{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T14:37:03Z","timestamp":1767969423999,"version":"3.49.0"},"reference-count":112,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T00:00:00Z","timestamp":1725840000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T00:00:00Z","timestamp":1725840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LD24F020002"],"award-info":[{"award-number":["LD24F020002"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s40747-024-01568-z","type":"journal-article","created":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:09:12Z","timestamp":1725851352000},"page":"8433-8465","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Integration of a novel 3D chaotic map with ELSS and novel cross-border pixel exchange strategy for secure image communication"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7027-024X","authenticated-orcid":false,"given":"Sajid","family":"Khan","sequence":"first","affiliation":[]},{"given":"Hao","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Zhaoquan","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Sardar","family":"Usman","sequence":"additional","affiliation":[]},{"given":"Namra","family":"Mukhtar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,9]]},"reference":[{"key":"1568_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.111994","volume":"158","author":"K Kumar","year":"2022","unstructured":"Kumar K, Roy S, Rawat U, Malhotra S (2022) IEHC: An efficient image encryption technique using hybrid chaotic map. Chaos Solit Fractals 158:111994. https:\/\/doi.org\/10.1016\/j.chaos.2022.111994","journal-title":"Chaos Solit Fractals"},{"key":"1568_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2021.111631","volume":"155","author":"M Yildirim","year":"2022","unstructured":"Yildirim M (2022) Optical color image encryption scheme with a novel DNA encoding algorithm based on a chaotic circuit. Chaos Solit Fractals 155:111631. https:\/\/doi.org\/10.1016\/j.chaos.2021.111631","journal-title":"Chaos Solit Fractals"},{"key":"1568_CR3","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.jbi.2017.08.002","volume":"73","author":"NA Loan","year":"2017","unstructured":"Loan NA, Parah SA, Sheikh JA et al (2017) Hiding Electronic Patient Record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications. J Biomed Inform 73:125\u2013136. https:\/\/doi.org\/10.1016\/j.jbi.2017.08.002","journal-title":"J Biomed Inform"},{"key":"1568_CR4","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/s11554-020-00994-9","volume":"18","author":"J Wu","year":"2021","unstructured":"Wu J, Xie J, Bardakoff A et al (2021) CGMBE: a model-based tool for the design and implementation of real-time image processing applications on CPU-GPU platforms. J Real Time Image Process 18:561\u2013583. https:\/\/doi.org\/10.1007\/s11554-020-00994-9","journal-title":"J Real Time Image Process"},{"key":"1568_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2021.111629","volume":"155","author":"X Wang","year":"2022","unstructured":"Wang X, Du X (2022) Pixel-level and bit-level image encryption method based on Logistic-Chebyshev dynamic coupled map lattices. Chaos Solit Fractals 155:111629. https:\/\/doi.org\/10.1016\/j.chaos.2021.111629","journal-title":"Chaos Solit Fractals"},{"key":"1568_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.112625","author":"X Wang","year":"2022","unstructured":"Wang X, Liu C, Jiang D (2022) Visually meaningful image encryption scheme based on new-designed chaotic map and random scrambling diffusion strategy. Chaos Solit Fractals. https:\/\/doi.org\/10.1016\/j.chaos.2022.112625","journal-title":"Chaos Solit Fractals"},{"key":"1568_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.112628","author":"R Tuli","year":"2022","unstructured":"Tuli R, Soneji HN, Churi P (2022) PixAdapt: A novel approach to adaptive image encryption. Chaos Solit Fractals. https:\/\/doi.org\/10.1016\/j.chaos.2022.112628","journal-title":"Chaos Solit Fractals"},{"key":"1568_CR8","doi-asserted-by":"publisher","first-page":"1943","DOI":"10.1177\/01423312231225782","volume":"46","author":"Y Tao","year":"2024","unstructured":"Tao Y, Tao H, Zhuang Z et al (2024) Quantized iterative learning control of communication-constrained systems with encoding and decoding mechanism. Trans Inst Measurement Control 46:1943\u20131954. https:\/\/doi.org\/10.1177\/01423312231225782","journal-title":"Trans Inst Measurement Control"},{"key":"1568_CR9","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1353-4858(10)70006-4","volume":"12","author":"H Simon","year":"2010","unstructured":"Simon H (2010) Advanced Encryption Standard (AES). Netw Secur 12:8\u201312. https:\/\/doi.org\/10.1016\/S1353-4858(10)70006-4","journal-title":"Netw Secur"},{"key":"1568_CR10","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"08","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 08:1259\u20131284. https:\/\/doi.org\/10.1142\/S021812749800098X","journal-title":"Int J Bifurc Chaos"},{"key":"1568_CR11","doi-asserted-by":"publisher","first-page":"2372","DOI":"10.1109\/TMM.2020.3011315","volume":"23","author":"J Chen","year":"2021","unstructured":"Chen J, Chen L, Zhou Y (2021) Universal chosen-ciphertext attack for a family of image encryption schemes. IEEE Trans Multimedia 23:2372\u20132385. https:\/\/doi.org\/10.1109\/TMM.2020.3011315","journal-title":"IEEE Trans Multimedia"},{"key":"1568_CR12","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.sigpro.2016.10.002","volume":"132","author":"EY