{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T09:38:34Z","timestamp":1725442714199},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"23","license":[{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100007847","name":"Natural Science Foundation of Jilin Province","doi-asserted-by":"publisher","award":["61802111, 61872125, 61871175"],"id":[{"id":"10.13039\/100007847","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Scientific Research Projects for Colleges and Universities of Henan Province","award":["19A413001"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput & Applic"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s00521-021-06225-x","type":"journal-article","created":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T13:02:37Z","timestamp":1626613357000},"page":"16251-16277","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Image cipher using image filtering with 3D DNA-based confusion and diffusion strategy"],"prefix":"10.1007","volume":"33","author":[{"given":"Zhihua","family":"Gan","sequence":"first","affiliation":[]},{"given":"Xiuli","family":"Chai","sequence":"additional","affiliation":[]},{"given":"Xiangcheng","family":"Zhi","sequence":"additional","affiliation":[]},{"given":"Wenke","family":"Ding","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4066-0826","authenticated-orcid":false,"given":"Yang","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Xiangjun","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,18]]},"reference":[{"key":"6225_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2020.07.051","volume":"544","author":"MX Wang","year":"2021","unstructured":"Wang MX, Wang XY, Zhao TT, Zhang C, Xia ZQ, Yao NM (2021) Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme. Inf Sci 544:1\u201324","journal-title":"Inf Sci"},{"key":"6225_CR2","doi-asserted-by":"crossref","first-page":"115829","DOI":"10.1016\/j.image.2020.115829","volume":"84","author":"H Zhang","year":"2020","unstructured":"Zhang H, Wang XQ, Sun YJ, Wang XY (2020) A novel method for lossless image compression and encryption based on LWT, SPIHT and cellular automata. Signal Process Image 84:115829","journal-title":"Signal Process Image"},{"key":"6225_CR3","doi-asserted-by":"crossref","first-page":"7111","DOI":"10.1007\/s00521-018-3541-y","volume":"31","author":"ZH Gan","year":"2019","unstructured":"Gan ZH, Chai XL, Han DJ, Chen YR (2019) A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Comput Appl 31:7111\u20137130","journal-title":"Neural Comput Appl"},{"key":"6225_CR4","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.optcom.2014.12.026","volume":"341","author":"WY Wen","year":"2015","unstructured":"Wen WY, Zhang YS, Fang ZJ, Chen JX (2015) Infrared target-based selective encryption by chaotic maps. Opt Commun 341:131\u2013139","journal-title":"Opt Commun"},{"key":"6225_CR5","first-page":"2322","volume":"66","author":"CQ Li","year":"2019","unstructured":"Li CQ, Feng BB, Li SJ, Kurths J, Chen GR (2019) Dynamic analysis of digital chaotic maps via state-mapping networks. IEEE Trans Circuits-I 66:2322\u20132335","journal-title":"IEEE Trans Circuits-I"},{"issue":"6","key":"6225_CR6","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 8(6):1259\u20131284","journal-title":"Int J Bifurcat Chaos"},{"issue":"19","key":"6225_CR7","doi-asserted-by":"crossref","first-page":"24701","DOI":"10.1007\/s11042-018-5669-2","volume":"77","author":"G Maddodi","year":"2018","unstructured":"Maddodi G, Awad A, Awad D, Awad M, Lee B (2018) A new image encryption algorithm based on heterogeneous chaotic neural network generator and DNA encoding. Multimed Tools Appl 77(19):24701\u201324725","journal-title":"Multimed Tools Appl"},{"key":"6225_CR8","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","volume":"90","author":"AY