{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T13:01:56Z","timestamp":1772715716556,"version":"3.50.1"},"reference-count":80,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T00:00:00Z","timestamp":1769126400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T00:00:00Z","timestamp":1772668800000},"content-version":"vor","delay-in-days":41,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Guangxi Young Elite Scientist Sponsorship Program","award":["GXYESS2025144"],"award-info":[{"award-number":["GXYESS2025144"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62462009"],"award-info":[{"award-number":["62462009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018571","name":"Specific Research Project of Guangxi for Research Bases and Talents","doi-asserted-by":"publisher","award":["GuiKeAD24010047"],"award-info":[{"award-number":["GuiKeAD24010047"]}],"id":[{"id":"10.13039\/501100018571","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s44443-025-00351-5","type":"journal-article","created":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T08:35:28Z","timestamp":1769157328000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Image cryptosystem based on hyper-chaos and optimized typhoon wind field model"],"prefix":"10.1007","volume":"38","author":[{"given":"Xue","family":"Ouyang","sequence":"first","affiliation":[]},{"given":"Shunbin","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Junxiu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yuling","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,23]]},"reference":[{"key":"351_CR1","doi-asserted-by":"publisher","unstructured":"Alexan W, Alexan N, Gabr M (2023) Multiple-layer image encryption utilizing fractional-order chen hyperchaotic map and cryptographically secure prngs. Fractal and Fractional 7(4). https:\/\/doi.org\/10.3390\/fractalfract7040287","DOI":"10.3390\/fractalfract7040287"},{"key":"351_CR2","doi-asserted-by":"publisher","unstructured":"Alexan W, ElBeltagy M, Aboshousha A (2022) Rgb image encryption through cellular automata, s-box and the lorenz system. Symmetry 14(3). https:\/\/doi.org\/10.3390\/sym14030443","DOI":"10.3390\/sym14030443"},{"key":"351_CR3","doi-asserted-by":"publisher","unstructured":"Alexan W, Elkandoz M, Mashaly M, Azab E, Aboshousha A (2023) Color image encryption through chaos and kaa map. IEEE Access 11:11541\u201311554. https:\/\/doi.org\/10.1109\/ACCESS.2023.3242311","DOI":"10.1109\/ACCESS.2023.3242311"},{"key":"351_CR4","doi-asserted-by":"publisher","unstructured":"Alghamdi Y, Munir A, Ahmad J (2022) A lightweight image encryption algorithm based on chaotic map and random substitution. Entropy 24(10). https:\/\/doi.org\/10.3390\/e24101344","DOI":"10.3390\/e24101344"},{"key":"351_CR5","doi-asserted-by":"crossref","unstructured":"Alvarez G, LI S, (2006) Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems. International Journal of Bifurcation and Chaos 16(8):2129\u20132151","DOI":"10.1142\/S0218127406015970"},{"key":"351_CR6","doi-asserted-by":"crossref","unstructured":"Can-Ling J, Chen-Yang TZ-A, Qiao W, Jing-Xi C (2023) Rucklidge-based memristive chaotic system: Dynamic analysis and image encryption. Chinese Physics B 32(10)","DOI":"10.1088\/1674-1056\/acdac3"},{"key":"351_CR7","doi-asserted-by":"crossref","unstructured":"Carapia RF, Garc\u00eda VMS, L\u00f3pez MAC (2023) A dynamic hybrid cryptosystem using chaos and diffie\u2013hellman protocol: An image encryption application. Applied Sciences 13(12)","DOI":"10.3390\/app13127168"},{"issue":"1","key":"351_CR8","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"X