{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:01:51Z","timestamp":1773615711002,"version":"3.50.1"},"reference-count":32,"publisher":"Allerton Press","issue":"4","license":[{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.3103\/s0146411623040053","type":"journal-article","created":{"date-parts":[[2023,8,27]],"date-time":"2023-08-27T07:01:49Z","timestamp":1693119709000},"page":"380-388","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Bit-Level Three-Dimensional Rectangular Image Encryption Algorithm Using New Chaotic Maps"],"prefix":"10.3103","volume":"57","author":[{"family":"Zhenhui Li","sequence":"first","affiliation":[]},{"given":"Zhouli","family":"He","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Renyuan","family":"Jia","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2023,8,27]]},"reference":[{"key":"7599_CR1","doi-asserted-by":"publisher","first-page":"11529","DOI":"10.1007\/s11042-015-2883-z","volume":"75","author":"F. Elgendy","year":"2015","unstructured":"Elgendy, F., Sarhan, A., Eltobely, T., El-Zoghdy, S., El-Sayed, H., and Faragallah, O., Chaos-based model for encryption and decryption of digital images, Multimedia Tools Appl., 2015, vol. 75, no. 18, pp. 11529\u201311553. https:\/\/doi.org\/10.1007\/s11042-015-2883-z","journal-title":"Multimedia Tools Appl."},{"key":"7599_CR2","doi-asserted-by":"publisher","first-page":"3613","DOI":"10.1142\/s021812740401151x","volume":"14","author":"Ya.B. Mao","year":"2004","unstructured":"Mao, Ya.B., Chen, G.R., and Lian, Sh.G., A novel fast image encryption scheme based on 3D chaotic baker maps, Int. J. Bifurcation Chaos, 2004, vol. 14, no. 10, pp. 3613\u20133624. https:\/\/doi.org\/10.1142\/s021812740401151x","journal-title":"Int. J. Bifurcation Chaos"},{"key":"7599_CR3","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1016\/j.jss.2011.10.051","volume":"85","author":"X. Tong","year":"2012","unstructured":"Tong, X., The novel bilateral\u2013diffusion image encryption algorithm with dynamical compound chaos, J. Syst. Software, 2012, vol. 85, no. 4, pp. 850\u2013858. https:\/\/doi.org\/10.1016\/j.jss.2011.10.051","journal-title":"J. Syst. Software"},{"key":"7599_CR4","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","volume":"11","author":"Yo. Wang","year":"2011","unstructured":"Wang, Yo., Wong, K., Liao, X., and Chen, G., A new chaos-based fast image encryption algorithm, Appl. Soft Comput., 2011, vol. 11, no. 1, pp. 514\u2013522. https:\/\/doi.org\/10.1016\/j.asoc.2009.12.011","journal-title":"Appl. Soft Comput."},{"key":"7599_CR5","first-page":"2934","volume":"32","author":"J.M. Zheng","year":"2011","unstructured":"Zheng, J.M. and Gao, W.Zh., Color image encryption algorithm based on chaotic map, Comp. Eng. Des., 2011, vol. 32, no. 9, pp. 2934\u20132937.","journal-title":"Comp. Eng. Des."},{"key":"7599_CR6","first-page":"1328","volume":"2","author":"A.S. Menon","year":"2013","unstructured":"Menon, A.S. and Sarila, K.S., Image encryption based on chaotic algorithms: An overview, Int. J. Sci., \n               Eng. Technol. Res., 2013, vol. 2, no. 6, pp. 1328\u20131332.","journal-title":"Eng. Technol. Res."},{"key":"7599_CR7","doi-asserted-by":"publisher","first-page":"12027","DOI":"10.1007\/s11042-018-6739-1","volume":"78","author":"C. Pak","year":"2019","unstructured":"Pak, C., An, K., Jang, P., Kim, J., and Kim, S., A novel bit-level color image encryption using improved 1D chaotic map, Multimedia Tools Appl., 2019, vol. 78, no. 9, pp. 12027\u201312042. https:\/\/doi.org\/10.1007\/s11042-018-6739-1","journal-title":"Multimedia Tools Appl."