{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T13:03:54Z","timestamp":1773061434239,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"17-18","license":[{"start":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T00:00:00Z","timestamp":1578960000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T00:00:00Z","timestamp":1578960000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"crossref","award":["No. ZR2019MF054"],"award-info":[{"award-number":["No. ZR2019MF054"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Foundation of Science and Technology on Information Assurance Laboratory","award":["No.KJ-17-004"],"award-info":[{"award-number":["No.KJ-17-004"]}]},{"name":"2017 Weihai University Co-construction Project","award":["None"],"award-info":[{"award-number":["None"]}]},{"name":"Equip Pre-research Projects of 2018, Foundation of China Academy of Space Technology","award":["No. WT-TXYY\/ WLZDFHJY003"],"award-info":[{"award-number":["No. WT-TXYY\/ WLZDFHJY003"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s11042-019-08478-0","type":"journal-article","created":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T08:02:21Z","timestamp":1578988941000},"page":"12329-12347","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["A novel method of dynamic S-box design based on combined chaotic map and fitness function"],"prefix":"10.1007","volume":"79","author":[{"given":"Honghong","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Xiaojun","family":"Tong","sequence":"additional","affiliation":[]},{"given":"Zhu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,14]]},"reference":[{"key":"8478_CR1","unstructured":"Belazi A, Khan M, Abd El-Latif AA, Belghith S (2016) Efficient cryptosystem approaches: S-boxes and permutationsubstitution-based encryption. Nonlinear Dyn. 87(1):1\u201325"},{"issue":"1","key":"8478_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A (1991) Differential cryptanalysis of des-like cryptosystems. J Cryptol 4(1):3\u201372","journal-title":"J Cryptol"},{"key":"8478_CR3","doi-asserted-by":"crossref","unstructured":"Chen X, Hu CJ (2017) Adaptive medical image encryption algorithm based on multiple chaotic mapping. Saudi J. Biol. Sci. 24(8):1821\u20131827","DOI":"10.1016\/j.sjbs.2017.11.023"},{"key":"8478_CR4","volume-title":"Joan Daemen, and Vincent Rijmen","author":"J Daor","year":"1998","unstructured":"Daor J (1998) Joan Daemen, and Vincent Rijmen. AES proposal, Rijndael"},{"key":"8478_CR5","doi-asserted-by":"crossref","unstructured":"Tarek Farah, Rhouma Rhouma, and Safya Belghith. A novel method for designing S-box based on chaotic map and TeachingLearning-Based Optimization. Nonlinear\u00a0Dyn. 88(2):1059\u20131074, 2017.","DOI":"10.1007\/s11071-016-3295-y"},{"issue":"4","key":"8478_CR6","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1016\/j.chaos.2006.08.006","volume":"36","author":"C Guo","year":"2008","unstructured":"Guo C (2008) A novel heuristic method for obtaining sboxes. Chaos Solitons and Fractals. 36(4):1028\u20131036","journal-title":"Chaos Solitons and Fractals"},{"key":"8478_CR7","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"Z Hua","year":"2016","unstructured":"Hua Z, Zhou Y (2016) Image encryption using 2D logistic-adjusted-sine map. Inform. Sci. 339:237\u2013253","journal-title":"Inform. Sci."},{"key":"8478_CR8","doi-asserted-by":"crossref","unstructured":"Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans. Circuits Syst. 48(2):163\u2013169","DOI":"10.1109\/81.904880"},{"key":"8478_CR9","doi-asserted-by":"crossref","unstructured":"Khan M (2015) A novel image encryption scheme based on multiple chaotic S-boxes. Nonlinear\u00a0Dyn. 82(1\u20132):527\u2013533","DOI":"10.1007\/s11071-015-2173-3"},{"issue":"4","key":"8478_CR10","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1007\/s00521-016-2511-5","volume":"29","author":"M Khan","year":"2018","unstructured":"Khan M, Asghar Z (2018) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8permutation. Neural Comput. Applic. 29(4):993\u2013999","journal-title":"Neural Comput. Applic."