{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T12:34:33Z","timestamp":1754483673348,"version":"3.38.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,3,9]],"date-time":"2025-03-09T00:00:00Z","timestamp":1741478400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,9]],"date-time":"2025-03-09T00:00:00Z","timestamp":1741478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-03803-x","type":"journal-article","created":{"date-parts":[[2025,3,9]],"date-time":"2025-03-09T21:10:16Z","timestamp":1741554616000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Multilayer Encryption Scheme Using Vigen\u00e8re Cipher and Chaotic Maps"],"prefix":"10.1007","volume":"6","author":[{"given":"Amit","family":"Paul","sequence":"first","affiliation":[]},{"given":"Rajwinder","family":"Singh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4628-9607","authenticated-orcid":false,"given":"Deep","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,9]]},"reference":[{"key":"3803_CR1","doi-asserted-by":"publisher","first-page":"3878","DOI":"10.3390\/math10203878","volume":"10","author":"PN Lone","year":"2022","unstructured":"Lone PN, Singh D, Stoffova V, Mishra DC, Mir UH, Kumar N. Cryptanalysis and improved image encryption scheme using elliptic curve and affine hill cipher. Mathematics. 2022;10:3878.","journal-title":"Mathematics"},{"key":"3803_CR2","doi-asserted-by":"crossref","unstructured":"Joshi AB, Kumar D, Mishra DC. Security of digital images based on 3D Arnold cat map and elliptic curve. Int J Image Gr. 2020;20.","DOI":"10.1142\/S0219467821500066"},{"key":"3803_CR3","doi-asserted-by":"publisher","first-page":"102087","DOI":"10.1109\/ACCESS.2022.3209376","volume":"10","author":"N Koul","year":"2022","unstructured":"Koul N, Kumar N, Sayeed A, Verma C, Raboaca MS. Data exchange techniques for internet of robotic things: recent developments. IEEE Access. 2022;10:102087\u2013106.","journal-title":"IEEE Access"},{"key":"3803_CR4","doi-asserted-by":"crossref","unstructured":"Nag A, Singh JP, Khan S, Ghosh S. Image encryption using affine transform and XOR operation. In: International conference on signal processing, communication computing and networking technologies. 2011.","DOI":"10.1109\/ICSCCN.2011.6024565"},{"key":"3803_CR5","doi-asserted-by":"crossref","unstructured":"Parida RR, Singh BK, Pradhan C. A novel approach for image encryption using Zaslavskii Map and Arnold\u2019s Cat Map. Data Eng Intell Comput. 2021;269\u201382.","DOI":"10.1007\/978-981-16-0171-2_26"},{"key":"3803_CR6","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.ijleo.2017.07.041","volume":"145","author":"A Vaish","year":"2017","unstructured":"Vaish A, Kumar M. Color image encryption unsing MSVD, DWT and Arnold transform in fractional Fourier domain. Optik. 2017;145:273\u201383.","journal-title":"Optik"},{"key":"3803_CR7","unstructured":"Sankhe P, Pimple S, Singh S, Lahane A. An image cryptography using Henon map and Arnold map. Int Res J Eng Technol. 2018."},{"key":"3803_CR8","unstructured":"Syah RD, Shatril RJ. Digital image cryptography using combination of Arnold Cat map and Bernoulli map based on chaos theory. Int Res J Adv Eng Sci. 2019;2455\u20139024."},{"key":"3803_CR9","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1080\/09500340.2020.1789233","volume":"67","author":"AB Joshi","year":"2020","unstructured":"Joshi AB, Kumar D, Mishra DC, Guleria V. Colour-image encryption based on 2D discrete wavelet transform and 3D logistic chaotic map. J Mod Opt. 2020;67:933\u201349.","journal-title":"J Mod Opt"},{"key":"3803_CR10","unstructured":"Chong Fu, Li W, Meng Z, Wang T, Li X. A symmetric Image Encryption Using Chaotic Baker Map and Lorenz System. In: Ninth International conference on computational intelligence and security: IEEE; 2013."},{"key":"3803_CR11","first-page":"615","volume":"2","author":"S Patel","year":"2021","unstructured":"Patel S, Vaish A. A novel image coding through the chaos theory and compressed sensing. Proc Int Conf Data Sci Appl. 2021;2:615\u201323.","journal-title":"Proc Int Conf Data Sci Appl"},{"key":"3803_CR12","first-page":"129","volume":"70","author":"D Kumar","year":"2020","unstructured":"Kumar D, Joshi AB, Gaffar A. Double color-image encryption based on 2D fractional discrete Fourier transform and Arnold cat map. Ganita. 