{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T07:53:38Z","timestamp":1742802818358,"version":"3.37.3"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T00:00:00Z","timestamp":1497571200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Natural Science Foundation of China (CN)","award":["61004006"]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2013M530181, 2015T80396"],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shanghai Postdoctoral Scientific Program","award":["13R21410600"]},{"name":"Program for Science and Technology Innovation Talents in Universities of Henan Province","award":["14HASTIT042"]},{"name":"Foundation for University Young Key Teacher Program of Henan Province","award":["2011GGJS-025"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1007\/s11042-017-4885-5","type":"journal-article","created":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T19:08:27Z","timestamp":1497640107000},"page":"12349-12376","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":81,"title":["A robust and lossless DNA encryption scheme for color images"],"prefix":"10.1007","volume":"77","author":[{"given":"Xiangjun","family":"Wu","sequence":"first","affiliation":[]},{"given":"J\u00fcrgen","family":"Kurths","sequence":"additional","affiliation":[]},{"given":"Haibin","family":"Kan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,16]]},"reference":[{"key":"4885_CR1","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.1126\/science.7973651","volume":"266","author":"L Adleman","year":"1994","unstructured":"Adleman L (1994) Molecular computation of solutions of combinational problems. Science 266:1021\u20131024","journal-title":"Science"},{"key":"4885_CR2","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1146\/annurev.bioeng.6.062403.132016","volume":"7","author":"CJ Benham","year":"2005","unstructured":"Benham CJ, Mielke SP (2005) DNA mechanics. Annu Rev Biomed Eng 7:21\u201353","journal-title":"Annu Rev Biomed Eng"},{"key":"4885_CR3","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1038\/21092","volume":"399","author":"CT Celland","year":"1999","unstructured":"Celland CT, Risca V, Bancroft C (1999) Hiding messages in DNA microdots. Nature 399:533\u2013534","journal-title":"Nature"},{"issue":"3","key":"4885_CR4","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui C (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Soliton Fract 21(3):749\u2013761","journal-title":"Chaos Soliton Fract"},{"key":"4885_CR5","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","volume":"56","author":"R Enayatifar","year":"2014","unstructured":"Enayatifar R, Abdullah A, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83\u201393","journal-title":"Opt Lasers Eng"},{"issue":"6","key":"4885_CR6","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 8(6):1259\u20131284","journal-title":"Int J Bifurcat Chaos"},{"issue":"4","key":"4885_CR7","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1016\/j.physleta.2007.07.040","volume":"372","author":"T Gao","year":"2008","unstructured":"Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372(4):394\u2013400","journal-title":"Phys Lett A"},{"issue":"5","key":"4885_CR8","doi-asserted-by":"crossref","first-page":"908","DOI":"10.1016\/j.physleta.2010.12.065","volume":"375","author":"X Ge","year":"2011","unstructured":"Ge X, Liu F, Lu B, Wang W (2011) Cryptanalysis of a spatiotemporal chaotic image\/video cryptosystem and its improved version. Phys Lett A 375(5):908\u2013913","journal-title":"Phys Lett A"},{"key":"4885_CR9","doi-asserted-by":"crossref","unstructured":"A. Gehani, T.H. LaBean, J.H. Reif, DNA-based cryptography, Dimacs Series in Discrete Mathematics and Theoretical Computer Science 54 (2000) 233\u2013249","DOI":"10.1090\/dimacs\/054\/19"},{"issue":"17","key":"4885_CR10","doi-asserted-by":"crossref","first-page":"4700","DOI":"10.1016\/j.ijleo.2014.05.023","volume":"125","author":"G Gu","year":"2014","unstructured":"Gu G, Ling J (2014) A fast image encryption method by using chaotic 3D cat maps. Optik 125(17):4700\u20134705","journal-title":"Optik"},{"issue":"2","key":"4885_CR11","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/S0303-2647(00)00091-5","volume":"57","author":"T Head","year":"2000","unstructured":"Head T, Rozenberg G, Bladergroen RS, Breek CKD, Lommerse PHM, Spaink HP (2000) Computing with DNA by operating on plasmids. Biosystems 57(2):87\u201393","journal-title":"Biosystems"},{"issue":"9","key":"4885_CR12","doi-asserted-by":"crossref","first-page":"2133","DOI":"10.1016\/j.jss.2012.04.031","volume":"85","author":"H Hermassi","year":"2012","unstructured":"Hermassi H, Rhouma R, Belghith S (2012) Security analysis of image cryptosystems only or partially based on a chaotic permutation. J Syst Softw 85(9):2133\u20132144","journal-title":"J Syst