Chai","year":"2019","unstructured":"Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155(1):44\u201362","journal-title":"Signal Process"},{"issue":"1","key":"351_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107525","volume":"171","author":"X Chai","year":"2020","unstructured":"Chai X, Wu H, Gan Z, Zhang Y, Chen Y (2020) Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy. Signal Process 171(1):107525","journal-title":"Signal Process"},{"issue":"1","key":"351_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107684","volume":"176","author":"X Chai","year":"2020","unstructured":"Chai X, Bi J, Gan Z, Liu X, Zhang Y, Chen Y (2020) Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process 176(1):107684","journal-title":"Signal Process"},{"issue":"1","key":"351_CR11","first-page":"1","volume":"17","author":"X Chai","year":"2020","unstructured":"Chai X, Wu H, Gan Z, Han D, Zhang Y (2020) Chen Y An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing. Inf Sci 17(1):1\u201346","journal-title":"Inf Sci"},{"issue":"4","key":"351_CR12","first-page":"1","volume":"113","author":"Y Deng","year":"2024","unstructured":"Deng Y, Tian X, Chen Z, Xiao Y, Xiao Y (2024) An image encryption algorithm based on a novel two-dimensional hyperchaotic map and difference algorithm. Nonlinear Dyn 113(4):1\u201328","journal-title":"Nonlinear Dyn"},{"key":"351_CR13","doi-asserted-by":"crossref","unstructured":"Dua M, Jadon S.S, Raghuvanshi A, Vishwakarma D, Dua S, Dhingra D (2025) An amalgamation of dynamic dna and two novel chaotic maps for satellite image encryption. Journal of the Indian Society of Remote Sensing (prepublish) pp 1\u201322","DOI":"10.1007\/s12524-025-02226-8"},{"key":"351_CR14","doi-asserted-by":"publisher","unstructured":"Erkan U, Toktas A, Lai Q (2023) 2d hyperchaotic system based on schaffer function for image encryption. Expert Systems with Applications 213, 119076. https:\/\/doi.org\/10.1016\/j.eswa.2022.119076","DOI":"10.1016\/j.eswa.2022.119076"},{"key":"351_CR15","doi-asserted-by":"crossref","unstructured":"Fetteha MA, Sayed WS, Said LA (2023) A lightweight image encryption scheme using dna coding and chaos. Electronics 12(24)","DOI":"10.3390\/electronics12244895"},{"issue":"2","key":"351_CR16","doi-asserted-by":"publisher","first-page":"776","DOI":"10.3390\/app15020776","volume":"15","author":"H Fu","year":"2025","unstructured":"Fu H, Wang Y, Xie Y, Luo C, Shang S, He Z, Wei G (2025) Super typhoons simulation: A comparison of wrf and empirical parameterized models for high wind speeds. Appl Sci 15(2):776\u2013776","journal-title":"Appl Sci"},{"key":"351_CR17","doi-asserted-by":"crossref","unstructured":"G SV, V S, A SS (2022) Improvements in wind field hindcast for storm surge predictions in the bay of bengal: A case study for the tropical cyclone varadah. Applied Ocean Research 127","DOI":"10.1016\/j.apor.2022.103324"},{"key":"351_CR18","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1016\/j.apm.2024.06.016","volume":"134","author":"S Gao","year":"2024","unstructured":"Gao S, Liu J, Iu HH-C, Erkan U, Zhou S, Wu R, Tang X (2024) Development of a video encryption algorithm for critical areas using 2d extended schaffer function map and neural networks. Appl Math Model 134:520\u2013537","journal-title":"Appl Math Model"},{"key":"351_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.114958","volume":"183","author":"S Gao","year":"2024","unstructured":"Gao S, Iu HH-C, Mou J, Erkan U, Liu J, Wu R, Tang X (2024) Temporal action segmentation for video encryption. Chaos Solitons & Fractals 