{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:31:11Z","timestamp":1757619071606,"version":"3.44.0"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,7,19]],"date-time":"2025-07-19T00:00:00Z","timestamp":1752883200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,19]],"date-time":"2025-07-19T00:00:00Z","timestamp":1752883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s11276-025-03999-z","type":"journal-article","created":{"date-parts":[[2025,7,19]],"date-time":"2025-07-19T06:54:26Z","timestamp":1752908066000},"page":"4377-4395","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A bandwidth-efficient lightweight authentication scheme for 5G HetNets"],"prefix":"10.1007","volume":"31","author":[{"given":"Indu","family":"Batra","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ajay","family":"Kakkar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,7,19]]},"reference":[{"key":"3999_CR1","doi-asserted-by":"publisher","first-page":"2607","DOI":"10.1007\/s11277-023-10248-z","volume":"129","author":"A Kakkar","year":"2023","unstructured":"Kakkar, A., & Singh, M. (2023). Performance analysis of a lightweight robust chaotic image re-encryption scheme for 5G heterogeneous networks. Wireless Personal Communications, 129, 2607\u20132631. https:\/\/doi.org\/10.1007\/s11277-023-10248-z","journal-title":"Wireless Personal Communications"},{"key":"3999_CR2","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.adhoc.2015.01.007","volume":"32","author":"A Mostefaoui","year":"2015","unstructured":"Mostefaoui, A., Noura, H., & Fawaz, Z. (2015). An integrated multimedia data reduction and content confidentiality approach for limited networked devices. Ad Hoc Networks, 32, 81\u201397. https:\/\/doi.org\/10.1016\/j.adhoc.2015.01.007","journal-title":"Ad Hoc Networks"},{"key":"3999_CR3","doi-asserted-by":"publisher","first-page":"2324","DOI":"10.1016\/j.sigpro.2009.02.001","volume":"89","author":"A Cheddad","year":"2009","unstructured":"Cheddad, A., Condell, J., Curran, K., & Kevitt, P. M. (2009). A secure and improved self-embedding algorithm to combat digital document forgery. Signal Processing, 89, 2324\u20132332. https:\/\/doi.org\/10.1016\/j.sigpro.2009.02.001","journal-title":"Signal Processing"},{"key":"3999_CR4","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/OJVT.2020.2992502","volume":"1","author":"A Yazar","year":"2020","unstructured":"Yazar, A., & Arslan, H. (2020). A waveform parameter assignment framework for 6G with the role of machine learning. IEEE Open Journal of Vehicular Technology, 1, 156\u2013172. https:\/\/doi.org\/10.1109\/OJVT.2020.2992502","journal-title":"IEEE Open Journal of Vehicular Technology"},{"key":"3999_CR5","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1016\/j.adhoc.2010.08.011","volume":"9","author":"A Seshadri","year":"2011","unstructured":"Seshadri, A., Luk, M., & Perrig, A. (2011). SAKE: Software attestation for key establishment in sensor networks. Ad Hoc Networks, 9, 1059\u20131067. https:\/\/doi.org\/10.1016\/j.adhoc.2010.08.011","journal-title":"Ad Hoc Networks"},{"key":"3999_CR6","doi-asserted-by":"publisher","first-page":"17799","DOI":"10.1007\/s11042-019-7166-7","volume":"78","author":"AA Abdulla","year":"2019","unstructured":"Abdulla, A. A., Sellahewa, H., & Jassim, S. A. (2019). Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimedia Tools and Applications, 78, 17799\u201317823. https:\/\/doi.org\/10.1007\/s11042-019-7166-7","journal-title":"Multimedia Tools and Applications"},{"key":"3999_CR7","doi-asserted-by":"publisher","first-page":"1695","DOI":"10.1007\/s11277-019-06949-z","volume":"111","author":"A Biswas","year":"2020","unstructured":"Biswas, A., & Gupta, V. R. (2020). Design and development of low profile MIMO antenna for 5G new radio smartphone applications. Wireless Personal Communications, 111, 1695\u20131706. https:\/\/doi.org\/10.1007\/s11277-019-06949-z","journal-title":"Wireless Personal Communications"},{"key":"3999_CR8","doi-asserted-by":"publisher","first-page":"103748","DOI":"10.1016\/j.jisa.2024.103748","volume":"82","author":"AI Awad","year":"2024","unstructured":"Awad, A. I., Babu, A., Barka, E., & Shuaib, K. (2024). AI-powered biometrics for Internet of Things security: A review and future vision. Journal of Information Security and Applications, 82, 103748. https:\/\/doi.org\/10.1016\/j.jisa.2024.103748","journal-title":"Journal of Information Security and Applications"},{"key":"3999_CR9","doi-asserted-by":"publisher","first-page":"101140","DOI":"10.1016\/j.measen.2024.101140","volume":"33","author":"S Bharadwaj","year":"2024","unstructured":"Bharadwaj, S., Amin, P., Janet Ramya, D., & Parikh, S. (2024). Reliable human authentication using AI-based multibiometric image sensor fusion: Assessment of performance in information security. Measurement: Sensors, 33, 101140. https:\/\/doi.org\/10.1016\/j.measen.2024.101140","journal-title":"Measurement: Sensors"},{"key":"3999_CR10","doi-asserted-by":"publisher","unstructured":"Johnson, L. (2020). Security component fundamentals for assessment, Security Controls Evaluation, Testing, and Assessment Handbook, 471\u2013536. https:\/\/doi.org\/10.1016\/B978-0-12-818427-1.00011-2","DOI":"10.1016\/B978-0-12-818427-1.00011-2"},{"key":"3999_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2020.102154","volume":"105","author":"H Naeem","year":"2020","unstructured":"Naeem, H., Ullah, F., Naeem, M. R., & Khalid, S. (2020). Malware detection in industrial internet of things based on hybrid image visualization and deep learning model. Ad Hoc Networks, 105, 1\u201312. https:\/\/doi.org\/10.1016\/j.adhoc.2020.102154","journal-title":"Ad Hoc Networks"},{"key":"3999_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-69007-9","volume-title":"Understanding cryptography from established symmetric and asymmetric ciphers to post-quantum algorithms","author":"C Paar","year":"2024","unstructured":"Paar, C., Pelzl, J., & Guneysu, T. (2024). Understanding cryptography from established symmetric and asymmetric ciphers to post-quantum algorithms. Berlin Heidelberg: Springer."},{"key":"3999_CR13","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1016\/j.patcog.2004.11.010","volume":"38","author":"R Lukac","year":"2005","unstructured":"Lukac, R., & Plataniotis, K. N. (2005). Bit-level based secret sharing for image encryption. Pattern Recognition, 38, 767\u2013772. https:\/\/doi.org\/10.1016\/j.patcog.2004.11.010","journal-title":"Pattern Recognition"},{"key":"3999_CR14","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1016\/j.patcog.2006.02.025","volume":"40","author":"SJ Shyu","year":"2007","unstructured":"Shyu, S. J. (2007). Image encryption by random grids. Pattern Recognition, 40, 1014\u20131031. https:\/\/doi.org\/10.1016\/j.patcog.2006.02.025","journal-title":"Pattern Recognition"},{"key":"3999_CR15","doi-asserted-by":"publisher","first-page":"3572","DOI":"10.1016\/j.patcog.2008.05.031","volume":"41","author":"J-B Feng","year":"2008","unstructured":"Feng, J.