{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T07:52:14Z","timestamp":1722498734088},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T00:00:00Z","timestamp":1616112000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T00:00:00Z","timestamp":1616112000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802111","61872125","61871175"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Foundation of Henan Province of China","award":["182102210027","182102410051"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput & Applic"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s00521-021-05797-y","type":"journal-article","created":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T20:10:31Z","timestamp":1616184631000},"page":"10371-10402","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Exploiting preprocessing-permutation\u2013diffusion strategy for secure image cipher based on 3D Latin cube and memristive hyperchaotic system"],"prefix":"10.1007","volume":"33","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-1609-0624","authenticated-orcid":false,"given":"Xiuli","family":"Chai","sequence":"first","affiliation":[]},{"given":"Jiangyu","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Jitong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Daojun","family":"Han","sequence":"additional","affiliation":[]},{"given":"Zhihua","family":"Gan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,19]]},"reference":[{"key":"5797_CR1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3008914","author":"YS Zhang","year":"2020","unstructured":"Zhang YS, Wang P, Huang H, Zhu YW, Xiao D, Xiang Y (2020) Privacy-assured FogCS: chaotic compressive sensing for secure industrial big image data processing in fog computing. IEEE Trans Ind Inform. https:\/\/doi.org\/10.1109\/TII.2020.3008914","journal-title":"IEEE Trans Ind Inform"},{"key":"5797_CR2","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.cnsns.2017.12.017","volume":"60","author":"S Amina","year":"2018","unstructured":"Amina S, Mohamed FK (2018) An efficient and secure chaotic cipher algorithm for image content preservation. Commun Nonlinear Sci Numer Simul 60:12\u201332","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"5797_CR3","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"XL Chai","year":"2019","unstructured":"Chai XL, Fu XL, Gan ZH, Lu Y, Chen YR (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44\u201362","journal-title":"Signal Process"},{"key":"5797_CR4","doi-asserted-by":"crossref","first-page":"107580","DOI":"10.1016\/j.sigpro.2020.107580","volume":"173","author":"WY Wen","year":"2020","unstructured":"Wen WY, Hong YK, Fang YM, Li M, Li M (2020) A visually secure image encryption scheme based on semi-tensor product compressed sensing. Signal Process 173:107580","journal-title":"Signal Process"},{"key":"5797_CR5","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.optlaseng.2017.08.018","volume":"100","author":"XW Li","year":"2018","unstructured":"Li XW, Xiao D, Wang QH (2018) Error-free holographic frames encryption with CA pixel-permutation encoding algorithm. Opt Lasers Eng 100:200\u2013207","journal-title":"Opt Lasers Eng"},{"key":"5797_CR6","doi-asserted-by":"crossref","first-page":"7111","DOI":"10.1007\/s00521-018-3541-y","volume":"31","author":"ZH Gan","year":"2019","unstructured":"Gan ZH, Chai XL, Han DJ, Chen YR (2019) A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Comput Appl 31:7111\u20137130","journal-title":"Neural Comput Appl"},{"issue":"1","key":"5797_CR7","doi-asserted-by":"crossref","first-page":"745","DOI":"10.1007\/s11071-018-4391-y","volume":"94","author":"GD Ye","year":"2018","unstructured":"Ye GD, Pan C, Huang XL, Mei QX (2018) An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dyn 94(1):745\u2013756","journal-title":"Nonlinear Dyn"},{"key":"5797_CR8","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"ZY Hua","year":"2019","unstructured":"Hua ZY, Zhou YC, Huang HJ (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403\u2013419","journal-title":"Inf Sci"},{"key":"5797_CR9","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/0161-118991863745","volume":"4","author":"R Matthews","year":"1989","unstructured":"Matthews R (1989) On the derivation of a \u2018chaotic\u2019 encryption algorithm. Cryptologia 4:29","journal-title":"Cryptologia"},{"key":"5797_CR10","doi-asserted-by":"crossref","first-page":"1587","DOI":"10.1007\/s11071-019-05378-8","volume":"99","author":"WY Wen","year":"2020","unstructured":"Wen WY, Wei KK, Zhang YS, Fang YM, Li M (2020) Colour light field image encryption based on DNA sequences and chaotic systems. Nonlinear Dyn 99:1587\u20131600","journal-title":"Nonlinear Dyn"},{"key":"5797_CR11","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.optlaseng.2018.12.002","volume":"115","author":"HJ Li","year":"2019","unstructured":"Li HJ, Wang YR, Zuo ZW (2019) Chaos-based image encryption algorithm with orbit perturbation and dynamic state variable selection mechanisms. Opt Lasers Eng 115:197\u2013207","journal-title":"Opt Lasers Eng"},{"key":"5797_CR12","doi-asserted-by":"crossref","first-page":"12027","DOI":"10.1007\/s11042-018-6739-1","volume":"78","author":"C Pak","year":"2019","unstructured":"Pak C, An K, Jang P, Kim J, Kim S (2019) A novel bit-level color image encryption using improved 1D chaotic map. Multimed Tools Appl 78:12027\u201312042","journal-title":"Multimed Tools Appl"},{"key":"5797_CR13","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"ZL Zhu","year":"2011","unstructured":"Zhu ZL, Zhang W, Wong K, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181:1171\u20131186","journal-title":"Inf Sci"},{"key":"5797_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.optlaseng.2015.12.004","volume":"80","author":"ZJ Tang","year":"2016","unstructured":"Tang ZJ, Song J, Zhang XQ, Sun RH (2016) Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt Lasers Eng 80:1\u201311","journal-title":"Opt Lasers Eng"},{"key":"5797_CR15","doi-asserted-by":"crossref","first-page":"20753","DOI":"10.1007\/s11042-020-08835-4","volume":"79","author":"L Zhang","year":"2020","unstructured":"Zhang L, Zhang XQ (2020) Multiple-image encryption algorithm based on bit planes and chaos. Multimed Tools Appl 79:20753\u201320771","journal-title":"Multimed Tools Appl"},{"key":"5797_CR16","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/s00521-018-3577-z","volume":"32","author":"Y He","year":"2020","unstructured":"He Y, Zhang YQ, Wang XY (2020) A new image encryption algorithm based on two-dimensional spatiotemporal chaotic system. Neural Comput Appl 32:247\u2013260","journal-title":"Neural Comput Appl"},{"key":"5797_CR17","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1007\/s11071-018-4600-8","volume":"95","author":"SF Raza","year":"2019","unstructured":"Raza SF, Satpute V (2019) A novel bit permutation-based image encryption algorithm. Nonlinear Dyn 95:859\u2013873","journal-title":"Nonlinear Dyn"},{"key":"5797_CR18","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.cnsns.2013.06.031","volume":"19","author":"YS Zhang","year":"2014","unstructured":"Zhang YS, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simul 19:74\u201382","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"5797_CR19","doi-asserted-by":"crossref","first-page":"5573","DOI":"10.1007\/s11042-019-08273-x","volume":"79","author":"C Xu","year":"2020","unstructured":"Xu C, Sun JR, Wang CH (2020) A novel image encryption algorithm based on bit-plane matrix rotation and hyper chaotic systems. Multimed Tools Appl 79:5573\u20135593","journal-title":"Multimed Tools Appl"},{"key":"5797_CR20","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.sigpro.2015.06.008","volume":"118","author":"W Zhang","year":"2016","unstructured":"Zhang W, Yu H, Zhao YL, Zhu ZL (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36\u201350","journal-title":"Signal