{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T13:35:39Z","timestamp":1751376939070,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2023,11,4]],"date-time":"2023-11-04T00:00:00Z","timestamp":1699056000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,4]],"date-time":"2023-11-04T00:00:00Z","timestamp":1699056000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Basic\u00a0scientific\u00a0research\u00a0projects\u00a0of\u00a0Liaoning\u00a0Provincial\u00a0Department\u00a0of\u00a0Education","award":["LJKMZ20221729"],"award-info":[{"award-number":["LJKMZ20221729"]}]},{"name":"2021\u00a0Liaoning\u00a0Provincial\u00a0Natural\u00a0Science \u00a0Foundation\u00a0Innovation\u00a0Capability\u00a0Enhancement\u00a0Joint\u00a0Fund","award":["2021-NLTS-13-01"],"award-info":[{"award-number":["2021-NLTS-13-01"]}]},{"name":"The\u00a0Liaoning\u00a0Province\u00a0Applied\u00a0Basic\u00a0Research\u00a0Project","award":["2022JH2\/101300134"],"award-info":[{"award-number":["2022JH2\/101300134"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17581-2","type":"journal-article","created":{"date-parts":[[2023,11,4]],"date-time":"2023-11-04T08:02:42Z","timestamp":1699084962000},"page":"50087-50109","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Securing chaos-based bit-level color image using bit plane permutation and dynamic DNA technology"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-2245-8085","authenticated-orcid":false,"given":"Wenqiang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zeyu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jiao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Na","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Hongjiang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mingxu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Liming","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,4]]},"reference":[{"issue":"5","key":"17581_CR1","doi-asserted-by":"publisher","first-page":"2563","DOI":"10.1007\/s11831-021-09656-w","volume":"29","author":"M Kaur","year":"2022","unstructured":"Kaur M, Singh S, Kaur M, Singh A, Singh D (2022) A Systematic Review of Metaheuristic-based Image Encryption Techniques. Arch Comput Methods Eng 29(5):2563\u20132577","journal-title":"Arch Comput Methods Eng"},{"issue":"2","key":"17581_CR2","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1175\/1520-0469(1963)020<0130:DNF>2.0.CO;2","volume":"20","author":"EN Lorenz","year":"1963","unstructured":"Lorenz EN (1963) Deterministic nonperiodic flow. J Atmos Sci 20(2):130\u2013141","journal-title":"J Atmos Sci"},{"issue":"6","key":"17581_CR3","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.matcom.2022.07.030","volume":"204","author":"L Liu","year":"2023","unstructured":"Liu L, Wang J (2023) A cluster of 1D quadratic chaotic map and its applications in image encryption. Math Comput Simulat 204(6):89\u2013114","journal-title":"Math Comput Simulat"},{"issue":"8","key":"17581_CR4","doi-asserted-by":"publisher","first-page":"3703","DOI":"10.1007\/s00500-022-06841-2","volume":"26","author":"M Kaur","year":"2022","unstructured":"Kaur M, Singh D, Kumar V (2022) Improved seven-dimensional (i7D) hyperchaotic map-based image encryption technique. Soft Comput 26(8):3703\u20133712","journal-title":"Soft Comput"},{"issue":"12","key":"17581_CR5","doi-asserted-by":"publisher","first-page":"15997","DOI":"10.1007\/s11042-018-6996-z","volume":"78","author":"H Liu","year":"2019","unstructured":"Liu H, Wen F, Kadir A (2019) Construction of a new 2D Chebyshev-Sine map and its application to color image encryption. Multimed Tools Appl 78(12):15997\u201316010","journal-title":"Multimed Tools Appl"},{"key":"17581_CR6","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1016\/j.optlastec.2018.07.052","volume":"108","author":"M Wang","year":"2018","unstructured":"Wang M, Wang X, Zhang Y, Gao Z (2018) A novel chaotic encryption scheme based on image segmentation and multiple diffusion models. Opt Laser Technol 108:558\u2013573","journal-title":"Opt Laser Technol"},{"key":"17581_CR7","doi-asserted-by":"publisher","unstructured":"Su Y, Wang X (2023) \u201cQuantum color image encryption based on controlled two-particle quantum walks.