{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T08:06:33Z","timestamp":1742803593478,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,11,2]],"date-time":"2018-11-02T00:00:00Z","timestamp":1541116800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["No.lzujbky-2016-238"],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.61175012"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"2017 second batch of innovation base and innovative talents","award":["17CX2JA018"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multidim Syst Sign Process"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s11045-018-0622-0","type":"journal-article","created":{"date-parts":[[2018,11,2]],"date-time":"2018-11-02T05:46:06Z","timestamp":1541137566000},"page":"1637-1657","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["A novel fourth order chaotic system and its algorithm for medical image encryption"],"prefix":"10.1007","volume":"30","author":[{"given":"Jizhao","family":"Liu","sequence":"first","affiliation":[]},{"given":"Shusen","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Lian","sequence":"additional","affiliation":[]},{"given":"Yide","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Xinguo","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,2]]},"reference":[{"issue":"10071","key":"622_CR1","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1016\/S0140-6736(16)32401-1","volume":"389","author":"HU Ahmed","year":"2017","unstructured":"Ahmed, H. U., Bosaily, A. E. S., Brown, L. C., et al. (2017). Diagnostic accuracy of multi-parametric MRI and TRUS biopsy in prostate cancer (PROMIS): A paired validating confirmatory study. The Lancet, 389(10071), 815\u2013822.","journal-title":"The Lancet"},{"issue":"2","key":"622_CR2","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1111\/bju.13739","volume":"120","author":"S Albisinni","year":"2017","unstructured":"Albisinni, S., Artigas, C., Aoun, F., et al. (2017). Clinical impact of 68\u00a0Ga-prostate-specific membrane antigen (PSMA) positron emission tomography\/computed tomography (PET\/CT) in patients with prostate cancer with rising prostate-specific antigen after treatment with curative intent: preliminary analysis of a multidisciplinary approach. BJU International, 120(2), 197\u2013203.","journal-title":"BJU International"},{"issue":"01","key":"622_CR3","doi-asserted-by":"publisher","first-page":"1750004","DOI":"10.1142\/S0218127417500043","volume":"27","author":"D Arroyo","year":"2017","unstructured":"Arroyo, D., Hernandez, F., & Or\u00fae, A. B. (2017). Cryptanalysis of a classical chaos-based cryptosystem with some quantum cryptography features. International Journal of Bifurcation and Chaos, 27(01), 1750004.","journal-title":"International Journal of Bifurcation and Chaos"},{"issue":"4","key":"622_CR4","doi-asserted-by":"publisher","first-page":"1172","DOI":"10.1053\/j.gastro.2017.11.274","volume":"154","author":"DH Bruining","year":"2018","unstructured":"Bruining, D. H., Zimmermann, E. M., Loftus, E. V., Jr., et al. (2018). Consensus recommendations for evaluation, interpretation, and utilization of computed tomography and magnetic resonance enterography in patients with small bowel Crohn\u2019s disease. Gastroenterology, 154(4), 1172\u20131194.","journal-title":"Gastroenterology"},{"key":"622_CR5","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.sigpro.2016.10.003","volume":"132","author":"W Cao","year":"2017","unstructured":"Cao, W., Zhou, Y., Chen, C. L. P., et al. (2017). Medical image encryption using edge maps. Signal Processing, 132, 96\u2013109.","journal-title":"Signal Processing"},{"issue":"3","key":"622_CR6","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals, 21(3), 749\u2013761.","journal-title":"Chaos, Solitons & Fractals"},{"issue":"3","key":"622_CR7","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1016\/j.cnsns.2014.06.032","volume":"20","author":"J Chen","year":"2015","unstructured":"Chen, J., Zhu, Z., Fu, C., et al. (2015). A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Communications in Nonlinear Science and Numerical Simulation, 20(3), 846\u2013860.