{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T05:49:57Z","timestamp":1768283397720,"version":"3.49.0"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T00:00:00Z","timestamp":1614902400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T00:00:00Z","timestamp":1614902400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-021-10587-8","type":"journal-article","created":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T23:02:46Z","timestamp":1614985366000},"page":"20191-20215","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["A novel finite rings based algebraic scheme of evolving secure S-boxes for images encryption"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1898-4082","authenticated-orcid":false,"given":"Abdul","family":"Razaq","sequence":"first","affiliation":[]},{"family":"Iqra","sequence":"additional","affiliation":[]},{"given":"Musheer","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Muhammad Awais","family":"Yousaf","sequence":"additional","affiliation":[]},{"given":"Sarfaraz","family":"Masood","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,5]]},"reference":[{"key":"10587_CR1","doi-asserted-by":"crossref","unstructured":"Abd-El-Atty B, Amin M, Abd-El-Latif A, Ugail H, Mehmood I (2019) An efficient cryptosystem based on the logistic-Chebyshev map. In 2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA) (pp. 1\u20136). IEEE","DOI":"10.1109\/SKIMA47702.2019.8982535"},{"key":"10587_CR2","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1016\/j.procs.2015.07.394","volume":"57","author":"M Ahmad","year":"2015","unstructured":"Ahmad M, Bhatia D, Hassan Y (2015) A novel ant colony optimization based scheme for substitution box design. Procedia Comput Sci 57:572\u2013580","journal-title":"Procedia Comput Sci"},{"key":"10587_CR3","doi-asserted-by":"crossref","unstructured":"Ahmad M, Mittal N, Garg P, Khan MM (2016) Efficient cryptographic substitution box design using travelling salesman problem and chaos. Perspect Sci 8:465\u2013468","DOI":"10.1016\/j.pisc.2016.06.001"},{"key":"10587_CR4","doi-asserted-by":"crossref","unstructured":"Ahmed HA, Zolkipli MF, Ahmad M (2018) A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput & Applic:1\u201310","DOI":"10.1007\/s00521-018-3557-3"},{"issue":"12","key":"10587_CR5","doi-asserted-by":"publisher","first-page":"2959","DOI":"10.1109\/26.477498","volume":"43","author":"ME Ahmet","year":"1995","unstructured":"Ahmet ME, Paul SF (1995) Image quality measures and their performance. IEEE Trans Commun 43(12):2959\u20132965","journal-title":"IEEE Trans Commun"},{"key":"10587_CR6","doi-asserted-by":"crossref","unstructured":"Alhadawi HS, Majid MA, Lambi\u0107 D, Ahmad M (2020) A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm. Multimed Tools Appl:1-18","DOI":"10.1007\/s11042-020-10048-8"},{"issue":"3","key":"10587_CR7","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1007\/s11277-015-2295-4","volume":"82","author":"A Anees","year":"2015","unstructured":"Anees A, Ahmed Z (2015) A technique for designing substitution box based on van der pol oscillator. Wirel Pers Commun 82(3):1497\u20131503","journal-title":"Wirel Pers Commun"},{"issue":"4","key":"10587_CR8","doi-asserted-by":"publisher","first-page":"571","DOI":"10.3390\/sym12040571","volume":"12","author":"F Artu\u011fer","year":"2020","unstructured":"Artu\u011fer F, \u00d6zkaynak F (2020) A novel method for performance improvement of Chaos-based substitution boxes. Symmetry 12(4):571","journal-title":"Symmetry"},{"key":"10587_CR9","doi-asserted-by":"crossref","unstructured":"Cassal-Quiroga BB, Campos-Cant\u00f3n E (2020) Generation of Dynamical S-Boxes for Block Ciphers via Extended Logistic Map. Mathematical Prob Eng","DOI":"10.1155\/2020\/2702653"},{"key":"10587_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael-AES:the advanced encryption standard","author":"J Daemen","year":"2002","unstructured":"Daemen J, Rijmen V (2002) The Design of Rijndael-AES:the advanced encryption standard. Springer, Berlin"},{"key":"10587_CR11","unstructured":"Dawson MH (1992) A unified framework for substitution box design based on information