{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T08:31:44Z","timestamp":1772008304450,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T00:00:00Z","timestamp":1758758400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T00:00:00Z","timestamp":1758758400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s13198-025-02976-1","type":"journal-article","created":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T06:59:23Z","timestamp":1758783563000},"page":"460-477","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A novel sine of logistic and tangent chaotic map and dna encoding based image encryption scheme"],"prefix":"10.1007","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7071-8323","authenticated-orcid":false,"given":"Mohit","family":"Dua","sequence":"first","affiliation":[]},{"given":"Rahul","family":"Bhogal","sequence":"additional","affiliation":[]},{"given":"Shelza","family":"Dua","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,25]]},"reference":[{"issue":"5","key":"2976_CR1","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.3390\/sym15051081","volume":"15","author":"W Alexan","year":"2023","unstructured":"Alexan W, Chen YL, Por LY, Gabr M (2023) Hyperchaotic maps and the single neuron model: a novel framework for chaos-based image encryption. Symmetry 15(5):1081","journal-title":"Symmetry"},{"issue":"3","key":"2976_CR2","doi-asserted-by":"publisher","first-page":"e7911","DOI":"10.1002\/cpe.7911","volume":"36","author":"H Bhatt","year":"2024","unstructured":"Bhatt H, Jadav NK, Kumari A, Gupta R, Tanwar S, Polkowski Z, Tolba A, Hassanein AS (2024) Artificial neural network-driven federated learning for heart stroke prediction in healthcare 4.0 underlying 5G. Concurrency Comput Pract Exp 36(3):e7911","journal-title":"Concurrency Comput Pract Exp"},{"key":"2976_CR3","doi-asserted-by":"publisher","first-page":"15561","DOI":"10.1007\/s11042-016-3858-4","volume":"76","author":"X Chai","year":"2017","unstructured":"Chai X, Gan Z, Zhang M (2017) A fast chaos-based image encryption scheme with a novel plain image-related swapping block permutation and block diffusion. Multimedia Tools Appl 76:15561\u201315585","journal-title":"Multimedia Tools Appl"},{"key":"2976_CR4","doi-asserted-by":"publisher","unstructured":"Chaturvedi P, Manekar S, Kumari A, Bishnoi D (2024) Disease identification and classification from pearl millet leaf images using machine learning techniques. In: Methodologies, frameworks, and applications of machine learning. IGI Global Scientific Publishing, pp 232\u2013243. https:\/\/doi.org\/10.4018\/979-8-3693-1062-5.ch013","DOI":"10.4018\/979-8-3693-1062-5.ch013"},{"key":"2976_CR5","doi-asserted-by":"publisher","first-page":"167286","DOI":"10.1016\/j.ijleo.2021.167286","volume":"243","author":"Q Cun","year":"2021","unstructured":"Cun Q, Tong X, Wang Z, Zhang M (2021) Selective image encryption method based on dynamic DNA coding and new chaotic map. Optik 243:167286","journal-title":"Optik"},{"issue":"12","key":"2976_CR6","doi-asserted-by":"publisher","first-page":"6589","DOI":"10.1007\/s00371-022-02750-5","volume":"39","author":"Q Cun","year":"2023","unstructured":"Cun Q, Tong X, Wang Z, Zhang M (2023) A new chaotic image encryption algorithm based on dynamic DNA coding and RNA computing. Vis Comput 39(12):6589\u20136608","journal-title":"Vis Comput"},{"issue":"1","key":"2976_CR7","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s11517-023-02925-9","volume":"62","author":"D Dhingra","year":"2024","unstructured":"Dhingra D, Dua M (2024) Medical video encryption using novel 2D cosine-sine map and dynamic DNA coding. Med Biol Eng Comput 62(1):237\u2013255","journal-title":"Med Biol Eng Comput"},{"issue":"3","key":"2976_CR8","doi-asserted-by":"publisher","first-page":"173804","DOI":"10.1007\/s11704-022-1419-8","volume":"17","author":"X Huang","year":"2023","unstructured":"Huang X, Dong Y, Ye G, Shi Y (2023) Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform. Front Comput Sci 17(3):173804","journal-title":"Front Comput Sci"},{"key":"2976_CR9","doi-asserted-by":"publisher","first-page":"117861","DOI":"10.1016\/j.eswa.2022.117861","volume":"206","author":"B Jasra","year":"2022","unstructured":"Jasra B, Moon AH (2022) Color image encryption and authentication using dynamic DNA encoding and hyper chaotic system. Expert Syst Appl 206:117861","journal-title":"Expert Syst Appl"},{"key":"2976_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-443-23814-7.00001-8","author":"D Jigyasu","year":"2024","unstructured":"Jigyasu D, Kumar S, Vats S (2024) Introduction to artificial intelligence-empowered electric