{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,11]],"date-time":"2026-05-11T13:49:27Z","timestamp":1778507367186,"version":"3.51.4"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T00:00:00Z","timestamp":1772755200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T00:00:00Z","timestamp":1772755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62061014"],"award-info":[{"award-number":["62061014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-025-08196-5","type":"journal-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T05:46:37Z","timestamp":1772775997000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Design of a three-dimensional logistic map and its application to seafood image encryption"],"prefix":"10.1007","volume":"82","author":[{"given":"Siqi","family":"Ding","sequence":"first","affiliation":[]},{"given":"Fan","family":"Shi","sequence":"additional","affiliation":[]},{"given":"U\u011fur","family":"Erkan","sequence":"additional","affiliation":[]},{"given":"Abdurrahim","family":"Toktas","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chunpeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Suo","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Mou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,6]]},"reference":[{"issue":"11","key":"8196_CR1","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.1007\/s11227-025-07670-4","volume":"81","author":"P Ding","year":"2025","unstructured":"Ding P, Hu W, Geng P, Zhang J, Zhu J (2025) A new multi-wing hyperchaotic system and its application in image encryption. J Supercomput 81(11):1201","journal-title":"J Supercomput"},{"issue":"8","key":"8196_CR2","doi-asserted-by":"publisher","first-page":"7706","DOI":"10.1109\/TCSVT.2025.3545868","volume":"35","author":"S Gao","year":"2025","unstructured":"Gao S, Iu HH-C, Erkan U, Simsek C, Toktas A, Cao Y, Wu R, Mou J, Li Q, Wang C (2025) A 3D memristive cubic map with dual discrete memristors: design, implementation, and application in image encryption. IEEE Trans Circuits Syst Video Technol 35(8):7706\u20137718","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"8","key":"8196_CR3","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1007\/s11227-025-07363-y","volume":"81","author":"J Fang","year":"2025","unstructured":"Fang J, Guo N, Liang S, Xiang Y (2025) Application of three-dimensional Rubik\u2019s cube scrambling and genetic information diffusion in multiple-color image encryption. J Supercomput 81(8):982","journal-title":"J Supercomput"},{"issue":"6","key":"8196_CR4","doi-asserted-by":"publisher","first-page":"8011","DOI":"10.1109\/TDSC.2025.3603570","volume":"22","author":"S Gao","year":"2025","unstructured":"Gao S, Zhang Z, Li Q, Ding S, Iu HH-C, Cao Y, Xu X, Wang C, Mou J (2025) Encrypt a story: a video segment encryption method based on the discrete sinusoidal memristive Rulkov neuron. IEEE Trans Depend Secure Comput 22(6):8011\u20138024","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"8196_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2025.100816","volume":"58","author":"S Gao","year":"2025","unstructured":"Gao S, Wu R, Iu HH-C, Erkan U, Cao Y, Li Q, Toktas A, Mou J (2025) Chaos-based video encryption techniques: a review. Comput Sci Rev 58:100816","journal-title":"Comput Sci Rev"},{"key":"8196_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2025.111017","volume":"156","author":"S Zhou","year":"2025","unstructured":"Zhou S, Tao Z, Erkan U, Toktas A, Iu HH-C, Zhang Y, Zhang H (2025) Multidimensional chaotic signals generation using deep learning and its application in image encryption. Eng Appl Artif Intell 156:111017","journal-title":"Eng Appl Artif Intell"},{"issue":"13","key":"8196_CR7","doi-asserted-by":"publisher","first-page":"17 177","DOI":"10.1007\/s11071-025-11001-w","volume":"113","author":"C \u015eim\u015fek","year":"2025","unstructured":"\u015eim\u015fek C, Erkan U, Toktas A, Lai Q, Gao S (2025) Hexadecimal permutation and 2D cumulative diffusion image encryption using hyperchaotic sinusoidal exponential memristive system. Nonlinear Dyn 113(13):17 177-17 208","journal-title":"Nonlinear