{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T13:13:53Z","timestamp":1771679633094,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Earth Sci Inform"],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s12145-024-01684-x","type":"journal-article","created":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T04:38:47Z","timestamp":1736483927000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Enhanced selective hyper chaotic encryption using deep neural network for hyperspectral images"],"prefix":"10.1007","volume":"18","author":[{"given":"Minal","family":"Bodke","sequence":"first","affiliation":[]},{"given":"Sangita","family":"Chaudhari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,10]]},"reference":[{"issue":"4","key":"1684_CR1","doi-asserted-by":"publisher","first-page":"287","DOI":"10.3390\/fractalfract7040287","volume":"7","author":"W Alexan","year":"2023","unstructured":"Alexan W, Alexan N, Gabr M (2023) Multiple-layer image encryption utilizing fractional-order chen hyperchaotic map and cryptographically secure prngs. Fractal and Fractional 7(4):287","journal-title":"Fractal and Fractional"},{"issue":"1","key":"1684_CR2","doi-asserted-by":"publisher","first-page":"126","DOI":"10.3390\/jcp4010007","volume":"4","author":"Y Alghamdi","year":"2024","unstructured":"Alghamdi Y, Munir A (2024) Image encryption algorithms: A survey of design and evaluation metrics. J Cybersecur Priv 4(1):126\u2013152","journal-title":"J Cybersecur Priv"},{"issue":"4","key":"1684_CR3","doi-asserted-by":"publisher","first-page":"1022","DOI":"10.3390\/rs15041022","volume":"15","author":"FS Alsubaei","year":"2023","unstructured":"Alsubaei FS, Alneil AA, Mohamed A, Mustafa Hilal A (2023) Block-scrambling-based encryption with deep-learning-driven remote sensing image classification. Remote Sens 15(4):1022","journal-title":"Remote Sens"},{"issue":"1","key":"1684_CR4","doi-asserted-by":"publisher","first-page":"22669","DOI":"10.1038\/s41598-021-02067-8","volume":"11","author":"R Audhkhasi","year":"2021","unstructured":"Audhkhasi R, Povinelli ML (2021) Generalized multi-channel scheme for secure image encryption. Sci Rep 11(1):22669","journal-title":"Sci Rep"},{"key":"1684_CR5","doi-asserted-by":"crossref","unstructured":"Bodke M, Chaudhari S (2024) Hyperspectral remote sensing image watermarking using discrete wavelet transform and forensic based investigation archimedes optimization. Earth Sci Inf 1\u201317","DOI":"10.1007\/s12145-024-01394-4"},{"issue":"3","key":"1684_CR6","volume":"98","author":"R Chen","year":"2023","unstructured":"Chen R, Li X, Teng L, Wang X (2023) Selective region medical image encryption algorithm based on cascade chaos and two-dimensional joseph traversal. Phys Scr 98(3):035227","journal-title":"Phys Scr"},{"key":"1684_CR7","doi-asserted-by":"crossref","unstructured":"Chen Q, Lv X (2024) Designing a novel image encryption algorithm based on a 2d-sclc hyperchaotic map. Multimed Tools Appl 1\u201327","DOI":"10.1007\/s11042-023-17755-y"},{"key":"1684_CR8","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1016\/j.ins.2021.12.126","volume":"589","author":"U Erkan","year":"2022","unstructured":"Erkan U, Toktas A, Toktas F, Alenezi F (2022) 2d e$$\\pi $$-map for image encryption. Inf Sci 589:770\u2013789","journal-title":"Inf Sci"},{"key":"1684_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109606","volume":"254","author":"G Fan","year":"2022","unstructured":"Fan G, Pan Z, Zhou Q, Dong J, Zhang X (2022) Pixel type classification based reversible data hiding for hyperspectral images. Knowl-Based Syst 254:109606","journal-title":"Knowl-Based Syst"},{"issue":"3","key":"1684_CR10","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/ac8cdf","volume":"32","author":"X Gao","year":"2023","unstructured":"Gao X, Sun B, Cao Y, Banerjee S, Mou J (2023) A color image encryption algorithm based on hyperchaotic map and dna mutation. Chin Phys B 32(3):030501","journal-title":"Chin Phys B"},{"key":"1684_CR11","doi-asserted-by":"crossref","unstructured":"Hangyu G, Zhi Z (2022) Progressive compression and encryption of hyperspectral images based on walsh transform and fingerprint recognition discrete multiple-parameter fractional fourier transform. In: Proceedings of the 6th International Conference on Digital Signal Processing, pp 127\u2013133","DOI":"10.1145\/3529570.3529592"},{"issue":"3","key":"1684_CR12","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/acb9c6","volume":"98","author":"L Huang","year":"2023","unstructured":"Huang L, Chai B, Xiang J, Zhang Z, Liu J (2023) Chaotic image encryption based on spiral traversal and finite field bidirectional diffusion. Phys Scr 98(3):035217","journal-title":"Phys Scr"},{"key":"1684_CR13","doi-asserted-by":"crossref","unstructured":"Kolivand H, Hamood SF, Asadianfam S, Rahim MS (2024) Image encryption techniques: A comprehensive review. Multimed Tools Appl","DOI":"10.1007\/s11042-023-17896-0"},{"key":"1684_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2021.106669","volume":"145","author":"C Lin","year":"2021","unstructured":"Lin C, Han Y, Lou S, Li Z (2021) High spectral and spatial resolved encryption and decryption of 3d color object based on holographic imaging spectroscopy. Opt Lasers Eng 145:106669","journal-title":"Opt