{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:03:01Z","timestamp":1772283781608,"version":"3.50.1"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,7,17]],"date-time":"2025-07-17T00:00:00Z","timestamp":1752710400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,7,17]],"date-time":"2025-07-17T00:00:00Z","timestamp":1752710400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Manipal University Jaipur"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00178-6","type":"journal-article","created":{"date-parts":[[2025,7,17]],"date-time":"2025-07-17T18:05:59Z","timestamp":1752775559000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["IELTSoC: enhanced image encryption using combined logistic and Tinkerbell maps with second order cellular automata for internet of things"],"prefix":"10.1007","volume":"5","author":[{"given":"Biswarup","family":"Yogi","sequence":"first","affiliation":[]},{"given":"Satyabrata","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Ajoy Kumar","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Umashankar","family":"Rawat","sequence":"additional","affiliation":[]},{"given":"Mahesh","family":"Jangid","sequence":"additional","affiliation":[]},{"given":"Pronaya","family":"Bhattacharya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,17]]},"reference":[{"issue":"5","key":"178_CR1","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MC.2015.152","volume":"48","author":"J Heuer","year":"2015","unstructured":"Heuer J, Hund J, Pfaff O. Toward the web of things: applying web technologies to the physical world. Computer. 2015;48(5):34\u201342.","journal-title":"Computer"},{"key":"178_CR2","doi-asserted-by":"publisher","first-page":"4733","DOI":"10.1007\/s12652-018-0850-z","volume":"10","author":"AM Shaheen","year":"2019","unstructured":"Shaheen AM, Sheltami TR, Al-Kharoubi TM, Shakshuki E. Digital image encryption techniques for wireless sensor networks using image transformation methods: Dct and dwt. J Ambient Intell Humaniz Comput. 2019;10:4733\u201350.","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"1","key":"178_CR3","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s11831-018-9298-8","volume":"27","author":"M Kaur","year":"2020","unstructured":"Kaur M, Kumar V. A comprehensive review on image encryption techniques. Arch Comput Methods Eng. 2020;27(1):15\u201343.","journal-title":"Arch Comput Methods Eng"},{"issue":"1","key":"178_CR4","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/s41315-022-00241-3","volume":"7","author":"K Soppari","year":"2023","unstructured":"Soppari K, Chandra NS. Automated digital image watermarking based on multi-objective hybrid meta-heuristic-based clustering approach. Int J Intell Robot Appl. 2023;7(1):164\u201389.","journal-title":"Int J Intell Robot Appl"},{"key":"178_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2020.106355","volume":"132","author":"T Wang","year":"2020","unstructured":"Wang T, Wang M-H. Hyperchaotic image encryption algorithm based on bit-level permutation and dna encoding. Opt Laser Technol. 2020;132: 106355.","journal-title":"Opt Laser Technol"},{"key":"178_CR6","doi-asserted-by":"publisher","first-page":"88093","DOI":"10.1109\/ACCESS.2020.2990170","volume":"8","author":"MA Malik","year":"2020","unstructured":"Malik MA, Bashir Z, Iqbal N, Imtiaz MA. Color image encryption algorithm based on hyper-chaos and dna computing. IEEE Access. 2020;8:88093\u2013107.","journal-title":"IEEE Access"},{"key":"178_CR7","volume":"54","author":"A Broumandnia","year":"2020","unstructured":"Broumandnia A. Image encryption algorithm based on the finite fields in chaotic maps. J Inf Secur Appl. 2020;54: 102553.","journal-title":"J Inf Secur Appl"},{"key":"178_CR8","volume":"52","author":"KAK Patro","year":"2020","unstructured":"Patro KAK, Soni A, Netam PK, Acharya B. Multiple grayscale image encryption using cross-coupled chaotic maps. J Inf Secur Appl. 2020;52: 102470.","journal-title":"J Inf Secur Appl"},{"key":"178_CR9","volume":"61","author":"S Roy","year":"2021","unstructured":"Roy