{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T03:56:35Z","timestamp":1772855795534,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T00:00:00Z","timestamp":1769212800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T00:00:00Z","timestamp":1772755200000},"content-version":"vor","delay-in-days":41,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s44443-025-00448-x","type":"journal-article","created":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T08:16:11Z","timestamp":1769242571000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A multi-layer windmill image retention encryption algorithm based on composite sequences and DNA"],"prefix":"10.1007","volume":"38","author":[{"given":"Ning","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Mingxin","family":"Fang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2663-2415","authenticated-orcid":false,"given":"Bing","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,24]]},"reference":[{"issue":"1","key":"448_CR1","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1007\/s40747-023-01187-0","volume":"10","author":"YM Afify","year":"2024","unstructured":"Afify YM, Sharkawy NH, Gad W, Badr N (2024) A new dynamic DNA-coding model for gray-scale image encryption. Complex Intell Syst 10(1):745\u2013761. https:\/\/doi.org\/10.1007\/s40747-023-01187-0","journal-title":"Complex Intell Syst"},{"key":"448_CR2","doi-asserted-by":"publisher","unstructured":"Aharonov, Davidovich, Zagury (1993) Quantum random walks. Physical review. A, Atomic, molecular, and optical physics. 48(2):1687\u20131690. https:\/\/doi.org\/10.1103\/PhysRevA.48.1687","DOI":"10.1103\/PhysRevA.48.1687"},{"key":"448_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2025.104140","author":"A Chowdhury","year":"2025","unstructured":"Chowdhury A, Uddin M, Hassan MR, Billah MM (2025) Image encryption algorithm based on DNA sequence-driven key scrambling and secure hashing. J Inf Secur Appl. https:\/\/doi.org\/10.1016\/j.jisa.2025.104140","journal-title":"J Inf Secur Appl"},{"key":"448_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2021.167286","author":"QQ Cun","year":"2021","unstructured":"Cun QQ, Tong XJ, Wang Z, Zhang M (2021) Selective image encryption method based on dynamic DNA coding and new chaotic map. Optik. https:\/\/doi.org\/10.1016\/j.ijleo.2021.167286","journal-title":"Optik"},{"key":"448_CR5","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12163455","author":"LY Feng","year":"2023","unstructured":"Feng LY, Du JZ, Fu C, Song W (2023) Image encryption algorithm combining chaotic image encryption and convolutional neural network. Electronics. https:\/\/doi.org\/10.3390\/electronics12163455","journal-title":"Electronics"},{"key":"448_CR6","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5527295","author":"J Ferdush","year":"2021","unstructured":"Ferdush J, Begum M, Uddin MS (2021) Chaotic lightweight cryptosystem for image encryption. Adv Multim. https:\/\/doi.org\/10.1155\/2021\/5527295","journal-title":"Adv Multim"},{"issue":"6","key":"448_CR7","doi-asserted-by":"publisher","first-page":"3590","DOI":"10.1109\/TIT.2023.3242612","volume":"69","author":"ZC Gao","year":"2023","unstructured":"Gao ZC, Li JY (2023) Improved error bounds for the distance distribution of Reed-Solomon codes. IEEE Trans Inform Theory 69(6):3590\u20133596. https:\/\/doi.org\/10.1109\/TIT.2023.3242612","journal-title":"IEEE Trans Inform Theory"},{"issue":"1","key":"448_CR8","doi-asserted-by":"publisher","first-page":"180","DOI":"10.3934\/AMC.2023046","volume":"19","author":"BY He","year":"2025","unstructured":"He BY, Liao QY (2025) The error-correcting pair for direct sum codes. Adv Math Commun 19(1):180\u2013201. https:\/\/doi.org\/10.3934\/AMC.2023046","journal-title":"Adv Math Commun"},{"key":"448_CR9","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6679288","author":"PC He","year":"2021","unstructured":"He PC, Sun KH, Zhu CX (2021) A novel image encryption algorithm based on the delayed maps and permutation-confusion-diffusion architecture. Secur Commun Networks. https:\/\/doi.org\/10.1155\/2021\/6679288","journal-title":"Secur Commun