{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T16:53:12Z","timestamp":1772988792656,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"28","license":[{"start":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T00:00:00Z","timestamp":1737331200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T00:00:00Z","timestamp":1737331200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-20532-0","type":"journal-article","created":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T08:34:39Z","timestamp":1737362079000},"page":"34303-34329","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A novel image cipher system based on hybrid vigenere-affine approach"],"prefix":"10.1007","volume":"84","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-0203-2769","authenticated-orcid":false,"given":"Hamid","family":"El Bourakkadi","sequence":"first","affiliation":[]},{"given":"Abdelhakim","family":"Chemlal","sequence":"additional","affiliation":[]},{"given":"Hassan","family":"Tabti","sequence":"additional","affiliation":[]},{"given":"Mourad","family":"Kattass","sequence":"additional","affiliation":[]},{"given":"Abdellatif","family":"Jarjar","sequence":"additional","affiliation":[]},{"given":"Abdelhamid","family":"Benazzi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,20]]},"reference":[{"issue":"2","key":"20532_CR1","doi-asserted-by":"publisher","first-page":"5531","DOI":"10.1007\/s11042-023-15806-y","volume":"83","author":"P Aberna","year":"2024","unstructured":"Aberna P, Agilandeeswari L (2024) Digital image and video watermarking: methodologies, attacks, applications, and future directions. Multimed Tools Appl 83(2):5531\u20135591. https:\/\/doi.org\/10.1007\/s11042-023-15806-y","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"20532_CR2","doi-asserted-by":"publisher","first-page":"3397","DOI":"10.1007\/s11042-023-15707-0","volume":"83","author":"A Durdu","year":"2024","unstructured":"Durdu A (2024) Image transfer with secure communications application using a new reversible chaotic image encryption. Multimed Tools Appl 83(2):3397\u20133424. https:\/\/doi.org\/10.1007\/s11042-023-15707-0","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"20532_CR3","doi-asserted-by":"publisher","first-page":"20861","DOI":"10.1007\/s11042-023-16240-w","volume":"83","author":"H Tong","year":"2023","unstructured":"Tong H, Li T, Xu Y, Su X, Qiao G (2023) Chaotic coyote optimization algorithm for image encryption and steganography. Multimed Tools Appl 83(7):20861\u201320887. https:\/\/doi.org\/10.1007\/s11042-023-16240-w","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"20532_CR4","doi-asserted-by":"publisher","first-page":"12627","DOI":"10.1007\/s11042-023-16215-x","volume":"83","author":"H \u00c7elik","year":"2023","unstructured":"\u00c7elik H, Do\u011fan N (2023) A hybrid color image encryption method based on extended logistic map. Multimed Tools Appl 83(5):12627\u201312650. https:\/\/doi.org\/10.1007\/s11042-023-16215-x","journal-title":"Multimed Tools Appl"},{"key":"20532_CR5","doi-asserted-by":"publisher","unstructured":"Ashour AS, Dey N (2017) \u201cSecurity of Multimedia Contents: A Brief,\u201d pp. 3\u201314. https:\/\/doi.org\/10.1007\/978-3-319-44790-2_1.","DOI":"10.1007\/978-3-319-44790-2_1"},{"key":"20532_CR6","doi-asserted-by":"publisher","unstructured":"Rahman H, Alam KM, Morimoto Y (2024) \u201cA multi-stage encryption technique using asymmetric and various symmetric ciphers,\u201d pp. 323\u2013335. https:\/\/doi.org\/10.1007\/978-3-031-62217-5_27","DOI":"10.1007\/978-3-031-62217-5_27"},{"issue":"2","key":"20532_CR7","doi-asserted-by":"publisher","first-page":"373","DOI":"10.3390\/sym14020373","volume":"14","author":"Q Lu","year":"2022","unstructured":"Lu Q, Yu L, Zhu C (2022) Symmetric Image Encryption Algorithm Based on a New Product Trigonometric Chaotic Map. Symmetry (Basel) 14(2):373. https:\/\/doi.org\/10.3390\/sym14020373","journal-title":"Symmetry (Basel)"},{"key":"20532_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/7203237","volume":"2022","author":"Z Lu","year":"2022","unstructured":"Lu Z (2022) Encryption Management of Accounting Data Based on DES Algorithm of Wireless Sensor