Process"},{"key":"5797_CR21","doi-asserted-by":"crossref","first-page":"27919","DOI":"10.1007\/s11042-018-5974-9","volume":"77","author":"ZH Gan","year":"2018","unstructured":"Gan ZH, Chai XL, Zhang MH, Lu Y (2018) A double color image encryption scheme based on three-dimensional Brownian motion. Multimed Tools Appl 77:27919\u201327953","journal-title":"Multimed Tools Appl"},{"key":"5797_CR22","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1016\/j.sigpro.2017.06.014","volume":"142","author":"JH Wu","year":"2018","unstructured":"Wu JH, Liao XF, Yang B (2018) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process 142:292\u2013300","journal-title":"Signal Process"},{"key":"5797_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2018.11.010","volume":"478","author":"M Xu","year":"2019","unstructured":"Xu M, Tian ZH (2019) A novel image cipher based on 3D bit matrix and latin cubes. Inf Sci 478:1\u201314","journal-title":"Inf Sci"},{"key":"5797_CR24","doi-asserted-by":"crossref","first-page":"888","DOI":"10.3390\/e21090888","volume":"21","author":"ZQ Zhang","year":"2019","unstructured":"Zhang ZQ, Yu SM (2019) On the security of a Latin-bit-based image chaotic encryption algorithm. Entropy 21:888","journal-title":"Entropy"},{"key":"5797_CR25","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.ins.2020.02.024","volume":"520","author":"JX Chen","year":"2020","unstructured":"Chen JX, Chen L, Zhou YC (2020) Cryptanalysis of a DNA-based image encryption scheme. Inf Sci 520:130\u2013141","journal-title":"Inf Sci"},{"key":"5797_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-019-04771-7","author":"M Li","year":"2019","unstructured":"Li M, Lu DD, Xiang Y, Zhang YS, Ren H (2019) Cryptanalysis and improvement in a chaotic image cipher using two-round permutation and diffusion. Nonlinear Dyn. https:\/\/doi.org\/10.1007\/s11071-019-04771-7","journal-title":"Nonlinear Dyn"},{"key":"5797_CR27","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1016\/j.sigpro.2017.11.005","volume":"144","author":"H Wang","year":"2018","unstructured":"Wang H, Xiao D, Chen X, Huang HY (2018) Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Signal Process 144:444\u2013452","journal-title":"Signal Process"},{"key":"5797_CR28","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1016\/j.image.2018.01.002","volume":"62","author":"M Li","year":"2018","unstructured":"Li M, Guo YZ, Huang J, Li Y (2018) Cryptanalysis of a chaotic image encryption scheme based on permutation\u2013diffusion structure. Signal Process Image Commun 62:164\u2013172","journal-title":"Signal Process Image Commun"},{"key":"5797_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.3011315","author":"JX Chen","year":"2020","unstructured":"Chen JX, Chen L, Zhou YC (2020) Universal chosen-ciphertext attack for a family of image encryption schemes. IEEE Trans Multimed. https:\/\/doi.org\/10.1109\/TMM.2020.3011315","journal-title":"IEEE Trans Multimed"},{"key":"5797_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08168-x","author":"XL Chai","year":"2019","unstructured":"Chai XL, Zhang JT, Gan ZH, Zhang YS (2019) Medical image encryption algorithm based on Latin square and memristive chaotic system. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-019-08168-x","journal-title":"Multimed Tools Appl"},{"key":"5797_CR31","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/j.ins.2013.11.027","volume":"264","author":"Y Wu","year":"2014","unstructured":"Wu Y, Zhou YC, Noonan JP, Agaian S (2014) Design of image cipher using latin squares. Inf Sci 264:317\u2013339","journal-title":"Inf Sci"},{"key":"5797_CR32","doi-asserted-by":"crossref","first-page":"1663","DOI":"10.1140\/epjst\/e2014-02119-9","volume":"223","author":"HT Panduranga","year":"2014","unstructured":"Panduranga HT, Naveen Kumar SK, Kiran E (2014) Image encryption based on permutation\u2013substitution using chaotic map and Latin square image cipher. Eur Phys J Spec Top 223:1663\u20131677","journal-title":"Eur Phys J Spec Top"},{"key":"5797_CR33","doi-asserted-by":"crossref","unstructured":"Ahmad