{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T20:06:07Z","timestamp":1774469167925,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T00:00:00Z","timestamp":1660608000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T00:00:00Z","timestamp":1660608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["61802111"],"award-info":[{"award-number":["61802111"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["61872125"],"award-info":[{"award-number":["61872125"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["62171114"],"award-info":[{"award-number":["62171114"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Key Science and Technology Project of Henan Province","award":["201300210400"],"award-info":[{"award-number":["201300210400"]}]},{"name":"the Key Science and Technology Project of Henan Province","award":["212102210094"],"award-info":[{"award-number":["212102210094"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,2]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Encryption of meaningful images into unidentifiable noise-like images can improve the security of images during storage and transmission. In this paper, a novel color image encryption method based on the lifting scheme and cross-component permutation (CIE-LSCP) is introduced. First, original image is divided into red, green and blue components, and then the three components are processed by a preprocessing strategy based on the lifting scheme (PSLS) to change the statistical distribution of the pixels. Second, a block-based cross-component permutation based on index vectors (BCPIV) is presented to divide three preprocessed components into blocks and perform the cross-component permutation operation on them, and three random matrices are utilized to determine the target component, target block and target pixel position of the current pixel to be moved, respectively. Subsequently, a multi stochastic diffusion based on random sequences (MSDRS) is developed to alter the pixel values of the permutated components, and finally a ciphertext image is gotten by merging the three components. Moreover, the SHA256 hash values of the plaintext image are used to obtain the initial parameters of the chaotic system, and the obtained chaotic sequences are applied in the image encryption process. Wherein the generated random sequences are highly reliant on the plaintext image, making the encryption scheme resistant to both known-plaintext attacks and chosen-plaintext attacks. Experimental results demonstrate that the proposed scheme has good security and effectiveness and can be applied for secure transmission of digital images over the Internet.<\/jats:p>","DOI":"10.1007\/s40747-022-00835-1","type":"journal-article","created":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T03:26:08Z","timestamp":1660620368000},"page":"927-950","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["CIE-LSCP: color image encryption scheme based on the lifting scheme and cross-component permutation"],"prefix":"10.1007","volume":"9","author":[{"given":"Xiuhui","family":"Chen","sequence":"first","affiliation":[]},{"given":"Mengxin","family":"Gong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1138-1887","authenticated-orcid":false,"given":"Zhihua","family":"Gan","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Xiuli","family":"Chai","sequence":"additional","affiliation":[]},{"given":"Xin","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,16]]},"reference":[{"issue":"10","key":"835_CR1","doi-asserted-by":"publisher","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","volume":"59","author":"H Liu","year":"2010","unstructured":"Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320\u20133327. https:\/\/doi.org\/10.1016\/j.camwa.2010.03.017","journal-title":"Comput Math Appl"},{"issue":"16\u201317","key":"835_CR2","doi-asserted-by":"publisher","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","volume":"284","author":"H