{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T19:25:03Z","timestamp":1772133903915,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T00:00:00Z","timestamp":1721174400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T00:00:00Z","timestamp":1721174400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19774-9","type":"journal-article","created":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T05:01:58Z","timestamp":1721192518000},"page":"19915-19946","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["DNA-level action accompanied by Vigenere using strong pseudo random S-box for color image encryption"],"prefix":"10.1007","volume":"84","author":[{"given":"Abdelhakim","family":"Chemlal","sequence":"first","affiliation":[]},{"given":"Hassan","family":"Tabti","sequence":"additional","affiliation":[]},{"given":"Hamid","family":"El Bourakkadi","sequence":"additional","affiliation":[]},{"given":"Hicham","family":"Rrghout","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7119-2068","authenticated-orcid":false,"given":"Abdellatif","family":"Jarjar","sequence":"additional","affiliation":[]},{"given":"Abdelhamid","family":"Benazzi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,17]]},"reference":[{"key":"19774_CR1","first-page":"247","volume-title":"Congress on smart computing technologies","author":"P Kizhekethottam","year":"2022","unstructured":"Kizhekethottam P, Takale B, Sherekar A, Thakur P, Lokhande M (2022) A survey of cryptographic algorithms for encryption and key transmission. Congress on smart computing technologies. Springer Nature Singapore, Singapore, pp 247\u2013256"},{"issue":"3","key":"19774_CR2","doi-asserted-by":"publisher","first-page":"1415","DOI":"10.3390\/s23031415","volume":"23","author":"M Alsafyani","year":"2023","unstructured":"Alsafyani M, Alhomayani F, Alsuwat H, Alsuwat E (2023) Face image encryption based on feature with optimization using secure crypto general adversarial neural network and optical chaotic map. Sensors 23(3):1415","journal-title":"Sensors"},{"issue":"3","key":"19774_CR3","doi-asserted-by":"publisher","first-page":"1787","DOI":"10.11591\/ijeecs.v34.i3.pp1787-1799","volume":"34","author":"H El Bourakkadi","year":"2024","unstructured":"El Bourakkadi H, Chemlal A, Tabti H, Kattass M, Jarjar A, Benazzi A (2024) Im-proved vigenere using affine functions surrounded by two genetic crossovers for image encryption. Indones J Electr Eng Comput Sci 34(3):1787. https:\/\/doi.org\/10.11591\/ijeecs.v34.i3.pp1787-1799","journal-title":"Indones J Electr Eng Comput Sci"},{"issue":"9","key":"19774_CR4","doi-asserted-by":"publisher","first-page":"106974","DOI":"10.1016\/j.optlastec.2021.106974","volume":"140","author":"AA Abbasi","year":"2021","unstructured":"Abbasi AA, Mazinani M, Hosseini R (2021) Evolutionary-based image encryption using biomolecules and non-coupled map lattice. Opt Laser Technol 140(9):106974","journal-title":"Opt Laser Technol"},{"key":"19774_CR5","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu L, Li Z, Li J et al (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17\u201325","journal-title":"Opt Lasers Eng"},{"key":"19774_CR6","doi-asserted-by":"publisher","first-page":"122210","DOI":"10.1109\/ACCESS.2020.3007550","volume":"8","author":"J Zhou","year":"2020","unstructured":"Zhou J, Li J, Di X (2020) A novel lossless medical image encryption scheme based on game theory with optimized ROI parameters and hidden ROI position. IEEE Access 8:122210\u2013122228","journal-title":"IEEE Access"},{"key":"19774_CR7","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.ijleo.2018.04.050","volume":"170","author":"P Murali","year":"2018","unstructured":"Murali P, Sankaradass V (2018) An efficient ROI-based copyright protection scheme for digital images with SVD and orthogonal polynomials transformation. Optik 170:242\u2013264","journal-title":"Optik"},{"key":"19774_CR8","doi-asserted-by":"crossref","unstructured":"Abid A, Qobbi Y, Benazzi A, Jarjar M, Jarjar A (2022) Two enhanced feistel steps for medical image encryption. In 2022 IEEE 3rd international conference on