{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T15:23:29Z","timestamp":1777389809727,"version":"3.51.4"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T00:00:00Z","timestamp":1679529600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T00:00:00Z","timestamp":1679529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2019MF054"],"award-info":[{"award-number":["ZR2019MF054"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.61902091"],"award-info":[{"award-number":["No.61902091"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s11554-023-01294-8","type":"journal-article","created":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T17:02:47Z","timestamp":1679590967000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Real-time image encryption algorithm based on combined chaotic map and optimized lifting wavelet transform"],"prefix":"10.1007","volume":"20","author":[{"given":"Ning","family":"Mao","sequence":"first","affiliation":[]},{"given":"Xiaojun","family":"Tong","sequence":"additional","affiliation":[]},{"given":"Miao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhu","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,23]]},"reference":[{"issue":"1","key":"1294_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3150226","volume":"51","author":"S Pouyanfar","year":"2018","unstructured":"Pouyanfar, S., Yang, Y.M., Chen, S.: Multimedia big data analytics: a survey. ACM Comput. Surv. 51(1), 1\u201334 (2018). https:\/\/doi.org\/10.1145\/3150226","journal-title":"ACM Comput. Surv."},{"key":"1294_CR2","doi-asserted-by":"publisher","first-page":"1632","DOI":"10.1109\/TDSC.2019.2922958","volume":"18","author":"J Liang","year":"2019","unstructured":"Liang, J., Qin, Z., Xiao, S., Qu, L., Lin, X.D.: Efficient and secure decision tree classification for cloud-assisted online diagnosis services. IEEE Trans. Depend. Secure Comput. 18, 1632\u20131644 (2019). https:\/\/doi.org\/10.1109\/TDSC.2019.2922958","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"1","key":"1294_CR3","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1049\/cit2.12053","volume":"7","author":"FS Hassan","year":"2022","unstructured":"Hassan, F.S., Gutub, A.: Improving data hiding within colour images using hue component of HSV colour space. CAAI Trans. Intell. Technol. 7(1), 56\u201368 (2022). https:\/\/doi.org\/10.1049\/cit2.12053","journal-title":"CAAI Trans. Intell. Technol."},{"issue":"4","key":"1294_CR4","doi-asserted-by":"publisher","first-page":"2631","DOI":"10.1007\/s13369-020-04413-w","volume":"45","author":"A Gutub","year":"2020","unstructured":"Gutub, A., Al-Shaarani, F.: Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons. Arab. J. Sci. Eng. 45(4), 2631\u20132644 (2020). https:\/\/doi.org\/10.1007\/s13369-020-04413-w","journal-title":"Arab. J. Sci. Eng."},{"issue":"1","key":"1294_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11554-019-00940-4","volume":"18","author":"B Mondal","year":"2020","unstructured":"Mondal, B., Behera, P.K., Gangopadhyay, S.: A secure image encryption scheme based on a novel 2D sine-cosine cross-chaotic (SC3) map. J. Real-Time Image Proc. 18(1), 1\u201318 (2020). https:\/\/doi.org\/10.1007\/s11554-019-00940-4","journal-title":"J. Real-Time Image Proc."},{"key":"1294_CR6","unstructured":"Hureib, E.S., Gutub, A.A.: Enhancing medical data security via combining elliptic curve cryptography and image steganography. Int. J. Comput. Sci. Netw. Secur. 