Dyn"},{"key":"8196_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2025.3567878","author":"F Yu","year":"2025","unstructured":"Yu F, He S, Yao W, Cai S, Xu Q (2025) Bursting firings in memristive hopffeld neural network with image encryption and hardware implementation. IEEE Trans Comput-Aided Design Integrated Circuits Syst. https:\/\/doi.org\/10.1109\/TCAD.2025.3567878","journal-title":"IEEE Trans Comput-Aided Design Integrated Circuits Syst"},{"key":"8196_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.114440","volume":"179","author":"F Yu","year":"2024","unstructured":"Yu F, Kong X, Yao W, Zhang J, Cai S, Lin H, Jin J (2024) Dynamics analysis, synchronization and FPGA implementation of multiscroll Hopfield neural networks with non-polynomial memristor. Chaos Solitons Fractals 179:114440","journal-title":"Chaos Solitons Fractals"},{"key":"8196_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2025.3635150","author":"X Cheng","year":"2025","unstructured":"Cheng X, Wang H, Luo X, Guan Q, Ma B, Wang J (2025) Re-cropping framework: a grid recovery method for quantization step estimation in non-aligned recompressed images. IEEE Trans Circuits Syst Video Technol. https:\/\/doi.org\/10.1109\/TCSVT.2025.3635150","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"8196_CR11","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1016\/j.apm.2024.06.016","volume":"134","author":"S Gao","year":"2024","unstructured":"Gao S, Liu J, Iu HH-C, Erkan U, Zhou S, Wu R, Tang X (2024) Development of a video encryption algorithm for critical areas using 2D extended Schaffer function map and neural networks. Appl Math Model 134:520\u2013537","journal-title":"Appl Math Model"},{"key":"8196_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.115740","volume":"190","author":"M Wang","year":"2025","unstructured":"Wang M, Yi Z, Li Z (2025) A memristive Ikeda map and its application in image encryption. Chaos Solitons Fractals 190:115740","journal-title":"Chaos Solitons Fractals"},{"key":"8196_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124891","volume":"257","author":"Y Lin","year":"2024","unstructured":"Lin Y, Xie Z, Chen T, Cheng X, Wen H (2024) Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics. Expert Syst Appl 257:124891","journal-title":"Expert Syst Appl"},{"issue":"4","key":"8196_CR14","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/adbac1","volume":"100","author":"R Si","year":"2025","unstructured":"Si R, Hu Q, Yan X (2025) A ship image encryption algorithm based on novel spatiotemporal chaotic system. Phys Scr 100(4):045213","journal-title":"Phys Scr"},{"issue":"5\u20138","key":"8196_CR15","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1080\/13682199.2022.2156669","volume":"69","author":"A Kumar","year":"2021","unstructured":"Kumar A, Dua M (2021) A novel chaos map based medical image encryption scheme. Imaging Sci J 69(5\u20138):219\u2013238","journal-title":"Imaging Sci J"},{"issue":"19","key":"8196_CR16","doi-asserted-by":"publisher","first-page":"17 477","DOI":"10.1007\/s11071-024-09953-6","volume":"112","author":"G Wang","year":"2024","unstructured":"Wang G, Ye X, Zhao B (2024) A novel remote sensing image encryption scheme based on block period Arnold scrambling. Nonlinear Dyn 112(19):17 477-17 507","journal-title":"Nonlinear Dyn"},{"key":"8196_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2025.122502","volume":"719","author":"W Shang","year":"2025","unstructured":"Shang W, Liu Z, Wang S, Ding L, Shang X, Zhou Z, Wang L (2025) Secure color image encryption algorithm for face recognition using Zaslavsky and Arnold cat maps with binary bit-plane decomposition. Inf Sci 719:122502","journal-title":"Inf Sci"},{"key":"8196_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121452","volume":"237","author":"O Kocak","year":"2024","unstructured":"Kocak O, Erkan U, Toktas A, Gao S (2024) Pso-based image encryption scheme using modular integrated logistic exponential map. Expert Syst Appl 237:121452","journal-title":"Expert Syst Appl"},{"issue":"2","key":"8196_CR19","doi-asserted-by":"publisher","first-page":"115","DOI":"10.3390\/fractalfract9020115","volume":"9","author":"F Yu","year":"2025","unstructured":"Yu