},{"key":"7599_CR8","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.ins.2020.02.008","volume":"520","author":"A. Mansouri","year":"2020","unstructured":"Mansouri, A. and Wang, X., A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme, Inf. Sci., 2020, vol. 520, pp. 46\u201362. https:\/\/doi.org\/10.1016\/j.ins.2020.02.008","journal-title":"Inf. Sci."},{"key":"7599_CR9","doi-asserted-by":"publisher","first-page":"27569","DOI":"10.1007\/s11042-019-07852-2","volume":"78","author":"S. Anwar","year":"2019","unstructured":"Anwar, S. and Meghana, S., A pixel permutation based image encryption technique using chaotic map, Multimedia Tools Appl., 2019, vol. 78, no. 19, pp. 27569\u201327590. https:\/\/doi.org\/10.1007\/s11042-019-07852-2","journal-title":"Multimedia Tools Appl."},{"key":"7599_CR10","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s11554-020-00948-1","volume":"18","author":"M.Z. Talhaoui","year":"2021","unstructured":"Talhaoui, M.Z., Wang, X., and Midoun, M.A., Fast image encryption algorithm with high security level using the B\u00fclban chaotic map, J. Real-Time Image Process., 2021, vol. 18, no. 1, pp. 85\u201398. https:\/\/doi.org\/10.1007\/s11554-020-00948-1","journal-title":"J. Real-Time Image Process."},{"key":"7599_CR11","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/s021812749800098x","volume":"8","author":"J. Fridrich","year":"1998","unstructured":"Fridrich, J., Symmetric ciphers based on two-dimensional chaotic maps, Int. J. Bifurcation Chaos, 1998, vol. 8, no. 6, pp. 1259\u20131284. https:\/\/doi.org\/10.1142\/s021812749800098x","journal-title":"Int. J. Bifurcation Chaos"},{"key":"7599_CR12","doi-asserted-by":"publisher","first-page":"31177","DOI":"10.1007\/s11042-018-6214-z","volume":"77","author":"B. Mondal","year":"2018","unstructured":"Mondal, B., Kumar, P., and Singh, S., A chaotic permutation and diffusion based image encryption algorithm for secure communications, Multimedia Tools Appl., 2018, vol. 77, no. 23, pp. 31177\u201331198. https:\/\/doi.org\/10.1007\/s11042-018-6214-z","journal-title":"Multimedia Tools Appl."},{"key":"7599_CR13","doi-asserted-by":"publisher","unstructured":"Huang, F., Ouyang, X.J., and Liu, X.P., An improved image encryption algorithm based on a new two-dimensional map, Adv. Mater. Res., 2011, vol. 216, pp. 293\u2013296. https:\/\/doi.org\/10.4028\/www.scientific.net\/amr.216.293","DOI":"10.4028\/www.scientific.net\/amr.216.293"},{"key":"7599_CR14","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.optlastec.2018.09.048","volume":"111","author":"T. Sivakumar","year":"2019","unstructured":"Sivakumar, T. and Li, P., A secure image encryption method using scan pattern and random key stream derived from laser chaos, Opt. Laser Technol., 2019, vol. 111, pp. 196\u2013204. https:\/\/doi.org\/10.1016\/j.optlastec.2018.09.048","journal-title":"Opt. Laser Technol."},{"key":"7599_CR15","doi-asserted-by":"publisher","first-page":"1211","DOI":"10.1007\/s10586-018-02895-w","volume":"22","author":"\u00dc. \u00c7avu\u015fo\u011flu","year":"2019","unstructured":"\u00c7avu\u015fo\u011flu, \u00dc. and Ka\u00e7ar, S., A novel parallel image encryption algorithm based on chaos, Cluster Comput., 2019, vol. 22, no. 4, pp. 1211\u20131223. https:\/\/doi.org\/10.1007\/s10586-018-02895-w","journal-title":"Cluster Comput."