Niyat","year":"2017","unstructured":"Niyat AY, Moattar MH, Torshiz MN (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng 90:225\u2013237","journal-title":"Opt Lasers Eng"},{"issue":"5","key":"6225_CR9","doi-asserted-by":"crossref","first-page":"6229","DOI":"10.1007\/s11042-016-3311-8","volume":"76","author":"XY Wang","year":"2017","unstructured":"Wang XY, Liu CM (2017) A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed Tools Appl 76(5):6229\u20136245","journal-title":"Multimed Tools Appl"},{"key":"6225_CR10","doi-asserted-by":"crossref","first-page":"1587","DOI":"10.1007\/s11071-019-05378-8","volume":"99","author":"WY Wen","year":"2020","unstructured":"Wen WY, Wei KK, Zhang YS, Fang YM, Li M (2020) Colour light field image encryption based on DNA sequences and chaotic systems. Nonlinear Dyn 99:1587\u20131600","journal-title":"Nonlinear Dyn"},{"issue":"20","key":"6225_CR11","doi-asserted-by":"crossref","first-page":"27017","DOI":"10.1007\/s11042-018-5902-z","volume":"77","author":"A Girdhar","year":"2018","unstructured":"Girdhar A, Kumar V (2018) A RGB image encryption technique using Lorenz and Rossler chaotic system on DNA sequences. Multimed Tools Appl 77(20):27017\u201327039","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"6225_CR12","doi-asserted-by":"crossref","first-page":"2105","DOI":"10.1007\/s11042-018-6346-1","volume":"78","author":"AU Rehman","year":"2019","unstructured":"Rehman AU, Liao XF (2019) A novel robust dual diffusion\/confusion encryption technique for color image based on chaos, DNA and SHA-2. Multimed Tools Appl 78(2):2105\u20132133","journal-title":"Multimed Tools Appl"},{"key":"6225_CR13","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1016\/j.optlastec.2017.04.022","volume":"95","author":"A Akhavan","year":"2017","unstructured":"Akhavan A, Samsudin A, Akhshani A (2017) Cryptanalysis of an image encryption algorithm based on DNA encoding. Opt Laser Technol 95:94\u201399","journal-title":"Opt Laser Technol"},{"issue":"9","key":"6225_CR14","doi-asserted-by":"crossref","first-page":"915","DOI":"10.1016\/j.physleta.2018.12.011","volume":"383","author":"DM Huo","year":"2019","unstructured":"Huo DM, Zhou DF, Yuan S, Yi SL, Zhang LZ, Zhou X (2019) Image encryption using exclusive-OR with DNA complementary rules and double random phase encoding. Phys Lett A 383(9):915\u2013922","journal-title":"Phys Lett A"},{"key":"6225_CR15","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.optlaseng.2016.10.006","volume":"90","author":"R Enayatifar","year":"2017","unstructured":"Enayatifar R, Abdullah AH, Isnin IF, Altameem A, Lee M (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146\u2013154","journal-title":"Opt Lasers Eng"},{"key":"6225_CR16","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.sigpro.2018.06.008","volume":"153","author":"JH Wu","year":"2018","unstructured":"Wu JH, Liao XF, Bo Y (2018) Image encryption using 2D H\u00e9non-Sine map and DNA approach. Signal Process 153:11\u201323","journal-title":"Signal Process"},{"issue":"2","key":"6225_CR17","first-page":"7201714","volume":"10","author":"SL Sun","year":"2018","unstructured":"Sun SL (2018) A novel hyperchaotic image encryption scheme based on DNA encoding, pixel-level scrambling and bit-level scrambling. IEEE Photon J 10(2):7201714","journal-title":"IEEE Photon J"},{"issue":"6","key":"6225_CR18","doi-asserted-by":"crossref","first-page":"7909215","DOI":"10.1109\/JPHOT.2018.2880590","volume":"10","author":"W Feng","year":"2018","unstructured":"Feng W, He YG (2018) Cryptanalysis and improvement of the hyper-chaotic image encryption scheme based on DNA encoding and scrambling. IEEE Photon J 10(6):7909215","journal-title":"IEEE Photon J"},{"key":"6225_CR19","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1016\/j.ins.2020.10.007","volume":"556","author":"XL