{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,3]],"date-time":"2026-05-03T21:27:25Z","timestamp":1777843645420,"version":"3.51.4"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":14,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Jiangsu Province Postgraduate Practice and Innovation Program Project","award":["SJCX25_2192"],"award-info":[{"award-number":["SJCX25_2192"]}]},{"name":"Jiangsu Province Postgraduate Practice and Innovation Program Project","award":["SJCX25_2190"],"award-info":[{"award-number":["SJCX25_2190"]}]},{"name":"Jiangsu Province Universities Natural Science Research Major Project","award":["23KJA520003"],"award-info":[{"award-number":["23KJA520003"]}]},{"name":"Huaian Science and Technology Plan Project Natural Science Research","award":["HAB2024048"],"award-info":[{"award-number":["HAB2024048"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s44443-025-00284-z","type":"journal-article","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T12:02:03Z","timestamp":1760529723000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A novel image encryption scheme using 3D chaotic maps with Josephus permutation and dynamic diffusion"],"prefix":"10.1007","volume":"37","author":[{"given":"Wanru","family":"Lu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1667-1410","authenticated-orcid":false,"given":"Chunhua","family":"Jin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiahao","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xinying","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Junyi","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhonghao","family":"Zhai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"key":"284_CR1","doi-asserted-by":"publisher","unstructured":"Ahmed SS, Mehdi SA (2022) Image encryption algorithm based on a novel 5d chaotic system. In: 2022 8th International Conference on Contemporary Information Technology and Mathematics (ICCITM), pp 249\u2013255. https:\/\/doi.org\/10.1109\/ICCITM56309.2022.10031883","DOI":"10.1109\/ICCITM56309.2022.10031883"},{"key":"284_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3428830","author":"HDK Al-Janabi","year":"2024","unstructured":"Al-Janabi HDK, Lashari SA, Khalil A, Al-Shareeda MA, Alsadhan AA, Almaiah MA, Alkhdour T (2024) D-blockauth: an authentication scheme based dual blockchain for 5g-assisted vehicular fog computing. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2024.3428830","journal-title":"IEEE Access"},{"issue":"6","key":"284_CR3","doi-asserted-by":"publisher","first-page":"0287291","DOI":"10.1371\/journal.pone.0287291","volume":"18","author":"AA Almazroi","year":"2023","unstructured":"Almazroi AA, Aldhahri EA, Al-Shareeda MA, Manickam S (2023) Eca-vfog: An efficient certificateless authentication scheme for 5g-assisted vehicular fog computing. PLoS ONE 18(6):0287291. https:\/\/doi.org\/10.1371\/journal.pone.0287291","journal-title":"PLoS ONE"},{"issue":"10","key":"284_CR4","doi-asserted-by":"publisher","first-page":"0292690","DOI":"10.1371\/journal.pone.0292690","volume":"18","author":"AA Almazroi","year":"2023","unstructured":"Almazroi AA, Alqarni MA, Al-Shareeda MA, Manickam S (2023a) L-cppa: lattice-based conditional privacy-preserving authentication scheme for fog computing with 5g-enabled vehicular system. PLoS ONE 18(10):0292690. https:\/\/doi.org\/10.1371\/journal.pone.0292690","journal-title":"PLoS