{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T04:53:47Z","timestamp":1773809627818,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","license":[{"start":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T00:00:00Z","timestamp":1618185600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T00:00:00Z","timestamp":1618185600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>We have proposed a robust, secure and efficient image encryption algorithm based on chaotic maps and algebraic structure. Nowadays, the chaotic cryptosystems gained more attention due to their efficiency, the assurance of robustness and high sensitivity corresponding to initial conditions. In literature, there are many encryption algorithms that can simply guarantees security while the schemes based on chaotic systems only promises the uncertainty, both of them can not encounter the needs of current scenario. To tackle this issue, this article proposed an image encryption algorithm based on Lorenz chaotic system and primitive irreducible polynomial substitution box. First, we have proposed 16 different S-boxes based on projective general linear group and 16 primitive irreducible polynomials of Galois field of order 256, and then utilized these S-boxes with combination of chaotic map in image encryption scheme. Three chaotic sequences can be produced by the disturbed of Lorenz chaotic system corresponding to variables <jats:italic>x<\/jats:italic>, <jats:italic>y<\/jats:italic> and <jats:italic>z<\/jats:italic>. We have constructed a new pseudo random chaotic sequence <jats:italic>k<\/jats:italic><jats:sub><jats:italic>i<\/jats:italic><\/jats:sub> based on <jats:italic>x<\/jats:italic>, <jats:italic>y<\/jats:italic> and <jats:italic>z<\/jats:italic>. The plain image is encrypted by the use of chaotic sequence <jats:italic>k<\/jats:italic><jats:sub><jats:italic>i<\/jats:italic><\/jats:sub> and XOR operation to get a ciphered image. To show the strength of presented image encryption, some renowned analyses are performed.<\/jats:p>","DOI":"10.1007\/s11042-021-10695-5","type":"journal-article","created":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T04:02:40Z","timestamp":1618200160000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":63,"title":["A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes"],"prefix":"10.1007","author":[{"given":"Temadher Alassiry","family":"Al-Maadeed","sequence":"first","affiliation":[]},{"given":"Iqtadar","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Amir","family":"Anees","sequence":"additional","affiliation":[]},{"given":"Muhammad Tahir","family":"Mustafa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,12]]},"reference":[{"issue":"4","key":"10695_CR1","doi-asserted-by":"publisher","first-page":"1839","DOI":"10.1007\/s11071-015-2281-0","volume":"82","author":"J Ahmad","year":"2015","unstructured":"Ahmad J, Hwang SO (2015) Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dynamics 82(4):1839\u20131850","journal-title":"Nonlinear Dynamics"},{"issue":"08","key":"10695_CR2","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcation Chaos 16(08):2129\u201351","journal-title":"Int J Bifurcation Chaos"},{"issue":"3","key":"10695_CR3","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.physleta.2007.02.021","volume":"366","author":"JM Amigo","year":"2007","unstructured":"Amigo JM, Kocarev L, Szczepanski J (2007) Theory and practice of chaotic cryptography. Phys Lett Section A 366(3):211\u201316. https:\/\/doi.org\/10.1016\/j.physleta.2007.02.021","journal-title":"Phys Lett Section A"},{"issue":"9","key":"10695_CR4","doi-asserted-by":"publisher","first-page":"3106","DOI":"10.1016\/j.cnsns.2014.02.011","volume":"19","author":"A Anees","year":"2014","unstructured":"Anees A, Siddiqui AM, Ahmed F (2014) Chaotic substitution for highly autocorrelated data in encryption algorithm. Commun Nonlinear Sci Numer Simul 19(9):3106\u20133118","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"4","key":"10695_CR5","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1007\/s11071-013-1105-3","volume":"75","author":"A Anees","year":"2014","unstructured":"Anees A, Siddiqui AM, Ahmed J, Hussain I (2014) A technique for digital steganography using chaotic maps. Nonlinear Dynamics 75(4):807\u2013816","journal-title":"Nonlinear Dynamics"},{"issue":"4","key":"10695_CR6","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1109\/JSYST.2013.2246011","volume":"8","author":"B Bakhache","year":"2014","unstructured":"Bakhache B, Ghazal JM, El Assad S (2014) Improvement of the security of zigbee by a new chaotic algorithm. IEEE Syst J 