{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T11:40:02Z","timestamp":1728474002805},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T00:00:00Z","timestamp":1669075200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T00:00:00Z","timestamp":1669075200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s11042-022-14175-2","type":"journal-article","created":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T05:13:38Z","timestamp":1669180418000},"page":"18545-18564","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Image encryption algorithm using dynamic permutation and large chaotic S-box"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-3533-7960","authenticated-orcid":false,"given":"Younes","family":"Qobbi","sequence":"first","affiliation":[]},{"given":"Abdellatif","family":"Jarjar","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Essaid","sequence":"additional","affiliation":[]},{"given":"Abdelhamid","family":"Benazzi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,22]]},"reference":[{"key":"14175_CR1","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.optlaseng.2016.04.023","volume":"85","author":"SK Abd-El-Hafiz","year":"2016","unstructured":"Abd-El-Hafiz SK, AbdElHaleem SH, Radwan AG (2016) Novel permutation measures for image encryption algorithms. Opt Lasers Eng 85:72\u201383","journal-title":"Opt Lasers Eng"},{"issue":"27","key":"14175_CR2","doi-asserted-by":"publisher","first-page":"19853","DOI":"10.1007\/s11042-020-08850-5","volume":"79","author":"TS Ali","year":"2020","unstructured":"Ali TS, Ali R (2020) A new chaos based color image encryption algorithm using permutation substitution and Boolean operation. Multimed Tools Appl 79(27):19853\u201319873","journal-title":"Multimed Tools Appl"},{"issue":"08","key":"14175_CR3","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. In J Bifurcat Chaos 16(08):2129\u20132151","journal-title":"In J Bifurcat Chaos"},{"key":"14175_CR4","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.optlaseng.2016.10.006","volume":"90","author":"R Enayatifar","year":"2017","unstructured":"Enayatifar R, Abdullah AH, Isnin IF, Altameem A, Lee M (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146\u2013154","journal-title":"Opt Lasers Eng"},{"issue":"5","key":"14175_CR5","doi-asserted-by":"publisher","first-page":"3829","DOI":"10.1007\/s00500-019-04151-8","volume":"24","author":"M Es-Sabry","year":"2020","unstructured":"Es-Sabry M, El Akkad N, Merras M, Saaidi A, Satori K (2020) A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators. Soft Comput 24(5):3829\u20133848","journal-title":"Soft Comput"},{"issue":"11","key":"14175_CR6","doi-asserted-by":"publisher","first-page":"7111","DOI":"10.1007\/s00521-018-3541-y","volume":"31","author":"ZH Gan","year":"2019","unstructured":"Gan ZH, Chai XL, Han DJ, Chen YR (2019) A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Comput & Applic 31(11):7111\u20137130","journal-title":"Neural Comput & Applic"},{"issue":"37","key":"14175_CR7","doi-asserted-by":"publisher","first-page":"26927","DOI":"10.1007\/s11042-020-09058-3","volume":"79","author":"M Ghazvini","year":"2020","unstructured":"Ghazvini M, Mirzadi M, Parvar N (2020) A modified method for image encryption based on chaotic map and genetic algorithm. Multimed Tools Appl 79(37):26927\u201326950","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"14175_CR8","doi-asserted-by":"publisher","first-page":"535","DOI":"10.3390\/e20070535","volume":"20","author":"L Huang","year":"2018","unstructured":"Huang L, Cai S, Xiao M, Xiong X (2018) A simple chaotic map-based image encryption system using both plaintext related permutation and diffusion. Entropy 20(7):535","journal-title":"Entropy"},{"issue":"2","key":"14175_CR9","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1007\/s11045-018-0589-x","volume":"30","author":"JS Khan","year":"2019","unstructured":"Khan JS, Ahmad J (2019) Chaos based efficient selective image encryption. Multidim Syst Sign Process 30(2):943\u2013961","journal-title":"Multidim Syst Sign Process"},{"issue":"6","key":"14175_CR10","doi-asserted-by":"publisher","first-page":"3753","DOI":"10.3233\/JIFS-17656","volume":"33","author":"FA Khan","year":"2017","unstructured":"Khan FA, Ahmed J, Khan JS, Ahmad J, Khan MA (2017) A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and S 8 permutation. J Intell Fuzzy Syst 33(6):3753\u20133765","journal-title":"J Intell Fuzzy Syst"},{"issue":"1","key":"14175_CR11","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s11071-016-3030-8","volume":"87","author":"C Li","year":"2017","unstructured":"Li C, Luo G, Qin K, Li C (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dynamics 87(1):127\u2013133","journal-title":"Nonlinear Dynamics"},{"key":"14175_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/3031506","volume":"2019","author":"C