183:114958","journal-title":"Chaos Solitons & Fractals"},{"key":"351_CR20","doi-asserted-by":"crossref","unstructured":"Gao S, Ding S, Ho-Ching\u00a0Iu H, Erkan U, Toktas A, Simsek C, Wu R, Xu X, Cao Y, Mou J (2025c) A three-dimensional memristor-based hyperchaotic map for pseudorandom number generation and multi-image encryption. Chaos: An Interdisciplinary Journal of Nonlinear Science 35(7)","DOI":"10.1063\/5.0270220"},{"key":"351_CR21","doi-asserted-by":"crossref","unstructured":"Gao S, Iu HH-C, Erkan U, Simsek C, Toktas A, Cao Y, Wu R, Mou J, Li Q, Wang C (2025a) A 3d memristive cubic map with dual discrete memristors: design, implementation, and application in image encryption. IEEE Transactions on Circuits and Systems for Video Technology","DOI":"10.1109\/TCSVT.2025.3545868"},{"key":"351_CR22","doi-asserted-by":"crossref","unstructured":"Gao S, Zhang Z, Iu HH-C, Ding S, Mou J, Erkan U, Toktas A, Li Q, Wang C, Cao Y (2025b) A parallel color image encryption algorithm based on a 2d logistic-rulkov neuron map. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2025.3540097"},{"issue":"2","key":"351_CR23","doi-asserted-by":"publisher","first-page":"1170","DOI":"10.1007\/s12596-023-01232-8","volume":"53","author":"A Hadj Brahim","year":"2024","unstructured":"Hadj Brahim A, Ali Pacha A, Hadj Said N (2024) An image encryption scheme based on a modified aes algorithm by using a variable s-box. J Opt 53(2):1170\u20131185","journal-title":"J Opt"},{"key":"351_CR24","doi-asserted-by":"publisher","unstructured":"Hayat U, Ahmed N (2019) A novel image encryption scheme based on an elliptic curve. Signal Processing 155(1):391\u2013402. https:\/\/doi.org\/10.1088\/1674-1056\/26\/12\/120504","DOI":"10.1088\/1674-1056\/26\/12\/120504"},{"key":"351_CR25","doi-asserted-by":"publisher","unstructured":"He X, Li L, Peng H, Tong F (2024) 2-d compressive sensing-based visually secure multilevel image encryption scheme. IEEE Sensors Journal 24(3):3286\u20133300. https:\/\/doi.org\/10.1109\/JSEN.2023.3341428","DOI":"10.1109\/JSEN.2023.3341428"},{"issue":"4","key":"351_CR26","doi-asserted-by":"publisher","first-page":"3583","DOI":"10.1007\/s11071-021-06941-y","volume":"106","author":"Z Hua","year":"2021","unstructured":"Hua Z, Li J, Li Y, Chen Y (2021) Image encryption using value-differencing transformation and modified zigzag transformation. Nonlinear Dyn 106(4):3583\u20133599","journal-title":"Nonlinear Dyn"},{"issue":"5","key":"351_CR27","doi-asserted-by":"publisher","first-page":"513","DOI":"10.3390\/e27050513","volume":"27","author":"L Huang","year":"2025","unstructured":"Huang L, Huang Q, Chen H, Cai S, Xiong X, Yang J (2025) A novel one-dimensional chaotic system for image encryption in network transmission through base64 encoding. Entropy 27(5):513\u2013513","journal-title":"Entropy"},{"key":"351_CR28","doi-asserted-by":"publisher","unstructured":"Iqbal N, Naqvi R.A, Atif M, Khan M.A, Hanif M, Abbas S, Hussain D (2021) On the image encryption algorithm based on the chaotic system, dna encoding, and castle. IEEE Access 9:118253\u2013118270. https:\/\/doi.org\/10.1109\/ACCESS.2021.3106028","DOI":"10.1109\/ACCESS.2021.3106028"},{"key":"351_CR29","doi-asserted-by":"publisher","first-page":"172304","DOI":"10.1016\/j.ijleo.2025.172304","volume":"327","author":"S Jain","year":"2025","unstructured":"Jain S, Samal A, Sharma A, Khurana M, Sharma B (2025) Advanced image security through chaotic system-based encryption and fisher-yates matrix shuffling. Optik 327:172304\u2013172304","journal-title":"Optik"},{"key":"351_CR30","doi-asserted-by":"crossref","unstructured":"Jasra