Xie","year":"2017","unstructured":"Xie EY, Li C, Yu S, L\u00fc J (2017) On the cryptanalysis of Fridrich\u2019s chaotic image encryption scheme. Signal Process 132:150\u2013154. https:\/\/doi.org\/10.1016\/j.sigpro.2016.10.002","journal-title":"Signal Process"},{"key":"1568_CR13","doi-asserted-by":"publisher","first-page":"1291","DOI":"10.1109\/TCSI.2021.3133318","volume":"69","author":"X Wang","year":"2022","unstructured":"Wang X, Liu P (2022) A new full chaos coupled mapping lattice and its application in privacy image encryption. IEEE Trans Circuits Syst I 69:1291\u20131301. https:\/\/doi.org\/10.1109\/TCSI.2021.3133318","journal-title":"IEEE Trans Circuits Syst I"},{"key":"1568_CR14","doi-asserted-by":"publisher","first-page":"4028","DOI":"10.1109\/TCSVT.2021.3108767","volume":"32","author":"Y Xian","year":"2022","unstructured":"Xian Y, Wang X, Teng L (2022) Double parameters fractal sorting matrix and its application in image encryption. IEEE Trans Circuits Syst Video Technol 32:4028\u20134037. https:\/\/doi.org\/10.1109\/TCSVT.2021.3108767","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"1568_CR15","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1016\/j.ins.2020.09.055","volume":"547","author":"Y Xian","year":"2021","unstructured":"Xian Y, Wang X (2021) Fractal sorting matrix and its application on chaotic image encryption. Inf Sci 547:1154\u20131169. https:\/\/doi.org\/10.1016\/j.ins.2020.09.055","journal-title":"Inf Sci"},{"key":"1568_CR16","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.ins.2021.04.013","volume":"569","author":"X Wang","year":"2021","unstructured":"Wang X, Yang J (2021) A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Inf Sci 569:217\u2013240. https:\/\/doi.org\/10.1016\/j.ins.2021.04.013","journal-title":"Inf Sci"},{"key":"1568_CR17","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ins.2019.08.041","volume":"507","author":"X Wang","year":"2020","unstructured":"Wang X, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16\u201336. https:\/\/doi.org\/10.1016\/j.ins.2019.08.041","journal-title":"Inf Sci"},{"key":"1568_CR18","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.ins.2020.06.030","volume":"539","author":"X Wang","year":"2020","unstructured":"Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf Sci 539:195\u2013214. https:\/\/doi.org\/10.1016\/j.ins.2020.06.030","journal-title":"Inf Sci"},{"key":"1568_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2020.106501","volume":"132","author":"X Wang","year":"2020","unstructured":"Wang X, Guan N (2020) Chaotic image encryption algorithm based on block theory and reversible mixed cellular automata. Opt Laser Technol 132:106501. https:\/\/doi.org\/10.1016\/j.optlastec.2020.106501","journal-title":"Opt Laser Technol"},{"key":"1568_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2023.130063","volume":"552","author":"Y Cui","year":"2024","unstructured":"Cui Y, Guo J, Shang C et al (2024) Light-field 3D image parallel encryption based on the state transition diagram of Maximum Length Cellular Automata. Opt Commun 552:130063. https:\/\/doi.org\/10.1016\/j.optcom.2023.130063","journal-title":"Opt Commun"},{"key":"1568_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.114396","volume":"179","author":"AY Darani","year":"2024","unstructured":"Darani AY, Yengejeh YK, Pakmanesh H, Navarro G (2024) Image encryption algorithm based on a new 3D chaotic system using cellular automata. Chaos Solit Fractals 179:114396","journal-title":"Chaos Solit Fractals"},{"key":"1568_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119942","volume":"657","author":"A Dennunzio","year":"2024","unstructured":"Dennunzio A, Formenti E, Margara L (2024) An efficient algorithm deciding chaos for linear cellular automata over (Z\/mZ)n with applications to data encryption. Inf Sci 657:119942. https:\/\/doi.org\/10.1016\/j.ins.2023.119942","journal-title":"Inf Sci"},{"key":"1568_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2024.102138","volume":"96","author":"C Wang","year":"2024","unstructured":"Wang C, Chong Z, Zhang H et al (2024) Color image encryption based on discrete memristor logistic map and DNA encoding. Integration 96:102138. https:\/\/doi.org\/10.1016\/j.vlsi.2024.102138","journal-title":"Integration"},{"key":"1568_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.114306","volume":"177","author":"LF \u00c1valos-Ru\u00edz","year":"2023","unstructured":"\u00c1valos-Ru\u00edz LF, Z\u00fa\u00f1iga-Aguilar CJ, G\u00f3mez-Aguilar JF et al (2023) A RGB image encryption technique using chaotic maps of fractional variable-order based on DNA encoding. Chaos Solit Fractals 177:114306. https:\/\/doi.org\/10.1016\/j.chaos.2023.114306","journal-title":"Chaos Solit Fractals"},{"key":"1568_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117861","volume":"206","author":"B Jasra","year":"2022","unstructured":"Jasra B, Hassan Moon A (2022) Color image encryption and authentication using dynamic DNA encoding and hyper chaotic system. Expert Syst Appl 206:117861. https:\/\/doi.org\/10.1016\/j.eswa.2022.117861","journal-title":"Expert Syst Appl"},{"key":"1568_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2021.111631","volume":"155","author":"M Yildirim","year":"2022","unstructured":"Yildirim M (2022) Optical color image encryption scheme with a novel DNA encoding algorithm based on a chaotic circuit. Chaos Solit Fractals 