-B., Hsien-Chu, Wu., Tsai, C.-S., Chang, Y.-F., & Chu, Y.-P. (2008). Visual secret sharing for multiple secrets. Pattern Recognition, 41, 3572\u20133581. https:\/\/doi.org\/10.1016\/j.patcog.2008.05.031","journal-title":"Pattern Recognition"},{"key":"3999_CR16","doi-asserted-by":"publisher","first-page":"7858","DOI":"10.1016\/j.eswa.2010.04.051","volume":"37","author":"T-L Lin","year":"2010","unstructured":"Lin, T.-L., Horng, S.-J., Lee, K.-H., Chiu, P.-L., & Chen, R.-J. (2010). A novel visual secret sharing scheme for multiple secrets without pixel expansion. Expert Systems with Applications, 37, 7858\u20137869. https:\/\/doi.org\/10.1016\/j.eswa.2010.04.051","journal-title":"Expert Systems with Applications"},{"key":"3999_CR17","doi-asserted-by":"publisher","first-page":"13906","DOI":"10.1016\/j.eswa.2011.04.197","volume":"38","author":"A Esam Elsheh","year":"2011","unstructured":"Esam Elsheh, A., & Hamza, B. (2011). Secret sharing approaches for 3D object encryption. Expert Systems with Applications, 38, 13906\u201313911. https:\/\/doi.org\/10.1016\/j.eswa.2011.04.197","journal-title":"Expert Systems with Applications"},{"key":"3999_CR18","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.pmcj.2018.05.004","volume":"48","author":"QGK Safi","year":"2018","unstructured":"Safi, Q. G. K., Luo, S., Pan, L., Liu, W., & Yan, G. (2018). Secure authentication framework for cloud-based toll payment message dissemination over ubiquitous VANETs. Pervasive and Mobile Computing, 48, 43\u201358. https:\/\/doi.org\/10.1016\/j.pmcj.2018.05.004","journal-title":"Pervasive and Mobile Computing"},{"key":"3999_CR19","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/j.inffus.2011.03.003","volume":"13","author":"J Hur","year":"2012","unstructured":"Hur, J., Park, C., & Hwang, S. O. (2012). Privacy-preserving identity-based broadcast encryption. Information Fusion, 13, 296\u2013303. https:\/\/doi.org\/10.1016\/j.inffus.2011.03.003","journal-title":"Information Fusion"},{"key":"3999_CR20","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.sigpro.2013.10.023","volume":"97","author":"Wu Xiaotian","year":"2014","unstructured":"Xiaotian, Wu., & Sun, W. (2014). Improved tagged visual cryptography by random grids. Signal Processing, 97, 64\u201382. https:\/\/doi.org\/10.1016\/j.sigpro.2013.10.023","journal-title":"Signal Processing"},{"key":"3999_CR21","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.jvcir.2015.09.014","volume":"33","author":"X-J Tong","year":"2015","unstructured":"Tong, X.-J., Zhang, M., Wang, Z., Liu, Y., & Ma, H. X. J. (2015). A fast encryption algorithm of color image based on four-dimensional chaotic system. Journal of Visual Communication and Image Representation, 33, 219\u2013234. https:\/\/doi.org\/10.1016\/j.jvcir.2015.09.014","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"3999_CR22","doi-asserted-by":"publisher","first-page":"1441","DOI":"10.1080\/09720529.2017.1392460","volume":"20","author":"C Kong","year":"2017","unstructured":"Kong, C. (2017). Adaptive correction method of two-dimensional image deviation in visual communication design. Journal of Discrete Mathematical Sciences and Cryptography, 20, 1441\u20131446. https:\/\/doi.org\/10.1080\/09720529.2017.1392460","journal-title":"Journal of Discrete Mathematical Sciences and Cryptography"},{"key":"3999_CR23","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s00521-012-0914-5","volume":"23","author":"I