Liu","year":"2011","unstructured":"Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16\u201317):3895\u20133903. https:\/\/doi.org\/10.1016\/j.optcom.2011.04.001","journal-title":"Opt Commun"},{"key":"835_CR3","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","volume":"142","author":"J Chen","year":"2018","unstructured":"Chen J, Zhu Z, Zhang L, Zhang Y, Yang B (2018) Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption. Signal Process 142:340\u2013353. https:\/\/doi.org\/10.1016\/j.sigpro.2017.07.034","journal-title":"Signal Process"},{"key":"835_CR4","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ins.2019.08.041","volume":"507","author":"X Wang","year":"2020","unstructured":"Wang X, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16\u201336. https:\/\/doi.org\/10.1016\/j.ins.2019.08.041","journal-title":"Inf Sci"},{"key":"835_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-022-07328-3","author":"X Chai","year":"2022","unstructured":"Chai X, Fu J, Gan Z, Lu Y, Zhang Y (2022) An image encryption scheme based on multi-objective optimization and block compressed sensing. Nonlinear Dyn. https:\/\/doi.org\/10.1007\/s11071-022-07328-3","journal-title":"Nonlinear Dyn"},{"key":"835_CR6","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.ins.2020.10.007","volume":"556","author":"X Chai","year":"2021","unstructured":"Chai X, Wu H, Gan Z, Han D, Zhang Y, Chen Y (2021) An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing. Inf Sci 556:305\u2013340. https:\/\/doi.org\/10.1016\/j.ins.2020.10.007","journal-title":"Inf Sci"},{"issue":"6","key":"835_CR7","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(6):1259\u20131284","journal-title":"Int J Bifurcation Chaos"},{"issue":"4","key":"835_CR8","first-page":"1148","volume":"41","author":"S Li","year":"2021","unstructured":"Li S, Zhao L, Zhang H (2021) Image grey level encryption based on cat map. J Comput Appl 41(4):1148\u20131152","journal-title":"J Comput Appl"},{"issue":"11","key":"835_CR9","first-page":"1129","volume":"14","author":"J Zhang","year":"2019","unstructured":"Zhang J, Chen N, Li Y (2019) Image encryption algorithm based on chaotic map and dynamic s-box. J China Acad Electron Inf Technol 14(11):1129\u20131135","journal-title":"J China Acad Electron Inf Technol"},{"key":"835_CR10","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.ins.2019.02.049","volume":"486","author":"X Wang","year":"2019","unstructured":"Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340\u2013358. https:\/\/doi.org\/10.1016\/j.ins.2019.02.049","journal-title":"Inf Sci"},{"issue":"2","key":"835_CR11","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1007\/s11071-018-4600-8","volume":"95","author":"SF Raza","year":"2019","unstructured":"Raza SF, Satpute V (2019) A novel bit permutation-based image encryption algorithm. Nonlinear Dyn 95(2):859\u2013873. https:\/\/doi.org\/10.1007\/s11071-018-4600-8","journal-title":"Nonlinear Dyn"},{"key":"835_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2020.07.051","volume":"544","author":"M Wang","year":"2021","unstructured":"Wang M, Wang X, Zhao T, Zhang C, Xia Z, Yao N (2021) Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme. Inf Sci 544:1\u201324. https:\/\/doi.org\/10.1016\/j.ins.2020.07.051","journal-title":"Inf Sci"},{"issue":"1","key":"835_CR13","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/s11071-016-3049-x","volume":"87","author":"W Wen","year":"2017","unstructured":"Wen W, Zhang Y, Su M, Zhang R, Chen J, Li M (2017) Differential attack on a hyper-chaos-based image cryptosystem with a classic bi-modular architecture. Nonlinear Dyn 87(1):383\u2013390. https:\/\/doi.org\/10.1007\/s11071-016-3049-x","journal-title":"Nonlinear Dyn"},{"key":"835_CR14","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"X Wang","year":"2015","unstructured":"Wang X, Zhang Y, Bao X (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53\u201361. https:\/\/doi.org\/10.1016\/j.optlaseng.2015.03.022","journal-title":"Opt Lasers