20(8), 1\u20138 (2020). https:\/\/orcid.org\/0000-0003-0923-202X"},{"issue":"12","key":"1294_CR7","doi-asserted-by":"publisher","first-page":"232","DOI":"10.22937\/IJCSNS.2020.20.12.26","volume":"20","author":"ESB Hureib","year":"2020","unstructured":"Hureib, E.S.B., Gutub, A.A.: Enhancing medical data security via combining elliptic curve cryptography with 1-LSB and 2-LSB image steganography[J]. Int. J. Comput. Sci. Netw. Secur. 20(12), 232\u2013241 (2020). https:\/\/doi.org\/10.22937\/IJCSNS.2020.20.12.26","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"issue":"39","key":"1294_CR8","doi-asserted-by":"publisher","first-page":"30087","DOI":"10.1007\/s11042-020-09513-1","volume":"79","author":"FS Hassan","year":"2020","unstructured":"Hassan, F.S., Gutub, A.: Efficient reversible data hiding multimedia technique based on smart image interpolation. Multimedia Tools Appl. 79(39), 30087\u201330109 (2020). https:\/\/doi.org\/10.1007\/s11042-020-09513-1","journal-title":"Multimedia Tools Appl."},{"issue":"9","key":"1294_CR9","doi-asserted-by":"publisher","first-page":"8441","DOI":"10.1007\/s13369-021-05529-3","volume":"46","author":"FS Hassan","year":"2021","unstructured":"Hassan, F.S., Gutub, A.: Efficient image reversible data hiding technique based on interpolation optimization. Arab. J. Sci. Eng. 46(9), 8441\u20138456 (2021). https:\/\/doi.org\/10.1007\/s13369-021-05529-3","journal-title":"Arab. J. Sci. Eng."},{"key":"1294_CR10","doi-asserted-by":"publisher","first-page":"2017","DOI":"10.1016\/j.jksuci.2020.07.008","volume":"34","author":"FS Hassan","year":"2020","unstructured":"Hassan, F.S., Gutub, A.: Novel embedding secrecy within images utilizing an improved interpolation-based reversible data hiding scheme. J. King Saud Univ. Comput. Inf. Sci. 34, 2017\u20132030 (2020). https:\/\/doi.org\/10.1016\/j.jksuci.2020.07.008","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"1294_CR11","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-319-49530-9_11","volume":"26","author":"V Nachef","year":"2017","unstructured":"Nachef, V., Patarin, J., Volte, E.: Des and variants: 3des, des-x. Feistel Ciphers Springer. 26, 157\u2013176 (2017). https:\/\/doi.org\/10.1007\/978-3-319-49530-9_11","journal-title":"Feistel Ciphers Springer."},{"key":"1294_CR12","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1016\/j.ins.2020.09.032","volume":"546","author":"ZY Hua","year":"2021","unstructured":"Hua, Z.Y., Zhu, Z.H., Yi, S., Zhang, Z., Huang, H.: Cross-plane color image encryption using a two-dimensional logistic tent modular map. Inf. Sci. 546, 1063\u20131083 (2021). https:\/\/doi.org\/10.1016\/j.ins.2020.09.032","journal-title":"Inf. Sci."},{"key":"1294_CR13","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.optlaseng.2017.06.015","volume":"107","author":"XY Wang","year":"2018","unstructured":"Wang, X.Y., Zhu, X.Q., Wu, X.J., Zhang, Y.Q.: Image encryption algorithm based on multiple mixed hash functions and cyclic shift. Opt. Lasers Eng. 107, 370\u2013379 (2018). https:\/\/doi.org\/10.1016\/j.optlaseng.2017.06.015","journal-title":"Opt. Lasers Eng."},{"issue":"21","key":"1294_CR14","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu, L., Li, Z., Li, J., Hua, W.: A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 78(21), 17\u201325 (2016). https:\/\/doi.org\/10.1016\/j.optlaseng.2015.09.007","journal-title":"Opt. Lasers Eng."