Networks"},{"key":"448_CR10","doi-asserted-by":"publisher","first-page":"91441","DOI":"10.1109\/ACCESS.2023.3305637","volume":"11","author":"DD He","year":"2023","unstructured":"He DD, Parthasarathy R, Li H, Geng ZX (2023) A fast image encryption algorithm based on logistic mapping and hyperchaotic Lorenz system for clear text correlation. IEEE Access 11:91441\u201391453. https:\/\/doi.org\/10.1109\/ACCESS.2023.3305637","journal-title":"IEEE Access"},{"key":"448_CR11","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"ZY Hua","year":"2015","unstructured":"Hua ZY, Zhou YC, Pun CM, Chen CLP (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80\u201394. https:\/\/doi.org\/10.1016\/j.ins.2014.11.018","journal-title":"Inf Sci"},{"issue":"5","key":"448_CR12","doi-asserted-by":"publisher","DOI":"10.3390\/e27050513","volume":"27","author":"LQ Huang","year":"2025","unstructured":"Huang LQ, Huang QY, Chen H, Cai ST, Xiong XM, Yang J (2025a) A novel one-dimensional chaotic system for image encryption in network transmission through Base64 encoding. Entropy 27(5):513. https:\/\/doi.org\/10.3390\/e27050513","journal-title":"Entropy"},{"key":"448_CR13","doi-asserted-by":"publisher","DOI":"10.3390\/math13081330","author":"L Huang","year":"2025","unstructured":"Huang L, Ding C, Bao ZJ, Chen HT, Wan CS (2025b) A DNA encoding image encryption algorithm based on chaos. Mathematics. https:\/\/doi.org\/10.3390\/math13081330","journal-title":"Mathematics"},{"key":"448_CR14","doi-asserted-by":"publisher","unstructured":"Jiang SX, Li Y, Shi J, Zhang J (2024) Double quantum images encryption scheme based on chaotic system. Chinese Phys B 33(4). https:\/\/doi.org\/10.1088\/1674-1056\/AD1174","DOI":"10.1088\/1674-1056\/AD1174"},{"key":"448_CR15","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.physa.2016.03.042","volume":"458","author":"YB Kang","year":"2016","unstructured":"Kang YB (2016) Quantum decomposition of random walk on Cayley graph of finite group. Physica a-Stat Mech Appl 458:146\u2013156. https:\/\/doi.org\/10.1016\/j.physa.2016.03.042","journal-title":"Physica a-Stat Mech Appl"},{"issue":"5","key":"448_CR16","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1007\/s00521-014-1800-0","volume":"26","author":"M Khan","year":"2015","unstructured":"Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput Appl 26(5):1137\u20131148. https:\/\/doi.org\/10.1007\/s00521-014-1800-0","journal-title":"Neural Comput Appl"},{"key":"448_CR17","doi-asserted-by":"publisher","DOI":"10.1002\/CPE.8092","author":"T Kumari","year":"2024","unstructured":"Kumari T, Singh D, Singh B (2024) Multi-chaotic maps and blockchain based image encryption. Concurrency Comput Pract Exp. https:\/\/doi.org\/10.1002\/CPE.8092","journal-title":"Concurrency Comput Pract Exp"},{"issue":"3","key":"448_CR18","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1049\/ipr2.12974","volume":"18","author":"LZ Li","year":"2024","unstructured":"Li LZ (2024) Image encryption algorithm based on hyperchaos and DNA coding. IET Image Process 18(3):627\u2013649. https:\/\/doi.org\/10.1049\/ipr2.12974","journal-title":"IET Image Process"},{"key":"448_CR19","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/AD3171","author":"Y Li","year":"2024","unstructured":"Li Y, Wang QX, Yu SM (2024) A novel hybrid scheme for chaotic image encryption. Phys Scr. https:\/\/doi.org\/10.1088\/1402-4896\/AD3171","journal-title":"Phys Scr"},{"issue":"8","key":"448_CR20","doi-asserted-by":"publisher","first-page":"6695","DOI":"10.1007\/s11071-024-09353-w","volume":"112","author":"CH Luo","year":"2024","unstructured":"Luo CH, Wang Y, Fu YJ, Zhou P, Wang MY (2024) Constructing dynamic S-boxes based on chaos and irreducible polynomials for image encryption. Nonlinear Dyn 112(8):6695\u20136713. https:\/\/doi.org\/10.1007\/s11071-024-09353-w","journal-title":"Nonlinear Dyn"},{"key":"448_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124413","author":"FQ Meng","year":"2024","unstructured":"Meng FQ, Wu G (2024) A color image encryption and decryption scheme based on extended DNA coding and fractional-order 5D hyper-chaotic system. Expert Syst Appl. https:\/\/doi.org\/10.1016\/j.eswa.2024.124413","journal-title":"Expert Syst Appl"},{"key":"448_CR22","doi-asserted-by":"publisher","unstructured":"Sha