{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T16:35:19Z","timestamp":1774802119050,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,7,6]],"date-time":"2019-07-06T00:00:00Z","timestamp":1562371200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,7,6]],"date-time":"2019-07-06T00:00:00Z","timestamp":1562371200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s12652-019-01385-0","type":"journal-article","created":{"date-parts":[[2019,7,6]],"date-time":"2019-07-06T15:02:36Z","timestamp":1562425356000},"page":"1289-1308","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":92,"title":["A chaotic colour image encryption scheme combining Walsh\u2013Hadamard transform and Arnold\u2013Tent maps"],"prefix":"10.1007","volume":"11","author":[{"given":"P. S.","family":"Sneha","sequence":"first","affiliation":[]},{"given":"Syam","family":"Sankar","sequence":"additional","affiliation":[]},{"given":"Ashok S.","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,6]]},"reference":[{"key":"1385_CR1","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/s0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16:2129\u20132151. \nhttps:\/\/doi.org\/10.1142\/s0218127406015970","journal-title":"Int J Bifurc Chaos"},{"key":"1385_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-1072-0","author":"A Bisht","year":"2018","unstructured":"Bisht A, Dua M, Dua S (2018) A novel approach to encrypt multiple images using multiple chaotic maps and chaotic discrete fractional random transform. J Ambient Intell Humaniz Comput. \nhttps:\/\/doi.org\/10.1007\/s12652-018-1072-0","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1385_CR4","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/S0167-2789(01)00323-2","volume":"160","author":"CL Bremer","year":"2001","unstructured":"Bremer CL, Kaplan DT (2001) Markov chain Monte Carlo estimation of nonlinear dynamics from time series. Phys D Nonlinear Phenom 160:116\u2013126. \nhttps:\/\/doi.org\/10.1016\/S0167-2789(01)00323-2","journal-title":"Phys D Nonlinear Phenom"},{"key":"1385_CR5","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197\u2013213. \nhttps:\/\/doi.org\/10.1016\/j.optlaseng.2016.08.009","journal-title":"Opt Lasers Eng"},{"key":"1385_CR2","series-title":"Lecture Notes in Computational Vision and Biomechanics","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-319-61316-1_2","volume-title":"Biologically rationalized computing techniques for image processing applications","author":"A Diana Andrushia","year":"2018","unstructured":"Diana Andrushia A, Thangarjan R (2018) Saliency-based image compression using walsh\u2013hadamard transform (WHT). In: Hemanth J, Balas V (eds) Biologically rationalized computing techniques for image processing applications. Lecture Notes in Computational Vision and Biomechanics, vol 25. Springer, Cham, pp 21\u201348. \nhttps:\/\/doi.org\/10.1007\/978-3-319-61316-1_2"},{"key":"1385_CR6","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/BF01608556","volume":"50","author":"M Henon","year":"1976","unstructured":"Henon M (1976) Mathematical physics a two-dimensional mapping with a strange attractor. Commun Math Phys 50:69\u201377","journal-title":"Commun Math Phys"},{"key":"1385_CR7","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198507239.001.0001","volume-title":"Chaos and nonlinear dynamics: an introduction for scientists and engineers","author":"RC Hilborn","year":"2000","unstructured":"Hilborn RC (2000) Chaos and nonlinear dynamics: an introduction for scientists and engineers, 2nd edn. Oxford University Press,  Oxford, United Kingdom","edition":"2"},{"key":"1385_CR8","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"Z Hua","year":"2016","unstructured":"Hua Z, Zhou Y (2016) Image encryption using 2D logistic-adjusted-Sine map. Inf Sci (N Y) 339:237\u2013253. \nhttps:\/\/doi.org\/10.1016\/j.ins.2016.01.017","journal-title":"Inf Sci (N Y)"},{"key":"1385_CR9","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.image.2015.03.003","volume":"34","author":"FG Jeng","year":"2015","unstructured":"Jeng FG, Huang