{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T05:37:00Z","timestamp":1772775420656,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T00:00:00Z","timestamp":1678233600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T00:00:00Z","timestamp":1678233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s11554-023-01289-5","type":"journal-article","created":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T02:02:30Z","timestamp":1678240950000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["A secure, efficient and super-fast chaos-based image encryption algorithm for real-time applications"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7541-0483","authenticated-orcid":false,"given":"Babak","family":"Rezaei","sequence":"first","affiliation":[]},{"given":"Mahvash","family":"Mobasseri","sequence":"additional","affiliation":[]},{"given":"Rasul","family":"Enayatifar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,8]]},"reference":[{"key":"1289_CR1","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.optlaseng.2018.11.017","volume":"115","author":"R Enayatifar","year":"2019","unstructured":"Enayatifar, R., Guimar\u00e3es, F.G., Siarry, P.: Index-based permutation-diffusion in multiple-image encryption using DNA sequence. Opt. Lasers Eng. 115, 131\u2013140 (2019). https:\/\/doi.org\/10.1016\/j.optlaseng.2018.11.017","journal-title":"Opt. Lasers Eng."},{"key":"1289_CR2","doi-asserted-by":"publisher","DOI":"10.3390\/sym12091497","author":"Z Li","year":"2020","unstructured":"Li, Z., Peng, C., Tan, W., Li, L.: A novel chaos-based color image encryption scheme using bit-level permutation. Symmetry (2020). https:\/\/doi.org\/10.3390\/sym12091497","journal-title":"Symmetry"},{"key":"1289_CR3","doi-asserted-by":"publisher","first-page":"166748","DOI":"10.1016\/j.ijleo.2021.166748","volume":"238","author":"D Wei","year":"2021","unstructured":"Wei, D., Jiang, M.: A fast image encryption algorithm based on parallel compressive sensing and DNA sequence. Optik 238, 166748 (2021). https:\/\/doi.org\/10.1016\/j.ijleo.2021.166748","journal-title":"Optik"},{"key":"1289_CR4","doi-asserted-by":"publisher","first-page":"102809","DOI":"10.1016\/j.jisa.2021.102809","volume":"58","author":"N Iqbal","year":"2021","unstructured":"Iqbal, N., Hanif, M., Abbas, S., Khan, M.A., Ul Rehman, Z.: Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding. J. Inf. Secur Appl 58, 102809 (2021). https:\/\/doi.org\/10.1016\/j.jisa.2021.102809","journal-title":"J. Inf. Secur Appl"},{"key":"1289_CR5","doi-asserted-by":"publisher","first-page":"102931","DOI":"10.1016\/j.jisa.2021.102931","volume":"61","author":"T Ul Haq","year":"2021","unstructured":"Ul Haq, T., Shah, T.: 4D mixed chaotic system and its application to RGB image encryption using substitution-diffusion. J. Inf. Secur. Appl. 61, 102931 (2021). https:\/\/doi.org\/10.1016\/j.jisa.2021.102931","journal-title":"J. Inf. Secur. Appl."},{"issue":"18","key":"1289_CR6","doi-asserted-by":"publisher","first-page":"25497","DOI":"10.1007\/s11042-022-12595-8","volume":"81","author":"MT Elkandoz","year":"2022","unstructured":"Elkandoz, M.T., Alexan, W.: Image encryption based on a combination of multiple chaotic maps. Multimedia Tools Appl. 81(18), 25497\u201325518 (2022). https:\/\/doi.org\/10.1007\/s11042-022-12595-8","journal-title":"Multimedia Tools Appl."},{"key":"1289_CR7","doi-asserted-by":"publisher","first-page":"106881","DOI":"10.1016\/j.optlaseng.2021.106881","volume":"150","author":"C-F Duan","year":"2022","unstructured":"Duan, C.-F., Zhou, J., Gong, L.-H., Wu, J.-Y., Zhou, N.-R.: New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method. Opt. Lasers Eng. 150, 106881 (2022). https:\/\/doi.org\/10.1016\/j.optlaseng.2021.106881","journal-title":"Opt. Lasers Eng."