YW, Mou J, Wang J, Banerjee S, Sun B (2023) Chaotic image encryption with hopfield neural network. Fractals-complex geometry patterns and scaling in nature and society 31(06). https:\/\/doi.org\/10.1142\/S0218348X23401072","DOI":"10.1142\/S0218348X23401072"},{"key":"448_CR23","doi-asserted-by":"publisher","first-page":"27477","DOI":"10.1109\/ACCESS.2023.3257349","volume":"11","author":"SW Shao","year":"2023","unstructured":"Shao SW, Li J, Shao P, Xu G (2023) Chaotic image encryption using piecewise-logistic-sine map. IEEE Access 11:27477\u201327488. https:\/\/doi.org\/10.1109\/ACCESS.2023.3257349","journal-title":"IEEE Access"},{"key":"448_CR24","doi-asserted-by":"publisher","DOI":"10.1080\/21642583.2024.2349896","author":"Y Shao","year":"2024","unstructured":"Shao Y, Zhu HR, Deng XF, Yang H (2024) Research on wheat image encryption based on different chaotic systems. Syst Sci Control Eng. https:\/\/doi.org\/10.1080\/21642583.2024.2349896","journal-title":"Syst Sci Control Eng"},{"key":"448_CR25","doi-asserted-by":"publisher","DOI":"10.3390\/E24111574","author":"HL Shen","year":"2022","unstructured":"Shen HL, Shan XL, Xu M, Tian ZH (2022) A new chaotic image encryption algorithm based on transversals in a Latin square. Entropy. https:\/\/doi.org\/10.3390\/E24111574","journal-title":"Entropy"},{"issue":"10","key":"448_CR26","doi-asserted-by":"publisher","first-page":"6954","DOI":"10.3390\/E17106954","volume":"17","author":"CY Song","year":"2015","unstructured":"Song CY, Qiao YL (2015) A novel image encryption algorithm based on DNA encoding and spatiotemporal chaos. Entropy 17(10):6954\u20136968. https:\/\/doi.org\/10.3390\/E17106954","journal-title":"Entropy"},{"key":"448_CR27","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.image.2018.12.008","volume":"72","author":"YR Su","year":"2019","unstructured":"Su YR, Wo Y, Han GQ (2019) Reversible cellular automata image encryption for similarity search. Signal Process-Image Commun 72:134\u2013147. https:\/\/doi.org\/10.1016\/j.image.2018.12.008","journal-title":"Signal Process-Image Commun"},{"key":"448_CR28","doi-asserted-by":"publisher","DOI":"10.3390\/e27080776","author":"YJ Su","year":"2025","unstructured":"Su YJ, Xia H, Chen ZY, Chen H, Huang LQ (2025) A novel one-dimensional chaotic system for image encryption through the three-strand structure of DNA. Entropy. https:\/\/doi.org\/10.3390\/e27080776","journal-title":"Entropy"},{"issue":"2","key":"448_CR29","doi-asserted-by":"publisher","first-page":"2625","DOI":"10.32604\/CMC.2024.050337","volume":"79","author":"ML Sun","year":"2024","unstructured":"Sun ML, Yuan J, Li XY, Liu DX (2024) Chaotic CS encryption: an efficient image encryption algorithm based on Chebyshev chaotic system and compressive sensing. CMC-Comput Mater Contin 79(2):2625\u20132646. https:\/\/doi.org\/10.32604\/CMC.2024.050337","journal-title":"CMC-Comput Mater Contin"},{"key":"448_CR30","doi-asserted-by":"publisher","unstructured":"Sun H, Liu L, Jin J, Lin HR (2025) A Fractional-order memristive hopfield neural network and its application in medical image encryption. Mathematics 13(16). https:\/\/doi.org\/10.1049\/10.3390\/math13162571","DOI":"10.1049\/10.3390\/math13162571"},{"issue":"3","key":"448_CR31","doi-asserted-by":"publisher","first-page":"346","DOI":"10.5755\/j01.itc.49.3.25901","volume":"49","author":"S Sundarakrishnan","year":"2020","unstructured":"Sundarakrishnan S, Jaison B, Raja SP (2020) Secured color image compression based on compressive sampling and Lu system. Inf Technol Control 49(3):346\u2013369. https:\/\/doi.org\/10.5755\/j01.itc.49.3.25901","journal-title":"Inf Technol Control"},{"key":"448_CR32","doi-asserted-by":"publisher","DOI":"10.3390\/s22249929","author":"PF Wang","year":"2022","unstructured":"Wang PF, Wang YX, Xiang JF, Xiao XL (2022a) Fast image encryption algorithm for Logistics-Sine-Cosine mapping. Sensors. https:\/\/doi.org\/10.3390\/s22249929","journal-title":"Sensors"},{"key":"448_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2021.107753","author":"SM Wang","year":"2022","unstructured":"Wang SM, Peng QQ, Du BX (2022b) Chaotic color image encryption based on 4D chaotic maps and DNA