{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:29:57Z","timestamp":1775068197141,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T00:00:00Z","timestamp":1748995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T00:00:00Z","timestamp":1748995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2023YFB2504703"],"award-info":[{"award-number":["2023YFB2504703"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["52172379"],"award-info":[{"award-number":["52172379"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["52441205"],"award-info":[{"award-number":["52441205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shaanxi International Science and Technology Cooperation Program Project","award":["2024GH-YBXM-24"],"award-info":[{"award-number":["2024GH-YBXM-24"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s40747-025-01912-x","type":"journal-article","created":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T08:52:26Z","timestamp":1749027146000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A dual-image encryption scheme for sensitive region of traffic image using public key cryptosystem and novel chaotic map"],"prefix":"10.1007","volume":"11","author":[{"given":"Tingyu","family":"An","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5750-7449","authenticated-orcid":false,"given":"Tao","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Ting","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Donghua","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,4]]},"reference":[{"key":"1912_CR1","doi-asserted-by":"crossref","unstructured":"Thoms G, Muresan R, Al-Dweik A (2019) Design of chaotic block cipher operation mode for intelligent transportation systems. In: IEEE International Conference on Consumer Electronics (ICCE) 1\u20134","DOI":"10.1109\/ICCE.2019.8661961"},{"key":"1912_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2024.109445","volume":"220","author":"XF He","year":"2024","unstructured":"He XF, Li LX, Peng HP, Tong FH (2024) A multi-level privacy-preserving scheme for extracting traffic images. Signal Process 220:109445. https:\/\/doi.org\/10.1016\/j.sigpro.2024.109445","journal-title":"Signal Process"},{"issue":"10","key":"1912_CR3","doi-asserted-by":"publisher","first-page":"14958","DOI":"10.1109\/tits.2024.3389066","volume":"25","author":"XF He","year":"2024","unstructured":"He XF, Li LX, Peng HP, Tong FH (2024) An efficient image privacy preservation scheme for smart city applications using compressive sensing and multi-level encryption. IEEE T Intell Transp 25(10):14958\u201314972. https:\/\/doi.org\/10.1109\/tits.2024.3389066","journal-title":"IEEE T Intell Transp"},{"key":"1912_CR4","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2025.3534859","author":"DH Jiang","year":"2025","unstructured":"Jiang DH, Ni JQ, Alasbali N, Nafea I, Liu QL, Ahmad J, Boulila W (2025) Ddcm: cracking anonymized facial images using denoising diffusion cryptanalytic model. IEEE T Consum Electr. https:\/\/doi.org\/10.1109\/TCE.2025.3534859","journal-title":"IEEE T Consum Electr"},{"issue":"1","key":"1912_CR5","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/tits.2021.3129598","volume":"24","author":"Y Sun","year":"2023","unstructured":"Sun Y, Yu KP, Bashir AK, Liao X (2023) Bl-IEA: a bit-level image encryption algorithm for cognitive services in intelligent transportation systems. IEEE T Intell Transp 24(1):1062\u20131074. https:\/\/doi.org\/10.1109\/tits.2021.3129598","journal-title":"IEEE T Intell Transp"},{"issue":"12","key":"1912_CR6","doi-asserted-by":"publisher","first-page":"18381","DOI":"10.1007\/s11042-022-13902-z","volume":"82","author":"A