Lasers Eng"},{"key":"1684_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.114361","volume":"178","author":"M SaberiKamarposhti","year":"2024","unstructured":"SaberiKamarposhti M, Ghorbani A, Yadollahi M (2024) A comprehensive survey on image encryption: Taxonomy, challenges, and future directions. Chaos, Solitons Fractals 178:114361","journal-title":"Chaos, Solitons Fractals"},{"key":"1684_CR16","doi-asserted-by":"crossref","unstructured":"Shao Z, Liu X, Yao Q, Qi N, Shang Y, Zhang J (2020) Multiple-image encryption based on chaotic phase mask and equal modulus decomposition in quaternion gyrator domain. Signal Proc Image Commun 80:115662","DOI":"10.1016\/j.image.2019.115662"},{"issue":"4","key":"1684_CR17","doi-asserted-by":"publisher","first-page":"11717","DOI":"10.1007\/s11042-023-15587-4","volume":"83","author":"SR Sharma","year":"2024","unstructured":"Sharma SR, Singh B, Kaur M (2024) A hybrid encryption model for the hyperspectral images: application to hyperspectral medical images. Multimed Tools Appl 83(4):11717\u201311743","journal-title":"Multimed Tools Appl"},{"key":"1684_CR18","doi-asserted-by":"crossref","unstructured":"Srujana OS, Mhala NC, Pais AR (2020) Secure transmission of hyperspectral images. In: 2020 3rd ISEA Conference on Security and Privacy (ISEA-ISAP), pp 94\u201399. IEEE","DOI":"10.1109\/ISEA-ISAP49340.2020.235006"},{"key":"1684_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2021.116168","volume":"93","author":"Y Tang","year":"2021","unstructured":"Tang Y, Shao Z, Zhao X, Shang Y (2021) Robust multiple color images encryption using discrete fourier transforms and chaotic map. Signal Proc Image Commun 93:116168","journal-title":"Signal Proc Image Commun"},{"issue":"5","key":"1684_CR20","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/ad20d9","volume":"33","author":"JX Tian","year":"2024","unstructured":"Tian JX, Jin SC, Zhang XQ, Yang SW, Shi DX (2024) Remote sensing image encryption algorithm based on novel hyperchaos and an elliptic curve cryptosystem. Chin Phys B 33(5):050502","journal-title":"Chin Phys B"},{"key":"1684_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123583","volume":"249","author":"F Toktas","year":"2024","unstructured":"Toktas F, Erkan U, Yetgin Z (2024) Cross-channel color image encryption through 2d hyperchaotic hybrid map of optimization test functions. Expert Syst Appl 249:123583","journal-title":"Expert Syst Appl"},{"key":"1684_CR22","doi-asserted-by":"crossref","unstructured":"Wang Mm, Song Xg, Liu Sh, Zhao Xq, Zhou Nr (2024) A novel 2d log-logistic\u2013sine chaotic map for image encryption. Nonlinear Dyn 1\u201330","DOI":"10.1007\/s11071-024-10331-5"},{"key":"1684_CR23","volume":"51","author":"H Wen","year":"2024","unstructured":"Wen H, Lin Y, Feng Z (2024) Cryptanalyzing a bit-level image encryption algorithm based on chaotic maps. Eng Sci Technol Int J 51:101634","journal-title":"Eng Sci Technol Int J"},{"key":"1684_CR24","doi-asserted-by":"crossref","unstructured":"Xiao S, Xu S, Chen Z (2024) Hyperchaotic encryption scheme for hyperspectral images using 3d zigzag-like transformation and brushing diffusion. Multimed Tools Appl 1\u201335","DOI":"10.1007\/s11042-023-17970-7"},{"issue":"15","key":"1684_CR25","doi-asserted-by":"publisher","first-page":"7649","DOI":"10.3390\/app12157649","volume":"12","author":"Z Yang","year":"2022","unstructured":"Yang Z, Cao Y, Liu S, Tanougast C, Blondel W, Liu Z, Chen H (2022) A novel signature and authentication cryptosystem for hyperspectral image by using triangular association encryption algorithm in gyrator domains. Appl Sci 12(15):7649","journal-title":"Appl Sci"},{"key":"1684_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2023.104367","volume":"146","author":"H Zhang","year":"2024","unstructured":"Zhang H, Hu H (2024) An image encryption algorithm based on a compound-coupled chaotic system. Digital Signal Process 146:104367","journal-title":"Digital Signal Process"},{"issue":"15","key":"1684_CR27","first-page":"1770","volume":"10","author":"X Zhang","year":"2021","unstructured":"Zhang X, Yan X (2021) Adaptive chaotic image encryption algorithm based on rna and pixel depth. Electr 10(15):1770","journal-title":"Electr"},{"key":"1684_CR28","volume":"81","author":"X Zhang","year":"2024","unstructured":"Zhang X, Pan Z, Zhou Q, Fan G (2024) Dong J (2024) A reversible data hiding method based on bitmap prediction for ambtc compressed hyperspectral images. J Inf Secur Appl 81:103697","journal-title":"J Inf Secur Appl"}],"container-title":["Earth Science Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12145-024-01684-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12145-024-01684-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12145-024-01684-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,26]],"date-time":"2025-04-26T08:07:01Z","timestamp":1745654821000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12145-024-01684-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1684"],"URL":"https:\/\/doi.org\/10.1007\/s12145-024-01684-x","relation":{},"ISSN":["1865-0473","1865-0481"],"issn-type":[{"value":"1865-0473","type":"print"},{"value":"1865-0481","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"25 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"161"}}