},{"issue":"2","key":"1294_CR15","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/s11554-021-01194-9","volume":"19","author":"BL Elizabeth","year":"2022","unstructured":"Elizabeth, B.L., Gayathri, J., Prakash, A.J.: HIDE: hyperchaotic image encryption using DNA computing. J. Real-Time Image Proc. 19(2), 429\u2013442 (2022). https:\/\/doi.org\/10.1007\/s11554-021-01194-9","journal-title":"J. Real-Time Image Proc."},{"issue":"2","key":"1294_CR16","doi-asserted-by":"publisher","first-page":"171","DOI":"10.3390\/e22020171","volume":"22","author":"YJ Wan","year":"2020","unstructured":"Wan, Y.J., Gu, S.Q., Du, B.X.: A new image encryption algorithm based on composite chaos and hyperchaos combined with DNA coding. Entropy 22(2), 171 (2020). https:\/\/doi.org\/10.3390\/e22020171","journal-title":"Entropy"},{"key":"1294_CR17","doi-asserted-by":"publisher","first-page":"2235","DOI":"10.3390\/e22020171","volume":"95","author":"YJ Song","year":"2019","unstructured":"Song, Y.J., Zhu, Z.L., Zhang, W., Guo, L., Yang, X., Yu, H.: Joint image compression encryption scheme using entropy coding and compressive sensing. Nonlinear Dyn. 95, 2235\u20132261 (2019). https:\/\/doi.org\/10.3390\/e22020171","journal-title":"Nonlinear Dyn."},{"issue":"3","key":"1294_CR18","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1007\/s11554-018-0826-4","volume":"16","author":"XT Duan","year":"2019","unstructured":"Duan, X.T., Liu, J.J., Zhang, E.: Efficient image encryption and compression based on a VAE generative model. J. Real-Time Image Proc. 16(3), 775\u2013790 (2019). https:\/\/doi.org\/10.1007\/s11554-018-0826-4","journal-title":"J. Real-Time Image Proc."},{"key":"1294_CR19","doi-asserted-by":"publisher","first-page":"153","DOI":"10.36909\/jer.v9i3A.10111","volume":"9","author":"A Gutub","year":"2021","unstructured":"Gutub, A., Al-Roithy, B.: Varying PRNG to improve image cryptography implementation. J. Eng. Res. 9, 153\u2013183 (2021). https:\/\/doi.org\/10.36909\/jer.v9i3A.10111","journal-title":"J. Eng. Res."},{"issue":"18","key":"1294_CR20","doi-asserted-by":"publisher","first-page":"28521","DOI":"10.1007\/s11042-021-11051-3","volume":"80","author":"BO Al-Roithy","year":"2021","unstructured":"Al-Roithy, B.O., Gutub, A.: Remodeling randomness prioritization to boost-up security of RGB image encryption. Multimedia Tools Appl. 80(18), 28521\u201328581 (2021). https:\/\/doi.org\/10.1007\/s11042-021-11051-3","journal-title":"Multimedia Tools Appl."},{"issue":"2","key":"1294_CR21","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s11554-010-0165-6","volume":"7","author":"A Panda","year":"2012","unstructured":"Panda, A., Zambreno, J.: The secure wavelet transform. J. Real-Time Image Proc. 7(2), 131\u2013142 (2012). https:\/\/doi.org\/10.1007\/s11554-010-0165-6","journal-title":"J. Real-Time Image Proc."},{"key":"1294_CR22","doi-asserted-by":"publisher","first-page":"6429","DOI":"10.1109\/ACCESS.2017.2692043","volume":"5","author":"XL Wu","year":"2017","unstructured":"Wu, X.L., Zhu, B., Hu, Y.T., Ran, Y.M.: A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access. 5, 6429\u20136436 (2017). https:\/\/doi.org\/10.1109\/ACCESS.2017.2692043","journal-title":"IEEE Access."},{"issue":"1","key":"1294_CR23","doi-asserted-by":"publisher","first-page":"013021","DOI":"10.1117\/1.JEI.26.1.013021","volume":"26","author":"K Zhan","year":"2017","unstructured":"Zhan, K., Wei, D., Shi, J.H.: Cross-utilizing hyperchaotic and DNA sequences for image encryption. J. Electron. Imaging. 