S, Shrivastava M, Rawat U, Pandey CV, Nayak SK. Iesca: an efficient image encryption scheme using 2-d cellular automata. J Inf Secur Appl. 2021;61: 102919.","journal-title":"J Inf Secur Appl"},{"issue":"3","key":"178_CR10","doi-asserted-by":"publisher","first-page":"2679","DOI":"10.1007\/s11071-021-06923-0","volume":"106","author":"M Shrivastava","year":"2021","unstructured":"Shrivastava M, Roy S, Kumar K, Pandey CV, Grover J. Licca: a lightweight image cipher using 3-d cellular automata. Nonlinear Dyn. 2021;106(3):2679\u2013702.","journal-title":"Nonlinear Dyn"},{"issue":"21","key":"178_CR11","doi-asserted-by":"publisher","first-page":"31529","DOI":"10.1007\/s11042-020-09880-9","volume":"80","author":"S Roy","year":"2021","unstructured":"Roy S, Shrivastava M, Pandey CV, Nayak SK, Rawat U. IEVCA: an efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata. Multimed Tools Appl. 2021;80(21):31529\u201367.","journal-title":"Multimed Tools Appl"},{"key":"178_CR12","first-page":"429","volume-title":"Conference on the theory and application of cryptographic techniques","author":"S Wolfram","year":"1985","unstructured":"Wolfram S. Cryptography with cellular automata. In: Conference on the theory and application of cryptographic techniques. Berlin: Springer; 1985. p. 429\u201332."},{"issue":"2","key":"178_CR13","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/0196-8858(86)90028-X","volume":"7","author":"S Wolfram","year":"1986","unstructured":"Wolfram S. Random sequence generation by cellular automata. Adv Appl Math. 1986;7(2):123\u201369.","journal-title":"Adv Appl Math"},{"key":"178_CR14","volume-title":"A New Kind of Science","author":"S Wolfram","year":"2002","unstructured":"Wolfram S. A New Kind of Science, vol. 5. IL: Wolfram media Champaign; 2002."},{"key":"178_CR15","unstructured":"Wolfram S. Theory and applications of cellular automata. World Scientific, 1986."},{"key":"178_CR16","unstructured":"Ulam S. Random processes and transformations. In: Proceedings of the International Congress on Mathematics, Citeseer; 1952. vol. 2, pp. 264\u2013275."},{"key":"178_CR17","doi-asserted-by":"crossref","unstructured":"Jiang D, Liu L, Zhu L, Wang X, Chen Y, Rong X. An efficient meaningful double-image encryption algorithm based on parallel compressive sensing and frft embedding. Multimed Tools Appl. 2023;1\u201327.","DOI":"10.1007\/s11042-023-14601-z"},{"key":"178_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2020.106501","volume":"132","author":"X Wang","year":"2020","unstructured":"Wang X, Guan N. Chaotic image encryption algorithm based on block theory and reversible mixed cellular automata. Opt Laser Technol. 2020;132: 106501.","journal-title":"Opt Laser Technol"},{"key":"178_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2021.107753","volume":"148","author":"S Wang","year":"2022","unstructured":"Wang S, Peng Q, Du B. Chaotic color image encryption based on 4d chaotic maps and dna sequence. Opt Laser Technol. 2022;148: 107753.","journal-title":"Opt Laser Technol"},{"key":"178_CR20","doi-asserted-by":"crossref","unstructured":"Wang J, Liu L, Xu M, Li, X. A novel content-selected image encryption algorithm based on the ls chaotic model. J King Saud Univ Comput Inf Sci. 2022.","DOI":"10.1016\/j.jksuci.2022.08.007"},{"issue":"3","key":"178_CR21","doi-asserted-by":"publisher","first-page":"7827","DOI":"10.1007\/s11042-023-15958-x","volume":"83","author":"SSAB Aldin","year":"2024","unstructured":"Aldin SSAB, Aykac M, Aldin NB. Quad-color image encryption based on chaos and fibonacci q-matrix. Multimed Tools Appl. 2024;83(3):7827\u201346.","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"178_CR22","doi-asserted-by":"publisher","first-page":"12211","DOI":"10.1007\/s11042-022-13724-z","volume":"82","author":"A Khaldi","year":"2023","unstructured":"Khaldi A, Kafi MR, Boukhamla AZE. Deformable model segmentation for range image watermarking. Multimed Tools Appl. 