155:111631. https:\/\/doi.org\/10.1016\/j.chaos.2021.111631","journal-title":"Chaos Solit Fractals"},{"key":"1568_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102809","volume":"58","author":"N Iqbal","year":"2021","unstructured":"Iqbal N, Hanif M, Abbas S et al (2021) Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding. J Inform Secur Appl 58:102809. https:\/\/doi.org\/10.1016\/j.jisa.2021.102809","journal-title":"J Inform Secur Appl"},{"key":"1568_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.mejo.2020.104878","volume":"104","author":"M Yildirim","year":"2020","unstructured":"Yildirim M (2020) DNA encoding for RGB image encryption with memristor based neuron model and chaos phenomenon. Microelectron J 104:104878. https:\/\/doi.org\/10.1016\/j.mejo.2020.104878","journal-title":"Microelectron J"},{"key":"1568_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100891","volume":"24","author":"MU Rehman","year":"2023","unstructured":"Rehman MU, Shafique A, Usman AB (2023) Securing medical information transmission between IoT devices: an innovative hybrid encryption scheme based on quantum walk, DNA encoding, and chaos. Internet Things 24:100891. https:\/\/doi.org\/10.1016\/j.iot.2023.100891","journal-title":"Internet Things"},{"key":"1568_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121514","volume":"237","author":"H Wen","year":"2024","unstructured":"Wen H, Lin Y (2024) Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Syst Appl 237:121514. https:\/\/doi.org\/10.1016\/j.eswa.2023.121514","journal-title":"Expert Syst Appl"},{"key":"1568_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.rinp.2023.107057","volume":"54","author":"Y Ma","year":"2023","unstructured":"Ma Y (2023) Research and application of Big data encryption technology based on quantum lightweight image encryption. Results Phys 54:107057. https:\/\/doi.org\/10.1016\/j.rinp.2023.107057","journal-title":"Results Phys"},{"key":"1568_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.101980","volume":"36","author":"MU Rehman","year":"2024","unstructured":"Rehman MU (2024) Quantum-enhanced chaotic image encryption: strengthening digital data security with 1-D sine-based chaotic maps and quantum coding. J King Saud Univ 36:101980. https:\/\/doi.org\/10.1016\/j.jksuci.2024.101980","journal-title":"J King Saud Univ"},{"key":"1568_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103698","volume":"81","author":"J He","year":"2024","unstructured":"He J, Zhu H, Zhou X (2024) Quantum image encryption algorithm via optimized quantum circuit and parity bit-plane permutation. J Inform Secur Appl 81:103698. https:\/\/doi.org\/10.1016\/j.jisa.2024.103698","journal-title":"J Inform Secur Appl"},{"key":"1568_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2021.126529","volume":"587","author":"Y Su","year":"2022","unstructured":"Su Y, Wang X (2022) A robust visual image encryption scheme based on controlled quantum walks. Phys A 587:126529. https:\/\/doi.org\/10.1016\/j.physa.2021.126529","journal-title":"Phys A"},{"key":"1568_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2023.128482","volume":"612","author":"H-K Wang","year":"2023","unstructured":"Wang H-K, Xu G-B, Jiang D-H (2023) Quantum grayscale image encryption and secret sharing schemes based on Rubik\u2019s Cube. Phys A 612:128482. https:\/\/doi.org\/10.1016\/j.physa.2023.128482","journal-title":"Phys A"},{"key":"1568_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.101980","volume":"36","author":"MU Rehman","year":"2024","unstructured":"Rehman MU (2024) Quantum-enhanced Chaotic Image Encryption: Strengthening Digital Data Security With 1-D Sine-based Chaotic Maps and Quantum Coding. J King Saud Univ 36:101980. https:\/\/doi.org\/10.1016\/j.jksuci.2024.101980","journal-title":"J King Saud Univ"},{"key":"1568_CR37","doi-asserted-by":"publisher","DOI":"10.3390\/e25060865","author":"J Gao","year":"2023","unstructured":"Gao J, Wang Y, Song Z, Wang S (2023) Quantum image encryption based on quantum DNA codec and pixel-level scrambling. Entropy. https:\/\/doi.org\/10.3390\/e25060865","journal-title":"Entropy"},{"key":"1568_CR38","doi-asserted-by":"publisher","first-page":"1559","DOI":"10.1007\/s11042-012-1173-2","volume":"70","author":"AAA El-Latif","year":"2014","unstructured":"El-Latif AAA, Li L, Niu X (2014) A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tools Appl 70:1559\u20131584. https:\/\/doi.org\/10.1007\/s11042-012-1173-2","journal-title":"Multimed Tools Appl"},{"key":"1568_CR39","doi-asserted-by":"publisher","first-page":"3373","DOI":"10.1007\/s12652-020-02399-9","volume":"12","author":"S Jeevitha","year":"2021","unstructured":"Jeevitha S, Amutha Prabha N (2021) Novel medical image encryption using DWT block-based scrambling and edge maps. J Ambient Intell Humaniz Comput 12:3373\u20133388. https:\/\/doi.org\/10.1007\/s12652-020-02399-9","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1568_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2022.107879","volume":"149","author":"Z-W Huang","year":"2022","unstructured":"Huang Z-W, Zhou N-R (2022) Image encryption scheme based on discrete cosine Stockwell transform and DNA-level modulus diffusion. Opt Laser Technol 149:107879. https:\/\/doi.org\/10.1016\/j.optlastec.2022.107879","journal-title":"Opt Laser Technol"},{"key":"1568_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2021.106626","volume":"143","author":"Y Zhang","year":"2021","unstructured":"Zhang Y, Zhang L, Zhong Z et al (2021) Hyperchaotic image encryption using phase-truncated fractional Fourier transform and DNA-level operation. Opt Lasers Eng 143:106626. https:\/\/doi.org\/10.1016\/j.optlaseng.2021.106626","journal-title":"Opt Lasers Eng"},{"key":"1568_CR42","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.optlaseng.2018.11.017","volume":"115","author":"R Enayatifar","year":"2019","unstructured":"Enayatifar R, Guimar\u00e3es FG, Siarry P (2019) Index-based permutation-diffusion in multiple-image encryption using DNA sequence. Opt Lasers Eng 115:131\u2013140. https:\/\/doi.org\/10.1016\/j.optlaseng.2018.11.017","journal-title":"Opt Lasers Eng"},{"key":"1568_CR43","doi-asserted-by":"publisher","first-page":"2050060","DOI":"10.1142\/S0218127420500601","volume":"30","author":"C Xu","year":"2020","unstructured":"Xu C, Sun J, Wang C (2020) An image encryption algorithm based on random walk and hyperchaotic systems. Int J Bifurc Chaos 30:2050060. https:\/\/doi.org\/10.1142\/S0218127420500601","journal-title":"Int J Bifurc Chaos"},{"key":"1568_CR44","doi-asserted-by":"publisher","DOI":"10.3390\/e24010040","author":"H Fan","year":"2022","unstructured":"Fan H, Lu H, Zhang C et al (2022) Cryptanalysis of an image encryption algorithm based on random walk and hyperchaotic systems. Entropy. https:\/\/doi.org\/10.3390\/e24010040","journal-title":"Entropy"},{"key":"1568_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2021.107252","volume":"142","author":"X Gao","year":"2021","unstructured":"Gao X (2021) Image encryption algorithm based on 2D hyperchaotic map. Opt Laser Technol 142:107252. https:\/\/doi.org\/10.1016\/j.optlastec.2021.107252","journal-title":"Opt Laser Technol"},{"key":"1568_CR46","doi-asserted-by":"publisher","DOI":"10.3390\/e25030395","author":"Q Jiang","year":"2023","unstructured":"Jiang Q, Yu S, Wang Q (2023) Cryptanalysis of an image encryption algorithm based on two-dimensional hyperchaotic map. Entropy. https:\/\/doi.org\/10.3390\/e25030395","journal-title":"Entropy"},{"key":"1568_CR47","doi-asserted-by":"publisher","first-page":"20511","DOI":"10.1007\/s11042-018-6824-5","volume":"78","author":"Z Lin","year":"2019","unstructured":"Lin Z, Liu J, Lian J et al (2019) A novel fast image encryption algorithm for embedded systems. Multimed Tools Appl 78:20511\u201320531. https:\/\/doi.org\/10.1007\/s11042-018-6824-5","journal-title":"Multimed Tools Appl"},{"key":"1568_CR48","doi-asserted-by":"publisher","first-page":"13801","DOI":"10.1007\/s11042-020-10289-7","volume":"80","author":"I El Hanouti","year":"2021","unstructured":"El Hanouti I, El Fadili H, Zenkouar K (2021) Cryptanalysis of an embedded systems\u2019 image encryption. Multimed Tools Appl 80:13801\u201313820. https:\/\/doi.org\/10.1007\/s11042-020-10289-7","journal-title":"Multimed Tools Appl"},{"key":"1568_CR49","doi-asserted-by":"publisher","first-page":"15605","DOI":"10.1007\/s11042-018-6973-6","volume":"78","author":"J Zhang","year":"2019","unstructured":"Zhang J, Huo D (2019) Image encryption algorithm based on quantum chaotic map and DNA coding. Multimed Tools Appl 78:15605\u201315621. https:\/\/doi.org\/10.1007\/s11042-018-6973-6","journal-title":"Multimed Tools Appl"},{"key":"1568_CR50","doi-asserted-by":"publisher","first-page":"42717","DOI":"10.1007\/s11042-023-15003-x","volume":"82","author":"X Chen","year":"2023","unstructured":"Chen X, Yu S, Wang Q et al (2023) On the cryptanalysis of an image encryption algorithm with quantum chaotic map and DNA coding. Multimed Tools Appl 82:42717\u201342737. https:\/\/doi.org\/10.1007\/s11042-023-15003-x","journal-title":"Multimed Tools Appl"},{"key":"1568_CR51","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.170075","volume":"271","author":"J Wang","year":"2022","unstructured":"Wang J, Jiang W, Xu H et al (2022) Image encryption based on Logistic-Sine self-embedding chaotic sequence. Optik (Stuttg) 271:170075. https:\/\/doi.org\/10.1016\/j.ijleo.2022.170075","journal-title":"Optik (Stuttg)"},{"key":"1568_CR52","doi-asserted-by":"publisher","first-page":"1937","DOI":"10.1109\/TSP.2020.2979596","volume":"68","author":"Z Hua","year":"2020","unstructured":"Hua Z, Zhang Y, Zhou Y (2020) Two-dimensional modular chaotification system for improving chaos complexity. IEEE Trans Signal Process 68:1937\u20131949. https:\/\/doi.org\/10.1109\/TSP.2020.2979596","journal-title":"IEEE Trans Signal Process"},{"key":"1568_CR53","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.sigpro.2015.06.008","volume":"118","author":"W Zhang","year":"2016","unstructured":"Zhang W, Yu H, Zhao Y, Zhu Z (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36\u201350. https:\/\/doi.org\/10.1016\/j.sigpro.2015.06.008","journal-title":"Signal Process"},{"key":"1568_CR54","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1016\/j.sigpro.2017.06.014","volume":"142","author":"J Wu","year":"2018","unstructured":"Wu J, Liao X, Yang B (2018) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process 142:292\u2013300. https:\/\/doi.org\/10.1016\/j.sigpro.2017.06.014","journal-title":"Signal Process"},{"key":"1568_CR55","doi-asserted-by":"publisher","first-page":"2557","DOI":"10.1109\/TIE.2017.2736515","volume":"65","author":"Z Hua","year":"2018","unstructured":"Hua Z, Zhou B, Zhou Y (2018) Sine-transform-based chaotic system with FPGA implementation. IEEE Trans Indus Electron 65:2557\u20132566. https:\/\/doi.org\/10.1109\/TIE.2017.2736515","journal-title":"IEEE Trans Indus