{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T20:51:30Z","timestamp":1777495890023,"version":"3.51.4"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T00:00:00Z","timestamp":1689120000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T00:00:00Z","timestamp":1689120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s11554-023-01338-z","type":"journal-article","created":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T00:02:22Z","timestamp":1689120142000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Smart camera with image encryption: a secure solution for real-time monitoring in Industry 4.0"],"prefix":"10.1007","volume":"20","author":[{"given":"C.","family":"Sekar","sequence":"first","affiliation":[]},{"given":"Vinod Ramesh","family":"Falmari","sequence":"additional","affiliation":[]},{"given":"M.","family":"Brindha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,12]]},"reference":[{"key":"1338_CR1","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.chaos.2018.12.021","volume":"119","author":"B Karakaya","year":"2019","unstructured":"Karakaya, B., G\u00fclten, A., Frasca, M.: A true random bit generator based on a memristive chaotic circuit: Analysis, design and fpga implementation. Chaos Solit. Fract. 119, 143\u2013149 (2019)","journal-title":"Chaos Solit. Fract."},{"issue":"2","key":"1338_CR2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0209618","volume":"14","author":"O Guill\u00e9n-Fern\u00e1ndez","year":"2019","unstructured":"Guill\u00e9n-Fern\u00e1ndez, O., Mel\u00e9ndez-Cano, A., Tlelo-Cuautle, E., N\u00fa\u00f1ez-P\u00e9rez, J.C., Rangel-Magdaleno, J.D.J.: On the synchronization techniques of chaotic oscillators and their fpga-based implementation for secure image transmission. PloS One 14(2), e0209618 (2019)","journal-title":"PloS One"},{"key":"1338_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119074","volume":"213","author":"D Wei","year":"2023","unstructured":"Wei, D., Jiang, M., Deng, Y.: A secure image encryption algorithm based on hyper-chaotic and bit-level permutation. Expert Syst. Appl. 213, 119074 (2023). https:\/\/doi.org\/10.1016\/j.eswa.2022.119074","journal-title":"Expert Syst. Appl."},{"key":"1338_CR4","volume":"53","author":"VR Falmari","year":"2020","unstructured":"Falmari, V.R., Brindha, M.: Privacy preserving cloud based secure digital locker using paillier based difference function and chaos based cryptosystem. J. Inf. Secur. Appl. 53, 102513 (2020)","journal-title":"J. Inf. Secur. Appl."},{"key":"1338_CR5","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.mejo.2019.05.005","volume":"90","author":"AJA El-Maksoud","year":"2019","unstructured":"El-Maksoud, A.J.A., El-Kader, A.A.A., Hassan, B.G., Rihan, N.G., Tolba, M.F., Said, L.A., Radwan, A.G., Abu-Elyazeed, M.F.: Fpga implementation of sound encryption system based on fractional-order chaotic systems. Microelectron. J. 90, 323\u2013335 (2019)","journal-title":"Microelectron. J."},{"key":"1338_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103324","volume":"79","author":"P Sikka","year":"2020","unstructured":"Sikka, P., Asati, A.R., Shekhar, C.: Speed optimal fpga implementation of the encryption algorithms for telecom applications. Microprocess. Microsyst. 79, 103324 (2020)","journal-title":"Microprocess. Microsyst."},{"key":"1338_CR7","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1016\/j.ins.2020.09.055","volume":"547","author":"Y Xian","year":"2021","unstructured":"Xian, Y., Wang, X.: Fractal sorting matrix and its application on chaotic image encryption. Inf. Sci. 547, 1154\u20131169 (2021)","journal-title":"Inf. Sci."},{"issue":"105","key":"1338_CR8","doi-asserted-by":"publisher","first-page":"1859","DOI":"10.1007\/s11071-021-06663-1","volume":"1","author":"WX Teng","year":"2021","unstructured":"Teng, W.X., Yang, L.: Color image encryption based on cross 2d hyperchaotic map using combined cycle shift scrambling and selecting diffusion. Nonlinear Dyn. 1(105), 1859\u20131876 (2021)","journal-title":"Nonlinear Dyn."