{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T13:49:50Z","timestamp":1771336190971,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T00:00:00Z","timestamp":1723507200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T00:00:00Z","timestamp":1723507200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s11227-024-06362-9","type":"journal-article","created":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T10:02:36Z","timestamp":1723543356000},"page":"25668-25684","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An accelerated chaotic image secure communication system based on Zynq-7000 platform"],"prefix":"10.1007","volume":"80","author":[{"given":"Meiting","family":"Liu","sequence":"first","affiliation":[]},{"given":"Wenxin","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Zuanbo","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,13]]},"reference":[{"key":"6362_CR1","doi-asserted-by":"publisher","first-page":"106685","DOI":"10.1016\/j.compeleceng.2020.106685","volume":"85","author":"WD Ferreira","year":"2020","unstructured":"Ferreira WD, Ferreira CBR, da Cruz JG et al (2020) A review of digital image forensics. Comput Electr Eng 85:106685","journal-title":"Comput Electr Eng"},{"key":"6362_CR2","doi-asserted-by":"publisher","first-page":"114143","DOI":"10.1016\/j.compstruct.2021.114143","volume":"271","author":"R Janeliukstis","year":"2021","unstructured":"Janeliukstis R, Chen X (2021) Review of digital image correlation application to large-scale composite structure testing. Compos Struct 271:114143","journal-title":"Compos Struct"},{"key":"6362_CR3","doi-asserted-by":"publisher","first-page":"3029","DOI":"10.1007\/s10773-017-3469-5","volume":"56","author":"H Wang","year":"2017","unstructured":"Wang H, Wang J, Geng YC et al (2017) Quantum image encryption based on iterative framework of frequency-spatial domain transforms. Int J Theor Phys 56:3029\u20133049","journal-title":"Int J Theor Phys"},{"issue":"7","key":"6362_CR4","doi-asserted-by":"publisher","first-page":"1919","DOI":"10.1109\/TCSVT.2018.2859253","volume":"29","author":"X Kang","year":"2018","unstructured":"Kang X, Tao R (2018) Color image encryption using pixel scrambling operator and reality-preserving MPFRHT. IEEE Trans Circuits Syst Video Technol 29(7):1919\u20131932","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"1","key":"6362_CR5","doi-asserted-by":"publisher","first-page":"451","DOI":"10.3233\/IFS-151769","volume":"30","author":"MT Huang","year":"2016","unstructured":"Huang MT, Lee CH, Lin CM (2016) Blind source separation with adaptive learning rates for image encryption. J Intell Fuzzy Sys 30(1):451\u2013460","journal-title":"J Intell Fuzzy Sys"},{"issue":"6","key":"6362_CR6","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1016\/j.imavis.2007.08.017","volume":"26","author":"QH Lin","year":"2008","unstructured":"Lin QH, Yin FL, Mei TM et al (2008) A blind source separation-based method for multiple images encryption. Image Vis Comput 26(6):788\u2013798","journal-title":"Image Vis Comput"},{"issue":"6","key":"6362_CR7","doi-asserted-by":"publisher","first-page":"768","DOI":"10.1016\/j.optlaseng.2013.01.016","volume":"51","author":"H Chen","year":"2013","unstructured":"Chen H, Du X, Liu Z et al (2013) Color image encryption based on the affine transform and gyrator transform. Opt Lasers Eng 51(6):768\u2013775","journal-title":"Opt Lasers Eng"},{"key":"6362_CR8","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1016\/j.optlastec.2012.11.020","volume":"48","author":"Y Pourasad","year":"2013","unstructured":"Pourasad Y, Ranjbarzadeh R, Mardani A, Sui L, Gao B (2013) Color image encryption based on gyrator transform and Arnold transform. Opt Laser Technol 48:530\u2013538","journal-title":"Opt Laser