{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T17:50:12Z","timestamp":1770745812397,"version":"3.49.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T00:00:00Z","timestamp":1695168000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T00:00:00Z","timestamp":1695168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-023-02172-7","type":"journal-article","created":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T13:02:12Z","timestamp":1695214932000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["An Image Encryption Algorithm Based on Trivium Cipher and Random Substitution"],"prefix":"10.1007","volume":"4","author":[{"given":"Yousef","family":"Alghamdi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3126-8945","authenticated-orcid":false,"given":"Arslan","family":"Munir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,20]]},"reference":[{"key":"2172_CR1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.FIPS.197","volume-title":"Advanced Encryption Standard (AES). Federal Information Processing Standards (NIST FIPS)","author":"M Dworkin","year":"2001","unstructured":"Dworkin M, Barker E, Nechvatal J, Foti J, Bassham L, Roback E, Dray J. Advanced Encryption Standard (AES). Federal Information Processing Standards (NIST FIPS). Gaithersburg: National Institute of Standards and Technology; 2001. https:\/\/doi.org\/10.6028\/NIST.FIPS.197."},{"key":"2172_CR2","unstructured":"Pub F. Data encryption standard (des). FIPS PUB. 1999, pp. 46\u20133."},{"key":"2172_CR3","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ins.2020.10.048","volume":"550","author":"MZ Talhaoui","year":"2021","unstructured":"Talhaoui MZ, Wang X. A new fractional one dimensional chaotic map and its application in high-speed image encryption. Inf Sci. 2021;550:13\u201326.","journal-title":"Inf Sci"},{"key":"2172_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2021.107252","volume":"142","author":"X Gao","year":"2021","unstructured":"Gao X. Image encryption algorithm based on 2D hyperchaotic map. Opt Laser Technol. 2021;142: 107252.","journal-title":"Opt Laser Technol"},{"issue":"10","key":"2172_CR5","doi-asserted-by":"publisher","first-page":"1344","DOI":"10.3390\/e24101344","volume":"24","author":"Y Alghamdi","year":"2022","unstructured":"Alghamdi Y, Munir A, Ahmad J. A lightweight image encryption algorithm based on chaotic map and random substitution. Entropy. 2022;24(10):1344. https:\/\/doi.org\/10.3390\/e24101344.","journal-title":"Entropy"},{"key":"2172_CR6","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun C-M, Chen CP. 2D sine logistic modulation map for image encryption. Inf Sci. 2015;297:80\u201394.","journal-title":"Inf Sci"},{"key":"2172_CR7","doi-asserted-by":"publisher","first-page":"12966","DOI":"10.1109\/ACCESS.2022.3146792","volume":"10","author":"J Arif","year":"2022","unstructured":"Arif J, Khan MA, Ghaleb B, Ahmad J, Munir A, Rashid U, Al-Dubai A. A novel chaotic permutation-substitution image encryption scheme based on logistic map and random substitution. IEEE Access. 2022;10:12966\u201382.","journal-title":"IEEE Access"},{"key":"2172_CR8","doi-asserted-by":"publisher","first-page":"25664","DOI":"10.1109\/ACCESS.2020.2970806","volume":"8","author":"Q Lu","year":"2020","unstructured":"Lu Q, Zhu C, Deng X. An efficient image encryption scheme based on the LSS chaotic map and single s-box. IEEE Access. 2020;8:25664\u201378.","journal-title":"IEEE Access"},{"key":"2172_CR9","doi-asserted-by":"publisher","first-page":"181434","DOI":"10.1109\/ACCESS.2019.2946890","volume":"7","author":"T-Y Wu","year":"2019","unstructured":"Wu T-Y, Fan X, Wang K-H, Lai C-F, Xiong N, Wu JM-T. A DNA computation-based image encryption scheme for cloud CCTV systems. IEEE Access. 2019;7:181434\u201343.","journal-title":"IEEE Access"},{"key":"2172_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2021.106626","volume":"143","author":"Y Zhang","year":"2021","unstructured":"Zhang Y, Zhang L, Zhong Z, Yu L, Shan M, Zhao Y. Hyperchaotic image encryption using phase-truncated fractional Fourier transform and DNA-level operation. Opt Lasers Eng. 2021;143: 106626.","journal-title":"Opt Lasers Eng"},{"issue":"6","key":"2172_CR11","doi-asserted-by":"publisher","first-page":"3241","DOI":"10.1007\/s40747-021-00515-6","volume":"7","author":"M Uddin","year":"2021","unstructured":"Uddin M, Jahan F, Islam MK, Rakib Hassan M. A novel DNA-based key scrambling technique for image encryption. Complex Intell Syst. 2021;7(6):3241\u201358.","journal-title":"Complex Intell Syst"},{"issue":"7","key":"2172_CR12","doi-asserted-by":"publisher","first-page":"9355","DOI":"10.1007\/s11042-018-6516-1","volume":"78","author":"D Xiao","year":"2019","unstructured":"Xiao D, Kulsoom A, Hashmi MA, Abbas SA, et al. Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules. Multimed Tools Appl. 2019;78(7):9355\u201382.","journal-title":"Multimed Tools Appl"},{"key":"2172_CR13","doi-asserted-by":"publisher","first-page":"25650","DOI":"10.1109\/ACCESS.2020.2970981","volume":"8","author":"M Samiullah","year":"2020","unstructured":"Samiullah M, Aslam W, Nazir H, Lali MI, Shahzad B, Mufti MR, Afzal H. An image encryption scheme based on DNA computing and multiple chaotic systems. IEEE Access. 2020;8:25650\u201363.","journal-title":"IEEE Access"},{"key":"2172_CR14","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.optlaseng.2018.11.010","volume":"115","author":"X-Y Wang","year":"2019","unstructured":"Wang X-Y, Li Z-M. A color image encryption algorithm based on hopfield chaotic neural network. Opt Lasers Eng. 2019;115:107\u201318.","journal-title":"Opt Lasers Eng"},{"key":"2172_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2021.111318","volume":"152","author":"Z Man","year":"2021","unstructured":"Man Z, Li J, Di X, Sheng Y, Liu Z. Double image encryption algorithm based on neural network and chaos. Chaos Solitons Fractals. 2021;152: 111318.","journal-title":"Chaos Solitons Fractals"},{"key":"2172_CR16","doi-asserted-by":"publisher","first-page":"220646","DOI":"10.1109\/ACCESS.2020.3043240","volume":"8","author":"Y Dou","year":"2020","unstructured":"Dou Y, Li M. An image encryption algorithm based on compressive sensing and m sequence. IEEE Access. 2020;8:220646\u201357.","journal-title":"IEEE Access"},{"key":"2172_CR17","doi-asserted-by":"publisher","first-page":"40838","DOI":"10.1109\/ACCESS.2020.2976798","volume":"8","author":"M Zhang","year":"2020","unstructured":"Zhang M, Tong X-J, Liu J, Wang Z, Liu J, Liu B, Ma J. Image compression and encryption scheme based on compressive sensing and Fourier transform. IEEE Access. 2020;8:40838\u201349.","journal-title":"IEEE Access"},{"key":"2172_CR18","doi-asserted-by":"publisher","first-page":"170168","DOI":"10.1109\/ACCESS.2019.2955570","volume":"7","author":"P Ping","year":"2019","unstructured":"Ping P, Fu J, Mao Y, Xu F, Gao J. Meaningful encryption: generating visually meaningful encrypted images by compressive sensing and reversible color transformation. IEEE Access. 2019;7:170168\u201384.","journal-title":"IEEE Access"},{"key":"2172_CR19","unstructured":"Canniere CD, Preneel B. Trivium specifications. eSTREAM, ECRYPT Stream Cipher Project. 2006. Accessed 10 Oct 2022."},{"issue":"4","key":"2172_CR20","doi-asserted-by":"publisher","first-page":"2457","DOI":"10.1109\/TDSC.2021.3059454","volume":"19","author":"MA Qureshi","year":"2022","unstructured":"Qureshi MA, Munir A. PUF-RAKE: a PUF-based robust and lightweight authentication and key establishment protocol. IEEE Trans Depend Secure Comput (TDSC). 2022;19(4):2457\u201375.","journal-title":"IEEE Trans Depend Secure Comput (TDSC)"},{"key":"2172_CR21","unstructured":"USC-SIPI Image Database. Volume 3: Miscellaneous. 2022. Accessed 10 Oct."},{"issue":"2","key":"2172_CR22","first-page":"525","volume":"52","author":"S Etemadi Borujeni","year":"2013","unstructured":"Etemadi Borujeni S, Eshghi M. Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommun Syst. 2013;52(2):525\u201337.","journal-title":"Telecommun Syst"},{"key":"2172_CR23","doi-asserted-by":"publisher","DOI":"10.3390\/e21060577","author":"SS Moafimadani","year":"2019","unstructured":"Moafimadani SS, Chen Y, Tang C. A new algorithm for medical color images encryption using chaotic systems. Entropy. 2019. https:\/\/doi.org\/10.3390\/e21060577.","journal-title":"Entropy"},{"issue":"3","key":"2172_CR24","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s11220-011-0062-5","volume":"12","author":"OS Faragallah","year":"2011","unstructured":"Faragallah OS. Digital image encryption based on the rc5 block cipher algorithm. Sens Imaging. 2011;12(3):73\u201394.","journal-title":"Sens Imaging"},{"key":"2172_CR25","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","volume":"128","author":"A Belazi","year":"2016","unstructured":"Belazi A, Abd El-Latif AA, Belghith S. A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process. 