{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:04:02Z","timestamp":1772060642768,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T00:00:00Z","timestamp":1771977600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T00:00:00Z","timestamp":1771977600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-026-21413-4","type":"journal-article","created":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T22:33:12Z","timestamp":1772058792000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing image encryption security with a 2D SF-SIMM hyperchaotic map"],"prefix":"10.1007","volume":"85","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5701-3097","authenticated-orcid":false,"given":"Mohammad","family":"Al-Jamal","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7238-8839","authenticated-orcid":false,"given":"Mohammad","family":"Al-Talib","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1889-6602","authenticated-orcid":false,"given":"Ahmad","family":"Baniabedalruhman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2026,2,25]]},"reference":[{"issue":"6","key":"21413_CR1","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 8(6):1259\u20131284. https:\/\/doi.org\/10.1142\/S021812749800098X","journal-title":"Int J Bifurcat Chaos"},{"issue":"8","key":"21413_CR2","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 16(8):2129\u20132151. https:\/\/doi.org\/10.1142\/S0218127406015970","journal-title":"Int J Bifurcat Chaos"},{"issue":"3","key":"21413_CR3","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK (2004a) A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos Solitons & Fractals 21(3):749\u2013761. https:\/\/doi.org\/10.1016\/j.chaos.2003.12.022","journal-title":"Chaos Solitons & Fractals"},{"key":"21413_CR4","doi-asserted-by":"publisher","first-page":"2395","DOI":"10.1007\/s00521-017-3195-1","volume":"31","author":"OM Al-Hazaimeh","year":"2019","unstructured":"Al-Hazaimeh OM, Al-Jamal MF, Alhindawi N et al (2019) Image encryption algorithm based on lorenz chaotic map with dynamic secret keys. Neural Comput Appl 31:2395\u20132405. https:\/\/doi.org\/10.1007\/s00521-017-3195-1","journal-title":"Neural Comput Appl"},{"issue":"7","key":"21413_CR5","doi-asserted-by":"publisher","first-page":"19129","DOI":"10.1007\/s11042-023-16163-6","volume":"83","author":"A Ghaffari","year":"2024","unstructured":"Ghaffari A (2024) Image encryption-compression method via encryption based sparse decomposition. Multimed Tools Appl 83(7):19129\u201319160. https:\/\/doi.org\/10.1007\/s11042-023-16163-6","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"21413_CR6","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/S0375-9601(98)00086-3","volume":"240","author":"MS Baptista","year":"1998","unstructured":"Baptista MS (1998) Cryptography with chaos. Phys Lett A 240(1):50\u201354. https:\/\/doi.org\/10.1016\/S0375-9601(98)00086-3","journal-title":"Phys Lett A"},{"issue":"41","key":"21413_CR7","doi-asserted-by":"publisher","first-page":"30329","DOI":"10.1007\/s11042-020-09595-x","volume":"79","author":"H Xiang","year":"2020","unstructured":"Xiang H, Liu L (2020) An improved digital logistic map and its application in image encryption. Multimed Tools Appl 79(41):30329\u201330355. https:\/\/doi.org\/10.1007\/s11042-020-09595-x","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"21413_CR8","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.physleta.2005.08.006","volume":"346","author":"Z-H Guan","year":"2005","unstructured":"Guan Z-H, Huang F, Guan W (2005) Chaos-based image encryption algorithm. Phys Lett A 346(1):153\u2013157. https:\/\/doi.org\/10.1016\/j.physleta.2005.08.006","journal-title":"Phys