Technol"},{"issue":"4","key":"6362_CR9","doi-asserted-by":"publisher","first-page":"521","DOI":"10.3390\/e24040521","volume":"24","author":"X Xu","year":"2022","unstructured":"Xu X, Chen S (2022) An optical image encryption method using Hopfield neural network. Entropy 24(4):521","journal-title":"Entropy"},{"issue":"21","key":"6362_CR10","doi-asserted-by":"publisher","first-page":"14533","DOI":"10.1007\/s00521-021-06096-2","volume":"33","author":"S Patel","year":"2021","unstructured":"Patel S, Thanikaiselvan V, Pelusi D et al (2021) Colour image encryption based on customized neural network and DNA encoding. Neural Comput Appl 33(21):14533\u201314550","journal-title":"Neural Comput Appl"},{"issue":"3","key":"6362_CR11","doi-asserted-by":"publisher","first-page":"341","DOI":"10.3390\/e23030341","volume":"23","author":"Y Pourasad","year":"2021","unstructured":"Pourasad Y, Ranjbarzadeh R, Mardani A (2021) A new algorithm for digital image encryption based on chaos theory. Entropy 23(3):341","journal-title":"Entropy"},{"key":"6362_CR12","first-page":"103056","volume":"63","author":"E Yavuz","year":"2021","unstructured":"Yavuz E (2021) A new parallel processing architecture for accelerating image encryption based on chaos. J Information SecurAppl 63:103056","journal-title":"J Information SecurAppl"},{"key":"6362_CR13","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.sigpro.2019.06.013","volume":"164","author":"M Alawida","year":"2019","unstructured":"Alawida M, Teh JS, Samsudin A (2019) An image encryption scheme based on hybridizing digital chaos and finite state machine. Signal Process 164:249\u2013266","journal-title":"Signal Process"},{"key":"6362_CR14","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.neunet.2020.02.008","volume":"125","author":"L Chen","year":"2020","unstructured":"Chen L, Yin H, Huang T et al (2020) Chaos in fractional-order discrete neural networks with application to image encryption. Neural Netw 125:174\u2013184","journal-title":"Neural Netw"},{"key":"6362_CR15","doi-asserted-by":"publisher","first-page":"105995","DOI":"10.1016\/j.optlaseng.2019.105995","volume":"128","author":"SC Wang","year":"2020","unstructured":"Wang SC, Wang CH, Xu C (2020) An image encryption algorithm based on a hidden attractor chaos system and the Knuth-Durstenfeld algorithm. Opt Lasers Eng 128:105995","journal-title":"Opt Lasers Eng"},{"key":"6362_CR16","doi-asserted-by":"publisher","first-page":"111318","DOI":"10.1016\/j.chaos.2021.111318","volume":"152","author":"Z Man","year":"2021","unstructured":"Man Z, Li J, Di X et al (2021) Double image encryption algorithm based on neural network and chaos. Chaos, Solitons Fractals 152:111318","journal-title":"Chaos, Solitons Fractals"},{"issue":"3","key":"6362_CR17","doi-asserted-by":"publisher","first-page":"1781","DOI":"10.1007\/s11071-018-4659-2","volume":"95","author":"B Li","year":"2019","unstructured":"Li B, Liao X, Jiang Y (2019) A novel image encryption scheme based on improved random number generator and its implementation. Nonlinear Dyn 95(3):1781\u20131805","journal-title":"Nonlinear Dyn"},{"issue":"14","key":"6362_CR18","doi-asserted-by":"publisher","first-page":"1950194","DOI":"10.1142\/S0218127419501943","volume":"29","author":"Y Xiao","year":"2019","unstructured":"Xiao Y, Sun K, Yu M et al (2019) Dynamics of a new multi-cavity hyperchaotic map and its DSP implementation. Inter J Bifurcation Chaos 29(14):1950194","journal-title":"Inter J Bifurcation Chaos"},{"issue":"10","key":"6362_CR19","doi-asserted-by":"publisher","first-page":"11448","DOI":"10.1007\/s10489-021-03071-1","volume":"52","author":"Q Lai","year":"2022","unstructured":"Lai Q, Zhang H, Kuate PDK et al (2022) Analysis and implementation of no-equilibrium chaotic system with application in image encryption. Appl Intell 