ONE"},{"issue":"6","key":"284_CR5","doi-asserted-by":"publisher","first-page":"0287291","DOI":"10.1371\/journal.pone.0287291","volume":"18","author":"AA Almazroi","year":"2023","unstructured":"Almazroi AA, Aldhahri EA, Al-Shareeda MA, Manickam S (2023b) Eca-vfog: an efficient certificateless authentication scheme for 5g-assisted vehicular fog computing. PLoS ONE 18(6):0287291. https:\/\/doi.org\/10.1371\/journal.pone.0287291","journal-title":"PLoS ONE"},{"key":"284_CR6","doi-asserted-by":"publisher","first-page":"101096","DOI":"10.1016\/j.iot.2024.101096","volume":"25","author":"AA Almazroi","year":"2024","unstructured":"Almazroi AA, Alqarni MA, Al-Shareeda MA, Alkinani MH, Almazroey AA, Gaber T (2024a) Fca-vbn: fog computing-based authentication scheme for 5g-assisted vehicular blockchain network. Internet of Things 25:101096","journal-title":"Internet of Things"},{"key":"284_CR7","doi-asserted-by":"publisher","first-page":"30101","DOI":"10.1109\/ACCESS.2024.3368393","volume":"12","author":"AA Almazroi","year":"2024","unstructured":"Almazroi AA, Alkinani MH, Al-Shareeda MA, Alqarni MA, Almazroey AA, Gaber T (2024b) Fc-lsr: fog computing-based lightweight sybil resistant scheme in 5g-enabled vehicular networks. IEEE Access 12:30101\u201330112. https:\/\/doi.org\/10.1109\/ACCESS.2024.3368393","journal-title":"IEEE Access"},{"key":"284_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3466914","author":"ZG Al-Mekhlafi","year":"2024","unstructured":"Al-Mekhlafi ZG, Lashari SA, Al-Shareeda MA, Mohammed BA, Alayba AM, Saleh AMS, Al-Reshidi HA, Almekhlafi K (2024) Cla-fc5g: a certificateless authentication scheme using fog computing for 5g-assisted vehicular networks. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2024.3466914","journal-title":"IEEE Access"},{"key":"284_CR9","doi-asserted-by":"publisher","unstructured":"Alsaffar DM, Sultan\u00a0Almutiri A, Alqahtani B, Alamri RM, Fahhad\u00a0Alqahtani H, Alqahtani NN, Mohammed\u00a0alshammari G, Ali AA (2020) Image encryption based on aes and rsa algorithms. In: 2020 3rd International Conference on Computer Applications & Information Security (ICCAIS), pp 1\u20135. https:\/\/doi.org\/10.1109\/ICCAIS48893.2020.9096809","DOI":"10.1109\/ICCAIS48893.2020.9096809"},{"issue":"3","key":"284_CR10","doi-asserted-by":"publisher","first-page":"1383","DOI":"10.3390\/app12031383","volume":"12","author":"MA Al-Shareeda","year":"2022","unstructured":"Al-Shareeda MA, Anbar M, Manickam S, Hasbullah IH (2022) Password-guessing attack-aware authentication scheme based on chinese remainder theorem for 5g-enabled vehicular networks. Appl Sci 12(3):1383. https:\/\/doi.org\/10.3390\/app12031383","journal-title":"Appl Sci"},{"issue":"13","key":"284_CR11","doi-asserted-by":"publisher","first-page":"5026","DOI":"10.3390\/s22135026","volume":"22","author":"MA Al-Shareeda","year":"2022","unstructured":"Al-Shareeda MA, Manickam S, Mohammed BA, Al-Mekhlafi ZG, Qtaish A, Alzahrani AJ, Alshammari G, Sallam AA, Almekhlafi K (2022a) Cm-cppa: chaotic map-based conditional privacy-preserving authentication scheme in 5g-enabled vehicular networks. Sensors 22(13):5026. https:\/\/doi.org\/10.3390\/s22135026","journal-title":"Sensors"},{"issue":"16","key":"284_CR12","doi-asserted-by":"publisher","first-page":"9961","DOI":"10.3390\/su14169961","volume":"14","author":"MA Al-Shareeda","year":"2022","unstructured":"Al-Shareeda MA, Manickam S, Mohammed BA, Al-Mekhlafi ZG, Qtaish A, Alzahrani AJ, Alshammari G, Sallam AA, Almekhlafi K (2022b) Provably secure with