},{"key":"7599_CR16","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G. Chen","year":"2004","unstructured":"Chen, G., Mao, Ya., and Chui, C., A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos, Solitons Fractals, 2004, vol. 21, no. 3, pp. 749\u2013761. https:\/\/doi.org\/10.1016\/j.chaos.2003.12.022","journal-title":"Chaos, Solitons Fractals"},{"key":"7599_CR17","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1016\/j.physleta.2007.07.040","volume":"372","author":"T. Gao","year":"2008","unstructured":"Gao, T. and Chen, Z., A new image encryption algorithm based on hyper-chaos, Phys. Lett. A, 2008, vol. 372, no. 4, pp. 394\u2013400. https:\/\/doi.org\/10.1016\/j.physleta.2007.07.040","journal-title":"Phys. Lett. A"},{"key":"7599_CR18","doi-asserted-by":"publisher","first-page":"10373","DOI":"10.1007\/s11042-018-6539-7","volume":"78","author":"S. Som","year":"2019","unstructured":"Som, S., Mitra, A., Palit, S., and Chaudhuri, B., A selective bitplane image encryption scheme using chaotic maps, Multimedia Tools Appl., 2019, vol. 78, no. 8, pp. 10373\u201310400. https:\/\/doi.org\/10.1007\/s11042-018-6539-7","journal-title":"Multimedia Tools Appl."},{"key":"7599_CR19","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1007\/s11071-018-4251-9","volume":"93","author":"Yu. Luo","year":"2018","unstructured":"Luo, Yu., Zhou, R., Liu, J., Cao, Yi., and Ding, X., A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map, Nonlinear Dyn., 2018, vol. 93, no. 3, pp. 1165\u20131181. https:\/\/doi.org\/10.1007\/s11071-018-4251-9","journal-title":"Nonlinear Dyn."},{"key":"7599_CR20","doi-asserted-by":"publisher","first-page":"1850010","DOI":"10.1142\/s0218127418500104","volume":"28","author":"G. Ye","year":"2018","unstructured":"Ye, G., Pan, C., Huang, X., Zhao, Z., and He, J., A chaotic image encryption algorithm based on information entropy, Int. J. Bifurcation Chaos, 2018, vol. 28, no. 01, p. 1850010. https:\/\/doi.org\/10.1142\/s0218127418500104","journal-title":"Int. J. Bifurcation Chaos"},{"key":"7599_CR21","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.ijleo.2018.12.178","volume":"181","author":"C. Han","year":"2019","unstructured":"Han, C., An image encryption algorithm based on modified logistic chaotic map, Optik, 2019, vol. 181, pp. 779\u2013785. https:\/\/doi.org\/10.1016\/j.ijleo.2018.12.178","journal-title":"Optik"},{"key":"7599_CR22","doi-asserted-by":"publisher","first-page":"162921","DOI":"10.1016\/j.ijleo.2019.06.021","volume":"193","author":"M.Y. Valandar","year":"2019","unstructured":"Valandar, M.Y., Barani, M.J., and Ayubi, P., A fast color image encryption technique based on three dimensional chaotic map, Optik, 2019, vol. 193, p. 162921. https:\/\/doi.org\/10.1016\/j.ijleo.2019.06.021","journal-title":"Optik"},{"key":"7599_CR23","doi-asserted-by":"publisher","first-page":"2753","DOI":"10.1007\/s11042-020-09648-1","volume":"80","author":"A. Pourjabbar Kari","year":"2021","unstructured":"Pourjabbar Kari, A., Habibizad Navin, A., Bidgoli, A.M., and Mirnia, M., A new image encryption scheme based on hybrid chaotic maps, Multimedia Tools Appl., 2021, vol. 80, no. 2, pp. 2753\u20132772. https:\/\/doi.org\/10.1007\/s11042-020-09648-1","journal-title":"Multimedia Tools Appl."},{"key":"7599_CR24","doi-asserted-by":"publisher","unstructured":"Dagadu, J.C., Li, J.-P., Shah, F., Mustafa, N., and Kumar, K., DWT based encryption technique for medical images, Proc. 2016 13th Int. Computer Conf. on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu, China, 2016, IEEE, 2016, pp. 252\u2013255. https:\/\/doi.org\/10.1109\/ICCWAMTIP.2016.8079849","DOI":"10.1109\/ICCWAMTIP.2016.8079849"},{"key":"7599_CR25","doi-asserted-by":"publisher","unstructured":"Slimane, N.B., Bouallegue, K., and Machhout, M., Nested chaotic image encryption scheme using two-diffusion process and the secure hash algorithm SHA-1, 2016 4th Int. Conf. on Control Engineering & Information Technology (CEIT), Hammamet, Tunisia, 2016, IEEE, 2016, pp. 