{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T07:47:50Z","timestamp":1742802470581,"version":"3.37.3"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T00:00:00Z","timestamp":1472688000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61203094 and 61305042"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Foundation of Henan Province of China","award":["152102210048"]},{"name":"Natural Science Foundation of Educational Committee of Henan Province of China","award":["14A413015"]},{"name":"Research Foundation of Henan University","award":["xxjc20140006"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s11042-016-3858-4","type":"journal-article","created":{"date-parts":[[2016,9,2]],"date-time":"2016-09-02T15:42:04Z","timestamp":1472830924000},"page":"15561-15585","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":88,"title":["A fast chaos-based image encryption scheme with a novel plain image-related swapping block permutation and block diffusion"],"prefix":"10.1007","volume":"76","author":[{"given":"Xiuli","family":"Chai","sequence":"first","affiliation":[]},{"given":"Zhihua","family":"Gan","sequence":"additional","affiliation":[]},{"given":"Miaohui","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,1]]},"reference":[{"key":"3858_CR1","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.cnsns.2012.05.023","volume":"18","author":"AA Abdo","year":"2013","unstructured":"Abdo AA, Lian SG, Ismail IA, Amin M, Diab H (2013) A cryptosystem based on elementary cellular automata. Commun Nonlinear Sci Numer Simul 18:136\u2013147","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"3858_CR2","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.optcom.2015.03.079","volume":"350","author":"A Akhavan","year":"2015","unstructured":"Akhavan A, Samsudin A, Akhshani A (2015) Cryptanalysis of \u201can improvement over an image encryption method based on total shuffling\u201d. Opt Commun 350:77\u201382","journal-title":"Opt Commun"},{"key":"3858_CR3","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s11071-014-1263-y","volume":"76","author":"A Belazi","year":"2014","unstructured":"Belazi A, Hermassi H, Rhouma Rh O, Safya B (2014) Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map. Nonlinear Dyn 76:1989\u20132004","journal-title":"Nonlinear Dyn"},{"key":"3858_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3088-1","author":"XL Chai","year":"2015","unstructured":"Chai XL (2015) An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimedia Tools Appl. doi:\n10.1007\/s11042-015-3088-1","journal-title":"Multimedia Tools Appl"},{"key":"3858_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3585-x","author":"XL Chai","year":"2016","unstructured":"Chai XL, Yang K, Gan ZH (2016) A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimedia Tools Appl. doi:\n10.1007\/s11042-016-3585-x","journal-title":"Multimedia Tools Appl"},{"key":"3858_CR6","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21:749\u2013761","journal-title":"Chaos Solitons Fractals"},{"key":"3858_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.optlaseng.2014.08.010","volume":"66","author":"JX Chen","year":"2015","unstructured":"Chen JX, Zhu ZL, Fu C, Zhang LB, Yu H (2015) Analysis and improvement of a double-image encryption scheme using pixel scrambling technique in gyrator domains. Opt Lasers Eng 66:1\u20139","journal-title":"Opt Lasers Eng"},{"key":"3858_CR8","doi-asserted-by":"crossref","first-page":"1151","DOI":"10.1007\/s11071-015-2057-6","volume":"81","author":"JX Chen","year":"2015","unstructured":"Chen JX, Zhu ZL, Fu C, Zhang LB, Zhang YS (2015) An efficient image encryption scheme using lookup table-based confusion and diffusion. Nonlinear Dyn 81:1151\u20131166","journal-title":"Nonlinear Dyn"},{"key":"3858_CR9","doi-asserted-by":"crossref","first-page":"1191","DOI":"10.1007\/s11071-014-1370-9","volume":"77","author":"JX Chen","year":"2014","unstructured":"Chen JX, Zhu ZL, Fu C, Yu H (2014) A fast image encryption scheme with a novel pixel swapping-based confusion approach. Nonlinear Dyn 77:1191\u20131207","journal-title":"Nonlinear