{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T17:18:09Z","timestamp":1775323089854,"version":"3.50.1"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,3,6]],"date-time":"2021-03-06T00:00:00Z","timestamp":1614988800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,6]],"date-time":"2021-03-06T00:00:00Z","timestamp":1614988800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012011","name":"Indian Council of Historical Research","doi-asserted-by":"publisher","award":["MHR-01-23-200-428"],"award-info":[{"award-number":["MHR-01-23-200-428"]}],"id":[{"id":"10.13039\/501100012011","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001843","name":"Science and Engineering Research Board","doi-asserted-by":"publisher","award":["CRG\/2020\/002040"],"award-info":[{"award-number":["CRG\/2020\/002040"]}],"id":[{"id":"10.13039\/501100001843","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s12652-021-02982-8","type":"journal-article","created":{"date-parts":[[2021,3,6]],"date-time":"2021-03-06T12:03:03Z","timestamp":1615032183000},"page":"2205-2226","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["Novel image encryption algorithm using fractional chaos and cellular neural network"],"prefix":"10.1007","volume":"13","author":[{"given":"Farhan","family":"Musanna","sequence":"first","affiliation":[]},{"given":"Deepak","family":"Dangwal","sequence":"additional","affiliation":[]},{"given":"Sanjeev","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,6]]},"reference":[{"key":"2982_CR1","doi-asserted-by":"crossref","unstructured":"Adamatzky A (2010) Game of life cellular automata, vol 1. Springer","DOI":"10.1007\/978-1-84996-217-9"},{"key":"2982_CR2","first-page":"529","volume":"71","author":"V Arnold","year":"1978","unstructured":"Arnold V (1978) VI Arnold and A. Avez, ergodic problems of classical mechanics (Benjamin, New York, 1968), p. 20. For quantum-mechanical ergodic problems, see PJM Bongaarts and TH. J. Siskens, Physica (Utrecht) 71, 529 (1978). Physica 71:529","journal-title":"Physica"},{"issue":"6","key":"2982_CR3","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1016\/j.optlaseng.2013.01.001","volume":"51","author":"A Bakhshandeh","year":"2013","unstructured":"Bakhshandeh A, Eslami Z (2013) An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Opt Lasers Eng 51(6):665\u2013673","journal-title":"Opt Lasers Eng"},{"issue":"1\u20132","key":"2982_CR4","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/S0375-9601(98)00086-3","volume":"240","author":"M Baptista","year":"1998","unstructured":"Baptista M (1998) Cryptography with chaos. Phys Lett A 240(1\u20132):50\u201354","journal-title":"Phys Lett A"},{"issue":"4\u20135","key":"2982_CR5","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1016\/j.physleta.2007.01.081","volume":"366","author":"S Behnia","year":"2007","unstructured":"Behnia S, Akhshani A, Ahadpour S, Mahmodi H, Akhavan A (2007) A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Phys Lett A 366(4\u20135):391\u2013396","journal-title":"Phys Lett A"},{"key":"2982_CR6","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","volume":"128","author":"A Belazi","year":"2016","unstructured":"Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155\u2013170","journal-title":"Signal Process"},{"key":"2982_CR7","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/j.ins.2014.02.018","volume":"277","author":"G Bhatnagar","year":"2014","unstructured":"Bhatnagar G, Saha A, Wu QJ, Atrey PK (2014) Analysis and extension of multiresolution singular value decomposition. Inf Sci 277:247\u2013262","journal-title":"Inf Sci"},{"issue":"07","key":"2982_CR8","doi-asserted-by":"crossref","first-page":"1465","DOI":"10.1142\/S0218127499001024","volume":"9","author":"G Chen","year":"1999","unstructured":"Chen G, Ueta T (1999) Yet another chaotic attractor. Int J Bifurc Chaos 9(07):1465\u20131466","journal-title":"Int J Bifurc Chaos"},{"issue":"1\u20134","key":"2982_CR9","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1023\/A:1016592219341","volume":"29","author":"K Diethelm","year":"2002","unstructured":"Diethelm K, Ford NJ, Freed AD (2002) A predictor-corrector approach for the numerical solution of fractional differential equations. Nonlinear Dyn 29(1\u20134):3\u201322","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"2982_CR10","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/s11760-009-0144-1","volume":"5","author":"R Dosselmann","year":"2011","unstructured":"Dosselmann R, Yang XD (2011) A comprehensive assessment of the structural similarity index. Signal Image Video Process 5(1):81\u201391","journal-title":"Signal Image Video Process"},{"key":"2982_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01580-z","author":"M Dua","year":"2019","unstructured":"Dua M, Wesanekar A, Gupta V, Bhola M, Dua S (2019) Differential evolution optimization of intertwining logistic map-DNA based image encryption technique. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-019-01580-z","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"2","key":"2982_CR12","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.aeue.2012.07.004","volume":"67","author":"AAA El-Latif","year":"2013","unstructured":"El-Latif AAA, Niu X (2013) A hybrid chaotic system and cyclic elliptic curve for image encryption. AEU Int J Electron Commun 67(2):136\u2013143","journal-title":"AEU Int J Electron Commun"},{"key":"2982_CR13","doi-asserted-by":"crossref","unstructured":"Elkamchouchi H, Makar M (2005) Measuring encryption quality for bitmap images encrypted with rijndael and kamkar block ciphers. In: Proceedings of the twenty-second national radio science conference, 2005. NRSC 2005. pp 277\u2013284. IEEE","DOI":"10.1109\/NRSC.2005.194011"},{"issue":"12","key":"2982_CR14","doi-asserted-by":"crossref","first-page":"1910","DOI":"10.4236\/am.2012.312262","volume":"3","author":"M Fran\u00e7ois","year":"2012","unstructured":"Fran\u00e7ois M, Grosges T, Barchiesi D, Erra R (2012) Image encryption algorithm based on a chaotic iterative process. Appl Math 3(12):1910","journal-title":"Appl Math"},{"issue":"06","key":"2982_CR15","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8(06):1259\u20131284","journal-title":"Int J Bifurc Chaos"},{"issue":"2","key":"2982_CR16","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/j.chaos.2005.08.110","volume":"29","author":"H Gao","year":"2006","unstructured":"Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29(2):393\u2013399","journal-title":"Chaos Solitons Fractals"},{"issue":"1\u20133","key":"2982_CR17","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.physleta.2005.08.006","volume":"346","author":"Z-H Guan","year":"2005","unstructured":"Guan Z-H, Huang F, Guan W (2005) Chaos-based image encryption algorithm. Phys Lett A 346(1\u20133):153\u2013157","journal-title":"Phys Lett A"},{"key":"2982_CR18","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun C-M, Chen CP (2015) 2d sine logistic modulation map for image encryption. Inf Sci 297:80\u201394","journal-title":"Inf Sci"},{"key":"2982_CR19","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1016\/j.dsp.2013.11.004","volume":"25","author":"A Kassem","year":"2014","unstructured":"Kassem A, Hassan HAH, Harkouss Y, Assaf R (2014) Efficient neural chaotic generator for image encryption. Dig Signal Process 25:266\u2013274","journal-title":"Dig Signal Process"},{"key":"2982_CR20","doi-asserted-by":"crossref","unstructured":"Katz J, Lindell Y (2014) Introduction to modern cryptography. CRC Press","DOI":"10.1201\/b17668"},{"issue":"2","key":"2982_CR21","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1016\/j.chaos.2004.02.013","volume":"22","author":"C Li","year":"2004","unstructured":"Li C, Peng G (2004) Chaos in Chen\u2019s system with a fractional order. Chaos Solitons Fractals 22(2):443\u2013450","journal-title":"Chaos Solitons Fractals"},{"key":"2982_CR22","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.sigpro.2015.11.017","volume":"125","author":"X Li","year":"2016","unstructured":"Li X, Li C, Lee I-K (2016) Chaotic image encryption using pseudo-random masks and pixel mapping. Signal Process 125:48\u201363","journal-title":"Signal Process"},{"key":"2982_CR23","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"Y Li","year":"2017","unstructured":"Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238\u2013246","journal-title":"Opt Lasers Eng"},{"issue":"16\u201317","key":"2982_CR24","doi-asserted-by":"crossref","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","volume":"284","author":"H Liu","year":"2011","unstructured":"Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Optics Commun 284(16\u201317):3895\u20133903","journal-title":"Optics Commun"},{"issue":"5","key":"2982_CR25","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu H, Wang X et al (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457\u20131466","journal-title":"Appl Soft Comput"},{"issue":"16","key":"2982_CR26","doi-asserted-by":"crossref","first-page":"12626","DOI":"10.1016\/j.eswa.2012.05.020","volume":"39","author":"J Machicao","year":"2012","unstructured":"Machicao J, Marco AG, Bruno OM (2012) Chaotic encryption method based on life-like cellular automata. Expert Syst Appl 39(16):12626\u201312635","journal-title":"Expert Syst Appl"},{"key":"2982_CR27","doi-asserted-by":"crossref","unstructured":"May RM (2004) Simple mathematical models with very complicated dynamics. In: The theory of chaotic attractors. Springer, pp 85\u201393","DOI":"10.1007\/978-0-387-21830-4_7"},{"issue":"3","key":"2982_CR28","doi-asserted-by":"crossref","first-page":"1745","DOI":"10.1016\/j.chaos.2009.03.084","volume":"42","author":"S Mazloom","year":"2009","unstructured":"Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. Chaos Solitons Fractals 42(3):1745\u20131754","journal-title":"Chaos Solitons Fractals"},{"key":"2982_CR29","unstructured":"Merkle R (1979) Secrecy, authentication, and public key systems. Ph. D. Thesis, Stanford University"},{"key":"2982_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6827-2","author":"F Musanna","year":"2018","unstructured":"Musanna F, Kumar S (2018) A novel fractional order chaos-based image encryption using fisher yates algorithm and 3-d cat map. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-018-6827-2","journal-title":"Multimed Tools Appl"},{"key":"2982_CR32","first-page":"102560","volume":"54","author":"F Musanna","year":"2020","unstructured":"Musanna F, Kumar S (2020) A novel image encryption algorithm using chaotic compressive sensing and nonlinear exponential function. J Inf Secur Appl 54:102560","journal-title":"J Inf Secur Appl"},{"key":"2982_CR30","doi-asserted-by":"publisher","unstructured":"Musanna F, Dangwal D, Kumar S, Malik V (2020) A chaos-based image encryption algorithm based on multiresolution singular value decomposition and a symmetric attractor. Imaging Sci J. https:\/\/doi.org\/10.1080\/13682199.2020.1732116","DOI":"10.1080\/13682199.2020.1732116"},{"issue":"11","key":"2982_CR33","doi-asserted-by":"crossref","first-page":"13681","DOI":"10.1007\/s11042-016-3769-4","volume":"76","author":"B Norouzi","year":"2017","unstructured":"Norouzi B, Mirzakuchaki S (2017) An image encryption algorithm based on DNA sequence operations and cellular neural network. Multimed Tools Appl 76(11):13681\u201313701","journal-title":"Multimed Tools Appl"},{"key":"2982_CR34","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak C, Huang L (2017) A new color image encryption using combination of the 1d chaotic map. Signal Process 138:129\u2013137","journal-title":"Signal Process"},{"issue":"7","key":"2982_CR35","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1016\/j.cnsns.2004.03.006","volume":"10","author":"N Pareek","year":"2005","unstructured":"Pareek N, Patidar V, Sud K (2005) Cryptography using multiple one-dimensional chaotic maps. Commun Nonlinear Sci Numer Simul 10(7):715\u2013723","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"9","key":"2982_CR36","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926\u2013934","journal-title":"Image Vis Comput"},{"issue":"3","key":"2982_CR37","doi-asserted-by":"crossref","first-page":"894","DOI":"10.1016\/j.dsp.2013.01.005","volume":"23","author":"NK Pareek","year":"2013","unstructured":"Pareek NK, Patidar V, Sud KK (2013) Diffusion-substitution based gray image encryption scheme. Dig Signal Process 23(3):894\u2013901","journal-title":"Dig Signal Process"},{"issue":"1","key":"2982_CR38","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.chaos.2007.07.083","volume":"40","author":"R Rhouma","year":"2009","unstructured":"Rhouma R, Meherzi S, Belghith S (2009) Ocml-based colour image encryption. Chaos Solitons Fractals 40(1):309\u2013318","journal-title":"Chaos Solitons Fractals"},{"key":"2982_CR39","doi-asserted-by":"crossref","unstructured":"Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report, Booz-Allen and Hamilton Inc Mclean Va","DOI":"10.6028\/NIST.SP.800-22"},{"issue":"12","key":"2982_CR40","doi-asserted-by":"crossref","first-page":"4733","DOI":"10.1007\/s12652-018-0850-z","volume":"10","author":"AM Shaheen","year":"2019","unstructured":"Shaheen AM, Sheltami TR, Al-Kharoubi TM, Shakshuki E (2019) Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT. J Ambient Intell Humaniz Comput 10(12):4733\u20134750","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"3","key":"2982_CR41","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379\u2013423","journal-title":"Bell Syst Tech J"},{"issue":"6","key":"2982_CR42","doi-asserted-by":"crossref","first-page":"2277","DOI":"10.1007\/s12652-018-0825-0","volume":"10","author":"S Suri","year":"2019","unstructured":"Suri S, Vijay R (2019) A synchronous intertwining logistic map-DNA approach for color image encryption. J Ambient Intell Humaniz Comput 10(6):2277\u20132290","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"6","key":"2982_CR43","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1016\/j.imavis.2007.09.005","volume":"26","author":"X Tong","year":"2008","unstructured":"Tong X, Cui M (2008) Image encryption with compound chaotic sequence cipher shifting dynamically. Image Vis Comput 26(6):843\u2013850","journal-title":"Image Vis Comput"},{"issue":"2","key":"2982_CR44","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1016\/j.camwa.2009.12.033","volume":"60","author":"M Usama","year":"2010","unstructured":"Usama M, Khan MK, Alghathbar K, Lee C (2010) Chaos-based secure satellite imagery cryptosystem. Comput Math Appl 60(2):326\u2013337","journal-title":"Comput Math Appl"},{"issue":"4","key":"2982_CR49","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP et al (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"2982_CR47","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1007\/s11071-010-9749-8","volume":"62","author":"X-Y