WL, Chen TH (2015) Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes. Signal Process Image Commun 34:45\u201351. \nhttps:\/\/doi.org\/10.1016\/j.image.2015.03.003","journal-title":"Signal Process Image Commun"},{"key":"1385_CR10","doi-asserted-by":"publisher","DOI":"10.1002\/9780470977859","volume-title":"The Duffing equation: nonlinear oscillators and their behaviour","author":"I Kovacic","year":"2011","unstructured":"Kovacic I, Brennan MJ (2011) The Duffing equation: nonlinear oscillators and their behaviour. Wiley, Hoboken, New Jersey"},{"key":"1385_CR11","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1007\/s12652-013-0217-4","volume":"6","author":"X Li","year":"2015","unstructured":"Li X, Zhang G, Zhang X (2015) Image encryption algorithm with compound chaotic maps. J Ambient Intell Humaniz Comput 6:563\u2013570","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1385_CR12","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s11071-016-3030-8","volume":"87","author":"C Li","year":"2017","unstructured":"Li C, Luo G, Qin K, Li C (2017a) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87:127\u2013133. \nhttps:\/\/doi.org\/10.1007\/s11071-016-3030-8","journal-title":"Nonlinear Dyn"},{"key":"1385_CR13","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"Y Li","year":"2017","unstructured":"Li Y, Wang C, Chen H (2017b) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238\u2013246. \nhttps:\/\/doi.org\/10.1016\/j.optlaseng.2016.10.020","journal-title":"Opt Lasers Eng"},{"key":"1385_CR14","doi-asserted-by":"publisher","first-page":"10033","DOI":"10.1007\/s11042-017-4946-9","volume":"77","author":"X Liao","year":"2018","unstructured":"Liao X, Guo S, Yin J et al (2018a) New cubic reference table based image steganography. Multimed Tools Appl 77:10033\u201310050. \nhttps:\/\/doi.org\/10.1007\/s11042-017-4946-9","journal-title":"Multimed Tools Appl"},{"key":"1385_CR15","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.compeleceng.2017.08.020","volume":"67","author":"X Liao","year":"2018","unstructured":"Liao X, Yin J, Guo S et al (2018b) Medical JPEG image steganography based on preserving inter-block dependencies. Comput Electr Eng 67:320\u2013329. \nhttps:\/\/doi.org\/10.1016\/j.compeleceng.2017.08.020","journal-title":"Comput Electr Eng"},{"key":"1385_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2019.2896270","author":"X Liao","year":"2019","unstructured":"Liao X, Yu Y, Li B et al (2019) A new payload partition strategy in color image steganography. IEEE Trans Circuits Syst Video Technol. \nhttps:\/\/doi.org\/10.1109\/tcsvt.2019.2896270","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"1385_CR17","doi-asserted-by":"publisher","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","volume":"59","author":"H Liu","year":"2010","unstructured":"Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59:3320\u20133327. \nhttps:\/\/doi.org\/10.1016\/j.camwa.2010.03.017","journal-title":"Comput Math Appl"},{"key":"1385_CR18","doi-asserted-by":"publisher","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","volume":"284","author":"H Liu","year":"2011","unstructured":"Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284:3895\u20133903. \nhttps:\/\/doi.org\/10.1016\/j.optcom.2011.04.001","journal-title":"Opt Commun"},{"key":"1385_CR19","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput J 12:1457\u20131466. \nhttps:\/\/doi.org\/10.1016\/j.asoc.2012.01.016","journal-title":"Appl Soft Comput J"},{"key":"1385_CR20","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24:926\u2013934. \nhttps:\/\/doi.org\/10.1016\/j.imavis.2006.02.021","journal-title":"Image Vis Comput"},{"key":"1385_CR21","doi-asserted-by":"crossref","unstructured":"Rohith S, Sujatha BK (2015) Image encryption and decryption using combined key sequence of logistic map and Lozi map. In: 2015 international conference on communication and signal processing, ICCSP 2015. Institute of Electrical and Electronics Engineers Inc., pp 1053\u20131058","DOI":"10.1109\/ICCSP.2015.7322662"},{"key":"1385_CR22","doi-asserted-by":"crossref","unstructured":"Rohith