Kumar","year":"2023","unstructured":"Kumar A, Dua M (2023) A GRU and chaos-based novel image encryption approach for transport images. Multimed Tools Appl 82(12):18381\u201318408. https:\/\/doi.org\/10.1007\/s11042-022-13902-z","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"1912_CR7","doi-asserted-by":"publisher","first-page":"2479","DOI":"10.1109\/TCSII.2023.3337145","volume":"71","author":"JN Tang","year":"2024","unstructured":"Tang JN, Zhang ZZ, Huang TT (2024) Two-dimensional cosine\u2013sine interleaved chaotic system for secure communication. IEEE T Circuits-Ii 71(4):2479\u20132483. https:\/\/doi.org\/10.1109\/TCSII.2023.3337145","journal-title":"IEEE T Circuits-Ii"},{"issue":"9","key":"1912_CR8","doi-asserted-by":"publisher","first-page":"3676","DOI":"10.1109\/TCSI.2023.3283877","volume":"70","author":"JN Tang","year":"2023","unstructured":"Tang JN, Zhang ZZ, Chen PY, Huang ZM, Huang TT (2023) A simple chaotic model with complex chaotic behaviors and its hardware implementation. IEEE T Circuits-I 70(9):3676\u20133688. https:\/\/doi.org\/10.1109\/TCSI.2023.3283877","journal-title":"IEEE T Circuits-I"},{"key":"1912_CR9","doi-asserted-by":"publisher","first-page":"1898998","DOI":"10.1155\/2021\/1898998","volume":"1","author":"W Feng","year":"2021","unstructured":"Feng W, Zhang J (2021) Qin ZT (2021) A secure and efficient image transmission scheme based on two chaotic maps. Complexity 1:1898998. https:\/\/doi.org\/10.1155\/2021\/1898998","journal-title":"Complexity"},{"issue":"12","key":"1912_CR10","doi-asserted-by":"publisher","first-page":"10485","DOI":"10.1007\/s11071-024-09580-1","volume":"112","author":"YC Chen","year":"2024","unstructured":"Chen YC, Huang HQ, Tang CM, Wei WM (2024) A novel adaptive image privacy protection method based on latin square. Nonlinear Dynam 112(12):10485\u201310508. https:\/\/doi.org\/10.1007\/s11071-024-09580-1","journal-title":"Nonlinear Dynam"},{"issue":"12","key":"1912_CR11","doi-asserted-by":"publisher","first-page":"887","DOI":"10.3390\/fractalfract7120887","volume":"7","author":"W Feng","year":"2023","unstructured":"Feng W, Wang QW, Liu H, Ren Y, Zhang JH, Zhang SB, Qian K, Wen HP (2023) Exploiting newly designed fractional-order 3d lorenz chaotic system and 2d discrete polynomial hyper-chaotic map for high-performance multi-image encryption. Fractal Fract 7(12):887. https:\/\/doi.org\/10.3390\/fractalfract7120887","journal-title":"Fractal Fract"},{"issue":"11","key":"1912_CR12","doi-asserted-by":"publisher","first-page":"2090","DOI":"10.3390\/mi14112090","volume":"14","author":"K Qian","year":"2023","unstructured":"Qian K, Xiao Y, Wei YJ, Liu D, Wang QW, Feng W (2023) A robust memristor-enhanced polynomial hyper-chaotic map and its multi-channel image encryption application. Micromachines-Basel 14(11):2090. https:\/\/doi.org\/10.3390\/mi14112090","journal-title":"Micromachines-Basel"},{"key":"1912_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121514","volume":"237","author":"HP Wen","year":"2024","unstructured":"Wen HP, Lin YT (2024) Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Syst Appl 237:121514. https:\/\/doi.org\/10.1016\/j.eswa.2023.121514","journal-title":"Expert Syst Appl"},{"issue":"7","key":"1912_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.101612","volume":"35","author":"HP Wen","year":"2023","unstructured":"Wen HP, Lin YT (2023) Cryptanalyzing an image cipher using multiple chaos and DNA operations. J King Saud Univ-Com 35(7):101612. https:\/\/doi.org\/10.1016\/j.jksuci.2023.101612","journal-title":"J King Saud Univ-Com"},{"key":"1912_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.107286","volume":"167","author":"YC