{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,5]],"date-time":"2024-08-05T05:14:02Z","timestamp":1722834842639},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2016,5,14]],"date-time":"2016-05-14T00:00:00Z","timestamp":1463184000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China (CN)","doi-asserted-by":"publisher","award":["61203094"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Foundation of Henan Province of China","award":["152102210048"]},{"name":"Natural Science Foundation of Educational Committee of Henan Province of China","award":["14A413015"]},{"name":"the joint funds between Henan Provincial Government and Ministry of Education of China","award":["SBGJ090603"]},{"name":"the Research Foundation of Henan University","award":["xxjc20140006"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1007\/s11042-016-3585-x","type":"journal-article","created":{"date-parts":[[2016,5,14]],"date-time":"2016-05-14T12:22:46Z","timestamp":1463228566000},"page":"9907-9927","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":80,"title":["A new chaos-based image encryption algorithm with dynamic key selection mechanisms"],"prefix":"10.1007","volume":"76","author":[{"given":"Xiuli","family":"Chai","sequence":"first","affiliation":[]},{"given":"Kang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zhihua","family":"Gan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,14]]},"reference":[{"key":"3585_CR1","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.optcom.2015.03.079","volume":"350","author":"A Akhavan","year":"2015","unstructured":"Akhavan A, Samsudin A, Akhshani A (2015) Cryptanalysis of \u201can improvement over an image encryption method based on total shuffling\u201d. Opt Commun 350:77\u201382","journal-title":"Opt Commun"},{"key":"3585_CR2","doi-asserted-by":"crossref","first-page":"4653","DOI":"10.1016\/j.cnsns.2012.05.033","volume":"17","author":"A Akhshani","year":"2012","unstructured":"Akhshani A, Akhavan A, Lim SC et al (2012) An image encryption scheme based on quantum logistic map. Commun Nonlinear Sci Numer Simul 17:4653\u20134661","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"3585_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3088-1","author":"XL Chai","year":"2015","unstructured":"Chai XL (2015) An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimed Tools Appl. doi: 10.1007\/s11042-015-3088-1","journal-title":"Multimed Tools Appl"},{"key":"3585_CR4","doi-asserted-by":"crossref","first-page":"846","DOI":"10.1016\/j.cnsns.2014.06.032","volume":"20","author":"JX Chen","year":"2015","unstructured":"Chen JX, Zhu ZL, Fu C, Yu H, Zhang LB (2015) A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Commun Nonlinear Sci Numer Simul 20:846\u2013860","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"3585_CR5","doi-asserted-by":"crossref","first-page":"1559","DOI":"10.1007\/s11042-012-1173-2","volume":"70","author":"AAA El-Latif","year":"2014","unstructured":"El-Latif AAA, Li L, Niu XM (2014) A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tools Appl 70:1559\u20131584","journal-title":"Multimed Tools Appl"},{"key":"3585_CR6","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.optcom.2012.07.052","volume":"286","author":"Z Eslami","year":"2013","unstructured":"Eslami Z, Bakhshandeh A (2013) An improvement over an image encryption method based on total shuffling. Opt Commun 286:51\u201355","journal-title":"Opt Commun"},{"key":"3585_CR7","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifur Chaos 8:1259\u20131284","journal-title":"Int J Bifur Chaos"},{"issue":"23","key":"3585_CR8","doi-asserted-by":"crossref","first-page":"5415","DOI":"10.1016\/j.optcom.2011.08.013","volume":"284","author":"C Fu","year":"2011","unstructured":"Fu C, Lin BB, Miao YS, Liu X, Chen JJ (2011) A novel chaos-based bit-level permutation scheme for digital image encryption. Opt Commun 284(23):5415\u20135423","journal-title":"Opt Commun"},{"key":"3585_CR9","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"ZY Hua","year":"2015","unstructured":"Hua ZY, Zhou YC, Pun CM, Philip Chen CL (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80\u201394","journal-title":"Inf Sci"},{"key":"3585_CR10","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s11042-012-1331-6","volume":"72","author":"XL Huang","year":"2014","unstructured":"Huang XL, Ye GD (2014) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed Tools Appl 72:57\u201370","journal-title":"Multimed Tools Appl"},{"key":"3585_CR11","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/j.sigpro.2015.06.007","volume":"117","author":"H Hung-I","year":"2015","unstructured":"Hung-I H, Junghsi L (2015) Color image encryption using chaotic nonlinear adaptive fiter. Signal Process 117:281\u2013309","journal-title":"Signal Process"},{"key":"3585_CR12","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/s11071-013-0819-6","volume":"75","author":"MS