efficient data sharing scheme for fifth-generation (5g)-enabled vehicular networks without road-side unit (rsu). Sustainability 14(16):9961. https:\/\/doi.org\/10.3390\/su14169961","journal-title":"Sustainability"},{"key":"284_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2025.3553868","author":"MA Al-Shareeda","year":"2025","unstructured":"Al-Shareeda MA, Gaber T, Alqarni MA, Alkinani MH, Almazroey AA, Almazroi AA (2025) Chebyshev polynomial based emergency conditions with authentication scheme for 5g-assisted vehicular fog computing. IEEE Trans Dependable Secure Comput. https:\/\/doi.org\/10.1109\/TDSC.2025.3553868","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"284_CR14","doi-asserted-by":"publisher","unstructured":"Chethan KS, Sumanth K, Rajagopal SM (2024) Image encryption and decryption based on 3d chaos maps and dna encoding. In: 2024 international conference on Emerging Smart Computing and Informatics (ESCI), pp 1\u20136. https:\/\/doi.org\/10.1109\/ESCI59607.2024.10497379","DOI":"10.1109\/ESCI59607.2024.10497379"},{"key":"284_CR15","doi-asserted-by":"publisher","unstructured":"Choi US, Cho SJ, Kang SW (2019) Color medical image encryption using 3d chaotic cat map and nca. In: 2019 10th IFIP international conference on New Technologies, Mobility and Security (NTMS), pp 1\u20135. https:\/\/doi.org\/10.1109\/NTMS.2019.8763779","DOI":"10.1109\/NTMS.2019.8763779"},{"key":"284_CR16","doi-asserted-by":"publisher","unstructured":"Chuman T, Kiya H (2022) Security evaluation of compressible image encryption for privacy-preserving image classification against ciphertext-only attacks. In: 2022 International Conference on Machine Learning and Cybernetics (ICMLC), pp 86\u201390. https:\/\/doi.org\/10.1109\/ICMLC56445.2022.9941309","DOI":"10.1109\/ICMLC56445.2022.9941309"},{"key":"284_CR17","doi-asserted-by":"publisher","unstructured":"Deng Y, Dong H, Mao B (2024) Differential privacy-preserving consensus of multi-agent systems under replay attacks. In: 2024 43rd Chinese Control Conference (CCC), pp 5627\u20135632. https:\/\/doi.org\/10.23919\/CCC63176.2024.10662029","DOI":"10.23919\/CCC63176.2024.10662029"},{"key":"284_CR18","doi-asserted-by":"publisher","unstructured":"Ding D, Xie D, Zhang H, Yang Z, Liu C (2025) Deepface-based chaotic image encryption using key optimization and semi-tensor product theory. IEEE Trans Circuits Syst Video Technol, 1\u20131. https:\/\/doi.org\/10.1109\/TCSVT.2025.3543824","DOI":"10.1109\/TCSVT.2025.3543824"},{"issue":"8","key":"284_CR19","doi-asserted-by":"publisher","first-page":"5037","DOI":"10.1109\/TCYB.2023.3267785","volume":"53","author":"X Gao","year":"2023","unstructured":"Gao X, Mou J, Banerjee S, Zhang Y (2023) Color-gray multi-image hybrid compression\u2013encryption scheme based on bp neural network and knight tour. IEEE Trans Cybern 53(8):5037\u20135047. https:\/\/doi.org\/10.1109\/TCYB.2023.3267785","journal-title":"IEEE Trans Cybern"},{"key":"284_CR20","doi-asserted-by":"publisher","first-page":"114958","DOI":"10.1016\/j.chaos.2024.114958","volume":"183","author":"S Gao","year":"2024","unstructured":"Gao S, Iu HH-C, Mou J, Erkan U, Liu J, Wu R, Tang X (2024) Temporal action segmentation for video encryption. Chaos Solitons & Fractals 183:114958. https:\/\/doi.org\/10.1016\/j.chaos.2024.114958","journal-title":"Chaos Solitons & Fractals"},{"key":"284_CR21","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1016\/j.apm.2024.06.016","volume":"134","author":"S