Chen","year":"2020","unstructured":"Chen YC, Tang CM, Ye RS (2020) Cryptanalysis and improvement of medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 167:107286. https:\/\/doi.org\/10.1016\/j.sigpro.2019.107286","journal-title":"Signal Process"},{"key":"1912_CR16","doi-asserted-by":"publisher","first-page":"145459","DOI":"10.1109\/ACCESS.2021.3123571","volume":"9","author":"W Feng","year":"2021","unstructured":"Feng W, Qin ZT, Zhang J, Ahmad M (2021) Cryptanalysis and improvement of the image encryption scheme based on feistel network and dynamic DNA encoding. IEEE Access 9:145459\u2013145470. https:\/\/doi.org\/10.1109\/ACCESS.2021.3123571","journal-title":"IEEE Access"},{"key":"1912_CR17","doi-asserted-by":"publisher","first-page":"12584","DOI":"10.1109\/ACCESS.2019.2893760","volume":"7","author":"W Feng","year":"2019","unstructured":"Feng W, He YG, Li HM, Li CL (2019) Cryptanalysis and improvement of the image encryption scheme based on 2d logistic-adjusted-sine map. IEEE Access 7:12584\u201312597. https:\/\/doi.org\/10.1109\/ACCESS.2019.2893760","journal-title":"IEEE Access"},{"issue":"1","key":"1912_CR18","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s40747-024-01723-6","volume":"11","author":"F Yan","year":"2025","unstructured":"Yan F, Wang ZQ, Hirota K (2025) Dual medical image watermarking using sru-enhanced network and eicc chaotic map. Complex Intell Syst 11(1):101. https:\/\/doi.org\/10.1007\/s40747-024-01723-6","journal-title":"Complex Intell Syst"},{"key":"1912_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103131","volume":"66","author":"A Belazi","year":"2022","unstructured":"Belazi A, Kharbech S, Aslam MN, Talha M, Xiang W, Iliyasu AM, Abd El-Latif AA (2022) Improved sine-tangent chaotic map with application in medical images encryption. J Inf Secur Appl 66:103131. https:\/\/doi.org\/10.1016\/j.jisa.2022.103131","journal-title":"J Inf Secur Appl"},{"key":"1912_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-024-10841-2","author":"Q Lai","year":"2025","unstructured":"Lai Q, Ji L (2025) An image encryption scheme based on memristive hyperchaos and virus propagation principle with application to driverless technology. Nonlinear Dynam. https:\/\/doi.org\/10.1007\/s11071-024-10841-2","journal-title":"Nonlinear Dynam"},{"issue":"4","key":"1912_CR21","doi-asserted-by":"publisher","first-page":"4505","DOI":"10.1007\/s11071-021-06472-6","volume":"104","author":"ZY Hua","year":"2021","unstructured":"Hua ZY, Zhu ZH, Chen YY, Li YM (2021) Color image encryption using orthogonal latin squares and a new 2D chaotic system. Nonlinear Dynam 104(4):4505\u20134522. https:\/\/doi.org\/10.1007\/s11071-021-06472-6","journal-title":"Nonlinear Dynam"},{"key":"1912_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2022.108489","volume":"195","author":"LY Zhu","year":"2022","unstructured":"Zhu LY, Jiang DH, Ni JQ, Wang XY, Rong XW, Ahmad M, Chen YP (2022) A stable meaningful image encryption scheme using the newly-designed 2D discrete fractional-order chaotic map and bayesian compressive sensing. Signal Process 195:108489. https:\/\/doi.org\/10.1016\/j.sigpro.2022.108489","journal-title":"Signal Process"},{"issue":"15","key":"1912_CR23","doi-asserted-by":"publisher","first-page":"13571","DOI":"10.1007\/s11071-024-09732-3","volume":"112","author":"ZL Man","year":"2024","unstructured":"Man ZL, Gao C, Dai Y, Meng XF (2024) Dynamic rotation medical image encryption scheme based on improved lorenz chaos. Nonlinear Dynam 112(15):13571\u201313597. https:\/\/doi.org\/10.1007\/s11071-024-09732-3","journal-title":"Nonlinear