26(1), 013021 (2017). https:\/\/doi.org\/10.1117\/1.JEI.26.1.013021","journal-title":"J. Electron. Imaging."},{"issue":"12","key":"1294_CR24","doi-asserted-by":"publisher","first-page":"167","DOI":"10.22937\/IJCSNS.2020.20.12.18","volume":"20","author":"B Al-Roithy","year":"2020","unstructured":"Al-Roithy, B., Gutub, A.: Trustworthy image security via involving binary and chaotic gravitational searching within PRNG selections. Int. J. Comput. Sci. Netw. Secur. 20(12), 167\u2013176 (2020). https:\/\/doi.org\/10.22937\/IJCSNS.2020.20.12.18","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"issue":"2","key":"1294_CR25","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1006\/acha.1996.0015","volume":"3","author":"W Sweldens","year":"1996","unstructured":"Sweldens, W.: The lifting scheme: a custom design construction of biorthogonal wavelets. Appl. Comput. Harmon. Anal. 3(2), 186\u2013200 (1996). https:\/\/doi.org\/10.1006\/acha.1996.0015","journal-title":"Appl. Comput. Harmon. Anal."},{"key":"1294_CR26","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.ins.2020.02.012","volume":"520","author":"Y Zhang","year":"2020","unstructured":"Zhang, Y.: The fast image encryption algorithm based on lifting scheme and chaos. Inf. Sci. 520, 177\u2013194 (2020). https:\/\/doi.org\/10.1016\/j.ins.2020.02.012","journal-title":"Inf. Sci."},{"key":"1294_CR27","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.ins.2020.07.058","volume":"547","author":"Y Zhang","year":"2021","unstructured":"Zhang, Y.: A new unified image encryption algorithm based on a lifting transformation and chaos. Inf. Sci. 547, 307\u2013327 (2021). https:\/\/doi.org\/10.1016\/j.ins.2020.07.058","journal-title":"Inf. Sci."},{"key":"1294_CR28","doi-asserted-by":"publisher","DOI":"10.36909\/jer.17853","author":"A Gutub","year":"2022","unstructured":"Gutub, A.: Dynamic smart random preference for higher medical image confidentiality. J. Eng. Res. (2022). https:\/\/doi.org\/10.36909\/jer.17853","journal-title":"J. Eng. Res."},{"key":"1294_CR29","doi-asserted-by":"publisher","first-page":"104863","DOI":"10.1016\/j.dib.2019.104863","volume":"28","author":"W Al-Dhabyani","year":"2020","unstructured":"Al-Dhabyani, W., Gomaa, M., Khaled, H., Fahmy, A.: Dataset of breast ultrasound images. Data Brie 28, 104863 (2020). https:\/\/doi.org\/10.1016\/j.dib.2019.104863","journal-title":"Data Brie"},{"key":"1294_CR30","doi-asserted-by":"publisher","first-page":"40755","DOI":"10.1007\/s11042-022-12621-9","volume":"81","author":"LH Li","year":"2022","unstructured":"Li, L.H., Luo, Y.L., Qiu, S.H., Xue, O.Y., Cao, L.C., Tang, S.B.: Image encryption using chaotic map and cellular automata. Multimedia Tools Appl. 81, 40755\u201340773 (2022). https:\/\/doi.org\/10.1007\/s11042-022-12621-9","journal-title":"Multimedia Tools Appl."},{"key":"1294_CR31","doi-asserted-by":"publisher","first-page":"21979","DOI":"10.1007\/s11042-021-10692-8","volume":"80","author":"A Ur Rehman","year":"2021","unstructured":"Ur Rehman, A., Liao, X., Wang, H.: An innovative technique for image encryption using tripartite graph and chaotic maps. Multimedia Tools Appl. 80, 21979\u201322005 (2021). https:\/\/doi.org\/10.1007\/s11042-021-10692-8","journal-title":"Multimedia Tools Appl."},{"key":"1294_CR32","doi-asserted-by":"publisher","DOI":"10.36909\/jer.13761","author":"N Kheshaifaty","year":"2021","unstructured":"Kheshaifaty, N., Gutub, A.: Engineering graphical captcha and AES crypto hash functions for secure online authentication. J. Eng. Res. (2021). https:\/\/doi.org\/10.36909\/jer.13761","journal-title":"J. Eng. Res."