{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T12:40:47Z","timestamp":1763728847475,"version":"3.44.0"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"23","license":[{"start":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T00:00:00Z","timestamp":1726185600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T00:00:00Z","timestamp":1726185600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100007102","name":"Zagazig University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100007102","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>People transmit millions of digital images daily over various networks, where securing these images is a big challenge. Image encryption is a successful approach widely used in securing digital images while transmitting. Researchers developed different encryption techniques that focus on securing individual images. Recently, encryption of multiple images has gained more interest as an emerging encryption approach. In this paper, we proposed a four-tier technique for multiple image encryption (MIE) to increase the transmission speed and improve digital image security. First, we attached the plain images to create an augmented image. Second, the randomized augmented image is obtained by randomly changing the position of each plain image. Third, we scrambled the randomized augmented image using the zigzag pattern, rotation, and random permutation between blocks. Finally, we diffuse the scrambled augmented image using an Altered Sine-logistic-based Tent map (ASLT). We draw a flowchart, write a pseudo-code, and present an illustrative example to simplify the proposed method and make it easy to understand. Many experiments were performed to evaluate this Four-Tier technique, and the results show that this technique is extremely effective and secure to withstand various attacks.<\/jats:p>","DOI":"10.1007\/s11042-024-20125-x","type":"journal-article","created":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T23:45:17Z","timestamp":1726184717000},"page":"26797-26815","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A new four-tier technique for efficient multiple images encryption"],"prefix":"10.1007","volume":"84","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8065-8977","authenticated-orcid":false,"given":"Khalid M.","family":"Hosny","sequence":"first","affiliation":[]},{"given":"Sara T.","family":"Kamal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,13]]},"reference":[{"key":"20125_CR1","doi-asserted-by":"publisher","first-page":"47425","DOI":"10.1109\/ACCESS.2021.3068211","volume":"9","author":"KM Hosny","year":"2021","unstructured":"Hosny KM, Darwish MM, Fouda MM (2021) Robust color images watermarking using new fractional-order exponent moments. IEEE Access 9:47425\u201347435","journal-title":"IEEE Access"},{"key":"20125_CR2","doi-asserted-by":"publisher","first-page":"9471","DOI":"10.1007\/s13369-021-06254-7","volume":"47","author":"Hani Alquhayz","year":"2022","unstructured":"Hani Alquhayz, Raza B (2022) Watermarking techniques for the security of medical images and image sequences. Arab J Sci Eng 47:9471\u20139488","journal-title":"Arab J Sci Eng"},{"key":"20125_CR3","doi-asserted-by":"publisher","first-page":"1859","DOI":"10.1007\/s13369-022-06960-w","volume":"48","author":"SA Aiman Jan","year":"2023","unstructured":"Aiman Jan SA, Parah M, Hassan, Bilal A, Malik (2023) Realization of efficient Steganographic Scheme using hybrid edge detection and Chaos. Arab J Sci Eng 48:1859\u20131872","journal-title":"Arab J Sci Eng"},{"issue":"9","key":"20125_CR4","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.3390\/electronics10091066","volume":"10","author":"KM Hosny","year":"2021","unstructured":"Hosny KM, Kamal ST, Darwish MM, Papakostas GA (2021) New image encryption algorithm using hyperchaotic system and Fibonacci q-matrix. Electronics 10(9):1066. https:\/\/doi.org\/10.3390\/electronics10091066","journal-title":"Electronics"},{"issue":"2","key":"20125_CR5","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1007\/s12652-021-03675-y","volume":"13","author":"KM Hosny","year":"2022","unstructured":"Hosny KM, Kamal ST, Darwish MM (2022) Novel