{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T06:17:00Z","timestamp":1769149020452,"version":"3.49.0"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11042-020-10142-x","type":"journal-article","created":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T22:02:27Z","timestamp":1604095347000},"page":"7967-7985","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["An encryption scheme based on chaotic Rabinovich-Fabrikant system and S8 confusion component"],"prefix":"10.1007","volume":"80","author":[{"given":"Abdullah","family":"Alghafis","sequence":"first","affiliation":[]},{"given":"Noor","family":"Munir","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5454-3770","authenticated-orcid":false,"given":"Majid","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,30]]},"reference":[{"issue":"7","key":"10142_CR1","doi-asserted-by":"publisher","first-page":"266","DOI":"10.3390\/sym10070266","volume":"10","author":"M Ahmad","year":"2018","unstructured":"Ahmad M, Al Solami E, Wang X-Y, Doja MN, Beg MMS, Alzaidi AA (2018) Cryptanalysis of an image encryption algorithm based on combined chaos for BAN system and its improved scheme using SHA-512 and hyperchaos. Symmetry 10(7):266","journal-title":"Symmetry"},{"issue":"3","key":"10142_CR2","doi-asserted-by":"publisher","first-page":"1323","DOI":"10.3233\/JIFS-169428","volume":"34","author":"M Ahmad","year":"2018","unstructured":"Ahmad M, Alam MZ, Ansari S, Lambic D, AlSharari HD (2018) Cryptanalysis of an image encryption algorithm based on PWLCM and inertial delayed neural network. Journal of Intelligent & Fuzzy Systems 34(3):1323\u20131332","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"10142_CR3","unstructured":"Ahmad M, Doja MN, Beg MMS (2018) Security analysis and enhancements of an image cryptosystem based on hyperchaotic system. Journal of King Saud University-CIS"},{"issue":"3","key":"10142_CR4","doi-asserted-by":"publisher","first-page":"1715","DOI":"10.1007\/s11277-018-5787-1","volume":"101","author":"M Ahmad","year":"2018","unstructured":"Ahmad M, Doja MN, Beg MMS (2018) ABC optimization based construction of strong substitution-box. Wirel Pers Commun 101(3):1715\u20131729","journal-title":"Wirel Pers Commun"},{"key":"10142_CR5","doi-asserted-by":"publisher","unstructured":"Ahmed HA, Zolkipli MF, Ahmad M (May 2018) A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Computing and Applications 31:7201\u20137210. https:\/\/doi.org\/10.1007\/s00521-018-3557-3","DOI":"10.1007\/s00521-018-3557-3"},{"key":"10142_CR6","doi-asserted-by":"crossref","unstructured":"Al Solami E, Ahmad M, Volos C, Doja MN, Beg MMS (2018) A new hyperchaotic system-based design for efficient bijective substitution-boxes. Entropy 20(7): 525","DOI":"10.3390\/e20070525"},{"key":"10142_CR7","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1007\/s10773-020-04402-7","volume":"59","author":"A Alghafis","year":"2020","unstructured":"Alghafis A, Munir N, Khan M, Hussain I (2020) An encryption scheme based on discrete quantum map and continuous chaotic system. Int J Theor Phys 59:1227\u20131240","journal-title":"Int J Theor Phys"},{"key":"10142_CR8","doi-asserted-by":"publisher","unstructured":"Ali KM, Khan M (2019) A new construction of confusion component of block ciphers. Multimed Tools Appl 78:32585\u201332604. https:\/\/doi.org\/10.1007\/s11042-019-07866-w.","DOI":"10.1007\/s11042-019-07866-w"},{"issue":"01","key":"10142_CR9","doi-asserted-by":"publisher","first-page":"55405","DOI":"10.1109\/ACCESS.2018.2871557","volume":"6","author":"AA Alzaidi","year":"2018","unstructured":"Alzaidi AA, Ahmad M, Doja MN, Al Solami E, Beg MMS (2018) A new 1D chaotic map and beta-hill climbing for generating substitution-boxes. IEEE Access 6(01):55405\u201355418","journal-title":"IEEE Access"},{"key":"10142_CR10","doi-asserted-by":"crossref","unstructured":"Amer Awad Alzaidi, Musheer Ahmad, Hussam S. Ahmed, Eesa AlSolami (2018) Sine-cosine optimization based bijective substitution-boxes construction using enhanced dynamics of chaotic map. Complexity","DOI":"10.1155\/2018\/9389065"},{"key":"10142_CR11","doi-asserted-by":"publisher","first-page":"27611","DOI":"10.1007\/s11042-019-07881-x","volume":"78","author":"SI Batool","year":"2019","unstructured":"Batool SI, Waseem HM (2019) A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimed Tools Appl 78:27611\u201327637. https:\/\/doi.org\/10.1007\/s11042-019-07881-x","journal-title":"Multimed Tools Appl"},{"key":"10142_CR12","first-page":"22","volume":"200","author":"SE