Electron"},{"key":"1568_CR56","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.matcom.2020.07.007","volume":"178","author":"DS Malik","year":"2020","unstructured":"Malik DS, Shah T (2020) Color multiple image encryption scheme based on 3D-chaotic maps. Math Comput Simul 178:646\u2013666. https:\/\/doi.org\/10.1016\/j.matcom.2020.07.007","journal-title":"Math Comput Simul"},{"key":"1568_CR57","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.ins.2017.11.021","volume":"430\u2013431","author":"LY Zhang","year":"2018","unstructured":"Zhang LY, Liu Y, Wang C et al (2018) Improved known-plaintext attack to permutation-only multimedia ciphers. Inf Sci 430\u2013431:228\u2013239. https:\/\/doi.org\/10.1016\/j.ins.2017.11.021","journal-title":"Inf Sci"},{"key":"1568_CR58","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1016\/j.sigpro.2010.09.014","volume":"91","author":"C Li","year":"2011","unstructured":"Li C, Lo K-T (2011) Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process 91:949\u2013954. https:\/\/doi.org\/10.1016\/j.sigpro.2010.09.014","journal-title":"Signal Process"},{"key":"1568_CR59","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1016\/j.comcom.2020.07.006","volume":"160","author":"S Liaqat","year":"2020","unstructured":"Liaqat S, Akhunzada A, Shaikh FS et al (2020) SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT). Comput Commun 160:697\u2013705. https:\/\/doi.org\/10.1016\/j.comcom.2020.07.006","journal-title":"Comput Commun"},{"key":"1568_CR60","doi-asserted-by":"publisher","DOI":"10.1016\/j.rinp.2023.107057","volume":"54","author":"Y Ma","year":"2023","unstructured":"Ma Y (2023) Research and application of Big data encryption technology based on quantum lightweight image encryption. Results Phys 54:107057. https:\/\/doi.org\/10.1016\/j.rinp.2023.107057","journal-title":"Results Phys"},{"key":"1568_CR61","doi-asserted-by":"publisher","first-page":"81333","DOI":"10.1109\/ACCESS.2019.2920383","volume":"7","author":"S Khan","year":"2019","unstructured":"Khan S, Han L, Lu H et al (2019) A new hybrid image encryption algorithm based on 2D-CA, FSM-DNA rule generator, and FSBI. IEEE Access 7:81333\u201381350. https:\/\/doi.org\/10.1109\/ACCESS.2019.2920383","journal-title":"IEEE Access"},{"key":"1568_CR62","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172\u2013182. https:\/\/doi.org\/10.1016\/j.sigpro.2013.10.034","journal-title":"Signal Process"},{"key":"1568_CR63","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.dcan.2022.04.028","volume":"9","author":"X Huang","year":"2023","unstructured":"Huang X, Dong Y, Ye G et al (2023) Visually meaningful image encryption algorithm based on digital signature. Digital Commun Netw 9:159\u2013165. https:\/\/doi.org\/10.1016\/j.dcan.2022.04.028","journal-title":"Digital Commun Netw"},{"key":"1568_CR64","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2024.129725","author":"A McAllister","year":"2024","unstructured":"McAllister A, McCartney M, Glass DH (2024) Correlation between Hurst exponent and largest Lyapunov exponent on a coupled map lattice. Phys A. https:\/\/doi.org\/10.1016\/j.physa.2024.129725","journal-title":"Phys A"},{"key":"1568_CR65","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1016\/j.ins.2021.12.126","volume":"589","author":"U Erkan","year":"2022","unstructured":"Erkan U, Toktas A, Toktas F, Alenezi F (2022) 2D e-map for image encryption. Inf Sci 589:770\u2013789. https:\/\/doi.org\/10.1016\/j.ins.2021.12.126","journal-title":"Inf Sci"},{"key":"1568_CR66","doi-asserted-by":"publisher","first-page":"12027","DOI":"10.1007\/s11042-018-6739-1","volume":"78","author":"C Pak","year":"2019","unstructured":"Pak C, An K, Jang P et al (2019) A novel bit-level color image encryption using improved 1D chaotic map. Multimed Tools Appl 78:12027\u201312042. https:\/\/doi.org\/10.1007\/s11042-018-6739-1","journal-title":"Multimed Tools Appl"},{"key":"1568_CR67","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1137\/080718851","volume":"8","author":"GA Gottwald","year":"2009","unstructured":"Gottwald GA, Melbourne I (2009) On the Implementation of the 0\u20131 Test for Chaos. SIAM J Appl Dyn Syst 8:129\u2013145. https:\/\/doi.org\/10.1137\/080718851","journal-title":"SIAM J Appl Dyn Syst"},{"key":"1568_CR68","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1152\/japplphysiol.01377.2010","volume":"113","author":"M Fishman","year":"2012","unstructured":"Fishman M, Jacono FJ, Park S et al (2012) A method for analyzing temporal patterns of variability of a time series from Poincar\u00e9 plots. J Appl Physiol 113:297\u2013306. https:\/\/doi.org\/10.1152\/japplphysiol.01377.2010","journal-title":"J Appl Physiol"},{"key":"1568_CR69","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2021.111506","volume":"153","author":"DA Trujillo-Toledo","year":"2021","unstructured":"Trujillo-Toledo DA, L\u00f3pez-Bonilla OR, Garc\u00eda-Guerrero EE et al (2021) Real-time RGB image encryption for IoT applications using enhanced sequences from chaotic maps. Chaos Solit Fractals 153:111506. https:\/\/doi.org\/10.1016\/j.chaos.2021.111506","journal-title":"Chaos Solit Fractals"},{"key":"1568_CR70","doi-asserted-by":"publisher","first-page":"8245","DOI":"10.1016\/j.jksuci.2022.08.007","volume":"34","author":"J Wang","year":"2022","unstructured":"Wang J, Liu L, Xu M, Li X (2022) A novel content-selected image encryption algorithm based on the LS chaotic model. J King Saud Univ 34:8245\u20138259. https:\/\/doi.org\/10.1016\/j.jksuci.2022.08.007","journal-title":"J