M, Ahmad F (2015) Cryptanalysis of image encryption based on permutation\u2013substitution using chaotic map and latin square image cipher. In: Proceeding of the 3rd international conference on Frontiers on intelligent computing: theory and applications (FICTA) 2014, vol 327, pp 481\u2013488","DOI":"10.1007\/978-3-319-11933-5_53"},{"key":"5797_CR34","doi-asserted-by":"crossref","first-page":"1305","DOI":"10.1007\/s11071-016-3311-2","volume":"88","author":"GQ Hu","year":"2017","unstructured":"Hu GQ, Xiao D, Wang Y, Li XY (2017) Cryptanalysis of a chaotic image cipher using latin square-based confusion and diffusion. Nonlinear Dyn 88:1305\u20131316","journal-title":"Nonlinear Dyn"},{"key":"5797_CR35","doi-asserted-by":"crossref","first-page":"319","DOI":"10.3390\/e21030319","volume":"21","author":"TY Li","year":"2019","unstructured":"Li TY, Shi JY, Li XS, Wu J, Pan F (2019) Image encryption based on pixel-level diffusion with dynamic filtering and DNA-level permutation with 3D latin cubes. Entropy 21:319","journal-title":"Entropy"},{"key":"5797_CR36","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.chaos.2018.01.004","volume":"107","author":"ZT Njitacke","year":"2018","unstructured":"Njitacke ZT, Kengne J, Wafo Tapche R, Pelap FB (2018) Uncertain destination dynamics of a novel memristive 4D autonomous system. Chaos Soliton Fract 107:177\u2013185","journal-title":"Chaos Soliton Fract"},{"key":"5797_CR37","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MMUL.2011.54","volume":"19","author":"AA Dalhoum","year":"2012","unstructured":"Dalhoum AA, Mahafzah BA, Awwad AA, Aldamari I, Ortega A, Alfonseca M (2012) Digital image scrambling using 2D cellular automata. IEEE Multimed 19:28\u201336","journal-title":"IEEE Multimed"},{"key":"5797_CR38","doi-asserted-by":"crossref","first-page":"14113","DOI":"10.1007\/s00521-020-04808-8","volume":"32","author":"ZH Gan","year":"2020","unstructured":"Gan ZH, Chai XL, Zhang JT, Zhang YS, Chen YR (2020) An effective image compression-encryption scheme based on compressive sensing (CS) and game of life. Neural Comput Appl 32:14113\u201314141","journal-title":"Neural Comput Appl"},{"key":"5797_CR39","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.optlaseng.2019.05.027","volume":"122","author":"HJ Liu","year":"2019","unstructured":"Liu HJ, Kadir A, Liu J (2019) Color pathological image encryption algorithm using arithmetic over Galois field and coupled hyper chaotic system. Opt Lasers Eng 122:123\u2013133","journal-title":"Opt Lasers Eng"},{"key":"5797_CR40","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/s11071-011-0006-6","volume":"67","author":"O Mirzaei","year":"2012","unstructured":"Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67:557\u2013566","journal-title":"Nonlinear Dyn"},{"key":"5797_CR41","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/s00521-017-2993-9","volume":"31","author":"XL Chai","year":"2019","unstructured":"Chai XL, Gan ZH, Yuan K, Chen YR, Liu XX (2019) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput Appl 31:219\u2013237","journal-title":"Neural Comput Appl"},{"key":"5797_CR42","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.jvcir.2017.01.022","volume":"44","author":"G Hu","year":"2017","unstructured":"Hu G, Xiao D, Wang Y, Xiang T (2017) An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications. J Vis Commun Image Represent 44:116\u2013127","journal-title":"J Vis Commun Image Represent"},{"key":"5797_CR43","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.sigpro.2018.05.008","volume":"151","author":"DD Liu","year":"2018","unstructured":"Liu DD, Zhang W, Yu H, Zhu ZL (2018) An image encryption scheme using self-adaptive selective permutation and inter-intra-block feedback diffusion. Signal Process 151:130\u2013143","journal-title":"Signal Process"},{"key":"5797_CR44","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/j.ins.2019.01.082","volume":"489","author":"J