Softw"},{"key":"4885_CR13","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun CM, Chen CLP (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80\u201394","journal-title":"Inf Sci"},{"issue":"11","key":"4885_CR14","doi-asserted-by":"crossref","first-page":"2123","DOI":"10.1016\/j.optcom.2009.02.044","volume":"282","author":"CK Huang","year":"2009","unstructured":"Huang CK, Nien HH (2009) Multi chaotic systems based pixel shuffle for image encryption. Opt Commun 282(11):2123\u20132127","journal-title":"Opt Commun"},{"issue":"5","key":"4885_CR15","doi-asserted-by":"crossref","first-page":"1671","DOI":"10.1016\/j.ijleo.2013.09.040","volume":"125","author":"A Kadir","year":"2014","unstructured":"Kadir A, Hamdulla A, Guo W (2014) Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik 125(5):1671\u20131675","journal-title":"Optik"},{"issue":"3","key":"4885_CR16","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/7384.963463","volume":"1","author":"L Kocaerv","year":"2001","unstructured":"Kocaerv L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 1(3):6\u201321","journal-title":"IEEE Circuits Syst Mag"},{"issue":"6","key":"4885_CR17","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1016\/j.physleta.2005.09.060","volume":"349","author":"P Li","year":"2005","unstructured":"Li P, Li Z, Halang WA, Chen G (2005) A multiple pseudorandom-bit generator based on a spatiotemporal chaotic map. Phys Lett A 349(6):467\u2013473","journal-title":"Phys Lett A"},{"issue":"8","key":"4885_CR18","doi-asserted-by":"crossref","first-page":"1035","DOI":"10.1016\/j.imavis.2008.09.004","volume":"27","author":"C Li","year":"2009","unstructured":"Li C, Li S, Chen G, Halang WA (2009) Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. Image Vis Comput 27(8):1035\u20131039","journal-title":"Image Vis Comput"},{"issue":"4","key":"4885_CR19","doi-asserted-by":"crossref","first-page":"2383","DOI":"10.1007\/s11071-012-0626-5","volume":"70","author":"C Li","year":"2012","unstructured":"Li C, Zhang LY, Ou R, Wong KW, Shu S (2012) Breaking a novel colour image encryption algorithm based on chaos. Nonlinear Dyn 70(4):2383\u20132388","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"4885_CR20","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.chaos.2004.11.096","volume":"26","author":"S Lian","year":"2005","unstructured":"Lian S, Sun J, Wang Z (2005) A block cipher based on a suitable use of chaotic standard map. Chaos Soliton Fract 26(1):117\u2013129","journal-title":"Chaos Soliton Fract"},{"issue":"16\u201317","key":"4885_CR21","doi-asserted-by":"crossref","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","volume":"284","author":"H Liu","year":"2011","unstructured":"Liu H, Wang X (2011) Color image encryption using spatial bit level permutation and high-dimension chaotic system. Opt Commun 284(16\u201317):3895\u20133903","journal-title":"Opt Commun"},{"key":"4885_CR22","doi-asserted-by":"crossref","first-page":"1240","DOI":"10.1016\/j.compeleceng.2012.02.007","volume":"38","author":"L Liu","year":"2012","unstructured":"Liu L, Zhang Q, Wei X (2012) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38:1240\u20131248","journal-title":"Comput Electr Eng"},{"issue":"5","key":"4885_CR23","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457\u20131466","journal-title":"Appl Soft Comput"},{"issue":"18","key":"4885_CR24","doi-asserted-by":"crossref","first-page":"3527","DOI":"10.1016\/j.ijleo.2012.10.068","volume":"124","author":"H Liu","year":"2013","unstructured":"Liu H, Wang X, Kadir A (2013) Color image encryption using Choquet fuzzy integral and hyper chaotic system. Optik 124(18):3527\u20133533","journal-title":"Optik"},{"key":"4885_CR25","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.optlastec.2014.01.015","volume":"60","author":"Y Liu","year":"2014","unstructured":"Liu Y, Tang J, Xie T (2014) Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Opt Laser Technol 60:111\u2013115","journal-title":"Opt Laser Technol"},{"issue":"1","key":"4885_CR26","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/0022-2836(81)90099-1","volume":"152","author":"M Mandelkern","year":"1981","unstructured":"Mandelkern M, Elias JG, Eden D, Crothers DM (1981) The dimensions of DNA in solution. J Mol Biol 152(1):153\u2013161","journal-title":"J Mol Biol"},{"key":"4885_CR27","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/0161-118991863745","volume":"13","author":"R Matthews","year":"1989","unstructured":"Matthews R (1989) On the derivation of a chaotic encryption algorithm. Cryptologia 13:29\u201342","journal-title":"Cryptologia"},{"key":"4885_CR28","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1038\/261459a0","volume":"261","author":"R May","year":"1976","unstructured":"May R (1976) Simple mathematical models with very complicated dynamics. Nature 261:459\u2013467","journal-title":"Nature"},{"key":"4885_CR29","unstructured":"Ning