{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T08:29:33Z","timestamp":1724920173165},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T00:00:00Z","timestamp":1612742400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T00:00:00Z","timestamp":1612742400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802111, 61872125, 61871175"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011447","name":"Science and Technology Department of Henan Province","doi-asserted-by":"crossref","award":["182102210027, 182102410051"],"id":[{"id":"10.13039\/501100011447","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11042-020-10413-7","type":"journal-article","created":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T10:33:04Z","timestamp":1612866784000},"page":"16087-16122","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Chaos-based image encryption strategy based on random number embedding and DNA-level self-adaptive permutation and diffusion"],"prefix":"10.1007","volume":"80","author":[{"given":"Jun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xiangcheng","family":"Zhi","sequence":"additional","affiliation":[]},{"given":"Xiuli","family":"Chai","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4066-0826","authenticated-orcid":false,"given":"Yang","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,8]]},"reference":[{"issue":"4","key":"10413_CR1","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MMUL.2011.54","volume":"19","author":"AL Abu Dalhoum","year":"2012","unstructured":"Abu Dalhoum AL, Mahafzah BA, Awwad AA, Aldamari I, Ortega A, Alfonseca M (2012) Digital image scrambling using 2D cellular automata. IEEE Multimedia 19(4):28\u201336","journal-title":"IEEE Multimedia"},{"key":"10413_CR2","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1126\/science.7973651","volume":"266","author":"LM Adleman","year":"1994","unstructured":"Adleman LM (1994) Molecular computation of solutions of combinatorial problems. Science 266:1021\u20131024","journal-title":"Science"},{"key":"10413_CR3","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li SJ (2006) Some basic cryptographic requirements for chaos-based cryptosystem. Int J Bifurcat Chaos 16:2129\u20132151","journal-title":"Int J Bifurcat Chaos"},{"key":"10413_CR4","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","volume":"128","author":"A Belazi","year":"2016","unstructured":"Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155\u2013170","journal-title":"Signal Process"},{"key":"10413_CR5","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.optlaseng.2016.07.010","volume":"88","author":"A Belazi","year":"2017","unstructured":"Belazi A, El-Latif AAA, Diaconu AV (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37\u201350","journal-title":"Opt Lasers Eng"},{"key":"10413_CR6","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s00521-017-2993-9","volume":"31","author":"XL Chai","year":"2019","unstructured":"Chai XL, Gan ZH, Yuan K, Chen YR, Liu XX (2019) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput & Applic 31:219\u2013237","journal-title":"Neural Comput & Applic"},{"key":"10413_CR7","doi-asserted-by":"publisher","first-page":"35419","DOI":"10.1007\/s11042-019-08168-x","volume":"78","author":"XL Chai","year":"2019","unstructured":"Chai XL, Zhang JT, Gan ZH, Zhang YS (2019) Medical image encryption algorithm based on Latin square and memristive chaotic system. Multimed Tools Appl 78:35419\u201335453","journal-title":"Multimed Tools Appl"},{"key":"10413_CR8","doi-asserted-by":"publisher","first-page":"107525","DOI":"10.1016\/j.sigpro.2020.107525","volume":"171","author":"XL Chai","year":"2020","unstructured":"Chai XL, Wu HY, Gan ZH, Zhang YS, Chen YR (2020) Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy. Signal Process 171:107525","journal-title":"Signal Process"},{"key":"10413_CR9","doi-asserted-by":"crossref","unstructured":"Chai X L, Wu H Y, Gan Z H, Zhang Y S, Chen Y R, Kent W. Nixon (2020) An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding. Opt Lasers Eng 124: 105837","DOI":"10.1016\/j.optlaseng.2019.105837"},{"key":"10413_CR10","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","volume":"142","author":"JX Chen","year":"2018","unstructured":"Chen JX, Zhu ZL, Zhang LB, Zhang YS, Yang BQ (2018) Exploiting self-adaptive permutation\u2013diffusion and DNA random