},{"issue":"79","key":"1338_CR9","doi-asserted-by":"publisher","first-page":"19005","DOI":"10.1007\/s11042-020-08810-z","volume":"1","author":"X Wang","year":"2020","unstructured":"Wang, X., Zhao, H.: Fast image encryption algorithm based on parallel permutation-and-diffusion strategy. Multimed Tools Appl 1(79), 19005\u201319024 (2020)","journal-title":"Multimed Tools Appl"},{"key":"1338_CR10","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"Y Li","year":"2017","unstructured":"Li, Y., Wang, C., Chen, H.: A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt. Lasers Eng. 90, 238\u2013246 (2017)","journal-title":"Opt. Lasers Eng."},{"issue":"7","key":"1338_CR11","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1016\/j.cnsns.2004.03.006","volume":"10","author":"N Pareek","year":"2005","unstructured":"Pareek, N., Patidar, V., Sud, K.: Cryptography using multiple one-dimensional chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 10(7), 715\u2013723 (2005)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"20","key":"1338_CR12","doi-asserted-by":"publisher","first-page":"4048","DOI":"10.1016\/j.optcom.2012.06.004","volume":"285","author":"L Teng","year":"2012","unstructured":"Teng, L., Wang, X.: A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive. Opt. Commun. 285(20), 4048\u20134054 (2012)","journal-title":"Opt. Commun."},{"key":"1338_CR13","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu, L., Li, Z., Li, J., Hua, W.: A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 78, 17\u201325 (2016)","journal-title":"Opt. Lasers Eng."},{"issue":"6","key":"1338_CR14","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1016\/s0375-9601(98)00425-3","volume":"245","author":"T Yang","year":"1998","unstructured":"Yang, T., Yang, L.-B., Yang, C.-M.: Cryptanalyzing chaotic secure communications using return maps. Phys. Lett. A 245(6), 495\u2013510 (1998). https:\/\/doi.org\/10.1016\/s0375-9601(98)00425-3","journal-title":"Phys. Lett. A"},{"issue":"4","key":"1338_CR15","doi-asserted-by":"publisher","first-page":"2383","DOI":"10.1007\/s11071-012-0626-5","volume":"70","author":"C Li","year":"2012","unstructured":"Li, C., Zhang, L.Y., Ou, R., Wong, K.-W., Shu, S.: Breaking a novel colour image encryption algorithm based on chaos. Nonlinear Dyn. 70(4), 2383\u20132388 (2012). https:\/\/doi.org\/10.1007\/s11071-012-0626-5","journal-title":"Nonlinear Dyn."},{"issue":"8","key":"1338_CR16","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.3390\/electronics9081280","volume":"9","author":"L Ding","year":"2020","unstructured":"Ding, L., Ding, Q.: A novel image encryption scheme based on 2d fractional chaotic map, DWT and 4d hyper-chaos. Electronics 9(8), 1280 (2020). https:\/\/doi.org\/10.3390\/electronics9081280","journal-title":"Electronics"},{"key":"1338_CR17","unstructured":"Wu, Y., Noonan, J.\u00a0P., Agaian, S.S.: Npcr and uaci randomness tests for image encryption (2011)"},{"issue":"16","key":"1338_CR18","doi-asserted-by":"publisher","first-page":"21445","DOI":"10.1007\/s11042-017-5594-9","volume":"77","author":"L Liu","year":"2018","unstructured":"Liu, L., Miao, S.: A new simple one-dimensional chaotic map and its application for image encryption. Multimedia Tools Appl. 77(16), 21445\u201321462 (2018). https:\/\/doi.org\/10.1007\/s11042-017-5594-9","journal-title":"Multimedia Tools Appl."},{"issue":"1","key":"1338_CR19","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1049\/iet-ipr.2016.0906","volume":"12","author":"SS Askar","year":"2018","unstructured":"Askar, S.S., Karawia, A.A., Alammar, F.S.: Cryptographic algorithm based on pixel shuffling and dynamical chaotic economic map. IET Image Process. 12(1), 158\u2013167 (2018). https:\/\/doi.org\/10.1049\/iet-ipr.2016.0906","journal-title":"IET Image Process."},{"issue":"20","key":"1338_CR20","doi-asserted-by":"publisher","first-page":"2445","DOI":"10.1016\/j.ijleo.2015.06.018","volume":"126","author":"X-J Tong","year":"2015","unstructured":"Tong, X.