{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T09:08:55Z","timestamp":1773392935308,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"25","license":[{"start":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T00:00:00Z","timestamp":1631836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T00:00:00Z","timestamp":1631836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s11042-021-11497-5","type":"journal-article","created":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T09:06:08Z","timestamp":1631869568000},"page":"36667-36684","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A novel block encryption method based on Catalan random walks"],"prefix":"10.1007","volume":"81","author":[{"given":"Muzafer","family":"Sara\u010devi\u0107","sequence":"first","affiliation":[]},{"given":"Sudhir Kumar","family":"Sharma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5682-7184","authenticated-orcid":false,"given":"Khaleel","family":"Ahmad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,17]]},"reference":[{"issue":"7","key":"11497_CR1","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1134\/S1995080218070028","volume":"39","author":"FM Ablayev","year":"2018","unstructured":"Ablayev FM et al (2018) Quantum-assisted blockchain. Lobachevskii J Math 39(7):957\u2013960","journal-title":"Lobachevskii J Math"},{"key":"11497_CR2","first-page":"102445","volume":"51","author":"EA Albahrani","year":"2020","unstructured":"Albahrani EA, Maryoosh AA, Lafta SH (2020) Block image encryption based on modified playfair and chaotic system. J Inform Security Appl 51:102445","journal-title":"J Inform Security Appl"},{"issue":"1","key":"11497_CR3","first-page":"159","volume":"21","author":"MA Balzarova","year":"2020","unstructured":"Balzarova MA (2020) Blockchain technology\u2014a new era of ecolabelling schemes? Corp Gov Int J Bus Soc 21(1):159\u2013174","journal-title":"Corp Gov Int J Bus Soc"},{"issue":"6","key":"11497_CR4","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1159\/000504325","volume":"98","author":"A Dubovitskaya","year":"2020","unstructured":"Dubovitskaya A, Novotny P, Xu ZG, Wang FS (2020) Applications of blockchain technology for data-sharing in oncology: results from a systematic literature review. Oncology 98(6):403\u2013411","journal-title":"Oncology"},{"issue":"3","key":"11497_CR5","first-page":"552","volume":"9","author":"EP Fedorova","year":"2020","unstructured":"Fedorova EP, Skobleva EI (2020) Application of blockchain technology in higher education. Eur J Contemp Educ 9(3):552\u2013571","journal-title":"Eur J Contemp Educ"},{"issue":"1","key":"11497_CR6","doi-asserted-by":"publisher","first-page":"871","DOI":"10.32604\/cmc.2020.012146","volume":"66","author":"T Feng","year":"2021","unstructured":"Feng T, Pei H, Ma R, Tian Y, Feng X (2021) Blockchain data privacy access control based on searchable attribute encryption. CMC-Comput Mater Contin 66(1):871\u2013884","journal-title":"CMC-Comput Mater Contin"},{"key":"11497_CR7","doi-asserted-by":"publisher","first-page":"102383","DOI":"10.1016\/j.ijhm.2019.102383","volume":"87","author":"V Filimonau","year":"2020","unstructured":"Filimonau V, Naumova E (2020) The blockchain technology and the scope of its application in hospitality operations. Int J Hosp Manag 87:102383","journal-title":"Int J Hosp Manag"},{"key":"11497_CR8","doi-asserted-by":"crossref","unstructured":"Gilad-Bachrach R, Navot A, Tishby N (2004) Margin based feature selection-theory and algorithms. In: Proceedings of the twenty-first international conference on Machine learning","DOI":"10.1145\/1015330.1015352"},{"key":"11497_CR9","doi-asserted-by":"publisher","first-page":"102741","DOI":"10.1016\/j.jvcir.2019.102741","volume":"70","author":"L Guo","year":"2020","unstructured":"Guo L, Xie H, Li Y (2020) Data encryption based blockchain and privacy preserving mechanisms towards big data. J Visual Commun Image Represent 70:102741","journal-title":"J Visual Commun Image Represent"},{"issue":"1","key":"11497_CR10","doi-asserted-by":"publisher","first-page":"1788292","DOI":"10.1080\/23311916.2020.1788292","volume":"7","author":"N Kapalova","year":"2020","unstructured":"Kapalova N, Khompysh A, Arici M, Algazy K (2020) A block encryption algorithm based on exponentiation transform. Cogent Eng 7(1):1788292","journal-title":"Cogent Eng"},{"key":"11497_CR11","doi-asserted-by":"publisher","first-page":"3407","DOI":"10.1098\/rsta.2006.1901","volume":"364","author":"V Kendon","year":"2006","unstructured":"Kendon V (2006) A random walk approach to quantum algorithms. Phil