{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:30:04Z","timestamp":1773844204628,"version":"3.50.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T00:00:00Z","timestamp":1723766400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T00:00:00Z","timestamp":1723766400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100014717","name":"National Outstanding Youth Science Fund Project of National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072417"],"award-info":[{"award-number":["62072417"]}],"id":[{"id":"10.13039\/100014717","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100017700","name":"Henan Provincial Science and Technology Research Project","doi-asserted-by":"publisher","award":["202102210177"],"award-info":[{"award-number":["202102210177"]}],"id":[{"id":"10.13039\/501100017700","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s11227-024-06400-6","type":"journal-article","created":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T13:02:27Z","timestamp":1723813347000},"page":"25853-25887","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A hexadecimal scrambling image encryption scheme based on improved four-dimensional chaotic system"],"prefix":"10.1007","volume":"80","author":[{"given":"Shengtao","family":"Geng","sequence":"first","affiliation":[]},{"given":"Heng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xuncai","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,16]]},"reference":[{"issue":"10","key":"6400_CR1","doi-asserted-by":"crossref","first-page":"2247","DOI":"10.1049\/ipr2.12193","volume":"15","author":"X Wang","year":"2021","unstructured":"Wang X, Zhang M (2021) High-sensitivity synchronous image encryption based on improved one-dimensional compound sine map. IET Image Proc 15(10):2247\u20132265","journal-title":"IET Image Proc"},{"key":"6400_CR2","first-page":"127738","volume":"442","author":"Q Lai","year":"2023","unstructured":"Lai Q, Hu G, Erkan U, Toktas A (2023) High-efficiency medical image encryption method based on 2D Logistic-Gaussian hyperchaotic map. Appl Math Comput 442:127738","journal-title":"Appl Math Comput"},{"issue":"24","key":"6400_CR3","doi-asserted-by":"crossref","first-page":"22679","DOI":"10.1007\/s11071-023-09020-6","volume":"111","author":"Q Wang","year":"2023","unstructured":"Wang Q, Zhang X, Zhao X (2023) Color image encryption algorithm based on novel 2D hyper-chaotic system and DNA crossover and mutation. Nonlinear Dyn 111(24):22679\u201322705","journal-title":"Nonlinear Dyn"},{"key":"6400_CR4","doi-asserted-by":"crossref","first-page":"118845","DOI":"10.1016\/j.eswa.2022.118845","volume":"213","author":"Q Lai","year":"2023","unstructured":"Lai Q, Hu G, Erkan U, Toktas A (2023) A novel pixel-split image encryption scheme based on 2D Salomon map. Expert Syst Appl 213:118845","journal-title":"Expert Syst Appl"},{"key":"6400_CR5","first-page":"600","volume":"4","author":"H Jiang","year":"2008","unstructured":"Jiang H, Fu C (2008) An image encryption scheme based on Lorenz chaos system. Fourth Int Conf Nat Comput IEEE 4:600\u2013604","journal-title":"Fourth Int Conf Nat Comput IEEE"},{"key":"6400_CR6","doi-asserted-by":"crossref","unstructured":"Mu X, Song E (2010) A new color image encryption algorithm based on 3D Lorenz chaos sequences.In: 2010 First International Conference on Pervasive Computing, Signal Processing and Applications. IEEE, pp 269\u2013272","DOI":"10.1109\/PCSPA.2010.72"},{"key":"6400_CR7","doi-asserted-by":"crossref","unstructured":"Cel\u0130k K, Kurt E (2016) A new image encryption algorithm based on Lorenz system. In: 