F, Zhang S, Su D, Wu Y, Gracia YM, Yin H (2025) Dynamic analysis and implementation of FPGA for a new 4D fractional-order memristive hopfield neural network. Fractal Fract 9(2):115","journal-title":"Fractal Fract"},{"issue":"1","key":"8196_CR20","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/s44198-025-00308-2","volume":"32","author":"R Ramar","year":"2025","unstructured":"Ramar R, Sambas A, Ka\u00e7ar S, Kuzievich KJ, Sulaiman IM, Ordukaya M, Tel\u00e7eken M (2025) Design of new chaotic system with hyperbolic sine function based on pseudo-random number generation for medical image encryption. J Nonlinear Math Phys 32(1):52","journal-title":"J Nonlinear Math Phys"},{"issue":"12","key":"8196_CR21","doi-asserted-by":"publisher","first-page":"887","DOI":"10.3390\/fractalfract7120887","volume":"7","author":"W Feng","year":"2023","unstructured":"Feng W, Wang Q, Liu H, Ren Y, Zhang J, Zhang S, Qian K, Wen H (2023) Exploiting newly designed fractional-order 3D Lorenz chaotic system and 2D discrete polynomial hyper-chaotic map for high-performance multi-image encryption. Fractal Fract 7(12):887","journal-title":"Fractal Fract"},{"issue":"4","key":"8196_CR22","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/s10586-024-04948-9","volume":"28","author":"K Benyahia","year":"2025","unstructured":"Benyahia K, Khobzaoui A, Benbakreti S (2025) Hybrid image encryption: leveraging DNA sequencing and Lorenz chaotic dynamics for enhanced security. Clust Comput 28(4):218","journal-title":"Clust Comput"},{"key":"8196_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cjph.2025.10.010","author":"Y Xu","year":"2025","unstructured":"Xu Y, Gao S, Xu X, Banerjee S, Mou J, Cao Y (2025) Neuronal dynamics and pain perception modeling based on the SMM-HR model. Chin J Phys. https:\/\/doi.org\/10.1016\/j.cjph.2025.10.010","journal-title":"Chin J Phys"},{"key":"8196_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2025.126883","volume":"274","author":"D Singh","year":"2025","unstructured":"Singh D, Kumar S (2025) Image authentication and encryption algorithm based on RSA cryptosystem and chaotic maps. Expert Syst Appl 274:126883","journal-title":"Expert Syst Appl"},{"issue":"9","key":"8196_CR25","doi-asserted-by":"publisher","first-page":"5237","DOI":"10.1109\/TSMC.2024.3401412","volume":"54","author":"A Toktas","year":"2024","unstructured":"Toktas A, Erkan U, Ustun D, Lai Q (2024) Multiobjective design of 2D hyperchaotic system using leader pareto grey wolf optimizer. IEEE Trans Syst Man Cybern Syst 54(9):5237\u20135247","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"issue":"14","key":"8196_CR26","doi-asserted-by":"publisher","first-page":"28 598","DOI":"10.1109\/JIOT.2025.3566439","volume":"12","author":"J Sun","year":"2024","unstructured":"Sun J, Yang J, Wang Y, Wang Y (2024) HNN-HR chaotic system with controllable multistable memristor for IIoT image encryption. IEEE Intern Things J 12(14):28 598-28 610","journal-title":"IEEE Intern Things J"},{"issue":"9","key":"8196_CR27","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1007\/s11227-025-07574-3","volume":"81","author":"Z Guitouni","year":"2025","unstructured":"Guitouni Z, Zayani HM (2025) Quantum chaotic techniques for medical image encryption in next-generation IoMT applications. J Supercomput 81(9):1070","journal-title":"J Supercomput"},{"key":"8196_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2025.126521","volume":"270","author":"A Mansouri","year":"2025","unstructured":"Mansouri A, Sun P, Lv C, Zhu Y, Zhao X, Ge H, Sun C (2025) A secure medical image encryption algorithm for IoMT using a quadratic-sine chaotic map and pseudo-parallel confusion\u2013diffusion mechanism. Expert Syst Appl 270:126521","journal-title":"Expert Syst Appl"},{"key":"8196_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2024.102336","volume":"101","author":"S Zhou","year":"2025","unstructured":"Zhou S, Wei Y, Zhang Y, Iu HH-C, Zhang H (2025) Image encryption algorithm based on the dynamic RNA computing and a new chaotic map. Integration 101:102336","journal-title":"Integration"},{"issue":"6","key":"8196_CR30","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1140\/epjp\/s13360-024-05280-2","volume":"139","author":"X