{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T19:30:31Z","timestamp":1768073431116,"version":"3.49.0"},"reference-count":68,"publisher":"Wiley","license":[{"start":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T00:00:00Z","timestamp":1690243200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004895","name":"European Social Fund","doi-asserted-by":"publisher","award":["09.3.3-LMT-K-712"],"award-info":[{"award-number":["09.3.3-LMT-K-712"]}],"id":[{"id":"10.13039\/501100004895","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004895","name":"European Social Fund","doi-asserted-by":"publisher","award":["09.3.3-LMT-K-712-23-0235"],"award-info":[{"award-number":["09.3.3-LMT-K-712-23-0235"]}],"id":[{"id":"10.13039\/501100004895","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2023,7,25]]},"abstract":"<jats:p>The concept of a hyper coupled map lattice (CML) is presented in this paper. The complexity of the lattice is increased not by adding another spatial dimension of the lattice but by replacing scalar nodal variables by multidimensional square matrices of iterative variables. The proposed scheme exploits the nonlinear effects of the spatiotemporal divergence induced by nilpotent nodal matrices to generate separate secret images at different discrete moments of time during the evolution of the CML. The time variable plays the primary role in the decoding stage of the scheme. The carrying capacity of the proposed scheme is <jats:inline-formula>\n                     <a:math xmlns:a=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M1\">\n                        <a:mi>n<\/a:mi>\n                        <a:mo>\u2212<\/a:mo>\n                        <a:mn>1<\/a:mn>\n                     <\/a:math>\n                  <\/jats:inline-formula> different dichotomous digital images, where <jats:inline-formula>\n                     <c:math xmlns:c=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M2\">\n                        <c:mi>n<\/c:mi>\n                     <\/c:math>\n                  <\/jats:inline-formula> is the dimension of the nilpotent nodal matrices. Computational experiments are used to demonstrate the efficacy of the proposed scheme.<\/jats:p>","DOI":"10.1155\/2023\/8831078","type":"journal-article","created":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T15:38:44Z","timestamp":1690299524000},"page":"1-20","source":"Crossref","is-referenced-by-count":2,"title":["Hyper Coupled Map Lattices for Hiding Multiple Images"],"prefix":"10.1155","volume":"2023","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0005-8240","authenticated-orcid":true,"given":"Rasa","family":"Smidtaite","sequence":"first","affiliation":[{"name":"Department of Applied Mathematics, Kaunas University of Technology, Studentu 50-429, Kaunas 51368, Lithuania"}]},{"given":"Jurate","family":"Ragulskiene","sequence":"additional","affiliation":[{"name":"Department of Mathematical Modelling, Kaunas University of Technology, Studentu 50-146, Kaunas 51368, Lithuania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3101-6967","authenticated-orcid":true,"given":"Liepa","family":"Bikulciene","sequence":"additional","affiliation":[{"name":"Department of Applied Mathematics, Kaunas University of Technology, Studentu 50-429, Kaunas 51368, Lithuania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3348-9717","authenticated-orcid":true,"given":"Minvydas","family":"Ragulskis","sequence":"additional","affiliation":[{"name":"Department of Mathematical Modelling, Kaunas University of Technology, Studentu 50-146, Kaunas 51368, Lithuania"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1143\/ptp.72.480"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1143\/ptp.74.1033"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(89)90117-6"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2014.8.4.09"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10014-4"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2019.02.009"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106040"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2855726"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.01.031"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6326-5"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-018-4361-4"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2018.06.016"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.3390\/e21050523"},{"issue":"3","key":"14","doi-asserted-by":"crossref","first-page":"123","DOI":"10.3923\/jai.2014.123.135","article-title":"Image encryption: an information security perceptive","volume":"7","author":"N. Aarthie","year":"2014","journal-title":"Journal of Artificial Intelligence"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5012496"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.3390\/e21090819"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1504\/ijesdf.2015.070389"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-022-00588-5"},{"issue":"1","key":"19","first-page":"1122","article-title":"A novel chaotic map encryption methodology for image cryptography and secret communication with steganography","volume":"8","author":"J. A. Alzubi","year":"2019","journal-title":"International Journal of Recent Technology and Engineering"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.54153\/sjpas.2021.v3i2.244"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.3390\/info11020110"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107255"},{"key":"23","first-page":"10816","article-title":"Large-capacity image steganography based on invertible neural networks","author":"S.-P. Lu"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12643-3"},{"key":"25","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/978-981-19-2126-1_9","article-title":"Coverless information hiding: a review","volume-title":"Proceedings of International Conference on Computational Intelligence","author":"N. Kanzariya","year":"2023"},{"key":"26","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/978-3-319-27051-7_11","article-title":"Coverless image steganography without embedding","volume-title":"Cloud Computing and Security: First International Conference, ICCCS 2015","author":"Z. Zhou","year":"2015"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-01033-x"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.12.002"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2901260"},{"key":"30","first-page":"1105","article-title":"Image encryption based on chaotic maps","author":"J. Fridrich"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2007.07.040"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.10.098"},{"key":"33","first-page":"102","article-title":"Image encryption using chaotic maps: a survey","author":"P. R. Sankpal"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2006.02.021"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.03.019"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-1911-x"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3085-4"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2014.05.023"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.10.033"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2018.12.178"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.3390\/e23111373"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-016-3030-8"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2817600"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-012-0409-z"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102428"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2011\/v4i5.27"},{"issue":"1","key":"47","first-page":"66","article-title":"Image encryption based on Henon map","volume":"31","author":"Z. Fan","year":"2008","journal-title":"Journal of Beijing University of Posts and Telecommunications"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-018-3989-7"},{"key":"49","first-page":"4","article-title":"Improved baker map for image encryption","author":"F. Han"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3925-x"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1103\/physreve.66.065202"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2012.11.002"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2007.10.054"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-66486-9"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2019.04.038"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2020.105589"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.108842"},{"key":"58","first-page":"373","article-title":"A secured steganography technique for hiding multiple images in an image using least significant bit algorithm and Arnold transformation","volume-title":"International Conference on Intelligent Data Communication Technologies and Internet of Things","author":"A. Jain","year":"2019"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2022.3141725"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-07849-3"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.3934\/dcdsb.2011.16.927"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2012.03.018"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.1038\/261459a0"},{"key":"64","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780198507239.001.0001","volume-title":"Chaos and Nonlinear Dynamics: An Introduction for Scientists and Engineers","author":"R. C. Hilborn","year":"2000"},{"key":"65","doi-asserted-by":"publisher","DOI":"10.1103\/physreve.84.056213"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.1142\/s0218127417500043"},{"key":"67","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-020-05703-6"},{"key":"68","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2013.04.008"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2023\/8831078.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2023\/8831078.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2023\/8831078.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T15:38:57Z","timestamp":1690299537000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/complexity\/2023\/8831078\/"}},"subtitle":[],"editor":[{"given":"Jesus M.","family":"Munoz-Pacheco","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023,7,25]]},"references-count":68,"alternative-id":["8831078","8831078"],"URL":"https:\/\/doi.org\/10.1155\/2023\/8831078","relation":{},"ISSN":["1099-0526","1076-2787"],"issn-type":[{"value":"1099-0526","type":"electronic"},{"value":"1076-2787","type":"print"}],"subject":[],"published":{"date-parts":[[2023,7,25]]}}}