Hussain","year":"2013","unstructured":"Hussain, I., Gondal, T. S. M. A., Khan, W. A., & Mahmood, H. (2013). A group theoretic approach to construct cryptographically strong substitution boxes. Neural Computing and Applications, 23, 97\u2013104. https:\/\/doi.org\/10.1007\/s00521-012-0914-5","journal-title":"Neural Computing and Applications"},{"issue":"273\u2013288","key":"3999_CR24","doi-asserted-by":"publisher","first-page":"2014","DOI":"10.1080\/09720529.2014.927645","volume":"17","author":"S De","year":"2017","unstructured":"De, S., & Bhaumik, J. (2017). TBLT-AES: A robust image encryption scheme. Journal of Discrete Mathematical Sciences and Cryptography., 17(273\u2013288), 2014. https:\/\/doi.org\/10.1080\/09720529.2014.927645","journal-title":"Journal of Discrete Mathematical Sciences and Cryptography."},{"key":"3999_CR25","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.sigpro.2017.06.010","volume":"141","author":"S Toughi","year":"2017","unstructured":"Toughi, S., Fathi, M. H., & Sekhavat, Y. A. (2017). An image encryption scheme based on elliptic curve pseudo random and Advanced Encryption System. Signal Processing, 141, 217\u2013227. https:\/\/doi.org\/10.1016\/j.sigpro.2017.06.010","journal-title":"Signal Processing"},{"key":"3999_CR26","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.ipl.2018.07.001","volume":"139","author":"D Gerault","year":"2018","unstructured":"Gerault, D., Lafourcade, P., Minier, M., & Solnon, C. (2018). Revisiting AES related-key differential attacks with constraint programming. Information Processing Letters, 139, 24\u201329. https:\/\/doi.org\/10.1016\/j.ipl.2018.07.001","journal-title":"Information Processing Letters"},{"key":"3999_CR27","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1016\/j.future.2017.06.004","volume":"83","author":"S Fahd","year":"2018","unstructured":"Fahd, S., Afzal, M., Abbas, H., Iqbal, W., & Waheed, S. (2018). Correlation power analysis of modes of encryption in AES and its countermeasures. Future Generation Computer Systems, 83, 496\u2013509. https:\/\/doi.org\/10.1016\/j.future.2017.06.004","journal-title":"Future Generation Computer Systems"},{"key":"3999_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/spy2.37","volume":"4","author":"C Chunka","year":"2018","unstructured":"Chunka, C., Goswami, R. S., & Banerjee, S. (2018). An efficient mechanism to generate dynamic keys based on genetic algorithm. Security and Privacy, 4, 1\u201310. https:\/\/doi.org\/10.1002\/spy2.37","journal-title":"Security and Privacy"},{"key":"3999_CR29","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.comnet.2018.01.038","volume":"140","author":"Q He","year":"2018","unstructured":"He, Q., Zhang, N., Wei, Y., & Zhang, Y. (2018). Lightweight attribute based encryption scheme for mobile cloud assisted cyber-physical systems. Computer Networks, 140, 163\u2013173. https:\/\/doi.org\/10.1016\/j.comnet.2018.01.038","journal-title":"Computer Networks"},{"key":"3999_CR30","doi-asserted-by":"publisher","first-page":"3039","DOI":"10.1109\/COMST.2019.2926625","volume":"21","author":"M Chen","year":"2019","unstructured":"Chen, M., Challita, U., Saad, W., Yin, C., & Debbah, M. (2019). Artificial neural networks-based machine learning for wireless networks: A tutorial. IEEE Communications Surveys & Tutorials, 21, 3039\u20133071. https:\/\/doi.org\/10.1109\/COMST.2019.2926625","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"3999_CR31","doi-asserted-by":"publisher","first-page":"85639","DOI":"10.1109\/ACCESS.2020.2992555","volume":"8","author":"MS