},{"key":"1289_CR8","doi-asserted-by":"publisher","DOI":"10.3390\/sym14030443","author":"W Alexan","year":"2022","unstructured":"Alexan, W., ElBeltagy, M., Aboshousha, A.: RGB Image Encryption through Cellular Automata, S-Box and the Lorenz System. Symmetry (2022). https:\/\/doi.org\/10.3390\/sym14030443","journal-title":"Symmetry"},{"issue":"1","key":"1289_CR9","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1007\/s11071-021-07192-7","volume":"108","author":"X Gao","year":"2022","unstructured":"Gao, X., Mou, J., Xiong, L., Sha, Y., Yan, H., Cao, Y.: A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dyn. 108(1), 613\u2013636 (2022). https:\/\/doi.org\/10.1007\/s11071-021-07192-7","journal-title":"Nonlinear Dyn."},{"key":"1289_CR10","doi-asserted-by":"publisher","first-page":"169430","DOI":"10.1016\/j.ijleo.2022.169430","volume":"265","author":"M Demirta\u015f","year":"2022","unstructured":"Demirta\u015f, M.: A new RGB color image encryption scheme based on cross-channel pixel and bit scrambling using chaos. Optik 265, 169430 (2022). https:\/\/doi.org\/10.1016\/j.ijleo.2022.169430","journal-title":"Optik"},{"key":"1289_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13003-x","author":"X Zhang","year":"2022","unstructured":"Zhang, X., Gong, Z.: Color image encryption algorithm based on 3D Zigzag transformation and view planes. Multimedia Tools Appl. (2022). https:\/\/doi.org\/10.1007\/s11042-022-13003-x","journal-title":"Multimedia Tools Appl."},{"issue":"19","key":"1289_CR12","doi-asserted-by":"publisher","first-page":"27453","DOI":"10.1007\/s11042-022-12762-x","volume":"81","author":"SF Yousif","year":"2022","unstructured":"Yousif, S.F., Abboud, A.J., Alhumaima, R.S.: A new image encryption based on bit replacing, chaos and DNA coding techniques. Multimedia Tools Appl. 81(19), 27453\u201327493 (2022). https:\/\/doi.org\/10.1007\/s11042-022-12762-x","journal-title":"Multimedia Tools Appl."},{"issue":"3","key":"1289_CR13","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1016\/j.optlaseng.2009.10.001","volume":"48","author":"N Singh","year":"2010","unstructured":"Singh, N., Sinha, A.: Chaos-based secure communication system using logistic map. Opt. Lasers Eng. 48(3), 398\u2013404 (2010). https:\/\/doi.org\/10.1016\/j.optlaseng.2009.10.001","journal-title":"Opt. Lasers Eng."},{"issue":"3","key":"1289_CR14","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1006\/jtbi.1995.0058","volume":"173","author":"AL Lloyd","year":"1995","unstructured":"Lloyd, A.L.: The coupled logistic map: a simple model for the effects of spatial heterogeneity on population dynamics. J. Theor. Biol. 173(3), 217\u2013230 (1995). https:\/\/doi.org\/10.1006\/jtbi.1995.0058","journal-title":"J. Theor. Biol."},{"issue":"4","key":"1289_CR15","doi-asserted-by":"publisher","first-page":"2062","DOI":"10.1016\/j.chaos.2008.08.022","volume":"41","author":"M Rani","year":"2009","unstructured":"Rani, M., Agarwal, R.: A new experimental approach to study the stability of logistic map. Chaos, Solitons Fractals 41(4), 2062\u20132066 (2009). https:\/\/doi.org\/10.1016\/j.chaos.2008.08.022","journal-title":"Chaos, Solitons Fractals"},{"issue":"1","key":"1289_CR16","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/BF02703801","volume":"31","author":"M Suneel","year":"2006","unstructured":"Suneel, M.: Electronic circuit realization of the logistic map. Sadhana 31(1), 69\u201378 (2006). https:\/\/doi.org\/10.1007\/BF02703801","journal-title":"Sadhana"},{"key":"1289_CR17","unstructured":"Arroyo, D., Alvarez, G., Fernandez, V.: On the inadequacy of the logistic map for cryptographic applications. Preprint at arXiv:0805.4355 (2008)."},{"key":"1289_CR18","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.chaos.2016.12.012","volume":"95","author":"VV Tarasova","year":"2017","unstructured":"Tarasova, V.V., Tarasov, V.E.: Logistic map with memory from economic model. Chaos Solitons Fractals 95, 84\u201391 (2017). https:\/\/doi.org\/10.1016\/j.chaos.2016.12.012","journal-title":"Chaos Solitons Fractals"},{"issue":"9","key":"1289_CR19","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24(9), 926\u2013934 (2006). https:\/\/doi.org\/10.1016\/j.imavis.2006.02.021","journal-title":"Image Vis. Comput."