Dynam"},{"issue":"20","key":"1912_CR24","doi-asserted-by":"publisher","first-page":"19487","DOI":"10.1007\/s11071-023-08545-0","volume":"111","author":"X Hu","year":"2023","unstructured":"Hu X, Jiang DH, Ahmad M, Tsafack N, Zhu LY, Zheng MW (2023) Novel 3-D hyperchaotic map with hidden attractor and its application in meaningful image encryption. Nonlinear Dynam 111(20):19487\u201319512. https:\/\/doi.org\/10.1007\/s11071-023-08545-0","journal-title":"Nonlinear Dynam"},{"issue":"7","key":"1912_CR25","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.3390\/e25071005","volume":"25","author":"YP Zhang","year":"2023","unstructured":"Zhang YP, Dong WJ, Zhang J, Ding Q (2023) An image encryption transmission scheme based on a polynomial chaotic map. Entropy-Switz 25(7):1005. https:\/\/doi.org\/10.3390\/e25071005","journal-title":"Entropy-Switz"},{"issue":"4","key":"1912_CR26","doi-asserted-by":"publisher","first-page":"2591","DOI":"10.1103\/PhysRevA.28.2591","volume":"28","author":"P Grassberger","year":"1983","unstructured":"Grassberger P, Procaccia I (1983) Estimation of the kolmogorov entropy from a chaotic signal. Phys Rev A 28(4):2591\u20132593. https:\/\/doi.org\/10.1103\/PhysRevA.28.2591","journal-title":"Phys Rev A"},{"key":"1912_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2024.105308","volume":"152","author":"H Khan","year":"2024","unstructured":"Khan H, Usman MT, Rida I, Koo J (2024) Attention enhanced machine instinctive vision with human-inspired saliency detection. Image Vision Comput 152:105308. https:\/\/doi.org\/10.1016\/j.imavis.2024.105308","journal-title":"Image Vision Comput"},{"key":"1912_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3476477","author":"MT Usman","year":"2024","unstructured":"Usman MT, Khan H, Singh SK, Lee MY, Koo J (2024) Efficient deepfake detection via layer-frozen assisted dual attention network for consumer imaging devices. IEEE T Consum Electr. https:\/\/doi.org\/10.1109\/TCE.2024.3476477","journal-title":"IEEE T Consum Electr"},{"key":"1912_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2024.105195","volume":"149","author":"H Khan","year":"2024","unstructured":"Khan H, Ullah I, Shabaz M, Omer MF, Usman MT, Guellil MS, Koo J (2024) Visionary vigilance: Optimized yolov8 for fallen person detection with large-scale benchmark dataset. Image Vision Comput 149:105195. https:\/\/doi.org\/10.1016\/j.imavis.2024.105195","journal-title":"Image Vision Comput"},{"key":"1912_CR30","doi-asserted-by":"crossref","unstructured":"Zhao YP, Yan HZ, Yu Z (2010) Real-time facial expression recognition based on adaptive canny operator edge detection. 2010 Second International Conference on Multimedia and Information Technology 2:154-157","DOI":"10.1109\/MMIT.2010.100"},{"key":"1912_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.115076","volume":"185","author":"HY Zhao","year":"2024","unstructured":"Zhao HY, Wang SS, Fu ZH (2024) A new image encryption algorithm based on cubic fractal matrix and l-lccml system. Chaos Soliton Fract 185:115076. https:\/\/doi.org\/10.1016\/j.chaos.2024.115076","journal-title":"Chaos Soliton Fract"},{"key":"1912_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124904","volume":"256","author":"D Ustun","year":"2024","unstructured":"Ustun D, Sahinkaya S, Atli N (2024) Developing a secure image encryption technique using a novel s-box constructed through real-coded genetic algorithm\u2019s crossover and mutation operators. Expert Syst Appl 256:124904. https:\/\/doi.org\/10.1016\/j.eswa.2024.124904","journal-title":"Expert Syst Appl"},{"key":"1912_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.115039","volume":"185","author":"S