Chai","year":"2021","unstructured":"Chai XL, Wu HY, Gan ZH, Han DJ, Zhang YS, Chen YR (2021) An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing. Inf Sci 556:305\u2013340","journal-title":"Inf Sci"},{"key":"6225_CR20","doi-asserted-by":"crossref","first-page":"107525","DOI":"10.1016\/j.sigpro.2020.107525","volume":"171","author":"XL Chai","year":"2020","unstructured":"Chai XL, Wu HY, Gan ZH, Zhang YS, Chen YR (2020) Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy. Signal Process 171:107525","journal-title":"Signal Process"},{"issue":"1","key":"6225_CR21","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/s11071-019-04791-3","volume":"96","author":"JX Chen","year":"2019","unstructured":"Chen JX, Chen L, Zhang LY, Zhu ZL (2019) Medical image cipher using hierarchical diffusion and non-sequential encryption. Nonlinear Dyn 96(1):301\u2013322","journal-title":"Nonlinear Dyn"},{"key":"6225_CR22","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/s11071-014-1287-3","volume":"77","author":"MT Su","year":"2014","unstructured":"Su MT, Wen WY, Zhang YS (2014) Security evaluation of bilateral-diffusion based image encryption algorithm. Nonlinear Dyn 77:243\u2013246","journal-title":"Nonlinear Dyn"},{"issue":"8","key":"6225_CR23","doi-asserted-by":"crossref","first-page":"2066","DOI":"10.1016\/j.cnsns.2012.12.012","volume":"18","author":"W Zhang","year":"2013","unstructured":"Zhang W, Wong K, Yu H, Zhu ZL (2013) An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun Nonlinear Sci Numer Simul 18(8):2066\u20132080","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"6225_CR24","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.ins.2017.02.036","volume":"396","author":"ZY Hua","year":"2017","unstructured":"Hua ZY, Zhou YC (2017) Design of image cipher using block-based scrambling and image filtering. Inf Sci 396:97\u2013113","journal-title":"Inf Sci"},{"issue":"3","key":"6225_CR25","doi-asserted-by":"crossref","first-page":"319","DOI":"10.3390\/e21030319","volume":"21","author":"TY Li","year":"2019","unstructured":"Li TY, Shi JY, Li XS, Wu J, Pan F (2019) Image encryption based on pixel-level diffusion with dynamic filtering and DNA-level permutation with 3D latin cubes. Entropy 21(3):319","journal-title":"Entropy"},{"key":"6225_CR26","first-page":"1","volume":"12","author":"XS Li","year":"2019","unstructured":"Li XS, Xie ZL, Wu J, Li TY (2019) Image encryption based on dynamic filtering and bit cuboid operations. Complexity 12:1\u201316","journal-title":"Complexity"},{"key":"6225_CR27","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1016\/j.aej.2017.01.044","volume":"57","author":"K Rajagopal","year":"2018","unstructured":"Rajagopal K, Vaidyanathan S, Karthikeyan A, Srinivasan A (2018) Complex novel 4D memristor hyperchaotic system and its synchronization using adaptive sliding mode control. Alex Eng J 57:683\u2013694","journal-title":"Alex Eng J"},{"key":"6225_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3051387","author":"CQ Li","year":"2021","unstructured":"Li CQ, Tan K, Feng BB, Lu JH (2021) The graph structure of the generalized discrete Arnold Cat map. IEEE T Comput. https:\/\/doi.org\/10.1109\/TC.2021.3051387","journal-title":"IEEE T Comput"},{"key":"6225_CR29","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.optlaseng.2016.10.009","volume":"90","author":"A Kanso","year":"2017","unstructured":"Kanso A, Ghebleh M (2017) An algorithm for encryption of secret images into meaningful images. Opt Lasers Eng 90:196\u2013208","journal-title":"Opt Lasers Eng"},{"key":"6225_CR30","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/s00521-017-2993-9","volume":"31","author":"XL Chai","year":"2019","unstructured":"Chai XL, Gan ZH, Yuan K, Chen YR, Liu XX (2019) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput Appl 