{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T16:50:28Z","timestamp":1777913428855,"version":"3.51.4"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T00:00:00Z","timestamp":1711324800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T00:00:00Z","timestamp":1711324800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evol. Intel."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s12065-024-00927-6","type":"journal-article","created":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T16:02:00Z","timestamp":1711382520000},"page":"3043-3059","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Advanced hybrid color image encryption utilizing novel chaotic neural network and 5D-hyperchaotic system"],"prefix":"10.1007","volume":"17","author":[{"given":"Subhashish","family":"Pal","sequence":"first","affiliation":[]},{"given":"Jaya","family":"Mukhopadhyay","sequence":"additional","affiliation":[]},{"given":"Arghya","family":"Pathak","sequence":"additional","affiliation":[]},{"given":"Hrishikesh","family":"Mondal","sequence":"additional","affiliation":[]},{"given":"Mrinal Kanti","family":"Mandal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,25]]},"reference":[{"issue":"4","key":"927_CR1","first-page":"289","volume":"9","author":"R Bhanot","year":"2015","unstructured":"Bhanot R, Hans R (2015) A review and comparative analysis of various encryption algorithms. Int J Secur Appl 9(4):289\u2013306","journal-title":"Int J Secur Appl"},{"key":"927_CR2","unstructured":"Dworkin MJ, Barker EB, Nechvatal JR, Foti J, Bassham LE, Roback E, Dray\u00a0Jr JF (2001) Advanced encryption standard (AES)"},{"key":"927_CR3","doi-asserted-by":"publisher","first-page":"100235","DOI":"10.1016\/j.cosrev.2020.100235","volume":"36","author":"B Alaya","year":"2020","unstructured":"Alaya B, Laouamer L, Msilini N (2020) Homomorphic encryption systems statement: trends and challenges. Comput Sci Rev 36:100235","journal-title":"Comput Sci Rev"},{"issue":"15","key":"927_CR4","doi-asserted-by":"publisher","first-page":"21811","DOI":"10.1007\/s11042-022-12092-y","volume":"81","author":"P Fang","year":"2022","unstructured":"Fang P, Liu H, Chengmao W, Liu M (2022) A block image encryption algorithm based on a hyperchaotic system and generative adversarial networks. Multimed Tools Appl 81(15):21811\u201321857","journal-title":"Multimed Tools Appl"},{"key":"927_CR5","doi-asserted-by":"crossref","unstructured":"Shende V, Kulkarni, M (2017) Fpga based hardware implementation of hybrid cryptographic algorithm for encryption and decryption. In: 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), IEEE, pp 416\u2013419","DOI":"10.1109\/ICEECCOT.2017.8284540"},{"issue":"12","key":"927_CR6","doi-asserted-by":"publisher","first-page":"4653","DOI":"10.1016\/j.cnsns.2012.05.033","volume":"17","author":"A Akhshani","year":"2012","unstructured":"Akhshani A, Akhavan A, Lim S-C, Hassan Z (2012) An image encryption scheme based on quantum logistic map. Commun Nonlinear Sci Numer Simul 17(12):4653\u20134661","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"927_CR7","doi-asserted-by":"publisher","first-page":"1802","DOI":"10.1007\/s10773-012-1274-8","volume":"52","author":"R-G Zhou","year":"2013","unstructured":"Zhou R-G, Qian W, Zhang M-Q, Shen C-Y (2013) Quantum image encryption and decryption algorithms based on quantum image geometric transformations. Int J Theor Phys 52:1802\u20131817","journal-title":"Int J Theor Phys"},{"key":"927_CR8","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.ins.2016.01.078","volume":"345","author":"J Yu-Guang Yang","year":"2016","unstructured":"Yu-Guang Yang J, Tian HL, Zhou Y-H, Shi W-M (2016) Novel quantum image encryption using one-dimensional quantum cellular automata. Inf Sci 345:257\u2013270","journal-title":"Inf Sci"},{"key":"927_CR9","doi-asserted-by":"publisher","first-page":"3234","DOI":"10.1007\/s10773-016-2954-6","volume":"55","author":"L-H Gong","year":"2016","unstructured":"Gong L-H, He X-T, Cheng S, Hua T-X, Zhou N-R (2016) Quantum