Hadi","year":"2020","unstructured":"Hadi, M. S., Lawey, A. Q., El-Gorashi, T. E. H., & Elmirghani, J. M. H. (2020). Patient-centric HetNets powered by machine learning and big data analytics for 6G networks. IEEE Access, 8, 85639\u201385655. https:\/\/doi.org\/10.1109\/ACCESS.2020.2992555","journal-title":"IEEE Access"},{"key":"3999_CR32","doi-asserted-by":"publisher","first-page":"1392","DOI":"10.1109\/COMST.2020.2975911","volume":"22","author":"F Yiming Liu","year":"2020","unstructured":"Yiming Liu, F., Richard, Yu., Li, Xi., Ji, Hong, & Leung, V. C. M. (2020). Blockchain and Machine Learning for Communications and Networking Systems. IEEE Communications Surveys & Tutorial, 22, 1392\u20131431. https:\/\/doi.org\/10.1109\/COMST.2020.2975911","journal-title":"IEEE Communications Surveys & Tutorial"},{"key":"3999_CR33","doi-asserted-by":"publisher","first-page":"32867","DOI":"10.1109\/ACCESS.2019.2901740","volume":"7","author":"W Bai","year":"2019","unstructured":"Bai, W., Yao, T., Zhang, H., & Leung, V. C. M. (2019). Research on channel power allocation of fog wireless access network based on NOMA. IEEE Access, 7, 32867\u201332873. https:\/\/doi.org\/10.1109\/ACCESS.2019.2901740","journal-title":"IEEE Access"},{"key":"3999_CR34","doi-asserted-by":"publisher","first-page":"10392","DOI":"10.1109\/ACCESS.2019.2891218","volume":"7","author":"V Raghavan","year":"2019","unstructured":"Raghavan, V., & Li, J. (2019). Evolution of physical-layer communications research in the post-5G era. IEEE Access, 7, 10392\u201310401. https:\/\/doi.org\/10.1109\/ACCESS.2019.2891218","journal-title":"IEEE Access"},{"key":"3999_CR35","doi-asserted-by":"publisher","first-page":"101043","DOI":"10.1016\/j.phycom.2020.101043","volume":"39","author":"WU Khan","year":"2020","unstructured":"Khan, W. U., Jameel, F., Jamshed, M. A., Pervaiz, H., & JuLiua, S. K. (2020). Efficient power allocation for NOMA-enabled IoT networks in 6G era. Physical Communication, 39, 101043. https:\/\/doi.org\/10.1016\/j.phycom.2020.101043","journal-title":"Physical Communication"},{"key":"3999_CR36","doi-asserted-by":"publisher","first-page":"2671","DOI":"10.1007\/s11277-019-07010-9","volume":"111","author":"BS Awoyemi","year":"2020","unstructured":"Awoyemi, B. S., Alfa, A. S., & Maharaj, B. T. J. (2020). Resource optimisation in 5G and internet-of-things networking. Wireless Personal Communications., 111, 2671\u20132702. https:\/\/doi.org\/10.1007\/s11277-019-07010-9","journal-title":"Wireless Personal Communications."},{"key":"3999_CR37","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/s11277-020-07053-3","volume":"112","author":"J Parikh","year":"2020","unstructured":"Parikh, J., & Basu, A. (2020). Technologies assisting the paradigm shift from 4G to 5G. Wireless Personal Communications, 112, 481\u2013502. https:\/\/doi.org\/10.1007\/s11277-020-07053-3","journal-title":"Wireless Personal Communications"},{"key":"3999_CR38","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s11277-022-09748-1","volume":"126","author":"P Prakasam","year":"2022","unstructured":"Prakasam, P., Madheswaran, M., Sujith, K. P., Sayeed, M. S., & Latency, L. (2022). Area and optimal power hybrid lightweight cryptography authentication scheme for internet of things applications. Wireless Personal Communications, 126, 351\u2013365. https:\/\/doi.org\/10.1007\/s11277-022-09748-1","journal-title":"Wireless Personal