Borujeni","year":"2009","unstructured":"Borujeni SE, Eshghi M (2009) Chaotic image encryption design using tompkins-paige algorithm. Hindawi Publishing Corporation Mathematical Problem in Engineering 200:22","journal-title":"Hindawi Publishing Corporation Mathematical Problem in Engineering"},{"issue":"2","key":"10142_CR13","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/j.chaos.2005.08.110","volume":"29","author":"H Gao","year":"2006","unstructured":"Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29(2):393\u2013399","journal-title":"Chaos Solitons Fractals"},{"issue":"3","key":"10142_CR14","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"C Guarnong","year":"2004","unstructured":"Guarnong C, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3):749\u2013761","journal-title":"Chaos Solitons Fractals"},{"key":"10142_CR15","doi-asserted-by":"publisher","first-page":"2775","DOI":"10.1016\/j.optcom.2011.02.039","volume":"284","author":"Z Guoji","year":"2011","unstructured":"Guoji Z, Qing L (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284:2775\u20132780","journal-title":"Opt Commun"},{"key":"10142_CR16","doi-asserted-by":"publisher","unstructured":"Hamza R, Yan Z, Muhammad K, Bellavista P, Titouna F (2019) A privacy-preserving cryptosystem for IoT E-healthcare. Inf Sci 527:493\u2013510. https:\/\/doi.org\/10.1016\/j.ins.2019.01.070","DOI":"10.1016\/j.ins.2019.01.070"},{"key":"10142_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/1625678","volume":"2019","author":"R Hamza","year":"2019","unstructured":"Hamza R, Hassan A, Huang T, Ke L, Yan H (2019) An efficient cryptosystem for video surveillance in the internet of things environment. Complexity 2019:1\u201311","journal-title":"Complexity"},{"key":"10142_CR18","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/s11071-015-2173-3","volume":"82","author":"M Khan","year":"2015","unstructured":"Khan M (2015) A novel image encryption scheme based on multi-parameters chaotic S-boxes. Nonlinear Dynamics 82:527\u2013533","journal-title":"Nonlinear Dynamics"},{"key":"10142_CR19","doi-asserted-by":"publisher","first-page":"3450","DOI":"10.1177\/1077546314523029","volume":"21","author":"M Khan","year":"2015","unstructured":"Khan M (2015) An image encryption by using Fourier series. J Vib Control 21:3450\u20133455","journal-title":"J Vib Control"},{"key":"10142_CR20","doi-asserted-by":"publisher","first-page":"3091","DOI":"10.1007\/s10773-019-04188-3","volume":"58","author":"M Khan","year":"2019","unstructured":"Khan M (2019) Khawaja Muhammad Ali, construction and optimization of substitution boxes based on two-dimensional mixed chaotic maps. Int J Theor Phys 58:3091\u20133117. https:\/\/doi.org\/10.1007\/s10773-019-04188-3","journal-title":"Int J Theor Phys"},{"key":"10142_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2511-5","volume-title":"A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S 8 permutation","author":"M Khan","year":"2016","unstructured":"Khan M, Asghar Z (2016) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Springer, Neural Comput & Applic. https:\/\/doi.org\/10.1007\/s00521-016-2511-5"},{"key":"10142_CR22","doi-asserted-by":"publisher","unstructured":"Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimedia Tools and Applications 78:26203-26222. https:\/\/doi.org\/10.1007\/s11042-019-07818-4.","DOI":"10.1007\/s11042-019-07818-4"},{"key":"10142_CR23","doi-asserted-by":"publisher","unstructured":"Khan M, Munir N (2019) A novel image encryption technique based on generalized advanced encryption standard based on field of any characteristic, Wireless Pers Commun 109:849\u2013867. https:\/\/doi.org\/10.1007\/s11277-019-06594-6.","DOI":"10.1007\/s11277-019-06594-6"},{"key":"10142_CR24","doi-asserted-by":"crossref","unstructured":"Khan M, Naqvi SIB (2018) Utilization of small S-boxes for information hiding. Cryptographic and Information Security Approaches for Images and Videos","DOI":"10.1201\/9780429435461-18"},{"key":"10142_CR25","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1007\/s00521-015-1887-y","volume":"27","author":"M Khan","year":"2016","unstructured":"Khan M, Shah T (2016) Construction and applications of chaotic S-boxes in image encryption. Neural Comput & Applic, Springer 27:677\u2013685","journal-title":"Neural Comput & Applic, Springer"},{"issue":"11","key":"10142_CR26","doi-asserted-by":"publisher","first-page":"e0206460","DOI":"10.1371\/journal.pone.0206460","volume":"13","author":"M Khan","year":"2018","unstructured":"Khan