2016;128:155\u201370.","journal-title":"Signal Process"},{"issue":"3","key":"2172_CR26","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE. A mathematical theory of communication. Bell Syst Tech J. 1948;27(3):379\u2013423.","journal-title":"Bell Syst Tech J"},{"key":"2172_CR27","doi-asserted-by":"crossref","unstructured":"Jawad LM. A novel region of interest for selective color image encryption technique based on new combination between GLCM texture features. In: 2021 National Computing Colleges Conference (NCCC), IEEE, 2021, pp. 1\u20136.","DOI":"10.1109\/NCCC49330.2021.9428802"},{"issue":"6","key":"2172_CR28","doi-asserted-by":"publisher","first-page":"3753","DOI":"10.3233\/JIFS-17656","volume":"33","author":"FA Khan","year":"2017","unstructured":"Khan FA, Ahmed J, Khan JS, Ahmad J, Khan MA. A novel image encryption based on Lorenz equation, ginger breadman chaotic map and s 8 permutation. J Intell Fuzzy Syst. 2017;33(6):3753\u201365.","journal-title":"J Intell Fuzzy Syst"},{"issue":"9","key":"2172_CR29","doi-asserted-by":"publisher","first-page":"3106","DOI":"10.1016\/j.cnsns.2014.02.011","volume":"19","author":"A Anees","year":"2014","unstructured":"Anees A, Siddiqui AM, Ahmed F. Chaotic substitution for highly autocorrelated data in encryption algorithm. Commun Nonlinear Sci Numer Simul. 2014;19(9):3106\u201318.","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"2172_CR30","first-page":"25","volume":"23","author":"J Ahmad","year":"2010","unstructured":"Ahmad J, Ahmed F. Efficiency analysis and security evaluation of image encryption schemes. Computing. 2010;23:25.","journal-title":"Computing"},{"key":"2172_CR31","doi-asserted-by":"crossref","unstructured":"Khan J, Ahmad J, Hwang SO. An efficient image encryption scheme based on: Henon map, skew tent map and s-box. In: 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO), IEEE, 2015, pp. 1\u20136.","DOI":"10.1109\/ICMSAO.2015.7152261"},{"issue":"3","key":"2172_CR32","doi-asserted-by":"publisher","first-page":"443","DOI":"10.3390\/sym14030443","volume":"14","author":"W Alexan","year":"2022","unstructured":"Alexan W, ElBeltagy M, Aboshousha A. Rgb image encryption through cellular automata, s-box and the Lorenz system. Symmetry. 2022;14(3):443.","journal-title":"Symmetry"},{"issue":"12","key":"2172_CR33","doi-asserted-by":"publisher","first-page":"16353","DOI":"10.1007\/s11042-022-12441-x","volume":"81","author":"M Khan","year":"2022","unstructured":"Khan M, Khan L, Hazzazi MM, Jamal SS, Hussain I. Image encryption scheme for multi-focus images for visual sensors network. Multimed Tools Appl. 2022;81(12):16353\u201370.","journal-title":"Multimed Tools Appl"},{"key":"2172_CR34","doi-asserted-by":"publisher","first-page":"140876","DOI":"10.1109\/ACCESS.2020.3012912","volume":"8","author":"A Qayyum","year":"2020","unstructured":"Qayyum A, Ahmad J, Boulila W, Rubaiee S, Masood F, Khan F, Buchanan WJ, et al. Chaos-based confusion and diffusion of image pixels using dynamic substitution. IEEE Access. 2020;8:140876\u201395.","journal-title":"IEEE Access"},{"issue":"2","key":"2172_CR35","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S, et al. NPCR and UACI randomness tests for image encryption. Cyber J. 2011;1(2):31\u20138.","journal-title":"Cyber J"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-02172-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-023-02172-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-02172-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T13:04:16Z","timestamp":1695215056000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-023-02172-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,20]]},"references-count":35,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2023,11]]}},"alternative-id":["2172"],"URL":"https:\/\/doi.org\/10.1007\/s42979-023-02172-7","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,20]]},"assertion":[{"value":"1 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 July 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests as defined by Springer, or other interests that might be perceived to influence the results and\/or discussion reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"The authors declare that they have no conflicts of interest. This article does not contain any studies involving human participants and\/or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Standards"}}],"article-number":"713"}}