electronics, control, optimization and computer science (ICECOCS). IEEE, pp 1-4","DOI":"10.1109\/ICECOCS55148.2022.9982938"},{"key":"19774_CR9","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ins.2019.08.041","volume":"507","author":"X Wang","year":"2020","unstructured":"Wang X, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16\u201336","journal-title":"Inf Sci"},{"issue":"3","key":"19774_CR10","doi-asserted-by":"publisher","first-page":"1745","DOI":"10.1016\/j.chaos.2009.03.084","volume":"42","author":"S Mazloom","year":"2009","unstructured":"Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. Chaos, Solitons Fractals 42(3):1745\u20131754","journal-title":"Chaos, Solitons Fractals"},{"issue":"1","key":"19774_CR11","first-page":"201","volume":"14","author":"H Tabti","year":"2024","unstructured":"Tabti H, El Bourakkadi H, Chemlal A, Jarjar A, Zenkouar K, Najah S (2024) Genetic crossover at the RNA level for secure medical image encryption. Int J Saf Secur Eng 14(1):201","journal-title":"Int J Saf Secur Eng"},{"issue":"10","key":"19774_CR12","doi-asserted-by":"publisher","first-page":"3771","DOI":"10.1007\/s12652-019-01580-z","volume":"11","author":"M Dua","year":"2020","unstructured":"Dua M, Wesanekar A, Gupta V et al (2020) Differential evolution optimization of intertwining logistic map-DNA based image encryption technique. J Ambient Intell Humaniz Comput 11(10):3771\u20133786","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"19774_CR13","doi-asserted-by":"publisher","first-page":"2807","DOI":"10.1007\/s11071-021-06422-2","volume":"104","author":"G Ye","year":"2021","unstructured":"Ye G, Jiao K, Huang X (2021) Quantum logistic image encryption algorithm based on SHA-3 and RSA. Nonlinear Dyn 104:2807\u20132827","journal-title":"Nonlinear Dyn"},{"issue":"10","key":"19774_CR14","doi-asserted-by":"publisher","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","volume":"59","author":"H Liu","year":"2010","unstructured":"Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320\u20133327","journal-title":"Comput Math Appl"},{"issue":"9","key":"19774_CR15","doi-asserted-by":"publisher","first-page":"6785","DOI":"10.1016\/j.aej.2021.12.023","volume":"61","author":"G Ye","year":"2022","unstructured":"Ye G, Liu M, Wu M (2022) Double image encryption algorithm based compressive sensing and elliptic curve. Alex Eng J 61(9):6785\u20136795","journal-title":"Alex Eng J"},{"issue":"7","key":"19774_CR16","doi-asserted-by":"publisher","first-page":"6791","DOI":"10.1007\/s11071-022-08119-6","volume":"111","author":"Y Luo","year":"2023","unstructured":"Luo Y, Liang Y, Zhang S, Liu J, Wang F (2023) An image encryption scheme based on block compressed sensing and Chen\u2019s system. Nonlinear Dyn 111(7):6791\u20136811","journal-title":"Nonlinear Dyn"},{"key":"19774_CR17","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.ins.2020.03.054","volume":"526","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Chen A, Tang Y et al (2020) Plaintext-related image encryption algorithm based on perceptron-like network. Inf Sci 526:180\u2013202","journal-title":"Inf Sci"},{"key":"19774_CR18","doi-asserted-by":"crossref","unstructured":"Xiyu S, Zhong C (2023) A fast image encryption algorithm with variable key space. Multimed Tools Appl 1\u201321","DOI":"10.1007\/s11042-023-16981-8"},{"issue":"2","key":"19774_CR19","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1109\/TC.2021.3051387","volume":"71","author":"C Li","year":"2022","unstructured":"Li C, Tan K, Feng B et al (2022) The graph structure of the generalized discrete Arnold\u2019s cat map. IEEE Trans Comput 71(2):364\u2013377","journal-title":"IEEE Trans Comput"},{"issue":"3","key":"19774_CR20","first-page":"1291","volume":"69","author":"X Wang","year":"2022","unstructured":"Wang X, Liu P (2022) A new full chaos coupled mapping lattice and its application in privacy image encryption. IEEE Trans Circuits Syst I: Regul Pap 69(3):1291\u20131301","journal-title":"IEEE Trans Circuits Syst I: Regul Pap"},{"issue":"3","key":"19774_CR21","doi-asserted-by":"publisher","first-page":"2684","DOI":"10.11591\/ijece.v14i3.pp2684-2694","volume":"14","author":"H