},{"key":"8478_CR11","doi-asserted-by":"crossref","unstructured":"Khan M, Shah T, Mahmood H, Gondal MA (2013) An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn. 71(3):489\u2013492","DOI":"10.1007\/s11071-012-0675-9"},{"key":"8478_CR12","doi-asserted-by":"crossref","unstructured":"P. A. W. Lewis, A. S. Goodman, and J. M. Miller (1969)\u00a0A pseudo-random number generator for the system\/360. IBM Syst. J. 8(2):136-146.","DOI":"10.1147\/sj.82.0136"},{"key":"8478_CR13","doi-asserted-by":"crossref","unstructured":"Matsui M (1994) Linear cryptanalysis method for DES Cipher. Advances in Cryptology \u2014 EUROCRYPT \u201993. Springer Berlin Heidelberg. 386\u2013397","DOI":"10.1007\/3-540-48285-7_33"},{"key":"8478_CR14","doi-asserted-by":"crossref","unstructured":"Ozkaynak F, \u1e08elik V, \u00d6zer AB (2017) A new S-box construction method based on the fractionalorder chaotic Chen system. Signal Image Video P. 11(4):659\u2013664","DOI":"10.1007\/s11760-016-1007-1"},{"key":"8478_CR15","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process. 138:129\u2013137","journal-title":"Signal Process"},{"key":"8478_CR16","doi-asserted-by":"crossref","unstructured":"Tong XJ (2012) The novel bilateral diffusion image encryption algorithm with dynamical compound chaos. J Syst Software. 85(4):850\u2013858","DOI":"10.1016\/j.jss.2011.10.051"},{"key":"8478_CR17","doi-asserted-by":"crossref","unstructured":"Tong X, Liu Y, Zhang M et al (2012) A novel image encryption scheme based on dynamical multiple Chaos and baker map[C]\/\/ international symposium on distributed Computing & Applications to business. IEEE Computer Society","DOI":"10.1109\/DCABES.2012.94"},{"key":"8478_CR18","doi-asserted-by":"crossref","unstructured":"Ullah A, Jamal SS, Shah T (2017) A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn. 88(4):2757\u20132769","DOI":"10.1007\/s11071-017-3409-1"},{"key":"8478_CR19","doi-asserted-by":"crossref","unstructured":"Ullah A, Jamal SS, Shah T (2018) A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn. 91(1):359\u2013370","DOI":"10.1007\/s11071-017-3874-6"},{"issue":"67","key":"8478_CR20","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1016\/j.physleta.2012.01.009","volume":"376","author":"Y Wang","year":"2012","unstructured":"Wang Y, Wong KW, Li C, Li Y (2012) A novel method to design s-box based on chaotic map and genetic algorithm. Physics Letters A 376(67):827\u2013833","journal-title":"Physics Letters A"},{"key":"8478_CR21","unstructured":"Webster AF, Tavares SE (1986) On the design of S-Boxes. Springer, Berlin Heidelberg"},{"key":"8478_CR22","unstructured":"Wu D, Weihong X (2011) Study on the relationship between S-box differential analysis and nonlinearity. Journal of Changsha University 25(5)"},{"key":"8478_CR23","unstructured":"XiangYang X (2010) A new genetic algorithm and tabu search for S-box optimization. In International Conference on Computer Design and Applications. V4\u2013492-V4\u2013495"},{"key":"8478_CR24","doi-asserted-by":"crossref","unstructured":"Zaibi G, Peyrard F, Kachouri A et al (2014) Efficient and secure chaotic S-box for wireless sensor network[J]. \u00a0Secur Commun Netw. 7(2):279\u2013292","DOI":"10.1002\/sec.728"},{"key":"8478_CR25","doi-asserted-by":"crossref","unstructured":"Zhang T, Li S, Ge R, Yuan M, Ma Y (2016) A novel 1D hybrid chaotic map-basedimage compression and encryption using compressed sensing and fibonacci-lucas transform. Math. Probl. Eng.","DOI":"10.1155\/2016\/7683687"},{"key":"8478_CR26","doi-asserted-by":"crossref","unstructured":"Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process. 97:172\u2013182","DOI":"10.1016\/j.sigpro.2013.10.034"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08478-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-08478-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08478-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T21:08:05Z","timestamp":1610572085000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-08478-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,14]]},"references-count":26,"journal-issue":{"issue":"17-18","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["8478"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08478-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,14]]},"assertion":[{"value":"14 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 October 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}