{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T02:31:49Z","timestamp":1725849109237},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T00:00:00Z","timestamp":1561334400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T00:00:00Z","timestamp":1561334400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["41571417","U1604145","61802111","61872125"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Science Foundation of the United States","award":["CNS-1253424","ECCS-1202225"]},{"name":"Science and Technology Foundation of Henan Province of China","award":["182102210027","182102410051"]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2018T110723","2016M602235"],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Scientific Research Projects for Colleges and Universities of Henan Province","award":["19A413001"]},{"name":"Research Foundation of Henan University","award":["xxjc20140006"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput & Applic"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s00521-019-04312-8","type":"journal-article","created":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T23:13:08Z","timestamp":1561417988000},"page":"8065-8088","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["Exploiting plaintext-related mechanism for secure color image encryption"],"prefix":"10.1007","volume":"32","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-1609-0624","authenticated-orcid":false,"given":"Xiuli","family":"Chai","sequence":"first","affiliation":[]},{"given":"Xiaoyu","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Zhihua","family":"Gan","sequence":"additional","affiliation":[]},{"given":"Yiran","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,24]]},"reference":[{"key":"4312_CR1","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"ZY Hua","year":"2019","unstructured":"Hua ZY, Zhou YC, Huang HJ (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403\u2013419","journal-title":"Inf Sci"},{"key":"4312_CR2","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"XL Chai","year":"2017","unstructured":"Chai XL, Chen YR, Lucie B (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197\u2013213","journal-title":"Opt Lasers Eng"},{"key":"4312_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.optlaseng.2015.12.004","volume":"80","author":"ZJ Tang","year":"2016","unstructured":"Tang ZJ, Song J, Zhang XQ, Sun RH (2016) Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt Lasers Eng 80:1\u201311","journal-title":"Opt Lasers Eng"},{"issue":"1","key":"4312_CR4","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s11042-012-1331-6","volume":"72","author":"XL Huang","year":"2014","unstructured":"Huang XL, Ye GD (2014) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed Tools Appl 72(1):57\u201370","journal-title":"Multimed Tools Appl"},{"key":"4312_CR5","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.cnsns.2013.06.031","volume":"19","author":"YS Zhang","year":"2014","unstructured":"Zhang YS, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci 19:74\u201382","journal-title":"Commun Nonlinear Sci"},{"key":"4312_CR6","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1007\/s00521-016-2490-6","volume":"29","author":"WY Wen","year":"2018","unstructured":"Wen WY, Zhang YS, Fang YM, Fang ZJ (2018) Image salient regions encryption for generating visually meaningful ciphertext image. Neural Comput Appl 29:653\u2013663","journal-title":"Neural Comput Appl"},{"key":"4312_CR7","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/s11071-013-1074-6","volume":"75","author":"GD Ye","year":"2014","unstructured":"Ye GD (2014) A block image encryption algorithm based on wave transmission and chaotic systems. Nonlinear Dyn 75:417\u2013427","journal-title":"Nonlinear Dyn"},{"key":"4312_CR8","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1016\/j.optcom.2011.11.044","volume":"285","author":"YC Zhou","year":"2012","unstructured":"Zhou YC, Panetta K, Agaian S, Philip Chen CL (2012) Image encryption using P-Fibonacci transform and decomposition. Opt