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"issue":"12","key":"622_CR8","doi-asserted-by":"publisher","first-page":"3616","DOI":"10.1088\/1009-1963\/16\/12\/011","volume":"16","author":"S Fu-Yan","year":"2007","unstructured":"Fu-Yan, S., Shu-Tang, L., & Zong-Wang, L. (2007). Image encryption using high-dimension chaotic system. Chinese Physics, 16(12), 3616.","journal-title":"Chinese Physics"},{"issue":"8","key":"622_CR9","doi-asserted-by":"publisher","first-page":"20151121","DOI":"10.1587\/elex.13.20151121","volume":"13","author":"R Ge","year":"2016","unstructured":"Ge, R., Zhang, L., Zhang, T., et al. (2016). A modified pulse-coupled spiking neuron circuit with memory threshold and its application. IEICE Electronics Express, 13(8), 20151121.","journal-title":"IEICE Electronics Express"},{"key":"622_CR10","unstructured":"Guo, J. I. (2000). A new chaotic key-based design for image encryption and decryption. In The 2000 IEEE international symposium on proceedings of circuits and systems, 2000, ISCAS 2000 (Vol. 4, pp. 49\u201352), Geneva. IEEE."},{"key":"622_CR11","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.sigpro.2017.10.004","volume":"144","author":"Z Hua","year":"2018","unstructured":"Hua, Z., Yi, S., & Zhou, Y. (2018). Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Processing, 144, 134\u2013144.","journal-title":"Signal Processing"},{"issue":"12","key":"622_CR12","doi-asserted-by":"publisher","first-page":"2777","DOI":"10.1109\/TIFS.2016.2598528","volume":"11","author":"F Huang","year":"2016","unstructured":"Huang, F., Huang, J., & Shi, Y. Q. (2016). New framework for reversible data hiding in encrypted domain. IEEE Transactions on Information Forensics and Security, 11(12), 2777\u20132789.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"622_CR13","first-page":"45","volume":"34","author":"FG Jeng","year":"2015","unstructured":"Jeng, F. G., Huang, W. L., & Chen, T. H. (2015). Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes. Signal Processing: Image Communication, 34, 45\u201351.","journal-title":"Signal Processing: Image Communication"},{"key":"622_CR14","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"Y Li","year":"2017","unstructured":"Li, Y., Wang, C., & Chen, H. (2017). A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Optics and Lasers in Engineering, 90, 238\u2013246.","journal-title":"Optics and Lasers in Engineering"},{"key":"622_CR15","doi-asserted-by":"publisher","first-page":"22787","DOI":"10.1007\/s11042-017-5534-8","volume":"77","author":"J Liu","year":"2018","unstructured":"Liu, J., Ma, Y., Li, S., et al. (2018a). A new simple chaotic system and its application in medical image encryption. Multimedia Tools and Applications, 77, 22787\u201322808.","journal-title":"Multimedia Tools and Applications"},{"issue":"4","key":"622_CR16","doi-asserted-by":"publisher","first-page":"230","DOI":"10.3390\/e20040230","volume":"20","author":"J Liu","year":"2018","unstructured":"Liu, J., Ma, J., Lian, J., et al. (2018b). An approach for the Generation of an nth-order chaotic system with hyperbolic sine. Entropy, 20(4), 230.","journal-title":"Entropy"},{"issue":"7","key":"622_CR17","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1049\/iet-com.2017.0455","volume":"12","author":"J Liu","year":"2018","unstructured":"Liu, J., Sprott, J. C., Wang, S., et al. (2018c). Simplest chaotic system with a hyperbolic sine and its applications in DCSK scheme. IET Communications, 12(7), 809\u2013815.","journal-title":"IET Communications"},{"issue":"16\u201317","key":"622_CR18","doi-asserted-by":"publisher","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","volume":"284","author":"H Liu","year":"2011","unstructured":"Liu, H., & Wang, X. (2011). Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Optics Communications, 284(16\u201317), 3895\u20133903.","journal-title":"Optics Communications"},{"issue":"2","key":"622_CR19","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1007\/s11071-016-3325-9","volume":"88","author":"F Nazarimehr","year":"2017","unstructured":"Nazarimehr, F., Jafari, S., Golpayegani, S. M. R. H., et al. (2017). Can Lyapunov exponent predict critical transitions in biological systems? Nonlinear Dynamics, 88(2), 1493\u20131500.","journal-title":"Nonlinear Dynamics"},{"issue":"6","key":"622_CR20","doi-asserted-by":"publisher","first-page":"1252","DOI":"10.1016\/j.ultrasmedbio.2017.01.012","volume":"43","author":"N Quader","year":"2017","unstructured":"Quader, N., Hodgson, A. J., Mulpuri, K., et al. (2017). Automatic evaluation of scan adequacy and dysplasia metrics in 2-D ultrasound images of the neonatal hip. Ultrasound in Medicine and Biology, 43(6), 1252\u20131262.","journal-title":"Ultrasound in Medicine and Biology"},{"issue":"2","key":"622_CR21","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1117\/1.482647","volume":"7","author":"J