-J., Zhang, M., Wang, Z., Liu, Y., Ma, J.: An image encryption scheme based on a new hyperchaotic finance system. Optik 126(20), 2445\u20132452 (2015). https:\/\/doi.org\/10.1016\/j.ijleo.2015.06.018","journal-title":"Optik"},{"key":"1338_CR21","doi-asserted-by":"publisher","first-page":"55540","DOI":"10.1109\/ACCESS.2020.2981771","volume":"8","author":"H Guo","year":"2020","unstructured":"Guo, H., Zhang, X., Zhao, X., Yu, H., Zhang, L.: Quadratic function chaotic system and its application on digital image encryption. IEEE Access 8, 55540\u201355549 (2020)","journal-title":"IEEE Access"},{"issue":"1\u20132","key":"1338_CR22","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.physleta.2006.10.081","volume":"363","author":"A Skrobek","year":"2007","unstructured":"Skrobek, A.: Cryptanalysis of chaotic stream cipher. Phys. Lett. A 363(1\u20132), 84\u201390 (2007). https:\/\/doi.org\/10.1016\/j.physleta.2006.10.081","journal-title":"Phys. Lett. A"},{"issue":"5","key":"1338_CR23","first-page":"2000","volume":"34","author":"R Vidhya","year":"2020","unstructured":"Vidhya, R., Brindha, M.: A chaos based image encryption algorithm using rubik\u2019s cube and prime factorization process (cierpf). J. King Saud Univ. Comput. Inf. Sci. 34(5), 2000\u201316 (2020)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"1338_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107484","volume":"171","author":"M Zhou","year":"2020","unstructured":"Zhou, M., Wang, C.: A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks. Signal Process. 171, 107484 (2020)","journal-title":"Signal Process."},{"key":"1338_CR25","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.ins.2020.01.009","volume":"518","author":"W Song","year":"2020","unstructured":"Song, W., Zheng, Y., Fu, C., Shan, P.: A novel batch image encryption algorithm using parallel computing. Inf. Sci. 518, 211\u2013224 (2020)","journal-title":"Inf. Sci."},{"issue":"11","key":"1338_CR26","doi-asserted-by":"publisher","first-page":"2622","DOI":"10.1109\/TCYB.2015.2483621","volume":"46","author":"Y Wu","year":"2016","unstructured":"Wu, Y., Hua, Z., Zhou, Y.: $$n$$ -dimensional discrete cat map generation using Laplace expansions. IEEE Trans. Cybernet. 46(11), 2622\u20132633 (2016)","journal-title":"IEEE Trans. Cybernet."},{"issue":"2\u20134","key":"1338_CR27","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1016\/j.physa.2005.01.001","volume":"351","author":"S Lian","year":"2005","unstructured":"Lian, S., Sun, J., Wang, Z.: Security analysis of a chaos-based image encryption algorithm. Phys. A Stat. Mech. Appl. 351(2\u20134), 645\u2013661 (2005). https:\/\/doi.org\/10.1016\/j.physa.2005.01.001","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"1338_CR28","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"Z Hua","year":"2016","unstructured":"Hua, Z., Zhou, Y.: Image encryption using 2d logistic-adjusted-sine map. Inf. Sci. 339, 237\u2013253 (2016)","journal-title":"Inf. Sci."},{"issue":"6","key":"1338_CR29","doi-asserted-by":"publisher","first-page":"9410","DOI":"10.3934\/mbe.2021463","volume":"18","author":"Q Ye","year":"2021","unstructured":"Ye, Q., Zhang, Q., Liu, S., Chen, K.: A novel chaotic system based on coupled map lattice and its application in HEVC encryption. Math. Biosci. Eng. 18(6), 9410\u20139429 (2021). https:\/\/doi.org\/10.3934\/mbe.2021463","journal-title":"Math. Biosci. Eng."},{"key":"1338_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107457","volume":"171","author":"W Cao","year":"2020","unstructured":"Cao, W., Mao, Y., Zhou, Y.: Designing a 2d infinite collapse map for image encryption. Signal Process. 171, 107457 (2020)","journal-title":"Signal Process."},{"key":"1338_CR31","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.ins.2020.02.008","volume":"520","author":"A Mansouri","year":"2020","unstructured":"Mansouri, A., Wang, X.: A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf. Sci. 520, 46\u201362 (2020)","journal-title":"Inf. Sci."},{"issue":"9","key":"1338_CR32","doi-asserted-by":"publisher","first-page":"3797","DOI":"10.3390\/app11093797","volume":"11","author":"R Huang","year":"2021","unstructured":"Huang, R., Han, F., Liao, X., Wang, Z., Dong, A.: A novel intermittent jumping coupled map lattice based on multiple chaotic maps. Appl. Sci. 11(9), 3797 (2021). https:\/\/doi.org\/10.3390\/app11093797","journal-title":"Appl. Sci."