\u201d Multimed Tools Appl. https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s11042-023-15189-0.","DOI":"10.1007\/s11042-023-15189-0"},{"issue":"16","key":"17581_CR8","doi-asserted-by":"publisher","first-page":"23899","DOI":"10.1007\/s11042-022-12069-x","volume":"82","author":"H Liu","year":"2023","unstructured":"Liu H, Liu J, Ma C (2023) Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption. Multimed Tools Appl 82(16):23899\u201323914","journal-title":"Multimed Tools Appl"},{"issue":"17","key":"17581_CR9","doi-asserted-by":"publisher","first-page":"25559","DOI":"10.1007\/s11042-023-14394-1","volume":"82","author":"S Yang","year":"2023","unstructured":"Yang S, Tong X, Wang Z, Zhang M (2023) S-box generation algorithm based on hyperchaotic system and its application in image encryption. Multimed Tools Appl 82(17):25559\u201325583","journal-title":"Multimed Tools Appl"},{"key":"17581_CR10","doi-asserted-by":"crossref","unstructured":"Liu HH, Wang X, Zha M, Niu Y (2022) \u201cConstructing strong S-Box by 2D chaotic map with application to irreversible parallel key expansion.\u201d Int J Bifurcation Chaos 32(11)","DOI":"10.1142\/S0218127422501632"},{"key":"17581_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15992-9","author":"S Sabir","year":"2023","unstructured":"Sabir S, Guleria V (2023) Multi-layer permutation-substitution operations based novel lossless multiple color image encryption. Multimed Tools Appl. https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s11042-023-15992-9","journal-title":"Multimed Tools Appl"},{"key":"17581_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2020.07.051","volume":"544","author":"M Wang","year":"2021","unstructured":"Wang M, Wang X, Zhao T, Zhang C, Xia Z, Yao N (2021) Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme. Inf Sci 544:1\u201324","journal-title":"Inf Sci"},{"key":"17581_CR13","doi-asserted-by":"publisher","first-page":"74048","DOI":"10.1109\/ACCESS.2023.3294570","volume":"11","author":"M Kaur","year":"2023","unstructured":"Kaur M, AlZubi AA, Singh D, Kumar V, Lee H-N (2023) Lightweight Biomedical Image Encryption Approach. IEEE Access 11:74048\u201374057","journal-title":"IEEE Access"},{"key":"17581_CR14","doi-asserted-by":"publisher","unstructured":"Ismail R, Fattah A, Saqr HM, Nasr ME (2022) \u201cAn efficient medical image encryption scheme for (WBAN) based on adaptive DNA and modern multi chaotic map. MultimedTools Appl. Doi: https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s11042-022-13343-8","DOI":"10.1007\/s11042-022-13343-8"},{"key":"17581_CR15","doi-asserted-by":"publisher","unstructured":"Li Q, Chen L (2023) \u201cAn image encryption algorithm based on 6-dimensional hyper chaotic system and DNA encoding.\u201d Multimed.Tools Appl. Doi: https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s11042-023-15550-3","DOI":"10.1007\/s11042-023-15550-3"},{"issue":"26","key":"17581_CR16","doi-asserted-by":"publisher","first-page":"37873","DOI":"10.1007\/s11042-022-13095-5","volume":"81","author":"LSJ Paul","year":"2022","unstructured":"Paul LSJ, Gracias C, Desai A, Thanikaiselvan V, Shanthini SS, Rengarajan A (2022) A novel colour image encryption scheme using dynamic DNA coding, chaotic maps, and SHA-2. Multimed Tools Appl 81(26):37873\u201337894","journal-title":"Multimed Tools Appl"},{"key":"17581_CR17","doi-asserted-by":"publisher","unstructured":"Dehghani R, Kheiri H (2023) \u201cChaotic-based color image encryption using a hybrid method of reversible cellular automata and DNA sequences.