King Saud Univ"},{"key":"1568_CR71","doi-asserted-by":"publisher","DOI":"10.3390\/math11010231","author":"S Zhu","year":"2023","unstructured":"Zhu S, Deng X, Zhang W, Zhu C (2023) Image encryption scheme based on newly designed chaotic map and parallel DNA coding. Mathematics. https:\/\/doi.org\/10.3390\/math11010231","journal-title":"Mathematics"},{"key":"1568_CR72","doi-asserted-by":"publisher","DOI":"10.3390\/e24070933","author":"N Li","year":"2022","unstructured":"Li N, Xie S, Zhang J (2022) A color image encryption algorithm based on double fractional order chaotic neural network and convolution operation. Entropy. https:\/\/doi.org\/10.3390\/e24070933","journal-title":"Entropy"},{"key":"1568_CR73","doi-asserted-by":"publisher","DOI":"10.3390\/e25050753","author":"Y Shen","year":"2023","unstructured":"Shen Y, Huang J, Chen L et al (2023) Fast and secure image encryption algorithm with simultaneous shuffling and diffusion based on a time-delayed combinatorial hyperchaos map. Entropy. https:\/\/doi.org\/10.3390\/e25050753","journal-title":"Entropy"},{"key":"1568_CR74","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102650","volume":"55","author":"Y Tao","year":"2020","unstructured":"Tao Y, Cui W, Zhang Z (2020) Spatiotemporal chaos in multiple dynamically coupled map lattices and its application in a novel image encryption algorithm. J Inform Secur Appl 55:102650. https:\/\/doi.org\/10.1016\/j.jisa.2020.102650","journal-title":"J Inform Secur Appl"},{"key":"1568_CR75","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2020.07.051","volume":"544","author":"M Wang","year":"2021","unstructured":"Wang M, Wang X, Zhao T et al (2021) Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme. Inf Sci 544:1\u201324. https:\/\/doi.org\/10.1016\/j.ins.2020.07.051","journal-title":"Inf Sci"},{"key":"1568_CR76","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4034","volume":"32","author":"S Khan","year":"2021","unstructured":"Khan S, Lansheng H, Qian Y et al (2021) Security of multimedia communication with game trick based fast, efficient, and robust color-\/gray-scale image encryption algorithm. Trans Emerg Telecommun Technol 32:e4034. https:\/\/doi.org\/10.1002\/ett.4034","journal-title":"Trans Emerg Telecommun Technol"},{"key":"1568_CR77","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10091066","author":"KM Hosny","year":"2021","unstructured":"Hosny KM, Kamal ST, Darwish MM, Papakostas GA (2021) New image encryption algorithm using hyper chaotic system and Fibonacci Q-Matrix. Electronics (Basel). https:\/\/doi.org\/10.3390\/electronics10091066","journal-title":"Electronics (Basel)"},{"key":"1568_CR78","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.ins.2022.03.025","volume":"596","author":"Y Xian","year":"2022","unstructured":"Xian Y, Wang X, Teng L et al (2022) Cryptographic system based on double parameters fractal sorting vector and new spatio temporal chaotic system. Inf Sci 596:304\u2013320. https:\/\/doi.org\/10.1016\/j.ins.2022.03.025","journal-title":"Inf Sci"},{"key":"1568_CR79","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4316163","author":"Y Cao","year":"2022","unstructured":"Cao Y, Shi P, Wu K, Li W (2022) Image encryption algorithm based on an improved ML neuron model and DNA dynamic coding. Comput Intell Neurosci. https:\/\/doi.org\/10.1155\/2022\/4316163","journal-title":"Comput Intell Neurosci"},{"key":"1568_CR80","doi-asserted-by":"publisher","DOI":"10.3390\/s22249929","author":"P Wang","year":"2022","unstructured":"Wang P, Wang Y, Xiang J, Xiao X (2022) Fast image encryption algorithm for logistics-sine-cosine mapping. Sensors. https:\/\/doi.org\/10.3390\/s22249929","journal-title":"Sensors"},{"key":"1568_CR81","doi-asserted-by":"publisher","DOI":"10.3390\/e25071005","author":"Y Zhang","year":"2023","unstructured":"Zhang Y, Dong W, Zhang J, Ding Q (2023) An image encryption transmission scheme based on a polynomial chaotic map. Entropy. https:\/\/doi.org\/10.3390\/e25071005","journal-title":"Entropy"},{"key":"1568_CR82","doi-asserted-by":"publisher","unstructured":"ur Rehman A, Liao X, Wang H (2021) An innovative technique for image encryption using tri-partite graph and chaotic maps. Multimed Tools Appl 80:21979\u201322005. https:\/\/doi.org\/10.1007\/s11042-021-10692-8","DOI":"10.1007\/s11042-021-10692-8"},{"key":"1568_CR83","doi-asserted-by":"publisher","unstructured":"ur Rehman A, Liao X, Ashraf R, et al (2018) A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2. Optik (Stuttg) 159:348\u2013367. https:\/\/doi.org\/10.1016\/j.ijleo.2018.01.064","DOI":"10.1016\/j.ijleo.2018.01.064"},{"key":"1568_CR84","doi-asserted-by":"publisher","first-page":"2105","DOI":"10.1007\/s11042-018-6346-1","volume":"78","author":"AU Rehman","year":"2019","unstructured":"Rehman AU, Liao X (2019) A novel robust dual diffusion\/confusion encryption technique for color image based on Chaos, DNA and SHA-2. Multimedia Tools Appl 78:2105\u20132133. https:\/\/doi.org\/10.1007\/s11042-018-6346-1","journal-title":"Multimedia Tools Appl"},{"key":"1568_CR85","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103686","volume":"80","author":"W Song","year":"2024","unstructured":"Song W, Fu C, Zheng Y et al (2024) Batch image encryption using cross image permutation and diffusion. J Inform Secur Appl 80:103686. https:\/\/doi.org\/10.1016\/j.jisa.2023.103686","journal-title":"J Inform Secur Appl"},{"key":"1568_CR86","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"X