2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) IEEE, pp 1\u20136","DOI":"10.1109\/ECAI.2016.7861097"},{"key":"6400_CR8","doi-asserted-by":"crossref","unstructured":"Kumar GM, Chandrasekaran V (2009) A novel image encryption scheme using Lorenz attractor. In: 2009 4th IEEE Conference on industrial electronics and applications IEEE, pp 3662\u20133666","DOI":"10.1109\/ICIEA.2009.5138890"},{"key":"6400_CR9","first-page":"5586959","volume":"1","author":"R Lin","year":"2021","unstructured":"Lin R, Li S (2021) An image encryption scheme based on Lorenz hyperchaotic system and RSA algorithm. Sec Commun Netw 1:5586959","journal-title":"Sec Commun Netw"},{"key":"6400_CR10","doi-asserted-by":"crossref","unstructured":"Khan FA, Ahmed J, Khan, JS, Ahmad J, Khan MA (2017) A novel substitution box for encryption based on Lorenz equations. In: 2017 International conference on circuits, system and simulation (ICCSS) IEEE, pp 32\u201336","DOI":"10.1109\/CIRSYSSIM.2017.8023176"},{"key":"6400_CR11","doi-asserted-by":"crossref","unstructured":"Zhang J (2013) A symmetric image cryptosystem based on Chen\u2019s Chaotic system. In: 2013 Ninth International Conference on Natural Computation (ICNC) IEEE, pp 1278\u20131282","DOI":"10.1109\/ICNC.2013.6818175"},{"key":"6400_CR12","doi-asserted-by":"crossref","unstructured":"Fu C, Chen ZF, Zhao W, Jiang HY (2017) A new fast color image encryption scheme using chen chaotic system. In: 2017 18th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD) IEEE, pp 121\u2013126","DOI":"10.1109\/SNPD.2017.8022710"},{"issue":"14","key":"6400_CR13","doi-asserted-by":"crossref","first-page":"21983","DOI":"10.1007\/s11042-021-10526-7","volume":"82","author":"Y Hui","year":"2023","unstructured":"Hui Y, Liu H, Fang P (2023) A DNA image encryption based on a new hyperchaotic system. Multimed Tools Appl 82(14):21983\u201322007","journal-title":"Multimed Tools Appl"},{"key":"6400_CR14","doi-asserted-by":"crossref","unstructured":"Lai Q, Yang L, Chen G (2023) Design and performance analysis of discrete memristive hyperchaotic systems with stuffed cube attractors and ultraboosting behaviors. In: IEEE Transactions on Industrial Electronics","DOI":"10.1109\/TIE.2023.3299016"},{"issue":"4","key":"6400_CR15","doi-asserted-by":"crossref","first-page":"4505","DOI":"10.1007\/s11071-021-06472-6","volume":"104","author":"Z Hua","year":"2021","unstructured":"Hua Z, Zhu Z, Che Y, Li Y (2021) Color image encryption using orthogonal Latin squares and a new 2D chaotic system. Nonlinear Dyn 104(4):4505\u20134522","journal-title":"Nonlinear Dyn"},{"key":"6400_CR16","doi-asserted-by":"crossref","first-page":"1277","DOI":"10.1007\/s11071-021-07017-7","volume":"107","author":"X Wang","year":"2022","unstructured":"Wang X, Su Y, Xu M, Zhang H, Zhang Y (2022) A new image encryption algorithm based on Latin square matrix. Nonlinear Dyn 107:1277\u20131293","journal-title":"Nonlinear Dyn"},{"key":"6400_CR17","doi-asserted-by":"crossref","first-page":"1469","DOI":"10.1007\/s11042-012-1292-9","volume":"71","author":"B Norouzi","year":"2014","unstructured":"Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71:1469\u20131497","journal-title":"Multimed Tools Appl"},{"key":"6400_CR18","doi-asserted-by":"crossref","unstructured":"Xu X, Feng J (2010) Research and implementation of image encryption algorithm based on zigzag transformation and inner product polarization vector. In: 2010 IEEE International Conference on Granular Computing, pp 556\u2013561","DOI":"10.1109\/GrC.2010.11"},{"key":"6400_CR19","first-page":"103340","volume":"70","author":"Q