Lett A"},{"issue":"1","key":"21413_CR9","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1504\/IJCSM.2022.122144","volume":"15","author":"OM Al-Hazaimeh","year":"2022","unstructured":"Al-Hazaimeh OM, Al-Jamal MF, Alomari AK, Bawaneh MJ, Tahat N (2022) Image encryption using anti-synchronisation and bogdanov transformation map. Int J Comput Sci Math 15(1):43\u201359. https:\/\/doi.org\/10.1504\/IJCSM.2022.122144","journal-title":"Int J Comput Sci Math"},{"issue":"3","key":"21413_CR10","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK (2004b) A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos Solitons & Fractals 21(3):749\u2013761. https:\/\/doi.org\/10.1016\/j.chaos.2003.12.022","journal-title":"Chaos Solitons & Fractals"},{"issue":"5","key":"21413_CR11","doi-asserted-by":"publisher","first-page":"2191","DOI":"10.1016\/j.chaos.2007.10.009","volume":"40","author":"D Xiao","year":"2009","unstructured":"Xiao D, Liao X, Wei P (2009) Analysis and improvement of a chaos-based image encryption algorithm. Chaos Solitons & Fractals 40(5):2191\u20132199. https:\/\/doi.org\/10.1016\/j.chaos.2007.10.009","journal-title":"Chaos Solitons & Fractals"},{"issue":"1","key":"21413_CR12","doi-asserted-by":"publisher","first-page":"95","DOI":"10.34028\/iajit\/18\/1\/12","volume":"18","author":"O Al-Hazaimeh","year":"2021","unstructured":"Al-Hazaimeh O, Al-Jamal M, Bawaneh M, Alhindawi N, Hamdoni B (2021) A new image encryption scheme using dual chaotic map synchronization. Int Arab J Inf Technol 18(1):95\u2013102. https:\/\/doi.org\/10.34028\/iajit\/18\/1\/12","journal-title":"Int Arab J Inf Technol"},{"key":"21413_CR13","doi-asserted-by":"publisher","unstructured":"Alghamdi Y, Munir A, Ahmad J (2022) A lightweight image encryption algorithm based on chaotic map and random substitution. Entropy 24(10). https:\/\/doi.org\/10.3390\/e24101344","DOI":"10.3390\/e24101344"},{"key":"21413_CR14","doi-asserted-by":"publisher","first-page":"62118","DOI":"10.1109\/ACCESS.2024.3377665","volume":"12","author":"K Jain","year":"2024","unstructured":"Jain K, Titus B, Krishnan P, Sudevan S, Prabu P, Alluhaidan AS (2024) A lightweight multi-chaos-based image encryption scheme for iot networks. IEEE Access 12:62118\u201362148. https:\/\/doi.org\/10.1109\/ACCESS.2024.3377665","journal-title":"IEEE Access"},{"issue":"11","key":"21413_CR15","doi-asserted-by":"publisher","first-page":"31618","DOI":"10.1016\/j.heliyon.2024.e31618","volume":"10","author":"A Panwar","year":"2024","unstructured":"Panwar A, Biban G, Chugh R, Tassaddiq A, Alharbi R (2024) An efficient image encryption model based on 6d hyperchaotic system and symmetric matrix for color and gray images. Heliyon 10(11):31618. https:\/\/doi.org\/10.1016\/j.heliyon.2024.e31618","journal-title":"Heliyon"},{"key":"21413_CR16","doi-asserted-by":"publisher","first-page":"66009","DOI":"10.1109\/ACCESS.2023.3290915","volume":"11","author":"S Sun","year":"2023","unstructured":"Sun S (2023) A new image encryption scheme based on 6d hyperchaotic system and random signal insertion. IEEE Access 11:66009\u201366016. https:\/\/doi.org\/10.1109\/ACCESS.2023.3290915","journal-title":"IEEE Access"},{"issue":"4","key":"21413_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2023.102620","volume":"15","author":"M Vijayakumar","year":"2024","unstructured":"Vijayakumar M, Ahilan A (2024) An optimized chaotic s-box for real-time image encryption scheme based on 4-dimensional memristive hyperchaotic map. Ain Shams Eng J 15(4):102620. https:\/\/doi.org\/10.1016\/j.asej.2023.102620","journal-title":"Ain Shams Eng