theory"},{"issue":"2","key":"10587_CR12","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1007\/s11071-016-3295-y","volume":"88","author":"T Farah","year":"2017","unstructured":"Farah T, Rhouma R, Belghith S (2017) A novel method for designing S-box based on chaotic map and Teaching\u2013Learning-Based Optimization. Nonlinear Dynamics 88(2):1059\u20131074","journal-title":"Nonlinear Dynamics"},{"key":"10587_CR13","doi-asserted-by":"crossref","unstructured":"Guesmi R, Farah MAB, Kachouri A, Samet M (2014) A novel design of Chaos based S-Boxes using genetic algorithm techniques. In 2014 IEEE\/ACS 11th International Conference on Computer Systems and Applications (AICCSA) (pp. 678\u2013684). IEEE Computer Society","DOI":"10.1109\/AICCSA.2014.7073265"},{"key":"10587_CR14","doi-asserted-by":"publisher","first-page":"282","DOI":"10.5560\/zna.2012-0022","volume":"67a","author":"I Hussain","year":"2012","unstructured":"Hussain I, Shah T, Gondal MA, Mahmood H (2012) Generalized majority logic criterion to analyze the statistical strength of S-boxes. Z Naturforsch A 67a:282\u2013288","journal-title":"Z Naturforsch A"},{"key":"10587_CR15","doi-asserted-by":"crossref","unstructured":"Huynh-Thu Q, Ghanbari M (2008) Scope of validity of PSNR in image\/video quality assessment. Electronic Letters 44(13):800\u2013801","DOI":"10.1049\/el:20080522"},{"key":"10587_CR16","doi-asserted-by":"crossref","unstructured":"Javeed A, Shah T, Ullah A (2020) Construction of non-linear component of block cipher by means of chaotic dynamical system and symmetric group. Wirel Pers Commun:1\u201314","DOI":"10.1007\/s11277-020-07052-4"},{"key":"10587_CR17","doi-asserted-by":"crossref","unstructured":"Khan M, Shah T (2015) A novel construction of substitution box with Zaslavskii chaotic map and symmetric group. J Intell Fuzzy Syst 28(4):1509\u20131517","DOI":"10.3233\/IFS-141434"},{"key":"10587_CR18","doi-asserted-by":"crossref","unstructured":"Khan M, Shah T, Mahmood H, Gondal MA (2013) An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dynamics 71(3):489\u2013492","DOI":"10.1007\/s11071-012-0675-9"},{"issue":"3","key":"10587_CR19","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1007\/s00521-015-1887-y","volume":"27","author":"M Khan","year":"2015","unstructured":"Khan M, Shah T, Batool SI (2015) Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comput & Applic 27(3):677\u2013685","journal-title":"Neural Comput & Applic"},{"key":"10587_CR20","doi-asserted-by":"publisher","first-page":"15999","DOI":"10.1109\/ACCESS.2019.2893176","volume":"7","author":"MF Khan","year":"2019","unstructured":"Khan MF, Ahmed A, Saleem K (2019) A novel cryptographic substitution box design using Gaussian distribution. IEEE Access 7:15999\u201316007","journal-title":"IEEE Access"},{"issue":"4","key":"10587_CR21","doi-asserted-by":"publisher","first-page":"2407","DOI":"10.1007\/s11071-016-3199-x","volume":"87","author":"D Lambi\u0107","year":"2017","unstructured":"Lambi\u0107 D (2017) A novel method of S-box design based on discrete chaotic map. Nonlinear Dynamics 87(4):2407\u20132413","journal-title":"Nonlinear Dynamics"},{"key":"10587_CR22","doi-asserted-by":"crossref","unstructured":"Lambi\u0107 D (2020) A new discrete-space chaotic map based on the multiplication of integer numbers and its application in S-box design. Nonlinear Dynamics:1-13","DOI":"10.1007\/s11071-020-05503-y"},{"key":"10587_CR23","doi-asserted-by":"publisher","first-page":"25664","DOI":"10.1109\/ACCESS.2020.2970806","volume":"8","author":"Q Lu","year":"2020","unstructured":"Lu Q, Zhu C, Deng X (2020) An efficient image encryption scheme based on the LSS chaotic map and single S-box. IEEE Access 8:25664\u201325678","journal-title":"IEEE Access"},{"key":"10587_CR24","first-page":"386","volume-title":"Workshop on the theory and application of of cryptographic techniques","author":"M Matsui","year":"1993","unstructured":"Matsui M (1993) Linear cryptanalysis method for DES cipher. In: Workshop on the theory and application of of cryptographic techniques. Springer, Berlin, pp 386\u2013397"},{"issue":"9","key":"10587_CR25","doi-asserted-by":"publisher","first-page":"795","DOI":"10.1049\/iet-ipr.2014.0395","volume":"9","author":"N