Commun 285:594\u2013608","journal-title":"Opt Commun"},{"key":"4312_CR9","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.sigpro.2018.04.014","volume":"150","author":"H Huang","year":"2018","unstructured":"Huang H, He X, Xiang Y, Wen WY, Zhang YS (2018) A compression-diffusion-permutation strategy for securing image. Signal Process 150:183\u2013190","journal-title":"Signal Process"},{"key":"4312_CR10","doi-asserted-by":"crossref","first-page":"8660","DOI":"10.1109\/ACCESS.2018.2890116","volume":"7","author":"ZY Hua","year":"2019","unstructured":"Hua ZY, Xu BX, Jin F, Huang HJ (2019) Image encryption using josephus problem and filtering diffusion. IEEE Access 7:8660\u20138674","journal-title":"IEEE Access"},{"key":"4312_CR11","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.optlaseng.2016.07.010","volume":"88","author":"A Belazi","year":"2017","unstructured":"Belazi A, EI-Latif AAA, Diaconu AV, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37\u201350","journal-title":"Opt Lasers Eng"},{"key":"4312_CR12","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","volume":"142","author":"JX Chen","year":"2018","unstructured":"Chen JX, Zhu ZL, Zhang LB, Zhang YS, Yang BQ (2018) Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption. Signal Process 142:340\u2013353","journal-title":"Signal Process"},{"key":"4312_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3541-y","author":"ZH Gan","year":"2018","unstructured":"Gan ZH, Chai XL, Han DJ, Chen YR (2018) A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Comput Appl. \nhttps:\/\/doi.org\/10.1007\/s00521-018-3541-y","journal-title":"Neural Comput Appl"},{"key":"4312_CR14","doi-asserted-by":"crossref","first-page":"2557","DOI":"10.1109\/TIE.2017.2736515","volume":"65","author":"ZY Hua","year":"2018","unstructured":"Hua ZY, Zhou BH, Zhou YC (2018) Sine-transform-based chaotic system with FPGA implementation. IEEE Trans Ind Electron 65:2557\u20132566","journal-title":"IEEE Trans Ind Electron"},{"key":"4312_CR15","first-page":"1","volume":"66","author":"C Li","year":"2019","unstructured":"Li C, Feng B, Li S, Kurths J, Chen G (2019) Dynamic analysis of digital chaotic maps via state-mapping networks. IEEE Trans Circuits-I 66:1\u201314","journal-title":"IEEE Trans Circuits-I"},{"key":"4312_CR16","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.cnsns.2017.12.017","volume":"60","author":"S Amina","year":"2018","unstructured":"Amina S, Mohamed FK (2018) An efficient and secure chaotic cipher algorithm for image content preservation. Commun Nonlinear Sci Numer Simul 60:12\u201332","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"4312_CR17","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.image.2017.01.002","volume":"52","author":"HM Yuan","year":"2017","unstructured":"Yuan HM, Liu Y, Lin T, Hu T, Gong LH (2017) A new parallel image cryptosystem based on 5D hyper-chaotic system. Signal Process Image\u00a052:87\u201396","journal-title":"Signal Process Image"},{"key":"4312_CR18","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"ZY Hua","year":"2016","unstructured":"Hua ZY, Zhou YC (2016) Image encryption using 2D Logistic-adjusted-Sine map. Inf Sci 339:237\u2013253","journal-title":"Inf Sci"},{"key":"4312_CR19","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.sigpro.2017.08.020","volume":"143","author":"C Cao","year":"2018","unstructured":"Cao C, Sun KH, Liu WH (2018) A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process 143:122\u2013133","journal-title":"Signal Process"},{"key":"4312_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2883690","author":"CQ Li","year":"2018","unstructured":"Li CQ, Lin DD, Feng BB, L\u00fc JH (2018) Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access. \nhttps:\/\/doi.org\/10.1109\/access.2018.2883690","journal-title":"IEEE Access"},{"key":"4312_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/mmul.2018.2873472","author":"CQ Li","year":"2018","unstructured":"Li CQ, Lin DD, L\u00fc JH, Hao F (2018) Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE Multimed. \nhttps:\/\/doi.org\/10.1109\/mmul.2018.2873472","journal-title":"IEEE Multimed"},{"key":"4312_CR22","first-page":"228","volume":"430\u2013431","author":"ZY Leo","year":"2018","unstructured":"Leo ZY, Liu YS, Wang C, Zhou JT, Zhang YS, Chen GR (2018) Improved known-plaintext attack to permutation-only multimedia ciphers. Inf Sci 430\u2013431:228\u2013239","journal-title":"Inf Sci"},{"key":"4312_CR23","doi-asserted-by":"crossref","first-page":"1311","DOI":"10.1007\/s11071-014-1517-8","volume":"78","author":"F Ozkaynak","year":"2014","unstructured":"Ozkaynak F, Yavuz S (2014) Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Nonlinear Dyn 78:1311\u20131320","journal-title":"Nonlinear Dyn"},{"key":"4312_CR24","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1007\/s11071-014-1331-3","volume":"77","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn 77:687\u2013698","journal-title":"Nonlinear Dyn"},{"key":"4312_CR25","doi-asserted-by":"crossref","first-page":"1850086","DOI":"10.1142\/S0218127418500864","volume":"28","author":"ZS Lin","year":"2018","unstructured":"Lin ZS, Yu SM, Feng XT, Lu JH (2018) Cryptanalysis of a chaotic stream cipher and its improved scheme. Int J Bifurcat Chaos 28:1850086","journal-title":"Int J Bifurcat Chaos"},{"key":"4312_CR26","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/s11071-013-1070-x","volume":"75","author":"XY Wang","year":"2014","unstructured":"Wang XY, Xu DH (2014) A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn 75:345\u2013353","journal-title":"Nonlinear Dyn"},{"key":"4312_CR27","doi-asserted-by":"crossref","first-page":"1511","DOI":"10.1007\/s11071-014-1757-7","volume":"79","author":"CX Zhu","year":"2015","unstructured":"Zhu CX, Xu SY, Hu YP, Sun KH (2015) Breaking a novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn 79:1511\u20131518","journal-title":"Nonlinear Dyn"},{"key":"4312_CR28","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak C, Huang LL (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129\u2013137","journal-title":"Signal Process"},{"key":"4312_CR29","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1016\/j.sigpro.2017.11.005","volume":"144","author":"H Wang","year":"2018","unstructured":"Wang H, Xiao D, Chen X, Huang HY (2018) Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Signal Process 144:444\u2013452","journal-title":"Signal Process"},{"key":"4312_CR30","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MMUL.2017.3051512","volume":"24","author":"CQ Li","year":"2017","unstructured":"Li CQ, Lin DD, Lu JH (2017) Cryptanalyzing an image-scrambling encryption algorithm of pixel bits. IEEE Multimed 24:64\u201371","journal-title":"IEEE Multimed"},{"key":"4312_CR31","doi-asserted-by":"crossref","first-page":"1750155","DOI":"10.1142\/S0218127417501553","volume":"27","author":"LY Zhang","year":"2017","unstructured":"Zhang LY, Zhang YS, Liu YS, Yang AJ, Chen GR (2017) Security analysis of some diffusion mechanisms used in chaotic ciphers. Int J Bifurc Chaos 27:1750155","journal-title":"Int J Bifurc Chaos"},{"key":"4312_CR32","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/s00521-015-2045-2","volume":"28","author":"YS Zhang","year":"2017","unstructured":"Zhang YS, Wen WY, Wu YF, Zhang R, Chen JX, He X (2017) Deciphering an RGB color image cryptosystem based on Choquet fuzzy integral. Neural Comput Appl 28:165\u2013169","journal-title":"Neural Comput Appl"},{"key":"4312_CR33","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.ins.2014.08.005","volume":"289","author":"YS Zhang","year":"2014","unstructured":"Zhang YS, Xiao D, Wen WY, Wong KW (2014) On the security of symmetric ciphers based on DNA coding. Inf Sci 289:254\u2013261","journal-title":"Inf Sci"},{"key":"4312_CR34","doi-asserted-by":"crossref","first-page":"47102","DOI":"10.1109\/ACCESS.2018.2867111","volume":"6","author":"M Li","year":"2018","unstructured":"Li M, Lu DD, Wen WY, Ren H, Zhang YS (2018) Cryptanalyzing a color image encryption scheme based on hybrid hyper-chaotic system and cellular automata. IEEE Access 