Communications"},{"key":"3999_CR39","doi-asserted-by":"publisher","first-page":"2113","DOI":"10.1007\/s11277-022-10035-2","volume":"128","author":"S Anirudh","year":"2023","unstructured":"Anirudh, S., Shaan Sundar, R., & Ganapathy, S. (2023). A new cryptosystem for secured data communications in plagiarism checking process using blockchain technology. Wireless Personal Communications, 128, 2113\u20132130. https:\/\/doi.org\/10.1007\/s11277-022-10035-2","journal-title":"Wireless Personal Communications"},{"key":"3999_CR40","doi-asserted-by":"publisher","first-page":"62549","DOI":"10.1109\/ACCESS.2023.3288285","volume":"11","author":"S Ahmad","year":"2023","unstructured":"Ahmad, S., Rass, S., & Schartner, P. (2023). False-bottom encryption: Deniable encryption from secret sharing. IEEE Access, 11, 62549\u201362564. https:\/\/doi.org\/10.1109\/ACCESS.2023.3288285","journal-title":"IEEE Access"},{"key":"3999_CR41","doi-asserted-by":"publisher","first-page":"122140","DOI":"10.1016\/j.eswa.2023.122140","volume":"238","author":"R Zhao","year":"2024","unstructured":"Zhao, R., Zhang, Y., Li, S., Wen, W., Yi, S., & Lan, R. (2024). 3D mesh encryption with differentiated visual effect and high efficiency based on chaotic system. Expert Systems with Applications, 238, 122140. https:\/\/doi.org\/10.1016\/j.eswa.2023.122140","journal-title":"Expert Systems with Applications"},{"key":"3999_CR42","doi-asserted-by":"publisher","first-page":"103800","DOI":"10.1016\/j.csi.2023.103800","volume":"88","author":"J Liu","year":"2024","unstructured":"Liu, J., Qin, J., Wang, W., Mei, L., & Wang, H. (2024). Key-aggregate based access control encryption for flexible cloud data sharing. Computer Standards & Interfaces, 88, 103800. https:\/\/doi.org\/10.1016\/j.csi.2023.103800","journal-title":"Computer Standards & Interfaces"},{"key":"3999_CR43","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1007\/s13369-013-0713-z","volume":"39","author":"H Khanzadi","year":"2014","unstructured":"Khanzadi, H., & Eshghi, M. (2014). Image encryption using random bit sequence based on chaotic maps. Arabian Journal for Science and Engineering, 39, 1039\u20131047. https:\/\/doi.org\/10.1007\/s13369-013-0713-z","journal-title":"Arabian Journal for Science and Engineering"},{"key":"3999_CR44","doi-asserted-by":"publisher","first-page":"2015","DOI":"10.1002\/sec.1458","volume":"9","author":"G Ye","year":"2016","unstructured":"Ye, G., & Huang, X. (2016). A secure image encryption algorithm based on chaotic maps and SHA-3. Security Communication Networks, 9, 2015\u20132023. https:\/\/doi.org\/10.1002\/sec.1458","journal-title":"Security Communication Networks"},{"key":"3999_CR45","doi-asserted-by":"publisher","first-page":"3900515","DOI":"10.1109\/JPHOT.2018.2827165","volume":"10","author":"X-Q Fu","year":"2018","unstructured":"Fu, X.-Q., Liu, B.-C., Xie, Y.-Y., Li, W., & Liu, Y. (2018). Image encryption-then-transmission using DNA encryption algorithm and the double chaos. IEEE Photonics Journal, 10, 3900515. https:\/\/doi.org\/10.1109\/JPHOT.2018.2827165","journal-title":"IEEE Photonics Journal"},{"key":"3999_CR46","doi-asserted-by":"publisher","first-page":"33381","DOI":"10.1007\/s11042-018-6833-4","volume":"79","author":"X Li","year":"2018","unstructured":"Li, X., Zhao, L., Chen, G., Zhou, W., Zhang, H., Pan, Z., Dong, Q., & Ling, J. (2018). Performance and power consumption tradeoff in multimedia cloud. Multimedia Tools and Applications, 79, 33381\u201333396. https:\/\/doi.org\/10.1007\/s11042-018-6833-4","journal-title":"Multimedia Tools and Applications"},{"key":"3999_CR47","doi-asserted-by":"publisher","first-page":"8271","DOI":"10.1007\/s11042-018-6810-y","volume":"78","author":"H-T Song","year":"2018","unstructured":"Song, H.