S, Bhat KN, Sharma AN (2014) Image encryption and decryption using chaotic key sequence generated by sequence of logistic map and sequence of states of linear feedback shift register, Bangalore","DOI":"10.1109\/ICAECC.2014.7002404"},{"key":"1385_CR23","doi-asserted-by":"publisher","first-page":"137","DOI":"10.7763\/IJIET.2011.V1.23","volume":"1","author":"K Sakthidasan","year":"2011","unstructured":"Sakthidasan K, Santhosh Krishna BV (2011) A new chaotic algorithm for image encryption and decryption of digital color images. Int J Inf Educ Technol 1:137\u2013141. \nhttps:\/\/doi.org\/10.7763\/IJIET.2011.V1.23","journal-title":"Int J Inf Educ Technol"},{"key":"1385_CR24","first-page":"780","volume":"6","author":"A Soleymani","year":"2012","unstructured":"Soleymani A, Ali ZM, Nordin MJ (2012) A survey on principal aspects of secure image transmission. Int J Comput Inf Eng 6:780\u2013787","journal-title":"Int J Comput Inf Eng"},{"key":"1385_CR25","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1063\/1.4823332","volume":"8","author":"SH Strogatz","year":"1994","unstructured":"Strogatz SH (1994) Nonlinear dynamics and chaos: with applications to physics, biology and chemistry. Comput Phys 8:532","journal-title":"Comput Phys"},{"key":"1385_CR26","doi-asserted-by":"publisher","first-page":"2277","DOI":"10.1007\/s12652-018-0825-0","volume":"10","author":"S Suri","year":"2019","unstructured":"Suri S, Vijay R (2019) A synchronous intertwining logistic map-DNA approach for color image encryption. J Ambient Intell Humaniz Comput 10:2277\u20132290","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1385_CR27","doi-asserted-by":"publisher","first-page":"2333","DOI":"10.1007\/s11071-016-2648-x","volume":"84","author":"XJ Tong","year":"2016","unstructured":"Tong XJ, Zhang M, Wang Z, Ma J (2016) A joint color image encryption and compression scheme based on hyper-chaotic system. Nonlinear Dyn 84:2333\u20132356. \nhttps:\/\/doi.org\/10.1007\/s11071-016-2648-x","journal-title":"Nonlinear Dyn"},{"key":"1385_CR28","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/s11071-012-0329-y","volume":"62","author":"XY Wang","year":"2010","unstructured":"Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62:615\u2013621. \nhttps:\/\/doi.org\/10.1007\/s11071-012-0329-y","journal-title":"Nonlinear Dyn"},{"key":"1385_CR29","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"X Wang","year":"2012","unstructured":"Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92:1101\u20131108. \nhttps:\/\/doi.org\/10.1016\/j.sigpro.2011.10.023","journal-title":"Signal Process"},{"key":"1385_CR30","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang X, Liu L, Zhang Y (2015a) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10\u201318. \nhttps:\/\/doi.org\/10.1016\/j.optlaseng.2014.08.005","journal-title":"Opt Lasers Eng"},{"key":"1385_CR31","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"XY Wang","year":"2015","unstructured":"Wang XY, Zhang YQ, Bao XM (2015b) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53\u201361. \nhttps:\/\/doi.org\/10.1016\/j.optlaseng.2015.03.022","journal-title":"Opt Lasers Eng"},{"key":"1385_CR32","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.optlaseng.2015.07.015","volume":"77","author":"L Wang","year":"2016","unstructured":"Wang L, Song H, Liu P (2016) A novel hybrid color image encryption algorithm using two complex chaotic systems. Opt Lasers Eng 77:118\u2013125. \nhttps:\/\/doi.org\/10.1016\/j.optlaseng.2015.07.015","journal-title":"Opt Lasers Eng"},{"key":"1385_CR33","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.optlaseng.2017.06.015","volume":"107","author":"X Wang","year":"2018","unstructured":"Wang X, Zhu X, Wu X, Zhang Y (2018) Image encryption algorithm based on multiple mixed hash functions and cyclic shift. Opt Lasers Eng 107:370\u2013379. \nhttps:\/\/doi.org\/10.1016\/j.optlaseng.2017.06.015","journal-title":"Opt Lasers Eng"},{"key":"1385_CR34","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.ins.2019.02.049","volume":"486","author":"X