image encryption algorithm based on quantum image XOR operations. Int J Theor Phys 55:3234\u20133250","journal-title":"Int J Theor Phys"},{"key":"927_CR10","doi-asserted-by":"publisher","first-page":"106403","DOI":"10.1016\/j.optlaseng.2020.106403","volume":"138","author":"B Abd-El-Atty","year":"2021","unstructured":"Abd-El-Atty B, Iliyasu AM, Alanezi A, Abd El-latif AA (2021) Optical image encryption based on quantum walks. Opt Lasers Eng 138:106403","journal-title":"Opt Lasers Eng"},{"issue":"5","key":"927_CR11","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu H, Wang X et al (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457\u20131466","journal-title":"Appl Soft Comput"},{"key":"927_CR12","doi-asserted-by":"crossref","unstructured":"Sadkhan SB, Yaseen BS (2019) DNA-based cryptanalysis: challenges, and future trends. In: 2019 2nd scientific conference of computer sciences (SCCS), IEEE, pp 24\u201327","DOI":"10.1109\/SCCS.2019.8852613"},{"issue":"2","key":"927_CR13","doi-asserted-by":"publisher","first-page":"171","DOI":"10.3390\/e22020171","volume":"22","author":"Y Wan","year":"2020","unstructured":"Wan Y, Shuangquan G, Baoxiang D (2020) A new image encryption algorithm based on composite chaos and hyperchaos combined with DNA coding. Entropy 22(2):171","journal-title":"Entropy"},{"issue":"1","key":"927_CR14","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1080\/02564602.2018.1544855","volume":"37","author":"M Kar","year":"2020","unstructured":"Kar M, Kumar A, Nandi D, Mandal MK (2020) Image encryption using DNA coding and hyperchaotic system. IETE Tech Rev 37(1):12\u201323","journal-title":"IETE Tech Rev"},{"issue":"2","key":"927_CR15","doi-asserted-by":"publisher","first-page":"175","DOI":"10.3390\/e22020175","volume":"22","author":"PW Khan","year":"2020","unstructured":"Khan PW, Byun Y (2020) A blockchain-based secure image encryption scheme for the industrial internet of things. Entropy 22(2):175","journal-title":"Entropy"},{"issue":"1","key":"927_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/app11010001","volume":"11","author":"A Qureshi","year":"2020","unstructured":"Qureshi A, Meg\u00edas Jim\u00e9nez D (2020) Blockchain-based multimedia content protection: Review and open challenges. Appl Sci 11(1):1","journal-title":"Appl Sci"},{"key":"927_CR17","doi-asserted-by":"publisher","first-page":"111318","DOI":"10.1016\/j.chaos.2021.111318","volume":"152","author":"Z Man","year":"2021","unstructured":"Man Z, Li J, Di X, Sheng Y, Liu Z (2021) Double image encryption algorithm based on neural network and chaos. Chaos Solitons Fractals 152:111318","journal-title":"Chaos Solitons Fractals"},{"issue":"16","key":"927_CR18","doi-asserted-by":"publisher","first-page":"3455","DOI":"10.3390\/electronics12163455","volume":"12","author":"L Feng","year":"2023","unstructured":"Feng L, Jize D, Chong F, Song W (2023) Image encryption algorithm combining chaotic image encryption and convolutional neural network. Electronics 12(16):3455","journal-title":"Electronics"},{"key":"927_CR19","doi-asserted-by":"publisher","first-page":"107753","DOI":"10.1016\/j.optlastec.2021.107753","volume":"148","author":"S Wang","year":"2022","unstructured":"Wang S, Peng Q, Baoxiang D (2022) Chaotic color image encryption based on 4d chaotic maps and DNA sequence. Opt Laser Technol 148:107753","journal-title":"Opt Laser Technol"},{"key":"927_CR20","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s12065-021-00643-5","volume":"16","author":"J Liu","year":"2023","unstructured":"Liu J, Zhang J, Yin S (2023) Hybrid chaotic system-oriented artificial fish swarm neural network for image encryption. Evolut Intell 16:77\u201387. https:\/\/doi.org\/10.1007\/s12065-021-00643-5","journal-title":"Evolut Intell"},{"key":"927_CR21","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1007\/s11045-019-00634-x","volume":"30","author":"R Ponuma","year":"2019","unstructured":"Ponuma R, Amutha R (2019) Image encryption using sparse coding and compressive sensing. Multidimens Syst Signal