M, Waseem HM (2018) A novel image encryption scheme based on quantum dynamical spinning and rotations. PloS one 13(11):e0206460","journal-title":"PloS one"},{"key":"10142_CR27","doi-asserted-by":"publisher","unstructured":"Khan M, Waseem HM (2019) A novel digital contents privacy scheme based on Kramer's arbitrary spin. Int J Theor Phys 58:2720\u20132743. https:\/\/doi.org\/10.1007\/s10773-019-04162-z","DOI":"10.1007\/s10773-019-04162-z"},{"key":"10142_CR28","doi-asserted-by":"crossref","unstructured":"Khanzadi H, Omam MA, Lotfifar F, Eshghi M (2010) Image encryption based on gyrator transforms using chaotic maps. In: 2010 IEEE 10th International Conference on Signal Processing (ICSP), pp 2608\u20132612","DOI":"10.1109\/ICOSP.2010.5656132"},{"key":"10142_CR29","doi-asserted-by":"publisher","unstructured":"Lambic D, Jankovic A, Ahmad M (2018) Security analysis of the efficient Chaos pseudo-random number generator applied to video encryption. J Electron Test 34:709\u2013715. https:\/\/doi.org\/10.1007\/s10836-018-5767-0","DOI":"10.1007\/s10836-018-5767-0"},{"issue":"13","key":"10142_CR30","doi-asserted-by":"publisher","first-page":"17973","DOI":"10.1007\/s11042-018-7122-y","volume":"78","author":"Y Li","year":"2019","unstructured":"Li Y, Ge G (2019) Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security. Multimedia Tools Appl 78(13):17973\u201317994","journal-title":"Multimedia Tools Appl"},{"issue":"4","key":"10142_CR31","doi-asserted-by":"publisher","first-page":"2387","DOI":"10.1007\/s11071-016-2652-1","volume":"84","author":"Y Li","year":"2016","unstructured":"Li Y, Ge G, Xia D (2016) Chaotic hash function based on the dynamic S-box with variable parameters. Nonlinear Dynamics 84(4):2387\u20132402","journal-title":"Nonlinear Dynamics"},{"issue":"18","key":"10142_CR32","doi-asserted-by":"publisher","first-page":"5756","DOI":"10.1002\/sec.1734","volume":"9","author":"X Liao","year":"2016","unstructured":"Liao X, Chen G, Yin J (2016) Content-adaptive steganalysis for color images. Security and Communication Networks 9(18):5756\u20135763","journal-title":"Security and Communication Networks"},{"key":"10142_CR33","doi-asserted-by":"publisher","first-page":"20739","DOI":"10.1007\/s11042-016-3971-4","volume":"76","author":"X Liao","year":"2017","unstructured":"Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76:20739\u201320753. https:\/\/doi.org\/10.1007\/s11042-016-3971-4","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"10142_CR34","doi-asserted-by":"publisher","first-page":"3613","DOI":"10.1142\/S021812740401151X","volume":"14","author":"Y Mao","year":"2004","unstructured":"Mao Y, Chen G, Lian S (2004) A novel fast image encryption scheme based on 3D chaotic bakermaps. Int J Bifurcation Chaos 14(10):3613\u20133624","journal-title":"Int J Bifurcation Chaos"},{"key":"10142_CR35","doi-asserted-by":"publisher","unstructured":"Munir N, Khan M (2018) A generalization of algebraic expression for nonlinear component of symmetric key algorithms of any characteristic p. In: International Conference on Applied and Engineering Mathematics. https:\/\/doi.org\/10.1109\/ICAEM.2018.8536308","DOI":"10.1109\/ICAEM.2018.8536308"},{"key":"10142_CR36","doi-asserted-by":"publisher","unstructured":"Munir N, Khan M, Wei Z, Akgul A, Amin M, Hussain I (2020) Circuit implementation of 3D chaotic self-exciting single-disk homopolar dynamo and its application in digital image confidentiality. Wireless Netw. https:\/\/doi.org\/10.1007\/s11276-020-02361-9","DOI":"10.1007\/s11276-020-02361-9"},{"issue":"9","key":"10142_CR37","doi-asserted-by":"publisher","first-page":"2137","DOI":"10.1109\/TIFS.2018.2812080","volume":"13","author":"M Preishuber","year":"2018","unstructured":"Preishuber M, H\u00fctter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Transactions on Information Forensics and Security 13(9):2137\u20132150","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10142_CR38","doi-asserted-by":"publisher","unstructured":"Rafiq A, Khan M (2018) Construction of new S-boxes based on triangle groups and its applications in copyright protection. Multimed Tools Appl 78:15527\u201315544. https:\/\/doi.org\/10.1007\/s11042-018-6953-x.","DOI":"10.1007\/s11042-018-6953-x"},{"key":"10142_CR39","first-page":"181","volume":"17","author":"X Tong","year":"2015","unstructured":"Tong X, Yang L, Zhang M, Xu H, Wang Z (2015) An image encryption scheme based on hyperchaotic rabinovich and exponential chaos maps 17:181\u2013196","journal-title":"An