{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T22:54:13Z","timestamp":1767480853231,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,2,13]],"date-time":"2020-02-13T00:00:00Z","timestamp":1581552000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,13]],"date-time":"2020-02-13T00:00:00Z","timestamp":1581552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evolving Systems"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s12530-020-09326-5","type":"journal-article","created":{"date-parts":[[2020,2,13]],"date-time":"2020-02-13T08:02:58Z","timestamp":1581580978000},"page":"359-375","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A comparative study of cellular automata-based digital image scrambling techniques"],"prefix":"10.1007","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4600-2899","authenticated-orcid":false,"given":"Zubair","family":"Jeelani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2294-0338","authenticated-orcid":false,"given":"Fasel","family":"Qadir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,13]]},"reference":[{"issue":"3\u20134","key":"9326_CR1","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/j.mcm.2009.08.010","volume":"51","author":"A Adamopoulos","year":"2010","unstructured":"Adamopoulos A, Pavlidis N, Vrahatis M (2010) Evolving cellular automata rules for multiple-step-ahead prediction of complex binary sequences. Math Comput Model 51(3\u20134):229\u2013238","journal-title":"Math Comput Model"},{"issue":"4","key":"9326_CR2","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s12530-013-9094-5","volume":"6","author":"AM Al-Ghaili","year":"2015","unstructured":"Al-Ghaili AM, Samsudin K, Saripan MI, Adnan WAW (2015) A fast cellular automata algorithm for liquid diffusion phenomenon modeling. Evol Syst 6(4):229\u2013241. https:\/\/doi.org\/10.1007\/s12530-013-9094-5","journal-title":"Evol Syst"},{"key":"9326_CR3","unstructured":"Angelov P, Kasabov N (2005) Evolving computational intelligence systems. In: Proceedings of the 1st international workshop on genetic fuzzy systems, Almeria, Spain, pp 76\u201382"},{"issue":"9","key":"9326_CR4","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1109\/TCYB.2013.2291234","volume":"44","author":"R\u00a0D Baruah","year":"2014","unstructured":"Baruah R\u00a0D, Angelov P (2014) DEC: dynamically evolving clustering and its application to structure identification of evolving fuzzy models. IEEE Trans Cybern 44(9):1619\u20131631","journal-title":"IEEE Trans Cybern"},{"issue":"3","key":"9326_CR5","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s12530-014-9105-1","volume":"5","author":"S Benmazou","year":"2014","unstructured":"Benmazou S, Merouani HF, Layachi S, Nedjmeddine B (2014) Classification of mammography images based on cellular automata and Haralick parameters. Evol Syst 5(3):209\u2013216. https:\/\/doi.org\/10.1007\/s12530-014-9105-1","journal-title":"Evol Syst"},{"key":"9326_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s11047-018-9696-8","author":"K Bhattacharjee","year":"2018","unstructured":"Bhattacharjee K, Naskar N, Roy S, Das S (2018) A survey of cellular automata: types, dynamics, non-uniformity and applications. Nat Comput. https:\/\/doi.org\/10.1007\/s11047-018-9696-8","journal-title":"Nat Comput"},{"issue":"4","key":"9326_CR7","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MMUL.2011.54","volume":"19","author":"ALA Dalhoum","year":"2012","unstructured":"Dalhoum ALA, Mahafzah BA, Awwad AA, Aldhamari I, Ortega A, Alfonseca M (2012) Digital image scrambling using 2D cellular automata. IEEE Multimed 19(4):28\u201336","journal-title":"IEEE Multimed"},{"issue":"24","key":"9326_CR8","doi-asserted-by":"publisher","first-page":"17\u00c3\u201a\u00c2 019","DOI":"10.1007\/s11042-015-2972-z","volume":"75","author":"A\u00a0L\u00a0A Dalhoum","year":"2015","unstructured":"Dalhoum A\u00a0L\u00a0A, Madain A, Hiary H (2015) Digital image scrambling based on elementary cellular automata. Multimed Tools Appl 75(24):17\u00c3\u201a\u00c2 019\u201317\u00c3\u201a\u00c2 034","journal-title":"Multimed Tools Appl"},{"key":"9326_CR9","doi-asserted-by":"publisher","first-page":"3515","DOI":"10.3906\/elk-1610-225","volume":"25","author":"G Dursun","year":"2017","unstructured":"Dursun G, \u00d6zer F, \u00d6zkaya U (2017) A new and secure digital image scrambling algorithm based on 2D cellular automata. Turk J Electric Eng Comput Sci 25:3515\u20133527","journal-title":"Turk J Electric Eng Comput Sci"},{"key":"9326_CR10","doi-asserted-by":"publisher","unstructured":"Halbach M, Hoffmann R (2004) Implementing cellular automata in FPGA logic. In: 18th international parallel and distributed processing symposium, proceedings, Santa Fe, NM, USA, p 258. https:\/\/doi.org\/10.1109\/IPDPS.2004.1303324","DOI":"10.1109\/IPDPS.2004.1303324"},{"key":"9326_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.12.006","author":"Z Jeelani","year":"2018","unstructured":"Jeelani Z, Qadir F (2018) Cellular automata-based approach for salt-and-pepper noise filtration. J King Saud Univ Comput Inf Sci. https:\/\/doi.org\/10.1016\/j.jksuci.2018.12.006","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"3","key":"9326_CR12","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1108\/IJICC-10-2017-0132","volume":"11","author":"Z Jeelani","year":"2018","unstructured":"Jeelani Z, Qadir F (2018) Cellular automata-based approach for digital image scrambling. Int J Intell Comput Cybern 11(3):353\u2013370","journal-title":"Int J Intell Comput Cybern"},{"key":"9326_CR13","doi-asserted-by":"publisher","unstructured":"Jiping N, Yongchuan Z, Zhihua H, Zuqiao Y (2008) A digital image scrambling method based on AES and error-correcting code. In: 2008 international conference on computer science and software engineering, Hubei, pp 677\u2013680. https:\/\/doi.org\/10.1109\/CSSE.2008.1172","DOI":"10.1109\/CSSE.2008.1172"},{"key":"9326_CR14","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1016\/j.jocs.2016.09.002","volume":"21","author":"M Kechaidou","year":"2017","unstructured":"Kechaidou M, Sirakoulis G (2017) Game of life variations for image scrambling. J Comput Sci 21:432\u2013447","journal-title":"J Comput Sci"},{"key":"9326_CR15","volume-title":"Modern cellular automata: theory and applications","author":"P Kendall Jr","year":"1984","unstructured":"Kendall P Jr, Duff MJ (1984) Modern cellular automata: theory and applications. Plenum Press, New York"},{"key":"9326_CR16","doi-asserted-by":"publisher","unstructured":"Min L, Ting L, Yu-jie H (2013) Arnold transform based image scrambling method. In: Proceedings of 3rd international conference on multimedia technology (ICMT 2013). Atlantis Press, pp 1309\u20131316. https:\/\/doi.org\/10.2991\/icmt-13.2013.160","DOI":"10.2991\/icmt-13.2013.160"},{"key":"9326_CR17","first-page":"89","volume":"7","author":"M Mitchell","year":"1993","unstructured":"Mitchell M, Hraber PT, Crutchfield JP (1993) Revisiting the edge of chaos: evolving cellular automata to perform computations. Complex Syst 7:89\u2013130 (no. Santa Fe Institute Working Paper 93-03-014)","journal-title":"Complex Syst"},{"key":"9326_CR18","doi-asserted-by":"publisher","unstructured":"Nag A, Singh JP, Khan S, Ghosh S, Biswas S, Sarkar D, Sarkar PP (2011) Image encryption using affine transform and XOR operation. In: 2011 international conference on signal processing, communication, computing and networking technologies, Thuckafay, pp 309\u2013312. https:\/\/doi.org\/10.1109\/ICSCCN.2011.6024565","DOI":"10.1109\/ICSCCN.2011.6024565"},{"issue":"5\u20136","key":"9326_CR19","doi-asserted-by":"publisher","first-page":"901","DOI":"10.1007\/BF01010423","volume":"38","author":"NH Packard","year":"1985","unstructured":"Packard NH, Wolfram S (1985) Two-dimensional cellular automata. J Stat Phys 38(5\u20136):901\u2013946","journal-title":"J Stat Phys"},{"key":"9326_CR21","doi-asserted-by":"publisher","unstructured":"Ping P, Xu F, Babu MSI, Lv X, Mao Y (2015) Image scrambling scheme based on bit-level permutation and 2-D cellular automata. In: 2015 international conference on intelligent information hiding and multimedia signal processing (IIH-MSP), Adelaide, SA, 2015, pp 413\u2013416. https:\/\/doi.org\/10.1109\/IIH-MSP.2015.78","DOI":"10.1109\/IIH-MSP.2015.78"},{"issue":"2","key":"9326_CR20","first-page":"59","volume":"44","author":"P Ping","year":"2016","unstructured":"Ping P, Xu F, Lv X, Mao Y, Qi R (2016) Investigations of life-like cellular automata for image scrambling. Control Intell Syst 44(2):59\u201366","journal-title":"Control Intell Syst"},{"issue":"2","key":"9326_CR22","first-page":"169","volume":"1","author":"M Prasad","year":"2011","unstructured":"Prasad M, Sudha K (2011) Chaos image encryption using pixel shuffling. Comput Sci Inf Technol 1(2):169\u2013179","journal-title":"Comput Sci Inf Technol"},{"issue":"2","key":"9326_CR23","first-page":"36","volume":"5","author":"F Qadir","year":"2012","unstructured":"Qadir F, Peer MA, Khan KA (2012) Digital image scrambling based on two dimensional cellular automata. Int J Comput Netw Inf Secur 5(2):36\u201341","journal-title":"Int J Comput Netw Inf