vehicles in smart grids. Artif Intell Empower Mod Electr Vehic Smart Grid Syst. https:\/\/doi.org\/10.1016\/B978-0-443-23814-7.00001-8","journal-title":"Artif Intell Empower Mod Electr Vehic Smart Grid Syst"},{"issue":"12","key":"2976_CR11","doi-asserted-by":"publisher","first-page":"18381","DOI":"10.1007\/s11042-022-13902-z","volume":"82","author":"A Kumar","year":"2023","unstructured":"Kumar A, Dua M (2023) A GRU and chaos-based novel image encryption approach for transport images. Multimedia Tools Appl 82(12):18381\u201318408","journal-title":"Multimedia Tools Appl"},{"issue":"3","key":"2976_CR12","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s00530-024-01334-8","volume":"30","author":"A Kumar","year":"2024","unstructured":"Kumar A, Dua M (2024) A novel exponent\u2013sine\u2013cosine chaos map-based multiple-image encryption technique. Multimedia Syst 30(3):141","journal-title":"Multimedia Syst"},{"issue":"1","key":"2976_CR13","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1186\/s44147-024-00376-z","volume":"71","author":"S Kumari","year":"2024","unstructured":"Kumari S, Dua M, Dua S, Dhingra D (2024) A novel cosine-cosine chaotic map-based video encryption scheme. J Eng Appl Sci 71(1):36","journal-title":"J Eng Appl Sci"},{"issue":"2","key":"2976_CR14","doi-asserted-by":"publisher","first-page":"5351","DOI":"10.1007\/s11042-023-15550-3","volume":"83","author":"Q Li","year":"2024","unstructured":"Li Q, Chen L (2024) An image encryption algorithm based on 6-dimensional hyper chaotic system and DNA encoding. Multimedia Tools Appl 83(2):5351\u20135368","journal-title":"Multimedia Tools Appl"},{"issue":"1","key":"2976_CR15","doi-asserted-by":"publisher","first-page":"20733","DOI":"10.1038\/s41598-024-71267-9","volume":"14","author":"R Li","year":"2024","unstructured":"Li R, Liu T, Yin J (2024) An encryption algorithm for color images based on an improved dual-chaotic system combined with DNA encoding. Sci Rep 14(1):20733","journal-title":"Sci Rep"},{"issue":"5","key":"2976_CR16","doi-asserted-by":"publisher","first-page":"5094","DOI":"10.1109\/TIE.2023.3281687","volume":"71","author":"X Liu","year":"2023","unstructured":"Liu X, Mou J, Zhang Y, Cao Y (2023) A new hyperchaotic map based on discrete memristor and meminductor: dynamics analysis, encryption application, and DSP implementation. IEEE Trans Ind Electron 71(5):5094\u20135104","journal-title":"IEEE Trans Ind Electron"},{"key":"2976_CR17","doi-asserted-by":"publisher","first-page":"121090","DOI":"10.1016\/j.eswa.2023.121090","volume":"235","author":"H Liu","year":"2024","unstructured":"Liu H, Teng L, Zhang Y, Si R, Liu P (2024) Mutil-medical image encryption by a new spatiotemporal chaos model and DNA new computing for information security. Expert Syst Appl 235:121090","journal-title":"Expert Syst Appl"},{"issue":"2","key":"2976_CR18","doi-asserted-by":"publisher","first-page":"2164","DOI":"10.1007\/s11227-023-05539-y","volume":"80","author":"P Mathivanan","year":"2024","unstructured":"Mathivanan P, Maran P (2024) Color image encryption based on novel kolam scrambling and modified 2D logistic cascade map (2D LCM). J Supercomput 80(2):2164\u20132195","journal-title":"J Supercomput"},{"issue":"2","key":"2976_CR19","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1007\/s10586-022-03653-9","volume":"26","author":"P Pavithran","year":"2023","unstructured":"Pavithran P, Mathew S, Namasudra S, Singh A (2023) Enhancing randomness of the ciphertext generated by DNA-based cryptosystem and finite state machine. Cluster Comput 26(2):1035\u20131051","journal-title":"Cluster Comput"},{"key":"2976_CR20","doi-asserted-by":"publisher","first-page":"116246","DOI":"10.1016\/j.image.2021.116246","volume":"95","author":"X Wang","year":"2021","unstructured":"Wang X, Su Y (2021) Image encryption based on compressed sensing and DNA encoding. Signal Process Image Commun 95:116246","journal-title":"Signal Process Image Commun"},{"key":"2976_CR21","doi-asserted-by":"publisher","first-page":"105851","DOI":"10.1016\/j.optlaseng.2019.105851","volume":"125","author":"X Wang","year":"2020","unstructured":"Wang X, Wang Y, Zhu X, Luo C (2020) A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level. Opt Lasers Eng 125:105851","journal-title":"Opt Lasers Eng"},{"key":"2976_CR22","doi-asserted-by":"publisher","first-page":"106837","DOI":"10.1016\/j.optlastec.2020.106837","volume":"138","author":"X Wang","year":"2021","unstructured":"Wang X, Chen S, Zhang Y (2021a) A chaotic image encryption algorithm based on random dynamic mixing. Opt Laser Technol 138:106837","journal-title":"Opt Laser