Wang","year":"2022","unstructured":"Wang Q, Zhan X, Zhao X (2022) Image encryption algorithm based on improved Zigzag transformation and quaternary DNA coding. J Inf Sec Appl 70:103340","journal-title":"J Inf Sec Appl"},{"issue":"8","key":"6400_CR20","doi-asserted-by":"crossref","first-page":"11301","DOI":"10.1007\/s11042-022-12269-5","volume":"81","author":"Z Guo","year":"2022","unstructured":"Guo Z, Sun P (2022) Improved reverse zigzag transform and DNA diffusion chaotic image encryption method. Multimed Tools Appl 81(8):11301\u201311323","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"6400_CR21","doi-asserted-by":"crossref","first-page":"6647","DOI":"10.1007\/s11042-017-4577-1","volume":"77","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Tang Y (2018) A plaintext-related image encryption algorithm based on chaos. Multimed Tools Appl 77(6):6647\u20136669","journal-title":"Multimed Tools Appl"},{"key":"6400_CR22","first-page":"127291","volume":"430","author":"C Zou","year":"2022","unstructured":"Zou C, Wang X, Zhou C, Xu S, Huang C (2022) A novel image encryption algorithm based on DNA strand exchange and diffusion. Appl Math Comput 430:127291","journal-title":"Appl Math Comput"},{"issue":"4","key":"6400_CR23","doi-asserted-by":"crossref","first-page":"3583","DOI":"10.1007\/s11071-021-06941-y","volume":"106","author":"Z Hua","year":"2021","unstructured":"Hua Z, Li J, Li Y, Chen Y (2021) Image encryption using value-differencing transformation and modified ZigZag transformation. Nonlinear Dyn 106(4):3583\u20133599","journal-title":"Nonlinear Dyn"},{"key":"6400_CR24","doi-asserted-by":"crossref","first-page":"96321","DOI":"10.1109\/ACCESS.2021.3094563","volume":"9","author":"Y Sha","year":"2021","unstructured":"Sha Y, Cao Y, Yan H, Gao X, Mou J (2021) An image encryption scheme based on IAVL permutation scheme and DNA operations. IEEE Access 9:96321\u201396336","journal-title":"IEEE Access"},{"key":"6400_CR25","doi-asserted-by":"crossref","first-page":"1151","DOI":"10.1007\/s11071-015-2057-6","volume":"81","author":"JX Chen","year":"2015","unstructured":"Chen JX, Zhu ZL, Fu C, Zhang LB, Zhang Y (2015) An efficient image encryption scheme using lookup table-based confusion and diffusion. Nonlinear Dyn 81:1151\u20131166","journal-title":"Nonlinear Dyn"},{"issue":"7","key":"6400_CR26","doi-asserted-by":"crossref","first-page":"6813","DOI":"10.1007\/s11071-022-08158-z","volume":"111","author":"J Wen","year":"2023","unstructured":"Wen J, Xu X, Sun K, Jiang Z, Wang X (2023) Triple-image bit-level encryption algorithm based on double cross 2D hyperchaotic map. Nonlinear Dyn 111(7):6813\u20136838","journal-title":"Nonlinear Dyn"},{"key":"6400_CR27","doi-asserted-by":"crossref","first-page":"106782","DOI":"10.1016\/j.optlaseng.2021.106782","volume":"149","author":"W Zhou","year":"2022","unstructured":"Zhou W, Wang X, Wang M, Li D (2022) A new combination chaotic system and its application in a new Bit-level image encryption scheme. Opt Lasers Eng 149:106782","journal-title":"Opt Lasers Eng"},{"key":"6400_CR28","first-page":"116495","volume":"99","author":"KU Shahna","year":"2021","unstructured":"Shahna KU, Mohamed A (2021) Novel hyper chaotic color image encryption based on pixel and bit level scrambling with diffusion. Signal Process: Image Commun 99:116495","journal-title":"Signal Process: Image Commun"},{"key":"6400_CR29","doi-asserted-by":"crossref","first-page":"109655","DOI":"10.1016\/j.optlastec.2023.109655","volume":"167","author":"H Zhang","year":"2023","unstructured":"Zhang H, Hu H, Ding W (2023) Image encryption