Tang","year":"2024","unstructured":"Tang S, Xu XM, Jiang ZH, Meng DW, Sun KH (2024) An image encryption scheme without additional key transmission based on an n-dimensional closed-loop coupled triangular wave model. Chaos Soliton Fract 185:115039. https:\/\/doi.org\/10.1016\/j.chaos.2024.115039","journal-title":"Chaos Soliton Fract"},{"issue":"21","key":"1912_CR34","doi-asserted-by":"publisher","first-page":"10360","DOI":"10.1007\/s10489-024-05613-9","volume":"54","author":"L Teng","year":"2024","unstructured":"Teng L, Du LB, Leng ZY, Wang XL (2024) Chaotic image encryption based on partial face recognition and DNA diffusion. Appl Intell 54(21):10360\u201310373. https:\/\/doi.org\/10.1007\/s10489-024-05613-9","journal-title":"Appl Intell"},{"issue":"1","key":"1912_CR35","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s11045-020-00739-8","volume":"32","author":"M Kaur","year":"2021","unstructured":"Kaur M, Singh D (2021) Multiobjective evolutionary optimization techniques based hyperchaotic map and their applications in image encryption. Multidim Syst Sign P 32(1):281\u2013301. https:\/\/doi.org\/10.1007\/s11045-020-00739-8","journal-title":"Multidim Syst Sign P"},{"key":"1912_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122052","volume":"238","author":"NR Zhou","year":"2024","unstructured":"Zhou NR, Hu LL, Huang ZW, Wang MM, Luo GS (2024) Novel multiple color images encryption and decryption scheme based on a bit-level extension algorithm. Expert Syst Appl 238:122052. https:\/\/doi.org\/10.1016\/j.eswa.2023.122052","journal-title":"Expert Syst Appl"},{"key":"1912_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2025.126407","volume":"269","author":"TY An","year":"2025","unstructured":"An TY, Gao T, Chen T, Jiang DH, Xu LL, Chen YX, Zhao P (2025) Traffic image encryption based on activation function-type chaotic map and reversible cellular automaton. Expert Syst Appl 269:126407. https:\/\/doi.org\/10.1016\/j.eswa.2025.126407","journal-title":"Expert Syst Appl"},{"issue":"24","key":"1912_CR38","doi-asserted-by":"publisher","first-page":"3917","DOI":"10.3390\/math12243917","volume":"12","author":"W Feng","year":"2024","unstructured":"Feng W, Yang JX, Zhao XY, Qin ZT, Zhang J, Zhu ZG, Wen HP, Qian K (2024) A novel multi-channel image encryption algorithm leveraging pixel reorganization and hyperchaotic maps. Mathematics-Basel 12(24):3917. https:\/\/doi.org\/10.3390\/math12243917","journal-title":"Mathematics-Basel"},{"key":"1912_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102919","volume":"61","author":"S Roy","year":"2021","unstructured":"Roy S, Shrivastava M, Rawat U, Pandey CV, Nayak SK (2021) IESCA: an efficient image encryption scheme using 2-D cellular automata. J Inf Secur Appl 61:102919. https:\/\/doi.org\/10.1016\/j.jisa.2021.102919","journal-title":"J Inf Secur Appl"},{"issue":"2","key":"1912_CR40","doi-asserted-by":"publisher","first-page":"1859","DOI":"10.1007\/s11071-021-06663-1","volume":"105","author":"L Teng","year":"2021","unstructured":"Teng L, Wang XY, Yang FF, Xian YJ (2021) Color image encryption based on cross 2D hyperchaotic map using combined cycle shift scrambling and selecting diffusion. Nonlinear Dynam 105(2):1859\u20131876. https:\/\/doi.org\/10.1007\/s11071-021-06663-1","journal-title":"Nonlinear Dynam"},{"issue":"22","key":"1912_CR41","doi-asserted-by":"publisher","first-page":"34541","DOI":"10.1007\/s11042-023-14988-9","volume":"82","author":"MC Wang","year":"2023","unstructured":"Wang MC, Liu HJ, Zhao MD (2023) Construction of a non-degeneracy 3D chaotic map and application to image encryption with keyed s-box. Multimed Tools Appl 