-T., Tang, G.-M., Kou, G., Sun, Y.-F., & Jiang, M.-M. (2018). Digital steganography model and embedding optimization strategy. Multimedia Tools and Applications, 78, 8271\u20138288. https:\/\/doi.org\/10.1007\/s11042-018-6810-y","journal-title":"Multimedia Tools and Applications"},{"key":"3999_CR48","doi-asserted-by":"publisher","first-page":"14379","DOI":"10.1007\/s11042-018-6795-6","volume":"78","author":"MA Hajjaji","year":"2018","unstructured":"Hajjaji, M. A., Dridi, M., & Mtibaa, A. (2018). A medical image crypto-compression algorithm based on neural network and PWLCM. Multimedia Tools and Applications, 78, 14379\u201314396. https:\/\/doi.org\/10.1007\/s11042-018-6795-6","journal-title":"Multimedia Tools and Applications"},{"key":"3999_CR49","doi-asserted-by":"publisher","first-page":"61334","DOI":"10.1109\/ACCESS.2021.3073514","volume":"9","author":"X Qian","year":"2021","unstructured":"Qian, X., Yang, Qi., Li, Q., Liu, Q., Yuanyuan, Wu., & Wang, W. (2021). A novel color image encryption algorithm based on three-dimensional chaotic maps and reconstruction techniques. IEEE Access, 9, 61334\u201361345. https:\/\/doi.org\/10.1109\/ACCESS.2021.3073514","journal-title":"IEEE Access"},{"key":"3999_CR50","doi-asserted-by":"publisher","first-page":"120596","DOI":"10.1109\/ACCESS.2021.3108789","volume":"9","author":"WJ Jun","year":"2021","unstructured":"Jun, W. J., & Fun, T. S. (2021). A new image encryption algorithm based on single S-box and dynamic encryption step. IEEE Access, 9, 120596\u2013120612. https:\/\/doi.org\/10.1109\/ACCESS.2021.3108789","journal-title":"IEEE Access"},{"key":"3999_CR51","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.inffus.2021.12.006","volume":"82","author":"W Wei","year":"2022","unstructured":"Wei, W., Wang, J., Yan, Z., & Ding, W. (2022). EPMDroid: Efficient and privacy-preserving malware detection based on SGX through data fusion. Information Fusion, 82, 43\u201357. https:\/\/doi.org\/10.1016\/j.inffus.2021.12.006","journal-title":"Information Fusion"},{"key":"3999_CR52","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s11277-022-09748-1","volume":"125","author":"H Elkamchouchi","year":"2022","unstructured":"Elkamchouchi, H., Anton, R., & Abouelseoud, Y. (2022). New encryption algorithm for secure image transmission through open network. Wireless Personal Communications, 125, 45\u201362. https:\/\/doi.org\/10.1007\/s11277-022-09748-1","journal-title":"Wireless Personal Communications"},{"key":"3999_CR53","doi-asserted-by":"publisher","first-page":"114111","DOI":"10.1016\/j.chaos.2023.114111","volume":"176","author":"G Long","year":"2023","unstructured":"Long, G., Chai, X., Gan, Z., Jiang, D., & Xin, M. S. (2023). Exploiting one-dimensional exponential Chebyshev chaotic map and matching embedding for visually meaningful image encryption. Chaos Solitons & Fractals, 176, 114111. https:\/\/doi.org\/10.1016\/j.chaos.2023.114111","journal-title":"Chaos Solitons & Fractals"},{"key":"3999_CR54","doi-asserted-by":"publisher","first-page":"8269","DOI":"10.1109\/JIOT.2022.3154039","volume":"9","author":"M Rasori","year":"2022","unstructured":"Rasori, M., La Manna, M., Perazzo, P., & Dini, G. (2022). A survey on attribute-based encryption schemes