Chai","year":"2019","unstructured":"Chai X, Fu X, Gan Z et al (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44\u201362. https:\/\/doi.org\/10.1016\/j.sigpro.2018.09.029","journal-title":"Signal Process"},{"key":"1568_CR87","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10172116","author":"MK Khairullah","year":"2021","unstructured":"Khairullah MK, Alkahtani AA, Bin Baharuddin MZ, Al-Jubari AM (2021) Designing 1D chaotic maps for fast chaotic image encryption. Electronics (Basel). https:\/\/doi.org\/10.3390\/electronics10172116","journal-title":"Electronics (Basel)"},{"key":"1568_CR88","doi-asserted-by":"publisher","unstructured":"Kumar M, Khaladkar VP (2024) Secure communication using an adaptable multilevel RGB image encryption algorithm for wireless sensor networks. e-Prime - Advances in Electrical Engineering, Electronics and Energy 7:100446. https:\/\/doi.org\/10.1016\/j.prime.2024.100446","DOI":"10.1016\/j.prime.2024.100446"},{"key":"1568_CR89","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6615512","author":"A Alanezi","year":"2021","unstructured":"Alanezi A, Abd-El-Atty B, Kolivand H et al (2021) Securing digital images through simple permutation-substitution mechanism in cloud-based smart city environment. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2021\/6615512","journal-title":"Secur Commun Netw"},{"key":"1568_CR90","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2021.168290","volume":"249","author":"A Yahi","year":"2022","unstructured":"Yahi A, Bekkouche T, El Hossine Daachi M, Diffellah N (2022) A color image encryption scheme based on 1D cubic map. Optik (Stuttg) 249:168290. https:\/\/doi.org\/10.1016\/j.ijleo.2021.168290","journal-title":"Optik (Stuttg)"},{"key":"1568_CR91","doi-asserted-by":"publisher","first-page":"23899","DOI":"10.1007\/s11042-022-12069-x","volume":"82","author":"H Liu","year":"2023","unstructured":"Liu H, Liu J, Ma C (2023) Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption. Multimed Tools Appl 82:23899\u201323914. https:\/\/doi.org\/10.1007\/s11042-022-12069-x","journal-title":"Multimed Tools Appl"},{"key":"1568_CR92","doi-asserted-by":"publisher","first-page":"6813","DOI":"10.1007\/s11071-022-08158-z","volume":"111","author":"J Wen","year":"2023","unstructured":"Wen J, Xu X, Sun K et al (2023) Triple-image bit-level encryption algorithm based on double cross 2D hyperchaotic map. Nonlinear Dyn 111:6813\u20136838. https:\/\/doi.org\/10.1007\/s11071-022-08158-z","journal-title":"Nonlinear Dyn"},{"key":"1568_CR93","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2024.2312108","author":"E G\u00fcveno\u011flu","year":"2024","unstructured":"G\u00fcveno\u011flu E (2024) An image encryption algorithm based on multi-layered chaotic maps and its security analysis. Conn Sci. https:\/\/doi.org\/10.1080\/09540091.2024.2312108","journal-title":"Conn Sci"},{"key":"1568_CR94","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1049\/ipr2.12069","volume":"15","author":"Q Zhang","year":"2021","unstructured":"Zhang Q, Han J, Ye Y (2021) Multi-image encryption algorithm based on image hash, bit-plane decomposition and dynamic DNA coding. IET Image Process 15:885\u2013896. https:\/\/doi.org\/10.1049\/ipr2.12069","journal-title":"IET Image Process"},{"key":"1568_CR95","doi-asserted-by":"publisher","first-page":"178167","DOI":"10.1109\/ACCESS.2020.3025241","volume":"8","author":"N Iqbal","year":"2020","unstructured":"Iqbal N, Hanif M, Abbas S et al (2020) DNA strands level scrambling based color image encryption scheme. IEEE Access 8:178167\u2013178182. https:\/\/doi.org\/10.1109\/ACCESS.2020.3025241","journal-title":"IEEE Access"},{"key":"1568_CR96","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-58612-8","author":"R Zhang","year":"2024","unstructured":"Zhang R, Zhou R, Luo J (2024) Nonequal-length image encryption based on bitplane chaotic mapping. Sci Rep. https:\/\/doi.org\/10.1038\/s41598-024-58612-8","journal-title":"Sci Rep"},{"key":"1568_CR97","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-31205-7","author":"I Pantic","year":"2023","unstructured":"Pantic I, Cumic J, Dugalic S et al (2023) Gray level co-occurrence matrix and wavelet analyses reveal discrete changes in proximal tubule cell nuclei after mild acute kidney injury. Sci Rep. https:\/\/doi.org\/10.1038\/s41598-023-31205-7","journal-title":"Sci Rep"},{"key":"1568_CR98","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/bs.adcom.2022.08.010","volume":"129","author":"C Bhaya","year":"2023","unstructured":"Bhaya C, Pal AK, Islam SKH (2023) Chapter Four - A novel image encryption and decryption scheme by using DNA computing. Adv Comput 129:129\u2013172. https:\/\/doi.org\/10.1016\/bs.adcom.2022.08.010","journal-title":"Adv Comput"},{"key":"1568_CR99","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.ins.2021.07.096","volume":"579","author":"X Wang","year":"2021","unstructured":"Wang X, Zhang M (2021) An image encryption algorithm based on new chaos and diffusion values of a truth table. Inf Sci 579:128\u2013149. https:\/\/doi.org\/10.1016\/j.ins.2021.07.096","journal-title":"Inf Sci"},{"key":"1568_CR100","doi-asserted-by":"publisher","first-page":"1859","DOI":"10.1007\/s11071-021-06663-1","volume":"105","author":"L Teng","year":"2021","unstructured":"Teng L, Wang X, Yang F, Xian Y (2021) Color image encryption based on cross 2D hyperchaotic map using combined cycle shift scrambling and selecting diffusion. Nonlinear