B, Hassan MA (2022) Color image encryption and authentication using dynamic dna encoding and hyper chaotic system. Expert Systems With Applications 206","DOI":"10.1016\/j.eswa.2022.117861"},{"issue":"6","key":"351_CR31","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1175\/1520-0493(1993)093<0343:ANCOS>2.3.CO;2","volume":"93","author":"CP Jelesnianski","year":"1965","unstructured":"Jelesnianski CP (1965) A numerical computation of storm tides by a tropical storm impinging on a continental shelf. Mon Weather Rev 93(6):343\u2013358","journal-title":"Mon Weather Rev"},{"issue":"10","key":"351_CR32","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/acdac3","volume":"32","author":"C-L Jian","year":"2023","unstructured":"Jian C-L, Tian Z-A, Liang B, Hu C-Y, Wang Q, Chen J-X (2023) Rucklidge-based memristive chaotic system: Dynamic analysis and image encryption. Chin Phys B 32(10):100503","journal-title":"Chin Phys B"},{"key":"351_CR33","doi-asserted-by":"publisher","unstructured":"Kermany D, Zhang K, Goldbaum M (2018) Labeled Optical Coherence Tomography (OCT) and Chest X-Ray Images for Classification. Mendeley Data. https:\/\/doi.org\/10.17632\/rscbjbr9sj.2","DOI":"10.17632\/rscbjbr9sj.2"},{"issue":"3","key":"351_CR34","doi-asserted-by":"publisher","first-page":"035213","DOI":"10.1088\/1402-4896\/adadab","volume":"100","author":"B Khadem","year":"2025","unstructured":"Khadem B, Gholamzadeh M, Ahmad M, Ansari ZA (2025) Robust image encryption scheme based on 6d hyper-chaos and dpa-resistant s-box. Phys Scr 100(3):035213\u2013035213","journal-title":"Phys Scr"},{"key":"351_CR35","doi-asserted-by":"crossref","unstructured":"Khan FA, Ahmed J, Alqahtani F, Alsuhibany SA, Ahmed F, Ahmad J, 5, (2022) A secure and lightweight chaos based image encryption scheme. Computers Materials & Continua 73(1):279\u2013294","DOI":"10.32604\/cmc.2022.028789"},{"key":"351_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121452","volume":"237","author":"O Kocak","year":"2024","unstructured":"Kocak O, Erkan U, Toktas A, Gao S (2024) Pso-based image encryption scheme using modular integrated logistic exponential map. Expert Syst Appl 237:121452","journal-title":"Expert Syst Appl"},{"key":"351_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119923","volume":"223","author":"Q Lai","year":"2023","unstructured":"Lai Q, Liu Y (2023) A cross-channel color image encryption algorithm using two-dimensional hyperchaotic map. Expert Syst Appl 223:119923","journal-title":"Expert Syst Appl"},{"issue":"1","key":"351_CR38","doi-asserted-by":"publisher","first-page":"2255","DOI":"10.1007\/s11071-017-3583-1","volume":"89","author":"D Lambi","year":"2017","unstructured":"Lambi D (2017) Cryptanalyzing a novel pseudorandom number generator based on pseudorandomly enhanced logistic map. Nonlinear Dyn 89(1):2255\u20132257","journal-title":"Nonlinear Dyn"},{"key":"351_CR39","doi-asserted-by":"crossref","unstructured":"Li L (2024) A novel chaotic map application in image encryption algorithm. Expert Syst Appl 252(PB):124316","DOI":"10.1016\/j.eswa.2024.124316"},{"key":"351_CR40","doi-asserted-by":"publisher","unstructured":"Li L (2024) Image encryption algorithm based on hyperchaos and dna coding. IET Image Processing 18(3):627\u2013649. https:\/\/doi.org\/10.1049\/ipr2.12974,https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/ipr2.12974","DOI":"10.1049\/ipr2.12974"},{"issue":"2","key":"351_CR41","doi-asserted-by":"publisher","first-page":"5351","DOI":"10.1007\/s11042-023-15550-3","volume":"83","author":"Q