{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T04:41:44Z","timestamp":1725856904889},"reference-count":42,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032013","62171114"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004772","name":"Natural Science Foundation of Ningxia Province","doi-asserted-by":"publisher","award":["2023AAC03365"],"id":[{"id":"10.13039\/501100004772","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["N2316010","N2324004-12"],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1016\/j.jisa.2023.103686","type":"journal-article","created":{"date-parts":[[2023,12,26]],"date-time":"2023-12-26T10:33:44Z","timestamp":1703586824000},"page":"103686","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":4,"special_numbering":"C","title":["Batch image encryption using cross image permutation and diffusion"],"prefix":"10.1016","volume":"80","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-2767-3999","authenticated-orcid":false,"given":"Wei","family":"Song","sequence":"first","affiliation":[]},{"given":"Chong","family":"Fu","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5816-4126","authenticated-orcid":false,"given":"Yu","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Yanfeng","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4745-8361","authenticated-orcid":false,"given":"Junxin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Peipei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2023.103686_b1","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/j.ijleo.2018.06.029","article-title":"Multiple-image encryption by using robust chaotic map in wavelet transform domain","volume":"171","author":"Li","year":"2018","journal-title":"Optik"},{"key":"10.1016\/j.jisa.2023.103686_b2","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1016\/j.sigpro.2017.06.014","article-title":"Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation","volume":"142","author":"Wu","year":"2018","journal-title":"Signal Process"},{"issue":"6","key":"10.1016\/j.jisa.2023.103686_b3","doi-asserted-by":"crossref","first-page":"7841","DOI":"10.1007\/s11042-018-6496-1","article-title":"Multiple-image encryption algorithm based on DNA encoding and chaotic system","volume":"78","author":"Zhang","year":"2019","journal-title":"Multimedia Tools Appl"},{"key":"10.1016\/j.jisa.2023.103686_b4","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.optlaseng.2018.11.017","article-title":"Index-based permutation-diffusion in multiple-image encryption using DNA sequence","volume":"115","author":"Enayatifar","year":"2019","journal-title":"Opt Lasers Eng"},{"key":"10.1016\/j.jisa.2023.103686_b5","doi-asserted-by":"crossref","first-page":"646","DOI":"10.1016\/j.matcom.2020.07.007","article-title":"Color multiple image encryption scheme based on 3D-chaotic maps","volume":"178","author":"Malik","year":"2020","journal-title":"Math Comput Simulation"},{"key":"10.1016\/j.jisa.2023.103686_b6","doi-asserted-by":"crossref","first-page":"73924","DOI":"10.1109\/ACCESS.2021.3081362","article-title":"Multi-images encryption scheme based on 3D chaotic map and substitution box","volume":"9","author":"Tanveer","year":"2021","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.jisa.2023.103686_b7","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1049\/ipr2.12069","article-title":"Multi-image encryption algorithm based on image hash, bit-plane decomposition and dynamic DNA coding","volume":"15","author":"Zhang","year":"2021","journal-title":"IET Image Process"},{"issue":"29","key":"10.1016\/j.jisa.2023.103686_b8","doi-asserted-by":"crossref","first-page":"20753","DOI":"10.1007\/s11042-020-08835-4","article-title":"Multiple-image encryption algorithm based on bit planes and chaos","volume":"79","author":"Zhang","year":"2020","journal-title":"Multimedia Tools Appl"},{"key":"10.1016\/j.jisa.2023.103686_b9","doi-asserted-by":"crossref","first-page":"123536","DOI":"10.1109\/ACCESS.2020.3004536","article-title":"A novel and efficient 3D multiple images encryption scheme based on chaotic systems and swapping operations","volume":"8","author":"Hanif","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.jisa.2023.103686_b10","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijleo.2022.169624","article-title":"A novel multiple grayscale image encryption method based on 3D bit-scrambling and diffusion","volume":"266","author":"Demirta\u015f","year":"2022","journal-title":"Optik"},{"key":"10.1016\/j.jisa.2023.103686_b11","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1016\/j.ins.2020.10.031","article-title":"Multiple images encryption based on 3D scrambling and hyper-chaotic system","volume":"550","author":"Sahasrabuddhe","year":"2021","journal-title":"Inform