1\u20135. https:\/\/doi.org\/10.1109\/ceit.2016.7929089","DOI":"10.1109\/ceit.2016.7929089"},{"key":"7599_CR26","doi-asserted-by":"publisher","unstructured":"Khan, J.S., Ahmad, J., and Hwang, S.O., An efficient image encryption scheme based on: Henon map, skew tent map and S-Box, 2015 6th Int. Conf. on Modeling, Simulation, and Applied Optimization (ICMSAO), Istanbul, 2015, IEEE, 2015, pp. 1\u20136. https:\/\/doi.org\/10.1109\/icmsao.2015.7152261","DOI":"10.1109\/icmsao.2015.7152261"},{"key":"7599_CR27","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/j.procs.2018.01.153","volume":"127","author":"M. Essaid","year":"2018","unstructured":"Essaid, M., Akharraz, I., Saaidi, A., and Mouhib, A., A new image encryption scheme based on confusion-diffusion using an enhanced skew tent map, Procedia Comput. Sci., 2018, vol. 127, pp. 539\u2013548. https:\/\/doi.org\/10.1016\/j.procs.2018.01.153","journal-title":"Procedia Comput. Sci."},{"key":"7599_CR28","doi-asserted-by":"publisher","first-page":"22023","DOI":"10.1007\/s11042-019-7453-3","volume":"78","author":"Yu. Luo","year":"2019","unstructured":"Luo, Yu., Yu, J., Lai, W., and Liu, L., A novel chaotic image encryption algorithm based on improved baker map and logistic map, Multimedia Tools Appl., 2019, vol. 78, no. 15, pp. 22023\u201322043. https:\/\/doi.org\/10.1007\/s11042-019-7453-3","journal-title":"Multimedia Tools Appl."},{"key":"7599_CR29","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/j.compeleceng.2015.11.008","volume":"54","author":"E. Yavuz","year":"2016","unstructured":"Yavuz, E., Yaz\u0131c\u0131, R., Kasapba\u015f\u0131, M., and Yama\u00e7, E., A chaos-based image encryption algorithm with simple logical functions, Comput. Electr. Eng., 2016, vol. 54, pp. 471\u2013483. https:\/\/doi.org\/10.1016\/j.compeleceng.2015.11.008","journal-title":"Comput. Electr. Eng."},{"key":"7599_CR30","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.ins.2018.03.055","volume":"450","author":"Yo. Zhang","year":"2018","unstructured":"Zhang, Yo., The unified image encryption algorithm based on chaos and cubic S-Box, Inf. Sci., 2018, vol. 450, pp. 361\u2013377. https:\/\/doi.org\/10.1016\/j.ins.2018.03.055","journal-title":"Inf. Sci."},{"key":"7599_CR31","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1016\/j.cnsns.2014.06.032","volume":"20","author":"J. Chen","year":"2015","unstructured":"Chen, J., Zhu, Zh., Fu, Ch., Yu, H., and Zhang, L., A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism, Commun. Nonlinear Sci. Numer. Simul., 2015, vol. 20, no. 3, pp.\u00a0846\u2013860. https:\/\/doi.org\/10.1016\/j.cnsns.2014.06.032","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"7599_CR32","first-page":"1593","volume":"3","author":"X. Yu","year":"2010","unstructured":"Yu, X., Huang, F., and Feng, Yo., A symmetric image encryption scheme based on a simple novel two-dimensional map, Int. J. Innovative Comput., Inf. Control, 2010, vol. 3, no. 6B, pp. 1593\u20131602.","journal-title":"Int. J. Innovative Comput., Inf. Control"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411623040053.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411623040053","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411623040053.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:36Z","timestamp":1773612216000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411623040053"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["7599"],"URL":"https:\/\/doi.org\/10.3103\/s0146411623040053","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8]]},"assertion":[{"value":"15 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}