encoding for secure and efficient image encryption. Signal Process 142:340\u2013353","journal-title":"Signal Process"},{"key":"10413_CR11","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.ins.2020.02.024","volume":"520","author":"JX Chen","year":"2020","unstructured":"Chen JX, Chen L, Zhou YC (2020) Cryptanalysis of a DNA-based image encryption scheme. Inf Sci 520:130\u2013141","journal-title":"Inf Sci"},{"issue":"1","key":"10413_CR12","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.optcom.2012.07.052","volume":"286","author":"Z Eslami","year":"2013","unstructured":"Eslami Z, Bakhshandeh A (2013) An improvement over an image encryption method based on total shuffling. Opt Commun 286(1):51\u201355","journal-title":"Opt Commun"},{"key":"10413_CR13","first-page":"1105","volume":"2","author":"J Fridrich","year":"1997","unstructured":"Fridrich J (1997) Image encryption based on chaotic maps. IEEE Int Conf Syst 2:1105\u20131110","journal-title":"IEEE Int Conf Syst"},{"key":"10413_CR14","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 8:1259\u20131284","journal-title":"Int J Bifurcat Chaos"},{"key":"10413_CR15","doi-asserted-by":"publisher","first-page":"8759","DOI":"10.1007\/s11042-017-4772-0","volume":"77","author":"ZH Gan","year":"2018","unstructured":"Gan ZH, Chai XL, Yuan K, Lu Y (2018) A novel image encryption algorithm based on LFT based S-boxes and chaos. Multimed Tools Appl 77:8759\u20138783","journal-title":"Multimed Tools Appl"},{"key":"10413_CR16","doi-asserted-by":"publisher","first-page":"7111","DOI":"10.1007\/s00521-018-3541-y","volume":"31","author":"ZH Gan","year":"2019","unstructured":"Gan ZH, Chai XL, Han DJ, Chen YR (2019) A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Comput & Applic 31:7111\u20137130","journal-title":"Neural Comput & Applic"},{"key":"10413_CR17","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.optlaseng.2019.03.006","volume":"121","author":"LH Gong","year":"2019","unstructured":"Gong LH, Qiu KD, Deng CZ, Zhou NR (2019) An optical image compression and encryption scheme based on compressive sensing and RSA algorithm. Opt Lasers Eng 121:169\u2013180","journal-title":"Opt Lasers Eng"},{"key":"10413_CR18","doi-asserted-by":"crossref","unstructured":"Farah M. A. B, Guesmi R, Kachouri A, Samet M (2020) A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt Laser Technol 121: 105777","DOI":"10.1016\/j.optlastec.2019.105777"},{"issue":"3","key":"10413_CR19","doi-asserted-by":"publisher","first-page":"2211","DOI":"10.1007\/s11042-013-1533-6","volume":"72","author":"H Hermassi","year":"2014","unstructured":"Hermassi H, Belazi A, Rhouma R, Belghith SM (2014) Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multimed Tools Appl 72(3):2211\u20132224","journal-title":"Multimed Tools Appl"},{"key":"10413_CR20","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"ZY Hua","year":"2016","unstructured":"Hua ZY, Zhou YC (2016) Image encryption using 2D Logistic-adjusted-Sine map. Inf Sci 339:237\u2013253","journal-title":"Inf Sci"},{"key":"10413_CR21","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"ZY Hua","year":"2019","unstructured":"Hua ZY, Zhou YC, Huang HJ (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403\u2013419","journal-title":"Inf Sci"},{"key":"10413_CR22","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s11042-012-1331-6","volume":"72","author":"XL Huang","year":"2014","unstructured":"Huang XL, Ye GD (2014) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed Tools Appl 72:57\u201370","journal-title":"Multimed Tools Appl"},{"key":"10413_CR23","doi-asserted-by":"publisher","first-page":"5455","DOI":"10.1007\/s11042-015-2515-7","volume":"75","author":"A Jain","year":"2016","unstructured":"Jain A, Rajpal N (2016) A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps. Multimed Tools Appl 75:5455\u20135472","journal-title":"Multimed Tools Appl"},{"key":"10413_CR24","doi-asserted-by":"publisher","first-page":"81333","DOI":"10.1109\/ACCESS.2019.2920383","volume":"7","author":"S Khan","year":"2019","unstructured":"Khan S, Han LS, Lu HW, Butt KK, Bachira G, Khan NU (2019) A new hybrid image encryption algorithm based on 2D-CA, FSM-DNA rule generator, and FSBI. IEEE Access 7:81333\u201381349","journal-title":"IEEE Access"},{"key":"10413_CR25","unstructured":"Kohli R, Kumar M (2013) FPGA implementation of cryptographic algorithms