Network. Wirel Commun Mob Comput 2022:1\u201314. https:\/\/doi.org\/10.1155\/2022\/7203237","journal-title":"Wirel Commun Mob Comput"},{"issue":"2","key":"20532_CR9","doi-asserted-by":"publisher","first-page":"1170","DOI":"10.1007\/s12596-023-01232-8","volume":"53","author":"A HadjBrahim","year":"2024","unstructured":"HadjBrahim A, Ali Pacha A, Hadj Said N (2024) An image encryption scheme based on a modified AES algorithm by using a variable S-box. J Optics 53(2):1170\u20131185. https:\/\/doi.org\/10.1007\/s12596-023-01232-8","journal-title":"J Optics"},{"key":"20532_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-024-18347-0","volume":"9","author":"Y Kumar","year":"2024","unstructured":"Kumar Y, Guleria V (2024) A novel multiple image encryption technique based on asymmetric cryptosystem with HCM in frequency domain. Multimed Tools Appl 9:1\u201326. https:\/\/doi.org\/10.1007\/s11042-024-18347-0","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"20532_CR11","doi-asserted-by":"publisher","first-page":"155014772092577","DOI":"10.1177\/1550147720925772","volume":"16","author":"S Ali","year":"2020","unstructured":"Ali S et al (2020) An efficient cryptographic technique using modified Diffie-Hellman in wireless sensor networks. Int J Distrib Sens Netw 16(6):155014772092577. https:\/\/doi.org\/10.1177\/1550147720925772","journal-title":"Int J Distrib Sens Netw"},{"key":"20532_CR12","doi-asserted-by":"publisher","unstructured":"Jin A, Li X, Xiong Q (2023) \u201cSecurity compressed sensing image encryption algorithm based on elliptic curve,\u201d pp. 350\u2013360. https:\/\/doi.org\/10.1007\/978-981-99-5968-6_25.","DOI":"10.1007\/978-981-99-5968-6_25"},{"key":"20532_CR13","doi-asserted-by":"publisher","first-page":"157106","DOI":"10.1109\/ACCESS.2021.3128177","volume":"9","author":"M Ramzan","year":"2021","unstructured":"Ramzan M, Shah T, Hazzazi MM, Aljaedi A, Alharbi AR (2021) Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption. IEEE Access 9:157106\u2013157123. https:\/\/doi.org\/10.1109\/ACCESS.2021.3128177","journal-title":"IEEE Access"},{"key":"20532_CR14","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1016\/j.aej.2022.10.066","volume":"66","author":"S Du","year":"2023","unstructured":"Du S, Ye G (2023) IWT and RSA based asymmetric image encryption algorithm. Alex Eng J 66:979\u2013991. https:\/\/doi.org\/10.1016\/j.aej.2022.10.066","journal-title":"Alex Eng J"},{"issue":"5","key":"20532_CR15","doi-asserted-by":"publisher","first-page":"108","DOI":"10.3390\/fi11050108","volume":"11","author":"A Abro","year":"2019","unstructured":"Abro A, Deng Z, Memon KA (2019) A Lightweight Elliptic-Elgamal-Based Authentication Scheme for Secure Device-to-Device Communication. Future Internet 11(5):108. https:\/\/doi.org\/10.3390\/fi11050108","journal-title":"Future Internet"},{"issue":"5","key":"20532_CR16","doi-asserted-by":"publisher","first-page":"1975","DOI":"10.1007\/s00371-022-02459-5","volume":"39","author":"P Fang","year":"2023","unstructured":"Fang P, Liu H, Wu C, Liu M (2023) A survey of image encryption algorithms based on chaotic system. Vis Comput 39(5):1975\u20132003. https:\/\/doi.org\/10.1007\/s00371-022-02459-5","journal-title":"Vis Comput"},{"issue":"4","key":"20532_CR17","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1007\/s10207-022-00588-5","volume":"21","author":"U Zia","year":"2022","unstructured":"Zia U et al (2022) Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains. Int J Inf Secur 21(4):917\u2013935. https:\/\/doi.org\/10.1007\/s10207-022-00588-5","journal-title":"Int J Inf Secur"},{"key":"20532_CR18","doi-asserted-by":"publisher","first-page":"168955","DOI":"10.1016\/j.ijleo.2022.168955","volume":"258","author":"X Wang","year":"2022","unstructured":"Wang X, Guan N, Liu P (2022) A selective image encryption algorithm based on a chaotic model using modular sine arithmetic. Optik (Stuttg) 258:168955. https:\/\/doi.org\/10.1016\/j.ijleo.2022.168955","journal-title":"Optik (Stuttg)"},{"issue":"09","key":"20532_CR19","doi-asserted-by":"publisher","first-page":"1850115","DOI":"10.1142\/S0217984918501154","volume":"32","author":"M Kaur","year":"2018","unstructured":"Kaur M, Kumar V (2018) Fourier\u2013Mellin moment-based intertwining map for image encryption. Mod Phys Lett B 32(09):1850115. https:\/\/doi.org\/10.1142\/S0217984918501154","journal-title":"Mod Phys Lett B"},{"issue":"7","key":"20532_CR20","doi-asserted-by":"publisher","first-page":"535","DOI":"10.3390\/e20070535","volume":"20","author":"L Huang","year":"2018","unstructured":"Huang L, Cai S, Xiao M, Xiong X (2018) A Simple Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and Diffusion. Entropy 20(7):535. https:\/\/doi.org\/10.3390\/e20070535","journal-title":"Entropy"},{"key":"20532_CR21","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.ins.2022.05.032","volume":"605","author":"L Teng","year":"2022","unstructured":"Teng L, Wang X, Xian Y (2022) Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion. Inf Sci (N Y) 605:71\u201385. https:\/\/doi.org\/10.1016\/j.ins.2022.05.032","journal-title":"Inf Sci (N Y)"},{"key":"20532_CR22","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.chaos.2016.12.018","volume":"95","author":"\u00dc \u00c7avu\u015fo\u011flu","year":"2017","unstructured":"\u00c7avu\u015fo\u011flu \u00dc, Ka\u00e7ar S, Pehlivan I, Zengin A (2017) Secure image encryption algorithm design using a novel chaos based S-Box. Chaos Solitons Fractals 95:92\u2013101. https:\/\/doi.org\/10.1016\/j.chaos.2016.12.018","journal-title":"Chaos Solitons Fractals"},{"issue":"18","key":"20532_CR23","doi-asserted-by":"publisher","first-page":"26535","DOI":"10.1007\/s11042-022-12139-0","volume":"81","author":"TM Hoang","year":"2022","unstructured":"Hoang TM (2022) A novel design of multiple image encryption using perturbed chaotic map. Multimed Tools Appl 81(18):26535\u201326589. https:\/\/doi.org\/10.1007\/s11042-022-12139-0","journal-title":"Multimed Tools Appl"},{"key":"20532_CR24","doi-asserted-by":"publisher","unstructured":"Jarjar M, Najah S, Zenkouar K, Hraoui S (2020) \u201cFurther improvement of the HILL method applied in image encryption,\u201d in 2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET), IEEE pp. 1\u20136. https:\/\/doi.org\/10.1109\/IRASET48871.2020.9092046.","DOI":"10.1109\/IRASET48871.2020.9092046"},{"issue":"3","key":"20532_CR25","doi-asserted-by":"publisher","first-page":"1787","DOI":"10.11591\/ijeecs.v34.i3.pp1787-1799","volume":"34","author":"H El Bourakkadi","year":"2024","unstructured":"El Bourakkadi H, Chemlal A, Tabti H, Kattass M, Jarjar A, Benazzi A (2024) Improved vigenere using affine functions surrounded by two genetic crossovers for image encryption. Indo J Elect Eng Comput Sci 34(3):1787. https:\/\/doi.org\/10.11591\/ijeecs.v34.i3.pp1787-1799","journal-title":"Indo J Elect Eng Comput Sci"},{"issue":"3","key":"20532_CR26","doi-asserted-by":"publisher","first-page":"2684","DOI":"10.11591\/ijece.v14i3.pp2684-2694","volume":"14","author":"H El Bourakkadi","year":"2024","unstructured":"El Bourakkadi H, Chemlal A, Tabti H, Kattass M, Jarjar A, Benazzi A (2024) Improved Vigenere approach incorporating pseudorandom affine functions for encrypting color images. Int J Elect Comput Eng (IJECE) 14(3):2684. https:\/\/doi.org\/10.11591\/ijece.v14i3.pp2684-2694","journal-title":"Int J Elect Comput Eng (IJECE)"},{"issue":"1","key":"20532_CR27","doi-asserted-by":"publisher","first-page":"201","DOI":"10.18280\/ijsse.140120","volume":"14","author":"H Tabti","year":"2024","unstructured":"Tabti H, EL Bourakkadi H, Chemlal A, Jarjar A, Zenkouar K, Najah S (2024) Genetic Crossover at the RNA Level for Secure Medical Image Encryption. Int J Safety Sec Eng 14(1):201\u2013216. https:\/\/doi.org\/10.18280\/ijsse.140120","journal-title":"Int J Safety Sec Eng"},{"key":"20532_CR28","doi-asserted-by":"publisher","unstructured":"Jarjar M, Abdellah A, Rrghout H, Kattass M, Jarjar A, Benazzi A (2024) Multiple image encryption acting at the RNA level. Med Imag Proc Technol 7(1). https:\/\/doi.org\/10.24294\/mipt.v7i1.3001.","DOI":"10.24294\/mipt.v7i1.3001"},{"key":"20532_CR29","doi-asserted-by":"publisher","unstructured":"Abid A, Qobbi Y, Benazzi A, Jarjar M, Jarjar A (2022) \u201cTwo Enhanced Feistel Steps for Medical Image Encryption,\u201d in 2022 IEEE 3rd International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS), IEEE pp. 