Dyn 105:1859\u20131876. https:\/\/doi.org\/10.1007\/s11071-021-06663-1","journal-title":"Nonlinear Dyn"},{"key":"1568_CR101","doi-asserted-by":"publisher","DOI":"10.3390\/computation11090178","author":"DRIM Setiadi","year":"2023","unstructured":"Setiadi DRIM, Rijati N (2023) An image encryption scheme combining 2D cascaded logistic map and permutation-substitution operations. Computation. https:\/\/doi.org\/10.3390\/computation11090178","journal-title":"Computation"},{"key":"1568_CR102","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2021.111629","volume":"155","author":"X Wang","year":"2022","unstructured":"Wang X, Du X (2022) Pixel-level and bit-level image encryption method based on Logistic-Chebyshev dynamic coupled map lattices. Chaos Solit Fractals 155:111629. https:\/\/doi.org\/10.1016\/j.chaos.2021.111629","journal-title":"Chaos Solit Fractals"},{"key":"1568_CR103","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2019.115670","volume":"80","author":"K Xuejing","year":"2020","unstructured":"Xuejing K, Zihui G (2020) A new color image encryption scheme based on DNA encoding and spatiotemporal chaotic system. Signal Process Image Commun 80:115670. https:\/\/doi.org\/10.1016\/j.image.2019.115670","journal-title":"Signal Process Image Commun"},{"key":"1568_CR104","doi-asserted-by":"publisher","first-page":"4335","DOI":"10.1007\/s00500-023-08747-z","volume":"28","author":"Y Wang","year":"2024","unstructured":"Wang Y, Teng L, Wang X (2024) An image encryption algorithm based on circular rotation and generalized Feistel structure. Soft Comput 28:4335\u20134358. https:\/\/doi.org\/10.1007\/s00500-023-08747-z","journal-title":"Soft Comput"},{"key":"1568_CR105","doi-asserted-by":"publisher","DOI":"10.1016\/j.trac.2024.117612","volume":"172","author":"X Liu","year":"2024","unstructured":"Liu X, An H, Cai W, Shao X (2024) Deep learning in spectral analysis: Modeling and imaging. TrAC Trends Anal Chem 172:117612. https:\/\/doi.org\/10.1016\/j.trac.2024.117612","journal-title":"TrAC Trends Anal Chem"},{"key":"1568_CR106","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.112742","volume":"164","author":"H Zhao","year":"2022","unstructured":"Zhao H, Wang S, Wang X (2022) Fast image encryption algorithm based on multi-parameter fractal matrix and MPMCML system. Chaos Solit Fractals 164:112742. https:\/\/doi.org\/10.1016\/j.chaos.2022.112742","journal-title":"Chaos Solit Fractals"},{"key":"1568_CR107","doi-asserted-by":"publisher","first-page":"31035","DOI":"10.1007\/s11042-018-7081-3","volume":"78","author":"Z Xiong","year":"2019","unstructured":"Xiong Z, Wu Y, Ye C et al (2019) Color image chaos encryption algorithm combining CRC and nine palace map. Multimed Tools Appl 78:31035\u201331055. https:\/\/doi.org\/10.1007\/s11042-018-7081-3","journal-title":"Multimed Tools Appl"},{"key":"1568_CR108","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107684","volume":"176","author":"X Chai","year":"2020","unstructured":"Chai X, Bi J, Gan Z et al (2020) Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process 176:107684. https:\/\/doi.org\/10.1016\/j.sigpro.2020.107684","journal-title":"Signal Process"},{"key":"1568_CR109","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2019.115670","volume":"80","author":"K Xuejing","year":"2020","unstructured":"Xuejing K, Zihui G (2020) A new color image encryption scheme based on DNA encoding and spatiotemporal chaotic system. Signal Process Image Commun 80:115670. https:\/\/doi.org\/10.1016\/j.image.2019.115670","journal-title":"Signal Process Image Commun"},{"key":"1568_CR110","doi-asserted-by":"publisher","unstructured":"Iqbal N, Hanif M, Abbas S et al (2020) DNA strands level scrambling based color image encryption scheme. IEEE Access 8:178167\u2013178182. https:\/\/doi.org\/10.1109\/ACCESS.2020.3025241","DOI":"10.1109\/ACCESS.2020.3025241"},{"key":"1568_CR111","doi-asserted-by":"publisher","first-page":"2103","DOI":"10.1007\/s11071-022-07534-z","volume":"109","author":"C Yang","year":"2022","unstructured":"Yang C, Taralova I, El Assad S, Loiseau JJ (2022) Image encryption based on fractional chaotic pseudo-random number generator and DNA encryption method. Nonlinear Dyn 109:2103\u20132127. https:\/\/doi.org\/10.1007\/s11071-022-07534-z","journal-title":"Nonlinear Dyn"},{"key":"1568_CR112","doi-asserted-by":"publisher","DOI":"10.3390\/e25071005","author":"Y Zhang","year":"2023","unstructured":"Zhang Y, Dong W, Zhang J, Ding Q (2023) An image encryption transmission scheme based on a polynomial chaotic map. Entropy. https:\/\/doi.org\/10.3390\/e25071005","journal-title":"Entropy"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01568-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-024-01568-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01568-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T22:21:37Z","timestamp":1729117297000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-024-01568-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,9]]},"references-count":112,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["1568"],"URL":"https:\/\/doi.org\/10.1007\/s40747-024-01568-z","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,9]]},"assertion":[{"value":"20 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors affirm that they have no Conflict of interest to report, which reinforces the integrity and objectivity of their work.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration of interest"}}]}}