6:47102\u201347111","journal-title":"IEEE Access"},{"key":"4312_CR35","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li SJ (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16:2129\u20132151","journal-title":"Int J Bifurc Chaos"},{"key":"4312_CR36","doi-asserted-by":"crossref","first-page":"1319","DOI":"10.1007\/s11071-018-4426-4","volume":"94","author":"Z Li","year":"2018","unstructured":"Li Z, Peng CG, Li LR, Zhu XY (2018) A novel plaintext-related image encryption scheme using hyper-chaotic system. Nonlinear Dyn 94:1319\u20131333","journal-title":"Nonlinear Dyn"},{"key":"4312_CR37","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.sigpro.2014.10.033","volume":"109","author":"MA Murillo-Escobar","year":"2015","unstructured":"Murillo-Escobar MA, Cryz-Hernandez C, Abundiz-Perez F, Lopez-Gutierrez RM, Del Campo ORA (2015) A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process 109:119\u2013131","journal-title":"Signal Process"},{"key":"4312_CR38","doi-asserted-by":"crossref","first-page":"20103","DOI":"10.1007\/s11042-017-5437-8","volume":"77","author":"HJ Fan","year":"2018","unstructured":"Fan HJ, Li M, Liu D, An K (2018) Cryptanalysis of a plaintext-related chaotic RGB image encryption scheme using total plain image characteristics. Multimed Tools Appl 77:20103\u201320127","journal-title":"Multimed Tools Appl"},{"key":"4312_CR39","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1080\/09720529.2010.10698290","volume":"13","author":"SK Pal","year":"2010","unstructured":"Pal SK, Kapoor S, Arora A, Chaudhary R, Khurana J (2010) Design of strong cryptographic schemes based on latin squares. J Discrete Math Sci Cryptogr 13:233\u2013256","journal-title":"J Discrete Math Sci Cryptogr"},{"key":"4312_CR40","doi-asserted-by":"crossref","unstructured":"Wu Y, Noonan JP, Agaian S (2011) Dynamic and implicit latin square doubly stochastic s-boxes with reversibility. In: 2011 IEEE international conference on systems, man and cybernetics (SMC), pp 3358\u20133364","DOI":"10.1109\/ICSMC.2011.6084188"},{"key":"4312_CR41","doi-asserted-by":"crossref","unstructured":"Chapaneri S, Chapaneri R (2014) Chaos based image encryption using latin rectangle scrambling. In: 2014 annual IEEE India conference (INDICON), pp 1\u20136","DOI":"10.1109\/INDICON.2014.7030358"},{"key":"4312_CR42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s13319-015-0068-1","volume":"6","author":"M Machkour","year":"2015","unstructured":"Machkour M, Saaidi A, Benmaati M (2015) A novel image encryption algorithm based on the two-dimensional logistic map and the latin square image cipher. 3D Research 6:1\u201318","journal-title":"3D Research"},{"key":"4312_CR43","first-page":"221","volume":"52","author":"P Doemoesi","year":"2015","unstructured":"Doemoesi P, Geza H (2015) A novel cryptosystem based on abstract automata and latin cubes. Stud Sci Math Hung 52:221\u2013232","journal-title":"Stud Sci Math Hung"},{"key":"4312_CR44","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/j.ins.2013.11.027","volume":"264","author":"Y Wu","year":"2014","unstructured":"Wu Y, Zhou YC, Noonan JP, Agaian S (2014) Design of image cipher using latin squares. Inf Sci 264:317\u2013339","journal-title":"Inf Sci"},{"key":"4312_CR45","doi-asserted-by":"crossref","first-page":"1663","DOI":"10.1140\/epjst\/e2014-02119-9","volume":"223","author":"HT Panduranga","year":"2014","unstructured":"Panduranga HT, Naveen Kumar SK, Kiran E (2014) Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher. Eur Phys J Spec Top 223:1663\u20131677","journal-title":"Eur Phys J Spec Top"},{"key":"4312_CR46","doi-asserted-by":"crossref","unstructured":"Ahmad M, Ahmad F (2015) Cryptanalysis of image encryption based on permutation-substitution using chaotic map and Latin square image cipher. In: Proceeding of the 3rd international conference on Frontiers on intelligent computing: theory and applications (FICTA) 2014, vol 327, pp 481\u2013488","DOI":"10.1007\/978-3-319-11933-5_53"},{"key":"4312_CR47","doi-asserted-by":"crossref","first-page":"1151","DOI":"10.1007\/s11071-015-2057-6","volume":"81","author":"JX