic equation and its new multi-chaotic image encryption method [J]. Telecommun Technol 60(08):955\u2013960 (in Chinese)","journal-title":"Telecommun Technol"},{"issue":"12","key":"19157_CR24","first-page":"76","volume":"22","author":"B Wang","year":"2022","unstructured":"Wang B, Xu GT (2022) Encryption algorithm based on improved Logistic mapping and dual graph mixture [J]. Inf Netw Secur 22(12):76\u201386","journal-title":"Inf Netw Secur"},{"key":"19157_CR25","unstructured":"Zhao HX, Xie SC, Zhang JZ et al (2020) Fast image encryption algorithm based on modified Henon map [J]. Comput Appl Res (1 2):3726\u20133730 (in Chinese)"},{"issue":"6","key":"19157_CR26","first-page":"124","volume":"28","author":"CJ Hu","year":"2019","unstructured":"Hu CJ, Ruan C, Niu ZX (2019) Image encryption algorithm based on improved Logistic mapping [J]. Comput Syst Appl 28(6):124\u2013129","journal-title":"Comput Syst Appl"},{"key":"19157_CR27","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.sigpro.2014.01.020","volume":"100","author":"YC Zhou","year":"2014","unstructured":"Zhou YC, Cao WJ, Chen P (2014) Image encryption using binary bit plane [J]. Signal Process 100:197\u2013207","journal-title":"Signal Process"},{"issue":"06","key":"19157_CR28","first-page":"185","volume":"39","author":"HE Ren","year":"2013","unstructured":"Ren HE, Dai LL (2013) Digital image encryption algorithm based on Bit-plane transformation [J]. Comput Eng 39(06):185\u2013189","journal-title":"Comput Eng"},{"key":"19157_CR29","doi-asserted-by":"publisher","first-page":"023115","DOI":"10.1063\/1.2728112","volume":"17","author":"T Xiang","year":"2007","unstructured":"Xiang T, Wong KW, Liao XF (2007) Selective image encryption using a spatiotemporal chaotic system [J]. Chaos 17:023115","journal-title":"Chaos"},{"key":"19157_CR30","doi-asserted-by":"publisher","first-page":"111117","DOI":"10.1016\/j.chaos.2021.111117","volume":"150","author":"XY Wang","year":"2021","unstructured":"Wang XY, Guan NN, Yang JJ (2021) Image encryption algorithm with random scrambling based on one - dimensional logistic self-embedding chaotic map [J]. Chaos Solit Fractals 150:111117","journal-title":"Chaos, Solitons & Fractals"},{"key":"19157_CR31","first-page":"38","volume":"06","author":"RR Zhang","year":"2021","unstructured":"Zhang RR, Cao CJ, Zhou J (2021) Image encryption algorithm based on random diffusion and bit-level block scrambling [J]. Digit Print 06:38\u201344+72 (in Chinese)","journal-title":"Digit Print"},{"issue":"C","key":"19157_CR32","first-page":"106162","volume":"90","author":"KU Shahna","year":"2020","unstructured":"Shahna KU, Mokamed A (2020) A novel image encryption scheme using both pixel level and bit level permutation with chaotic map [J]. Appl Soft Comput 90(C):106162","journal-title":"Appl Soft Comput"},{"issue":"11","key":"19157_CR33","first-page":"158","volume":"47","author":"XQ Zeng","year":"2021","unstructured":"Zeng XQ, Ye RS (2021) Chaotic image encryption algorithm based on improved logistic map [J]. Comput Eng 47(11):158-165,174","journal-title":"Comput Eng"},{"issue":"8","key":"19157_CR34","first-page":"2381","volume":"41","author":"XJ Han","year":"2020","unstructured":"Han XJ, Li GD (2020) Dynamic cat transformation and chaotic mapping image encryption algorithm [J]. Comput Eng Des 41(8):2381\u20132387","journal-title":"Comput Eng Des"},{"issue":"1\u20132","key":"19157_CR35","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.physleta.2013.10.035","volume":"378","author":"II Shevchenko","year":"2014","unstructured":"Shevchenko II (2014) Lyapunov exponents in resonance multiplets [J]. Phys Lett A 378(1\u20132):34\u201342","journal-title":"Phys Lett A"},{"issue":"12","key":"19157_CR36","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.jss.2014.08.066","volume":"98","author":"M Zhang","year":"2014","unstructured":"Zhang M, Tong XJ (2014) A new chaotic map based image encryption schemes for several image formats [J]. J Syst Softw 98(12):140\u2013154","journal-title":"J Syst Softw"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19157-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19157-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19157-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T06:05:22Z","timestamp":1714716322000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19157-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,3]]},"references-count":36,"alternative-id":["19157"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19157-0","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,5,3]]},"assertion":[{"value":"18 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no relevant financial interest in the copy and no other potential conflict of interest to be disclosed.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}