{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T00:39:26Z","timestamp":1775608766140,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"34","license":[{"start":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T00:00:00Z","timestamp":1744588800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T00:00:00Z","timestamp":1744588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-025-20840-z","type":"journal-article","created":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T06:24:37Z","timestamp":1744611877000},"page":"42379-42398","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Lightweight secure image encryption: a tent map chaos theory approach"],"prefix":"10.1007","volume":"84","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9929-2116","authenticated-orcid":false,"given":"Ammar","family":"Odeh","sequence":"first","affiliation":[]},{"given":"Anas Abu","family":"Taleb","sequence":"additional","affiliation":[]},{"given":"Tareq","family":"Alhajahjeh","sequence":"additional","affiliation":[]},{"given":"Francisco","family":"Navarro","sequence":"additional","affiliation":[]},{"given":"Aladdin","family":"Ayesh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,14]]},"reference":[{"key":"20840_CR1","doi-asserted-by":"publisher","first-page":"102494","DOI":"10.1016\/j.cose.2021.102494","volume":"112","author":"AE Omolara","year":"2022","unstructured":"Omolara AE, Alabdulatif A, Abiodun OI, Alawida M, Alabdulatif A, Arshad H (2022) The internet of things security: A survey encompassing unexplored areas and new insights. Comput Secur 112:102494","journal-title":"Comput Secur"},{"key":"20840_CR2","doi-asserted-by":"publisher","first-page":"e4108","DOI":"10.1002\/ett.4108","volume":"33","author":"B Seth","year":"2022","unstructured":"Seth B, Dalal S, Jaglan V, Le DN, Mohan S, Srivastava G (2022) Integrating encryption techniques for secure data storage in the cloud. Transactions on Emerging Telecommunications Technologies 33:e4108","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"20840_CR3","doi-asserted-by":"publisher","first-page":"2585","DOI":"10.3390\/math11112585","volume":"11","author":"B Zhang","year":"2023","unstructured":"Zhang B, Liu L (2023) Chaos-Based Image Encryption: Review, Application, and Challenges. Mathematics 11:2585","journal-title":"Mathematics"},{"key":"20840_CR4","doi-asserted-by":"publisher","first-page":"1821","DOI":"10.1007\/s12652-018-1161-0","volume":"11","author":"K Shankar","year":"2020","unstructured":"Shankar K, Elhoseny M, Kumar RS, Lakshmanaprabu S, Yuan X (2020) RETRACTED ARTICLE: Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. J Ambient Intell Humaniz Comput 11:1821\u20131833","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"20840_CR5","first-page":"1","volume":"2021","author":"M Kaur","year":"2021","unstructured":"Kaur M, Singh S, Kaur M (2021) Computational image encryption techniques: a comprehensive review. Math Probl Eng 2021:1\u201317","journal-title":"Math Probl Eng"},{"key":"20840_CR6","doi-asserted-by":"publisher","first-page":"13291","DOI":"10.3390\/app132413291","volume":"13","author":"A Odeh","year":"2023","unstructured":"Odeh A, Taleb AA, Alhajahjeh T, Navarro F (2023) Invisible Shield: Unveiling an Efficient Watermarking Solution for Medical Imaging Security. Appl Sci 13:13291","journal-title":"Appl Sci"},{"key":"20840_CR7","doi-asserted-by":"publisher","first-page":"3225","DOI":"10.1007\/s11277-021-08177-w","volume":"118","author":"P Kadian","year":"2021","unstructured":"Kadian P, Arora SM, Arora N (2021) Robust digital watermarking techniques for copyright protection of digital data: A survey. Wireless Pers Commun 118:3225\u20133249","journal-title":"Wireless Pers Commun"},{"key":"20840_CR8","doi-asserted-by":"publisher","first-page":"8724","DOI":"10.3390\/app12178724","volume":"12","author":"PV Sanivarapu","year":"2022","unstructured":"Sanivarapu PV, Rajesh KN, Hosny KM, Fouda MM (2022) Digital Watermarking System for Copyright Protection and Authentication of Images Using Cryptographic Techniques. Appl Sci 12:8724","journal-title":"Appl Sci"},{"key":"20840_CR9","doi-asserted-by":"publisher","first-page":"5091","DOI":"10.1007\/s11042-022-12169-8","volume":"82","author":"M Gupta","year":"2023","unstructured":"Gupta M, Singh VP, Gupta KK, Shukla PK (2023) An efficient image encryption technique based on two-level security for internet of things. Multimedia Tools and Applications 82:5091\u20135111","journal-title":"Multimedia Tools and Applications"},{"key":"20840_CR10","unstructured":"A. Odeh and A. A. Taleb, \"A Multi-Faceted Encryption Strategy for Securing Patient Information in Medical Imaging.