Sci"},{"issue":"4","key":"10.1016\/j.jisa.2023.103686_b12","first-page":"1535","article-title":"An effective multiple-image encryption algorithm based on 3D cube and hyperchaotic map","volume":"34","author":"Gao","year":"2022","journal-title":"J King Saud Univ-Comput Inf Sci"},{"issue":"5","key":"10.1016\/j.jisa.2023.103686_b13","doi-asserted-by":"crossref","DOI":"10.1088\/1402-4896\/ac66a1","article-title":"Multiple-image encryption algorithm based on genetic central dogma","volume":"97","author":"Zhang","year":"2022","journal-title":"Phys Scr"},{"key":"10.1016\/j.jisa.2023.103686_b14","doi-asserted-by":"crossref","DOI":"10.1016\/j.image.2019.115662","article-title":"Multiple-image encryption based on chaotic phase mask and equal modulus decomposition in quaternion gyrator domain","volume":"80","author":"Shao","year":"2020","journal-title":"Signal Process, Image Commun"},{"key":"10.1016\/j.jisa.2023.103686_b15","doi-asserted-by":"crossref","DOI":"10.1016\/j.image.2021.116168","article-title":"Robust multiple color images encryption using discrete Fourier transforms and chaotic map","volume":"93","author":"Tang","year":"2021","journal-title":"Signal Process, Image Commun"},{"key":"10.1016\/j.jisa.2023.103686_b16","doi-asserted-by":"crossref","DOI":"10.1016\/j.optcom.2021.127494","article-title":"Research on multiple-image encryption mechanism based on radon transform and ghost imaging","volume":"504","author":"Zhang","year":"2022","journal-title":"Opt Commun"},{"issue":"19","key":"10.1016\/j.jisa.2023.103686_b17","doi-asserted-by":"crossref","first-page":"12959","DOI":"10.1007\/s11042-019-08470-8","article-title":"A novel multi-dimensional multiple image encryption technique","volume":"79","author":"Patro","year":"2020","journal-title":"Multimedia Tools Appl"},{"key":"10.1016\/j.jisa.2023.103686_b18","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.ins.2020.01.009","article-title":"A novel batch image encryption algorithm using parallel computing","volume":"518","author":"Song","year":"2020","journal-title":"Inform Sci"},{"key":"10.1016\/j.jisa.2023.103686_b19","doi-asserted-by":"crossref","DOI":"10.1016\/j.image.2021.116628","article-title":"A fast parallel batch image encryption algorithm using intrinsic properties of chaos","volume":"102","author":"Song","year":"2022","journal-title":"Signal Process, Image Commun"},{"key":"10.1016\/j.jisa.2023.103686_b20","first-page":"1","article-title":"A practical medical image cryptosystem with parallel acceleration","author":"Song","year":"2022","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"1","key":"10.1016\/j.jisa.2023.103686_b21","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1007\/s11071-021-07192-7","article-title":"A fast and efficient multiple images encryption based on single-channel encryption and chaotic system","volume":"108","author":"Gao","year":"2022","journal-title":"Nonlinear Dynam"},{"issue":"3","key":"10.1016\/j.jisa.2023.103686_b22","doi-asserted-by":"crossref","first-page":"2363","DOI":"10.1364\/OE.20.002363","article-title":"A chaos-based digital image encryption scheme with an improved diffusion strategy","volume":"20","author":"Fu","year":"2012","journal-title":"Opt Express"},{"key":"10.1016\/j.jisa.2023.103686_b23","series-title":"International conference on advanced data mining and applications","first-page":"393","article-title":"Cryptography-inspired federated learning for generative adversarial networks and meta learning","author":"Zheng","year":"2023"},{"issue":"1","key":"10.1016\/j.jisa.2023.103686_b24","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MMUL.2021.3114589","article-title":"Cryptanalyzing two image encryption algorithms based on a first-order time-delay system","volume":"29","author":"Liu","year":"2021","journal-title":"IEEE MultiMedia"},{"key":"10.1016\/j.jisa.2023.103686_b25","article-title":"When an attacker meets a cipher-image in 2018: A year in review","volume":"48","author":"Li","year":"2019","journal-title":"J Inf Secur Appl"},{"key":"10.1016\/j.jisa.2023.103686_b26","doi-asserted-by":"crossref","unstructured":"Zheng Y, Tian H, Du M, Fu C. Encrypted video search: scalable, modular, and content-similar. In: Proceedings of the 13th ACM multimedia systems conference. 