Gao","year":"2024","unstructured":"Gao S, Liu J, Iu HH-C, Erkan U, Zhou S, Wu R, Tang X (2024) Development of a video encryption algorithm for critical areas using 2d extended schaffer function map and neural networks. Appl Math Model 134:520\u2013537. https:\/\/doi.org\/10.1016\/j.apm.2024.06.016","journal-title":"Appl Math Model"},{"issue":"11","key":"284_CR22","doi-asserted-by":"publisher","first-page":"18115","DOI":"10.1109\/JIOT.2025.3540097","volume":"12","author":"S Gao","year":"2025","unstructured":"Gao S, Zhang Z, Iu HH-C, Ding S, Mou J, Erkan U, Toktas A, Li Q, Wang C, Cao Y (2025a) A parallel color image encryption algorithm based on a 2-d logistic-rulkov neuron map. IEEE Internet Things J 12(11):18115\u201318124. https:\/\/doi.org\/10.1109\/JIOT.2025.3540097","journal-title":"IEEE Internet Things J"},{"key":"284_CR23","doi-asserted-by":"publisher","unstructured":"Gao S, Ding S, Ho-Ching Iu H, Erkan U, Toktas A, Simsek C, Wu R, Xu X, Cao Y, Mou J (2025b) A three-dimensional memristor-based hyperchaotic map for pseudorandom number generation and multi-image encryption. Chaos: An Interdisciplinary J Nonl Sci 35(7). https:\/\/doi.org\/10.1063\/5.0270220","DOI":"10.1063\/5.0270220"},{"key":"284_CR24","doi-asserted-by":"publisher","unstructured":"Gao S, Iu HH-C, Erkan U, Simsek C, Toktas A, Cao Y, Wu R, Mou J, Li Q, Wang C (2025c) A 3d memristive cubic map with dual discrete memristors: design, implementation, and application in image encryption. IEEE Trans Circuits Syst Video Technol, 1\u20131. https:\/\/doi.org\/10.1109\/TCSVT.2025.3545868","DOI":"10.1109\/TCSVT.2025.3545868"},{"key":"284_CR25","doi-asserted-by":"publisher","unstructured":"Garello R, Visintin M, Schiavone R, Compagnoni A, Chiasserini CF (2025) Aes and mixed aes\/gold spreading sequences for satellite uplink code division multiplexing. IEEE Trans Commun, 1\u20131. https:\/\/doi.org\/10.1109\/TCOMM.2025.3554679","DOI":"10.1109\/TCOMM.2025.3554679"},{"key":"284_CR26","doi-asserted-by":"publisher","unstructured":"Gros C (2024) Bifurcations and chaos in dynamical systems. Springer, Cham, pp 45\u201385. https:\/\/doi.org\/10.1007\/978-3-031-55076-8_2","DOI":"10.1007\/978-3-031-55076-8_2"},{"key":"284_CR27","doi-asserted-by":"publisher","unstructured":"Hamad SM, Al\u00a0Daradkeh N, Odeh A, AbuTaleb A, Abu\u00a0Al-Haija QS (2024) Enhanced lightweight image encryption utilizing stream cipher and secure hashing algorithm. In: 2024 1st International Conference on Innovative Engineering Sciences and Technological Research (ICIESTR), pp 1\u20135. https:\/\/doi.org\/10.1109\/ICIESTR60916.2024.10798340","DOI":"10.1109\/ICIESTR60916.2024.10798340"},{"key":"284_CR28","doi-asserted-by":"publisher","unstructured":"Jonathan\u00a0Satish T, Naga Sai\u00a0Theja M, Girish\u00a0Kumar G, Thanikaiselvan V (2018) Image encryption using integer wavelet transform, logistic map and xor encryption. In: 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), pp 704\u2013709. https:\/\/doi.org\/10.1109\/ICECA.2018.8474930","DOI":"10.1109\/ICECA.2018.8474930"},{"key":"284_CR29","doi-asserted-by":"publisher","first-page":"5483","DOI":"10.1109\/ACCESS.2022.3230096","volume":"11","author":"I Khalid","year":"2022","unstructured":"Khalid I, Shah T, Eldin SM, Shah D, Asif M, Saddique I (2022) An integrated image encryption scheme based on elliptic curve. IEEE Access 11:5483\u20135501. https:\/\/doi.org\/10.1109\/ACCESS.2022.3230096","journal-title":"IEEE