El Bourakkadi","year":"2024","unstructured":"El Bourakkadi H, Chemlal A, Tabti H, Kattass M, Jarjar A, Benazzi A (2024) Improved Vigenere approach incorporating pseudorandom affine functions for encrypting color images. Int J Electr Comput Eng (IJECE) 14(3):2684. https:\/\/doi.org\/10.11591\/ijece.v14i3.pp2684-2694","journal-title":"Int J Electr Comput Eng (IJECE)"},{"issue":"5","key":"19774_CR22","doi-asserted-by":"publisher","first-page":"12627","DOI":"10.1007\/s11042-023-16215-x","volume":"83","author":"H \u00c7elik","year":"2024","unstructured":"\u00c7elik H, Do\u011fan N (2024) A hybrid color image encryption method based on extended logistic map. Multimed Tools Appl 83(5):12627\u201312650","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"19774_CR23","doi-asserted-by":"publisher","first-page":"5823","DOI":"10.1007\/s00500-021-06567-7","volume":"26","author":"Y Qobbi","year":"2022","unstructured":"Qobbi Y, Jarjar A, Essaid M, Benazzi A (2022) Image encryption algorithm based on genetic operations and chaotic DNA encoding. Soft Comput 26(12):5823\u20135832","journal-title":"Soft Comput"},{"issue":"15","key":"19774_CR24","doi-asserted-by":"publisher","first-page":"11859","DOI":"10.1007\/s00521-019-04668-x","volume":"32","author":"S Suri","year":"2019","unstructured":"Suri S, Vijay R (2019) A Pareto-optimal evolutionary approach of image encryption using coupled map lattice and DNA. Neural Comput Appl 32(15):11859\u201311873","journal-title":"Neural Comput Appl"},{"key":"19774_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/6352021","volume":"2020","author":"F Yu","year":"2020","unstructured":"Yu F et al (2020) Chaos-based application of a novel multistable 5D memristive hyperchaotic system with coexisting multiple attractors. Complexity 2020:1\u201319","journal-title":"Complexity"},{"key":"19774_CR26","doi-asserted-by":"crossref","unstructured":"Chen X et al (2023) \"A chaotic color image encryption scheme based on improved Arnold scrambling and dynamic DNA encoding.\" Multimed Tools Appl 1\u201322","DOI":"10.1007\/s11042-023-14826-y"},{"issue":"11","key":"19774_CR27","doi-asserted-by":"publisher","first-page":"2585","DOI":"10.3390\/math11112585","volume":"11","author":"B Zhang","year":"2023","unstructured":"Zhang B, Liu L (2023) Chaos-based image encryption: review, application, and challenges. Mathematics 11(11):2585","journal-title":"Mathematics"},{"key":"19774_CR28","doi-asserted-by":"crossref","unstructured":"Yao X et al (2023) \"A novel image encryption scheme for DNA storage systems based on DNA hybridization and gene mutation.\" Interdiscip Sci: Comput Life Sci 1\u201314","DOI":"10.21203\/rs.3.rs-2000112\/v1"},{"issue":"3","key":"19774_CR29","doi-asserted-by":"publisher","first-page":"030501","DOI":"10.1088\/1674-1056\/ac8cdf","volume":"32","author":"X Gao","year":"2023","unstructured":"Gao X et al (2023) A color image encryption algorithm based on hyperchaotic map and DNA mutation. Chin Phys B 32(3):030501","journal-title":"Chin Phys B"},{"key":"19774_CR30","doi-asserted-by":"publisher","first-page":"136905","DOI":"10.1109\/ACCESS.2021.3118050","volume":"9","author":"RA Elmanfaloty","year":"2021","unstructured":"Elmanfaloty RA, Alnajim AM, Abou-Bakr E (2021) A finite precision implementation of an image encryption scheme based on DNA encoding and binarized chaotic cores. IEEE Access 9:136905\u2013136916","journal-title":"IEEE Access"},{"key":"19774_CR31","doi-asserted-by":"publisher","first-page":"81333","DOI":"10.1109\/ACCESS.2019.2920383","volume":"7","author":"S Khan","year":"2019","unstructured":"Khan S et al (2019) A new hybrid image encryption algorithm based on 2D-CA, FSM-DNA rule generator, and FSBI. IEEE Access 7:81333\u201381350","journal-title":"IEEE Access"},{"key":"19774_CR32","doi-asserted-by":"publisher","first-page":"83596","DOI":"10.1109\/ACCESS.2020.2991420","volume":"8","author":"Q Liu","year":"2020","unstructured":"Liu Q, Liu L (2020) Color image encryption algorithm based on DNA coding and double chaos system. IEEE Access 8:83596\u201383610","journal-title":"IEEE