Gayathri","year":"2019","unstructured":"Gayathri J, Subashini S (2019) An efficient spatiotemporal chaotic image cipher with an improved scrambling algorithm driven by dynamic diffusion phase. Inf Sci 489:227\u2013254","journal-title":"Inf Sci"},{"key":"5797_CR45","doi-asserted-by":"crossref","first-page":"9597619","DOI":"10.1155\/2020\/9597619","volume":"2020","author":"I Yasser","year":"2020","unstructured":"Yasser I, Khalifa F, Mohamed MA, Samrah AS (2020) A new image encryption scheme based on hybrid chaotic maps. Complexity 2020:9597619","journal-title":"Complexity"},{"key":"5797_CR46","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.optlastec.2017.09.008","volume":"99","author":"JX Chen","year":"2018","unstructured":"Chen JX, Zhang Y, Qi L, Fu C, Xu LS (2018) Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression. Opt Laser Technol 99:238\u2013248","journal-title":"Opt Laser Technol"},{"key":"5797_CR47","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","volume":"142","author":"JX Chen","year":"2018","unstructured":"Chen JX, Zhu ZL, Zhang LB, Zhang YS, Yang BQ (2018) Exploiting self-adaptive permutation\u2013diffusion and DNA random encoding for secure and efficient image encryption. Signal Process 142:340\u2013353","journal-title":"Signal Process"},{"issue":"19","key":"5797_CR48","doi-asserted-by":"crossref","first-page":"27611","DOI":"10.1007\/s11042-019-07881-x","volume":"78","author":"SI Batool","year":"2019","unstructured":"Batool SI, Waseem HM (2019) A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimed Tools Appl 78(19):27611\u201327637","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"5797_CR49","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/s11071-016-3046-0","volume":"87","author":"A Belazi","year":"2017","unstructured":"Belazi A, Khan M, El-Latif AAA, Belghith S (2017) Efficient cryptosystem approaches: S-boxes and permutation\u2013substitution-based encryption. Nonlinear Dyn 87(1):337\u2013361","journal-title":"Nonlinear Dyn"},{"key":"5797_CR50","doi-asserted-by":"crossref","unstructured":"Li L, Abd-El-Atty B, El-Latif AAA, Ghoneim A (2017) Quantum color image encryption based on multiple discrete chaotic systems. In: Federated conference on computer science and information systems (FedCSIS), pp 555\u2013559","DOI":"10.15439\/2017F163"},{"issue":"9\u201310","key":"5797_CR51","doi-asserted-by":"crossref","first-page":"6661","DOI":"10.1007\/s11042-019-08514-z","volume":"79","author":"Wang Ling","year":"2020","unstructured":"Ling Wang, Qiwen Ran, Jing Ma (2020) Double quantum color images encryption scheme based on DQRCI. Multimed Tools Appl 79(9\u201310):6661\u20136687","journal-title":"Multimed Tools Appl"},{"key":"5797_CR52","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J Multidiscip 1:31\u201338","journal-title":"Cyber J Multidiscip"},{"key":"5797_CR53","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2012","unstructured":"Xu L, Li Z, Li J et al (2012) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17\u201325","journal-title":"Opt Lasers Eng"},{"key":"5797_CR54","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.optlaseng.2016.03.019","volume":"84","author":"W Liu","year":"2016","unstructured":"Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26\u201336","journal-title":"Opt Lasers Eng"},{"key":"5797_CR55","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.1007\/s11071-014-1729-y","volume":"79","author":"X Wang","year":"2015","unstructured":"Wang X, Wang Q, Zhang Y (2015) A fast image algorithm based on rows and columns switch. Nonlinear Dyn 79:1141\u20131149","journal-title":"Nonlinear Dyn"},{"key":"5797_CR56","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.sigpro.2018.06.008","volume":"153","author":"JH Wu","year":"2018","unstructured":"Wu JH, Liao XF, Yang B (2018) Image encryption using 2D H\u00e9non-Sine map and DNA approach. Signal Process 153:11\u201323","journal-title":"Signal