31:219\u2013237","journal-title":"Neural Comput Appl"},{"key":"6225_CR31","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.4153\/CJM-1976-113-0","volume":"28","author":"J Arkin","year":"1976","unstructured":"Arkin J, Hoggatt VE, Straus EG (1976) Systems of magic Latin k-cubes. Can J Math 28:1153\u20131161","journal-title":"Can J Math"},{"key":"6225_CR32","first-page":"288","volume":"12","author":"J Arkin","year":"1974","unstructured":"Arkin J, Straus EG (1974) Latin k-cubes. Fibonacci Quarterly 12:288\u2013292","journal-title":"Fibonacci Quarterly"},{"key":"6225_CR33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2018.11.010","volume":"478","author":"M Xu","year":"2019","unstructured":"Xu M, Tian ZH (2019) A novel image cipher based on 3D bit matrix and Latin cubes. Inf Sci 478:1\u201314","journal-title":"Inf Sci"},{"key":"6225_CR34","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.sigpro.2015.06.008","volume":"118","author":"W Zhang","year":"2016","unstructured":"Zhang W, Yu H, Zhao YL, Zhu ZL (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36\u201350","journal-title":"Signal Process"},{"key":"6225_CR35","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1016\/j.sigpro.2017.06.014","volume":"142","author":"JH Wu","year":"2018","unstructured":"Wu JH, Liao XF, Yang B (2018) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process 142:292\u2013300","journal-title":"Signal Process"},{"key":"6225_CR36","doi-asserted-by":"crossref","first-page":"1781","DOI":"10.1007\/s11071-018-4659-2","volume":"95","author":"B Li","year":"2019","unstructured":"Li B, Liao XF, Jiang Y (2019) A novel image encryption scheme based on improved random number generator and its implementation. Nonlinear Dyn 95:1781\u20131805","journal-title":"Nonlinear Dyn"},{"key":"6225_CR37","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.optlastec.2017.09.008","volume":"99","author":"JX Chen","year":"2018","unstructured":"Chen JX, Zhang Y, Qi L, Fu C, Xu LS (2018) Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression. Opt Laser Technol 99:238\u2013248","journal-title":"Opt Laser Technol"},{"key":"6225_CR38","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.sigpro.2018.05.008","volume":"151","author":"DD Liu","year":"2018","unstructured":"Liu DD, Zhang W, Yu H, Zhu ZL (2018) An image encryption scheme using self-adaptive selective permutation and inter-intra-block feedback diffusion. Signal Process 151:130\u2013143","journal-title":"Signal Process"},{"key":"6225_CR39","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.optlaseng.2018.05.014","volume":"110","author":"NR Zhou","year":"2018","unstructured":"Zhou NR, Jiang H, Gong LH, Xie XW (2018) Double-image compression and encryption algorithm based on co-sparse representation and random pixel exchanging. Opt Lasers Eng 110:72\u201379","journal-title":"Opt Lasers Eng"},{"key":"6225_CR40","doi-asserted-by":"crossref","first-page":"8065","DOI":"10.1007\/s00521-019-04312-8","volume":"32","author":"XL Chai","year":"2020","unstructured":"Chai XL, Zheng XY, Gan ZH, Chen YR (2020) Exploiting plaintext-related mechanism for secure color image encryption. Neural Comput Appl 32:8065\u20138088","journal-title":"Neural Comput Appl"},{"key":"6225_CR41","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1016\/j.image.2014.06.012","volume":"29","author":"XP Zhang","year":"2014","unstructured":"Zhang XP, Zhao ZM, Wang JY (2014) Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process Image 29:902\u2013913","journal-title":"Signal Process Image"},{"key":"6225_CR42","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.sigpro.2018.02.007","volume":"148","author":"XL Chai","year":"2018","unstructured":"Chai XL, Zheng XY, Gan ZH, Hua DJ, Chen YR (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124\u2013144","journal-title":"Signal