2023;82(8):12211\u201327.","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"178_CR23","doi-asserted-by":"publisher","first-page":"7901","DOI":"10.1007\/s11042-022-13649-7","volume":"82","author":"K Amine","year":"2023","unstructured":"Amine K, Redouane K, Bilel M. A redundant wavelet based medical image watermarking scheme for secure transmission in telemedicine applications. Multimed Tools Appl. 2023;82(5):7901\u201315.","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"178_CR24","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1080\/13682199.2023.2182547","volume":"71","author":"P Mathivanan","year":"2023","unstructured":"Mathivanan P, Maran P. A color image encryption scheme using customized map. Imaging Sci J. 2023;71(4):343\u201361.","journal-title":"Imaging Sci J"},{"key":"178_CR25","doi-asserted-by":"crossref","unstructured":"Farri E, Ayubi P. A robust digital video watermarking based on ct-svd domain and chaotic dna sequences for copyright protection. J Ambient Intell Humaniz Comput. 2022:1\u201325.","DOI":"10.1007\/s12652-022-03771-7"},{"key":"178_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2020.115829","volume":"84","author":"H Zhang","year":"2020","unstructured":"Zhang H, Wang X-Q, Sun Y-J, Wang X-Y. A novel method for lossless image compression and encryption based on lwt, spiht and cellular automata. Signal Process Image Commun. 2020;84: 115829.","journal-title":"Signal Process Image Commun"},{"key":"178_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2022.116793","volume":"107","author":"Y Wang","year":"2022","unstructured":"Wang Y, Shang Y, Shao Z, Zhang Y, Coatrieux G, Ding H, Liu T. Multiple color image encryption based on cascaded quaternion gyrator transforms. Signal Process Image Commun. 2022;107: 116793.","journal-title":"Signal Process Image Commun"},{"key":"178_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117861","volume":"206","author":"B Jasra","year":"2022","unstructured":"Jasra B, Moon AH. Color image encryption and authentication using dynamic dna encoding and hyper chaotic system. Expert Syst Appl. 2022;206: 117861.","journal-title":"Expert Syst Appl"},{"issue":"9","key":"178_CR29","doi-asserted-by":"publisher","first-page":"4961","DOI":"10.1007\/s00521-018-3913-3","volume":"32","author":"X Chai","year":"2020","unstructured":"Chai X, Fu X, Gan Z, Zhang Y, Lu Y, Chen Y. An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata. Neural Comput Appl. 2020;32(9):4961\u201388.","journal-title":"Neural Comput Appl"},{"issue":"3","key":"178_CR30","doi-asserted-by":"publisher","first-page":"2877","DOI":"10.1007\/s11071-020-05625-3","volume":"100","author":"PK Naskar","year":"2020","unstructured":"Naskar PK, Bhattacharyya S, Nandy D, Chaudhuri A. A robust image encryption scheme using chaotic tent map and cellular automata. Nonlinear Dyn. 2020;100(3):2877\u201398.","journal-title":"Nonlinear Dyn"},{"key":"178_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.112017","volume":"158","author":"Q Lai","year":"2022","unstructured":"Lai Q, Lai C, Zhang H, Li C. Hidden coexisting hyperchaos of new memristive neuron model and its application in image encryption. Chaos Solitons Fractals. 2022;158: 112017.","journal-title":"Chaos Solitons Fractals"},{"key":"178_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.112380","volume":"161","author":"S Zhou","year":"2022","unstructured":"Zhou S, Zhao Z, Wang X. Novel chaotic colour image cryptosystem with deep learning. Chaos Solitons Fractals. 2022;161: 112380.","journal-title":"Chaos Solitons Fractals"},{"key":"178_CR33","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1016\/j.ins.2019.10.028","volume":"512","author":"Y Khedmati","year":"2020","unstructured":"Khedmati Y, Parvaz R, Behroo Y. 2d hybrid chaos map for image security transform based on framelet and cellular automata. Inf Sci. 2020;512:855\u201379.","journal-title":"Inf Sci"},{"key":"178_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2021.111631","volume":"155","author":"M Yildirim","year":"2022","unstructured":"Yildirim M. Optical color image encryption scheme with a novel dna encoding algorithm based on a chaotic circuit. Chaos Solitons Fractals. 