82(22):34541\u201334563. https:\/\/doi.org\/10.1007\/s11042-023-14988-9","journal-title":"Multimed Tools Appl"},{"key":"1912_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123190","volume":"246","author":"W Feng","year":"2024","unstructured":"Feng W, Zhang J, Chen Y, Qin Z, Zhang Y, Ahmad M, Wo\u017aniak M (2024) Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption. Expert Syst Appl 246:123190. https:\/\/doi.org\/10.1016\/j.eswa.2024.123190","journal-title":"Expert Syst Appl"},{"key":"1912_CR43","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/7485621","author":"XS Li","year":"2019","unstructured":"Li XS, Xie ZL, Wu J, Li TY (2019) Image encryption based on dynamic filtering and bit cuboid operations. Complexity. https:\/\/doi.org\/10.1155\/2019\/7485621","journal-title":"Complexity"},{"key":"1912_CR44","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121728","volume":"238","author":"LB Du","year":"2024","unstructured":"Du LB, Teng L, Liu HP, Lu HR (2024) Multiple face images encryption based on a new non-adjacent dynamic coupled mapping lattice. Expert Syst Appl 238:121728. https:\/\/doi.org\/10.1016\/j.eswa.2023.121728","journal-title":"Expert Syst Appl"},{"issue":"3","key":"1912_CR45","doi-asserted-by":"publisher","first-page":"1291","DOI":"10.1109\/tcsi.2021.3133318","volume":"69","author":"XY Wang","year":"2022","unstructured":"Wang XY, Liu PB (2022) A new full chaos coupled mapping lattice and its application in privacy image encryption. IEEE T Circuits-I 69(3):1291\u20131301. https:\/\/doi.org\/10.1109\/tcsi.2021.3133318","journal-title":"IEEE T Circuits-I"},{"issue":"19","key":"1912_CR46","doi-asserted-by":"publisher","first-page":"22863","DOI":"10.1007\/s10489-023-04727-w","volume":"53","author":"Q Lai","year":"2023","unstructured":"Lai Q, Liu Y, Yang L (2023) Image encryption using memristive hyperchaos. Appl Intell 53(19):22863\u201322881. https:\/\/doi.org\/10.1007\/s10489-023-04727-w","journal-title":"Appl Intell"},{"key":"1912_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.115632","volume":"189","author":"DH Jiang","year":"2024","unstructured":"Jiang DH, Njitacke ZT, Long GQ, Awrejcewicz J, Zheng MW, Cai L (2024) Novel tabu learning neuron model with variable activation gradient and its application to secure healthcare. Chaos Soliton Fract 189:115632. https:\/\/doi.org\/10.1016\/j.chaos.2024.115632","journal-title":"Chaos Soliton Fract"},{"key":"1912_CR48","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2023.109107","volume":"211","author":"NR Zhou","year":"2023","unstructured":"Zhou NR, Tong LJ, Zou WP (2023) Multi-image encryption scheme with quaternion discrete fractional tchebyshev moment transform and cross-coupling operation. Signal Process 211:109107. https:\/\/doi.org\/10.1016\/j.sigpro.2023.109107","journal-title":"Signal Process"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-01912-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-025-01912-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-01912-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T11:08:35Z","timestamp":1750331315000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-025-01912-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,4]]},"references-count":48,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["1912"],"URL":"https:\/\/doi.org\/10.1007\/s40747-025-01912-x","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,4]]},"assertion":[{"value":"9 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"All authors read and agreed to participate in the manuscript.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}}],"article-number":"319"}}