Access"},{"key":"284_CR30","doi-asserted-by":"publisher","unstructured":"Kumar A, Dua M (2022) A novel cosine transformed chebyshev chaotic map based image encryption. In: 2022 IEEE 7th forum on Research and Technologies for Society and Industry Innovation (RTSI), pp 43\u201349. https:\/\/doi.org\/10.1109\/RTSI55261.2022.9905195","DOI":"10.1109\/RTSI55261.2022.9905195"},{"key":"284_CR31","doi-asserted-by":"publisher","first-page":"24051","DOI":"10.1109\/ACCESS.2019.2900367","volume":"7","author":"Q Lai","year":"2019","unstructured":"Lai Q, Chen C, Zhao X-W, Kengne J, Volos C (2019) Constructing chaotic system with multiple coexisting attractors. IEEE Access 7:24051\u201324056. https:\/\/doi.org\/10.1109\/ACCESS.2019.2900367","journal-title":"IEEE Access"},{"key":"284_CR32","doi-asserted-by":"publisher","unstructured":"Lai Q, Ji L (2025) A bidirectional cross-scrambling medical image encryption scheme incorporates compressed sensing and its application in iomt. IEEE Trans Circuits Syst Video Technol, 1\u20131. https:\/\/doi.org\/10.1109\/TCSVT.2025.3545788","DOI":"10.1109\/TCSVT.2025.3545788"},{"issue":"1","key":"284_CR33","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/MMUL.2024.3356494","volume":"31","author":"C Li","year":"2024","unstructured":"Li C, Shen X, Liu S (2024) Cryptanalyzing an image encryption algorithm underpinned by 2-d lag-complex logistic map. IEEE Multimedia 31(1):99\u2013109. https:\/\/doi.org\/10.1109\/MMUL.2024.3356494","journal-title":"IEEE Multimedia"},{"key":"284_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124891","volume":"257","author":"Y Lin","year":"2024","unstructured":"Lin Y, Xie Z, Chen T, Cheng X, Wen H (2024) Image privacy protection scheme based on high-quality reconstruction dct compression and nonlinear dynamics. Expert Syst Appl 257:124891. https:\/\/doi.org\/10.1016\/j.eswa.2024.124891","journal-title":"Expert Syst Appl"},{"issue":"1","key":"284_CR35","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1109\/TCSI.2024.3511675","volume":"72","author":"W Liu","year":"2025","unstructured":"Liu W, Sun K, Wang H, Li B, Chen Y (2025) Inverse proportional chaotification model for image encryption in iot scenarios. IEEE Trans Circuits Syst I Regul Pap 72(1):254\u2013264. https:\/\/doi.org\/10.1109\/TCSI.2024.3511675","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"key":"284_CR36","doi-asserted-by":"publisher","unstructured":"Liu Z, Zhu D, Zhou C, Zhang W (2022) Chaotic image encryption method based on zigzag scrambling and dna coding. In: 2022 4th International Conference on Frontiers Technology of Information and Computer (ICFTIC), pp 231\u2013235. https:\/\/doi.org\/10.1109\/ICFTIC57696.2022.10075195","DOI":"10.1109\/ICFTIC57696.2022.10075195"},{"key":"284_CR37","doi-asserted-by":"publisher","unstructured":"Mada\u00a0Sanjaya WS, Roziqin A, Temiesela AW, Zaman MFB, Wibiksana AD, Anggraeni D (2023) Digital image encryption analysis using the rikitake chaotic system. In: 2023 International Conference on Artificial Intelligence Robotics, Signal and Image Processing (AIRoSIP), pp 144\u2013149. https:\/\/doi.org\/10.1109\/AIRoSIP58759.2023.10874028","DOI":"10.1109\/AIRoSIP58759.2023.10874028"},{"issue":"6","key":"284_CR38","doi-asserted-by":"publisher","first-page":"1446","DOI":"10.3390\/math11061446","volume":"11","author":"BA Mohammed","year":"2023","unstructured":"Mohammed BA, Al-Shareeda MA, Manickam S, Al-Mekhlafi ZG, Alayba AM, Sallam AA (2023) Anaa-fog: a novel