suitable for the internet of things. IEEE Internet of Things Journal, 9, 8269\u20138290. https:\/\/doi.org\/10.1109\/JIOT.2022.3154039","journal-title":"IEEE Internet of Things Journal"},{"key":"3999_CR55","doi-asserted-by":"publisher","first-page":"63027","DOI":"10.1109\/ACCESS.2023.3287858","volume":"11","author":"KM Hosny","year":"2023","unstructured":"Hosny, K. M., Zaki, M. A., Lashin, N. A., Fouda, M. M., & Hamza, H. M. (2023). Multimedia security using encryption: a survey. IEEE Access, 11, 63027\u201363056. https:\/\/doi.org\/10.1109\/ACCESS.2023.3287858","journal-title":"IEEE Access"},{"key":"3999_CR56","doi-asserted-by":"publisher","first-page":"63004","DOI":"10.1109\/ACCESS.2022.3182329","volume":"10","author":"NH Sharkawy","year":"2022","unstructured":"Sharkawy, N. H., Afify, Y. M., Gad, W., & Badr, N. (2022). Gray-scale image encryption using DNA operations. IEEE Access, 10, 63004\u201363019. https:\/\/doi.org\/10.1109\/ACCESS.2022.3182329","journal-title":"IEEE Access"},{"key":"3999_CR57","doi-asserted-by":"publisher","first-page":"107057","DOI":"10.1016\/j.rinp.2023.107057","volume":"54","author":"Ye Ma","year":"2023","unstructured":"Ma, Ye. (2023). Research and application of Big data encryption technology based on quantum lightweight image encryption. Results in Physics, 54, 107057. https:\/\/doi.org\/10.1016\/j.rinp.2023.107057","journal-title":"Results in Physics"},{"key":"3999_CR58","doi-asserted-by":"publisher","first-page":"101595","DOI":"10.1016\/j.jksuci.2023.101595","volume":"35","author":"M Alawida","year":"2023","unstructured":"Alawida, M. (2023). A novel chaos-based permutation for image encryption. Journal of King Saud University - Computer and Information Sciences, 35, 101595. https:\/\/doi.org\/10.1016\/j.jksuci.2023.101595","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"key":"3999_CR59","doi-asserted-by":"publisher","first-page":"e01955","DOI":"10.1016\/j.sciaf.2023.e01955","volume":"22","author":"F ElAzzaby","year":"2023","unstructured":"ElAzzaby, F., Sabour, K. H., ELakkad, N., El-Shafai, W., Torki, A., & Rajkumar, S. R. (2023). Color image encryption using a Zigzag Transformation and sine-cosine maps. Scientific African, 22, e01955. https:\/\/doi.org\/10.1016\/j.sciaf.2023.e01955","journal-title":"Scientific African"},{"key":"3999_CR60","doi-asserted-by":"publisher","first-page":"122052","DOI":"10.1016\/j.eswa.2023.122052","volume":"238","author":"N-R Zhou","year":"2024","unstructured":"Zhou, N.-R., Long-Long, Hu., Huang, Z.-W., Wang, M.-M., & Luo, G.-S. (2024). Novel multiple color images encryption and decryption scheme based on a bit-level extension algorithm. Expert Systems with Applications, 238, 122052. https:\/\/doi.org\/10.1016\/j.eswa.2023.122052","journal-title":"Expert Systems with Applications"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-025-03999-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-025-03999-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-025-03999-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T14:46:56Z","timestamp":1757256416000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-025-03999-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,19]]},"references-count":60,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["3999"],"URL":"https:\/\/doi.org\/10.1007\/s11276-025-03999-z","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2025,7,19]]},"assertion":[{"value":"1 July 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}