\""},{"key":"20840_CR11","doi-asserted-by":"publisher","first-page":"1413","DOI":"10.1007\/s42835-020-00393-x","volume":"15","author":"B Arpac\u0131","year":"2020","unstructured":"Arpac\u0131 B, Kurt E, \u00c7elik K, Ciylan B (2020) Colored image encryption and decryption with a new algorithm and a hyperchaotic electrical circuit. Journal of Electrical Engineering & Technology 15:1413\u20131429","journal-title":"Journal of Electrical Engineering & Technology"},{"key":"20840_CR12","doi-asserted-by":"publisher","first-page":"065203","DOI":"10.1088\/1402-4896\/abed7d","volume":"96","author":"X Gao","year":"2021","unstructured":"Gao X (2021) A color image encryption algorithm based on an improved H\u00e9non map. Phys Scr 96:065203","journal-title":"Phys Scr"},{"key":"20840_CR13","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1111\/1467-9655.13481","volume":"27","author":"AR Taylor","year":"2021","unstructured":"Taylor AR (2021) Future-proof: bunkered data centres and the selling of ultra-secure cloud storage. J Roy Anthropol Inst 27:76\u201394","journal-title":"J Roy Anthropol Inst"},{"key":"20840_CR14","doi-asserted-by":"publisher","first-page":"8833","DOI":"10.3390\/s22228833","volume":"22","author":"S Bhujel","year":"2022","unstructured":"Bhujel S, Rahulamathavan Y (2022) A survey: Security, transparency, and scalability issues of nft\u2019s and its marketplaces. Sensors 22:8833","journal-title":"Sensors"},{"key":"20840_CR15","doi-asserted-by":"publisher","first-page":"1990","DOI":"10.11591\/eei.v11i4.3850","volume":"11","author":"MA Al-Fayoumi","year":"2022","unstructured":"Al-Fayoumi MA, Odeh A, Keshta I, Ahmad A (2022) Techniques of medical image encryption taxonomy. Bulletin of Electrical Engineering and Informatics 11:1990\u20131997","journal-title":"Bulletin of Electrical Engineering and Informatics"},{"key":"20840_CR16","doi-asserted-by":"publisher","first-page":"160","DOI":"10.3390\/computers12080160","volume":"12","author":"ST Ahmed","year":"2023","unstructured":"Ahmed ST, Hammood DA, Chisab RF, Al-Naji A, Chahl J (2023) Medical Image encryption: A comprehensive review. Computers 12:160","journal-title":"Computers"},{"key":"20840_CR17","doi-asserted-by":"crossref","unstructured":"S. G. Gollagi, R. Srividya, G. S. Kumar, and P. K. Pareek, \"A Novel Image Encryption Optimization Technique,\" in 2021 International Conference on Forensics, Analytics, Big Data, Security (FABS), 2021, pp. 1\u20136.","DOI":"10.1109\/FABS52071.2021.9702621"},{"key":"20840_CR18","doi-asserted-by":"crossref","unstructured":"A. A. Siddique, W. Boulila, M. S. Alshehri, F. Ahmed, T. R. Gadekallu, N. Victor, et al., \"Privacy-enhanced pneumonia diagnosis: IoT-enabled federated multi-party computation in industry 5.0,\" IEEE Transactions on Consumer Electronics, 2023.","DOI":"10.1109\/TCE.2023.3319565"},{"key":"20840_CR19","unstructured":"T. Wang, Y. Zhang, S. Qi, R. Zhao, Z. Xia, and J. Weng, \"Security and privacy on generative data in aigc: A survey,\" arXiv preprint arXiv:2309.09435, 2023."},{"key":"20840_CR20","doi-asserted-by":"publisher","first-page":"14721","DOI":"10.1038\/s41598-023-41082-9","volume":"13","author":"H Wen","year":"2023","unstructured":"Wen H, Lin Y, Xie Z, Liu T (2023) Chaos-based block permutation and dynamic sequence multiplexing for video encryption. Sci Rep 13:14721","journal-title":"Sci Rep"},{"key":"20840_CR21","doi-asserted-by":"crossref","unstructured":"A. A. Ahmed, M. M. Madboly, and S. K. Guirguis, \"Securing Data Transmission and Privacy Preserving Using Fully Homomorphic Encryption,\" International Journal of Intelligent Engineering & Systems, vol. 16, 2023.","DOI":"10.22266\/ijies2023.0228.25"},{"key":"20840_CR22","doi-asserted-by":"publisher","first-page":"100474","DOI":"10.1016\/j.hitech.2023.100474","volume":"34","author":"N Krishnamoorthy","year":"2023","unstructured":"Krishnamoorthy N, Umarani S (2023) Implementation and management of cloud security for industry 4. O-data using hybrid elliptical curve cryptography. J High Technol Managem Res 34:100474","journal-title":"J High Technol Managem Res"},{"key":"20840_CR23","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.tics.2019.12.016","volume":"24","author":"D Mobbs","year":"2020","unstructured":"Mobbs D, Headley DB, Ding W, Dayan P (2020) Space, time, and fear: survival computations along defensive circuits. Trends Cogn Sci 24:228\u2013241","journal-title":"Trends Cogn Sci"},{"key":"20840_CR24","doi-asserted-by":"publisher","first-page":"946","DOI":"10.1016\/j.ijleo.2017.04.103","volume":"140","author":"B Norouzi","year":"2017","unstructured":"Norouzi B, Mirzakuchaki S, Norouzi P (2017) Breaking an image encryption technique based on neural chaotic generator. Optik 140:946\u2013952","journal-title":"Optik"},{"key":"20840_CR25","doi-asserted-by":"publisher","first-page":"716","DOI":"10.3390\/e20090716","volume":"20","author":"S Zhu","year":"2018","unstructured":"Zhu S, Zhu C, Wang W (2018) A new image encryption algorithm based on chaos and secure hash