Process"},{"key":"6225_CR43","first-page":"102361","volume":"48","author":"CQ Li","year":"2019","unstructured":"Li CQ, Zhang Y, Xie EY (2019) When an attacker meets a cipher-image in 2018: a year in review. J Inf Secur Appl 48:102361","journal-title":"J Inf Secur Appl"},{"key":"6225_CR44","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MMUL.2018.2873472","volume":"25","author":"CQ Li","year":"2018","unstructured":"Li CQ, Lin DD, Lu JH, Feng H (2018) Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE Multimed 25:46\u201356","journal-title":"IEEE Multimed"},{"issue":"2","key":"6225_CR45","doi-asserted-by":"crossref","first-page":"2508","DOI":"10.1109\/JSYST.2019.2927495","volume":"14","author":"LL Zhou","year":"2020","unstructured":"Zhou LL, Tan F, Yu F (2020) A robust synchronization-based chaotic secure communication scheme with double-layered and multiple hybrid networks. IEEE Syst J 14(2):2508\u20132519","journal-title":"IEEE Syst J"},{"key":"6225_CR46","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1016\/j.optlastec.2019.01.043","volume":"114","author":"Y Erdem","year":"2019","unstructured":"Erdem Y (2019) A novel chaotic image encryption algorithm based on content-sensitive dynamic function switching scheme. Opt Laser Technol 114:224\u2013239","journal-title":"Opt Laser Technol"},{"issue":"2","key":"6225_CR47","doi-asserted-by":"crossref","first-page":"943","DOI":"10.1007\/s11045-018-0589-x","volume":"30","author":"SK Jan","year":"2019","unstructured":"Jan SK, Jawad A (2019) Chaos based efficient selective image encryption. Multidim Syst Sign P 30(2):943\u2013961","journal-title":"Multidim Syst Sign P"},{"issue":"17","key":"6225_CR48","doi-asserted-by":"crossref","first-page":"10631","DOI":"10.1007\/s11042-014-2115-y","volume":"75","author":"Z Parvin","year":"2014","unstructured":"Parvin Z, Seyedarabi H, Shamsi M (2014) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed Tools Appl 75(17):10631\u201310648","journal-title":"Multimed Tools Appl"},{"key":"6225_CR49","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.optlaseng.2016.07.010","volume":"88","author":"A Belazi","year":"2017","unstructured":"Belazi A, El-Latif AAA, Diaconu AV (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37\u201350","journal-title":"Opt Lasers Eng"},{"key":"6225_CR50","doi-asserted-by":"crossref","first-page":"105777","DOI":"10.1016\/j.optlastec.2019.105777","volume":"121","author":"MAB Farah","year":"2020","unstructured":"Farah MAB, Guesmi R, Kachouri A, Samet M (2020) A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt Laser Technol 121:105777","journal-title":"Opt Laser Technol"},{"key":"6225_CR51","doi-asserted-by":"crossref","first-page":"3029","DOI":"10.1007\/s10773-017-3469-5","volume":"56","author":"H Wang","year":"2017","unstructured":"Wang H, Wang J, Geng YC, Song Y, Liu JQ (2017) Quantum image encryption based on iterative framework of frequency-spatial domain transforms. Int J Theor Phys 56:3029\u20133049","journal-title":"Int J Theor Phys"},{"issue":"18","key":"6225_CR52","doi-asserted-by":"crossref","first-page":"11241","DOI":"10.1007\/s11042-015-2851-7","volume":"75","author":"X Aqeel-ur-Rehman","year":"2016","unstructured":"Aqeel-ur-Rehman X, Liao AK, Ullah S (2016) A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps. Multimed Tools Appl 75(18):11241\u201311266","journal-title":"Multimed Tools Appl"},{"key":"6225_CR53","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1140\/epjp\/i2018-11834-2","volume":"133","author":"H Natiq","year":"2018","unstructured":"Natiq H, Saidi MRM, Kilicman A (2018) A new hyperchaotic map and its application for image encryption. Eur Phys J Plus 133:6","journal-title":"Eur Phys J Plus"},{"key":"6225_CR54","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1016\/j.optlaseng.2019.06.015","volume":"122","author":"XY