{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T21:03:42Z","timestamp":1767647022655,"version":"3.48.0"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T00:00:00Z","timestamp":1763424000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T00:00:00Z","timestamp":1763424000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s44443-025-00272-3","type":"journal-article","created":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T10:46:05Z","timestamp":1763462765000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multiple face encryption based on non-adjacent coupled map lattice and improved YOLOv8 algorithm"],"prefix":"10.1007","volume":"37","author":[{"given":"Wei","family":"Li","sequence":"first","affiliation":[]},{"given":"Lingling","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Chengye","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Yunong","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,18]]},"reference":[{"key":"272_CR1","doi-asserted-by":"crossref","unstructured":"Abbasi AA, Mazinani M, Hosseini R (2020) Chaotic evolutionary-based image encryption using RNA codons and amino acid truth table. Optics Laser Technol 132","DOI":"10.1016\/j.optlastec.2020.106465"},{"key":"272_CR2","doi-asserted-by":"publisher","unstructured":"Abusham E, Ibrahim B, Zia K, Rehman M (2023) Facial image encryption for secure face recognition system. Electronics 12 (3). https:\/\/doi.org\/10.3390\/electronics12030774","DOI":"10.3390\/electronics12030774"},{"key":"272_CR3","doi-asserted-by":"publisher","unstructured":"Alexan W, Youssef M, Hussein HH, Ahmed KK, Hosny KM, Fathy A, Mansour MBM (2025) A new multiple image encryption algorithm using hyperchaotic systems, SVD, and modified RC5. Sci Rep 15(1) . https:\/\/doi.org\/10.1038\/s41598-025-92065-x","DOI":"10.1038\/s41598-025-92065-x"},{"key":"272_CR4","doi-asserted-by":"publisher","unstructured":"Alsafyani M, Alhomayani F, Alsuwat H, Alsuwat E (2023) Face image encryption based on feature with optimization using secure crypto general adversarial neural network and optical chaotic map. Sensors 23(3). https:\/\/doi.org\/10.3390\/s23031415","DOI":"10.3390\/s23031415"},{"issue":"8","key":"272_CR5","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li SJ (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 16(8):2129\u20132151","journal-title":"Int J Bifurcat Chaos"},{"key":"272_CR6","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.ins.2020.07.007","volume":"542","author":"M Asgari-Chenaghlu","year":"2021","unstructured":"Asgari-Chenaghlu M, Feizi-Derakhshi MR, Nikzad-Khasmakhi N, Feizi-Derakhshi AR, Ramezani M, Jahanbakhsh-Nagadeh Z, Rahkar-Farshi T, Zafarani-Moattar E, Ranjbar-Khadivi M, Balafar MA (2021) Cy: chaotic yolo for user intended image encryption and sharing in social media. Inf Sci 542:212\u2013227","journal-title":"Inf Sci"},{"issue":"3","key":"272_CR7","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"GR Chen","year":"2004","unstructured":"Chen GR, Mao YB, Chui CK (2004) A symmetric image cryptographic scheme based on 3D chaotic cat maps. Chaos Solitons Fract 21(3):749\u2013761","journal-title":"Chaos Solitons Fract"},{"key":"272_CR8","doi-asserted-by":"crossref","unstructured":"Du LB, Teng L, Liu HP, Lu HR (2023) Multiple face images encryption based on a new non-adjacent dynamic coupled mapping lattice. Expert Systems with Applications, 238, Part B","DOI":"10.1016\/j.eswa.2023.121728"},{"key":"272_CR9","doi-asserted-by":"crossref","unstructured":"Elshamy AM, Abd El-Samie FE, Faragallah O S, Elshamy EM, El-sayed HS, El-zoghdy