Eng"},{"key":"835_CR15","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10\u201318. https:\/\/doi.org\/10.1016\/j.optlaseng.2014.08.005","journal-title":"Opt Lasers Eng"},{"key":"835_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13721-021-00324-4","volume":"10","author":"S Pankaj","year":"2021","unstructured":"Pankaj S, Dua M (2021) A novel ToCC map and two-level scrambling-based medical image encryption technique. Netw Model Anal Heal Inform Bioinform 10:1\u201319. https:\/\/doi.org\/10.1007\/s13721-021-00324-4","journal-title":"Netw Model Anal Heal Inform Bioinform"},{"key":"835_CR17","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.sigpro.2018.02.028","volume":"148","author":"X Wu","year":"2018","unstructured":"Wu X, Wang K, Wang X, Kan H, Kurths J (2018) Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process 148:272\u2013287. https:\/\/doi.org\/10.1016\/j.sigpro.2018.02.028","journal-title":"Signal Process"},{"issue":"2","key":"835_CR18","doi-asserted-by":"publisher","first-page":"2105","DOI":"10.1007\/s11042-018-6346-1","volume":"78","author":"A Rehman","year":"2019","unstructured":"Rehman A, Liao X (2019) A novel robust dual diffusion\/confusion encryption technique for color image based on Chaos, DNA and SHA-2. Multimed Tools Appl 78(2):2105\u20132133. https:\/\/doi.org\/10.1007\/s11042-018-6346-1","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"835_CR19","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/s40747-020-00201-z","volume":"7","author":"M Dua","year":"2021","unstructured":"Dua M, Suthar A, Garg A, Garg V (2021) An ILM-cosine transform-based improved approach to image encryption. Complex Intell Syst 7(1):327\u2013343. https:\/\/doi.org\/10.1007\/s40747-020-00201-z","journal-title":"Complex Intell Syst"},{"key":"835_CR20","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.ins.2020.06.030","volume":"539","author":"X Wang","year":"2020","unstructured":"Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf Sci 539:195\u2013214. https:\/\/doi.org\/10.1016\/j.ins.2020.06.030","journal-title":"Inf Sci"},{"key":"835_CR21","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1016\/j.ins.2020.09.055","volume":"547","author":"Y Xian","year":"2021","unstructured":"Xian Y, Wang X (2021) Fractal sorting matrix and its application on chaotic image encryption. Inf Sci 547:1154\u20131169. https:\/\/doi.org\/10.1016\/j.ins.2020.09.055","journal-title":"Inf Sci"},{"key":"835_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3108767","author":"Y Xian","year":"2021","unstructured":"Xian Y, Wang X, Teng L (2021) Double parameters fractal sorting matrix and its application in image encryption. IEEE T Circ Syst Vid. https:\/\/doi.org\/10.1109\/TCSVT.2021.3108767","journal-title":"IEEE T Circ Syst Vid"},{"issue":"5","key":"835_CR23","doi-asserted-by":"publisher","first-page":"2751","DOI":"10.1007\/s40747-021-00460-4","volume":"7","author":"M Khan","year":"2021","unstructured":"Khan M, Alanazi AS, Khan LS, Hussain I (2021) An efficient image encryption scheme based on fractal Tromino and Chebyshev polynomial. Complex Intell Syst 7(5):2751\u20132764. https:\/\/doi.org\/10.1007\/s40747-021-00460-4","journal-title":"Complex Intell Syst"},{"key":"835_CR24","doi-asserted-by":"publisher","first-page":"106437","DOI":"10.1016\/j.optlastec.2020.106437","volume":"131","author":"J Zhou","year":"2020","unstructured":"Zhou J, Zhou N, Gong L (2020) Fast color image encryption scheme based on 3D orthogonal Latin squares and matching matrix. Opt Laser Technol 131:106437. https:\/\/doi.org\/10.1016\/j.optlastec.2020.106437","journal-title":"Opt Laser Technol"},{"key":"835_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10847-7","author":"K Ma","year":"2021","unstructured":"Ma K, Teng L, Wang X, Meng J (2021) Color image encryption scheme based on the combination of the fisher-yates scrambling algorithm and chaos theory. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-021-10847-7","journal-title":"Multimed Tools Appl"},{"key":"835_CR26","doi-asserted-by":"publisher","first-page":"27785","DOI":"10.1007\/s11042-021-10970-5","volume":"80","author":"A Kumar","year":"2021","unstructured":"Kumar A, Dua M (2021) Novel pseudo random key & cosine transformed chaotic maps based satellite image encryption. Multimed Tools Appl 80:27785\u201327805. https:\/\/doi.org\/10.1007\/s11042-021-10970-5","journal-title":"Multimed Tools Appl"},{"key":"835_CR27","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129\u2013137. https:\/\/doi.org\/10.1016\/j.sigpro.2017.03.011","journal-title":"Signal Process"},{"key":"835_CR28","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.ins.2021.02.022","volume":"563","author":"A Mansouri","year":"2021","unstructured":"Mansouri A, Wang X (2021) A novel one-dimensional chaotic map generator and its application in a new index representation-based image encryption scheme. Inf Sci 563:91\u2013110. https:\/\/doi.org\/10.1016\/j.ins.2021.02.022","journal-title":"Inf Sci"},{"issue":"7","key":"835_CR29","doi-asserted-by":"publisher","first-page":"1757","DOI":"10.1007\/s00371-020-01936-z","volume":"37","author":"MZ Talhaoui","year":"2021","unstructured":"Talhaoui MZ, Wang X, Talhaoui A (2021) A new one-dimensional chaotic map and its application in a novel permutation-less image encryption scheme. Visual Comput 37(7):1757\u20131768. https:\/\/doi.org\/10.1007\/s00371-020-01936-z","journal-title":"Visual Comput"},{"key":"835_CR30","doi-asserted-by":"publisher","first-page":"123869","DOI":"10.1016\/j.physa.2019.123869","volume":"547","author":"AA Abd El-latif","year":"2020","unstructured":"Abd El-latif AA, Abd-El-Atty B, Venegas-Andraca SE (2020) Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption. Physica A 547:123869. https:\/\/doi.org\/10.1016\/j.physa.2019.123869","journal-title":"Physica A"},{"key":"835_CR31","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1016\/j.ijleo.2018.01.064","volume":"159","author":"AU Rehman","year":"2018","unstructured":"Rehman AU, Liao X, Ashraf R, Ullah S, Wang H (2018) A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2. Optik 159:348\u2013367. https:\/\/doi.org\/10.1016\/j.ijleo.2018.01.064","journal-title":"Optik"},{"key":"835_CR32","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TCSI.2021.3133318","volume":"69","author":"X Wang","year":"2021","unstructured":"Wang X, Liu P (2021) A new full chaos coupled mapping lattice and its application in privacy image encryption. IEEE T Circuits-I 69:3. https:\/\/doi.org\/10.1109\/TCSI.2021.3133318","journal-title":"IEEE T Circuits-I"},{"key":"835_CR33","doi-asserted-by":"publisher","first-page":"106031","DOI":"10.1016\/j.optlaseng.2020.106031","volume":"129","author":"F Yang","year":"2020","unstructured":"Yang F, Mou J, Ma C, Cao Y (2020) Dynamic analysis of an improper fractional-order laser chaotic system and its image encryption application. Opt Lasers Eng 129:106031. https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106031","journal-title":"Opt Lasers Eng"},{"key":"835_CR34","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.ins.2021.04.013","volume":"569","author":"X Wang","year":"2021","unstructured":"Wang X, Yang J (2021) A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Inf Sci 569:217\u2013240. https:\/\/doi.org\/10.1016\/j.ins.2021.04.013","journal-title":"Inf Sci"},{"issue":"1","key":"835_CR35","doi-asserted-by":"publisher","first-page":"1246","DOI":"10.1515\/jisys-2018-0365","volume":"29","author":"A Bisht","year":"2020","unstructured":"Bisht A, Dua M, Dua S, Jaroli P (2020) A color image encryption technique based on bit-level permutation and alternate logistic maps. J Intell Syst 29(1):1246\u20131260. https:\/\/doi.org\/10.1515\/jisys-2018-0365","journal-title":"J Intell Syst"},{"key":"835_CR36","doi-asserted-by":"publisher","first-page":"107373","DOI":"10.1016\/j.sigpro.2019.107373","volume":"169","author":"F Yang","year":"2020","unstructured":"Yang F, Mou J, Liu J, Ma C, Yan H (2020) Characteristic analysis of the fractional-order hyperchaotic complex system and its image encryption