{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:56:39Z","timestamp":1773932199304,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T00:00:00Z","timestamp":1720224000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T00:00:00Z","timestamp":1720224000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19787-4","type":"journal-article","created":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T05:01:26Z","timestamp":1720242086000},"page":"17893-17906","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Constructing a non-degenerate 2D chaotic map with application in irreversible PRNG"],"prefix":"10.1007","volume":"84","author":[{"given":"Qingzhen","family":"Zhou","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,6]]},"reference":[{"key":"19787_CR1","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.apm.2023.03.038","volume":"120","author":"T Liu","year":"2023","unstructured":"Liu T, Tong X et al (2023) A novel Devaney chaotic map with uniform trajectory for color image encryption[J]. Appl Math Model 120:153\u2013174","journal-title":"Appl Math Model"},{"issue":"12","key":"19787_CR2","doi-asserted-by":"publisher","first-page":"15997","DOI":"10.1007\/s11042-018-6996-z","volume":"78","author":"H Liu","year":"2019","unstructured":"Liu H, Wen F, Kadir A (2019) Construction of a new 2D Chebyshev-Sine map and its application to color image encryption[J]. Multimedia Tools and Applications 78(12):15997\u201316010","journal-title":"Multimedia Tools and Applications"},{"issue":"12","key":"19787_CR3","doi-asserted-by":"publisher","first-page":"2050173","DOI":"10.1142\/S0218127420501734","volume":"30","author":"H Liu","year":"2020","unstructured":"Liu H, Kadir A, Xu C (2020) Color image encryption with cipher feedback and coupling chaotic map. International Journal of Bifurcation and Chaos 30(12):2050173","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"19787_CR4","doi-asserted-by":"publisher","first-page":"103299","DOI":"10.1016\/j.jisa.2022.103299","volume":"69","author":"M Sharma","year":"2022","unstructured":"Sharma M, Ranjan RK, Bharti V (2022) A pseudo-random bit generator based on chaotic maps enhanced with a bit-XOR operation[J]. Journal of Information Security and Applications 69:103299","journal-title":"Journal of Information Security and Applications"},{"key":"19787_CR5","first-page":"3806","volume":"65","author":"S Keshari","year":"2022","unstructured":"Keshari S, Sharma N, Srivastava R (2022) A Modified Discretized Chaotic Map and Its Generated Pseudo Binary Random Number[J]. Materials Today: Proceedings 65:3806\u20133813","journal-title":"Materials Today: Proceedings"},{"key":"19787_CR6","doi-asserted-by":"publisher","first-page":"164925","DOI":"10.1016\/j.ijleo.2020.164925","volume":"216","author":"H Liu","year":"2020","unstructured":"Liu H, Xu Y, Ma C (2020) Chaos based image hybrid encryption algorithm using key stretching and hash feedback. Optik 216:164925","journal-title":"Optik"},{"key":"19787_CR7","first-page":"83","volume":"360","author":"H Liu","year":"2019","unstructured":"Liu H, Zhang Y, Kadir A et al (2019) Image encryption using complex hyper chaotic system by injecting impulse into parameters[J]. Appl Math Comput 360:83\u201393","journal-title":"Appl Math Comput"},{"issue":"16","key":"19787_CR8","doi-asserted-by":"publisher","first-page":"11077","DOI":"10.1007\/s00500-021-05849-4","volume":"25","author":"H Liu","year":"2021","unstructured":"Liu H, Wang X, Kadir A (2021) Constructing chaos-based hash function via parallel impulse perturbation. Soft Comput 25(16):11077\u201311086","journal-title":"Soft Comput"},{"issue":"16\u201317","key":"19787_CR9","first-page":"3239","volume":"231","author":"C Dong","year":"2022","unstructured":"Dong C (2022) Constructing a discrete memristor chaotic map and application to hash function with dynamic S-Box. European Physical Journal: Special Topics 231(16\u201317):3239\u20133247","journal-title":"European Physical Journal: Special Topics"},{"key":"19787_CR10","first-page":"125153","volume":"376","author":"H Liu","year":"2020","unstructured":"Liu H, Kadir A, Xu C (2020) Cryptanalysis and constructing S-Box based on chaotic map and backtracking[J]. Appl Math Comput 376:125153","journal-title":"Appl Math Comput"},{"issue":"5","key":"19787_CR11","first-page":"628","volume":"29","author":"C Dong","year":"2014","unstructured":"Dong C (2014) Color image encryption using one-time keys and coupled chaotic systems. Signal Processing: Image Communicationthis 29(5):628\u2013640","journal-title":"Signal Processing: Image Communicationthis"},{"issue":"13","key":"19787_CR12","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1142\/S0218127416502199","volume":"26","author":"J He","year":"2016","unstructured":"He J, Yu S, Cai J (2016) Numerical analysis and improved algorithms for Lyapunov-exponent calculation of discrete-time chaotic systems[J]. International Journal of Bifurcation and Chaos 26(13):332\u2013334","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"19787_CR13","doi-asserted-by":"publisher","first-page":"102071","DOI":"10.1016\/j.vlsi.2023.102071","volume":"93","author":"R