Li","year":"2019","unstructured":"Li C, Zhao F, Liu C, Lei L, Zhang J (2019) A hyperchaotic color image encryption algorithm and security analysis. Secur Commun Netw 2019:1\u20138","journal-title":"Secur Commun Netw"},{"issue":"5","key":"14175_CR13","doi-asserted-by":"publisher","first-page":"1240","DOI":"10.1016\/j.compeleceng.2012.02.007","volume":"38","author":"L Liu","year":"2012","unstructured":"Liu L, Zhang Q, Wei X (2012) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38(5):1240\u20131248","journal-title":"Comput Electr Eng"},{"key":"14175_CR14","doi-asserted-by":"publisher","first-page":"105818","DOI":"10.1016\/j.optlastec.2019.105818","volume":"121","author":"M Mahmud","year":"2020","unstructured":"Mahmud M, Lee M, Choi JY (2020) Evolutionary-based image encryption using RNA codons truth table. Opt Laser Technol 121:105818","journal-title":"Opt Laser Technol"},{"issue":"1","key":"14175_CR15","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/s11042-015-3064-9","volume":"76","author":"M Mollaeefar","year":"2017","unstructured":"Mollaeefar M, Sharif A, Nazari M (2017) A novel encryption scheme for colored image based on high level chaotic maps. Multimed Tools Appl 76(1):607\u2013629","journal-title":"Multimed Tools Appl"},{"issue":"35","key":"14175_CR16","doi-asserted-by":"publisher","first-page":"25613","DOI":"10.1007\/s11042-020-09237-2","volume":"79","author":"Y Niu","year":"2020","unstructured":"Niu Y, Zhou Z, Zhang X (2020) An image encryption approach based on chaotic maps and genetic operations. Multimed Tools Appl 79(35):25613\u201325633","journal-title":"Multimed Tools Appl"},{"key":"14175_CR17","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.neucom.2017.12.048","volume":"283","author":"P Ping","year":"2018","unstructured":"Ping P, Xu F, Mao Y, Wang Z (2018) Designing permutation\u2013substitution image encryption networks with Henon map. Neurocomputing 283:53\u201363","journal-title":"Neurocomputing"},{"issue":"4","key":"14175_CR18","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656\u2013715","journal-title":"Bell Syst Tech J"},{"key":"14175_CR19","doi-asserted-by":"crossref","unstructured":"Song Y, Song J, Qu J (2016, October) A secure image encryption algorithm based on multiple one-dimensional chaotic systems. In: 2016 2nd IEEE international conference on computer and communications (ICCC) (pp. 584-588). IEEE","DOI":"10.1109\/CompComm.2016.7924768"},{"key":"14175_CR20","doi-asserted-by":"publisher","DOI":"10.1142\/7183","volume-title":"Elegant chaos: algebraically simple chaotic flows","author":"JC Sprott","year":"2010","unstructured":"Sprott JC (2010) Elegant chaos: algebraically simple chaotic flows. World Scientific"},{"key":"14175_CR21","doi-asserted-by":"crossref","unstructured":"Thanki RM, Kothari AM (2019). Image enhancement in the spatial domain. In: Digital image processing using SCILAB (pp. 19\u201350). Springer, Cham","DOI":"10.1007\/978-3-319-89533-8_2"},{"issue":"6","key":"14175_CR22","doi-asserted-by":"publisher","first-page":"3877","DOI":"10.3390\/e17063877","volume":"17","author":"XY Wang","year":"2015","unstructured":"Wang XY, Zhang YQ, Bao XM (2015) A colour image encryption scheme using permutation-substitution based on chaos. Entropy 17(6):3877\u20133897","journal-title":"Entropy"},{"issue":"3","key":"14175_CR23","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/23\/3\/030503","volume":"23","author":"W Xing-Yuan","year":"2014","unstructured":"Xing-Yuan W, Qian W (2014) A fast image encryption algorithm based on only blocks in cipher text. Chinese physics B 23(3):030503","journal-title":"Chinese physics B"},{"issue":"11","key":"14175_CR24","doi-asserted-by":"publisher","first-page":"2310","DOI":"10.1049\/iet-ipr.2019.1340","volume":"14","author":"J Zheng","year":"2020","unstructured":"Zheng J, Liu L (2020) Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map. IET Image Process 14(11):2310\u20132320","journal-title":"IET Image Process"},{"key":"14175_CR25","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Bao L, Chen CP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172\u2013182","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-14175-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-14175-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-14175-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T10:47:21Z","timestamp":1728470841000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-14175-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,22]]},"references-count":25,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["14175"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-14175-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2022,11,22]]},"assertion":[{"value":"1 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 April 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}