},{"issue":"9","key":"1338_CR33","doi-asserted-by":"publisher","first-page":"1096","DOI":"10.1049\/iet-spr.2015.0522","volume":"10","author":"H Liu","year":"2016","unstructured":"Liu, H., Lingfeng, H., Miao, S.: N-phase logistic chaotic sequence and its application for image encryption. IET Signal Process. 10(9), 1096\u20131104 (2016). https:\/\/doi.org\/10.1049\/iet-spr.2015.0522","journal-title":"IET Signal Process."},{"key":"1338_CR34","unstructured":"NI product documentation. https:\/\/www.ni.com\/docs\/en-US\/bundle\/ni-vision-builder-for-automated-inspection-configuration-help\/page\/vbai_config\/smartcamera_acquire.html, [Accessed 04-May-2023]"},{"key":"1338_CR35","unstructured":"NI smart camera. https:\/\/www.artisantg.com\/Test Measurement\/88411-1\/National-Instruments-NI-1772C-Smart-Camera. Accessed 04 May 2023"},{"key":"1338_CR36","doi-asserted-by":"publisher","DOI":"10.1155\/2011\/530354","author":"T Winkler","year":"2010","unstructured":"Winkler, T., Rinner, B.: Securing embedded smart cameras with trusted computing. EURASIP J. Wirel. Commun. Netw. (2010). https:\/\/doi.org\/10.1155\/2011\/530354","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"1338_CR37","unstructured":"Image Download Status-https. https:\/\/sipi.usc.edu\/database\/misc.zip. Accessed 10 Jun 2023"},{"issue":"21","key":"1338_CR38","doi-asserted-by":"publisher","first-page":"13951","DOI":"10.1007\/s11042-015-2973-y","volume":"75","author":"J Ahmad","year":"2015","unstructured":"Ahmad, J., Hwang, S.O.: A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools Appl. 75(21), 13951\u201313976 (2015). https:\/\/doi.org\/10.1007\/s11042-015-2973-y","journal-title":"Multimedia Tools Appl."},{"issue":"3","key":"1338_CR39","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1007\/s11042-012-1292-9","volume":"71","author":"B Norouzi","year":"2012","unstructured":"Norouzi, B., Mirzakuchaki, S., Seyedzadeh, S.M., Mosavi, M.R.: A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimedia Tools Appl. 71(3), 1469\u20131497 (2012)","journal-title":"Multimedia Tools Appl."},{"key":"1338_CR40","doi-asserted-by":"crossref","unstructured":"Zhu, S., Zhu, C., Wang, W.: A new image encryption algorithm based on chaos and secure hash sha-256. Entropy (2018). https:\/\/www.mdpi.com\/1099-4300\/20\/9\/716","DOI":"10.3390\/e20090716"},{"key":"1338_CR41","volume":"50","author":"K Jithin","year":"2020","unstructured":"Jithin, K., Sankar, S.: Colour image encryption algorithm combining, arnold map, dna sequence operation, and a mandelbrot set. J. Inf. Secur. Appl. 50, 102428 (2020)","journal-title":"J. Inf. Secur. Appl."},{"issue":"1","key":"1338_CR42","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1049\/iet-ipr.2019.0123","volume":"14","author":"D Herbadji","year":"2019","unstructured":"Herbadji, D., Belmeguenai, A., Derouiche, N., Liu, H.: Colour image encryption scheme based on enhanced quadratic chaotic map. IET Image Proc. 14(1), 40\u201352 (2019)","journal-title":"IET Image Proc."},{"key":"1338_CR43","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"Z Hua","year":"2018","unstructured":"Hua, Z., Jin, F., Xu, B., Huang, H.: 2d logistic-sine-coupling map for image encryption. Signal Process. 149, 148\u2013161 (2018). https:\/\/doi.org\/10.1016\/j.sigpro.2018.03.010","journal-title":"Signal Process."}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-023-01338-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11554-023-01338-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-023-01338-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,24]],"date-time":"2023-07-24T19:24:43Z","timestamp":1690226683000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11554-023-01338-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,12]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["1338"],"URL":"https:\/\/doi.org\/10.1007\/s11554-023-01338-z","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,12]]},"assertion":[{"value":"9 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest to disclose. All the authors have participated in writing this paper and the work is original and is not published elsewhere. This manuscript has not been submitted to, nor is it under review at, another journal or other publishing venue.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"83"}}