1\u20134. https:\/\/doi.org\/10.1109\/ICECOCS55148.2022.9982938.","DOI":"10.1109\/ICECOCS55148.2022.9982938"},{"issue":"1","key":"20532_CR30","doi-asserted-by":"publisher","first-page":"15","DOI":"10.18280\/ijsse.140102","volume":"14","author":"A Abid","year":"2024","unstructured":"Abid A, Jarjar M, Kattass M, Rrghout H, Jarjar A, Benazzi A (2024) Genetic Algorithm Using Feistel and Genetic Operator Acting at the Bit Level for Images Encryption. Int J Safety Sec Eng 14(1):15\u201327. https:\/\/doi.org\/10.18280\/ijsse.140102","journal-title":"Int J Safety Sec Eng"},{"key":"20532_CR31","doi-asserted-by":"publisher","unstructured":"Abdellah A, Jarjar M, Benazzi A, Jarjar A, Qobbi Y, El Kaddouhi S (2023) \u201cVigen\u00e8re implemented in two chaotic feistel laps for medical images encryption followed by genetic mutation,\u201d pp. 824\u2013830. https:\/\/doi.org\/10.1007\/978-3-031-26254-8_120.","DOI":"10.1007\/978-3-031-26254-8_120"},{"issue":"4","key":"20532_CR32","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s13319-015-0068-1","volume":"6","author":"M Machkour","year":"2015","unstructured":"Machkour M, Saaidi A, Benmaati ML (2015) A Novel Image Encryption Algorithm Based on the Two-Dimensional Logistic Map and the Latin Square Image Cipher. 3D Research 6(4):36. https:\/\/doi.org\/10.1007\/s13319-015-0068-1","journal-title":"3D Research"},{"key":"20532_CR33","doi-asserted-by":"publisher","first-page":"169430","DOI":"10.1016\/j.ijleo.2022.169430","volume":"265","author":"M Demirta\u015f","year":"2022","unstructured":"Demirta\u015f M (2022) A new RGB color image encryption scheme based on cross-channel pixel and bit scrambling using chaos. Optik (Stuttg) 265:169430. https:\/\/doi.org\/10.1016\/j.ijleo.2022.169430","journal-title":"Optik (Stuttg)"},{"key":"20532_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2021.107326","volume":"143","author":"N Khalil","year":"2021","unstructured":"Khalil N, Sarhan A, Alshewimy MAM (2021) An efficient color\/grayscale image encryption scheme based on hybrid chaotic maps. Opt Laser Technol 143:107326. https:\/\/doi.org\/10.1016\/j.optlastec.2021.107326","journal-title":"Opt Laser Technol"},{"key":"20532_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2021.107252","volume":"142","author":"X Gao","year":"2021","unstructured":"Gao X (2021) Image encryption algorithm based on 2D hyperchaotic map. Opt Laser Technol 142:107252. https:\/\/doi.org\/10.1016\/j.optlastec.2021.107252","journal-title":"Opt Laser Technol"},{"issue":"27\u201328","key":"20532_CR36","doi-asserted-by":"publisher","first-page":"19853","DOI":"10.1007\/s11042-020-08850-5","volume":"79","author":"TS Ali","year":"2020","unstructured":"Ali TS, Ali R (2020) A new chaos based color image encryption algorithm using permutation substitution and Boolean operation. Multimed Tools Appl 79(27\u201328):19853\u201319873. https:\/\/doi.org\/10.1007\/s11042-020-08850-5","journal-title":"Multimed Tools Appl"},{"key":"20532_CR37","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.optlaseng.2016.10.006","volume":"90","author":"R Enayatifar","year":"2017","unstructured":"Enayatifar R, Abdullah AH, Isnin IF, Altameem A, Lee M (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146\u2013154. https:\/\/doi.org\/10.1016\/j.optlaseng.2016.10.006","journal-title":"Opt Lasers Eng"},{"issue":"12","key":"20532_CR38","doi-asserted-by":"publisher","first-page":"18545","DOI":"10.1007\/s11042-022-14175-2","volume":"82","author":"Y Qobbi","year":"2023","unstructured":"Qobbi Y, Jarjar A, Essaid M, Benazzi A (2023) Image encryption algorithm using dynamic permutation and large chaotic S-box. Multimed Tools Appl 82(12):18545\u201318564. https:\/\/doi.org\/10.1007\/s11042-022-14175-2","journal-title":"Multimed Tools Appl"},{"issue":"15","key":"20532_CR39","doi-asserted-by":"publisher","first-page":"16529","DOI":"10.1007\/s11042-016-3926-9","volume":"76","author":"R Bansal","year":"2017","unstructured":"Bansal R, Gupta S, Sharma G (2017) An innovative image encryption scheme based on chaotic map and Vigen\u00e8re scheme. Multimed Tools Appl 76(15):16529\u201316562. https:\/\/doi.org\/10.1007\/s11042-016-3926-9","journal-title":"Multimed Tools