{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T17:06:39Z","timestamp":1763831199351,"version":"3.37.3"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T00:00:00Z","timestamp":1612915200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T00:00:00Z","timestamp":1612915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"DST FIST Fund","award":["SR\/FST\/ET-II\/2018\/221"],"award-info":[{"award-number":["SR\/FST\/ET-II\/2018\/221"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Process Lett"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11063-020-10412-7","type":"journal-article","created":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T07:26:52Z","timestamp":1612942012000},"page":"907-928","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Mutated Cleavages of Images for Stealth Disclosure: A Hopfield Neural Network Attractor (HNNA) Approach"],"prefix":"10.1007","volume":"53","author":[{"given":"C.","family":"Lakshmi","sequence":"first","affiliation":[]},{"given":"K.","family":"Thenmozhi","sequence":"additional","affiliation":[]},{"given":"C.","family":"Venkatesan","sequence":"additional","affiliation":[]},{"given":"A.","family":"Seshadhri","sequence":"additional","affiliation":[]},{"given":"John Bosco Balaguru","family":"Rayappan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1574-3045","authenticated-orcid":false,"given":"Rengarajan","family":"Amirtharajan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,10]]},"reference":[{"key":"10412_CR1","doi-asserted-by":"publisher","first-page":"2277","DOI":"10.1007\/s12652-018-0825-0","volume":"10","author":"S Suri","year":"2019","unstructured":"Suri S, Vijay R (2019) A synchronous intertwining logistic map-DNA approach for color image encryption. J Ambient Intell Hum Comput 10:2277\u20132290. https:\/\/doi.org\/10.1007\/s12652-018-0825-0","journal-title":"J Ambient Intell Hum Comput"},{"key":"10412_CR2","doi-asserted-by":"publisher","first-page":"33837","DOI":"10.1007\/s11042-019-08166-z","volume":"78","author":"N Chidambaram","year":"2019","unstructured":"Chidambaram N, Raj P, Thenmozhi K et al (2019) A cloud compatible DNA coded security solution for multimedia file sharing & storage. Multimed Tools Appl 78:33837\u201333863. https:\/\/doi.org\/10.1007\/s11042-019-08166-z","journal-title":"Multimed Tools Appl"},{"key":"10412_CR3","doi-asserted-by":"publisher","first-page":"2987","DOI":"10.1049\/iet-ipr.2019.0168","volume":"14","author":"R Sivaraman","year":"2020","unstructured":"Sivaraman R, Rajagopalan S, Rayappan B, Bosco J, Rengarajan A (2020) \u2018Ring oscillator as confusion\u2013diffusion agent: a complete TRNG drove image security. IET Image Process 14:2987\u20132997. https:\/\/doi.org\/10.1049\/iet-ipr.2019.0168","journal-title":"IET Image Process"},{"key":"10412_CR4","doi-asserted-by":"publisher","first-page":"2925","DOI":"10.1007\/s11063-019-10067-z","volume":"50","author":"M Kalpana","year":"2019","unstructured":"Kalpana M, Ratnavelu K, Balasubramaniam P et al (2019) Double-key secure for N-1-N sound record data (SRD) by the drive-response of BAM NNs. Neural Process Lett 50:2925\u20132944. https:\/\/doi.org\/10.1007\/s11063-019-10067-z","journal-title":"Neural Process Lett"},{"key":"10412_CR5","unstructured":"N. I. of S. and Technology (2001) Specification for the Advanced Encryption Standard (AES)\u2014FIPS PUB 197, pp 1\u201347. https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.197.pdf"},{"key":"10412_CR6","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.amc.2018.03.019","volume":"332","author":"VM Silva-garc\u00eda","year":"2018","unstructured":"Silva-garc\u00eda VM, Flores-carapia R, Renter\u00eda-m\u00e1rquez C, Luna-benoso B (2018) Substitution box generation using Chaos: an image encryption application. Appl Math Comput 332:123\u2013135","journal-title":"Appl Math Comput"},{"key":"10412_CR7","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s11235-016-0212-0","volume":"65","author":"P Praveenkumar","year":"2017","unstructured":"Praveenkumar P, Amirtharajan R, Thenmozhi K, Rayappan JBB (2017) Fusion of confusion and diffusion: a novel image encryption approach. Telecommun Syst 65:65\u201378","journal-title":"Telecommun