Process 30:1895\u20131909","journal-title":"Multidimens Syst Signal Process"},{"key":"927_CR22","doi-asserted-by":"publisher","first-page":"28277","DOI":"10.1007\/s11042-020-09125-9","volume":"79","author":"J Karmakar","year":"2020","unstructured":"Karmakar J, Nandi D, Mandal MK (2020) A novel hyper-chaotic image encryption with sparse-representation based compression. Multimed Tools Appl 79:28277\u201328300","journal-title":"Multimed Tools Appl"},{"key":"927_CR23","doi-asserted-by":"publisher","first-page":"181083","DOI":"10.1109\/ACCESS.2019.2959031","volume":"7","author":"J Chen","year":"2019","unstructured":"Chen J, Li X-W, Wang Q-H (2019) Deep learning for improving the robustness of image encryption. IEEE Access 7:181083\u2013181091","journal-title":"IEEE Access"},{"key":"927_CR24","doi-asserted-by":"publisher","first-page":"103134","DOI":"10.1016\/j.micpro.2020.103134","volume":"77","author":"SR Maniyath","year":"2020","unstructured":"Maniyath SR, Thanikaiselvan V (2020) An efficient image encryption using deep neural network and chaotic map. Microprocess Microsyst 77:103134","journal-title":"Microprocess Microsyst"},{"issue":"10","key":"927_CR25","doi-asserted-by":"publisher","first-page":"1474","DOI":"10.3390\/e24101474","volume":"24","author":"W Yanan","year":"2022","unstructured":"Yanan W, Zeng J, Dong W, Li X, Qin D, Ding Q (2022) A novel color image encryption scheme based on hyperchaos and hopfield chaotic neural network. Entropy 24(10):1474","journal-title":"Entropy"},{"issue":"3","key":"927_CR26","doi-asserted-by":"publisher","first-page":"035209","DOI":"10.1088\/1402-4896\/abd50f","volume":"96","author":"Y Wang","year":"2021","unstructured":"Wang Y, Yang F (2021) A fractional-order CNN hyperchaotic system for image encryption algorithm. Phys Scr 96(3):035209","journal-title":"Phys Scr"},{"key":"927_CR27","doi-asserted-by":"publisher","first-page":"169758","DOI":"10.1016\/j.ijleo.2022.169758","volume":"268","author":"S Wang","year":"2022","unstructured":"Wang S, Hong L, Jiang J (2022) An image encryption scheme using a chaotic neural network and a network with multistable hyperchaos. Optik 268:169758","journal-title":"Optik"},{"issue":"5","key":"927_CR28","doi-asserted-by":"publisher","first-page":"21","DOI":"10.23919\/JCC.2020.05.003","volume":"17","author":"F Yang","year":"2020","unstructured":"Yang F, Mou J, Cao Y, Chu R (2020) An image encryption algorithm based on BP neural network and hyperchaotic system. China Commun 17(5):21\u201328","journal-title":"China Commun"},{"issue":"5","key":"927_CR29","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1016\/0375-9601(76)90101-8","volume":"57","author":"OE R\u00f6ssler","year":"1976","unstructured":"R\u00f6ssler OE (1976) An equation for continuous chaos. Phys Lett A 57(5):397\u2013398","journal-title":"Phys Lett A"},{"issue":"2","key":"927_CR30","doi-asserted-by":"publisher","first-page":"118","DOI":"10.12677\/DSC.2019.82014","volume":"8","author":"Q Wei","year":"2019","unstructured":"Wei Q, Niu H (2019) Analysis and circuit design of a novel 5D hyperchaotic system. Dyn Syst Control 8(2):118\u2013128","journal-title":"Dyn Syst Control"},{"issue":"08","key":"927_CR31","doi-asserted-by":"publisher","first-page":"1930023","DOI":"10.1142\/S0218127419300234","volume":"29","author":"C Fan","year":"2019","unstructured":"Fan C, Ding Q, Tse CK (2019) Counteracting the dynamical degradation of digital chaos by applying stochastic jump of chaotic orbits. Int J Bifurc Chaos 29(08):1930023","journal-title":"Int J Bifurc Chaos"},{"key":"927_CR32","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-22r1a","volume-title":"Sp 800\u201322 rev. 1a. a statistical test suite for random and pseudorandom number generators for cryptographic applications","author":"LE Bassham III","year":"2010","unstructured":"Bassham III LE, Rukhin AL, Soto J, Nechvatal JR, Smid ME, Barker EB, Leigh SD, Levenson M, Vangel M, Banks DL et al (2010) Sp 800\u201322 rev. 1a. a statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards & Technology, Gaithersburg"},{"issue":"5","key":"927_CR33","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1016\/j.optcom.2011.11.025","volume":"285","author":"Z Zhong","year":"2012","unstructured":"Zhong Z, Chang J, Shan M, Hao B (2012) Double image encryption using double pixel scrambling and random phase encoding. Opt Commun 285(5):584\u2013588","journal-title":"Opt Commun"},{"issue":"11\u201312","key":"927_CR34","doi-asserted-by":"publisher","first-page":"2028","DOI":"10.1016\/j.mcm.2010.06.005","volume":"52","author":"Q Zhang","year":"2010","unstructured":"Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52(11\u201312):2028\u20132035","journal-title":"Math Comput Model"},{"key":"927_CR35","first-page":"224","volume":"3","author":"C Shannon","year":"1948","unstructured":"Shannon C (1948) Claude shannon. Inf Theory 3:224","journal-title":"Inf Theory"},{"key":"927_CR36","doi-asserted-by":"publisher","first-page":"117861","DOI":"10.1016\/j.eswa.2022.117861","volume":"206","author":"Bhat Jasra and Ayaz Hassan Moon","year":"2022","unstructured":"Bhat Jasra and Ayaz Hassan Moon (2022) Color image encryption and authentication using dynamic DNA encoding and hyper chaotic system. Expert Syst Appl 206:117861","journal-title":"Expert Syst Appl"},{"key":"927_CR37","doi-asserted-by":"publisher","first-page":"112380","DOI":"10.1016\/j.chaos.2022.112380","volume":"161","author":"S Zhou","year":"2022","unstructured":"Zhou S, Zhao Z, Wang X (2022) Novel chaotic colour image cryptosystem with deep learning. Chaos Solitons Fractals 161:112380","journal-title":"Chaos Solitons Fractals"},{"key":"927_CR38","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.vlsi.2022.10.002","volume":"88","author":"S Yan","year":"2023","unstructured":"Yan S, Li L, Binxian G, Cui Yu, Wang J, Song J (2023) Design of hyperchaotic system based on multi-scroll and its encryption algorithm in color image. Integration 88:203\u2013221","journal-title":"Integration"},{"key":"927_CR39","doi-asserted-by":"publisher","first-page":"11541","DOI":"10.1109\/ACCESS.2023.3242311","volume":"11","author":"W Alexan","year":"2023","unstructured":"Alexan W, Elkandoz M, Mashaly M, Azab E, Aboshousha A (2023) Color image encryption through chaos and KAA map. IEEE Access 11:11541\u201311554","journal-title":"IEEE Access"},{"issue":"1","key":"927_CR40","doi-asserted-by":"publisher","first-page":"105","DOI":"10.37936\/ecti-cit.2023171.249733","volume":"17","author":"S Pal","year":"2023","unstructured":"Pal S, Mahanty A, Pathak A, Karmakar J, Mondal H, Mandal M (2023) A novel image encryption technique with four stage bit-interspersing and a 4D-hyperchaotic system. ECTI Trans Comput Inf Technol (ECTI-CIT) 17(1):105\u2013116","journal-title":"ECTI Trans Comput Inf Technol (ECTI-CIT)"},{"key":"927_CR41","doi-asserted-by":"publisher","unstructured":"Pathak A, Mondal H, Karmakar J, Pal S, Nandi D, Mandal MK (2023) Sparse compression-based image encryption using data encryption standards rc5. IETE Tech Rev. https:\/\/doi.org\/10.1080\/02564602.2023.2240286","DOI":"10.1080\/02564602.2023.2240286"}],"container-title":["Evolutionary Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-024-00927-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12065-024-00927-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-024-00927-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T05:35:23Z","timestamp":1720676123000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12065-024-00927-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,25]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["927"],"URL":"https:\/\/doi.org\/10.1007\/s12065-024-00927-6","relation":{},"ISSN":["1864-5909","1864-5917"],"issn-type":[{"value":"1864-5909","type":"print"},{"value":"1864-5917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,25]]},"assertion":[{"value":"13 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare that they have no Conflict of interest for the publication of the paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}