Wang","year":"2019","unstructured":"Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci (N Y) 486:340\u2013358. \nhttps:\/\/doi.org\/10.1016\/j.ins.2019.02.049","journal-title":"Inf Sci (N Y)"},{"key":"1385_CR35","doi-asserted-by":"publisher","first-page":"2645","DOI":"10.1016\/j.physleta.2007.12.026","volume":"372","author":"KW Wong","year":"2008","unstructured":"Wong KW, Kwok BSH, Law WS (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett Sect A Gen At Solid State Phys 372:2645\u20132652. \nhttps:\/\/doi.org\/10.1016\/j.physleta.2007.12.026","journal-title":"Phys Lett Sect A Gen At Solid State Phys"},{"key":"1385_CR36","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan J, Agaian S (2011) NPCR and UACI randomness tests for image encryption. J Sel Areas Telecommun 1:31\u201338","journal-title":"J Sel Areas Telecommun"},{"key":"1385_CR37","doi-asserted-by":"publisher","first-page":"6429","DOI":"10.1109\/ACCESS.2017.2692043","volume":"5","author":"X Wu","year":"2017","unstructured":"Wu X, Zhu B, Hu Y, Ran Y (2017) A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access 5:6429\u20136436. \nhttps:\/\/doi.org\/10.1109\/ACCESS.2017.2692043","journal-title":"IEEE Access"},{"key":"1385_CR38","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17\u201325. \nhttps:\/\/doi.org\/10.1016\/j.optlaseng.2015.09.007","journal-title":"Opt Lasers Eng"},{"key":"1385_CR39","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","volume":"90","author":"A Yaghouti Niyat","year":"2017","unstructured":"Yaghouti Niyat A, Moattar MH, Niazi Torshiz M (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng 90:225\u2013237. \nhttps:\/\/doi.org\/10.1016\/j.optlaseng.2016.10.019","journal-title":"Opt Lasers Eng"},{"key":"1385_CR40","doi-asserted-by":"publisher","unstructured":"Zhang J (2015) An image encryption scheme based on cat map and hyperchaotic lorenz system. In: Proceedings\u20142015 IEEE international conference on computational intelligence and communication technology, CICT 2015, pp 78\u201382. \nhttps:\/\/doi.org\/10.1109\/cict.2015.134","DOI":"10.1109\/cict.2015.134"},{"key":"1385_CR41","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf Sci (N Y) 273:329\u2013351. \nhttps:\/\/doi.org\/10.1016\/j.ins.2014.02.156","journal-title":"Inf Sci (N Y)"},{"key":"1385_CR42","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.asoc.2014.09.039","volume":"26","author":"YQ Zhang","year":"2015","unstructured":"Zhang YQ, Wang XY (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput J 26:10\u201320. \nhttps:\/\/doi.org\/10.1016\/j.asoc.2014.09.039","journal-title":"Appl Soft Comput J"},{"key":"1385_CR43","doi-asserted-by":"publisher","first-page":"2066","DOI":"10.1016\/j.cnsns.2012.12.012","volume":"18","author":"W Zhang","year":"2013","unstructured":"Zhang W, Wong K, Yu H, Zhu ZL (2013) An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun Nonlinear Sci Numer Simul 18:2066\u20132080. \nhttps:\/\/doi.org\/10.1016\/j.cnsns.2012.12.012","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"1385_CR44","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"ZL Zhu","year":"2011","unstructured":"Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci (N Y) 181:1171\u20131186. \nhttps:\/\/doi.org\/10.1016\/j.ins.2010.11.009","journal-title":"Inf Sci (N Y)"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01385-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-019-01385-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01385-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,4]],"date-time":"2020-07-04T23:17:06Z","timestamp":1593904626000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-019-01385-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,6]]},"references-count":44,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["1385"],"URL":"https:\/\/doi.org\/10.1007\/s12652-019-01385-0","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,6]]},"assertion":[{"value":"10 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 July 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}