Technol"},{"key":"2976_CR23","first-page":"102699","volume":"58","author":"R Wang","year":"2021","unstructured":"Wang R, Deng GQ, Duan XF (2021b) An image encryption scheme based on double chaotic cyclic shift and Josephus problem. J Inf Secur Appl 58:102699","journal-title":"J Inf Secur Appl"},{"key":"2976_CR24","doi-asserted-by":"publisher","first-page":"102138","DOI":"10.1016\/j.vlsi.2024.102138","volume":"96","author":"C Wang","year":"2024","unstructured":"Wang C, Chong Z, Zhang H, Ma P, Dong W (2024) Color image encryption based on discrete memristor logistic map and DNA encoding. Integration 96:102138","journal-title":"Integration"},{"issue":"8","key":"2976_CR25","doi-asserted-by":"publisher","first-page":"101660","DOI":"10.1016\/j.jksuci.2023.101660","volume":"35","author":"H Wen","year":"2023","unstructured":"Wen H, Huang Y, Lin Y (2023) High-quality color image compression-encryption using chaos and block permutation. J King Saud Univ Comput Inf Sci 35(8):101660","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"2","key":"2976_CR26","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1109\/TII.2022.3194590","volume":"19","author":"Y Wu","year":"2022","unstructured":"Wu Y, Zhang L, Berretti S, Wan S (2022) Medical image encryption by content-aware DNA computing for secure healthcare. IEEE Trans Ind Inform 19(2):2089\u20132098","journal-title":"IEEE Trans Ind Inform"},{"key":"2976_CR27","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.optlaseng.2016.10.012","volume":"91","author":"L Xu","year":"2017","unstructured":"Xu L, Gou X, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt Lasers Eng 91:41\u201352","journal-title":"Opt Lasers Eng"},{"issue":"3","key":"2976_CR28","doi-asserted-by":"publisher","first-page":"035212","DOI":"10.1088\/1402-4896\/ad224b","volume":"99","author":"S Yan","year":"2024","unstructured":"Yan S, Wang J, Li L (2024) A color image encryption scheme based on cellular neural networks and linear feedback shift registers. Phys Scr 99(3):035212","journal-title":"Phys Scr"},{"key":"2976_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-023-03219-9","author":"J Yu","year":"2024","unstructured":"Yu J, Peng K, Zhang L, Xie W (2024) Image encryption algorithm based on DNA network and hyperchaotic system. Vis Comput. https:\/\/doi.org\/10.1007\/s00371-023-03219-9","journal-title":"Vis Comput"},{"key":"2976_CR30","doi-asserted-by":"publisher","first-page":"107073","DOI":"10.1016\/j.optlastec.2021.107073","volume":"141","author":"X Zhang","year":"2021","unstructured":"Zhang X, Hu Y (2021) Multiple-image encryption algorithm based on the 3D scrambling model and dynamic DNA coding. Opt Laser Technol 141:107073","journal-title":"Opt Laser Technol"},{"issue":"1","key":"2976_CR31","first-page":"43","volume":"26","author":"J Zhu","year":"2024","unstructured":"Zhu J, Jian\u2019E Z (2024) A novel four-dimensional hyperchaotic system and DNA encoding method for image encryption. Int J Netw Secur 26(1):43\u201350","journal-title":"Int J Netw Secur"},{"key":"2976_CR32","doi-asserted-by":"publisher","first-page":"147106","DOI":"10.1109\/ACCESS.2019.2946208","volume":"7","author":"S Zhu","year":"2019","unstructured":"Zhu S, Zhu C (2019) Plaintext-related image encryption algorithm based on block structure and five-dimensional chaotic map. IEEE Access 7:147106\u2013147118","journal-title":"IEEE Access"},{"issue":"7","key":"2976_CR33","doi-asserted-by":"publisher","first-page":"772","DOI":"10.3390\/e22070772","volume":"22","author":"S Zhu","year":"2020","unstructured":"Zhu S, Zhu C (2020) Secure image encryption algorithm based on hyperchaos and dynamic DNA coding. Entropy 22(7):772","journal-title":"Entropy"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-025-02976-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-025-02976-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-025-02976-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T07:54:23Z","timestamp":1772006063000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-025-02976-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,25]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["2976"],"URL":"https:\/\/doi.org\/10.1007\/s13198-025-02976-1","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,25]]},"assertion":[{"value":"12 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All the authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The data of this research do not involve any moral or ethical issues.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"All the authors are informed and approve the submission of this manuscript.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}