2020;70:129\u201341.","journal-title":"Ganita"},{"key":"3803_CR13","doi-asserted-by":"crossref","unstructured":"Naeem AE, Joshi AB, Kumar D, Abd El-Samie FE. Low detail encryption algorithm based on diffusion and confusion using Henon and Baker Chaotic Map. Research square 2022.","DOI":"10.21203\/rs.3.rs-1213667\/v1"},{"key":"3803_CR14","first-page":"103","volume":"68","author":"AB Joshi","year":"2018","unstructured":"Joshi AB, Gaffar A. Digital image encryption based on chaotic map and circulant matrix. Ganita. 2018;68:103\u201315.","journal-title":"Ganita"},{"key":"3803_CR15","first-page":"1","volume":"6","author":"MAF Al-Husainy","year":"2012","unstructured":"Al-Husainy MAF. A novel encryption method for image security. Int J Secur Appl. 2012;6:1\u20138.","journal-title":"Int J Secur Appl"},{"key":"3803_CR16","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1016\/j.ins.2020.09.032","volume":"546","author":"Z Hua","year":"2012","unstructured":"Hua Z, Zhu Z, Yi S, Zhang Z, Huang H. Cross-plane color image encryption using a two dimensional logistic tent modular map. Inform Sci. 2012;546:1063\u201383.","journal-title":"Inform Sci"},{"key":"3803_CR17","doi-asserted-by":"publisher","first-page":"2693","DOI":"10.1007\/s11071-019-05157-5","volume":"97","author":"BY Irani","year":"2019","unstructured":"Irani BY, Ayubi P, Jabalkandi FA, Valandar MY, Barani MJ. Digital image scrambling based on a new one dimensional coupled sine map. Nonlinear Dyn. 2019;97:2693\u2013721.","journal-title":"Nonlinear Dyn"},{"key":"3803_CR18","doi-asserted-by":"crossref","unstructured":"Lone PN, Singh D, Mir UH. Image encryption using dna coding and three-dimensional chaotic system, multimedia tools and applications. Springer. 2021.","DOI":"10.1007\/s11042-021-11802-2"},{"issue":"8","key":"3803_CR19","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1109\/TNB.2017.2780881","volume":"16","author":"D Ravichandran","year":"2017","unstructured":"Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R. DNA chaos blend to secure medical privacy. IEEE Trans Nanobiosci. 2017;16(8):850\u20138.","journal-title":"IEEE Trans Nanobiosci"},{"key":"3803_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.169606","volume":"266","author":"A Vaish","year":"2022","unstructured":"Vaish A, Patel S. Securing color images using DNA coding and cosine Stockwell transformation in wavelet domain. Optik. 2022;266: 160606.","journal-title":"Optik"},{"key":"3803_CR21","doi-asserted-by":"publisher","first-page":"6243","DOI":"10.1007\/s11042-017-4534-z","volume":"77","author":"XY Wang","year":"2018","unstructured":"Wang XY, Li P, Zhang YQ, Liu LY, Zhang H, Wang X. A novel color image encryption scheme using DNA permutation based on the Lorenz system. Multimed Tools Appl. 2018;77:6243\u201365.","journal-title":"Multimed Tools Appl"},{"key":"3803_CR22","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S. NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. J Select Areas Telecom. 2011;1:31\u20138.","journal-title":"J Select Areas Telecom"},{"issue":"10","key":"3803_CR23","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1080\/09500340.2021.1924885","volume":"68","author":"PN Lone","year":"2021","unstructured":"Lone PN, Singh D, Mir UH. A Novel color image encryption using random matrix affine cipher and the chaotic maps. J Mod Opt. 2021;68(10):510\u201322.","journal-title":"J Mod Opt"},{"issue":"19","key":"3803_CR24","doi-asserted-by":"publisher","first-page":"25223","DOI":"10.1007\/s11042-018-5782-2","volume":"77","author":"SJ Sheela","year":"2018","unstructured":"Sheela SJ, Suresh SV, Tandur D. Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimedia Tools and Appl. 2018;77(19):25223\u201351.","journal-title":"Multimedia Tools and Appl."},{"key":"3803_CR25","doi-asserted-by":"publisher","first-page":"22023","DOI":"10.1007\/s11042-019-7453-3","volume":"78","author":"Y Luo","year":"2019","unstructured":"Luo Y, Yu J, Lai L. A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimedia Tools Appl. 2019;78:22023\u201343.","journal-title":"Multimedia Tools Appl"},{"key":"3803_CR26","doi-asserted-by":"publisher","first-page":"30931","DOI":"10.1007\/s11042-022-12844-w","volume":"81","author":"F Masood","year":"2022","unstructured":"Masood F, Boulila W, Alsaeedi A, Khan JS, Ahmad J, Khan MA, Rehman SU. A novel image encryption scheme based on Arnold cat map, Newton\u2013Leipnik system and Logistic Gaussian map. Multimedia Tools Appl. 2022;81:30931\u201359.","journal-title":"Multimedia Tools Appl"},{"key":"3803_CR27","doi-asserted-by":"publisher","first-page":"1482","DOI":"10.3390\/sym14071482","volume":"14","author":"J Chen","year":"2022","unstructured":"Chen J, Wu Y, Sun Y, Yang C. Image encryption algorithm using 2-order bit compass coding and chaotic mapping. Symmetry. 