Chen","year":"2015","unstructured":"Chen JX, Zhu ZL, Fu C, Zhang LB, Zhang YS (2015) An efficient image encryption scheme using lookup table-based confusion and diffusion. Nonlinear Dyn 81:1151\u20131166","journal-title":"Nonlinear Dyn"},{"key":"4312_CR48","doi-asserted-by":"crossref","first-page":"1305","DOI":"10.1007\/s11071-016-3311-2","volume":"88","author":"GQ Hu","year":"2017","unstructured":"Hu GQ, Xiao D, Wang Y, Li XY (2017) Cryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusion. Nonlinear Dyn 88:1305\u20131316","journal-title":"Nonlinear Dyn"},{"issue":"7","key":"4312_CR49","doi-asserted-by":"crossref","first-page":"676","DOI":"10.1016\/j.aeue.2014.02.002","volume":"68","author":"HJ Liu","year":"2014","unstructured":"Liu HJ, Kadir A, Niu YJ (2014) Chaos-based color image block encryption scheme using S-box. AEU-Int J Electron C 68(7):676\u2013686","journal-title":"AEU-Int J Electron C"},{"key":"4312_CR50","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/s11071-017-3874-6","volume":"91","author":"A Ullah","year":"2018","unstructured":"Ullah A, Jamal SS, Shah T (2018) A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn 91:359\u2013370","journal-title":"Nonlinear Dyn"},{"issue":"18","key":"4312_CR51","doi-asserted-by":"crossref","first-page":"3596","DOI":"10.1016\/j.ijleo.2012.11.018","volume":"124","author":"Q Zhang","year":"2013","unstructured":"Zhang Q, Guo L, Wei XP (2013) A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik 124(18):3596\u20133600","journal-title":"Optik"},{"key":"4312_CR52","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"XY Wang","year":"2015","unstructured":"Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53\u201361","journal-title":"Opt Lasers Eng"},{"issue":"5","key":"4312_CR53","doi-asserted-by":"crossref","first-page":"628","DOI":"10.1016\/j.image.2013.09.006","volume":"29","author":"CE Dong","year":"2014","unstructured":"Dong CE (2014) Color image encryption using one-time keys and coupled chaotic systems. Signal Process Image\u00a029(5):628\u2013640","journal-title":"Signal Process Image"},{"key":"4312_CR54","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/j.sigpro.2016.01.017","volume":"125","author":"M Kumar","year":"2016","unstructured":"Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography. Signal Process 125:187\u2013202","journal-title":"Signal Process"},{"key":"4312_CR55","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6996-z","author":"H Liu","year":"2018","unstructured":"Liu H, Wen F, Kadir A (2018) Construction of a new 2D Chebyshev-Sine map and its application to color image encryption. Multimed Tools Appl. \nhttps:\/\/doi.org\/10.1007\/s11042-018-6996-z","journal-title":"Multimed Tools Appl"},{"key":"4312_CR56","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"XL Chai","year":"2019","unstructured":"Chai XL, Fu XL, Gan ZH, Lu Y, Chen YR (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44\u201362","journal-title":"Signal Process"},{"issue":"10","key":"4312_CR57","first-page":"76","volume":"25","author":"XL Chai","year":"2016","unstructured":"Chai XL, Gan ZH, Lu Y, Zhang MH, Chen YR (2016) A novel color image encryption algorithm based on genetic recombination and the four-dimensional memristive hyperchaotic system. Chin Phys B 25(10):76\u201388","journal-title":"Chin Phys B"},{"key":"4312_CR58","doi-asserted-by":"crossref","first-page":"4094","DOI":"10.1016\/j.cnsns.2014.04.012","volume":"19","author":"XL Huang","year":"2014","unstructured":"Huang XL, Ye GD (2014) An efficient self-adaptive model for chaotic image encryption algorithm. Commun Nonlinear Sci 19:4094\u20134104","journal-title":"Commun Nonlinear Sci"},{"key":"4312_CR59","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.sigpro.2017.04.006","volume":"141","author":"JH Wu","year":"2017","unstructured":"Wu JH, Liao XF, Yang B (2017) Color image encryption based on chaotic systems and elliptic curve ElGamal scheme. Signal Process 141:109\u2013124","journal-title":"Signal