Wang","year":"2024","unstructured":"Wang X, Cao Y, Xu X, Mou J (2024) A novel memristor-coupled hyperchaotic map: dynamical analysis, linear transform control and encryption application. Eur Phys J Plus 139(6):480","journal-title":"Eur Phys J Plus"},{"key":"8196_CR31","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1063\/5.0270220","volume":"35","author":"S Gao","year":"2025","unstructured":"Gao S, Ding S, Ho-Ching Iu H, Erkan U, Toktas A, Simsek C, Wu R, Xu X, Cao Y, Mou J (2025) A three-dimensional memristor-based hyperchaotic map for pseudorandom number generation and multi-image encryption. Chaos: Interdiscipl J Nonlinear Sci 35:7","journal-title":"Chaos: Interdiscipl J Nonlinear Sci"},{"issue":"4","key":"8196_CR32","first-page":"1625","volume":"70","author":"Q Lai","year":"2022","unstructured":"Lai Q, Yang L (2022) A new 3D memristive hyperchaotic map with multi-parameter-relied dynamics. IEEE Trans Circuits Syst II Express Briefs 70(4):1625\u20131629","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"issue":"10","key":"8196_CR33","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ae0d0b","volume":"100","author":"X-L Xu","year":"2025","unstructured":"Xu X-L, Jiang Z, Wang H-X, Zhang H, Liu S-H, Wang M-M (2025) Novel four random phase encoding and 1D log-cosine-tent chaotic map for multi-image compression\u2013encryption. Phys Scr 100(10):105207","journal-title":"Phys Scr"},{"key":"8196_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.126201","volume":"275","author":"MA Midoun","year":"2025","unstructured":"Midoun MA, Cai X, Talhaoui MZ, Mekkaoui DE, Smaili A (2025) Rotary combination permutation and image tiling to safeguard real-time image-based systems through a new 1D-chaotic map. Expert Syst Appl 275:126201","journal-title":"Expert Syst Appl"},{"issue":"4","key":"8196_CR35","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s10462-024-10719-0","volume":"57","author":"S Kumar","year":"2024","unstructured":"Kumar S, Sharma D (2024) A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm. Artif Intell Rev 57(4):87","journal-title":"Artif Intell Rev"},{"key":"8196_CR36","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1016\/j.ins.2022.11.121","volume":"621","author":"S Gao","year":"2023","unstructured":"Gao S, Wu R, Wang X, Liu J, Li Q, Tang X (2023) EFR-CSTP: encryption for face recognition based on the chaos and semi-tensor product theory. Inf Sci 621:766\u2013781","journal-title":"Inf Sci"},{"issue":"19","key":"8196_CR37","doi-asserted-by":"publisher","first-page":"3156","DOI":"10.3390\/electronics11193156","volume":"11","author":"M Lawnik","year":"2022","unstructured":"Lawnik M, Moysis L, Volos C (2022) Chaos-based cryptography: text encryption using image algorithms. Electronics 11(19):3156","journal-title":"Electronics"},{"key":"8196_CR38","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"Z Hua","year":"2019","unstructured":"Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403\u2013419","journal-title":"Inf Sci"},{"key":"8196_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2021.111693","volume":"154","author":"X Liu","year":"2022","unstructured":"Liu X, Tong X, Wang Z, Zhang M (2022) A new n-dimensional conservative chaos based on generalized Hamiltonian system and its\u2019 applications in image encryption. Chaos Solitons Fractals 154:111693","journal-title":"Chaos Solitons Fractals"},{"key":"8196_CR40","doi-asserted-by":"publisher","first-page":"11 541","DOI":"10.1109\/ACCESS.2023.3242311","volume":"11","author":"W Alexan","year":"2023","unstructured":"Alexan W, Elkandoz M, Mashaly M, Azab E, Aboshousha A (2023) Color image encryption through chaos and KAA map. IEEE Access 11:11 541-11 554","journal-title":"IEEE Access"},{"issue":"4","key":"8196_CR41","doi-asserted-by":"publisher","first-page":"4433","DOI":"10.1007\/s11071-022-07371-0","volume":"108","author":"D Ding","year":"2022","unstructured":"Ding D, Xiao H, Yang Z, Luo H, Hu Y, Zhang X, Liu Y (2022) Coexisting multi-stability of hopfield neural network based on coupled fractional-order locally active memristor and its