Wang","year":"2010","unstructured":"Wang X-Y, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62(3):615\u2013621","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"2982_CR48","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","volume":"11","author":"Y Wang","year":"2011","unstructured":"Wang Y, Wong K-W, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514\u2013522","journal-title":"Appl Soft Comput"},{"key":"2982_CR46","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10\u201318","journal-title":"Opt Lasers Eng"},{"key":"2982_CR45","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.ins.2019.02.049","volume":"486","author":"X Wang","year":"2019","unstructured":"Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340\u2013358","journal-title":"Inf Sci"},{"issue":"3","key":"2982_CR50","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/0167-2789(85)90011-9","volume":"16","author":"A Wolf","year":"1985","unstructured":"Wolf A, Swift JB, Swinney HL, Vastano JA (1985) Determining Lyapunov exponents from a time series. Phys D Nonlinear Phenom 16(3):285\u2013317","journal-title":"Phys D Nonlinear Phenom"},{"issue":"2","key":"2982_CR51","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S et al (2011) NPCR and UACI randomness tests for image encryption. Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun JSAT 1(2):31\u201338","journal-title":"Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun JSAT"},{"issue":"1\u20134","key":"2982_CR52","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.physleta.2005.02.083","volume":"349","author":"T Xiang","year":"2006","unstructured":"Xiang T, Liao X, Tang G, Chen Y, Wong K-W (2006) A novel block cryptosystem based on iterating a chaotic map. Phys Lett A 349(1\u20134):109\u2013115","journal-title":"Phys Lett A"},{"issue":"11","key":"2982_CR53","doi-asserted-by":"crossref","first-page":"3507","DOI":"10.1016\/j.cnsns.2010.01.004","volume":"15","author":"H Yang","year":"2010","unstructured":"Yang H, Wong K-W, Liao X, Zhang W, Wei P (2010) A fast image encryption and authentication scheme based on chaotic maps. Commun Nonlinear Sci Numer Simul 15(11):3507\u20133517","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"2982_CR54","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.optlaseng.2017.04.009","volume":"96","author":"R Zahmoul","year":"2017","unstructured":"Zahmoul R, Ejbali R, Zaied M (2017) Image encryption based on new beta chaotic maps. Opt Lasers Eng 96:39\u201349","journal-title":"Opt Lasers Eng"},{"issue":"11\u201312","key":"2982_CR55","doi-asserted-by":"crossref","first-page":"2028","DOI":"10.1016\/j.mcm.2010.06.005","volume":"52","author":"Q Zhang","year":"2010","unstructured":"Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52(11\u201312):2028\u20132035","journal-title":"Math Comput Model"},{"key":"2982_CR56","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"Y-Q Zhang","year":"2014","unstructured":"Zhang Y-Q, Wang X-Y (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf Sci 273:329\u2013351","journal-title":"Inf Sci"},{"key":"2982_CR57","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.asoc.2014.09.039","volume":"26","author":"Y-Q Zhang","year":"2015","unstructured":"Zhang Y-Q, Wang X-Y (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10\u201320","journal-title":"Appl Soft Comput"},{"issue":"5","key":"2982_CR58","doi-asserted-by":"crossref","first-page":"050506","DOI":"10.1088\/1674-1056\/21\/5\/050506","volume":"21","author":"W Zhen","year":"2012","unstructured":"Zhen W, Xia H, Ning L, Xiao-Na S (2012) Image encryption based on a delayed fractional-order chaotic logistic system. Chin Phys B 21(5):050506","journal-title":"Chin Phys B"},{"issue":"1","key":"2982_CR59","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","volume":"285","author":"C Zhu","year":"2012","unstructured":"Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29\u201337","journal-title":"Opt Commun"},{"issue":"6","key":"2982_CR60","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"Z-L Zhu","year":"2011","unstructured":"Zhu Z-L, Zhang W, Wong K-W, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171\u20131186","journal-title":"Inf Sci"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-02982-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-021-02982-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-02982-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T12:02:00Z","timestamp":1648209720000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-021-02982-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,6]]},"references-count":60,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["2982"],"URL":"https:\/\/doi.org\/10.1007\/s12652-021-02982-8","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,6]]},"assertion":[{"value":"24 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}