Process"},{"key":"4312_CR60","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.asoc.2015.08.008","volume":"37","author":"XJ Wu","year":"2015","unstructured":"Wu XJ, Kan HB, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24\u201339","journal-title":"Appl Soft Comput"},{"key":"4312_CR61","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.optcom.2014.12.043","volume":"342","author":"XY Wang","year":"2015","unstructured":"Wang XY, Zhang HL (2015) A color image encryption with heterogeneous bit-permutation and correlated chaos. Opt Commun 342:51\u201361","journal-title":"Opt Commun"},{"issue":"3","key":"4312_CR62","doi-asserted-by":"crossref","first-page":"e0119660","DOI":"10.1371\/journal.pone.0119660","volume":"10","author":"XJ Wu","year":"2015","unstructured":"Wu XJ, Li Y, Kurths J (2015) A new color image encryption scheme using CML and a fractional-order chaotic system. PLoS ONE 10(3):e0119660","journal-title":"PLoS ONE"},{"issue":"6","key":"4312_CR63","doi-asserted-by":"crossref","first-page":"1884","DOI":"10.1016\/j.cnsns.2013.10.025","volume":"19","author":"XJ Wu","year":"2014","unstructured":"Wu XJ, Bai CX, Kan HB (2014) A new color image cryptosystem via hyperchaos synchronization. Commun Nonlinear Sci Numer Simul 19(6):1884\u20131897","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"4312_CR64","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/s11071-011-0006-6","volume":"67","author":"O Mirzaei","year":"2012","unstructured":"Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67:557\u2013566","journal-title":"Nonlinear Dyn"},{"key":"4312_CR65","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.optcom.2014.10.021","volume":"338","author":"HJ Liu","year":"2015","unstructured":"Liu HJ, Kadir A, Gong PJ (2015) A fast color image encryption scheme using one-time S-boxes based on complex chaotic system and random noise. Opt Commun 338:340\u2013347","journal-title":"Opt Commun"},{"key":"4312_CR66","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.sigpro.2016.11.016","volume":"134","author":"XL Chai","year":"2017","unstructured":"Chai XL, Gan ZH, Chen YR, Zhang YS (2017) A visually secure image encryption scheme based on compressive sensing. Signal Process 134:35\u201351","journal-title":"Signal Process"},{"issue":"15","key":"4312_CR67","doi-asserted-by":"crossref","first-page":"16831","DOI":"10.1007\/s11042-016-3954-5","volume":"76","author":"Y Suryanto","year":"2017","unstructured":"Suryanto Y, Suryadi MT, Ramli K (2017) A new image encryption using color scrambling based on chaotic permutation multiple circular shrinking and expanding. Multimed Tools Appl 76(15):16831\u201316854","journal-title":"Multimed Tools Appl"},{"key":"4312_CR68","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.optlaseng.2015.09.002","volume":"77","author":"Y Qin","year":"2016","unstructured":"Qin Y, Wang ZP, Pan QN, Gong Q (2016) Optical color-image encryption in the diffractive-imaging scheme. Opt Lasers Eng 77:191\u2013202","journal-title":"Opt Lasers Eng"},{"key":"4312_CR69","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.optlaseng.2017.05.019","volume":"98","author":"YG Su","year":"2017","unstructured":"Su YG, Tang C, Gao GN, Gu F, Lei ZK, Tang SW (2017) Optical encryption scheme for multiple color images using complete trinary tree structure. Opt Lasers Eng 98:46\u201355","journal-title":"Opt Lasers Eng"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-019-04312-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-019-04312-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-019-04312-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,22]],"date-time":"2020-06-22T23:27:07Z","timestamp":1592868427000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-019-04312-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,24]]},"references-count":69,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["4312"],"URL":"https:\/\/doi.org\/10.1007\/s00521-019-04312-8","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,24]]},"assertion":[{"value":"13 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}