Li","year":"2024","unstructured":"Li Q, Chen L (2024) An image encryption algorithm based on 6-dimensional hyper chaotic system and dna encoding. Multimedia Tools and Applications 83(2):5351\u20135368","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"351_CR42","first-page":"45","volume":"14","author":"Q Li","year":"2005","unstructured":"Li Q, Duan Z (2005) Shapiro typhoon wind-field model and its numerical simulation. Journal of natural disaster 14(1):45\u201352","journal-title":"Journal of natural disaster"},{"issue":"11","key":"351_CR43","doi-asserted-by":"publisher","first-page":"107794","DOI":"10.1016\/j.jfranklin.2025.107794","volume":"362","author":"X Li","year":"2025","unstructured":"Li X, Teng L (2025) An image encryption scheme based on new hyperchaos and encrypted kinoform. J Franklin Inst 362(11):107794\u2013107794","journal-title":"J Franklin Inst"},{"issue":"8","key":"351_CR44","doi-asserted-by":"publisher","first-page":"5695","DOI":"10.1109\/TCSVT.2021.3138795","volume":"32","author":"Q Li","year":"2021","unstructured":"Li Q, Wang X, Ma B, Wang X, Wang C, Gao S, Shi Y (2021) Concealed attack for robust watermarking based on generative model and perceptual loss. IEEE Trans Circuits Syst Video Technol 32(8):5695\u20135706","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"1","key":"351_CR45","first-page":"106","volume":"71","author":"Q Li","year":"2023","unstructured":"Li Q, Ma B, Wang X, Wang C, Gao S (2023) Image steganography in color conversion. IEEE Trans Circuits Syst II Express Briefs 71(1):106\u2013110","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"issue":"10","key":"351_CR46","doi-asserted-by":"publisher","first-page":"4103","DOI":"10.1109\/TCSI.2023.3296693","volume":"70","author":"S-Y Li","year":"2023","unstructured":"Li S-Y, Gai Y, Shih K-C, Chen C-S (2023) An efficient image encryption algorithm based on innovative des structure and hyperchaotic keys. IEEE Trans Circuits Syst I Regul Pap 70(10):4103\u20134111","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"key":"351_CR47","doi-asserted-by":"publisher","unstructured":"Liang Q, Zhu C (2023) A new one-dimensional chaotic map for image encryption scheme based on random dna coding. Optics & Laser Technology 160:109033. https:\/\/doi.org\/10.1016\/j.optlastec.2022.109033","DOI":"10.1016\/j.optlastec.2022.109033"},{"key":"351_CR48","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124891","volume":"257","author":"Y Lin","year":"2024","unstructured":"Lin Y, Xie Z, Chen T, Cheng X, Wen H (2024) Image privacy protection scheme based on high-quality reconstruction dct compression and nonlinear dynamics. Expert Syst Appl 257:124891","journal-title":"Expert Syst Appl"},{"issue":"2","key":"351_CR49","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/j.cnsns.2014.05.022","volume":"20","author":"Y Luo","year":"2015","unstructured":"Luo Y, Du M, Liu J (2015) A symmetrical image encryption scheme in wavelet and time domain. Commun Nonlinear Sci Numer Simul 20(2):447\u2013460","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"1","key":"351_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2019.105836","volume":"124","author":"Y Luo","year":"2020","unstructured":"Luo Y, Tang S, Liu J, Cao L, Qiu S (2020) Image encryption scheme by combining the hyper-chaotic system with quantum coding. Opt Lasers Eng 124(1):105836","journal-title":"Opt Lasers Eng"},{"issue":"2","key":"351_CR51","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s11554-023-01294-8","volume":"20","author":"N Mao","year":"2023","unstructured":"Mao N, Tong X, Zhang M, Wang Z (2023) Real-time image encryption algorithm based on combined chaotic map and optimized lifting wavelet transform. J Real-Time Image Proc 20(2):35","journal-title":"J Real-Time Image Proc"},{"issue":"2","key":"351_CR52","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1080\/23742917.2024.2338954","volume":"9","author":"D Okunbor","year":"2025","unstructured":"Okunbor D (2025) Analysis of linear feedback shift registers and chaos-based techniques for image encryption. Journal of Cyber Security Technology 9(2):79\u201387","journal-title":"Journal of Cyber Security Technology"},{"key":"351_CR53","doi-asserted-by":"crossref","unstructured":"Pradhan G, Dawadi BR, Chaulagain A, Joshi AL, Vaidya PG (2023) Chaos and dna coding technique for image cryptography. Security and Privacy 7(2)","DOI":"10.1002\/spy2.359"},{"issue":"11","key":"351_CR54","doi-asserted-by":"publisher","first-page":"1890","DOI":"10.3390\/math13111890","volume":"13","author":"M Qi","year":"2025","unstructured":"Qi M, Wang D (2025) Secure parallel image cryptographic hash function using a novel 2d high-randomness hyperchaotic map. Mathematics 13(11):1890\u20131890","journal-title":"Mathematics"},{"issue":"16","key":"351_CR55","doi-asserted-by":"publisher","first-page":"14527","DOI":"10.1007\/s11071-024-09769-4","volume":"112","author":"L Qiang","year":"2024","unstructured":"Qiang L, Yuan L (2024) A meaningful image encryption method based on dynamic update pixel diffusion and 2d hyperchaotic map. Nonlinear Dyn 112(16):14527\u201314546","journal-title":"Nonlinear Dyn"},{"issue":"12","key":"351_CR56","doi-asserted-by":"publisher","first-page":"10611","DOI":"10.1007\/s11071-024-09632-6","volume":"112","author":"X Qin","year":"2024","unstructured":"Qin X, Zhang Y (2024) Image encryption algorithm based on coa and hyperchaotic lorenz system. Nonlinear Dyn 112(12):10611\u201310632","journal-title":"Nonlinear Dyn"},{"issue":"16","key":"351_CR57","doi-asserted-by":"publisher","first-page":"14573","DOI":"10.1007\/s11071-024-09841-z","volume":"112","author":"L RongQing","year":"2024","unstructured":"RongQing L, LingFeng L, Xuan H, BingXue J, ZiWen Z, LiuQin F (2024) Thumbnail-preserving encryption by sum-preserving within blocks based on exponential chaotic map. Nonlinear Dyn 112(16):14573\u201314592","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"351_CR58","doi-asserted-by":"publisher","first-page":"29602","DOI":"10.1038\/s41598-024-80969-z","volume":"14","author":"A Sambas","year":"2024","unstructured":"Sambas A, Zhang X, Moghrabi IAR, Vaidyanathan S, Benkouider K, Al\u00e7\u0131n M, Koyuncu TM, Sulaiman IM, Mohamed MA, Johansyah MD (2024) Ann-based chaotic prng in the novel jerk chaotic system and its application for the image encryption via 2-d hilbert curve. Sci Rep 14(1):29602\u201329602","journal-title":"Sci Rep"},{"issue":"13","key":"351_CR59","doi-asserted-by":"publisher","first-page":"17177","DOI":"10.1007\/s11071-025-11001-w","volume":"113","author":"C \u015eim\u015fek","year":"2025","unstructured":"\u015eim\u015fek C, Erkan U, Toktas A, Lai Q, Gao S (2025) Hexadecimal permutation and 2d cumulative diffusion image encryption using hyperchaotic sinusoidal exponential memristive system. Nonlinear Dyn 113(13):17177\u201317208","journal-title":"Nonlinear Dyn"},{"issue":"13","key":"351_CR60","doi-asserted-by":"publisher","first-page":"17177","DOI":"10.1007\/s11071-025-11001-w","volume":"113","author":"C \u015eim\u015fek","year":"2025","unstructured":"\u015eim\u015fek C, Erkan U, Toktas A, Lai Q, Gao S (2025) Hexadecimal permutation and 2d cumulative diffusion