2022, p. 177\u201390.","DOI":"10.1145\/3524273.3528190"},{"issue":"4","key":"10.1016\/j.jisa.2023.103686_b27","doi-asserted-by":"crossref","first-page":"4505","DOI":"10.1007\/s11071-021-06472-6","article-title":"Color image encryption using orthogonal latin squares and a new 2D chaotic system","volume":"104","author":"Hua","year":"2021","journal-title":"Nonlinear Dynam"},{"key":"10.1016\/j.jisa.2023.103686_b28","series-title":"Introduction to algorithms","author":"Cormen","year":"2022"},{"key":"10.1016\/j.jisa.2023.103686_b29","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.matcom.2022.07.029","article-title":"A parallel image encryption algorithm using intra bitplane scrambling","volume":"204","author":"Song","year":"2023","journal-title":"Math Comput Simulation","ISSN":"http:\/\/id.crossref.org\/issn\/0378-4754","issn-type":"print"},{"key":"10.1016\/j.jisa.2023.103686_b30","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","article-title":"Cosine-transform-based chaotic system for image encryption","volume":"480","author":"Hua","year":"2019","journal-title":"Inform Sci"},{"key":"10.1016\/j.jisa.2023.103686_b31","series-title":"Computer Vision\u2013ECCV 2014: 13th European Conference, Zurich, Switzerland, September 6-12, 2014, Proceedings, Part V 13","first-page":"740","article-title":"Microsoft coco: Common objects in context","author":"Lin","year":"2014"},{"issue":"08","key":"10.1016\/j.jisa.2023.103686_b32","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","article-title":"Some basic cryptographic requirements for chaos-based cryptosystems","volume":"16","author":"Alvarez","year":"2006","journal-title":"Int J Bifurcation Chaos"},{"issue":"4","key":"10.1016\/j.jisa.2023.103686_b33","doi-asserted-by":"crossref","first-page":"2367","DOI":"10.1109\/TCBB.2022.3140306","article-title":"Cross-modality LGE-CMR segmentation using image-to-image translation based data augmentation","volume":"20","author":"Wang","year":"2023","journal-title":"IEEE\/ACM Trans Comput Biol Bioinform"},{"key":"10.1016\/j.jisa.2023.103686_b34","series-title":"2017 IEEE 17th international conference on communication technology","first-page":"1768","article-title":"A color image encryption algorithm using a new 1-D chaotic map","author":"Fu","year":"2017"},{"key":"10.1016\/j.jisa.2023.103686_b35","article-title":"A robust deep learning framework based on spectrograms for heart sound classification","author":"Chen","year":"2023","journal-title":"IEEE\/ACM Trans Comput Biol Bioinform"},{"issue":"3","key":"10.1016\/j.jisa.2023.103686_b36","doi-asserted-by":"crossref","first-page":"2000","DOI":"10.1109\/TII.2021.3088465","article-title":"Compressed sensing framework for heart sound acquisition in internet of medical things","volume":"18","author":"Chen","year":"2022","journal-title":"IEEE Trans Ind Inf"},{"issue":"7","key":"10.1016\/j.jisa.2023.103686_b37","doi-asserted-by":"crossref","first-page":"5743","DOI":"10.1007\/s00521-021-06725-w","article-title":"Protection of image ROI using chaos-based encryption and DCNN-based object detection","volume":"34","author":"Song","year":"2022","journal-title":"Neural Comput Appl"},{"issue":"11","key":"10.1016\/j.jisa.2023.103686_b38","doi-asserted-by":"crossref","first-page":"3662","DOI":"10.1109\/JSAC.2023.3310097","article-title":"Digital twin empowered wireless healthcare monitoring for smart home","volume":"41","author":"Chen","year":"2023","journal-title":"IEEE J Sel Areas Commun"},{"key":"10.1016\/j.jisa.2023.103686_b39","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.117198","article-title":"CODH++: Macro-semantic differences oriented instance segmentation network","volume":"202","author":"Zhang","year":"2022","journal-title":"Expert Syst Appl"},{"key":"10.1016\/j.jisa.2023.103686_b40","article-title":"A more compact object detector head network with feature enhancement and relational reasoning","author":"Zhang","year":"2022","journal-title":"Neurocomputing"},{"issue":"18","key":"10.1016\/j.jisa.2023.103686_b41","doi-asserted-by":"crossref","first-page":"11627","DOI":"10.1007\/s00521-021-05867-1","article-title":"Global context aware RCNN for object detection","volume":"33","author":"Zhang","year":"2021","journal-title":"Neural Comput Appl"},{"key":"10.1016\/j.jisa.2023.103686_b42","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.ins.2020.02.024","article-title":"Cryptanalysis of a DNA-based image encryption scheme","volume":"520","author":"Chen","year":"2020","journal-title":"Inform Sci"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623002703?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623002703?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,2,27]],"date-time":"2024-02-27T22:57:43Z","timestamp":1709074663000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212623002703"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":42,"alternative-id":["S2214212623002703"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103686","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2024,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Batch image encryption using cross image permutation and diffusion","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103686","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103686"}}