2022;155: 111631.","journal-title":"Chaos Solitons Fractals"},{"issue":"2","key":"178_CR35","first-page":"1","volume":"10","author":"S Sun","year":"2018","unstructured":"Sun S. A novel hyperchaotic image encryption scheme based on dna encoding, pixel-level scrambling and bit-level scrambling. IEEE Photonics J. 2018;10(2):1\u201314.","journal-title":"IEEE Photonics J"},{"issue":"4","key":"178_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JPHOT.2018.2858823","volume":"10","author":"X Zhang","year":"2018","unstructured":"Zhang X, Zhou Z, Niu Y. An image encryption method based on the feistel network and dynamic dna encoding. IEEE Photonics J. 2018;10(4):1\u201314.","journal-title":"IEEE Photonics J"},{"key":"178_CR37","doi-asserted-by":"crossref","unstructured":"Alexan W, El-Damak D, Gabr M. Image encryption based on Fourier-DNA coding for hyperchaotic chen system, chen-based binary quantization s-box, and variable-base modulo operation. IEEE Access. 2024.","DOI":"10.1109\/ACCESS.2024.3363018"},{"key":"178_CR38","doi-asserted-by":"crossref","unstructured":"Alexan W, Gabr M, Mamdouh E, Elias R, Aboshousha A. Color image cryptosystem based on sine chaotic map, 4d chen hyperchaotic map of fractional-order and hybrid dna coding. IEEE Access. 2023.","DOI":"10.1109\/ACCESS.2023.3282160"},{"key":"178_CR39","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.ins.2016.01.078","volume":"345","author":"Y-G Yang","year":"2016","unstructured":"Yang Y-G, Tian J, Lei H, Zhou Y-H, Shi W-M. Novel quantum image encryption using one-dimensional quantum cellular automata. Inf Sci. 2016;345:257\u201370.","journal-title":"Inf Sci"},{"key":"178_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2019.164000","volume":"203","author":"A Babaei","year":"2020","unstructured":"Babaei A, Motameni H, Enayatifar R. A new permutation-diffusion-based image encryption technique using cellular automata and dna sequence. Optik. 2020;203: 164000.","journal-title":"Optik"},{"issue":"5","key":"178_CR41","doi-asserted-by":"publisher","first-page":"504","DOI":"10.3390\/e21050504","volume":"21","author":"W Zhang","year":"2019","unstructured":"Zhang W, Zhu Z, Yu H. A symmetric image encryption algorithm based on a coupled logistic-Bernoulli map and cellular automata diffusion strategy. Entropy. 2019;21(5):504.","journal-title":"Entropy"},{"key":"178_CR42","doi-asserted-by":"publisher","first-page":"17535","DOI":"10.1007\/s11042-018-7130-y","volume":"78","author":"N Nasrullah","year":"2019","unstructured":"Nasrullah N, Sang J, Mateen M, Akbar MA, Xiang H, Xia X. Reversible data hiding in compressed and encrypted images by using kd-tree. Multimed Tools Appl. 2019;78:17535\u201354.","journal-title":"Multimed Tools Appl"},{"key":"178_CR43","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.sigpro.2017.04.006","volume":"141","author":"J Wu","year":"2017","unstructured":"Wu J, Liao X, Yang B. Color image encryption based on chaotic systems and elliptic curve elgamal scheme. Signal Process. 2017;141:109\u201324.","journal-title":"Signal Process"},{"issue":"1","key":"178_CR44","first-page":"3","volume":"5","author":"J Von Neumann","year":"1966","unstructured":"Von Neumann J, Burks AW. Theory of self-reproducing automata. IEEE Trans Neural Netw. 1966;5(1):3\u201314.","journal-title":"IEEE Trans Neural Netw"},{"issue":"12","key":"178_CR45","doi-asserted-by":"publisher","first-page":"1346","DOI":"10.1109\/12.338094","volume":"43","author":"S Nandi","year":"1994","unstructured":"Nandi S, Kar B, Chaudhuri PP. Theory and applications of cellular automata in cryptography. IEEE Trans Comput. 