algorithm based on Hilbert sorting vector and new spatiotemporal chaotic system. Opt Laser Technol 167:109655","journal-title":"Opt Laser Technol"},{"key":"6400_CR30","doi-asserted-by":"crossref","first-page":"18479","DOI":"10.1007\/s11042-021-10631-7","volume":"80","author":"CL Li","year":"2021","unstructured":"Li CL, Zhou Y, Li HM, Feng W, Du JR (2021) Image encryption scheme with bit-level scrambling and multiplication diffusion. Multimed Tools Appl 80:18479\u201318501","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"6400_CR31","doi-asserted-by":"crossref","first-page":"731","DOI":"10.1007\/s00371-023-02812-2","volume":"40","author":"C Li","year":"2024","unstructured":"Li C, Zhang Y, Li H, Zhou Y (2024) Visual image encryption scheme based on inter-intra-block scrambling and weighted diffusion. Vis Comput 40(2):731\u2013746","journal-title":"Vis Comput"},{"key":"6400_CR32","doi-asserted-by":"crossref","first-page":"171132","DOI":"10.1016\/j.ijleo.2023.171132","volume":"287","author":"B Sun","year":"2023","unstructured":"Sun B, Zhang C, Peng Q, Du B (2023) Color image encryption algorithm based on 5D memristive chaotic system and group scrambling. Optik 287:171132","journal-title":"Optik"},{"key":"6400_CR33","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1016\/j.optlastec.2018.07.052","volume":"108","author":"M Wang","year":"2018","unstructured":"Wang M, Wang X, Zhang Y, Gao Z (2018) A novel chaotic encryption scheme based on image segmentation and multiple diffusion models. Opt Laser Technol 108:558\u2013573","journal-title":"Opt Laser Technol"},{"issue":"07","key":"6400_CR34","doi-asserted-by":"crossref","first-page":"1465","DOI":"10.1142\/S0218127499001024","volume":"9","author":"G Chen","year":"1999","unstructured":"Chen G, Ueta T (1999) Yet another chaotic attractor. Int J Bifurc Chaos 9(07):1465\u20131466","journal-title":"Int J Bifurc Chaos"},{"issue":"4","key":"6400_CR35","doi-asserted-by":"crossref","first-page":"3851","DOI":"10.1007\/s11071-022-07993-4","volume":"111","author":"JY Sun","year":"2023","unstructured":"Sun JY, Cai H, Gao ZB, Wang CP, Zhang H (2023) A novel non-equilibrium hyperchaotic system and application on color image steganography with FPGA implementation. Nonlinear Dyn 111(4):3851\u20133868","journal-title":"Nonlinear Dyn"},{"key":"6400_CR36","doi-asserted-by":"crossref","first-page":"102126","DOI":"10.1016\/j.vlsi.2023.102126","volume":"95","author":"J Zhang","year":"2023","unstructured":"Zhang J, Zuo J, Guo Y, Hou J, Xie Q (2023) Nonlinear analysis, circuit implementation, and application in image encryption of a four-dimensional multi-scroll hyper-chaotic system. Integration 95:102126","journal-title":"Integration"},{"issue":"4","key":"6400_CR37","doi-asserted-by":"crossref","first-page":"3919","DOI":"10.1007\/s11071-021-07149-w","volume":"107","author":"D Yan","year":"2022","unstructured":"Yan D, Ji\u2019e M, Wang L, Duan S, Du X (2022) Generating novel multi-scroll chaotic attractors via fractal transformation. Nonlinear Dyn 107(4):3919\u20133944","journal-title":"Nonlinear Dyn"},{"issue":"4","key":"6400_CR38","doi-asserted-by":"crossref","first-page":"10039","DOI":"10.1007\/s11042-023-16025-1","volume":"83","author":"S Wang","year":"2024","unstructured":"Wang S, Sun B, Wang Y, Du B (2024) Image encryption algorithm using multi-base diffusion and a new four-dimensional chaotic system. Multimed Tools Appl 83(4):10039\u201310060","journal-title":"Multimed Tools Appl"},{"key":"6400_CR39","doi-asserted-by":"crossref","first-page":"126793","DOI":"10.1016\/j.physa.2021.126793","volume":"591","author":"LH