application. Signal Process 169:107373. https:\/\/doi.org\/10.1016\/j.sigpro.2019.107373","journal-title":"Signal Process"},{"issue":"5","key":"835_CR37","doi-asserted-by":"publisher","first-page":"21","DOI":"10.23919\/JCC.2020.05.003","volume":"17","author":"F Yang","year":"2020","unstructured":"Yang F, Mou J, Cao Y, Chu R (2020) An image encryption algorithm based on BP neural network and hyperchaotic system. China Commun 17(5):21\u201328. https:\/\/doi.org\/10.23919\/JCC.2020.05.003","journal-title":"China Commun"},{"issue":"11","key":"835_CR38","doi-asserted-by":"publisher","first-page":"110209","DOI":"10.7498\/aps.61.110209","volume":"61","author":"J Zhao","year":"2012","unstructured":"Zhao J, Wang J, Wang H (2012) The study of finite-time stability active control method for Lorenz\u2013Haken laser chaotic system. Acta Phys Sin 61(11):110209","journal-title":"Acta Phys Sin"},{"key":"835_CR39","unstructured":"Equation L (2012) Faculty of Mathematics Table of Contents List of Figures."},{"key":"835_CR40","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1006\/acha.1996.0015","volume":"3","author":"W Sweldens","year":"1996","unstructured":"Sweldens W (1996) The lifting scheme: a custom-design construction of biorthogonal wavelets. Appl Comput Harmon Anal 3:186\u2013200","journal-title":"Appl Comput Harmon Anal"},{"key":"835_CR41","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/j.ins.2021.06.032","volume":"574","author":"X Wang","year":"2021","unstructured":"Wang X, Liu C, Jiang D (2021) A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT. Inf Sci 574:505\u2013527. https:\/\/doi.org\/10.1016\/j.ins.2021.06.032","journal-title":"Inf Sci"},{"key":"835_CR42","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Wang X (2014) A symmetric image encryption algorithm based on mixed linear\u2013nonlinear coupled map lattice. Inf Sci 273:329\u2013351. https:\/\/doi.org\/10.1016\/j.ins.2014.02.156","journal-title":"Inf Sci"},{"key":"835_CR43","doi-asserted-by":"publisher","first-page":"108041","DOI":"10.1016\/j.sigpro.2021.108041","volume":"183","author":"X Chai","year":"2021","unstructured":"Chai X, Zhi X, Gan Z, Zhang Y, Chen Y, Fu J (2021) Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption. Signal Process 183:108041. https:\/\/doi.org\/10.1016\/j.sigpro.2021.108041","journal-title":"Signal Process"},{"key":"835_CR44","doi-asserted-by":"publisher","first-page":"107684","DOI":"10.1016\/j.sigpro.2020.107684","volume":"176","author":"X Chai","year":"2020","unstructured":"Chai X, Bi J, Gan Z, Liu X, Zhang Y, Chen Y (2020) Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process 176:107684. https:\/\/doi.org\/10.1016\/j.sigpro.2020.107684","journal-title":"Signal Process"},{"issue":"4","key":"835_CR45","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"X Wang","year":"2012","unstructured":"Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101\u20131108. https:\/\/doi.org\/10.1016\/j.sigpro.2011.10.023","journal-title":"Signal Process"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00835-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-022-00835-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00835-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T18:06:34Z","timestamp":1677089194000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-022-00835-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,16]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["835"],"URL":"https:\/\/doi.org\/10.1007\/s40747-022-00835-1","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,16]]},"assertion":[{"value":"8 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Our research is not involved in human participants and animals.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All the listed authors have participated actively in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All the listed authors have agreed to publish our article in Complex & Intelligent Systems.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}