K (2009) A pseudo DNA cryptography method (PDF Download Available). Available from: https:\/\/www.researchgate.net\/publication\/24164703_A_Pseudo_DNA_Cryptography_Method . Accessed 4 June 2017"},{"issue":"2","key":"4885_CR30","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1007\/s11071-014-1492-0","volume":"78","author":"B Norouzi","year":"2014","unstructured":"Norouzi B, Mirzakuchaki S (2014) A fast color image encryption algorithm based on hyper-chaotic systems. Nonlinear Dyn 78(2):995\u20131015","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"4885_CR31","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s00530-013-0314-4","volume":"20","author":"B Norouzi","year":"2013","unstructured":"Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2013) A novel image encryption based on hash function with only two-round diffusion process. Multimedia Systems 20(1):45\u201364","journal-title":"Multimedia Systems"},{"issue":"24","key":"4885_CR32","doi-asserted-by":"crossref","first-page":"4946","DOI":"10.1016\/j.optcom.2012.07.106","volume":"285","author":"F \u00d6zkaynak","year":"2012","unstructured":"\u00d6zkaynak F, \u00d6zer AB, Yavuz S (2012) Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(24):4946\u20134948","journal-title":"Opt Commun"},{"issue":"9","key":"4885_CR33","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926\u2013934","journal-title":"Image Vis Comput"},{"issue":"38","key":"4885_CR34","doi-asserted-by":"crossref","first-page":"5973","DOI":"10.1016\/j.physleta.2008.07.057","volume":"372","author":"R Rhouma","year":"2008","unstructured":"Rhouma R, Belghith S (2008) Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys Lett A 372(38):5973\u20135978","journal-title":"Phys Lett A"},{"issue":"1","key":"4885_CR35","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.chaos.2007.07.083","volume":"40","author":"R Rhouma","year":"2009","unstructured":"Rhouma R, Meherzi S, Belghith S (2009) OCML-based colour image encryption. Chaos Soliton Fract 40(1):309\u2013318","journal-title":"Chaos Soliton Fract"},{"key":"4885_CR36","unstructured":"Shyam M, Kiran N, Maheswaran V (2007) A novel encryption scheme based on DNA computing. In: Proceedings of the 14th IEEE International Conference on High Performance Computing, HiPC\u20192007. IEEE, New York, USA"},{"issue":"2","key":"4885_CR37","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1016\/j.optcom.2009.09.070","volume":"283","author":"E Solak","year":"2010","unstructured":"Solak E, Rhouma R, Belghith S (2010) Cryptanalysis of a multi-chaotic systems based image cryptosystem. Opt Commun 283(2):232\u2013236","journal-title":"Opt Commun"},{"key":"4885_CR38","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1016\/j.optlastec.2012.11.020","volume":"48","author":"L Sui","year":"2013","unstructured":"Sui L, Gao B (2013) Color image encryption based on gyrator transform and Arnold transform. Opt Laser Technol 48:530\u2013538","journal-title":"Opt Laser Technol"},{"issue":"20","key":"4885_CR39","doi-asserted-by":"crossref","first-page":"4048","DOI":"10.1016\/j.optcom.2012.06.004","volume":"285","author":"L Teng","year":"2012","unstructured":"Teng L, Wang X (2012) A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive. Opt Commun 285(20):4048\u20134054","journal-title":"Opt Commun"},{"issue":"4","key":"4885_CR40","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1016\/j.sigpro.2008.09.011","volume":"89","author":"X Tong","year":"2009","unstructured":"Tong X, Cui M (2009) Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator. Signal Process 89(4):480\u2013491","journal-title":"Signal Process"},{"key":"4885_CR41","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-02238-8","volume-title":"Modern image quality assessment, synthesis lectures on image, Video & Multimedia Processing","author":"Z Wang","year":"2006","unstructured":"Wang Z, Bovik AC (2006) Modern image quality assessment, synthesis lectures on image, Video & Multimedia Processing. Morgan & Claypool, San Rafael"},{"issue":"1","key":"4885_CR42","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","volume":"11","author":"Y Wang","year":"2011","unstructured":"Wang Y, Wong K, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514\u2013522","journal-title":"Appl Soft Comput"},{"issue":"4","key":"4885_CR43","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"X Wang","year":"2012","unstructured":"Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101\u20131108","journal-title":"Signal Process"},{"issue":"2646205","key":"4885_CR44","first-page":"1","volume":"2016","author":"W Wang","year":"2016","unstructured":"Wang W, Tan H, Pang Y, Li Z, Ran P, Wu J (2016) A novel encryption algorithm based on DWT and multichaos mapping. J Sens 2016(2646205):1\u20137","journal-title":"J