Secur"},{"key":"9326_CR24","doi-asserted-by":"publisher","unstructured":"Shang Z, Ren H, Zhang J (2008) A block location scrambling algorithm of digital image based on arnold transformation. In: 2008 9th international conference for young computer scientists, Hunan, pp 2942\u20132947. https:\/\/doi.org\/10.1109\/ICYCS.2008.99","DOI":"10.1109\/ICYCS.2008.99"},{"key":"9326_CR25","doi-asserted-by":"publisher","unstructured":"Sipper M (1997) Evolving uniform and non-uniform cellular automata networks. In: Annual reviews of computational physics V, pp 243\u2013285. https:\/\/doi.org\/10.1142\/9789812819444_0006","DOI":"10.1142\/9789812819444_0006"},{"key":"9326_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/536930","volume":"2014","author":"A Soleymani","year":"2014","unstructured":"Soleymani A, Nordin MJ, Sundararajan E (2014) A chaotic cryptosystem for images based on Henon and Arnold cat map. Sci World J 2014:1\u201321. https:\/\/doi.org\/10.1155\/2014\/536930","journal-title":"Sci World J"},{"key":"9326_CR27","unstructured":"Soleymani A, Ali ZM, Nordin MJ (2012) A survey on principal aspects of secure image transmission. In: Proceedings of World Academy of Science, Engineering and Technology, no.\u00a066. World Academy of Science, Engineering and Technology"},{"key":"9326_CR28","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/1763.001.0001","volume-title":"Cellular automata machines: a new environment for modeling","author":"T Toffoli","year":"1987","unstructured":"Toffoli T, Margolus N (1987) Cellular automata machines: a new environment for modeling. MIT Press, Cambridge"},{"issue":"2\u201321","key":"9326_CR29","first-page":"42","volume":"9","author":"S Wolfram","year":"1983","unstructured":"Wolfram S (1983) Cellular automata. Los Alamos Sci 9(2\u201321):42","journal-title":"Los Alamos Sci"},{"key":"9326_CR30","volume-title":"A new kind of science","author":"S Wolfram","year":"2002","unstructured":"Wolfram S (2002) A new kind of science, vol 5. Wolfram Media, Champaign"},{"issue":"7","key":"9326_CR31","first-page":"1673","volume":"8","author":"W Xue","year":"2013","unstructured":"Xue W (2013) Study on digital image scrambling algorithm. J Netw 8(7):1673\u20131680","journal-title":"J Netw"},{"key":"9326_CR32","doi-asserted-by":"publisher","unstructured":"Ye R, Li H (2008) A novel image scrambling and watermarking scheme based on cellular automata. In: 2008 international symposium on electronic commerce and security, Guangzhou City, pp 938\u2013941. https:\/\/doi.org\/10.1109\/ISECS.2008.138","DOI":"10.1109\/ISECS.2008.138"},{"key":"9326_CR33","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1007\/11596981_145","volume-title":"Computational intelligence and security","author":"L Zhang","year":"2005","unstructured":"Zhang L, Ji S, Xie Y, Yuan Q, Wan Y, Bao G (2005) Principle of image encrypting algorithm based on magic cube transformation. In: Hao Y, Liu J, Wang Y-P, Cheung Y-M, Yin H, Jiao L, Ma J, Jiao Y-C (eds) Computational intelligence and security. Springer, Berlin, pp 977\u2013982"},{"key":"9326_CR34","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Bao L, Chen CP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172\u2013182","journal-title":"Signal Process"},{"key":"9326_CR35","doi-asserted-by":"publisher","unstructured":"Zhu L, Li W, Liao L, Li H (2006) A novel algorithm for scrambling digital image based on cat chaotic mapping. In: 2006 international conference on intelligent information hiding and multimedia, Pasadena, CA, USA, pp 601\u2013604. https:\/\/doi.org\/10.1109\/IIH-MSP.2006.265074","DOI":"10.1109\/IIH-MSP.2006.265074"}],"container-title":["Evolving Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12530-020-09326-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12530-020-09326-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12530-020-09326-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,21]],"date-time":"2021-05-21T04:24:18Z","timestamp":1621571058000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12530-020-09326-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,13]]},"references-count":35,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["9326"],"URL":"https:\/\/doi.org\/10.1007\/s12530-020-09326-5","relation":{},"ISSN":["1868-6478","1868-6486"],"issn-type":[{"type":"print","value":"1868-6478"},{"type":"electronic","value":"1868-6486"}],"subject":[],"published":{"date-parts":[[2020,2,13]]},"assertion":[{"value":"14 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 February 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}