Dyn"},{"key":"3858_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.10.027","author":"AV Diaconu","year":"2015","unstructured":"Diaconu AV (2015) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf Sci. doi:\n10.1016\/j.ins.2015.10.027","journal-title":"Inf Sci"},{"key":"3858_CR11","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.optlaseng.2015.03.007","volume":"71","author":"R Enayatifar","year":"2015","unstructured":"Enayatifar R, Sadaei HJ, Abdullah AH, Lee M, Isnin IF (2015) A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Opt Laser Eng 71:33\u201341","journal-title":"Opt Laser Eng"},{"key":"3858_CR12","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.optcom.2012.07.052","volume":"286","author":"Z Eslami","year":"2013","unstructured":"Eslami Z, Bakhshandeh A (2013) An improvement over an image encryption method based on total shuffling. Opt Commun 286:51\u201355","journal-title":"Opt Commun"},{"key":"3858_CR13","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8:1259\u20131284","journal-title":"Int J Bifurcation Chaos"},{"key":"3858_CR14","doi-asserted-by":"crossref","first-page":"1000","DOI":"10.1016\/j.compbiomed.2013.05.005","volume":"43","author":"C Fu","year":"2013","unstructured":"Fu C, Meng WH, Zhan YF, Zhu ZL, Lau FCM, Tse CK, Ma HF (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43:1000\u20131010","journal-title":"Comput Biol Med"},{"key":"3858_CR15","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.optcom.2015.05.011","volume":"353","author":"GE Galizzi","year":"2015","unstructured":"Galizzi GE, Christian C-L (2015) Joint transform correlator optical encryption system: Extensions of the recorded encrypted signal and its inverse Fourier transform. Opt Commun 353:76\u201382","journal-title":"Opt Commun"},{"key":"3858_CR16","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1016\/j.physleta.2007.07.040","volume":"372","author":"TG Gao","year":"2008","unstructured":"Gao TG, Chen ZQ (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372:394\u2013400","journal-title":"Phys Lett A"},{"key":"3858_CR17","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/j.sigpro.2015.06.007","volume":"117","author":"H-I Hsiao","year":"2015","unstructured":"Hsiao H-I, Lee J (2015) Color image encryption using chaotic nonlinear adaptive fiter. Signal Process 117:281\u2013309","journal-title":"Signal Process"},{"key":"3858_CR18","doi-asserted-by":"crossref","first-page":"2411","DOI":"10.1007\/s11071-011-0155-7","volume":"67","author":"XL Huang","year":"2012","unstructured":"Huang XL (2012) Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn 67:2411\u20132417","journal-title":"Nonlinear Dyn"},{"key":"3858_CR19","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/s11071-013-0819-6","volume":"75","author":"MS Kamarposhti","year":"2014","unstructured":"Kamarposhti MS, Mohammad D, Rahim MSM, Yaghobi M (2014) Using 3-cell chaotic map for image encryption based on biological operations. Nonlinear Dyn 75:407\u2013416","journal-title":"Nonlinear Dyn"},{"key":"3858_CR20","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.sigpro.2015.07.008","volume":"118","author":"CQ Li","year":"2016","unstructured":"Li CQ (2016) Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process 118:203\u2013210","journal-title":"Signal Process"},{"key":"3858_CR21","doi-asserted-by":"crossref","first-page":"1327","DOI":"10.1016\/j.optlaseng.2013.05.011","volume":"51","author":"H Li","year":"2013","unstructured":"Li H, Wang Y, Yan H, Li L, Li Q, Zhao Z (2013) Double-image encryption by using chaos-based local pixel scrambling technique and gyrator transform. Opt Lasers Eng 51:1327\u20131331","journal-title":"Opt Lasers Eng"},{"issue":"13","key":"3858_CR22","doi-asserted-by":"crossref","first-page":"1550188","DOI":"10.1142\/S0218127415501886","volume":"25","author":"YS Liu","year":"2015","unstructured":"Liu YS, Fan H, Eric XY, Cheng G, Li CQ (2015) Deciphering an image cipher based on mixed transformed logistic maps. Int J Bifurcation Chaos 25(13):1550188","journal-title":"Int J Bifurcation