8(4):1021\u201330. https:\/\/doi.org\/10.1109\/JSYST.2013.2246011","journal-title":"IEEE Syst J"},{"issue":"1","key":"10695_CR7","first-page":"337","volume":"87","author":"M Belazi","year":"2017","unstructured":"Belazi M, E-Latif AAA, Belghith S (2017) Khan efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption. Wirel Pers Commun 87(1):337\u2013361","journal-title":"Wirel Pers Commun"},{"key":"10695_CR8","doi-asserted-by":"crossref","unstructured":"Biham E, Shamir A (1993) Differential cryptanalysis of the data encryption standard. Springer","DOI":"10.1007\/978-1-4613-9314-6"},{"issue":"22","key":"10695_CR9","first-page":"5968","volume":"9","author":"U \u00c7avu\u015fo\u011flu","year":"2016","unstructured":"\u00c7avu\u015fo\u011flu U, Akg\u00fcl A, Ka\u00e7ar S, Pehlivan \u0130, Zengin A (2016) A novel chaos-based encryption algorithm over TCP data packet for secure communication. Secur Commun Netw 9(22):5968\u201374","journal-title":"Secur Commun Netw"},{"issue":"3","key":"10695_CR10","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3):749\u201361. https:\/\/doi.org\/10.1016\/j.chaos.2003.12.022","journal-title":"Chaos Solitons Fractals"},{"issue":"04","key":"10695_CR11","doi-asserted-by":"publisher","first-page":"1350022","DOI":"10.1142\/S0218126613500229","volume":"22","author":"S Cicek","year":"2013","unstructured":"Cicek S, Uyaro\u011flu Y, Pehlivan I (2013) Simulation and circuit implementation of sprott case h chaotic system and its synchronization application for secure communication systems. J Circuits Syst Comput 22(04):1350022","journal-title":"J Circuits Syst Comput"},{"key":"10695_CR12","doi-asserted-by":"crossref","unstructured":"Daemen J, Rijmen V (2002) The design of Rijndael: AES - The advanced encryption standard. Springer","DOI":"10.1007\/978-3-662-04722-4_1"},{"key":"10695_CR13","unstructured":"Dillak RY (2013) Digital color image encryption using RC4 stream cipher and chaotic logistic map Information Technology and Electrical Engineering (ICITEE), 2013 International Conference on"},{"issue":"6","key":"10695_CR14","doi-asserted-by":"publisher","first-page":"2543","DOI":"10.1016\/j.cnsns.2010.09.005","volume":"16","author":"MAB Farah","year":"2011","unstructured":"Farah MAB, Kachouri A, Samet M (2011) Improvement of cryptosystem based on iterating chaotic map. Commun Nonlinear Sci Numer Simul 16 (6):2543\u20132553","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10695_CR15","doi-asserted-by":"publisher","first-page":"1925","DOI":"10.1007\/s11042-020-09672-1","volume":"80","author":"R Guesmi","year":"2021","unstructured":"Guesmi R, Farah MAB (2021) A new efficient medical image cipher based on hybrid chaotic map and DNA code. Multimed Tools Appl 80:1925\u20131944","journal-title":"Multimed Tools Appl"},{"key":"10695_CR16","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1007\/s00521-012-0870-0","volume":"22","author":"I Hussain","year":"2013","unstructured":"Hussain I (2013) A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Computing & Applications 22:1085\u20131093","journal-title":"Neural Computing & Applications"},{"issue":"2","key":"10695_CR17","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/81.904880","volume":"48","author":"G Jakimoski","year":"2001","unstructured":"Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans Circuits Syst I 48(2):163\u20139. https:\/\/doi.org\/10.1109\/81.904880","journal-title":"IEEE Trans Circuits Syst I"},{"issue":"1","key":"10695_CR18","first-page":"172","volume":"4","author":"A Jolfaei","year":"2011","unstructured":"Jolfaei A, Mirghadri A (2011) Image encryption using chaos and block cipher. Comput Inf Sci 4(1):172\u201385. www.ccsenet.org\/cis","journal-title":"Comput Inf Sci"},{"issue":"3","key":"10695_CR19","first-page":"667","volume":"27","author":"M Khan","year":"2016","unstructured":"Khan M, Shah T, Batool SI (2016) Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comput and Applic 27(3):667\u2013685","journal-title":"Neural Comput and Applic"},{"key":"10695_CR20","unstructured":"Kohli R, KKumar M (2013) Optimized on system analysis using AES and X-tea. IJARCSSE 3(2). ISSN 2277-128X"},{"key":"10695_CR21","doi-asserted-by":"crossref","unstructured":"Kohli R, Sharma D, Baliyan MK (2012) S-Box design analysis and parameter variation in AES algorithm. Int J Comput Appl 60(2)","DOI":"10.5120\/9667-4084"},{"key":"10695_CR22","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/3-540-45311-3_30","volume":"2247","author":"S Li","year":"2001","unstructured":"Li S, Mou X, Cai Y (2001) Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography. Proceedings, Lecture