SHA-256. Entropy 20:716","journal-title":"Entropy"},{"key":"20840_CR26","doi-asserted-by":"publisher","first-page":"19999","DOI":"10.1007\/s11042-022-12765-8","volume":"81","author":"L Liu","year":"2022","unstructured":"Liu L, Wei Z, Xiang H (2022) A novel image encryption algorithm based on compound-coupled logistic chaotic map. Multimedia Tools and Applications 81:19999\u201320019","journal-title":"Multimedia Tools and Applications"},{"key":"20840_CR27","doi-asserted-by":"publisher","first-page":"567","DOI":"10.3390\/math11030567","volume":"11","author":"X Wang","year":"2023","unstructured":"Wang X, Zhang X, Gao M, Tian Y, Wang C, Iu HH-C (2023) A color image encryption algorithm based on hash table, hilbert curve and hyper-chaotic synchronization. Mathematics 11:567","journal-title":"Mathematics"},{"key":"20840_CR28","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.physleta.2007.01.034","volume":"365","author":"X Wu","year":"2007","unstructured":"Wu X, Guan Z-H (2007) A novel digital watermark algorithm based on chaotic maps. Phys Lett A 365:403\u2013406","journal-title":"Phys Lett A"},{"key":"20840_CR29","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.jisa.2019.02.006","volume":"46","author":"KAK Patro","year":"2019","unstructured":"Patro KAK, Acharya B (2019) An efficient colour image encryption scheme based on 1-D chaotic maps. Journal of Information Security and Applications 46:23\u201341","journal-title":"Journal of Information Security and Applications"},{"key":"20840_CR30","doi-asserted-by":"publisher","first-page":"101634","DOI":"10.1016\/j.jestch.2024.101634","volume":"51","author":"H Wen","year":"2024","unstructured":"Wen H, Lin Y, Feng Z (2024) Cryptanalyzing a bit-level image encryption algorithm based on chaotic maps. Engineering Science and Technology, an International Journal 51:101634","journal-title":"Engineering Science and Technology, an International Journal"},{"key":"20840_CR31","doi-asserted-by":"publisher","first-page":"116555","DOI":"10.1016\/j.geoderma.2023.116555","volume":"436","author":"X Jin","year":"2023","unstructured":"Jin X, Zhou J, Rao Y, Zhang X, Zhang W, Ba W et al (2023) An innovative approach for integrating two-dimensional conversion of Vis-NIR spectra with the Swin Transformer model to leverage deep learning for predicting soil properties. Geoderma 436:116555","journal-title":"Geoderma"},{"key":"20840_CR32","doi-asserted-by":"crossref","unstructured":"H. Wen, Y. Lin, L. Yang, and R. Chen, \"Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos,\" Expert Systems with Applications, p. 123748, 2024.","DOI":"10.1016\/j.eswa.2024.123748"},{"key":"20840_CR33","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1016\/j.ins.2020.09.032","volume":"546","author":"Z Hua","year":"2021","unstructured":"Hua Z, Zhu Z, Yi S, Zhang Z, Huang H (2021) Cross-plane colour image encryption using a two-dimensional logistic tent modular map. Inf Sci 546:1063\u20131083","journal-title":"Inf Sci"},{"key":"20840_CR34","doi-asserted-by":"publisher","first-page":"121514","DOI":"10.1016\/j.eswa.2023.121514","volume":"237","author":"H Wen","year":"2024","unstructured":"Wen H, Lin Y (2024) Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Syst Appl 237:121514","journal-title":"Expert Syst Appl"},{"key":"20840_CR35","doi-asserted-by":"publisher","first-page":"100501","DOI":"10.1088\/1674-1056\/24\/10\/100501","volume":"24","author":"L-C Cao","year":"2015","unstructured":"Cao L-C, Luo Y-L, Qiu S-H, Liu J-X (2015) A perturbation method to the tent map based on Lyapunov exponent and its application. Chin Phys B 24:100501","journal-title":"Chin Phys B"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-025-20840-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-025-20840-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-025-20840-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T23:08:27Z","timestamp":1759446507000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-025-20840-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,14]]},"references-count":35,"journal-issue":{"issue":"34","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["20840"],"URL":"https:\/\/doi.org\/10.1007\/s11042-025-20840-z","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,14]]},"assertion":[{"value":"24 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 April 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 April 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 April 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"All authors whose names appear on the submission made substantial contributions to the conception and design of the work.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All authors whose names appear on the submission approved the version to be published.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}