Chaos"},{"key":"3858_CR23","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1016\/j.jss.2012.11.026","volume":"86","author":"HJ Liu","year":"2013","unstructured":"Liu HJ, Wang XY (2013) Triple-image encryption scheme based on one-time key stream generated by chaos and plain images. J Syst Softw 86:826\u2013834","journal-title":"J Syst Softw"},{"key":"3858_CR24","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12:1457\u20131466","journal-title":"Appl Soft Comput"},{"key":"3858_CR25","doi-asserted-by":"crossref","first-page":"2514","DOI":"10.1016\/j.ijleo.2012.08.017","volume":"124","author":"P Lu","year":"2013","unstructured":"Lu P, Xu ZY, Lu X, Liu XY (2013) Digital image information encryption based on compressive sensing and double random-phase encoding technique. Optik 124:2514\u20132518","journal-title":"Optik"},{"key":"3858_CR26","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1016\/j.cnsns.2014.05.022","volume":"20","author":"YL Luo","year":"2015","unstructured":"Luo YL, Du MH, Liu JX (2015) A symmetrical image encryption scheme in wavelet and time domain. Commun Nonlinear Sci Numer Simul 20:447\u2013460","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"10","key":"3858_CR27","doi-asserted-by":"crossref","first-page":"3613","DOI":"10.1142\/S021812740401151X","volume":"14","author":"Y Mao","year":"2014","unstructured":"Mao Y, Chen G, Lian S (2014) A novel fast image encryption scheme based on 3D chaotic baker maps. Int J Bifurcation Chaos 14(10):3613\u20133624","journal-title":"Int J Bifurcation Chaos"},{"key":"3858_CR28","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/0161-118991863745","volume":"4","author":"R Matthews","year":"1989","unstructured":"Matthews R (1989) On the derivation of a chaotic encryption algorithm. Cryptologia 4:29\u201342","journal-title":"Cryptologia"},{"key":"3858_CR29","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1016\/j.optcom.2015.06.015","volume":"354","author":"I Mehra","year":"2015","unstructured":"Mehra I, Nishchal NK (2015) Optical asymmetric image encryption using gyrator wavelet transform. Opt Commun 354:344\u2013352","journal-title":"Opt Commun"},{"key":"3858_CR30","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/s11071-011-0006-6","volume":"67","author":"O Mirzaei","year":"2012","unstructured":"Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67:557\u2013566","journal-title":"Nonlinear Dyn"},{"key":"3858_CR31","doi-asserted-by":"crossref","first-page":"2178","DOI":"10.1016\/j.cpc.2013.04.014","volume":"184","author":"F Ozkaynak","year":"2013","unstructured":"Ozkaynak F, Yavuz S (2013) Security problems of pseudorandom sequence generator based on Chen chaotic system. Comput Phys Commun 184:2178\u20132181","journal-title":"Comput Phys Commun"},{"key":"3858_CR32","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1016\/j.sigpro.2014.06.020","volume":"105","author":"P Ping","year":"2014","unstructured":"Ping P, Xu F, Wang ZJ (2014) Image encryption based on non-affine and balanced cellular automata. Signal Process 105:419\u2013429","journal-title":"Signal Process"},{"issue":"20","key":"3858_CR33","doi-asserted-by":"crossref","first-page":"2638","DOI":"10.1016\/j.physd.2008.03.049","volume":"237","author":"A Pisarchik","year":"2008","unstructured":"Pisarchik A, Zanin M (2008) Image encryption with chaotically coupled chaotic maps. Phys D 237(20):2638\u20132648","journal-title":"Phys D"},{"key":"3858_CR34","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1007\/s11042-010-0652-6","volume":"56","author":"IS Sam","year":"2012","unstructured":"Sam IS, Devaraj P, Bhuvaneswaran RS (2012) A novel image cipher based on mixed transformed logistic maps. Multimedia Tools Appl 56:315\u2013330","journal-title":"Multimedia Tools Appl"},{"key":"3858_CR35","doi-asserted-by":"crossref","first-page":"1202","DOI":"10.1016\/j.sigpro.2011.11.004","volume":"92","author":"SM Seyedzadeh","year":"2012","unstructured":"Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92:1202\u20131215","journal-title":"Signal