sequence. Opt Laser Technol. https:\/\/doi.org\/10.1016\/j.optlastec.2021.107753","journal-title":"Opt Laser Technol"},{"key":"448_CR34","doi-asserted-by":"publisher","DOI":"10.3390\/e27010084","author":"L Wang","year":"2025","unstructured":"Wang L, Song WJ, Di JL, Zhang XC, Zou CY (2025) Image encryption method based on three-dimensional chaotic systems and V-shaped scrambling. Entropy. https:\/\/doi.org\/10.3390\/e27010084","journal-title":"Entropy"},{"key":"448_CR35","doi-asserted-by":"publisher","DOI":"10.3390\/math11143133","author":"HP Wen","year":"2023","unstructured":"Wen HP, Kang SH, Wu ZX, Lin YT, Huang YM (2023) Dynamic RNA coding color image cipher based on chain feedback structure. Mathematics. https:\/\/doi.org\/10.3390\/math11143133","journal-title":"Mathematics"},{"issue":"4","key":"448_CR36","doi-asserted-by":"publisher","first-page":"3213","DOI":"10.1007\/s11760-023-02984-3","volume":"18","author":"WQ Wu","year":"2024","unstructured":"Wu WQ, Kong LS (2024) Image encryption algorithm based on a new 2D polynomial chaotic map and dynamic S-box. Signal Image Video Process 18(4):3213\u20133228. https:\/\/doi.org\/10.1007\/s11760-023-02984-3","journal-title":"Signal Image Video Process"},{"issue":"2","key":"448_CR37","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/TETCI.2019.2952908","volume":"4","author":"F Xia","year":"2020","unstructured":"Xia F, Liu JY, Nie HS, Fu YH, Wan LT, Kong XJ (2020) Random walks: a review of algorithms and applications. IEEE Trans Emerg Top Comput Intell 4(2):95\u2013107. https:\/\/doi.org\/10.1109\/TETCI.2019.2952908","journal-title":"IEEE Trans Emerg Top Comput Intell"},{"issue":"6","key":"448_CR38","doi-asserted-by":"publisher","first-page":"4028","DOI":"10.1016\/10.1109\/TCSVT.2021.3108767","volume":"32","author":"YJ Xian","year":"2022","unstructured":"Xian YJ, Wang XY, Teng L (2022) Double parameters fractal sorting matrix and its application in image encryption. IEEE Trans Circuits Syst Video Technol 32(6):4028\u20134037. https:\/\/doi.org\/10.1016\/10.1109\/TCSVT.2021.3108767","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"448_CR39","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ADB523","author":"QM Xiao","year":"2025","unstructured":"Xiao QM, Yu WX (2025) A random decomposition method for chaotic sequences to improve the security of image encryption. Phys Scr. https:\/\/doi.org\/10.1088\/1402-4896\/ADB523","journal-title":"Phys Scr"},{"issue":"13","key":"448_CR40","doi-asserted-by":"publisher","first-page":"11501","DOI":"10.1007\/s11071-024-09616-6","volume":"112","author":"WJ Xu","year":"2024","unstructured":"Xu WJ, Liu LF (2024) An image autonomous selection encryption algorithm based on the delay exponential logistic chaotic model. Nonlinear Dyn 112(13):11501\u201311522. https:\/\/doi.org\/10.1007\/s11071-024-09616-6","journal-title":"Nonlinear Dyn"},{"key":"448_CR41","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127423500219","author":"JJ Xu","year":"2023","unstructured":"Xu JJ, Zhao B (2023) Designing an image encryption algorithm based on hyperchaotic system and DCT. Int J Bifurcat Chaos. https:\/\/doi.org\/10.1142\/S0218127423500219","journal-title":"Int J Bifurcat Chaos"},{"key":"448_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106178","author":"QY Xu","year":"2020","unstructured":"Xu QY, Sun KH, He SB, Zhu CX (2020) An effective image encryption algorithm based on compressive sensing and 2D-SLIM. Opt Lasers Eng. https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106178","journal-title":"Opt Lasers Eng"},{"key":"448_CR43","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-86771-9","author":"CY Xu","year":"2025","unstructured":"Xu CY, Shang YB, Yang YW, Zou CY (2025) An encryption algorithm for multiple medical images based on a novel chaotic system and an odd-even separation strategy. Sci Rep. https:\/\/doi.org\/10.1038\/s41598-025-86771-9","journal-title":"Sci Rep"},{"key":"448_CR44","doi-asserted-by":"publisher","DOI":"10.3390\/app15020913","author":"YX Yao","year":"2025","unstructured":"Yao YX, Xu XM, Jiang ZH (2025) A new chaotic color image encryption algorithm based on memristor model and random hybrid transforms. Appl