},{"issue":"30","key":"1294_CR33","doi-asserted-by":"publisher","first-page":"36305","DOI":"10.1007\/s11042-021-11386-x","volume":"80","author":"N Iqbal","year":"2021","unstructured":"Iqbal, N., Hanif, M.: An efficient grayscale image encryption scheme based on variable length row-column swapping operations. Multimedia Tools Appl. 80(30), 36305\u201336339 (2021). https:\/\/doi.org\/10.1007\/s11042-021-11386-x","journal-title":"Multimedia Tools Appl."},{"key":"1294_CR34","doi-asserted-by":"publisher","first-page":"25613","DOI":"10.1007\/s11042-020-09237-2","volume":"79","author":"Y Niu","year":"2020","unstructured":"Niu, Y., Zhou, Z., Zhang, X.C.: An image encryption approach based on chaotic maps and genetic operations. Multimedia Tools Appl. 79, 25613\u201325633 (2020). https:\/\/doi.org\/10.1007\/s11042-020-09237-2","journal-title":"Multimedia Tools Appl."},{"key":"1294_CR35","doi-asserted-by":"publisher","first-page":"55540","DOI":"10.1007\/978-981-16-0666-3_23","volume":"8","author":"H Guo","year":"2020","unstructured":"Guo, H., Zhang, X., Zhao, X., Yu, H., Zhang, L.: Quadratic function chaotic system and its application on digital image encryption. IEEE Access. 8, 55540\u201355549 (2020). https:\/\/doi.org\/10.1007\/978-981-16-0666-3_23","journal-title":"IEEE Access."},{"issue":"11","key":"1294_CR36","doi-asserted-by":"publisher","first-page":"1574","DOI":"10.3390\/e24111574","volume":"24","author":"HL Shen","year":"2022","unstructured":"Shen, H.L., Shan, X.L., Xu, M., Tian, Z.H.: A new chaotic image encryption algorithm based on transversals in a Latin square. Entropy 24(11), 1574 (2022). https:\/\/doi.org\/10.3390\/e24111574","journal-title":"Entropy"},{"key":"1294_CR37","doi-asserted-by":"publisher","first-page":"21975","DOI":"10.1007\/s11042-022-12239-x","volume":"81","author":"XQ Gui","year":"2022","unstructured":"Gui, X.Q., Huang, J., Li, L., Li, S.L., Cao, J.: A novel hyperchaotic image encryption algorithm with simultaneous shuffling and diffusion. Multimedia Tools Appl. 81, 21975\u201321994 (2022). https:\/\/doi.org\/10.1007\/s11042-022-12239-x","journal-title":"Multimedia Tools Appl."},{"key":"1294_CR38","doi-asserted-by":"publisher","first-page":"11301","DOI":"10.1007\/s11042-022-12269-5","volume":"81","author":"ZD Guo","year":"2022","unstructured":"Guo, Z.D., Sun, P.: Improved reverse zigzag transform and DNA diffusion chaotic image encryption method. Multimedia Tools Appl. 81, 11301\u201311323 (2022). https:\/\/doi.org\/10.1007\/s11042-022-12269-5","journal-title":"Multimedia Tools Appl."},{"key":"1294_CR39","doi-asserted-by":"publisher","first-page":"19129","DOI":"10.1007\/s11042-020-08718-8","volume":"79","author":"MAB Farah","year":"2020","unstructured":"Farah, M.A.B., Guesmi, R., Kachouri, A., Samet, M.: A new design of cryptosystem based on S-box and chaotic permutation. Multimedia Tools Appl. 79, 19129\u201319150 (2020). https:\/\/doi.org\/10.1007\/s11042-020-08718-8","journal-title":"Multimedia Tools Appl."},{"key":"1294_CR40","doi-asserted-by":"publisher","first-page":"106837","DOI":"10.1016\/j.optlastec.2020.106837","volume":"138","author":"XY Wang","year":"2021","unstructured":"Wang, X.Y., Chen, S.N., Zhang, Y.Q.: A chaotic image encryption algorithm based on random dynamic mixing. Opt. Laser Technol. 138, 106837 (2021). https:\/\/doi.org\/10.1016\/j.optlastec.2020.106837","journal-title":"Opt. Laser Technol."