Appl"},{"issue":"37\u201338","key":"20532_CR40","doi-asserted-by":"publisher","first-page":"26927","DOI":"10.1007\/s11042-020-09058-3","volume":"79","author":"M Ghazvini","year":"2020","unstructured":"Ghazvini M, Mirzadi M, Parvar N (2020) A modified method for image encryption based on chaotic map and genetic algorithm. Multimed Tools Appl 79(37\u201338):26927\u201326950. https:\/\/doi.org\/10.1007\/s11042-020-09058-3","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"20532_CR41","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s42452-022-04972-7","volume":"4","author":"S Hraoui","year":"2022","unstructured":"Hraoui S, JarJar A (2022) Single Feistel lapse acting on reduced ASCII codes followed by a genetic crossover. SN Appl Sci 4(4):113. https:\/\/doi.org\/10.1007\/s42452-022-04972-7","journal-title":"SN Appl Sci"},{"key":"20532_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2023.103826","volume":"89","author":"T Umar","year":"2024","unstructured":"Umar T, Nadeem M, Anwer F (2024) A new modified Skew Tent Map and its application in pseudo-random number generator. Comput Stand Interfaces 89:103826. https:\/\/doi.org\/10.1016\/j.csi.2023.103826","journal-title":"Comput Stand Interfaces"},{"key":"20532_CR43","doi-asserted-by":"publisher","first-page":"102192","DOI":"10.1016\/j.vlsi.2024.102192","volume":"97","author":"D Herbadji","year":"2024","unstructured":"Herbadji D, Herbadji A, Kahia H, Belmeguenai A, Derouiche N (2024) An enhanced logistic chaotic map based tweakable speech encryption algorithm. Integration 97:102192. https:\/\/doi.org\/10.1016\/j.vlsi.2024.102192","journal-title":"Integration"},{"key":"20532_CR44","unstructured":"\u201cUSC-SIPI database.\u201d [Online]. Available: http:\/\/sipi.usc.edu\/database"},{"issue":"35\u201336","key":"20532_CR45","doi-asserted-by":"publisher","first-page":"25613","DOI":"10.1007\/s11042-020-09237-2","volume":"79","author":"Y Niu","year":"2020","unstructured":"Niu Y, Zhou Z, Zhang X (2020) An image encryption approach based on chaotic maps and genetic operations. Multimed Tools Appl 79(35\u201336):25613\u201325633. https:\/\/doi.org\/10.1007\/s11042-020-09237-2","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"20532_CR46","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s11071-016-3046-0","volume":"87","author":"A Belazi","year":"2017","unstructured":"Belazi A, Khan M, El-Latif AAA, Belghith S (2017) Efficient cryptosystem approaches: S-boxes and permutation\u2013substitution-based encryption. Nonlinear Dyn 87(1):337\u2013361. https:\/\/doi.org\/10.1007\/s11071-016-3046-0","journal-title":"Nonlinear Dyn"},{"key":"20532_CR47","doi-asserted-by":"publisher","first-page":"117861","DOI":"10.1016\/j.eswa.2022.117861","volume":"206","author":"B Jasra","year":"2022","unstructured":"Jasra B, Hassan Moon A (2022) Color image encryption and authentication using dynamic DNA encoding and hyper chaotic system. Expert Syst Appl 206:117861. https:\/\/doi.org\/10.1016\/j.eswa.2022.117861","journal-title":"Expert Syst Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20532-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-20532-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20532-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T11:27:32Z","timestamp":1754134052000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-20532-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,20]]},"references-count":47,"journal-issue":{"issue":"28","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["20532"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-20532-0","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,20]]},"assertion":[{"value":"2 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This research is not being funded by any governmental, private, or laboratory entities, hence there are no anticipated conflicts. All of the authors of this work attest to the absence of any conflicts between them. There are no studies or experiments on humans or animals in this text.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"None of the authors have ever acquired funding from individuals or institutions.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}