using multi-encryption technique. Int J Adv Res Comput Sci Softw Eng 3(5)"},{"key":"10413_CR26","first-page":"2322","volume":"66","author":"C Li","year":"2019","unstructured":"Li C, Feng B, Li S, Kurths J, Chen G (2019) Dynamic analysis of digital chaotic maps via state-mapping networks. IEEE T Circ- I 66:2322\u20132335","journal-title":"IEEE T Circ- I"},{"key":"10413_CR27","doi-asserted-by":"publisher","first-page":"494","DOI":"10.3390\/app9030494","volume":"9","author":"M Li","year":"2019","unstructured":"Li M, Zhou KL, Ren H, Fan HJ (2019) Cryptanalysis of permutation-diffusion-based lightweight chaotic image encryption scheme using CPA. Appl Sci-Base 9:494","journal-title":"Appl Sci-Base"},{"key":"10413_CR28","doi-asserted-by":"publisher","first-page":"1781","DOI":"10.1007\/s11071-018-4659-2","volume":"95","author":"B Li","year":"2019","unstructured":"Li B, Liao XF, Jiang Y (2019) A novel image encryption scheme based on improved random number generator and its implementation. Nonlinear Dyn 95:1781\u20131805","journal-title":"Nonlinear Dyn"},{"key":"10413_CR29","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.sigpro.2015.01.016","volume":"113","author":"H Liu","year":"2015","unstructured":"Liu H, Kadir A (2015) Asymmetric color image encryption scheme using 2D discrete-time map. Signal Process 113:104\u2013112","journal-title":"Signal Process"},{"issue":"8","key":"10413_CR30","doi-asserted-by":"publisher","first-page":"10217","DOI":"10.1007\/s11042-017-5406-2","volume":"77","author":"JY Liu","year":"2018","unstructured":"Liu JY, Yang DD, Zhou HB (2018) A digital image encryption algorithm based on bit-planes and an improved logistic map. Multimed Tools Appl 77(8):10217\u201310233","journal-title":"Multimed Tools Appl"},{"issue":"14","key":"10413_CR31","doi-asserted-by":"publisher","first-page":"20465","DOI":"10.1007\/s11042-019-7186-3","volume":"78","author":"H Liu","year":"2019","unstructured":"Liu H, Zhao B, Huang LQ (2019) A novel quantum image encryption algorithm based on crossover operation and mutation operation. Multimed Tools Appl 78(14):20465\u201320483","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"10413_CR32","first-page":"687","volume":"61","author":"B Lu","year":"2019","unstructured":"Lu B, Liu FL, Ge X, Li ZY (2019) Cryptanalysis and improvement of a chaotic map-control-based and the plain image-related cryptosystem. Comput Mater Contin 61(2):687\u2013699","journal-title":"Comput Mater Contin"},{"key":"10413_CR33","doi-asserted-by":"publisher","first-page":"2293","DOI":"10.1007\/s11071-015-2481-7","volume":"83","author":"YL Luo","year":"2016","unstructured":"Luo YL, Cao LC, Qiu SH, Lin H, Harkin J (2016) A chaotic map-control-based and the plain image-related cryptosystem. Nonlinear Dyn 83:2293\u20132310","journal-title":"Nonlinear Dyn"},{"issue":"77","key":"10413_CR34","doi-asserted-by":"publisher","first-page":"31177","DOI":"10.1007\/s11042-018-6214-z","volume":"2018","author":"B Mondal","year":"2018","unstructured":"Mondal B, Kumar P, Singh S (2018) A chaotic permutation and diffusion based image encryption algorithm for secure communications. Multimed Tools Appl 2018(77):31177\u201331198","journal-title":"Multimed Tools Appl"},{"key":"10413_CR35","doi-asserted-by":"publisher","first-page":"13681","DOI":"10.1007\/s11042-016-3769-4","volume":"76","author":"B Norouzi","year":"2017","unstructured":"Norouzi B, Mirzakuchaki S (2017) An image encryption algorithm based on DNA sequence operations and cellular neural network. Multimed Tools Appl 76:13681\u201313701","journal-title":"Multimed Tools Appl"},{"key":"10413_CR36","first-page":"476","volume-title":"Grayscale image encryption based on symmetric-key Latin square image cipher","author":"KEV Pawan","year":"2018","unstructured":"Pawan KEV, Aswatha AR, Sasi S (2018) Grayscale image encryption based on symmetric-key Latin square image cipher. Springer, Coimbatore, pp 476\u2013487"},{"issue":"13","key":"10413_CR37","doi-asserted-by":"publisher","first-page":"4655","DOI":"10.1007\/s11042-013-1828-7","volume":"74","author":"AU Rehman","year":"2015","unstructured":"Rehman AU, Liao X, Kulsoom A (2015) Selective encryption for gray images based on chaos and DNA complementary rules. Multimed Tools Appl 74(13):4655\u20134677","journal-title":"Multimed Tools