Muhammad","year":"2015","unstructured":"Muhammad N, Bibi N (2015) Digital image watermarking using partial pivoting lower and upper triangular decomposition into the wavelet domain. IET Image Process 9(9):795\u2013803","journal-title":"IET Image Process"},{"key":"10587_CR26","doi-asserted-by":"publisher","first-page":"56581","DOI":"10.1109\/ACCESS.2020.2982827","volume":"8","author":"ZMZ Muhammad","year":"2020","unstructured":"Muhammad ZMZ, \u00d6zkaynak F (2020) An image encryption algorithm based on chaotic selection of robust cryptographic primitives. IEEE Access 8:56581\u201356589","journal-title":"IEEE Access"},{"issue":"4","key":"10587_CR27","doi-asserted-by":"publisher","first-page":"997","DOI":"10.1007\/s10044-017-0613-z","volume":"21","author":"N Muhammad","year":"2018","unstructured":"Muhammad N, Bibi N, Qasim I, Jahangir A, Mahmood Z (2018) Digital watermarking using hall property image decomposition method. Pattern Anal Applic 21(4):997\u20131012","journal-title":"Pattern Anal Applic"},{"issue":"1","key":"10587_CR28","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1504\/IJICA.2007.013404","volume":"1","author":"N Nedjah","year":"2007","unstructured":"Nedjah N, Mourelle LDM (2007) Designing substitution boxes for secure ciphers. Int J Innov Comput Appl 1(1):86\u201391","journal-title":"Int J Innov Comput Appl"},{"key":"10587_CR29","doi-asserted-by":"crossref","unstructured":"\u00d6zkaynak F (2017) Construction of robust substitution boxes based on chaotic systems. Neural Comput Appl:1\u201310","DOI":"10.1007\/s00521-017-3287-y"},{"key":"10587_CR30","doi-asserted-by":"crossref","unstructured":"Pieprzyk J, Finkelstein G (1988) Towards effective nonlinear cryptosystem design. IEE Proc E-Comput Digital Tech 135(6):325\u2013335","DOI":"10.1049\/ip-e.1988.0044"},{"key":"10587_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/5101934","volume":"2017","author":"A Razaq","year":"2017","unstructured":"Razaq A, Yousaf A, Shuaib U, Siddiqui N, Ullah A, Waheed A (2017) A novel construction of substitution box involving coset diagram and a bijective map. Secur Commun Networks 2017:1\u201316","journal-title":"Secur Commun Networks"},{"issue":"4","key":"10587_CR32","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656\u2013715","journal-title":"Bell Syst Tech J"},{"key":"10587_CR33","doi-asserted-by":"publisher","unstructured":"Siddiqui N, Naseer A, Ehatisham-ul-Haq M (2020) A novel scheme of substitution-box design based on modified Pascal\u2019s triangle and elliptic curve. Wireless Pers Commun. https:\/\/doi.org\/10.1007\/s11277-020-07832-y","DOI":"10.1007\/s11277-020-07832-y"},{"key":"10587_CR34","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.amc.2018.03.019","volume":"332","author":"V Silva-Garc\u00eda","year":"2018","unstructured":"Silva-Garc\u00eda V, Flores-Carapia R, Renter\u00eda-M\u00e1rquez C, Luna-Benoso B, Aldape-P\u00e9rez M (2018) Substitution box generation using Chaos: an image encryption application. Appl Math Comput 332:123\u2013135","journal-title":"Appl Math Comput"},{"key":"10587_CR35","unstructured":"Tian Y, Lu Z (2016) S-box: Six-dimensional compound hyperchaotic map and artificial bee colony algorithm. J Syst Eng Electron 27(1):232\u2013241"},{"key":"10587_CR36","doi-asserted-by":"crossref","unstructured":"Tran MT, Bui DK, Duong AD (2008) Gray S-box for advanced encryption standard. Int Conf Comput Intell Secur IEEE. pp 253\u2013258","DOI":"10.1109\/CIS.2008.205"},{"issue":"1","key":"10587_CR37","first-page":"213","volume":"99","author":"A Ullah","year":"2017","unstructured":"Ullah A, Jamal SS, Shah T (2017) A novel algebraic technique for the construction of strong substitution box. Wireless Pers Commun 99(1):213\u2013226","journal-title":"Wireless Pers Commun"},{"issue":"4","key":"10587_CR38","doi-asserted-by":"publisher","first-page":"2757","DOI":"10.1007\/s11071-017-3409-1","volume":"88","author":"A Ullah","year":"2017","unstructured":"Ullah A, Jamal SS, Shah T (2017) A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn 88(4):2757\u20132769","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"10587_CR39","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/97.995823","volume":"9","author":"Z