52(10):11448\u201311471","journal-title":"Appl Intell"},{"key":"6362_CR20","doi-asserted-by":"publisher","first-page":"68057","DOI":"10.1109\/ACCESS.2022.3181424","volume":"10","author":"A Sambas","year":"2022","unstructured":"Sambas A, Vaidyanathan S, Zhang X et al (2022) A novel 3D chaotic system with line equilibrium: multistability, integral sliding mode control, electronic circuit, FPGA implementation and its image encryption. IEEE Access 10:68057\u201368074","journal-title":"IEEE Access"},{"key":"6362_CR21","doi-asserted-by":"publisher","first-page":"128624","DOI":"10.1016\/j.physa.2023.128624","volume":"616","author":"B Liang","year":"2023","unstructured":"Liang B, Hu C, Tian Z et al (2023) A 3D chaotic system with multi-transient behavior and its application in image encryption. Physica A 616:128624","journal-title":"Physica A"},{"key":"6362_CR22","first-page":"154497","volume":"160","author":"A Gokyildirim","year":"2023","unstructured":"Gokyildirim A, Kocamaz UE, Uyaroglu Y et al (2023) A novel five-term 3D chaotic system with cubic nonlinearity and its microcontroller-based secure communication implementation. AEU-International Journal of Electronics and Communications 160:154497","journal-title":"AEU-International Journal of Electronics and Communications"},{"key":"6362_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.111992","volume":"158","author":"R Wang","year":"2022","unstructured":"Wang R, Li C, Kong S et al (2022) A 3D memristive chaotic system with conditional symmetry. Chaos, Solitons Fractals 158:111992","journal-title":"Chaos, Solitons Fractals"},{"key":"6362_CR24","doi-asserted-by":"publisher","first-page":"6773","DOI":"10.1007\/s11071-022-08101-2","volume":"111","author":"D Murillo-Escobar","year":"2023","unstructured":"Murillo-Escobar D, Murillo-Escobar MA et al (2023) Pseudorandom number generator based on novel 2D H\u00e9non-Sine hyperchaotic map with microcontroller implementation. Nonlinear Dyn 111:6773\u20136789","journal-title":"Nonlinear Dyn"},{"key":"6362_CR25","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1016\/j.ijleo.2018.01.064","volume":"159","author":"A Ur Rehman","year":"2018","unstructured":"Ur Rehman A, Liao X, Ashraf R et al (2018) A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2. Optik 159:348\u2013367","journal-title":"Optik"},{"issue":"12","key":"6362_CR26","doi-asserted-by":"publisher","first-page":"2050173","DOI":"10.1142\/S0218127420501734","volume":"30","author":"H Liu","year":"2020","unstructured":"Liu H, Kadir A, Xu C (2020) Color Image Encryption with Cipher Feedback and Coupling Chaotic Map. International Journal of Bifurcation and Chaos 30(12):2050173","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"6362_CR27","doi-asserted-by":"publisher","first-page":"3519","DOI":"10.1007\/s12652-018-1072-0","volume":"10","author":"A Bisht","year":"2019","unstructured":"Bisht A, Dua M, Dua S (2019) A novel approach to encrypt multiple images using multiple chaotic maps and chaotic discrete fractional random transform. J Ambient Intell Humaniz Comput 10:3519\u20133531","journal-title":"J Ambient Intell Humaniz Comput"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06362-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-024-06362-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06362-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:36:43Z","timestamp":1725550603000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-024-06362-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,13]]},"references-count":27,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["6362"],"URL":"https:\/\/doi.org\/10.1007\/s11227-024-06362-9","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,13]]},"assertion":[{"value":"12 July 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}