Sci. https:\/\/doi.org\/10.3390\/app15020913","journal-title":"Appl Sci"},{"issue":"14","key":"448_CR45","doi-asserted-by":"publisher","first-page":"20037","DOI":"10.1007\/s11042-018-7110-2","volume":"78","author":"WQ Yu","year":"2019","unstructured":"Yu WQ, Liu Y, Gong LH, Tian MM, Tu LQ (2019) Double-image encryption based on spatiotemporal chaos and DNA operations. Multimedia Tools Appl 78(14):20037\u201320064. https:\/\/doi.org\/10.1007\/s11042-018-7110-2","journal-title":"Multimedia Tools Appl"},{"issue":"11","key":"448_CR46","doi-asserted-by":"publisher","first-page":"8001","DOI":"10.1007\/s00371-023-03219-9","volume":"40","author":"JW Yu","year":"2024","unstructured":"Yu JW, Peng KY, Zhang LW, Xie W (2024) Image encryption algorithm based on DNA network and hyperchaotic system. Vis Comput 40(11):8001\u20138021. https:\/\/doi.org\/10.1007\/s00371-023-03219-9","journal-title":"Vis Comput"},{"issue":"3","key":"448_CR47","doi-asserted-by":"publisher","first-page":"7939","DOI":"10.1007\/s11042-023-14786-3","volume":"83","author":"EZ Zefreh","year":"2024","unstructured":"Zefreh EZ, Abdali M (2024) LSIE: a fast and secure Latin square-based image encryption scheme. Multimedia Tools Appl 83(3):7939\u20137979. https:\/\/doi.org\/10.1007\/s11042-023-14786-3","journal-title":"Multimedia Tools Appl"},{"issue":"1","key":"448_CR48","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s11071-014-1445-7","volume":"78","author":"XP Zhang","year":"2014","unstructured":"Zhang XP, Mao YB, Zhao ZM (2014) An efficient chaotic image encryption based on alternate circular S-boxes. Nonlinear Dyn 78(1):359\u2013369. https:\/\/doi.org\/10.1007\/s11071-014-1445-7","journal-title":"Nonlinear Dyn"},{"key":"448_CR49","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.sigpro.2015.06.008","volume":"118","author":"W Zhang","year":"2016","unstructured":"Zhang W, Yu H, Zhao YL, Zhu ZL (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36\u201350. https:\/\/doi.org\/10.1016\/j.sigpro.2015.06.008","journal-title":"Signal Process"},{"key":"448_CR50","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/3594534","author":"XC Zhang","year":"2019","unstructured":"Zhang XC, Wang LF, Cui GZ, Niu Y (2019) Entropy-based block scrambling image encryption using DES structure and chaotic systems. Int J Opt. https:\/\/doi.org\/10.1155\/2019\/3594534","journal-title":"Int J Opt"},{"key":"448_CR51","doi-asserted-by":"publisher","unstructured":"Zhang WJ, Xu JJ, Zhao B (2023) DNA image encryption algorithm based on serrated spiral scrambling and cross bit plane. J King Saud Univ-Comput Inf Sci 35(10). https:\/\/doi.org\/10.1016\/j.jksuci.2023.101858","DOI":"10.1016\/j.jksuci.2023.101858"},{"key":"448_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2025.103974","author":"CF Zhao","year":"2025","unstructured":"Zhao CF, Zhai ZB, Zeng B (2025) Delayed chaotic image encryption algorithm using cross-layer and DNA coding techniques. Comput Stand Interfaces. https:\/\/doi.org\/10.1016\/j.csi.2025.103974","journal-title":"Comput Stand Interfaces"},{"issue":"11","key":"448_CR53","doi-asserted-by":"publisher","first-page":"2310","DOI":"10.1049\/iet-ipr.2019.1340","volume":"14","author":"JY Zheng","year":"2020","unstructured":"Zheng JY, Liu LF (2020) Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map. IET Image Process 14(11):2310\u20132320. https:\/\/doi.org\/10.1049\/iet-ipr.2019.1340","journal-title":"IET Image Process"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00448-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00448-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00448-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T15:16:58Z","timestamp":1772810218000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00448-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,24]]},"references-count":53,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["448"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00448-x","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"value":"1319-1578","type":"print"},{"value":"2213-1248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,24]]},"assertion":[{"value":"19 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"86"}}