1994;43(12):1346\u201357.","journal-title":"IEEE Trans Comput"},{"issue":"1","key":"178_CR46","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/BF00971964","volume":"5","author":"DR Chowdhury","year":"1994","unstructured":"Chowdhury DR, Sengupta I, Chaudhuri PP. A class of two-dimensional cellular automata and their applications in random pattern testing. J Electron Test. 1994;5(1):67\u201382.","journal-title":"J Electron Test"},{"issue":"12","key":"178_CR47","doi-asserted-by":"publisher","first-page":"2640","DOI":"10.3390\/app8122640","volume":"8","author":"A Ouannas","year":"2018","unstructured":"Ouannas A, Khennaoui A-A, Bendoukha S, Vo TP, Pham V-T, Huynh VV. The fractional form of the Tinkerbell map is chaotic. Appl Sci. 2018;8(12):2640.","journal-title":"Appl Sci"},{"key":"178_CR48","unstructured":"Taylor R. Logistic maps and synchronization. PhD thesis, Brigham Young University. 2007."},{"issue":"5","key":"178_CR49","doi-asserted-by":"publisher","first-page":"2557","DOI":"10.1016\/j.chaos.2007.10.049","volume":"40","author":"A Kanso","year":"2009","unstructured":"Kanso A, Smaoui N. Logistic chaotic maps for binary numbers generations. Chaos Solitons Fractals. 2009;40(5):2557\u201368.","journal-title":"Chaos Solitons Fractals"},{"issue":"6","key":"178_CR50","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/MAP.2010.5723276","volume":"52","author":"S \u015eahin","year":"2010","unstructured":"\u015eahin S, G\u00fczelis C. Chaotification of real systems by dynamic state feedback. IEEE Antennas Propag Mag. 2010;52(6):222\u201333.","journal-title":"IEEE Antennas Propag Mag"},{"issue":"12","key":"178_CR51","doi-asserted-by":"publisher","first-page":"1836","DOI":"10.1016\/j.optlaseng.2012.06.002","volume":"50","author":"J Jin","year":"2012","unstructured":"Jin J. An image encryption based on elementary cellular automata. Opt Lasers Eng. 2012;50(12):1836\u201343.","journal-title":"Opt Lasers Eng"},{"issue":"23","key":"178_CR52","doi-asserted-by":"publisher","first-page":"5415","DOI":"10.1016\/j.optcom.2011.08.013","volume":"284","author":"C Fu","year":"2011","unstructured":"Fu C, Lin B-B, Miao Y-S, Liu X, Chen J-J. A novel chaos-based bit-level permutation scheme for digital image encryption. Opt Commun. 2011;284(23):5415\u201323.","journal-title":"Opt Commun"},{"issue":"1","key":"178_CR53","first-page":"9597619","volume":"2020","author":"I Yasser","year":"2020","unstructured":"Yasser I, Khalifa F, Mohamed MA, Samrah AS. A new image encryption scheme based on hybrid chaotic maps. Complexity. 2020;2020(1):9597619.","journal-title":"Complexity"},{"issue":"1\u20132","key":"178_CR54","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s11071-012-0707-5","volume":"72","author":"X-J Tong","year":"2013","unstructured":"Tong X-J, Wang Z, Zhang M, Liu Y. A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. Nonlinear Dyn. 2013;72(1\u20132):229\u201341.","journal-title":"Nonlinear Dyn"},{"key":"178_CR55","first-page":"117","volume":"45","author":"B Mondal","year":"2019","unstructured":"Mondal B, Singh S, Kumar P. A secure image encryption scheme based on cellular automata and chaotic skew tent map. J Inf Secur Appl. 2019;45:117\u201330.","journal-title":"J Inf Secur Appl"},{"key":"178_CR56","doi-asserted-by":"publisher","first-page":"32842","DOI":"10.1109\/ACCESS.2023.3255779","volume":"11","author":"J De La Rosa-De La","year":"2023","unstructured":"De La Rosa-De La J, Murgu\u00eda J, Mej\u00eda-Carlos M, Lastras-Monta\u00f1o M\u00c1. Design and implementation of a configurable encryption system for power-constrained devices. IEEE Access. 2023;11:32842\u201356.","journal-title":"IEEE Access"},{"issue":"5","key":"178_CR57","doi-asserted-by":"publisher","first-page":"7253","DOI":"10.1007\/s11042-021-11812-0","volume":"81","author":"P Sarosh","year":"2022","unstructured":"Sarosh P, Parah SA, Bhat GM. An efficient image encryption scheme for healthcare applications. Multimed Tools Appl. 2022;81(5):7253\u201370.","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"178_CR58","doi-asserted-by":"publisher","first-page":"1859","DOI":"10.1007\/s11071-021-06663-1","volume":"105","author":"L Teng","year":"2021","unstructured":"Teng L, Wang X, Yang F, Xian Y. Color image encryption based on cross 2d hyperchaotic map using combined cycle shift scrambling and selecting diffusion. Nonlinear Dyn. 2021;105(2):1859\u201376.","journal-title":"Nonlinear