Gong","year":"2022","unstructured":"Gong LH, Luo HX, Wu RQ, Zhou NR (2022) New 4D chaotic system with hidden attractors and self-excited attractors and its application in image encryption based on RNG. Physica A 591:126793","journal-title":"Physica A"},{"key":"6400_CR40","first-page":"102484","volume":"52","author":"R Vidhya","year":"2020","unstructured":"Vidhya R, Brindha M (2020) A novel conditional butterfly network topology based chaotic image encryption. J Inf Sec Appl 52:102484","journal-title":"J Inf Sec Appl"},{"issue":"3","key":"6400_CR41","doi-asserted-by":"crossref","first-page":"501","DOI":"10.3390\/electronics12030501","volume":"12","author":"T Zhang","year":"2023","unstructured":"Zhang T, Zhu B, Ma Y, Zhou X (2023) A novel image encryption algorithm based on multiple random DNA coding and annealing. Electronics 12(3):501","journal-title":"Electronics"},{"key":"6400_CR42","doi-asserted-by":"crossref","first-page":"27361","DOI":"10.1109\/ACCESS.2020.2971759","volume":"8","author":"L Liu","year":"2020","unstructured":"Liu L, Lei Y, Wang D (2020) A fast chaotic image encryption scheme with simultaneous permutation-diffusion operation. IEEE access 8:27361\u201327374","journal-title":"IEEE access"},{"key":"6400_CR43","doi-asserted-by":"crossref","first-page":"106366","DOI":"10.1016\/j.optlastec.2020.106366","volume":"131","author":"X Wang","year":"2020","unstructured":"Wang X, Guan N (2020) A novel chaotic image encryption algorithm based on extended Zigzag confusion and RNA operation. Opt Laser Technol 131:106366","journal-title":"Opt Laser Technol"},{"key":"6400_CR44","doi-asserted-by":"crossref","first-page":"164884","DOI":"10.1016\/j.ijleo.2020.164884","volume":"217","author":"X Wang","year":"2020","unstructured":"Wang X, Yang J (2020) A novel image encryption scheme of dynamic S-boxes and random blocks based on spatiotemporal chaotic system. Optik 217:164884","journal-title":"Optik"},{"key":"6400_CR45","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1007\/s11042-020-09688-7","volume":"80","author":"X Wang","year":"2021","unstructured":"Wang X, Xue W, An J (2021) Image encryption algorithm based on LDCML and DNA coding sequence. Multimed Tools Appl 80:591\u2013614","journal-title":"Multimed Tools Appl"},{"issue":"19","key":"6400_CR46","doi-asserted-by":"crossref","first-page":"27453","DOI":"10.1007\/s11042-022-12762-x","volume":"81","author":"SF Yousif","year":"2022","unstructured":"Yousif SF, Abboud AJ, Alhumaima RS (2022) A new image encryption based on bit replacing, chaos and DNA coding techniques. Multimed Tools Appl 81(19):27453\u201327493","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"6400_CR47","doi-asserted-by":"crossref","first-page":"231","DOI":"10.3390\/math11010231","volume":"11","author":"S Zhu","year":"2023","unstructured":"Zhu S, Deng X, Zhang W, Zhu C (2023) Image encryption scheme based on newly designed chaotic map and parallel DNA coding. Mathematics 11(1):231","journal-title":"Mathematics"},{"issue":"2","key":"6400_CR48","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1007\/s11071-014-1492-0","volume":"78","author":"B Norouzi","year":"2014","unstructured":"Norouzi B, Mirzakuchaki S (2014) A fast color image encryption algorithm based on hyper-chaotic systems. Nonlinear Dyn 78(2):995\u20131015","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"6400_CR49","doi-asserted-by":"crossref","first-page":"3473","DOI":"10.1007\/s11042-023-15284-2","volume":"83","author":"D Zhang","year":"2024","unstructured":"Zhang D, Chen L, Li T (2024) Hyper-chaotic color image encryption