Wang","year":"2002","unstructured":"Wang Z (2002) A universal image quality index. IEEE Signal Processing Letters 9(3):81\u201384","journal-title":"IEEE Signal Processing Letters"},{"issue":"4","key":"10587_CR40","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"issue":"6\u20137","key":"10587_CR41","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1016\/j.physleta.2012.01.009","volume":"376","author":"Y Wang","year":"2012","unstructured":"Wang Y, Wong KW, Li C, Li Y (2012) A novel method to design S-box based on chaotic map and genetic algorithm. Phys Lett A 376(6\u20137):827\u2013833","journal-title":"Phys Lett A"},{"key":"10587_CR42","doi-asserted-by":"crossref","unstructured":"Webster AF, Tavares SE (1986) On, the Design of S-Boxes, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) pp 523\u2013534","DOI":"10.1007\/3-540-39799-X_41"},{"issue":"2","key":"10587_CR43","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J: Multidisciplin J Sci Technol J Select Areas Telecommun (JSAT) 1(2):31\u201338","journal-title":"Cyber J: Multidisciplin J Sci Technol J Select Areas Telecommun (JSAT)"},{"key":"10587_CR44","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.asoc.2015.08.008","volume":"37","author":"XJ Wu","year":"2015","unstructured":"Wu XJ, Kan HB, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24\u201339","journal-title":"Appl Soft Comput"},{"issue":"3","key":"10587_CR45","doi-asserted-by":"publisher","first-page":"2115","DOI":"10.1007\/s11071-018-4478-5","volume":"94","author":"T Ye","year":"2018","unstructured":"Ye T, Zhimao L (2018) Chaotic S-box: six-dimensional fractional Lorenz\u2013Duffing chaotic system and O-shaped path scrambling. Nonlinear Dynamics 94(3):2115\u20132126","journal-title":"Nonlinear Dynamics"},{"key":"10587_CR46","doi-asserted-by":"publisher","first-page":"53079","DOI":"10.1109\/ACCESS.2019.2911395","volume":"7","author":"L Yi","year":"2019","unstructured":"Yi L, Tong X, Wang Z, Zhang M, Zhu H, Liu J (2019) A novel block encryption algorithm based on chaotic S-box for wireless sensor network. IEEE Access 7:53079\u201353090","journal-title":"IEEE Access"},{"key":"10587_CR47","doi-asserted-by":"publisher","first-page":"39781","DOI":"10.1109\/ACCESS.2020.2975880","volume":"8","author":"MA Yousaf","year":"2020","unstructured":"Yousaf MA, Alolaiyan H, Ahmad M, Dilbar M, Razaq A (2020) Comparison of pre and post-action of a finite Abelian group over certain nonlinear schemes. IEEE Access 8:39781\u201339792","journal-title":"IEEE Access"},{"key":"10587_CR48","doi-asserted-by":"publisher","first-page":"150326","DOI":"10.1109\/ACCESS.2020.3016401","volume":"8","author":"AH Zahid","year":"2020","unstructured":"Zahid AH, Al-Solami E, Ahmad M (2020) A novel modular approach based substitution-box design for image encryption. IEEE Access 8:150326\u2013150340","journal-title":"IEEE Access"},{"key":"10587_CR49","doi-asserted-by":"publisher","first-page":"54175","DOI":"10.1109\/ACCESS.2020.2979827","volume":"8","author":"YQ Zhang","year":"2020","unstructured":"Zhang YQ, Hao JL, Wang XY (2020) An efficient image encryption scheme based on S-boxes and fractional-order differential logistic map. IEEE Access 8:54175\u201354188","journal-title":"IEEE Access"},{"key":"10587_CR50","doi-asserted-by":"crossref","unstructured":"Zhu H, Tong X, Wang Z, Ma J (2020) A novel method of dynamic S-box design based on combined chaotic map and fitness function. Multimed Tools Appl:1-19","DOI":"10.1007\/s11042-019-08478-0"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10587-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10587-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10587-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T05:06:35Z","timestamp":1698728795000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10587-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,5]]},"references-count":50,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10587"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10587-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,5]]},"assertion":[{"value":"19 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}