SF, Rashed ANZ, Mohamed AA, Alhamad AQ (2016) Optical image cryptosystem using double random phase encoding and Arnold's Cat map. Optical and Quantum electronics 48 (3)","DOI":"10.1007\/s11082-016-0461-x"},{"key":"272_CR10","doi-asserted-by":"publisher","unstructured":"Gao S, Iu HHC, Mou J, Erkan U, Liu JF, Wu R, Tang XL (2024) Temporal action segmentation for video encryption. Chaos Solitons Fract 183. https:\/\/doi.org\/10.1016\/j.chaos.2024.114958","DOI":"10.1016\/j.chaos.2024.114958"},{"issue":"8","key":"272_CR11","doi-asserted-by":"publisher","first-page":"7706","DOI":"10.1109\/TCSVT.2025.3545868","volume":"35","author":"S Gao","year":"2025","unstructured":"Gao S, Iu HHC, Erkan U, Simsek C, Toktas A, Cao YH, Wu R, Mou J, Li Q (2025) Wang CP (2025) A 3D memristive cubic map with dual discrete memristors: design, implementation, and application in image encryption. IEEE Trans Circuits Syst Video Technol 35(8):7706\u20137718","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"11","key":"272_CR12","doi-asserted-by":"publisher","first-page":"18115","DOI":"10.1109\/JIOT.2025.3540097","volume":"12","author":"S Gao","year":"2025","unstructured":"Gao S, Zhang ZY, Iu HHC, Ding SQ, Mou J, Erkan U, Toktas A, Li Q, Wang CP, Cao YH (2025a) A parallel color image encryption algorithm based on a 2-D logistic-Rulkov neuron map. IEEE Internet Things J 12(11):18115\u201318124","journal-title":"IEEE Internet Things J"},{"key":"272_CR13","doi-asserted-by":"crossref","unstructured":"Gao S, Ding SQ, Iu HHC, Erkan U, Toktas A, Simsek C, Wu R, Xu XY, Cao YH, Mou J (2025) A three-dimensional memristor-based hyperchaotic map for pseudorandom number generation and multi-image encryption. Choas 35 (7)","DOI":"10.1063\/5.0270220"},{"key":"272_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2024.109512","author":"Z Gu","year":"2024","unstructured":"Gu Z, He D, Huang J, Chen J, Wu X, Huang B, Dong T, Yang Q, Li H (2024) Simultaneous detection of fruits and fruiting stems in mango using improved yolov8 model deployed by edge device. Comput Electron Agric. https:\/\/doi.org\/10.1016\/j.compag.2024.109512. (part 1,)","journal-title":"Comput Electron Agric"},{"issue":"1","key":"272_CR15","doi-asserted-by":"publisher","first-page":"2312108","DOI":"10.1080\/09540091.2024.2312108","volume":"36","author":"E G\u00fcvenoglu","year":"2024","unstructured":"G\u00fcvenoglu E (2024) An image encryption algorithm based on multi-layered chaotic maps and its security analysis. Connect Sci 36(1):2312108","journal-title":"Connect Sci"},{"key":"272_CR16","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"ZY Hua","year":"2016","unstructured":"Hua ZY, Zhou YC (2016) Image encryption using 2D logistic-adjusted-sine map. Inf Sci 339:237\u2013253","journal-title":"Inf Sci"},{"key":"272_CR17","doi-asserted-by":"publisher","unstructured":"Huang PH, Li DY, Wang Y, Zhao HM, Deng W (2022) A novel color image encryption algorithm using coupled map lattice with polymorphic mapping. Electronics 11(21). https:\/\/doi.org\/10.3390\/electronics11213436","DOI":"10.3390\/electronics11213436"},{"key":"272_CR18","doi-asserted-by":"publisher","unstructured":"Ibrahim MM, Venkatesan R (2025) Image encryption using novel chaotic map and cellular automata dynamics. RAIRO 59. https:\/\/doi.org\/10.1051\/ita\/2025001","DOI":"10.1051\/ita\/2025001"},{"key":"272_CR19","unstructured":"Jocher G (2020) YOLOv5 by Ultralytics. Zenodo, Version 7.0, 2020. Available online: https:\/\/github.com\/ultralytics\/yolov5"},{"key":"272_CR20","unstructured":"Jocher G, Qiu J, Chaurasia A (2023) Ultralytics YOLO. GitHub repository, Version 8.0.0, 2023. Available online: https:\/\/github.com\/ultralytics\/ultralytics"},{"key":"272_CR21","doi-asserted-by":"crossref","unstructured":"Kamal FM, Elsonbaty A, Elsaid A (2021) A novel fractional nonautonomous chaotic circuit model and its application to image encryption. Chaos Solitons Fract 144","DOI":"10.1016\/j.chaos.2021.110686"},{"issue":"1\u20132","key":"272_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0167-2789(89)90227-3","volume":"34","author":"K Kaneko","year":"1989","unstructured":"Kaneko K (1989) Pattern dynamics in spatiotemporal chaos: Pattern selection, diffusion of defect and pattern competition intermettency. Physica D 34(1\u20132):1\u201341","journal-title":"Physica D"},{"issue":"13","key":"272_CR23","doi-asserted-by":"publisher","first-page":"194","DOI":"10.21786\/bbrc\/13.13\/27","volume":"13","author":"Parameshachari BD Kiran","year":"2020","unstructured":"Kiran Parameshachari BD (2020) Selective image encryption of medical images based on threshold entropy and Arnold cat map. Biosci Biotechnol Res Commun 13(13):194\u2013202","journal-title":"Biosci Biotechnol Res Commun"},{"issue":"12","key":"272_CR24","doi-asserted-by":"publisher","first-page":"18941","DOI":"10.1007\/s11042-020-10325-6","volume":"80","author":"M Kumar","year":"2021","unstructured":"Kumar M, Gupta P (2021) A new medical image cryptographic algorithm based on the 1D logistic map associated with pseudo-random numbers. Multimed Tools Appl 80(12):18941\u201318967","journal-title":"Multimed Tools Appl"},{"key":"272_CR25","doi-asserted-by":"publisher","unstructured":"Li YY, Ye XL (2024) An improved coupled map lattice model and its application in image encryption. Eur Phys J plus 139(5). https:\/\/doi.org\/10.1140\/epjp\/s13360-024-05233-9","DOI":"10.1140\/epjp\/s13360-024-05233-9"},{"key":"272_CR26","doi-asserted-by":"publisher","unstructured":"Li Z, Yang SQ, Tan WJ, Huang Z, Wang JK (2024a) A novel plaintext-related image encryption and compression method based on a new coupled map lattices model. Phys Scr 99(9). https:\/\/doi.org\/10.1088\/1402-4896\/ad6b53","DOI":"10.1088\/1402-4896\/ad6b53"},{"key":"272_CR27","doi-asserted-by":"crossref","unstructured":"Li XJ, Mou J, Xiong L (2021) Fractional-order double-ring erbium-doped fiber laser chaotic system and its application on image encryption. Optics Laser Technol 140","DOI":"10.1016\/j.optlastec.2021.107074"},{"key":"272_CR28","doi-asserted-by":"crossref","unstructured":"Li YH, Yu H, Song B, Chen CC (2021) Image encryption based on a single-round dictionary and chaotic sequences in cloud computing.\u00a0Concurr Comput Pract Exp 33(7)","DOI":"10.1002\/cpe.5182"},{"key":"272_CR29","unstructured":"Li C, Zhang B, Li L, Li L, Geng Y, Cheng M, Xiaoming X, Chu X, Wei X (2024) YOLOv6: A Single-Stage Object Detection Framework for Industrial Applications. OpenReview preprint, 2024. Available online: https:\/\/openreview.net\/forum?id=7c3ZOKGQ6s"},{"issue":"6","key":"272_CR30","doi-asserted-by":"publisher","first-page":"2511","DOI":"10.1109\/TCSI.2023.3250713","volume":"70","author":"PB Liu","year":"2023","unstructured":"Liu PB, Wang XY, Su YN, Liu HP, Unar S (2023) Globally coupled private image encryption algorithm based on infinite interval spatiotemporal chaotic system. IEEE Trans Circuits Syst I Regul Pap 70(6):2511\u20132522","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"key":"272_CR31","doi-asserted-by":"publisher","unstructured":"Liu PB, Teng L, Iu HHC, Wang MX, Li Q, Fu XP (2025) High sensitivity image encryption