},{"issue":"07","key":"1289_CR20","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.1142\/S0218127499001024","volume":"9","author":"G Chen","year":"1999","unstructured":"Chen, G., Ueta, T.: Yet another chaotic attractor. Int. J. Bifurc. Chaos 9(07), 1465\u20131466 (1999). https:\/\/doi.org\/10.1142\/S0218127499001024","journal-title":"Int. J. Bifurc. Chaos"},{"issue":"1","key":"1289_CR21","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1002\/cta.470","volume":"37","author":"Z Zhang","year":"2009","unstructured":"Zhang, Z., Chen, G., Yu, S.: Hyperchaotic signal generation via DSP for efficient perturbations to liquid mixing. Int. J. Circuit Theory Appl. 37(1), 31\u201341 (2009). https:\/\/doi.org\/10.1002\/cta.470","journal-title":"Int. J. Circuit Theory Appl."},{"issue":"5","key":"1289_CR22","doi-asserted-by":"publisher","first-page":"3957","DOI":"10.1007\/s11042-019-7642-0","volume":"79","author":"S Kayalvizhi","year":"2020","unstructured":"Kayalvizhi, S., Malarvizhi, S.: A novel encrypted compressive sensing of images based on fractional order hyper chaotic Chen system and DNA operations. Multimedia Tools Appl. 79(5), 3957\u20133974 (2020). https:\/\/doi.org\/10.1007\/s11042-019-7642-0","journal-title":"Multimedia Tools Appl."},{"issue":"05","key":"1289_CR23","doi-asserted-by":"publisher","first-page":"1750076","DOI":"10.1142\/S0218127417500766","volume":"27","author":"H-P Ren","year":"2017","unstructured":"Ren, H.-P., Bai, C., Huang, Z.-Z., Grebogi, C.: Secure communication based on hyperchaotic Chen system with time-delay. Int. J. Bifurc. Chaos 27(05), 1750076 (2017). https:\/\/doi.org\/10.1142\/S0218127417500766","journal-title":"Int. J. Bifurc. Chaos"},{"issue":"1","key":"1289_CR24","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/s11071-013-0804-0","volume":"73","author":"S Effati","year":"2013","unstructured":"Effati, S., Saberi Nik, H., Jajarmi, A.: Hyperchaos control of the hyperchaotic Chen system by optimal control design. Nonlinear Dyn. 73(1), 499\u2013508 (2013). https:\/\/doi.org\/10.1007\/s11071-013-0804-0","journal-title":"Nonlinear Dyn."},{"issue":"3","key":"1289_CR25","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1016\/j.chaos.2005.02.002","volume":"26","author":"JH Park","year":"2005","unstructured":"Park, J.H.: Adaptive synchronization of hyperchaotic Chen system with uncertain parameters. Chaos Solitons Fractals 26(3), 959\u2013964 (2005). https:\/\/doi.org\/10.1016\/j.chaos.2005.02.002","journal-title":"Chaos Solitons Fractals"},{"issue":"2","key":"1289_CR26","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.1016\/j.amc.2004.10.016","volume":"168","author":"Z Yan","year":"2005","unstructured":"Yan, Z.: Controlling hyperchaos in the new hyperchaotic Chen system. Appl. Math. Comput. 168(2), 1239\u20131250 (2005). https:\/\/doi.org\/10.1016\/j.amc.2004.10.016","journal-title":"Appl. Math. Comput."},{"key":"1289_CR27","unstructured":"Hlevkin: https:\/\/www.hlevkin.com\/hlevkin\/06testimages.htm"},{"key":"1289_CR28","unstructured":"SIPI: https:\/\/sipi.usc.edu\/database\/database.php?volume=misc"},{"key":"1289_CR29","unstructured":"University of Waterloo: https:\/\/links.uwaterloo.ca\/Repository.html"},{"key":"1289_CR30","unstructured":"CelebA dataset: http:\/\/mmlab.ie.cuhk.edu.hk\/projects\/CelebA.html"},{"issue":"08","key":"1289_CR31","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 16(08), 2129\u20132151 (2006). https:\/\/doi.org\/10.1142\/S0218127406015970","journal-title":"Int. J. Bifurc. Chaos"},{"key":"1289_CR32","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","volume":"222","author":"Y Wu","year":"2013","unstructured":"Wu, Y., Zhou, Y., Saveriades, G., Agaian, S., Noonan, J.P., Natarajan, P.: Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci. 222, 323\u2013342 (2013). https:\/\/doi.org\/10.1016\/j.ins.2012.07.049","journal-title":"Inf. Sci."},{"issue":"2","key":"1289_CR33","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. Cyber J. 1(2), 31\u201338 (2011)","journal-title":"Cyber J."