Process"},{"key":"3858_CR36","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1007\/s11071-015-2008-2","volume":"81","author":"SM Seyedzadeh","year":"2015","unstructured":"Seyedzadeh SM, Norouzi B, Mosavi MR, Mirzakuchaki S (2015) A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn 81:511\u2013529","journal-title":"Nonlinear Dyn"},{"key":"3858_CR37","doi-asserted-by":"crossref","first-page":"2456","DOI":"10.1016\/j.cnsns.2009.09.023","volume":"15","author":"Y Tang","year":"2010","unstructured":"Tang Y, Wang ZD, Fang JN (2010) Image encryption using chaotic coupled map lattices with time-varying delay. Commun Nonlinear Sci Numer Simul 15:2456\u20132468","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"3858_CR38","doi-asserted-by":"crossref","first-page":"1943","DOI":"10.1007\/s11071-014-1259-7","volume":"76","author":"XY Wang","year":"2014","unstructured":"Wang XY, Guo K (2014) A new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 76:1943\u20131950","journal-title":"Nonlinear Dyn"},{"issue":"24","key":"3858_CR39","doi-asserted-by":"crossref","first-page":"5804","DOI":"10.1016\/j.optcom.2011.08.053","volume":"284","author":"X Wang","year":"2011","unstructured":"Wang X, He G (2011) Cryptanalysis on a novel image encryption method based on total shuffling scheme. Opt Commun 284(24):5804\u20135807","journal-title":"Opt Commun"},{"issue":"3","key":"3858_CR40","doi-asserted-by":"crossref","first-page":"030503","DOI":"10.1088\/1674-1056\/23\/3\/030503","volume":"23","author":"XY Wang","year":"2014","unstructured":"Wang XY, Wang Q (2014) A fast image encryption algorithm based on only blocks in cipher text. Chin Phys B 23(3):030503","journal-title":"Chin Phys B"},{"issue":"4","key":"3858_CR41","doi-asserted-by":"crossref","first-page":"1773","DOI":"10.1016\/j.chaos.2008.07.031","volume":"41","author":"Y Wang","year":"2009","unstructured":"Wang Y, Wong K, Liao X, Xiang T, Chen G (2009) A chaos-based image encryption algorithm with variable control parameters. Chaos Solitons Fractals 41(4):1773\u20131783","journal-title":"Chaos Solitons Fractals"},{"key":"3858_CR42","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","volume":"11","author":"Y Wang","year":"2011","unstructured":"Wang Y, Wong KW, Liao XF, Chen GR (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11:514\u2013522","journal-title":"Appl Soft Comput"},{"issue":"1\u20132","key":"3858_CR43","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/s11071-013-1070-x","volume":"75","author":"XY Wang","year":"2014","unstructured":"Wang XY, Xu DH (2014) A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn 75(1\u20132):345\u2013353","journal-title":"Nonlinear Dyn"},{"key":"3858_CR44","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"XY Wang","year":"2015","unstructured":"Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Laser Eng 73:53\u201361","journal-title":"Opt Laser Eng"},{"key":"3858_CR45","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1016\/j.optcom.2011.10.098","volume":"285","author":"XY Wang","year":"2012","unstructured":"Wang XY, Zhao JF, Liu HJ (2012) A new image encryption algorithm based on chaos. Opt Commun 285:562\u2013566","journal-title":"Opt Commun"},{"issue":"15","key":"3858_CR46","doi-asserted-by":"crossref","first-page":"2645","DOI":"10.1016\/j.physleta.2007.12.026","volume":"372","author":"K Wong","year":"2008","unstructured":"Wong K, Kwok B, Law W (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372(15):2645\u20132652","journal-title":"Phys Lett A"},{"issue":"5","key":"3858_CR47","doi-asserted-by":"crossref","first-page":"2652","DOI":"10.1016\/j.chaos.2008.09.047","volume":"41","author":"K Wong","year":"2009","unstructured":"Wong K, Kwok B, Yuen C (2009) An efficient diffusion approach for chaos-based image encryption. Chaos Solitons Fractals 41(5):2652\u20132663","journal-title":"Chaos Solitons Fractals"},{"key":"3858_CR48","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.sigpro.2014.03.015","volume":"102","author":"Y Wu","year":"2014","unstructured":"Wu Y, Zhou YC, Sos A, Noonan Joseph P (2014) A symmetric image cipher using wave perturbations. Signal Process 