Sens"},{"key":"4885_CR45","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1038\/171737a0","volume":"171","author":"JD Watson","year":"1953","unstructured":"Watson JD, Crick FHC (1953) A structure for deoxyribose nucleic acid. Nature 171:737\u2013738","journal-title":"Nature"},{"issue":"2","key":"4885_CR46","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1016\/j.jss.2011.08.017","volume":"85","author":"X Wei","year":"2012","unstructured":"Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290\u2013299","journal-title":"J Syst Softw"},{"issue":"12","key":"4885_CR47","doi-asserted-by":"crossref","first-page":"1413","DOI":"10.1360\/csb2006-51-12-1413","volume":"51","author":"GZ Xiao","year":"2006","unstructured":"Xiao GZ, Lu MX, Qin L, Lai XJ (2006) New field of cryptography: DNA cryptography. Chin Sci Bull 51(12):1413\u20131420","journal-title":"Chin Sci Bull"},{"issue":"5","key":"4885_CR48","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1016\/j.patrec.2009.11.008","volume":"31","author":"G Ye","year":"2010","unstructured":"Ye G (2010) Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn Lett 31(5):347\u2013354","journal-title":"Pattern Recogn Lett"},{"issue":"12","key":"4885_CR49","doi-asserted-by":"crossref","first-page":"2775","DOI":"10.1016\/j.optcom.2011.02.039","volume":"284","author":"G Zhang","year":"2011","unstructured":"Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775\u20132780","journal-title":"Opt Commun"},{"key":"4885_CR50","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Wang X (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf Sci 273:329\u2013351","journal-title":"Inf Sci"},{"issue":"23","key":"4885_CR51","doi-asserted-by":"crossref","first-page":"6276","DOI":"10.1016\/j.ijleo.2013.05.009","volume":"124","author":"Q Zhang","year":"2013","unstructured":"Zhang Q, Wei X (2013) A novel couple images encryption algorithm based on DNA subsequence operation and chaotic system. Optik 124(23):6276\u20136281","journal-title":"Optik"},{"issue":"11\u201312","key":"4885_CR52","doi-asserted-by":"crossref","first-page":"2028","DOI":"10.1016\/j.mcm.2010.06.005","volume":"52","author":"Q Zhang","year":"2010","unstructured":"Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52(11\u201312):2028\u20132035","journal-title":"Math Comput Model"},{"issue":"18","key":"4885_CR53","doi-asserted-by":"crossref","first-page":"3596","DOI":"10.1016\/j.ijleo.2012.11.018","volume":"124","author":"Q Zhang","year":"2013","unstructured":"Zhang Q, Guo L, Wei X (2013) A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik 124(18):3596\u20133600","journal-title":"Optik"},{"issue":"3","key":"4885_CR54","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1016\/j.aeue.2013.08.007","volume":"68","author":"Q Zhang","year":"2014","unstructured":"Zhang Q, Liu L, Wei X (2014) Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps. AEU-Int J Electron Commun 68(3):186\u2013192","journal-title":"AEU-Int J Electron Commun"},{"issue":"4","key":"4885_CR55","doi-asserted-by":"crossref","first-page":"1562","DOI":"10.1016\/j.ijleo.2013.09.018","volume":"125","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Wen W, Su M, Li M (2014) Cryptanalyzing a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik 125(4):1562\u20131564","journal-title":"Optik"},{"issue":"1","key":"4885_CR56","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.amc.2009.02.011","volume":"212","author":"XD Zheng","year":"2009","unstructured":"Zheng XD, Xu J, Li W (2009) Parallel DNA arithmetic operation based on n-moduli set. Appl Math Comput 212(1):177\u2013184","journal-title":"Appl Math Comput"},{"key":"4885_CR57","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Bao L, Chen Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172\u2013182","journal-title":"Signal Process"},{"issue":"1","key":"4885_CR58","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","volume":"285","author":"C Zhu","year":"2012","unstructured":"Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29\u201337","journal-title":"Opt Commun"},{"key":"4885_CR59","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"Z Zhu","year":"2011","unstructured":"Zhu Z, Zhang W, Wong K, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181:1171\u20131186","journal-title":"Inf Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-4885-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4885-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4885-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T20:38:59Z","timestamp":1719261539000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-4885-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,16]]},"references-count":59,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["4885"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-4885-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2017,6,16]]}}}