algorithm based on cascaded chaotic system. J Inf Secur Appl 93. https:\/\/doi.org\/10.1016\/j.jisa.2025.104153","DOI":"10.1016\/j.jisa.2025.104153"},{"key":"272_CR32","doi-asserted-by":"crossref","unstructured":"Liu Z, Wang Y, Zhang LY, Ma J (2021) A novel compressive image encryption with an improved 2D coupled map lattice model. Security and Communication Networks, 2021","DOI":"10.1155\/2021\/6625579"},{"key":"272_CR33","doi-asserted-by":"crossref","unstructured":"Lv W, Zhao Y, Xu S, Wei J, Wang G, Dang Q, Liu Y, Chen J (2023) DETRs Beat YOLOs on Real-time Object Detection. arXiv preprint arXiv:2304.08069","DOI":"10.1109\/CVPR52733.2024.01605"},{"key":"272_CR34","doi-asserted-by":"crossref","unstructured":"Ouyang D, He S, Zhang GZ, Luo MZ, Guo HY, Zhan J, Huang ZJ (2023) Efficient multi-scale attention module with cross-spatial learning. IEEE International Conference on Acoustics, Speech and Signal Processing","DOI":"10.1109\/ICASSP49357.2023.10096516"},{"key":"272_CR35","doi-asserted-by":"publisher","unstructured":"Pu L, Zhao Y, Hua Z, Han M, Song H (2025) Multi-target spraying behavior detection based on an improved yolov8n and st-gcn model with interactive of video scenes. Expert Syst Appl 262. https:\/\/doi.org\/10.1016\/j.eswa.2024.125668","DOI":"10.1016\/j.eswa.2024.125668"},{"issue":"2","key":"272_CR36","doi-asserted-by":"publisher","first-page":"57","DOI":"10.4018\/IJMDEM.2021040104","volume":"12","author":"A Rahmani","year":"2021","unstructured":"Rahmani A (2021) A hyperbolic Arnold\u2019s cat map-based system for multimedia data encryption. Int J Multimedia Data Eng Manage 12(2):57\u201371","journal-title":"Int J Multimedia Data Eng Manage"},{"key":"272_CR37","unstructured":"Ren S, He K, Girshick R, Sun J (2015) Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks. arXiv preprint arXiv:1506.01497"},{"key":"272_CR38","first-page":"125039","volume":"373","author":"YJ Sun","year":"2020","unstructured":"Sun YJ, Zhang H, Wang XY, Wang XQ, Yan PF (2020) 2D Non-adjacent coupled map lattice with q and its applications in image encryption. Appl Math Comput 373:125039","journal-title":"Appl Math Comput"},{"key":"272_CR39","doi-asserted-by":"crossref","unstructured":"Tan MX, Pang RM, Le QV (2020) Efficientdet: Scalable and efficient object detection. IEEE\/CVF conference on computer vision and pattern recognition, 10781\u201310790","DOI":"10.1109\/CVPR42600.2020.01079"},{"key":"272_CR40","doi-asserted-by":"crossref","unstructured":"Tang YD, Shao ZH, Zhao XX, Shang YY (2021) Robust multiple color images encryption using discrete Fourier transforms and chaotic map.\u00a0Signal Process Image Commun 93","DOI":"10.1016\/j.image.2021.116168"},{"key":"272_CR41","doi-asserted-by":"publisher","unstructured":"Tiwari A, Diwan P, Diwan TD, Miroslav M, Samal SP (2025) A compressed image encryption algorithm leveraging optimized 3D chaotic maps for secure image communication. Sci Rep 15(1). https:\/\/doi.org\/10.1038\/s41598-025-95995-8","DOI":"10.1038\/s41598-025-95995-8"},{"key":"272_CR42","unstructured":"Tong ZJ, Chen YH, Xu ZW, Yu R (2023) Wise-iou: bounding box regression loss with dynamic focusing mechanism. arXiv preprint arXiv:2301.10051"},{"key":"272_CR43","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.ins.2021.04.013","volume":"569","author":"XY Wang","year":"2021","unstructured":"Wang XY, Yang JJ (2021) A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Inf Sci 569:217\u2013240","journal-title":"Inf Sci"},{"key":"272_CR44","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.optlaseng.2017.06.015","volume":"107","author":"XY