},{"key":"1289_CR34","unstructured":"CPU Benchmark: https:\/\/www.cpubenchmark.net\/singleCompare.php"},{"issue":"4","key":"1289_CR35","first-page":"249","volume":"41","author":"RE Boriga","year":"2014","unstructured":"Boriga, R.E., D\u0103sc\u0103lescu, A.C., Diaconu, A.V.: A new fast image encryption scheme based on 2D chaotic maps. IAENG Int. J. Comput. Sci. 41(4), 249\u2013258 (2014)","journal-title":"IAENG Int. J. Comput. Sci."},{"issue":"6","key":"1289_CR36","doi-asserted-by":"publisher","first-page":"8809","DOI":"10.1007\/s11042-020-09465-6","volume":"80","author":"X Zhang","year":"2021","unstructured":"Zhang, X., Ye, R.: A novel RGB image encryption algorithm based on DNA sequences and chaos. Multimedia Tools Appl. 80(6), 8809\u20138833 (2021). https:\/\/doi.org\/10.1007\/s11042-020-09465-6","journal-title":"Multimedia Tools Appl."},{"issue":"2","key":"1289_CR37","doi-asserted-by":"publisher","first-page":"1859","DOI":"10.1007\/s11071-021-06663-1","volume":"105","author":"L Teng","year":"2021","unstructured":"Teng, L., Wang, X., Yang, F., Xian, Y.: Color image encryption based on cross 2D hyperchaotic map using combined cycle shift scrambling and selecting diffusion. Nonlinear Dyn. 105(2), 1859\u20131876 (2021). https:\/\/doi.org\/10.1007\/s11071-021-06663-1","journal-title":"Nonlinear Dyn."},{"key":"1289_CR38","doi-asserted-by":"publisher","first-page":"146408","DOI":"10.1109\/ACCESS.2020.3015085","volume":"8","author":"M Hanif","year":"2020","unstructured":"Hanif, M., Abbas, S., Khan, M.A., Iqbal, N., Rehman, Z.U., Saeed, M.A., Mohamed, E.M.: A novel and efficient multiple RGB images cipher based on chaotic system and circular shift operations. IEEE Access 8, 146408\u2013146427 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3015085","journal-title":"IEEE Access"},{"key":"1289_CR39","doi-asserted-by":"publisher","first-page":"137635","DOI":"10.1109\/ACCESS.2021.3118377","volume":"9","author":"B Ge","year":"2021","unstructured":"Ge, B., Chen, X., Chen, G., Shen, Z.: Secure and fast image encryption algorithm using hyper-chaos-based key generator and vector operation. IEEE Access 9, 137635\u2013137654 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3118377","journal-title":"IEEE Access"},{"issue":"1","key":"1289_CR40","doi-asserted-by":"publisher","first-page":"1209","DOI":"10.1007\/s11042-021-11424-8","volume":"81","author":"SW Kang","year":"2022","unstructured":"Kang, S.W., Choi, U.S., Cho, S.J.: Fast image encryption algorithm based on (n, m, k)-PCMLCA. Multimedia Tools Appl. 81(1), 1209\u20131235 (2022). https:\/\/doi.org\/10.1007\/s11042-021-11424-8","journal-title":"Multimedia Tools Appl."},{"key":"1289_CR41","doi-asserted-by":"publisher","first-page":"162921","DOI":"10.1016\/j.ijleo.2019.06.021","volume":"193","author":"MY Valandar","year":"2019","unstructured":"Valandar, M.Y., Barani, M.J., Ayubi, P.: A fast color image encryption technique based on three dimensional chaotic map. Optik 193, 162921 (2019). https:\/\/doi.org\/10.1016\/j.ijleo.2019.06.021","journal-title":"Optik"},{"key":"1289_CR42","doi-asserted-by":"publisher","first-page":"6615708","DOI":"10.1155\/2021\/6615708","volume":"2021","author":"LM Heucheun Yepdia","year":"2021","unstructured":"Heucheun Yepdia, L.M., Tiedeu, A., Kom, G.: A robust and fast image encryption scheme based on a mixing technique. Secur. Commun. Networks 2021, 6615708 (2021). https:\/\/doi.org\/10.1155\/2021\/6615708","journal-title":"Secur. Commun. Networks"}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-023-01289-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11554-023-01289-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-023-01289-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,13]],"date-time":"2023-04-13T19:20:42Z","timestamp":1681413642000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11554-023-01289-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,8]]},"references-count":42,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["1289"],"URL":"https:\/\/doi.org\/10.1007\/s11554-023-01289-5","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,8]]},"assertion":[{"value":"7 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"30"}}