J"},{"issue":"6","key":"21413_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s44443-025-00163-7","volume":"37","author":"F Meng","year":"2025","unstructured":"Meng F, Wu G, Zhang J (2025) A novel color image encryption algorithm based on fractional-order conservative memristive hyperchaotic system and extended zig-zag transform. J King Saud Univ Comput Inf Sci 37(6):1\u201317. https:\/\/doi.org\/10.1007\/s44443-025-00163-7","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"20","key":"21413_CR19","doi-asserted-by":"publisher","first-page":"58349","DOI":"10.1007\/s11042-023-17812-6","volume":"83","author":"M Kumar","year":"2024","unstructured":"Kumar M (2024) A new rgb image encryption algorithm based on hyper-chaotic-discrete-wavelet-packet-transform. Multimed Tools Appl 83(20):58349\u201358374. https:\/\/doi.org\/10.1007\/s11042-023-17812-6","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"21413_CR20","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.1007\/s11042-023-15783-2","volume":"83","author":"AAK Javan","year":"2024","unstructured":"Javan AAK, Zare A (2024) Images encryption based on robust multi-mode finite time synchronization of fractional-order hyper-chaotic rikitake systems. Multimed Tools Appl 83(1):1103\u20131123. https:\/\/doi.org\/10.1007\/s11042-023-15783-2","journal-title":"Multimed Tools Appl"},{"key":"21413_CR21","doi-asserted-by":"publisher","unstructured":"Liu M, Ning C, Zhu C (2024) A secure image encryption scheme based on a new hyperchaotic system and 2d compressed sensing. Entropy 26(7). https:\/\/doi.org\/10.3390\/e26070603","DOI":"10.3390\/e26070603"},{"issue":"4","key":"21413_CR22","doi-asserted-by":"publisher","first-page":"11147","DOI":"10.1007\/s11042-023-15818-8","volume":"83","author":"E Abdellatef","year":"2024","unstructured":"Abdellatef E, Naeem EA, El-Samie FEA (2024) Deepenc: deep learning-based ct image encryption approach. Multimed Tools Appl 83(4):11147\u201311167. https:\/\/doi.org\/10.1007\/s11042-023-15818-8","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"21413_CR23","doi-asserted-by":"publisher","first-page":"2395","DOI":"10.1007\/s12010-022-04161-7","volume":"195","author":"S Bhattacharjee","year":"2023","unstructured":"Bhattacharjee S, Gupta M, Chatterjee B (2023) Time efficient image encryption-decryption for visible and covid-19 x-ray images using modified chaos-based logistic map. Appl Biochem Biotechnol 195(4):2395\u20132413. https:\/\/doi.org\/10.1007\/s12010-022-04161-7","journal-title":"Appl Biochem Biotechnol"},{"key":"21413_CR24","doi-asserted-by":"publisher","unstructured":"Li S, Li M, Li Q, Lv Y (2023) Hyperchaotic image encryption system based on deep learning lstm. Int J Adv Comput Sci Appl 14(11). https:\/\/doi.org\/10.14569\/IJACSA.2023.0141134","DOI":"10.14569\/IJACSA.2023.0141134"},{"issue":"1","key":"21413_CR25","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1038\/s41598-023-50661-9","volume":"14","author":"Z Zhuang","year":"2024","unstructured":"Zhuang Z, Zhuang Z, Wang T (2024) Medical image encryption algorithm based on a new five-dimensional multi-band multi-wing chaotic system and qr decomposition. Sci Rep 14(1):402. https:\/\/doi.org\/10.1038\/s41598-023-50661-9","journal-title":"Sci Rep"},{"key":"21413_CR26","doi-asserted-by":"publisher","unstructured":"Ghatak S, Chakrabarti S, Bhattacherjee D, Misra D, Chatterjee B, Gupta M, Bhattacharjee S (2024) A survey on the application of chaos-based encryption techniques on medical images. In: Tavares JMRS, Rodrigues JJPC, Misra D, Bhattacherjee D (eds) Data science and communication. Springer, Singapore, pp 