\u201d Multimed Tools Appl. doi: https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s11042-023-16118-x","DOI":"10.1007\/s11042-023-16118-x"},{"key":"17581_CR18","doi-asserted-by":"publisher","first-page":"117861","DOI":"10.1016\/j.eswa.2022.117861","volume":"206","author":"J Bhat","year":"2022","unstructured":"Bhat J, Moon AH (2022) Color image encryption and authentication using dynamic DNA encoding and Hyper Chaotic System. Expert Syst. Appl. 206:117861. https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.eswa.2022.117861","journal-title":"Expert Syst. Appl."},{"key":"17581_CR19","doi-asserted-by":"publisher","first-page":"75834","DOI":"10.1109\/ACCESS.2018.2883690","volume":"6","author":"C Li","year":"2018","unstructured":"Li C, Lin D, Feng B, Lu J, Hao F (2018) Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6:75834\u201375842","journal-title":"IEEE Access"},{"issue":"8","key":"17581_CR20","doi-asserted-by":"publisher","first-page":"1950103","DOI":"10.1142\/S0218127419501037","volume":"29","author":"K Panwar","year":"2019","unstructured":"Panwar K, Purwar RK, Jain A (2019) Cryptanalysis and improvement of a color image encryption scheme based on DNA sequences and multiple 1D chaotic maps. Int J Bifurcation Chaos. 29(8):1950103","journal-title":"Int J Bifurcation Chaos."},{"key":"17581_CR21","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.ins.2018.08.028","volume":"470","author":"C Wang","year":"2019","unstructured":"Wang C, Wang X, Xia Z, Zhang C (2019) Ternary radial harmonic Fourier moments based robust stereo image zero watermarking algorithm. Inf Sci 470:109\u2013120","journal-title":"Inf Sci"},{"issue":"3","key":"17581_CR22","doi-asserted-by":"publisher","DOI":"10.1063\/1.5087512","volume":"29","author":"S Zhou","year":"2019","unstructured":"Zhou S, Wang X, Wang ZZ, Zhang C (2019) A novel method based on the pseudo orbits to calculate the largest Lyapunov exponent from chaotic equations. Chaos 29(3):033125","journal-title":"Chaos"},{"issue":"7","key":"17581_CR23","doi-asserted-by":"publisher","first-page":"581","DOI":"10.7326\/0003-4819-138-7-200304010-00015","volume":"138","author":"JD Watson","year":"2003","unstructured":"Watson JD, Crick FH (2003) A structure for deoxyribose nucleic acid. Ann Intern Med 138(7):581\u2013582","journal-title":"Ann Intern Med"},{"issue":"6\u20137","key":"17581_CR24","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1016\/j.dam.2005.07.015","volume":"155","author":"OD King","year":"2007","unstructured":"King OD, Gaborit P (2007) Binary templates for comma-free DNA codes. Discret Appl Math 155(6\u20137):831\u2013839","journal-title":"Discret Appl Math"},{"issue":"24","key":"17581_CR25","doi-asserted-by":"publisher","first-page":"7166","DOI":"10.1016\/j.ijleo.2014.07.111","volume":"125","author":"T Xie","year":"2014","unstructured":"Xie T, Liu Y, Tang J (2014) Breaking a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik 125(24):7166\u20137169","journal-title":"Optik"},{"key":"17581_CR26","doi-asserted-by":"publisher","first-page":"110028","DOI":"10.1016\/j.chaos.2020.110028","volume":"139","author":"M Wang","year":"2020","unstructured":"Wang M, Wang X, Wang C, Xia Z, Zhao H, Gao S, Zhou S, Yao N (2020) Spatiotemporal chaos in cross coupled map lattice with dynamic coupling coefficient and its application in bit-level color image encryption. Chaos Soliton Fract 139:110028","journal-title":"Chaos Soliton Fract"},{"issue":"10","key":"17581_CR27","doi-asserted-by":"publisher","first-page":"100503","DOI":"10.1088\/1674-1056\/25\/10\/100503","volume":"25","author":"X Chai","year":"2016","unstructured":"Chai X, Gan Z, Lu Y, Zhang M, Chen Y (2016) A novel color image encryption algorithm based on genetic recombination and the four-dimensional memristive hyperchaotic system. Chin. Phys. B 25(10):100503","journal-title":"Chin. Phys. B"},{"key":"17581_CR28","first-page":"110028","volume":"139","author":"C Chen","year":"2020","unstructured":"Chen C, Kehui