Process"},{"issue":"2","key":"5797_CR57","doi-asserted-by":"crossref","first-page":"158","DOI":"10.3390\/e22020158","volume":"22","author":"HG Mohamed","year":"2020","unstructured":"Mohamed HG, ElKamchouchi DH, Moussa KH (2020) A novel color image encryption algorithm based on hyperchaotic maps and mitochondrial DNA sequences. Entropy 22(2):158","journal-title":"Entropy"},{"key":"5797_CR58","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MMUL.2018.2873472","volume":"25","author":"CQ Li","year":"2018","unstructured":"Li CQ, Lin DD, Lu JH, Hao F (2018) Cryptanalyzing an image encryption algorithm based on autoblocking electrocardiography. IEEE Multimed 25:46\u201356","journal-title":"IEEE Multimed"},{"key":"5797_CR59","doi-asserted-by":"crossref","first-page":"75834","DOI":"10.1109\/ACCESS.2018.2883690","volume":"6","author":"CQ Li","year":"2018","unstructured":"Li CQ, Lin DD, Feng BB, Lu JH (2018) Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6:75834\u201375842","journal-title":"IEEE Access"},{"key":"5797_CR60","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MMUL.2017.3051512","volume":"24","author":"CQ Li","year":"2017","unstructured":"Li CQ, Lin DD, Lu JH (2017) Cryptanalyzing an image-scrambling encryption algorithm of pixel bits. IEEE Multimed 24:64\u201371","journal-title":"IEEE Multimed"},{"key":"5797_CR61","doi-asserted-by":"crossref","first-page":"2399","DOI":"10.1007\/s11071-018-4332-9","volume":"93","author":"JX Chen","year":"2018","unstructured":"Chen JX, Han FF, Qian W, Yao YD, Zhu ZL (2018) Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map. Nonlinear Dyn 93:2399\u20132413","journal-title":"Nonlinear Dyn"},{"key":"5797_CR62","doi-asserted-by":"crossref","first-page":"107684","DOI":"10.1016\/j.sigpro.2020.107684","volume":"176","author":"XL Chai","year":"2020","unstructured":"Chai XL, Bi JQ, Gan ZH, Liu XX, Zhang YS, Chen YR (2020) Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process 176:107684","journal-title":"Signal Process"},{"key":"5797_CR63","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.optlaseng.2018.11.015","volume":"115","author":"LQ Huang","year":"2019","unstructured":"Huang LQ, Cai ST, Xiong XM, Xiao MQ (2019) On symmetric color image encryption system with permutation\u2013diffusion simultaneous operation. Opt Lasers Eng 115:7\u201320","journal-title":"Opt Lasers Eng"},{"key":"5797_CR64","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.asoc.2015.08.008","volume":"37","author":"XJ Wu","year":"2015","unstructured":"Wu XJ, Kan HB, Kurths J (2015) A new color image encryption scheme based on DNA sequence and multiple improved 1D chaotic maps. Appl Soft Comput 37:24\u201339","journal-title":"Appl Soft Comput"},{"key":"5797_CR65","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1016\/j.sigpro.2018.02.028","volume":"148","author":"XJ Wu","year":"2018","unstructured":"Wu XJ, Wang KS, Wang XY, Kan HB, Kurths J (2018) Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process 148:272\u2013287","journal-title":"Signal Process"},{"key":"5797_CR66","doi-asserted-by":"crossref","first-page":"282","DOI":"10.3390\/e20040282","volume":"29","author":"S Cai","year":"2018","unstructured":"Cai S, Huang L, Chen X, Xiong X (2018) A symmetric plaintext-related color image encryption system based on bit permutation. Entropy 29:282","journal-title":"Entropy"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-021-05797-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-021-05797-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-021-05797-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T07:42:27Z","timestamp":1625730147000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-021-05797-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,19]]},"references-count":66,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["5797"],"URL":"https:\/\/doi.org\/10.1007\/s00521-021-05797-y","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,19]]},"assertion":[{"value":"3 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}