Appl"},{"key":"10413_CR38","doi-asserted-by":"publisher","first-page":"14021","DOI":"10.1007\/s11042-016-3800-9","volume":"76","author":"X Su","year":"2017","unstructured":"Su X, Li W, Hu H (2017) Cryptanalysis of a chaos-based image encryption scheme combining DNA coding and entropy. Multimed Tools Appl 76:14021\u201314033","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"10413_CR39","doi-asserted-by":"publisher","first-page":"6243","DOI":"10.1007\/s11042-017-4534-z","volume":"77","author":"XY Wang","year":"2018","unstructured":"Wang XY, Li P (2018) A novel color image encryption scheme using DNA permutation based on the Lorenz system. Multimed Tools Appl 77(5):6243\u20136265","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"10413_CR40","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1007\/s11071-014-1729-y","volume":"79","author":"XY Wang","year":"2015","unstructured":"Wang XY, Wang Q, Zhang YQ (2015) A fast image algorithm based on rows and columns switch. Nonlinear Dyn 79(2):1141\u20131149","journal-title":"Nonlinear Dyn"},{"key":"10413_CR41","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"XY Wang","year":"2015","unstructured":"Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53\u201361","journal-title":"Opt Lasers Eng"},{"key":"10413_CR42","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"XY Wang","year":"2015","unstructured":"Wang XY, Liu LT, Zhang YQ (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10\u201318","journal-title":"Opt Lasers Eng"},{"issue":"3","key":"10413_CR43","doi-asserted-by":"publisher","first-page":"1417","DOI":"10.1007\/s11071-015-2579-y","volume":"84","author":"XY Wang","year":"2016","unstructured":"Wang XY, Liu CM, Xu DH, Liu CX (2016) Image encryption scheme using chaos and simulated annealing algorithm. Nonlinear Dyn 84(3):1417\u20131429","journal-title":"Nonlinear Dyn"},{"key":"10413_CR44","doi-asserted-by":"publisher","first-page":"3029","DOI":"10.1007\/s10773-017-3469-5","volume":"56","author":"H Wang","year":"2017","unstructured":"Wang H, Wang J, Geng YC, Song Y, Liu JQ (2017) Quantum image encryption based on iterative framework of frequency-spatial domain transforms. Int J Theor Phys 56:3029\u20133049","journal-title":"Int J Theor Phys"},{"key":"10413_CR45","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1016\/j.optlastec.2018.07.052","volume":"108","author":"MX Wang","year":"2018","unstructured":"Wang MX, Wang XY, Zhang YQ, Guo ZG (2018) A novel chaotic encryption scheme based on image segmentation and multiple diffusion models. Opt Laser Technol 108:558\u2013573","journal-title":"Opt Laser Technol"},{"key":"10413_CR46","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1016\/j.optlaseng.2019.06.015","volume":"122","author":"XY Wang","year":"2019","unstructured":"Wang XY, Wang Y, Unar S, Wang MX, Wang S (2019) A privacy encryption algorithm based on an improved chaotic system. Opt Lasers Eng 122:335\u2013346","journal-title":"Opt Lasers Eng"},{"key":"10413_CR47","first-page":"397","volume":"421","author":"JD Watson","year":"1953","unstructured":"Watson JD, Crick FHC (1953) A structure for deoxyribose nucleic acid. Nature 421:397\u2013398","journal-title":"Nature"},{"key":"10413_CR48","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1007\/s11071-019-05378-8","volume":"99","author":"WY Wen","year":"2020","unstructured":"Wen WY, Wei KK, Zhang YS, Fang YM, Li M (2020) Colour light field image encryption based on DNA sequences and chaotic sequences. Nonlinear Dyn 99:1587\u20131600","journal-title":"Nonlinear Dyn"},{"key":"10413_CR49","unstructured":"Wu Y (2011) NPCR and UACI randomness tests for image encryption. Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun"},{"key":"10413_CR50","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","volume":"222","author":"Y Wu","year":"2013","unstructured":"Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci 222:323\u2013342","journal-title":"Inf Sci"},{"key":"10413_CR51","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.sigpro.2018.06.008","volume":"153","author":"JH Wu","year":"2018","unstructured":"Wu JH, Liao XF, Yang B (2018) Image encryption using 2D H\u00e9non-Sine map and DNA approach. Signal Process 153:11\u201323","journal-title":"Signal Process"},{"key":"10413_CR52","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.sigpro.2018.02.028","volume":"148","author":"XJ Wu","year":"2018","unstructured":"Wu XJ, Wang