encryption for color images using fractional-order hyperchaotic system. J Ambient Intell Humaniz Comput 13(2):973\u2013988","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"20125_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-023-07715-x)","author":"JDD Nkapkop","year":"2023","unstructured":"Gabriel Armand Gakam Tegue, Nkapkop JDD, Abdel MA, Tsafack N, Musheer A, Signing FV (2023) Joseph Yves Effa, and Jean Gaston Tamba, a novel image encryption Scheme combining a dynamic S-Box generator and a New Chaotic Oscillator with Hidden Behavior. Arab J Sci Eng. https:\/\/doi.org\/10.1007\/s13369-023-07715-x)","journal-title":"Arab J Sci Eng"},{"key":"20125_CR7","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s11831-018-9298-8","volume":"27","author":"M Kaur","year":"2020","unstructured":"Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods Eng 27:15\u201343","journal-title":"Arch Comput Methods Eng"},{"issue":"18","key":"20125_CR8","doi-asserted-by":"publisher","first-page":"25101","DOI":"10.1007\/s11042-022-11956-7","volume":"81","author":"M Magdy","year":"2022","unstructured":"Magdy M, Hosny KM, Ghali NI, Ghoniemy S (2022) Security of medical images for telemedicine: a systematic review. Multimedia Tools Appl 81(18):25101\u201325145","journal-title":"Multimedia Tools Appl"},{"key":"20125_CR9","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1007\/s00371-021-02382-1","volume":"39","author":"KM Hosny","year":"2023","unstructured":"Hosny KM, Kamal ST, Darwish MM (2023) A novel color image encryption based on fractional shifted Gegenbauer moments and 2D logistic-sine map. Visual Comput 39:1027\u20131044","journal-title":"Visual Comput"},{"key":"20125_CR10","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1016\/j.compeleceng.2016.12.025","volume":"62","author":"X Zhang","year":"2017","unstructured":"Zhang X, Wang X (2017) Multiple-image encryption algorithm based on mixed image element and chaos. Comput Electr Eng 62:401\u2013413","journal-title":"Comput Electr Eng"},{"key":"20125_CR11","doi-asserted-by":"publisher","first-page":"7841","DOI":"10.1007\/s11042-018-6496-1","volume":"78","author":"X Zhang","year":"2019","unstructured":"Zhang X, Wang X (2019) Multiple-image encryption algorithm based on DNA encoding and chaotic system. Multimed Tools App 78:7841\u20137869","journal-title":"Multimed Tools App"},{"key":"20125_CR12","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.optlaseng.2017.06.015","volume":"107","author":"Z Wang Xingyuan","year":"2018","unstructured":"Wang Xingyuan Z, Xiaoqiang W, Xiangjun Z, Yingqian (2018) Image encryption algorithm based on multiple mixed hash functions and cyclic shift. Opt Lasers Eng 107:370\u2013379","journal-title":"Opt Lasers Eng"},{"issue":"10","key":"20125_CR13","doi-asserted-by":"publisher","first-page":"801","DOI":"10.3390\/e20100801","volume":"20","author":"AA Karawia","year":"2018","unstructured":"Karawia AA (2018) Encryption Algorithm of Multiple-Image Using Mixed Image Elements and Two Dimensional Chaotic Economic Map. Entropy 20(10):801. https:\/\/doi.org\/10.3390\/e20100801","journal-title":"Entropy"},{"key":"20125_CR14","first-page":"111","volume":"40","author":"K Abhimanyu Kumar Patro and Bibhudendra Acharya","year":"2018","unstructured":"K Abhimanyu Kumar Patro and Bibhudendra Acharya (2018) Secure multi-level permutation operation based multiple colour image encryption. J Inform Secur Appl 40:111\u2013133","journal-title":"J Inform Secur Appl"},{"key":"20125_CR15","doi-asserted-by":"publisher","first-page":"12959","DOI":"10.1007\/s11042-019-08470-8","volume":"79","author":"KAK Patro","year":"2020","unstructured":"Patro KAK, Acharya B (2020) A novel multi-dimensional multiple image encryption technique. Multimed Tools App 79:12959\u201312994","journal-title":"Multimed Tools App"},{"key":"20125_CR16","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.optlaseng.2018.11.017","volume":"115","author":"FG Rasul Enayatfar","year":"2019","unstructured":"Rasul Enayatfar FG, Guimar\u00e3es, Siarry P (2019) Index-based permutation-diffusion in multiple-image encryption using DNA sequence. Opt Lasers Eng 115:131\u2013140","journal-title":"Opt Lasers Eng"},{"key":"20125_CR17","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.ijleo.2018.10.025","volume":"179","author":"M Zarebnia","year":"2019","unstructured":"Zarebnia M, Pakmanesh H, Parvaz R (2019) A fast multiple-image encryption algorithm based on hybrid chaotic systems for grayscale images, Optik. 