2022;14:1482.","journal-title":"Symmetry"},{"key":"3803_CR28","doi-asserted-by":"publisher","first-page":"55","DOI":"10.51983\/ajcst-2018.7.1.1829","volume":"7","author":"P Sharma","year":"2018","unstructured":"Sharma P, Shrivastava R, Sarthi VK, Bhatpahri P. Security analysis of XOR based ciphered image. Asian J Comput Sci Technol. 2018;7:55\u201360.","journal-title":"Asian J Comput Sci Technol"},{"issue":"2.2","key":"3803_CR29","doi-asserted-by":"publisher","first-page":"62","DOI":"10.14419\/ijet.v7i2.2.12734","volume":"7","author":"A Susanto","year":"2018","unstructured":"Susanto A, Khotimah T, Sumadi MT, Waristo J. Image encryption using Vigenere cipher with bit circular shift. Int J Eng Technol. 2018;7(2.2):62\u20134.","journal-title":"Int J Eng Technol"},{"key":"3803_CR30","volume":"50","author":"KC Jithin","year":"2020","unstructured":"Jithin KC, Sankar S. Colour image encryption algorithm combining, Arnold map, DNA sequence operation, and Amandelbrot set. J Inf Secur Appl. 2020;50: 102428.","journal-title":"J Inf Secur Appl"},{"issue":"19","key":"3803_CR31","doi-asserted-by":"publisher","first-page":"25223","DOI":"10.1007\/s11042-018-5782-2","volume":"77","author":"SJ Sheela","year":"2018","unstructured":"Sheela SJ, Suresh KV, Tandur D. Image encryption based on modified Henon map using hybrid chaotic shift trans-form. Multimedia Tools Appl. 2018;77(19):25223\u201351.","journal-title":"Multimedia Tools Appl"},{"key":"3803_CR32","doi-asserted-by":"crossref","unstructured":"Iqbal N, Hanif M, Abbas S, et al. DNA strands level scram-bling based color image encryption scheme. IEEE Access. 2020;8.","DOI":"10.1109\/ACCESS.2020.3025241"},{"key":"3803_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2020.165155","volume":"218","author":"PN Lone","year":"2020","unstructured":"Lone PN, Singh D. Application of algebra and chaos theory in security of color images. Optik. 2020;218: 165155.","journal-title":"Optik"},{"issue":"10","key":"3803_CR34","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1080\/09500340.2020.1789233","volume":"67","author":"AB Joshi","year":"2020","unstructured":"Joshi AB, Kumar D, Mishra DC, et al. Colour image encryption based on 2D discrete wavelet transform and3D logistic chaotic map. J Mod Opt. 2020;67(10):933\u201349.","journal-title":"J Mod Opt"},{"key":"3803_CR35","doi-asserted-by":"publisher","first-page":"16529","DOI":"10.1007\/s11042-016-3926-9","volume":"76","author":"R Bansal","year":"2017","unstructured":"Bansal R, Gupta S, Sharma G. An innovative image encryption scheme based on chaotic map and Vigen\u00e8re scheme. Multimedia Tools Appl. 2017;76:16529\u201362.","journal-title":"Multimedia Tools Appl"},{"key":"3803_CR36","doi-asserted-by":"crossref","unstructured":"Kaddouhi SE, Qobbi Y, Jarjar M, Zaaraoui H, Jarjar A. A new encryption approach that uses an improved Hill-Vigen\u00e8re method and chaotic maps. Multimedia tools and applications. 2024.","DOI":"10.1007\/s11042-024-19472-6"},{"key":"3803_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.169430","volume":"265","author":"M Demirta\u015f","year":"2022","unstructured":"Demirta\u015f M. A new RGB color image encryption scheme based on cross-channel pixel and bit scrambling using chaos. Optik. 2022;265: 169430.","journal-title":"Optik"},{"key":"3803_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2021.107326","volume":"143","author":"N Khalil","year":"2021","unstructured":"Khalil N, Sarhan A, Alshewimy MAM. An efficient color\/grayscale image encryption scheme based on hybrid chaotic maps. Opt Laser Technol. 2021;143: 107326.","journal-title":"Opt Laser Technol"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03803-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-03803-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03803-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,9]],"date-time":"2025-03-09T21:10:22Z","timestamp":1741554622000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-03803-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,9]]},"references-count":38,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["3803"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-03803-x","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,9]]},"assertion":[{"value":"27 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The present research do not have involvement of any Human or Animals testing.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human or animals"}}],"article-number":"262"}}