Kamarposhti","year":"2014","unstructured":"Kamarposhti MS, Mohammad D, Rahim MSM, Yaghobi M (2014) Using 3-cell chaotic map for image encryption based on biological operations. Nonlinear Dyn 75:407\u2013416","journal-title":"Nonlinear Dyn"},{"key":"3585_CR13","doi-asserted-by":"crossref","first-page":"1350075","DOI":"10.1142\/S0218127413500752","volume":"23","author":"CQ Li","year":"2013","unstructured":"Li CQ, Liu YS, Zhang LY (2013) Breaking a chaotic image encryption algorithm based on modulo addition and xor operation. Int J Bifur Chaos 23:1350075","journal-title":"Int J Bifur Chaos"},{"issue":"1","key":"3585_CR14","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.chaos.2004.11.096","volume":"26","author":"S Lian","year":"2005","unstructured":"Lian S, Sun J, Wang Z (2005) A block cipher based on a suitable use of the chaotic standard map. Chaos Solitons Fractals 26(1):117\u2013129","journal-title":"Chaos Solitons Fractals"},{"key":"3585_CR15","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.sigpro.2015.01.016","volume":"113","author":"HJ Liu","year":"2015","unstructured":"Liu HJ, Abdurahman K (2015) Asymmetric color image encryption scheme using 2D discrete-time map. Signal Process 113:104\u2013112","journal-title":"Signal Process"},{"key":"3585_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2691-5","author":"Y Liu","year":"2015","unstructured":"Liu Y, Tong XJ, Ma J (2015) Image encryption algorithm based on hyperchaotic system and dynamic S-box. Multimed Tools Appl. doi: 10.1007\/s11042-015-2691-5","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"3585_CR17","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1016\/j.jss.2012.11.026","volume":"86","author":"H Liu","year":"2013","unstructured":"Liu H, Wang X (2013) Triple-image encryption scheme based on one-time key stream generated by chaos and plain images. J Syst Softw 86(3):826\u2013834","journal-title":"J Syst Softw"},{"key":"3585_CR18","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s11071-015-2142-x","volume":"82","author":"O Mannai","year":"2015","unstructured":"Mannai O, Bechikh R, Hermassi H, Rhouma R, Belghith S (2015) A new image encryption scheme based on a simple first-order time-delay system with appropriate nonlinearity. Nonlinear Dyn 82:107\u2013117","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"3585_CR19","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/s11071-011-0006-6","volume":"67","author":"O Mirzaei","year":"2012","unstructured":"Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67(1):557\u2013566","journal-title":"Nonlinear Dyn"},{"key":"3585_CR20","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s00530-013-0314-4","volume":"20","author":"B Norouzi","year":"2014","unstructured":"Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosazi MR (2014) A novel image encryption based on hash function with only two-round diffusion process. Multimedia Systems 20:45\u201364","journal-title":"Multimedia Systems"},{"issue":"10","key":"3585_CR21","doi-asserted-by":"crossref","first-page":"2755","DOI":"10.1016\/j.cnsns.2009.11.010","volume":"15","author":"V Patidar","year":"2010","unstructured":"Patidar V, Pareek N, Purohit G, Sud K (2010) Modified substitution\u2013diffusion image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 15(10):2755\u20132765","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"20","key":"3585_CR22","doi-asserted-by":"crossref","first-page":"2638","DOI":"10.1016\/j.physd.2008.03.049","volume":"237","author":"A Pisarchik","year":"2008","unstructured":"Pisarchik A, Zanin M (2008) Image encryption with chaotically coupled chaotic maps. Phys D Nonlinear Phenom 237(20):2638\u20132648","journal-title":"Phys D Nonlinear Phenom"},{"key":"3585_CR23","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1007\/s11071-015-2008-2","volume":"81","author":"SM Seyedzadeh","year":"2015","unstructured":"Seyedzadeh SM, Norouzi B, Mosavi MR, Mirzakuchaki S (2015) A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn 81:511\u2013529","journal-title":"Nonlinear Dyn"},{"key":"3585_CR24","doi-asserted-by":"crossref","first-page":"795","DOI":"10.1007\/s11071-013-0832-9","volume":"73","author":"X Wang","year":"2013","unstructured":"Wang X, Liu L (2013) Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos. Nonlinear Dyn 73:795\u2013800","journal-title":"Nonlinear Dyn"},{"key":"3585_CR25","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"XY Wang","year":"2015","unstructured":"Wang XY, Liu LT, Zhang YQ (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Laser Eng 66:10\u201318","journal-title":"Opt Laser Eng"},{"key":"3585_CR26","doi-asserted-by":"crossref","unstructured":"Wang XY, Wang Q (2014) A fast image encryption algorithm based on only blocks in cipher text. Chin Phys B 