image encryption using hyperchaotic sinusoidal exponential memristive system. Nonlinear Dyn 113(13):17177\u201317208","journal-title":"Nonlinear Dyn"},{"key":"351_CR61","doi-asserted-by":"publisher","unstructured":"Song W, Fu C, Zheng Y, Zhang Y, Chen J, Wang P (2024) Batch image encryption using cross image permutation and diffusion. Journal of Information Security and Applications 80, 103686. https:\/\/doi.org\/10.1016\/j.jisa.2023.103686","DOI":"10.1016\/j.jisa.2023.103686"},{"key":"351_CR62","doi-asserted-by":"crossref","unstructured":"Subhajit A, Sunil K (2023) Medical image encryption method using cubic-sin-logistic-tent chaotic pseudo-random number sequence-based substitution. SN Computer Science 4(4)","DOI":"10.1007\/s42979-023-01783-4"},{"issue":"3","key":"351_CR63","doi-asserted-by":"publisher","first-page":"3959","DOI":"10.1007\/s11042-021-11690-6","volume":"81","author":"F Sun","year":"2022","unstructured":"Sun F, Lv Z (2022) A secure image encryption based on spatial surface chaotic system and aes algorithm. Multimedia Tools and Applications 81(3):3959\u20133979","journal-title":"Multimedia Tools and Applications"},{"key":"351_CR64","doi-asserted-by":"crossref","unstructured":"Wang X, Gao, (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci 507(1):16\u201336","DOI":"10.1016\/j.ins.2019.08.041"},{"issue":"1","key":"351_CR65","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.ins.2020.06.030","volume":"539","author":"X Wang","year":"2020","unstructured":"Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf Sci 539(1):195\u2013214","journal-title":"Inf Sci"},{"issue":"4","key":"351_CR66","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"X Wang","year":"2012","unstructured":"Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101\u20131108","journal-title":"Signal Process"},{"issue":"1","key":"351_CR67","first-page":"1","volume":"125","author":"X Wang","year":"2020","unstructured":"Wang X, Wang Y, Zhu X, Luo C (2020) A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level. Opt Lasers Eng 125(1):1\u201312","journal-title":"Opt Lasers Eng"},{"key":"351_CR68","doi-asserted-by":"crossref","unstructured":"Wang M, Song X, Zhou N, Liu S (2024) Novel 1-d enhanced log-logistic chaotic map and asymmetric generalized gaussian apertured frft for image encryption. Chaos Solitons and Fractals the interdisciplinary journal of Nonlinear Science and Nonequilibrium and Complex Phenomena 187:115443\u2013115443","DOI":"10.1016\/j.chaos.2024.115443"},{"key":"351_CR69","doi-asserted-by":"crossref","unstructured":"Wang H, Cheng X, Wu H, Luo X, Ma B, Zong H, Zhang J, Wang J (2025) A gan-based anti-forensics method by modifying the quantization table in jpeg header file. Journal of Visual Communication and Image Representation, 104462","DOI":"10.1016\/j.jvcir.2025.104462"},{"key":"351_CR70","doi-asserted-by":"publisher","unstructured":"Wang X, Wang Y, Zhu X, Luo C (2020) A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and dna level. Optics and Lasers in Engineering 125:105851. https:\/\/doi.org\/10.1016\/j.optlaseng.2019.105851","DOI":"10.1016\/j.optlaseng.2019.105851"},{"key":"351_CR71","doi-asserted-by":"publisher","first-page":"14721","DOI":"10.1038\/s41598-023-41082-9","volume":"13","author":"H Wen","year":"2023","unstructured":"Wen H, Lin Y, Xie Z, Liu T (2023) Chaos-based block permutation and dynamic sequence multiplexing for video encryption. Sci Rep 13:14721","journal-title":"Sci Rep"},{"key":"351_CR72","first-page":"101634","volume":"51","author":"H Wen","year":"2024","unstructured":"Wen H, Lin Y, Feng Z (2024) Cryptanalyzing a bit-level image encryption algorithm based on chaotic maps. Eng Sci Technol Int J 51:101634","journal-title":"Eng Sci Technol Int J"},{"key":"351_CR73","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.113492","volume":"172","author":"X Wu","year":"2023","unstructured":"Wu X, Shi H, Ji\u2019e M, Duan S, Wang L (2023) A novel image compression and encryption scheme based on conservative chaotic system and dna method. Chaos Solitons & Fractals 172:113492","journal-title":"Chaos Solitons & Fractals"},{"issue":"1","key":"351_CR74","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1016\/j.ins.2020.09.055","volume":"547","author":"Y Xian","year":"2021","unstructured":"Xian Y, Wang X (2021) Fractal sorting matrix and its application on chaotic image encryption. Inf Sci 547(1):1154\u20131169","journal-title":"Inf Sci"},{"key":"351_CR75","doi-asserted-by":"publisher","unstructured":"Zang H, Tai M, Wei X (2022) Image encryption schemes based on a class of uniformly distributed chaotic systems. Mathematics 10(7). https:\/\/doi.org\/10.3390\/math10071027","DOI":"10.3390\/math10071027"},{"issue":"11","key":"351_CR76","doi-asserted-by":"publisher","first-page":"10629","DOI":"10.1007\/s11071-023-08397-8","volume":"111","author":"Z Zhang","year":"2023","unstructured":"Zhang Z, Tang J, Ni H, Huang T (2023) Image adaptive encryption algorithm using a novel 2d chaotic system. Nonlinear Dyn 111(11):10629\u201310652","journal-title":"Nonlinear Dyn"},{"key":"351_CR77","doi-asserted-by":"publisher","first-page":"112751","DOI":"10.1016\/j.optlastec.2025.112751","volume":"186","author":"H Zhang","year":"2025","unstructured":"Zhang H, Hu H, Ding W (2025) A time-varying image encryption algorithm driven by neural network. Opt Laser Technol 186:112751\u2013112751","journal-title":"Opt Laser Technol"},{"issue":"12","key":"351_CR78","doi-asserted-by":"publisher","first-page":"1976","DOI":"10.3390\/math13121976","volume":"13","author":"H Zhang","year":"2025","unstructured":"Zhang H, Feng X, Sun J, Yan P (2025) Chaotic image security techniques and developments: A review. Mathematics 13(12):1976\u20131976","journal-title":"Mathematics"},{"issue":"1","key":"351_CR79","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.optcom.2015.05.043","volume":"354","author":"N Zhou","year":"2015","unstructured":"Zhou N, Yang J, Tan C, Pan S, Zhou Z (2015) Double-image encryption scheme combining DWT-based compressive sensing with discrete fractional random transform. Opt Commun 354(1):112\u2013121","journal-title":"Opt Commun"},{"key":"351_CR80","doi-asserted-by":"crossref","unstructured":"Zhou S, Wei Y, Zhang Y, Teng L (2023) Novel chaotic image cryptosystem using dynamic dna coding. International Journal of Modern Physics C 35(06)","DOI":"10.1142\/S0129183124500682"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00351-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00351-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00351-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T12:02:20Z","timestamp":1772712140000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00351-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,23]]},"references-count":80,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["351"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00351-5","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"value":"1319-1578","type":"print"},{"value":"2213-1248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,23]]},"assertion":[{"value":"15 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"83"}}