Wang","year":"2018","unstructured":"Wang XY, Zhu XQ, Wu XJ, Zhang YQ (2018) Image encryption algorithm based on multiple mixed hash functions and cyclic shift. Opt Lasers Eng 107:370\u2013379","journal-title":"Opt Lasers Eng"},{"issue":"4","key":"272_CR45","doi-asserted-by":"publisher","first-page":"2797","DOI":"10.1007\/s11071-018-4723-y","volume":"95","author":"XY Wang","year":"2019","unstructured":"Wang XY, Feng L, Li R, Zhang FC (2019a) A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model. Nonlinear Dyn 95(4):2797\u20132824","journal-title":"Nonlinear Dyn"},{"key":"272_CR46","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.ins.2019.02.049","volume":"486","author":"XY Wang","year":"2019","unstructured":"Wang XY, Feng L, Zhao HY (2019b) Fast image cryptographic algorithm based on parallel computing system. Inf Sci 486:340\u2013358","journal-title":"Inf Sci"},{"key":"272_CR47","doi-asserted-by":"publisher","unstructured":"Wang XY, Guan NN, Zhao HY, Wang SW, Zhang YQ (2020) A new image encryption scheme based on coupling map lattices with mixed multi-chaos. Sci Rep 10(1). https:\/\/doi.org\/10.1038\/s41598-020-66486-9","DOI":"10.1038\/s41598-020-66486-9"},{"key":"272_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2020.07.051","volume":"544","author":"MX Wang","year":"2021","unstructured":"Wang MX, Wang XY, Zhao TT, Zhang C, Xia ZQ, Yao NM (2021) Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme. Inf Sci 544:1\u201324","journal-title":"Inf Sci"},{"key":"272_CR49","doi-asserted-by":"publisher","unstructured":"Wang XY, Liu C, Jiang DH (2022) A novel visually meaningful image encryption algorithm based on parallel compressive sensing and adaptive embedding. Expert Syst Appl 209. https:\/\/doi.org\/10.1016\/j.eswa.2022.118426","DOI":"10.1016\/j.eswa.2022.118426"},{"key":"272_CR50","doi-asserted-by":"crossref","unstructured":"Wang C-Y, Liao H-YM (2024) YOLOv9: Learning What You Want to Learn Using Programmable Gradient Information. arXiv preprint arXiv: 2402.13616","DOI":"10.1007\/978-3-031-72751-1_1"},{"key":"272_CR51","doi-asserted-by":"crossref","unstructured":"Wang T, Wang MH (2020) Hyperchaotic image encryption algorithm based on bit-level permutation and DNA encoding. Optics Laser Technol 132","DOI":"10.1016\/j.optlastec.2020.106355"},{"key":"272_CR52","doi-asserted-by":"crossref","unstructured":"Wang A, Chen H, Liu L, Chen K, Lin Z, Han J, Ding G (2024) YOLOv10: Real-time end-to-end object detection. arXiv preprint arXiv:2405.14458","DOI":"10.52202\/079017-3429"},{"key":"272_CR53","doi-asserted-by":"crossref","unstructured":"Wei TD, Lin P, Zhu QX, Yao Q (2021) Instability of impulsive stochastic systems with application to image encryption. Appl Math Comput 402","DOI":"10.1016\/j.amc.2021.126098"},{"key":"272_CR54","doi-asserted-by":"crossref","unstructured":"Yang S, Luo P, Loy CC (2016) Wider face: A face detection benchmark. 2016 IEEE conference on computer vision and pattern recognition, 5525\u20135533","DOI":"10.1109\/CVPR.2016.596"},{"key":"272_CR55","doi-asserted-by":"crossref","unstructured":"Yildirim M (2021) A color image encryption scheme reducing the correlations between R, G, B components. Optik, 237","DOI":"10.1016\/j.ijleo.2021.166728"},{"key":"272_CR56","doi-asserted-by":"publisher","first-page":"18317","DOI":"10.1007\/s11042-021-10576-x","volume":"80","author":"D Zareai","year":"2021","unstructured":"Zareai D, Balafar M, Derakhshi MRF (2021) A new Grayscale image cryptographic algorithm composed of logistic mapping, Arnold cat, and image blocking. Multimed Tools