Notes in Computer Science 2247:316\u2013329","journal-title":"Proceedings, Lecture Notes in Computer Science"},{"issue":"7","key":"10695_CR23","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1016\/j.aeue.2014.02.002","volume":"68","author":"H Liu","year":"2014","unstructured":"Liu H, Kadir A, Niu Y (2014) Chaos-based color image block encryption scheme using S-box. AEU - Int J Electr Commun 68(7):676\u201386. https:\/\/doi.org\/10.1016\/j.aeue.2014.02.002","journal-title":"AEU - Int J Electr Commun"},{"issue":"8","key":"10695_CR24","doi-asserted-by":"publisher","first-page":"3267","DOI":"10.1016\/j.cnsns.2011.11.040","volume":"17","author":"Y Liu","year":"2012","unstructured":"Liu Y, Tian S, Hu W, Xing C (2012) Design and statistical analysis of a new chaotic block cipher for wireless sensor networks. Commun Nonlinear Sci Numer Simul 17(8):3267\u201378. https:\/\/doi.org\/10.1016\/j.cnsns.2011.11.040","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10695_CR25","unstructured":"Matsui M (1994) Linear cryptanalysis of the data encryption standard. In: Eurocrypt\u201993, LNCS, vol 765. Springer, pp 386\u2013397"},{"key":"10695_CR26","unstructured":"Morioka S (2002) An optimized S-box circuit architecture for low power AES design. Workshop on cryptographic hardware and embedded systems, CHES.02. In: LNCS, vol 2523, pp 172\u2013186"},{"key":"10695_CR27","doi-asserted-by":"publisher","unstructured":"Noura H, El Assad S, Vladeanu C (2010) Design of a fast and robust chaos-based crypto-system for image encryption. In: 2010 8th international conference on communications, COMM 2010, pp 423\u20136. https:\/\/doi.org\/10.1109\/ICCOMM.2010.5509114","DOI":"10.1109\/ICCOMM.2010.5509114"},{"key":"10695_CR28","unstructured":"Ott E (1979) Chaos in dynamical systems. Second edition"},{"issue":"3","key":"10695_CR29","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1007\/s11071-013-0987-4","volume":"74","author":"F Ozkaynak","year":"2013","unstructured":"Ozkaynak F, Yavuz S (2013) Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dyn 74(3):551\u20137. https:\/\/doi.org\/10.1007\/s11071-013-0987-4","journal-title":"Nonlinear Dyn"},{"issue":"12","key":"10695_CR30","doi-asserted-by":"publisher","first-page":"3124","DOI":"10.1109\/TCSI.2010.2052515","volume":"57","author":"F Pareschi","year":"2010","unstructured":"Pareschi F, Setti G, Rovatti R (2010) Implementation and testing of high-Speed CMOS true random number generators based on chaotic systems. IEEE Trans Circuits Syst I 57(12):3124\u201337. https:\/\/doi.org\/10.1109\/TCSI.2010.2052515","journal-title":"IEEE Trans Circuits Syst I"},{"issue":"SUPPL.2","key":"10695_CR31","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.3906\/elk-1103-14","volume":"20","author":"I Pehlivan","year":"2012","unstructured":"Pehlivan I, Wei Z (2012) Analysis, nonlinear control, and chaos generator circuit of another strange chaotic system. Turk J Electr Eng Comput Sci 20 (SUPPL.2):1229\u201339. https:\/\/doi.org\/10.3906\/elk-1103-14","journal-title":"Turk J Electr Eng Comput Sci"},{"issue":"20","key":"10695_CR32","doi-asserted-by":"publisher","first-page":"2638","DOI":"10.1016\/j.physd.2008.03.049","volume":"237","author":"AN Pisarchika","year":"2008","unstructured":"Pisarchika AN, Zaninb M (2008) Image encryption with chaotically coupled chaotic maps. Physica D: Nonlinear Phenomena 237(20):2638\u20132648","journal-title":"Physica D: Nonlinear Phenomena"},{"issue":"7","key":"10695_CR33","doi-asserted-by":"publisher","first-page":"1887","DOI":"10.1016\/j.cnsns.2009.07.007","volume":"15","author":"R Rhouma","year":"2010","unstructured":"Rhouma R, Solak E, Belghith S (2010) Cryptanalysis of a new substitution-diffusionbased image cipher. Commun Nonlinear Sci Numer Simul 15(7):1887\u201392. https:\/\/doi.org\/10.1016\/j.cnsns.2009.07.007","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"05","key":"10695_CR34","doi-asserted-by":"publisher","first-page":"1405","DOI":"10.1142\/S0218127410026563","volume":"20","author":"E Solak","year":"2010","unstructured":"Solak E, \u00c7okal C, Yildiz OT, BIYIKOG LU T (2010) Cryptanalysis of Fridrich chaotic image encryption. Int J Bifurcation Chaos 20(05):1405\u201313","journal-title":"Int J Bifurcation Chaos"},{"issue":"5","key":"10695_CR35","doi-asserted-by":"publisher","first-page":"1901","DOI":"10.1016\/S0960-0779(04)00454-0","volume":"23","author":"G Tang","year":"2005","unstructured":"Tang G, Liao X (2005) A method for designing dynamical S-boxes based on discretized chaotic map. Chaos Solitons Fractals 23(5):1901\u20139. https:\/\/doi.org\/10.1016\/j.chaos.2004.07.033","journal-title":"Chaos