image encryption scheme based on hyperchaotic rabinovich and exponential chaos maps"},{"key":"10142_CR40","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","volume":"11","author":"Y Wang","year":"2009","unstructured":"Wang Y, Wong KW, Liao X, Chen G (2009) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11:514\u2013522","journal-title":"Appl Soft Comput"},{"key":"10142_CR41","doi-asserted-by":"publisher","first-page":"3584","DOI":"10.1007\/s10773-018-3872-6","volume":"57","author":"HM Waseem","year":"2018","unstructured":"Waseem HM, Khan M (2018) Information confidentiality using quantum spinning, rotation and finite state machine. International Journal of Theoretical Physics 57:3584\u20133594","journal-title":"International Journal of Theoretical Physics"},{"issue":"6","key":"10142_CR42","doi-asserted-by":"publisher","first-page":"063022","DOI":"10.1117\/1.JEI.27.6.063022","volume":"27","author":"HM Waseem","year":"2018","unstructured":"Waseem HM, Khan M, Shah T (2018) Image privacy scheme using quantum spinning and rotation. Journal of Electronic Imaging 27(6):063022","journal-title":"Journal of Electronic Imaging"},{"key":"10142_CR43","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s11071-015-2144-8","volume":"82","author":"Z Wei","year":"2015","unstructured":"Wei Z, Yu P, Zhang W, Yao M (2015) Study of hidden attractors, multiple limit cycles from Hopf bifurcation and boundedness of motion in the generalized hyperchaotic Rabinovich system. Nonlinear Dynamics 82:131\u2013141","journal-title":"Nonlinear Dynamics"},{"key":"10142_CR44","doi-asserted-by":"publisher","first-page":"1635","DOI":"10.1007\/s11071-016-2783-4","volume":"85","author":"Z Wei","year":"2016","unstructured":"Wei Z, Pham V-T, Kapitaniak T, Wang Z (2016) Bifurcation analysis and circuit realization for multiple-delayed Wang-Chen system with hidden chaotic attractors. Nonlinear Dynamics 85:1635\u20131650","journal-title":"Nonlinear Dynamics"},{"key":"10142_CR45","doi-asserted-by":"crossref","unstructured":"Wei Z, Moroz I, Wang Z, Sprott JC, Kapitaniak T (2016) Dynamics at infinity, degenerate Hopf and zero-Hopf bifurcation for Kingni-Jafari system with hidden attractors. International Int J Bifurcat Chaos 26(7)1650125","DOI":"10.1142\/S021812741650125X"},{"key":"10142_CR46","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1016\/j.amc.2018.10.090","volume":"347","author":"Z Wei","year":"2019","unstructured":"Wei Z, Zhu B, Yang J, Perc M, Slavinec M (2019) Bifurcation analysis of two disc dynamos with viscous friction and multiple time delays. Appl Math Comput 347:265\u2013281","journal-title":"Appl Math Comput"},{"issue":"2","key":"10142_CR47","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. Journal of Selected Areas in Telecommunications (JSAT) 1(2):31\u201338","journal-title":"Journal of Selected Areas in Telecommunications (JSAT)"},{"issue":"12","key":"10142_CR48","doi-asserted-by":"publisher","first-page":"913","DOI":"10.3390\/e20120913","volume":"20","author":"I Younas","year":"2018","unstructured":"Younas I, Khan M (2018) A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy 20(12):913","journal-title":"Entropy"},{"issue":"3","key":"10142_CR49","doi-asserted-by":"publisher","first-page":"245","DOI":"10.3390\/e21030245","volume":"21","author":"AH Zahid","year":"2019","unstructured":"Zahid AH, Arshad MJ, Ahmad M (2019) A novel construction of efficient substitution-boxes using cubic fractional transformation. Entropy 21(3):245","journal-title":"Entropy"},{"issue":"3","key":"10142_CR50","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1016\/j.chaos.2004.09.035","volume":"24","author":"L Zhang","year":"2005","unstructured":"Zhang L, Liao X, Wang X (2005) An image encryption approach based on chaotic maps. Chaos Solitons Fractals 24(3):759\u2013765","journal-title":"Chaos Solitons Fractals"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10142-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-10142-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10142-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T07:56:58Z","timestamp":1698307018000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-10142-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"references-count":50,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["10142"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10142-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,30]]},"assertion":[{"value":"28 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}