Liu","year":"2023","unstructured":"Liu R, Liu H, Zhao M (2023) Reveal the correlation between randomness and Lyapunov exponent of n-dimensional non-degenerate hyper chaotic map. Integration 93:102071","journal-title":"Integration"},{"issue":"2","key":"19787_CR14","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1109\/TII.2019.2923553","volume":"16","author":"Z Hua","year":"2019","unstructured":"Hua Z, Zhou Y, Bao B (2019) Two-dimensional sine chaotification system with hardware implementation[J]. IEEE Trans Industr Inf 16(2):887\u2013897","journal-title":"IEEE Trans Industr Inf"},{"issue":"10","key":"19787_CR15","doi-asserted-by":"publisher","first-page":"2150146","DOI":"10.1142\/S0218127421501467","volume":"31","author":"Y Si","year":"2021","unstructured":"Si Y, Liu H, Chen Y (2021) Constructing keyed strong S-Box using an enhanced quadratic map[J]. International Journal of Bifurcation and Chaos 31(10):2150146","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"19787_CR16","doi-asserted-by":"publisher","first-page":"108745","DOI":"10.1016\/j.sigpro.2022.108745","volume":"202","author":"S Gao","year":"2023","unstructured":"Gao S, Wu R, Wang X et al (2023) A 3D model encryption scheme based on a cascaded chaotic system[J]. Signal Process 202:108745","journal-title":"Signal Process"},{"issue":"6","key":"19787_CR17","doi-asserted-by":"publisher","first-page":"H2039","DOI":"10.1152\/ajpheart.2000.278.6.H2039","volume":"278","author":"J Richman","year":"2000","unstructured":"Richman J, Randall M (2000) Physiological time-series analysis using approximate entropy and sample entropy[J]. Am J Physiol Heart Circ Physiol 278(6):H2039\u2013H2049","journal-title":"Am J Physiol Heart Circ Physiol"},{"issue":"10","key":"19787_CR18","doi-asserted-by":"publisher","first-page":"5069","DOI":"10.5194\/hess-22-5069-2018","volume":"22","author":"C Di","year":"2018","unstructured":"Di C, Wang T, Yang X et al (2018) An improved Grassberger-Procaccia algorithm for analysis of climate system complexity[J]. Hydrol Earth Syst Sci 22(10):5069\u20135079","journal-title":"Hydrol Earth Syst Sci"},{"issue":"2","key":"19787_CR19","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/TIFS.2012.2185227","volume":"7","author":"F Pareschi","year":"2012","unstructured":"Pareschi F, Rovatti R, Setti G (2012) On statistical tests for randomness included in the NIST SP800-22 test suite and based on the binomial distribution[J]. IEEE Trans Inf Forensics Secur 7(2):491\u2013505","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"19787_CR20","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.vlsi.2023.05.006","volume":"92","author":"M Zhao","year":"2023","unstructured":"Zhao M, Liu H, Niu Y (2023) Batch generating keyed strong S-Boxes with high nonlinearity using 2D hyper chaotic map. Integration 92:91\u201398","journal-title":"Integration"},{"issue":"11","key":"19787_CR21","doi-asserted-by":"publisher","first-page":"2250163","DOI":"10.1142\/S0218127422501632","volume":"32","author":"H Liu","year":"2022","unstructured":"Liu H, Wang X, Zhao M et al (2022) Constructing strong S-Box by 2D chaotic map with application to irreversible parallel key expansion[J]. International Journal of Bifurcation and Chaos 32(11):2250163","journal-title":"International Journal of Bifurcation and Chaos"},{"issue":"7","key":"19787_CR22","doi-asserted-by":"publisher","first-page":"2250095","DOI":"10.1142\/S021812742250095X","volume":"32","author":"Y Si","year":"2022","unstructured":"Si Y, Liu H, Chen Y (2022) Constructing a 3D exponential hyperchaotic map and applying to PRNG[J]. International Journal of Bifurcation and Chaos 32(7):2250095","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"19787_CR23","doi-asserted-by":"publisher","first-page":"23899","DOI":"10.1007\/s11042-022-12069-x","volume":"82","author":"H Liu","year":"2023","unstructured":"Liu H, Liu J, Ma C (2023) Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption. Multimedia Tools and Applications 82:23899\u201323914","journal-title":"Multimedia Tools and Applications"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19787-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19787-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19787-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T08:41:54Z","timestamp":1748076114000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19787-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,6]]},"references-count":23,"journal-issue":{"issue":"17","published-online":{"date-parts":[[2025,5]]}},"alternative-id":["19787"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19787-4","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,6]]},"assertion":[{"value":"23 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 July 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that all relevant ethical safeguards have been met in relation to patient or subject protection, or animal experimentation.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical statement"}},{"value":"We declare that we have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest (COI) statement"}}]}}