Appl 80:18317\u201318344","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"272_CR57","doi-asserted-by":"publisher","first-page":"526","DOI":"10.15388\/NA.18.4.13977","volume":"18","author":"YQ Zhang","year":"2013","unstructured":"Zhang YQ, Wang XY (2013) Spatiotemporal chaos in Arnold coupled logistic map lattice. Nonlinear Anal-Model Control 18(4):526\u2013541","journal-title":"Nonlinear Anal-Model Control"},{"key":"272_CR58","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear\u2013nonlinear coupled map lattice. Inf Sci 273:329\u2013351","journal-title":"Inf Sci"},{"key":"272_CR59","doi-asserted-by":"publisher","unstructured":"Zhang S, Wang K, Zhang H, Wang T, Gao X, Song Y, Wang F (2024) An improved yolov8 for fiber bundle segmentation in x-ray computed tomography images of 2.5d composites to build the finite element model. Compos Part A-Appl Sci Manuf 185. https:\/\/doi.org\/10.1016\/j.compositesa.2024.108337","DOI":"10.1016\/j.compositesa.2024.108337"},{"issue":"8","key":"272_CR60","doi-asserted-by":"publisher","first-page":"8574","DOI":"10.1109\/TCYB.2021.3095305","volume":"52","author":"ZH Zheng","year":"2021","unstructured":"Zheng ZH, Wang P, Ren DW, Liu W, Ye RG, Hu QH, Zuo WM (2021) Enhancing geometric factors in model learning and inference for object detection and instance segmentation. IEEE Trans Cybern 52(8):8574\u20138586","journal-title":"IEEE Trans Cybern"},{"issue":"4","key":"272_CR61","doi-asserted-by":"publisher","first-page":"2925","DOI":"10.1007\/s11071-020-06092-6","volume":"102","author":"CY Zou","year":"2020","unstructured":"Zou CY, Wang XY, Li HF, Wang YZ (2020) Enhancing the kinetic complexity of 2-D digital coupled chaotic lattice. Nonlinear Dyn 102(4):2925\u20132943","journal-title":"Nonlinear Dyn"},{"key":"272_CR62","doi-asserted-by":"publisher","unstructured":"Zou CY, Shang YB, Yang YW, Zhou CJ, Liu YN (2024a) A novel image encryption algorithm with anti-tampering attack capability. Chaos Solitons Fract 189. https:\/\/doi.org\/10.1016\/j.chaos.2024.115638","DOI":"10.1016\/j.chaos.2024.115638"},{"issue":"10","key":"272_CR63","doi-asserted-by":"publisher","first-page":"12211","DOI":"10.1007\/s11071-024-10668-x","volume":"113","author":"CY Zou","year":"2024","unstructured":"Zou CY, Liu YN, Yang YW, Shang YB, Zhou CJ (2024b) A novel object localization encryption algorithm for wind turbine. Nonlinear Dyn 113(10):12211\u201312231","journal-title":"Nonlinear Dyn"},{"key":"272_CR64","doi-asserted-by":"publisher","unstructured":"Zou CY, Liu YN, Yang YW, Zhou CJ, Yu Y, Shang YB (2025) A privacy-preserving license plate encryption scheme based on an improved YOLOv8 image recognition algorithm. Signal Process 230. https:\/\/doi.org\/10.1016\/j.sigpro.2024.109811","DOI":"10.1016\/j.sigpro.2024.109811"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00272-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00272-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00272-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T18:48:32Z","timestamp":1767638912000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00272-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,18]]},"references-count":64,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["272"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00272-3","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"type":"print","value":"1319-1578"},{"type":"electronic","value":"2213-1248"}],"subject":[],"published":{"date-parts":[[2025,11,18]]},"assertion":[{"value":"10 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"321"}}