application in image encryption. Nonlinear Dyn 108(4):4433\u20134458","journal-title":"Nonlinear Dyn"},{"key":"8196_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117861","volume":"206","author":"B Jasra","year":"2022","unstructured":"Jasra B, Moon AH (2022) Color image encryption and authentication using dynamic DNA encoding and hyper chaotic system. Expert Syst Appl 206:117861","journal-title":"Expert Syst Appl"},{"issue":"21","key":"8196_CR43","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.3390\/math13213442","volume":"13","author":"S Ding","year":"2025","unstructured":"Ding S, Meng K, Zhang M, Lin Y, Wang C, Li Q, Gao S, Mou J (2025) Three-dimensional discrete echo-memristor map: dynamic analysis and DSP implementation. Mathematics 13(21):3442","journal-title":"Mathematics"},{"issue":"8","key":"8196_CR44","doi-asserted-by":"publisher","first-page":"9668","DOI":"10.1109\/TIE.2023.3292857","volume":"71","author":"L Fu","year":"2024","unstructured":"Fu L, Wu X, He S, Wang H, Sun K (2024) A memristive H\u00e9non map based on the state variable difference and its analog circuit implementation. IEEE Trans Ind Electron 71(8):9668\u20139676","journal-title":"IEEE Trans Ind Electron"},{"key":"8196_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2025.116480","volume":"196","author":"MS Feali","year":"2025","unstructured":"Feali MS (2025) Chaotic dynamics of discrete memristor-coupled Sinh map. Chaos Solitons Fractals 196:116480","journal-title":"Chaos Solitons Fractals"},{"key":"8196_CR46","doi-asserted-by":"crossref","unstructured":"Ulucan O, Karakaya D, Turkan M (2020) A large-scale dataset for fish segmentation and classification. In: 2020 Innovations in Intelligent Systems and Applications Conference (ASYU). IEEE 2020, pp 1\u20135","DOI":"10.1109\/ASYU50717.2020.9259867"},{"issue":"2","key":"8196_CR47","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S et al (2011) NPCR and UACI randomness tests for image encryption. J Sel Areas Telecommun 1(2):31\u201338","journal-title":"J Sel Areas Telecommun"},{"issue":"8","key":"8196_CR48","doi-asserted-by":"publisher","first-page":"3726","DOI":"10.1109\/TCSI.2024.3407809","volume":"71","author":"L Huang","year":"2024","unstructured":"Huang L, Gao H (2024) Multi-image encryption algorithm based on novel spatiotemporal chaotic system and fractal geometry. IEEE Trans Circuits Syst I Regul Pap 71(8):3726\u20133739","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"issue":"1","key":"8196_CR49","doi-asserted-by":"publisher","first-page":"3977","DOI":"10.1109\/TCE.2023.3285626","volume":"70","author":"M Singh","year":"2024","unstructured":"Singh M, Baranwal N, Singh KN, Singh AK (2024) Using GAN-based encryption to secure digital images with reconstruction through customized super resolution network. IEEE Trans Consum Electron 70(1):3977\u20133984","journal-title":"IEEE Trans Consum Electron"},{"issue":"1","key":"8196_CR50","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1109\/TGCN.2021.3095707","volume":"6","author":"Z Gu","year":"2022","unstructured":"Gu Z, Li H, Khan S, Deng L, Du X, Guizani M, Tian Z (2022) IEPSBP: a cost-efficient image encryption algorithm based on parallel chaotic system for green IoT. IEEE Trans Green Commun Network 6(1):89\u2013106","journal-title":"IEEE Trans Green Commun Network"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-08196-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-08196-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-08196-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T07:02:58Z","timestamp":1772780578000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-025-08196-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,6]]},"references-count":50,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2026,3]]}},"alternative-id":["8196"],"URL":"https:\/\/doi.org\/10.1007\/s11227-025-08196-5","relation":{},"ISSN":["1573-0484"],"issn-type":[{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,6]]},"assertion":[{"value":"1 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest related to the research presented in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"225"}}