23(3):030503","DOI":"10.1088\/1674-1056\/23\/3\/030503"},{"issue":"1","key":"3585_CR27","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","volume":"11","author":"Y Wang","year":"2011","unstructured":"Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. J Appl Soft Comput 11(1):514\u2013522","journal-title":"J Appl Soft Comput"},{"issue":"4","key":"3585_CR28","doi-asserted-by":"crossref","first-page":"2449","DOI":"10.1007\/s11071-014-1824-0","volume":"79","author":"XY Wang","year":"2015","unstructured":"Wang XY, Xu DH (2015) A novel image encryption scheme using chaos and Langton\u2019s Ant cellular automaton. Nonlinear Dyn 79(4):2449\u20132456","journal-title":"Nonlinear Dyn"},{"issue":"15","key":"3585_CR29","doi-asserted-by":"crossref","first-page":"2645","DOI":"10.1016\/j.physleta.2007.12.026","volume":"372","author":"KW Wong","year":"2008","unstructured":"Wong KW, Kwok BSH, Law WS (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372(15):2645\u20132652","journal-title":"Phys Lett A"},{"key":"3585_CR30","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.sigpro.2014.03.015","volume":"102","author":"Y Wu","year":"2014","unstructured":"Wu Y, Zhou YC, Sos A, Noonan Joseph P (2014) A symmetric image cipher using wave perturbations. Signal Process 102:122\u2013131","journal-title":"Signal Process"},{"issue":"5","key":"3585_CR31","doi-asserted-by":"crossref","first-page":"2191","DOI":"10.1016\/j.chaos.2007.10.009","volume":"40","author":"D Xiao","year":"2009","unstructured":"Xiao D, Liao X, Wei P (2009) Analysis and improvement of a chaos-based image encryption algorithm. Chaos Solitons Fractals 40(5):2191\u20132199","journal-title":"Chaos Solitons Fractals"},{"key":"3585_CR32","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/s11071-013-1074-6","volume":"75","author":"GD Ye","year":"2014","unstructured":"Ye GD (2014) A block image encryption algorithm based on wave transmission and chaotic systems. Nonlinear Dyn 75:417\u2013427","journal-title":"Nonlinear Dyn"},{"key":"3585_CR33","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/j.asoc.2014.05.025","volume":"22","author":"GD Ye","year":"2014","unstructured":"Ye GD, Zhou J (2014) A block chaotic image encryption scheme based on self-adaptive modelling. Appl Soft Comput 22:351\u2013357","journal-title":"Appl Soft Comput"},{"issue":"10","key":"3585_CR34","doi-asserted-by":"crossref","first-page":"3653","DOI":"10.1016\/j.cnsns.2014.03.016","volume":"19","author":"L Zhang","year":"2014","unstructured":"Zhang L, Hu X, Liu Y, Wong K (2014) A chaotic image encryption scheme owning temp-value feedback. Commun Nonlinear Sci Numer Simul 19(10):3653\u20133659","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"3585_CR35","doi-asserted-by":"crossref","first-page":"2775","DOI":"10.1016\/j.optcom.2011.02.039","volume":"284","author":"G Zhang","year":"2011","unstructured":"Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284:2775\u20132780","journal-title":"Opt Commun"},{"key":"3585_CR36","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf Sci 273:329\u2013351","journal-title":"Inf Sci"},{"issue":"3","key":"3585_CR37","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1016\/j.cnsns.2012.08.010","volume":"18","author":"W Zhang","year":"2013","unstructured":"Zhang W, Wong KW, Yu H, Zhu ZL (2013) A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun Nonlinear Sci Numer Simul 18(3):584\u2013600","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"1","key":"3585_CR38","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.cnsns.2013.06.031","volume":"19","author":"YS Zhang","year":"2014","unstructured":"Zhang YS, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simul 19(1):74\u201382","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"3585_CR39","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.sigpro.2014.01.020","volume":"100","author":"YC Zhou","year":"2014","unstructured":"Zhou YC, Cao WJ, Philip Chen CL (2014) Image encryption using binary bitplane. Signal Process 100:197\u2013207","journal-title":"Signal Process"},{"key":"3585_CR40","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","volume":"285","author":"CX Zhu","year":"2012","unstructured":"Zhu CX (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285:29\u201337","journal-title":"Opt Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3585-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3585-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3585-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3585-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T23:32:52Z","timestamp":1559345572000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3585-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,14]]},"references-count":40,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2017,4]]}},"alternative-id":["3585"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3585-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,14]]}}}