based on 3D orthogonal Latin cubes and RNA diffusion. Multimed Tools Appl 83(2):3473\u20133496","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"6400_CR50","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1007\/s11042-021-11384-z","volume":"81","author":"KM Hosny","year":"2022","unstructured":"Hosny KM, Kamal ST, Darwish MM (2022) A color image encryption technique using block scrambling and chaos. Multimed Tools Appl 81(1):505\u2013525","journal-title":"Multimed Tools Appl"},{"key":"6400_CR51","doi-asserted-by":"crossref","first-page":"111989","DOI":"10.1016\/j.chaos.2022.111989","volume":"158","author":"M Li","year":"2022","unstructured":"Li M, Wang M, Fan H, An K, Liu G (2022) A novel plaintext-related chaotic image encryption scheme with no additional plaintext information. Chaos, Solitons Fractals 158:111989","journal-title":"Chaos, Solitons Fractals"},{"key":"6400_CR52","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-18838-0","author":"Z Liang","year":"2024","unstructured":"Liang Z, Chen L, Chen K, Liang Z, Wen K, Zhu J, Hu Y (2024) Holographic encryption algorithm based on DNA coding and bit-plane decomposition. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-024-18838-0","journal-title":"Multimed Tools Appl"},{"key":"6400_CR53","doi-asserted-by":"crossref","first-page":"119074","DOI":"10.1016\/j.eswa.2022.119074","volume":"213","author":"D Wei","year":"2023","unstructured":"Wei D, Jiang M, Deng Y (2023) A secure image encryption algorithm based on hyper-chaotic and bit-level permutation. Expert Syst Appl 213:119074","journal-title":"Expert Syst Appl"},{"key":"6400_CR54","doi-asserted-by":"crossref","first-page":"105854","DOI":"10.1016\/j.optlastec.2019.105854","volume":"122","author":"X Wang","year":"2020","unstructured":"Wang X, Sun H (2020) A chaotic image encryption algorithm based on improved Joseph traversal and cyclic shift function. Opt Laser Technol 122:105854","journal-title":"Opt Laser Technol"},{"key":"6400_CR55","doi-asserted-by":"crossref","first-page":"112456","DOI":"10.1016\/j.chaos.2022.112456","volume":"162","author":"J Yu","year":"2022","unstructured":"Yu J, Xie W, Zhong Z, Wang H (2022) Image encryption algorithm based on hyperchaotic system and a new DNA sequence operation. Chaos, Solitons Fractals 162:112456","journal-title":"Chaos, Solitons Fractals"},{"key":"6400_CR56","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10\u201318","journal-title":"Opt Lasers Eng"},{"issue":"2","key":"6400_CR57","doi-asserted-by":"crossref","first-page":"3621","DOI":"10.1007\/s11042-023-15662-w","volume":"83","author":"YG Yang","year":"2024","unstructured":"Yang YG, Wang ZJ, Wang BP, Zhou YH, Shi WM, Liao X (2024) A new visually meaningful double-image encryption algorithm combining 2D compressive sensing with fractional-order chaotic system. Multimed Tools Appl 83(2):3621\u20133655","journal-title":"Multimed Tools Appl"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06400-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-024-06400-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06400-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T20:40:15Z","timestamp":1726778415000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-024-06400-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,16]]},"references-count":57,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["6400"],"URL":"https:\/\/doi.org\/10.1007\/s11227-024-06400-6","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,16]]},"assertion":[{"value":"30 July 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}