anonymous authentication scheme for 5g-enabled vehicular fog computing. Mathematics 11(6):1446. https:\/\/doi.org\/10.3390\/math11061446","journal-title":"Mathematics"},{"key":"284_CR39","doi-asserted-by":"publisher","unstructured":"Mu Z, Liu H (2020) Research on digital media image encryption algorithm based on logistic chaotic map. In: 2020 International Conference on Robots & Intelligent System (ICRIS), pp 108\u2013111. https:\/\/doi.org\/10.1109\/ICRIS52159.2020.00035","DOI":"10.1109\/ICRIS52159.2020.00035"},{"key":"284_CR40","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/s42979-021-00778-3","volume":"2","author":"JS Muthu","year":"2021","unstructured":"Muthu JS, Murali P (2021) Review of chaos detection techniques performed on chaotic maps and systems in image encryption. SN Comp Sci 2:392. https:\/\/doi.org\/10.1007\/s42979-021-00778-3","journal-title":"SN Comp Sci"},{"key":"284_CR41","doi-asserted-by":"publisher","unstructured":"Muthukumar A, Giridhar A, Raghavendra G, Teja UV, Deepak GS, Kumar GA (2025) Data security enhancements in iot communication networks using homomorphic encryption and location based data access. In: 2025 International Conference on Multi-Agent Systems for Collaborative Intelligence (ICMSCI), pp 393\u2013399. https:\/\/doi.org\/10.1109\/ICMSCI62561.2025.10894102","DOI":"10.1109\/ICMSCI62561.2025.10894102"},{"key":"284_CR42","doi-asserted-by":"publisher","unstructured":"Nekkanti K, Sumanth LS, Renuka A, Supriya M, Kumar A (2023) Performance analysis of lightweight ciphers for securing images. In: 2023 International Conference on Modeling, Simulation & Intelligent Computing (MoSICom), pp 560\u2013564. https:\/\/doi.org\/10.1109\/MoSICom59118.2023.10458747","DOI":"10.1109\/MoSICom59118.2023.10458747"},{"key":"284_CR43","doi-asserted-by":"publisher","unstructured":"Nguyen TK, Thi Thanh\u00a0Truc N, Hai VT (2023) Akq: a hybrid quantum-classical image encryption system. In: 2023 RIVF international conference on computing and communication technologies (RIVF), pp 527\u2013532. https:\/\/doi.org\/10.1109\/RIVF60135.2023.10471808","DOI":"10.1109\/RIVF60135.2023.10471808"},{"key":"284_CR44","doi-asserted-by":"publisher","unstructured":"Okokpujie K, Akinola DG, Nwokolo I, Isife OF, Obiazi O, Owivri O (2022) Enhanced optical double phase image encryption using random gaussian noise. In: 2022 5th Information Technology for Education and Development (ITED), pp 1\u20135. https:\/\/doi.org\/10.1109\/ITED56637.2022.10051261","DOI":"10.1109\/ITED56637.2022.10051261"},{"key":"284_CR45","doi-asserted-by":"publisher","unstructured":"Ping P, Zhang X, Yang X, Mao Y, Gao Z (2020) Parallel image encryption technology based on cellular automaton. In: 2020 IEEE sixth international conference on Big Data Computing Service and Applications (BigDataService), pp 216\u2013223. https:\/\/doi.org\/10.1109\/BigDataService49289.2020.00042","DOI":"10.1109\/BigDataService49289.2020.00042"},{"key":"284_CR46","doi-asserted-by":"publisher","unstructured":"Sahlabadi M, Saberikamarposhti M, Muniyandi RC, Shukur Z (2022) Using cycling 3d chaotic map and dna sequences for introducing a novel algorithm for color image encryption. In: 2022 International Conference on Cyber Resilience (ICCR), pp 1\u20137. https:\/\/doi.org\/10.1109\/ICCR56254.2022.9995857","DOI":"10.1109\/ICCR56254.2022.9995857"},{"key":"284_CR47","doi-asserted-by":"publisher","unstructured":"Sangwan Y, Bharadwaj\u00a0Bayari PV, Bhatnagar G (2023) A