259\u2013273. https:\/\/doi.org\/10.1007\/978-981-99-5435-3_18","DOI":"10.1007\/978-981-99-5435-3_18"},{"key":"21413_CR27","doi-asserted-by":"publisher","unstructured":"Lin C-F, Lin Y-X, Chang S-H (2025) Medical image encryption using chaotic mechanisms: a study. Bioengineering 12(7). https:\/\/doi.org\/10.3390\/bioengineering12070734","DOI":"10.3390\/bioengineering12070734"},{"key":"21413_CR28","doi-asserted-by":"publisher","unstructured":"G V, M R (2021) A survey on image encryption using chaos-based techniques. Int J Adv Comput Sci Appl 12(1). https:\/\/doi.org\/10.14569\/IJACSA.2021.0120145","DOI":"10.14569\/IJACSA.2021.0120145"},{"key":"21413_CR29","doi-asserted-by":"publisher","first-page":"2521","DOI":"10.1007\/s11071-017-3601-3","volume":"89","author":"W Liu","year":"2017","unstructured":"Liu W, Sun K, He S (2017) Sf-simm high-dimensional hyperchaotic map and its performance analysis. Nonlinear Dyn 89:2521\u20132532. https:\/\/doi.org\/10.1007\/s11071-017-3601-3","journal-title":"Nonlinear Dyn"},{"key":"21413_CR30","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication Theory of Secrecy Systems 28:656\u2013715. https:\/\/doi.org\/10.1002\/j.1538-7305.1949.tb00928.x","journal-title":"Communication Theory of Secrecy Systems"},{"key":"21413_CR31","doi-asserted-by":"crossref","unstructured":"Schneier B (2015) Applied cryptography: protocols, algorithms, and source code in C, 2nd edn. John Wiley & Sons, United Kingdom","DOI":"10.1002\/9781119183471.ch10"},{"key":"21413_CR32","doi-asserted-by":"publisher","unstructured":"Cover TM, Thomas JA (2006) Elements of information theory, 2nd edn. John Wiley & Sons, Germany. https:\/\/doi.org\/10.1002\/047174882X","DOI":"10.1002\/047174882X"},{"issue":"1","key":"21413_CR33","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A (1991) Differential cryptanalysis of des-like cryptosystems. J Cryptol 4(1):3\u201372. https:\/\/doi.org\/10.1007\/BF00630563","journal-title":"J Cryptol"},{"issue":"6","key":"21413_CR34","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1016\/j.ins.2010.12.019","volume":"181","author":"C Zhu","year":"2011","unstructured":"Zhu C, Fu C, Zhang C (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171\u20131186. https:\/\/doi.org\/10.1016\/j.ins.2010.12.019","journal-title":"Inf Sci"},{"key":"21413_CR35","volume-title":"Cryptography and network security: principles and practice","author":"W Stallings","year":"2017","unstructured":"Stallings W (2017) Cryptography and network security: principles and practice, 7th edn. Pearson, United Kingdom","edition":"7"},{"issue":"12","key":"21413_CR36","doi-asserted-by":"publisher","first-page":"16527","DOI":"10.1007\/s11042-018-7000-7","volume":"78","author":"H Noura","year":"2019","unstructured":"Noura H, Chehab A, Noura M, Couturier R, Mansour MM (2019) Lightweight, dynamic and efficient image encryption scheme. Multimed Tools Appl 78(12):16527\u201316561. https:\/\/doi.org\/10.1007\/s11042-018-7000-7","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21413-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-026-21413-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21413-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T22:33:13Z","timestamp":1772058793000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-026-21413-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,25]]},"references-count":36,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2026,3]]}},"alternative-id":["21413"],"URL":"https:\/\/doi.org\/10.1007\/s11042-026-21413-4","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,25]]},"assertion":[{"value":"12 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}],"article-number":"186"}}