102:122\u2013131","journal-title":"Signal Process"},{"key":"3858_CR49","doi-asserted-by":"crossref","first-page":"3507","DOI":"10.1016\/j.cnsns.2010.01.004","volume":"15","author":"H Yang","year":"2010","unstructured":"Yang H, Wong KW, Liao X, Zhang W, Wei P (2010) A fast image encryption and authentication scheme based on chaotic maps. Commun Nonlinear Sci Numer Simul 15:3507\u20133517","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"3858_CR50","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s11071-015-1979-3","volume":"81","author":"W Yao","year":"2015","unstructured":"Yao W, Zhang X, Zheng ZM, Qiu WJ (2015) A colour image encryption algorithm using 4-pixel Feistel structure and multiple chaotic systems. Nonlinear Dyn 81:151\u2013168","journal-title":"Nonlinear Dyn"},{"key":"3858_CR51","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/s11071-013-1074-6","volume":"75","author":"GD Ye","year":"2014","unstructured":"Ye GD (2014) A block image encryption algorithm based on wave transmission and chaotic systems. Nonlinear Dyn 75:417\u2013427","journal-title":"Nonlinear Dyn"},{"key":"3858_CR52","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1049\/ip-vis:20000208","volume":"147","author":"JC Yen","year":"2000","unstructured":"Yen JC, Guo JI (2000) Efficient hierarchical chaotic image encryption algorithm and its VLSI realization. IEEE Proc Vis Image Signal Process 147:167\u2013175","journal-title":"IEEE Proc Vis Image Signal Process"},{"issue":"12","key":"3858_CR53","doi-asserted-by":"crossref","first-page":"2775","DOI":"10.1016\/j.optcom.2011.02.039","volume":"284","author":"G Zhang","year":"2011","unstructured":"Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775\u20132780","journal-title":"Opt Commun"},{"key":"3858_CR54","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1016\/j.aeue.2013.08.007","volume":"68","author":"Q Zhang","year":"2014","unstructured":"Zhang Q, Liu L, Wei X (2014) Improved algorithm for image encryption based on DNA encoding and multichaotic maps. Int J Electron Commun (AE\u00dc) 68:186\u2013192","journal-title":"Int J Electron Commun (AE\u00dc)"},{"key":"3858_CR55","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear- nonlinear coupled map lattice. Inf Sci 273:329\u2013351","journal-title":"Inf Sci"},{"key":"3858_CR56","doi-asserted-by":"crossref","first-page":"2066","DOI":"10.1016\/j.cnsns.2012.12.012","volume":"18","author":"W Zhang","year":"2013","unstructured":"Zhang W, Wong Kwok-wo YH, Zhu ZL (2013) An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun Nonlinear Sci Numer Simul 18:2066\u20132080","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"3858_CR57","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"YC Zhou","year":"2014","unstructured":"Zhou YC, Bao L, Philip Chen CL (2014) A new 1D chaotic system for image encryption. Signal Process 97:172\u2013182","journal-title":"Signal Process"},{"key":"3858_CR58","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.sigpro.2014.01.020","volume":"100","author":"YC Zhou","year":"2014","unstructured":"Zhou YC, Cao WJ, Chen CL P (2014) Image encryption using binary bitplane. Signal Process 100:197\u2013207","journal-title":"Signal Process"},{"key":"3858_CR59","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"ZL Zhu","year":"2011","unstructured":"Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181:1171\u20131186","journal-title":"Inf Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3858-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3858-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3858-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3858-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,26]],"date-time":"2017-06-26T01:42:25Z","timestamp":1498441345000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3858-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,1]]},"references-count":59,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["3858"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3858-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2016,9,1]]}}}