{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:58:35Z","timestamp":1773615515135,"version":"3.50.1"},"reference-count":11,"publisher":"Allerton Press","issue":"4","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.3103\/s0146411622040083","type":"journal-article","created":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T13:04:24Z","timestamp":1662987864000},"page":"374-381","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Color Image Encryption Using Hyperchaotic Maps"],"prefix":"10.3103","volume":"56","author":[{"given":"V. N.","family":"Shashihin","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S. V.","family":"Budnik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Y. R.","family":"Kireeva","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1627","published-online":{"date-parts":[[2022,9,12]]},"reference":[{"key":"7496_CR1","doi-asserted-by":"publisher","first-page":"2652","DOI":"10.1016\/j.chaos.2008.09.047","volume":"41","author":"W.-W. Wong","year":"2009","unstructured":"Wong, W.-W., Kwok, B.S.-H., and Yuen, C.-H., An efficient diffusion approach for chaos-based image encryption, Chaos, Solitons Fractals, 2009, vol. 41, no. 5, pp. 2652\u20132663.\u00a0https:\/\/doi.org\/10.1016\/j.chaos.2008.09.047","journal-title":"Chaos, Solitons Fractals"},{"key":"7496_CR2","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1016\/j.compeleceng.2017.07.026","volume":"65","author":"W. Wang","year":"2018","unstructured":"Wang, W., Si, M., Pang, Y., Ran, P., Wang, H., Jiang, X., Liu, X., Wu, J., Wu, W., Naveen, C., and Gwanggil, J., An encryption algorithm based on combined chaos in body area networks, Comput. Electr. Eng., 2018, vol. 65, pp.\u00a0282\u2013291.\u00a0https:\/\/doi.org\/10.1016\/j.compeleceng.2017.07.026","journal-title":"Comput. Electr. Eng."},{"key":"7496_CR3","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1016\/j.image.2013.09.006","volume":"29","author":"C. Dong","year":"2014","unstructured":"Dong, C., Color image encryption using one-time keys and coupled chaotic systems, Signal Process.: Image Commun., 2014, vol. 29, pp. 628\u2013640.\u00a0https:\/\/doi.org\/10.1016\/j.image.2013.09.006","journal-title":"Signal Process.: Image Commun."},{"key":"7496_CR4","doi-asserted-by":"publisher","unstructured":"Liu, H., Kadir, A., and Gong, P., A fast color image encryption scheme using one-time S-Boxes based on complex chaotic system and random noise, Opt. Commun., 2015, vol. 338, pp. 340\u2013347 (2015).\u00a0https:\/\/doi.org\/10.1016\/j.optcom.2014.10.021","DOI":"10.1016\/j.optcom.2014.10.021"},{"key":"7496_CR5","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.1140\/epjst\/e2015-02470-3","volume":"224","author":"G.A. Leonov","year":"2015","unstructured":"Leonov, G.A., Kuznetsov, N.V., and Mokaev, T.N., Homoclinic orbits and self-excited and hidden attractors in a lorenz-like system describing convective fluid motion, Eur. Phys. J. Spec. Top., 2015, vol. 224, no. 8, pp.\u00a01421\u20131458.\u00a0https:\/\/doi.org\/10.1140\/epjst\/e2015-02470-3","journal-title":"Eur. Phys. J. Spec. Top."},{"key":"7496_CR6","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TCSII.2016.2585680","volume":"64","author":"C. Volos","year":"2017","unstructured":"Volos, C., Maaita, J.O., Vaidyanathan, S., Pham, V.-T., Stouboulos, I., and Kyprianidis, I., A novel four-dimensional hyperchaotic four-wing system with a saddle-focus equilibrium, IEEE Trans. Circuits Syst. II: Express Briefs, 2017, vol. 64, no. 3, pp. 339\u2013343.\u00a0https:\/\/doi.org\/10.1109\/TCSII.2016.2585680","journal-title":"IEEE Trans. Circuits Syst. II: Express Briefs"},{"key":"7496_CR7","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/j.image.2016.12.007","volume":"52","author":"X. Chai","year":"2017","unstructured":"Chai, X., Gan, Z., Yang, K., Chen, Y., and Liu, X., An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations, Signal Process.: Image Commun., 2017, vol. 52, pp. 6\u201319.\u00a0https:\/\/doi.org\/10.1016\/j.image.2016.12.007","journal-title":"Signal Process.: Image Commun."},{"key":"7496_CR8","doi-asserted-by":"publisher","first-page":"7","DOI":"10.18721\/JCSTCS.14101","volume":"14","author":"V.N. Shashihin","year":"2021","unstructured":"Shashihin, V.N., Turulin, A.V., and Budnik, C.V., Image encryption algorithm based on controlled chaotic maps, Comput., \n               Telecommun. Control, 2021, vol. 14, no. 1, pp. 7\u201321. \u00a0https:\/\/doi.org\/10.18721\/JCSTCS.14101","journal-title":"Telecommun. Control"},{"key":"7496_CR9","doi-asserted-by":"publisher","first-page":"213","DOI":"10.3103\/S0146411621030032","volume":"55","author":"S.V. Budnik","year":"2021","unstructured":"Budnik, S.V. and Shashihin, V.N., Stabilization of nonlinear systems with dynamic chaos, Autom. Control Comput. Sci., 2021, vol. 55, no. 3, pp. 213\u2013221. \u00a0https:\/\/doi.org\/10.3103\/S0146411621030032","journal-title":"Autom. Control Comput. Sci."},{"key":"7496_CR10","doi-asserted-by":"publisher","first-page":"1865","DOI":"10.1142\/S021812740100305X","volume":"11","author":"J.C. Sprott","year":"2001","unstructured":"Sprott, J.C. and Rowlands, G., Improved correlation dimension calculation, Int. J. Bifurcation Chaos, 2001, vol.\u00a011, no. 7, pp. 1865\u20131880. \u00a0https:\/\/doi.org\/10.1142\/S021812740100305X","journal-title":"Int. J. Bifurcation Chaos"},{"key":"7496_CR11","unstructured":"Sidorenko, A.V. and Zhukovets, D.A., Differential and linear cryptoanalysis methods elements for encryption algorithm based on dynamic chaos, Sist. Anal. Prikl. Mat., 2015, no. 3, pp. 48\u201354."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411622040083.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411622040083","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411622040083.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:00:59Z","timestamp":1773612059000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411622040083"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8]]},"references-count":11,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["7496"],"URL":"https:\/\/doi.org\/10.3103\/s0146411622040083","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8]]},"assertion":[{"value":"2 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 April 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}