Scharinger","year":"1998","unstructured":"Scharinger, J. (1998). Fast encryption of image data using chaotic Kolmogorov flows. Journal of Electronic Imaging, 7(2), 318\u2013325.","journal-title":"Journal of Electronic Imaging"},{"issue":"1","key":"622_CR22","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/S0375-9601(00)00026-8","volume":"266","author":"JC Sprott","year":"2000","unstructured":"Sprott, J. C. (2000). A new class of chaotic circuit. Physics Letters A, 266(1), 19\u201323.","journal-title":"Physics Letters A"},{"key":"622_CR23","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198508397.001.0001","volume-title":"Chaos and time-series analysis","author":"JC Sprott","year":"2003","unstructured":"Sprott, J. C. (2003). Chaos and time-series analysis. Oxford: Oxford University Press."},{"key":"622_CR24","doi-asserted-by":"publisher","DOI":"10.1201\/9780429492563","volume-title":"Nonlinear dynamics and chaos: With applications to physics, biology, chemistry, and engineering","author":"SH Strogatz","year":"2018","unstructured":"Strogatz, S. H. (2018). Nonlinear dynamics and chaos: With applications to physics, biology, chemistry, and engineering. Boca Raton: CRC Press."},{"issue":"4","key":"622_CR25","doi-asserted-by":"publisher","first-page":"2333","DOI":"10.1007\/s11071-016-2648-x","volume":"84","author":"XJ Tong","year":"2016","unstructured":"Tong, X. J., Zhang, M., Wang, Z., et al. (2016). A joint color image encryption and compression scheme based on hyper-chaotic system. Nonlinear Dynamics, 84(4), 2333\u20132356.","journal-title":"Nonlinear Dynamics"},{"issue":"1\u20132","key":"622_CR26","doi-asserted-by":"publisher","first-page":"795","DOI":"10.1007\/s11071-013-0832-9","volume":"73","author":"X Wang","year":"2013","unstructured":"Wang, X., & Liu, L. (2013). Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos. Nonlinear Dynamics, 73(1\u20132), 795\u2013800.","journal-title":"Nonlinear Dynamics"},{"issue":"1\u20132","key":"622_CR27","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s11071-015-2330-8","volume":"83","author":"X Wang","year":"2016","unstructured":"Wang, X., & Zhang, H. (2016). A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dynamics, 83(1\u20132), 333\u2013346.","journal-title":"Nonlinear Dynamics"},{"issue":"6","key":"622_CR28","doi-asserted-by":"publisher","first-page":"8087","DOI":"10.1007\/s11042-016-3454-7","volume":"76","author":"HM Yuan","year":"2017","unstructured":"Yuan, H. M., Liu, Y., Gong, L. H., et al. (2017). A new image cryptosystem based on 2D hyper-chaotic system. Multimedia Tools and Applications, 76(6), 8087\u20138108.","journal-title":"Multimedia Tools and Applications"},{"key":"622_CR29","volume-title":"Nonlinear circuit: Based analysis and design","author":"XG Zhang","year":"2011","unstructured":"Zhang, X. G., Ma, Y. D., & LI, S. L. (2011). Nonlinear circuit: Based analysis and design. Beijing: Higher Education Press."},{"issue":"4","key":"622_CR30","doi-asserted-by":"publisher","first-page":"1562","DOI":"10.1016\/j.ijleo.2013.09.018","volume":"125","author":"Y Zhang","year":"2014","unstructured":"Zhang, Y., Wen, W., Su, M., et al. (2014). Cryptanalyzing a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik-International Journal for Light and Electron Optics, 125(4), 1562\u20131564.","journal-title":"Optik-International Journal for Light and Electron Optics"}],"container-title":["Multidimensional Systems and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11045-018-0622-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11045-018-0622-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11045-018-0622-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T00:06:03Z","timestamp":1720742763000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11045-018-0622-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,2]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["622"],"URL":"https:\/\/doi.org\/10.1007\/s11045-018-0622-0","relation":{},"ISSN":["0923-6082","1573-0824"],"issn-type":[{"type":"print","value":"0923-6082"},{"type":"electronic","value":"1573-0824"}],"subject":[],"published":{"date-parts":[[2018,11,2]]},"assertion":[{"value":"23 January 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and\/or national research committee and with the 1964 Helsinki declaration and its later amendments or comparable ethical standards.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}