KS, Wang XY, Kan HB, Kurths J (2018) Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process 148:272\u2013287","journal-title":"Signal Process"},{"key":"10413_CR53","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1016\/j.ijleo.2018.06.112","volume":"171","author":"M Xu","year":"2018","unstructured":"Xu M, Tian ZH (2018) A novel image encryption algorithm based on self-orthogonal Latin squares. Optik 171:891\u2013903","journal-title":"Optik"},{"key":"10413_CR54","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.neucom.2017.04.016","volume":"251","author":"GD Ye","year":"2017","unstructured":"Ye GD, Huang XL (2017) An efficient symmetric image encryption algorithm based on an intertwining logistic map. Neurocomputing 251:45\u201353","journal-title":"Neurocomputing"},{"issue":"1","key":"10413_CR55","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1007\/s11071-018-4391-y","volume":"94","author":"GD Ye","year":"2018","unstructured":"Ye GD, Pan C, Huang XL, Mei QX (2018) An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dyn 94(1):745\u2013756","journal-title":"Nonlinear Dyn"},{"key":"10413_CR56","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.26.1.013021","volume":"26","author":"K Zhan","year":"2017","unstructured":"Zhan K, Wei D, Shi J, Yu J (2017) Cross-utilizing hyperchaotic and DNA sequences for image encryption. J Electronic Imaging 26:013021","journal-title":"J Electronic Imaging"},{"key":"10413_CR57","doi-asserted-by":"publisher","first-page":"6276","DOI":"10.1016\/j.ijleo.2013.05.009","volume":"124","author":"Q Zhang","year":"2013","unstructured":"Zhang Q, Wei XP (2013) A novel couple images encryption algorithm based on DNA subsequence operation and chaotic system. Optik 124:6276\u20136281","journal-title":"Optik"},{"key":"10413_CR58","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.cnsns.2013.06.031","volume":"19","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simul 19:74\u201382","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"11","key":"10413_CR59","doi-asserted-by":"publisher","first-page":"2028","DOI":"10.1016\/j.mcm.2010.06.005","volume":"52","author":"Q Zhang","year":"2010","unstructured":"Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52(11):2028\u20132035","journal-title":"Math Comput Model"},{"issue":"18","key":"10413_CR60","doi-asserted-by":"publisher","first-page":"3596","DOI":"10.1016\/j.ijleo.2012.11.018","volume":"124","author":"Q Zhang","year":"2013","unstructured":"Zhang Q, Guo L, Wei X (2013) A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik 124(18):3596\u20133600","journal-title":"Optik"},{"key":"10413_CR61","doi-asserted-by":"publisher","first-page":"6303","DOI":"10.1007\/s11042-015-2573-x","volume":"75","author":"P Zhen","year":"2016","unstructured":"Zhen P, Zhao G, Min L, Jin X (2016) Chaos-based image encryption scheme combining DNA coding and entropy. Multimed Tools Appl 75:6303\u20136319","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"10413_CR62","doi-asserted-by":"publisher","first-page":"1750027","DOI":"10.1142\/S0218127417500274","volume":"27","author":"L Zhou","year":"2017","unstructured":"Zhou L, Wang CH, Zhou LL (2017) Generating four-wing hyperchaotic attractor chaotic attractors in 4D memristive system. Int J Bifurcat Chaos 27(2):1750027","journal-title":"Int J Bifurcat Chaos"},{"key":"10413_CR63","doi-asserted-by":"publisher","first-page":"7227","DOI":"10.1007\/s11042-019-08226-4","volume":"79","author":"CJ Zhu","year":"2020","unstructured":"Zhu CJ, Gan ZH, Lu Y, Chai XL (2020) An image encryption algorithm based on 3-D DNA level permutation and substitution scheme. Multimed Tools Appl 79:7227\u20137258","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10413-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10413-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10413-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,29]],"date-time":"2023-01-29T03:12:40Z","timestamp":1674961960000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10413-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,8]]},"references-count":63,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["10413"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10413-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,8]]},"assertion":[{"value":"28 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}