Wang","year":"2019","unstructured":"Wang XY, Wang Y, Unar S, Wang MX, Wang S (2019) A privacy encryption algorithm based on an improved chaotic system. Opt Lasers Eng 122:335\u2013346","journal-title":"Opt Lasers Eng"},{"issue":"8","key":"6225_CR55","doi-asserted-by":"crossref","first-page":"10217","DOI":"10.1007\/s11042-017-5406-2","volume":"77","author":"JY Liu","year":"2018","unstructured":"Liu JY, Yang DD, Zhou HB, Chen SQ (2018) A digital image encryption algorithm based on bit-planes and an improved logistic map. Multimed Tools Appl 77(8):10217\u201310233","journal-title":"Multimed Tools Appl"},{"key":"6225_CR56","doi-asserted-by":"crossref","first-page":"105769","DOI":"10.1016\/j.optlastec.2019.105769","volume":"121","author":"KL Zhou","year":"2020","unstructured":"Zhou KL, Fan JJ, Fan HJ, Li M (2020) Secure image encryption scheme using double random-phase encoding and compressed sensing. Opt Laser Technol 121:105769","journal-title":"Opt Laser Technol"},{"key":"6225_CR57","doi-asserted-by":"crossref","first-page":"105818","DOI":"10.1016\/j.optlastec.2019.105818","volume":"121","author":"M Mahmud","year":"2020","unstructured":"Mahmud M, Atta-ur-Rahman, Lee M, Choi J-Y (2020) Evolutionary-based image encryption using RNA codons truth table. Opt Laser Technol 121:105818","journal-title":"Opt Laser Technol"},{"key":"6225_CR58","doi-asserted-by":"crossref","first-page":"35419","DOI":"10.1007\/s11042-019-08168-x","volume":"78","author":"XL Chai","year":"2019","unstructured":"Chai XL, Zhang JT, Gan ZH, Zhang YS (2019) Medical image encryption algorithm based on Latin square and memristive chaotic system. Multimed Tools Appl 78:35419\u201335453","journal-title":"Multimed Tools Appl"},{"key":"6225_CR59","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s11042-012-1331-6","volume":"72","author":"XL Huang","year":"2014","unstructured":"Huang XL, Ye GD (2014) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed Tools Appl 72:57\u201370","journal-title":"Multimed Tools Appl"},{"key":"6225_CR60","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"XY Wang","year":"2015","unstructured":"Wang XY, Liu LT, Zhang YQ (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10\u201318","journal-title":"Opt Lasers Eng"},{"key":"6225_CR61","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"XY Wang","year":"2015","unstructured":"Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53\u201361","journal-title":"Opt Lasers Eng"},{"issue":"7","key":"6225_CR62","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.sigpro.2014.01.020","volume":"100","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Cao W, Chen CLP (2014) Image encryption using binary bit plane. Signal Process 100(7):197\u2013207","journal-title":"Signal Process"},{"issue":"21","key":"6225_CR63","first-page":"17","volume":"78","author":"L Xu","year":"2012","unstructured":"Xu L, Li Z, Li J (2012) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78(21):17\u201325","journal-title":"Opt Lasers Eng"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-021-06225-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-021-06225-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-021-06225-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T18:19:05Z","timestamp":1635963545000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-021-06225-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,18]]},"references-count":63,"journal-issue":{"issue":"23","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["6225"],"URL":"https:\/\/doi.org\/10.1007\/s00521-021-06225-x","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,18]]},"assertion":[{"value":"13 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 June 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}