Syst"},{"key":"10412_CR8","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1007\/s00371-018-1574-y","volume":"35","author":"G Li","year":"2019","unstructured":"Li G, Wang L (2019) Double chaotic image encryption algorithm based on optimal sequence solution and fractional transform. Vis Comput 35:1267\u20131277. https:\/\/doi.org\/10.1007\/s00371-018-1574-y","journal-title":"Vis Comput"},{"issue":"4","key":"10412_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13319-017-0148-5","volume":"8","author":"M Kumari","year":"2017","unstructured":"Kumari M, Gupta S, Sardana P (2017) A survey of image encryption algorithms. 3D Res 8(4):1\u201335","journal-title":"3D Res"},{"issue":"22","key":"10412_CR10","doi-asserted-by":"publisher","first-page":"24251","DOI":"10.1007\/s11042-016-4102-y","volume":"76","author":"C Wang","year":"2017","unstructured":"Wang C, Zhang X, Zheng Z (2017) An efficient image encryption algorithm based on a novel chaotic map. Multimed Tools Appl 76(22):24251\u201324280","journal-title":"Multimed Tools Appl"},{"key":"10412_CR11","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s10462-016-9459-9","volume":"46","author":"D Sengul","year":"2016","unstructured":"Sengul D (2016) A new data hiding method based on chaos embedded genetic algorithm for color image. Artif Intell Rev 46:129\u2013143","journal-title":"Artif Intell Rev"},{"key":"10412_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/6729896","volume":"2017","author":"J Chandrasekaran","year":"2017","unstructured":"Chandrasekaran J, Thiruvengadam SJ (2017) A hybrid chaotic and number theoretic approach for securing DICOM images. Secur Commun Netw 2017:1\u201312","journal-title":"Secur Commun Netw"},{"key":"10412_CR13","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1016\/j.sigpro.2017.06.014","volume":"142","author":"J Wu","year":"2018","unstructured":"Wu J, Liao X, Yang B (2018) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process 142:292\u2013300","journal-title":"Signal Process"},{"key":"10412_CR14","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.sigpro.2017.12.021","volume":"146","author":"S Dhall","year":"2018","unstructured":"Dhall S, Pal SK, Sharma K (2018) Cryptanalysis of image encryption scheme based on a new 1D chaotic system. Signal Process 146:22\u201332","journal-title":"Signal Process"},{"key":"10412_CR15","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1016\/j.sigpro.2017.11.005","volume":"144","author":"H Wang","year":"2018","unstructured":"Wang H, Xiao D, Chen X, Huang H (2018) Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Signal Process 144:444\u2013452","journal-title":"Signal Process"},{"issue":"13","key":"10412_CR16","doi-asserted-by":"publisher","first-page":"5190","DOI":"10.1016\/j.ijleo.2016.03.018","volume":"127","author":"F \u00d6zkaynak","year":"2016","unstructured":"\u00d6zkaynak F, \u00d6zer AB (2016) Cryptanalysis of a new image encryption algorithm based on chaos. Optik (Stuttg) 127(13):5190\u20135192","journal-title":"Optik (Stuttg)"},{"key":"10412_CR17","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.cmpb.2018.02.021","volume":"159","author":"C Lakshmi","year":"2018","unstructured":"Lakshmi C, Thenmozhi K, Rayappan JBB, Amirtharajan R (2018) Encryption and watermark-treated medical image against hacking disease\u2014an immune convention in spatial and frequency domains. Comput Methods Progr Biomed 159:11\u201321","journal-title":"Comput Methods Progr Biomed"},{"key":"10412_CR18","doi-asserted-by":"publisher","first-page":"3088","DOI":"10.1073\/pnas.81.10.3088","volume":"81","author":"J Hopfield","year":"1984","unstructured":"Hopfield J (1984) Neurons with graded response have collective computational properties like those of two-state neurons. Proc Natl Acad Sci USA 81:3088\u20133092","journal-title":"Proc Natl Acad Sci USA"},{"key":"10412_CR19","doi-asserted-by":"publisher","first-page":"11477","DOI":"10.1007\/s00521-019-04637-4","volume":"32","author":"C Lakshmi","year":"2019","unstructured":"Lakshmi C, Thenmozhi K, Rayappan JBB, Amirtharajan R (2019) Hopfield attractor-trusted neural network: an attack-resistant image encryption. Neural Comput