},{"key":"1294_CR41","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1007\/s11554-022-01220-4","volume":"19","author":"H Cai","year":"2022","unstructured":"Cai, H., Sun, J.Y., Gao, Z.B.: A novel multi-wing chaotic system with FPGA implementation and application in image encryption. J. Real-Time Image Process. 19, 775\u2013790 (2022). https:\/\/doi.org\/10.1007\/s11554-022-01220-4","journal-title":"J. Real-Time Image Process."},{"key":"1294_CR42","doi-asserted-by":"publisher","first-page":"22107","DOI":"10.1007\/s11042-020-08897-4","volume":"79","author":"F Naz","year":"2020","unstructured":"Naz, F., Shoukat, I.A., Ashraf, R., Iqbal, U., Rauf, A.: An ASCII based efective and multi-operation image encryption method. Multimedia Tools Appl. 79, 22107\u201322129 (2020). https:\/\/doi.org\/10.1007\/s11042-020-08897-4","journal-title":"Multimedia Tools Appl."},{"key":"1294_CR43","doi-asserted-by":"publisher","first-page":"107484","DOI":"10.1016\/j.sigpro.2020.107484","volume":"171","author":"M Zhou","year":"2020","unstructured":"Zhou, M., Wang, C.: A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks. Signal Process. 171, 107484 (2020). https:\/\/doi.org\/10.1016\/j.sigpro.2020.107484","journal-title":"Signal Process."},{"key":"1294_CR44","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.sigpro.2019.02.016","volume":"160","author":"M Alawida","year":"2019","unstructured":"Alawida, M., Samsudin, A., Teh, J.S., Alkhawaldeh, R.S.: A new hybrid digital chaotic system with applications in image encryption. Signal Process. 160, 45\u201358 (2019). https:\/\/doi.org\/10.1016\/j.sigpro.2019.02.016","journal-title":"Signal Process."},{"key":"1294_CR45","doi-asserted-by":"publisher","first-page":"103340","DOI":"10.1016\/j.jisa.2022.103340","volume":"70","author":"QY Wang","year":"2022","unstructured":"Wang, Q.Y., Zhang, X.Q., Zhao, X.H.: Image encryption algorithm based on improved Zigzag transformation and quaternary DNA coding. J. Inf. Secur. Appl. 70, 103340 (2022). https:\/\/doi.org\/10.1016\/j.jisa.2022.103340","journal-title":"J. Inf. Secur. Appl."},{"issue":"9","key":"1294_CR46","doi-asserted-by":"publisher","first-page":"095210","DOI":"10.1088\/1402-4896\/ac8840","volume":"97","author":"XQ Zhang","year":"2022","unstructured":"Zhang, X.Q., Yang, X.C.: Color image encryption algorithm based on 3D spiral transform and radial diffusion. Phys. Scripta. 97(9), 095210 (2022). https:\/\/doi.org\/10.1088\/1402-4896\/ac8840","journal-title":"Phys. Scripta."}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-023-01294-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11554-023-01294-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-023-01294-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,13]],"date-time":"2023-04-13T19:22:00Z","timestamp":1681413720000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11554-023-01294-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,23]]},"references-count":46,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["1294"],"URL":"https:\/\/doi.org\/10.1007\/s11554-023-01294-8","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,23]]},"assertion":[{"value":"23 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 March 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.Informed consent was obtained from all individual participants included in the study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}}],"article-number":"35"}}