modified logistic map inspired image encryption scheme. In: 2023 IEEE 6th international conference on Multimedia Information Processing and Retrieval (MIPR), pp 1\u20136. https:\/\/doi.org\/10.1109\/MIPR59079.2023.00036","DOI":"10.1109\/MIPR59079.2023.00036"},{"key":"284_CR48","doi-asserted-by":"publisher","unstructured":"Shao S, Zhu H, Shao P, Gong Y (2024) Fast image encryption based on two-stage chunking under xor-scrambling framework. In: 2024 7th International Conference on Computer Information Science and Application Technology (CISAT), pp 517\u2013521. https:\/\/doi.org\/10.1109\/CISAT62382.2024.10695195","DOI":"10.1109\/CISAT62382.2024.10695195"},{"key":"284_CR49","doi-asserted-by":"publisher","unstructured":"Sreelakshmi K, Ravi RV (2020) A bidirectional diffusion based image encryption scheme for color images. In: 2020 7th International Conference on Smart Structures and Systems (ICSSS), pp 1\u20136. https:\/\/doi.org\/10.1109\/ICSSS49621.2020.9202070","DOI":"10.1109\/ICSSS49621.2020.9202070"},{"issue":"3","key":"284_CR50","doi-asserted-by":"publisher","first-page":"3778","DOI":"10.1109\/TII.2023.3312405","volume":"20","author":"J Sun","year":"2024","unstructured":"Sun J, Li C, Wang Z, Wang Y (2024) A memristive fully connect neural network and application of medical image encryption based on central diffusion algorithm. IEEE Trans Industr Inf 20(3):3778\u20133788. https:\/\/doi.org\/10.1109\/TII.2023.3312405","journal-title":"IEEE Trans Industr Inf"},{"key":"284_CR51","doi-asserted-by":"publisher","unstructured":"Su W, Zhou M, Bao J, Yang L, Zhu L, Li G (2024) Image encryption design based on henon mapping. In: 2024 Asia-Pacific conference on Image Processing, Electronics and Computers (IPEC), pp 280\u2013285. https:\/\/doi.org\/10.1109\/IPEC61310.2024.00055","DOI":"10.1109\/IPEC61310.2024.00055"},{"key":"284_CR52","doi-asserted-by":"publisher","first-page":"73924","DOI":"10.1109\/ACCESS.2021.3081362","volume":"9","author":"M Tanveer","year":"2021","unstructured":"Tanveer M, Shah T, Rehman A, Ali A, Siddiqui GF, Saba T, Tariq U (2021) Multi-images encryption scheme based on 3d chaotic map and substitution box. IEEE Access 9:73924\u201373937. https:\/\/doi.org\/10.1109\/ACCESS.2021.3081362","journal-title":"IEEE Access"},{"issue":"2","key":"284_CR53","doi-asserted-by":"publisher","first-page":"1562","DOI":"10.1109\/TCSVT.2024.3470110","volume":"35","author":"L Teng","year":"2025","unstructured":"Teng L, Cao P, Liu Y (2025) Multi-image encryption algorithm based on novel spatiotemporal chaotic system and dynamical chaotic trajectories. IEEE Trans Circuits Syst Video Technol 35(2):1562\u20131575. https:\/\/doi.org\/10.1109\/TCSVT.2024.3470110","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"284_CR54","doi-asserted-by":"publisher","unstructured":"Vithayathil AJ, Sreekumar A (2023) Image encryption through aperiodic Josephus permutation and novel cyclic shift operation. In: 2023 3rd international conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS), pp 81\u201388. https:\/\/doi.org\/10.1109\/ACCESS57397.2023.10201106","DOI":"10.1109\/ACCESS57397.2023.10201106"},{"key":"284_CR55","doi-asserted-by":"publisher","unstructured":"Wang C, Hu J, Bian S, Ni J, Zhang X (2023) A customized deep network based encryption-then-lossy-compression scheme of color images achieving arbitrary compression ratios. IEEE Trans Circuits\u00a0Syst Video Technol 