Appl 32:11477\u201311489","journal-title":"Neural Comput Appl"},{"key":"10412_CR20","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.optlaseng.2018.11.010","volume":"115","author":"XY Wang","year":"2019","unstructured":"Wang XY, Li ZM (2019) A color image encryption algorithm based on Hopfield chaotic neural network. Opt Lasers Eng 115:107\u2013118","journal-title":"Opt Lasers Eng"},{"key":"10412_CR21","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.neucom.2005.02.009","volume":"67","author":"Q Li","year":"2005","unstructured":"Li Q, Yang X-S, Yang F (2005) Hyperchaos in Hopfield-type neural networks. Neurocomputing 67:275\u2013280","journal-title":"Neurocomputing"},{"key":"10412_CR22","first-page":"2554","volume":"79","author":"JJ Hopfield","year":"1982","unstructured":"Hopfield JJ (1982) Neural networks and physical systems with emergent collective computational abilities (associative memory\/parallel processing\/categorization\/content-addressable memory\/fail-soft devices). Biophysics (Oxf) 79:2554\u20132558","journal-title":"Biophysics (Oxf)"},{"issue":"1","key":"10412_CR23","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1016\/j.chaos.2009.01.017","volume":"42","author":"T Gao","year":"2009","unstructured":"Gao T, Gu Q, Emmanuel S (2009) A novel image authentication scheme based on hyper-chaotic cell neural network. Chaos, Solitons Fractals 42(1):548\u2013553","journal-title":"Chaos, Solitons Fractals"},{"issue":"13","key":"10412_CR24","doi-asserted-by":"publisher","first-page":"1787","DOI":"10.1016\/j.neucom.2005.11.001","volume":"69","author":"Y Huang","year":"2006","unstructured":"Huang Y, Yang X-S (2006) Hyperchaos and bifurcation in a new class of four-dimensional Hopfield neural networks. Neurocomputing 69(13):1787\u20131795","journal-title":"Neurocomputing"},{"key":"10412_CR25","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.dsp.2013.11.004","volume":"25","author":"A Kassem","year":"2013","unstructured":"Kassem A, Hassan HAH, Harkouss Y, Assaf R (2013) Efficient neural chaotic generator for image encryption. Digit Signal Process 25:266\u2013274","journal-title":"Digit Signal Process"},{"issue":"2","key":"10412_CR26","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1016\/j.compeleceng.2011.11.019","volume":"38","author":"N Bigdeli","year":"2012","unstructured":"Bigdeli N, Farid Y, Afshar K (2012) A robust hybrid method for image encryption based on Hopfield neural network. Comput Electr Eng 38(2):356\u2013369","journal-title":"Comput Electr Eng"},{"issue":"4\u20135","key":"10412_CR27","first-page":"333","volume":"356","author":"W Yu","year":"2006","unstructured":"Yu W, Cao J (2006) Cryptography based on delayed chaotic neural networks. Phys Lett Sect A Gen At Solid State Phys 356(4\u20135):333\u2013338","journal-title":"Phys Lett Sect A Gen At Solid State Phys"},{"issue":"8","key":"10412_CR28","doi-asserted-by":"publisher","first-page":"1000","DOI":"10.1016\/j.compbiomed.2013.05.005","volume":"43","author":"C Fu","year":"2013","unstructured":"Fu C et al (2013) An efficient and secure medical image protection scheme based on chaotic map. Comput Biol Med 43(8):1000\u20131010. https:\/\/doi.org\/10.1016\/j.compbiomed.2013.05.005","journal-title":"Comput Biol Med"},{"key":"10412_CR29","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.image.2015.10.004","volume":"41","author":"S El Assad","year":"2016","unstructured":"El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144\u2013157","journal-title":"Signal Process Image Commun"},{"key":"10412_CR30","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.ins.2018.03.055","volume":"450","author":"Y Zhang","year":"2018","unstructured":"Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic S-Box. Inf Sci (NY) 450:361\u2013377. https:\/\/doi.org\/10.1016\/j.ins.2018.03.055","journal-title":"Inf Sci (NY)"},{"issue":"1\u20134 SUPPL.","key":"10412_CR31","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.neucom.2005.02.009","volume":"67","author":"Q Li","year":"2005","unstructured":"Li Q, Yang XS, Yang F (2005) Hyperchaos in Hopfield-type neural networks. Neurocomputing 67(1\u20134 