S, Shaobo H (2020) An improved image encryption algorithm with finite computing precision. Signal Process 139:110028","journal-title":"Signal Process"},{"key":"17581_CR29","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.optlaseng.2017.11.001","volume":"102","author":"J Li","year":"2018","unstructured":"Li J, Xiang S, Wang H, Gong J, Wen A (2018) A novel image encryption algorithm based on synchronized random bit generated in cascade coupled chaotic semiconductor ring lasers. Opt Lasers Eng 102:170\u2013180","journal-title":"Opt Lasers Eng"},{"issue":"8","key":"17581_CR30","first-page":"5883","volume":"34","author":"G Kaur","year":"2022","unstructured":"Kaur G, Agarwal R, Patidar V (2022) Color image encryption system using combination of robust chaos and chaotic order fractional Hartley transformation. J King Saud Univ 34(8):5883\u20135897","journal-title":"J King Saud Univ"},{"key":"17581_CR31","first-page":"169430","volume":"265","author":"M Demirtas","year":"2022","unstructured":"Demirtas M (2022) A new RGB color image encryption scheme based on cross-channel pixel and bit scrambling using chaos. Optic 265:169430","journal-title":"Optic"},{"issue":"3","key":"17581_CR32","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1007\/s00371-021-02066-w","volume":"38","author":"G Kaur","year":"2022","unstructured":"Kaur G, Agarwal R, Patidar V (2022) Color image encryption scheme based on fractional Hartley transform and chaotic substitution-permutation. Visual Comput 38(3):1027\u20131050","journal-title":"Visual Comput"},{"issue":"21","key":"17581_CR33","doi-asserted-by":"publisher","first-page":"27919","DOI":"10.1007\/s11042-018-5974-9","volume":"77","author":"Z Gan","year":"2018","unstructured":"Gan Z, Chai X, Zhang M, Lu Y (2018) A double color image encryption scheme based on three dimensional brownian motion. Multimed Tools Appl 77(21):27919\u201327953","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"17581_CR34","doi-asserted-by":"publisher","first-page":"6883","DOI":"10.1007\/s11042-017-4605-1","volume":"77","author":"L Teng","year":"2018","unstructured":"Teng L, Wang X, Meng J (2018) A chaotic color image encryption using integrated bit level permutation. Multimed Tools Appl 77(6):6883\u20136896","journal-title":"Multimed Tools Appl"},{"key":"17581_CR35","first-page":"83","volume":"360","author":"H Liu","year":"2019","unstructured":"Liu H, Zhang Y, Kadir A, Xu Y (2019) Image encryption using complex hyper chaotic system by injecting impulse into parameters. Appl Comput Math 360:83\u201393","journal-title":"Appl Comput Math"},{"key":"17581_CR36","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"X Chai","year":"2019","unstructured":"Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44\u201362","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17581-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/link.springer.com\/article\/10.1007\/s11042-023-17581-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17581-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T07:15:24Z","timestamp":1715757324000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/link.springer.com\/10.1007\/s11042-023-17581-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,4]]},"references-count":36,"journal-issue":{"issue":"17","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["17581"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s11042-023-17581-2","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,11,4]]},"assertion":[{"value":"11 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"All protocols and procedures were adhered to institutional ethical standards and\/or research committee and with the 1964 Helsinki declaration and its later amendments or comparable ethical standards.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human participants and\/or animals"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}