Dyn"},{"issue":"18","key":"178_CR59","doi-asserted-by":"publisher","first-page":"26073","DOI":"10.1007\/s11042-019-07766-z","volume":"78","author":"HR Shakir","year":"2019","unstructured":"Shakir HR. An image encryption method based on selective aes coding of wavelet transform and chaotic pixel shuffling. Multimed Tools Appl. 2019;78(18):26073\u201387.","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"178_CR60","doi-asserted-by":"publisher","first-page":"341","DOI":"10.3390\/e23030341","volume":"23","author":"Y Pourasad","year":"2021","unstructured":"Pourasad Y, Ranjbarzadeh R, Mardani A. A new algorithm for digital image encryption based on chaos theory. Entropy. 2021;23(3):341.","journal-title":"Entropy"},{"key":"178_CR61","doi-asserted-by":"publisher","first-page":"2753","DOI":"10.1007\/s11042-020-09648-1","volume":"80","author":"A Pourjabbar Kari","year":"2021","unstructured":"Pourjabbar Kari A, Habibizad Navin A, Bidgoli AM, Mirnia M. A new image encryption scheme based on hybrid chaotic maps. Multimed Tools Appl. 2021;80:2753\u201372.","journal-title":"Multimed Tools Appl"},{"key":"178_CR62","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.cnsns.2017.12.017","volume":"60","author":"S Amina","year":"2018","unstructured":"Amina S, Mohamed FK. An efficient and secure chaotic cipher algorithm for image content preservation. Commun Nonlinear Sci Numer Simul. 2018;60:12\u201332.","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"6","key":"178_CR63","doi-asserted-by":"publisher","first-page":"17429","DOI":"10.1007\/s11042-023-16118-x","volume":"83","author":"R Dehghani","year":"2024","unstructured":"Dehghani R, Kheiri H. Chaotic-based color image encryption using a hybrid method of reversible cellular automata and dna sequences. Multimed Tools Appl. 2024;83(6):17429\u201350.","journal-title":"Multimed Tools Appl"},{"key":"178_CR64","doi-asserted-by":"publisher","first-page":"24701","DOI":"10.1007\/s11042-018-5669-2","volume":"77","author":"G Maddodi","year":"2018","unstructured":"Maddodi G, Awad A, Awad D, Awad M, Lee B. A new image encryption algorithm based on heterogeneous chaotic neural network generator and dna encoding. Multimed Tools Appl. 2018;77:24701\u201325.","journal-title":"Multimed Tools Appl"},{"issue":"15","key":"178_CR65","doi-asserted-by":"publisher","first-page":"44903","DOI":"10.1007\/s11042-023-17236-2","volume":"83","author":"PK Pal","year":"2024","unstructured":"Pal PK, Kumar D, Agarwal V. Efficient image encryption using the Tinkerbell map in conjunction with linear feedback shift registers. Multimed Tools Appl. 2024;83(15):44903\u201332.","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"178_CR66","doi-asserted-by":"publisher","first-page":"3075","DOI":"10.1016\/j.cnsns.2013.04.008","volume":"18","author":"X Wang","year":"2013","unstructured":"Wang X, Luan D. A novel image encryption algorithm using chaos and reversible cellular automata. Commun Nonlinear Sci Numer Simul. 2013;18(11):3075\u201385.","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"178_CR67","doi-asserted-by":"crossref","unstructured":"Kaur M, Kumar V. A comprehensive review on image encryption techniques. Arch Comput Methods Eng. 2018:1\u201329.","DOI":"10.1007\/s11831-018-9298-8"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00178-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00178-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00178-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T14:06:14Z","timestamp":1757253974000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00178-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,17]]},"references-count":67,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["178"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00178-6","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,17]]},"assertion":[{"value":"27 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"None.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human participants and\/or animals"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"78"}}