SUPPL.):275\u2013280","journal-title":"Neurocomputing"},{"key":"10412_CR32","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","volume":"222","author":"Y Wu","year":"2013","unstructured":"Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shanon entropy measure with statistical tests for image randomness. Inf Sci (NY) 222:323\u2013342","journal-title":"Inf Sci (NY)"},{"key":"10412_CR33","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun 1:31\u201338","journal-title":"Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun"},{"key":"10412_CR34","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1016\/j.optlastec.2018.04.030","volume":"106","author":"H Xue","year":"2018","unstructured":"Xue H, Du J, Li S, Ma W (2018) Region of interest encryption for color images based on a hyperchaotic system with three positive Lyapunov exponets. Opt Laser Technol 106:506\u2013516","journal-title":"Opt Laser Technol"},{"key":"10412_CR35","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.ins.2015.10.027","volume":"355\u2013356","author":"A-V Diaconu","year":"2016","unstructured":"Diaconu A-V (2016) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf Sci 355\u2013356:314\u2013327. https:\/\/doi.org\/10.1016\/j.ins.2015.10.027","journal-title":"Inf Sci"},{"issue":"2","key":"10412_CR36","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1109\/JAS.2020.1003048","volume":"7","author":"AH Khan","year":"2020","unstructured":"Khan AH, Cao X, Li S, Katsikis VN, Liao L (2020) BAS-ADAM: an ADAM based approach to improve the performance of beetle antennae search optimizer. IEEE\/CAA J Autom Sin 7(2):461\u2013471. https:\/\/doi.org\/10.1109\/JAS.2020.1003048","journal-title":"IEEE\/CAA J Autom Sin"},{"key":"10412_CR37","doi-asserted-by":"publisher","first-page":"57437","DOI":"10.1109\/ACCESS.2020.2982195","volume":"8","author":"AH Khan","year":"2020","unstructured":"Khan AH et al (2020) Optimal portfolio management for engineering problems using nonconvex cardinality constraint: a computing perspective. IEEE Access 8:57437\u201357450. https:\/\/doi.org\/10.1109\/ACCESS.2020.2982195","journal-title":"IEEE Access"},{"key":"10412_CR38","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/tcsii.2020.3007879","volume":"1","author":"Z Li","year":"2020","unstructured":"Li Z, Li S (2020) Saturated PI control for nonlinear system with provable convergence: an optimization perspective. IEEE Trans Circuits Syst II Express Briefs 1:5. https:\/\/doi.org\/10.1109\/tcsii.2020.3007879","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"key":"10412_CR39","doi-asserted-by":"publisher","first-page":"107964","DOI":"10.1016\/j.measurement.2020.107964","volume":"163","author":"Z Li","year":"2020","unstructured":"Li Z, Zuo W, Li S (2020) Zeroing dynamics method for motion control of industrial upper-limb exoskeleton system with minimal potential energy modulation. Measurement 163:107964","journal-title":"Measurement"},{"issue":"12","key":"10412_CR40","doi-asserted-by":"publisher","first-page":"7469","DOI":"10.1109\/TII.2019.2957186","volume":"16","author":"Z Li","year":"2020","unstructured":"Li Z, Li C, Li S, Cao X (2020) A fault-tolerant method for motion planning of industrial redundant manipulator. IEEE Trans Ind Inform 16(12):7469\u20137478. https:\/\/doi.org\/10.1109\/TII.2019.2957186","journal-title":"IEEE Trans Ind Inform"}],"container-title":["Neural Processing Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-020-10412-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11063-020-10412-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-020-10412-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T03:26:17Z","timestamp":1698636377000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11063-020-10412-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,10]]},"references-count":40,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["10412"],"URL":"https:\/\/doi.org\/10.1007\/s11063-020-10412-7","relation":{},"ISSN":["1370-4621","1573-773X"],"issn-type":[{"type":"print","value":"1370-4621"},{"type":"electronic","value":"1573-773X"}],"subject":[],"published":{"date-parts":[[2021,2,10]]},"assertion":[{"value":"5 December 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}