Access"},{"issue":"1","key":"19774_CR33","doi-asserted-by":"publisher","first-page":"94","DOI":"10.55145\/ajest.2023.01.01.0011","volume":"2","author":"SAS Almola","year":"2023","unstructured":"Almola SAS (2023) A review in use of 4D hyper chaotic systems and DNA for image encryption. Al-Salam J Eng Technol 2(1):94","journal-title":"Al-Salam J Eng Technol"},{"issue":"15","key":"19774_CR34","doi-asserted-by":"publisher","first-page":"23401","DOI":"10.1007\/s11042-022-14255-3","volume":"82","author":"D Zhang","year":"2023","unstructured":"Zhang D et al (2023) An image encryption algorithm based on joint RNA-level permutation and substitution. Multimed Tools Appl 82(15):23401\u201323426","journal-title":"Multimed Tools Appl"},{"key":"19774_CR35","doi-asserted-by":"crossref","unstructured":"Soltani M, Shakeri H, Houshmand M (2023) \"A robust hybrid algorithm for medical image cryptography using patient biometrics based on DNA and RNA computing.\"","DOI":"10.21203\/rs.3.rs-3314772\/v1"},{"key":"19774_CR36","unstructured":"Sun M et al (2023) \"Chaotic color image encryption algorithm based on RNA operations and heart shape chunking.\" IAENG Int J ComputSci 50(1)"},{"key":"19774_CR37","doi-asserted-by":"crossref","unstructured":"Tahbaz M, Shirgahi H, Yamaghani MR (2023) \"Evolutionary-based image encryption using magic square chaotic algorithm and RNA codons truth table.\" Multimed Tools Appl 1\u201324","DOI":"10.1007\/s11042-023-15677-3"},{"key":"19774_CR38","doi-asserted-by":"crossref","unstructured":"Zhao L et al (2023) \"Satellite image encryption based on RNA and 7D complex chaotic system.\" Visual Comput 1\u201321","DOI":"10.1007\/s00371-023-03128-x"},{"key":"19774_CR39","doi-asserted-by":"crossref","unstructured":"Talhaoui MZ (2021) A new one-dimensional cosine polynomial chaotic map and its use in image encryption. Visual Comput","DOI":"10.1007\/s00371-020-01822-8"},{"key":"19774_CR40","unstructured":"Kengnou AN (2021) Image encryption algorithm based on dynamic DNA coding operations and 3D chaotic systems. Multimed Tools \u2013 Springer"},{"key":"19774_CR41","doi-asserted-by":"crossref","unstructured":"Abid A et al (2022) \"Two enhanced feistel steps for medical image encryption.\" 2022 IEEE 3rd international conference on electronics, control, optimization and computer science (ICECOCS). IEEE","DOI":"10.1109\/ICECOCS55148.2022.9982938"},{"key":"19774_CR42","doi-asserted-by":"crossref","unstructured":"Wang S (2022) An image encryption scheme using a chaotic neural network and a network with multistable hyperchaos. Optik","DOI":"10.1016\/j.ijleo.2022.169758"},{"issue":"3","key":"19774_CR43","doi-asserted-by":"publisher","first-page":"1713","DOI":"10.1007\/s12652-021-03392-6","volume":"14","author":"PK Behera","year":"2023","unstructured":"Behera PK, Gangopadhyay S (2023) Evolving bijective S-boxes using hybrid adaptive genetic algorithm with optimal cryptographic properties. J Ambient Intell Humanized Comput 14(3):1713\u20131730","journal-title":"J Ambient Intell Humanized Comput"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19774-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19774-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19774-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T10:26:52Z","timestamp":1748082412000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19774-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,17]]},"references-count":43,"journal-issue":{"issue":"18","published-online":{"date-parts":[[2025,5]]}},"alternative-id":["19774"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19774-9","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,17]]},"assertion":[{"value":"15 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The present paper authors declare the absence of any conflicts among them, and neither public nor private organizations nor laboratories have offered funding for this research, thereby minimizing any potential conflicts of interest. Also, the present article does not involve any experiments or research with humans or animals.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}