179:761\u2013773","journal-title":"Optik"},{"key":"20125_CR18","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1049\/iet-ipr.2019.0771","volume":"14","author":"H Zhang","year":"2020","unstructured":"Zhang H, Wang Xiao-qing, Wang Xing-yuan, Peng-fei Y (2020) Novel multiple images encryption algorithm using CML system and DNA encoding, IET Image Processing, pp. 518\u2013529","journal-title":"IET Image Processing"},{"key":"20125_CR19","first-page":"102592","volume":"54","author":"Tanveerul Haq and Tariq Shah","year":"2020","unstructured":"Tanveerul Haq and Tariq Shah (2020) Algebra-chaos amalgam and DNA transform based multiple digital image encryption. J Inform Secur Appl, 54, Article 102592","journal-title":"J Inform Secur Appl"},{"key":"20125_CR20","doi-asserted-by":"publisher","first-page":"15737","DOI":"10.1038\/s41598-021-94748-7","volume":"11","author":"X Gao","year":"2021","unstructured":"Gao X, Yu J, Banerjee S, Huizhen Yan, and, Mou J (2021) A new image encryption scheme based on fractional-order hyperchaotic system and multiple image fusion. Sci Rep, 11, Article 15737","journal-title":"Sci Rep"},{"key":"20125_CR21","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1007\/s11071-021-07192-7","volume":"108","author":"J Xinyu Gao","year":"2022","unstructured":"Xinyu Gao J, Mou L, Xiong Y, Sha HY, Cao Y (2022) A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dyn 108:613\u2013636","journal-title":"Nonlinear Dyn"},{"key":"20125_CR22","doi-asserted-by":"publisher","first-page":"20021","DOI":"10.1007\/s11042-022-12554-3","volume":"81","author":"X Zhang","year":"2022","unstructured":"Zhang X, Zhang L (2022) Multiple-image encryption algorithm based on chaos and gene fusion. Multimed Tools App 81:20021\u201320042","journal-title":"Multimed Tools App"},{"issue":"1","key":"20125_CR23","doi-asserted-by":"publisher","first-page":"11","DOI":"10.12720\/jcm.17.1.11-16","volume":"17","author":"I Aouissaoui","year":"2022","unstructured":"Aouissaoui I, Bakir T, Sakly A, Femmam S (2022) Improved one-Dimensional Piecewise Chaotic maps for Information Security. J Commun 17(1):11\u201316","journal-title":"J Commun"},{"key":"20125_CR24","doi-asserted-by":"publisher","first-page":"107073","DOI":"10.1016\/j.optlastec.2021.107073","volume":"141","author":"X Zhang","year":"2021","unstructured":"Zhang X, Hu Y (2021) Multiple-image encryption algorithm based on the 3D scrambling model and dynamic DNA coding. Opt Laser Technol 141:107073","journal-title":"Opt Laser Technol"},{"key":"20125_CR25","doi-asserted-by":"publisher","first-page":"107652","DOI":"10.1016\/j.sigpro.2020.107652","volume":"175","author":"H Ye","year":"2020","unstructured":"Ye H, Zhou N, Gong L (2020) Multi-image compression-encryption scheme based on quaternion discrete fractional Hartley transform and improved pixel adaptive diffusion. Signal Process 175:107652\u2013107666","journal-title":"Signal Process"},{"key":"20125_CR26","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. J Sel Areas Telecommunications (JSAT), 31\u201338","journal-title":"J Sel Areas Telecommunications (JSAT)"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20125-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-20125-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20125-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T22:15:52Z","timestamp":1757110552000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-20125-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,13]]},"references-count":26,"journal-issue":{"issue":"23","published-online":{"date-parts":[[2025,7]]}},"alternative-id":["20125"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-20125-x","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,9,13]]},"assertion":[{"value":"7 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No conflict of interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interests"}}]}}