33(8):4322\u20134336. https:\/\/doi.org\/10.1109\/TCSVT.2023.3238383","DOI":"10.1109\/TCSVT.2023.3238383"},{"issue":"2","key":"284_CR56","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1109\/TII.2022.3194590","volume":"19","author":"Y Wu","year":"2023","unstructured":"Wu Y, Zhang L, Berretti S, Wan S (2023) Medical image encryption by content-aware dna computing for secure healthcare. IEEE Trans Industr Inf 19(2):2089\u20132098. https:\/\/doi.org\/10.1109\/TII.2022.3194590","journal-title":"IEEE Trans Industr Inf"},{"issue":"4","key":"284_CR57","doi-asserted-by":"publisher","first-page":"2387","DOI":"10.1109\/TSC.2023.3258144","volume":"16","author":"Y Yang","year":"2023","unstructured":"Yang Y, Cheng M, Ding Y, Zhang W (2023) A visually meaningful image encryption scheme based on lossless compression spiht coding. IEEE Trans Serv Comput 16(4):2387\u20132401. https:\/\/doi.org\/10.1109\/TSC.2023.3258144","journal-title":"IEEE Trans Serv Comput"},{"key":"284_CR58","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/s11071-019-04810-3","volume":"96","author":"L Yuan","year":"2019","unstructured":"Yuan L, Zheng S, Alam Z (2019) Dynamics analysis and cryptographic application of fractional logistic map. Nonlinear Dyn 96:615\u2013636. https:\/\/doi.org\/10.1007\/s11071-019-04810-3","journal-title":"Nonlinear Dyn"},{"issue":"10","key":"284_CR59","doi-asserted-by":"publisher","first-page":"9250","DOI":"10.1109\/TCSVT.2024.3394951","volume":"34","author":"Z Zhang","year":"2024","unstructured":"Zhang Z, Tang J, Zhang F, Huang T, Lu M (2024a) Medical image encryption based on josephus scrambling and dynamic cross-diffusion for patient privacy security. IEEE Trans Circuits Syst Video Technol 34(10):9250\u20139263. https:\/\/doi.org\/10.1109\/TCSVT.2024.3394951","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"284_CR60","doi-asserted-by":"publisher","first-page":"24379","DOI":"10.1007\/s11227-024-06257-9","volume":"80","author":"J Zhang","year":"2024","unstructured":"Zhang J, Wang P, Cheng N et al (2024b) The dynamic analysis, fpga implementation, and adaptive synchronization control application of a multi-vortex chaotic system based on nonlinear functions. J Supercomput 80:24379\u201324412. https:\/\/doi.org\/10.1007\/s11227-024-06257-9","journal-title":"J Supercomput"},{"key":"284_CR61","doi-asserted-by":"publisher","first-page":"1114","DOI":"10.1109\/TMM.2023.3276504","volume":"26","author":"C Zhang","year":"2024","unstructured":"Zhang C, Chen J, Chen D, Wang W, Zhang Y, Zhou Y (2024c) Exploiting substitution box for cryptanalyzing image encryption schemes with dna coding and nonlinear dynamics. IEEE Trans Multimedia 26:1114\u20131128. https:\/\/doi.org\/10.1109\/TMM.2023.3276504","journal-title":"IEEE Trans Multimedia"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00284-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00284-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00284-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T15:39:56Z","timestamp":1761752396000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00284-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":61,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["284"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00284-z","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"value":"1319-1578","type":"print"},{"value":"2213-1248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10]]},"assertion":[{"value":"23 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"254"}}