Solitons Fractals"},{"issue":"2","key":"10695_CR36","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1016\/j.chaos.2004.04.023","volume":"23","author":"G Tang","year":"2005","unstructured":"Tang G, Liao X, Chen Y (2005) A novel method for designing S-boxes based on chaotic maps. Chaos Solitons Fractals 23(2):413\u201319. https:\/\/doi.org\/10.1016\/j.chaos.2004.04.023, http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0960077904002474","journal-title":"Chaos Solitons Fractals"},{"issue":"4","key":"10695_CR37","doi-asserted-by":"publisher","first-page":"2757","DOI":"10.1007\/s11071-017-3409-1","volume":"88","author":"SS Ullah","year":"2017","unstructured":"Ullah SS, Shah T (2017) Jamal A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dynamics 88(4):2757\u20132769","journal-title":"Nonlinear Dynamics"},{"issue":"4","key":"10695_CR38","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"X Wang","year":"2012","unstructured":"Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101\u20131108","journal-title":"Signal Process"},{"issue":"1","key":"10695_CR39","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","volume":"11","author":"Y Wang","year":"2011","unstructured":"Wang Y, Wong K-W, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11 (1):514\u201322. https:\/\/doi.org\/10.1016\/j.asoc.2009.12.011","journal-title":"Appl Soft Comput"},{"issue":"7","key":"10695_CR40","doi-asserted-by":"publisher","first-page":"3089","DOI":"10.1016\/j.cnsns.2008.12.005","volume":"14","author":"Y Wang","year":"2009","unstructured":"Wang Y, Wong KW, Liao X, Xiang T (2009a) A block cipher with dynamic S-boxes based on tent map. Commun Nonlinear Sci Numer Simul 14(7):3089\u201399. https:\/\/doi.org\/10.1016\/j.cnsns.2008.12.005","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10695_CR41","doi-asserted-by":"publisher","unstructured":"Wang Y, Xie Q, Wu Y, Du B (2009b) A software for S-box performance analysis and test. In: Proceedings - 2009 International conference on electronic commerce and business intelligence, ECBI 2009, p 125\u20138. https:\/\/doi.org\/10.1109\/ECBI.2009.15","DOI":"10.1109\/ECBI.2009.15"},{"issue":"3","key":"10695_CR42","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/s11071-010-9749-8","volume":"62","author":"X-Y Wang","year":"2010","unstructured":"Wang X-Y, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dynamics 62(3):615\u2013621","journal-title":"Nonlinear Dynamics"},{"key":"10695_CR43","unstructured":"Wu Y, Noonan JP, Agaian S (2010) NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary journals in science and technology, Journal of selected areas in telecommunications, pp 31\u201338"},{"issue":"1","key":"10695_CR44","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/j.chaos.2008.02.017","volume":"41","author":"D Yang","year":"2009","unstructured":"Yang D, Liao X, Wang Y, Yang H, Wei P (2009) A novel chaotic block cryptosystem based on iterating map with output-feedback. Chaos Solitons Fractals 41(1):505\u201310. https:\/\/doi.org\/10.1016\/j.chaos.2008.02.017","journal-title":"Chaos Solitons Fractals"},{"issue":"11","key":"10695_CR45","doi-asserted-by":"publisher","first-page":"3507","DOI":"10.1016\/j.cnsns.2010.01.004","volume":"15","author":"H Yang","year":"2010","unstructured":"Yang H, Wong K -W, Liao X, Zhang W, Wei P (2010) A fast image encryption and authentication scheme based on chaotic maps. Commun Nonlinear Sci Numer Simul 15(11):3507\u201317. https:\/\/doi.org\/10.1016\/j.cnsns.2010.01.004","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10695_CR46","doi-asserted-by":"crossref","unstructured":"Zhang Y (2013) Encryption speed improvement on an improvement over an image encryption method based on total shuffling. In: Proceedings of 2013 International conference on sensor network security technology and privacy communication system, Nangang, China","DOI":"10.1109\/SNS-PCS.2013.6553865"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10695-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10695-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10695-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T04:12:44Z","timestamp":1618200764000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10695-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,12]]},"references-count":46,"alternative-id":["10695"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10695-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,12]]},"assertion":[{"value":"30 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 April 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}