Trans R Soc A 364:3407\u20133422","journal-title":"Phil Trans R Soc A"},{"key":"11497_CR12","volume-title":"Catalan numbers with applications","author":"T Koshy","year":"2009","unstructured":"Koshy T (2009) Catalan numbers with applications. Oxford University Press, New York"},{"issue":"9","key":"11497_CR13","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.3390\/electronics10091127","volume":"10","author":"SW Lee","year":"2021","unstructured":"Lee SW, Sim KB (2021) Design and hardware implementation of a simplified DAG-based blockchain and new AES-CBC algorithm for IoT security. Electronics 10(9):1127","journal-title":"Electronics"},{"key":"11497_CR14","doi-asserted-by":"publisher","first-page":"901","DOI":"10.1109\/SIPROCESS.2019.8868638","volume-title":"2019 IEEE 4th international conference on signal and image processing (ICSIP)","author":"X Li","year":"2019","unstructured":"Li X, Li X (2019) A novel block image encryption algorithm based on DNA dynamic encoding and chaotic system. 2019 IEEE 4th international conference on signal and image processing (ICSIP). IEEE, Wuxi, pp 901\u2013906"},{"key":"11497_CR15","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/ICWAPR.2017.8076670","volume-title":"2017 international conference on wavelet analysis and pattern recognition (ICWAPR)","author":"L Li","year":"2017","unstructured":"Li L, Pang B, Tang Y (2017) An image encryption system based on 2-dimensional quantum random walks. 2017 international conference on wavelet analysis and pattern recognition (ICWAPR). IEEE, Ningbo, pp 93\u201398"},{"issue":"4","key":"11497_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-020-2612-z","volume":"19","author":"M Liang","year":"2020","unstructured":"Liang M, Yang L (2020) Block encryption of quantum messages. Quantum Inf Process 19(4):1\u201325","journal-title":"Quantum Inf Process"},{"key":"11497_CR17","first-page":"217","volume-title":"Basic & clinical pharmacology & toxicology","author":"W Luo","year":"2020","unstructured":"Luo W, Tan J (2020) Regulatable user privacy protection model of blockchain with encryption on sensitive data. Basic & clinical pharmacology & toxicology, vol 126. Wiley, Hoboken, pp 217\u2013218"},{"key":"11497_CR18","first-page":"102566","volume":"54","author":"YL Ma","year":"2020","unstructured":"Ma YL, Li CQ, Ou B (2020) Cryptanalysis of an image block encryption algorithm based on chaotic maps. J Inform Security Appl 54:102566","journal-title":"J Inform Security Appl"},{"key":"11497_CR19","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/BLOC.2019.8751336","volume-title":"2019 IEEE international conference on blockchain and cryptocurrency (ICBC)","author":"A Manzoor","year":"2019","unstructured":"Manzoor A, Liyanage M, Braeke A, Kanhere SS, Ylianttila M (2019) Blockchain based proxy re-encryption scheme for secure IoT data sharing. 2019 IEEE international conference on blockchain and cryptocurrency (ICBC). IEEE, Seoul, pp 99\u2013103"},{"issue":"2","key":"11497_CR20","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/BF00193563","volume":"5","author":"U Maurer","year":"1992","unstructured":"Maurer U (1992) A universal statistical test for random bit generators. J Cryptol 5(2):89\u2013105","journal-title":"J Cryptol"},{"issue":"3","key":"11497_CR21","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1109\/18.256484","volume":"39","author":"U Maurer","year":"1993","unstructured":"Maurer U (1993) Secret key agreement by public discussion from common information. IEEE Trans Inform Theory 39(3):733\u2013742","journal-title":"IEEE Trans Inform Theory"},{"key":"11497_CR22","doi-asserted-by":"publisher","first-page":"3001","DOI":"10.1007\/s13369-020-04989-3","volume":"46","author":"IA Omar","year":"2020","unstructured":"Omar IA, Jayaraman R, Salah K, Yaqoob I, Ellahham S (2020) Applications of blockchain technology in clinical trials: review and open challenges. Arab J Sci Eng 46:3001\u20133015","journal-title":"Arab J Sci Eng"},{"key":"11497_CR23","doi-asserted-by":"publisher","first-page":"18835","DOI":"10.1007\/s11042-019-7257-5","volume":"78","author":"O Pal","year":"2019","unstructured":"Pal O, Alam B (2019) Efficient and secure conditional access system for pay-TV systems. Multimed Tools Appl 78:18835\u201318853","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"11497_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCE.2019.2959629","volume":"66","author":"O Pal","year":"2020","unstructured":"Pal O, Alam B (2020) Efficient and secure key management for conditional access systems. IEEE Trans Consum Electron 66(1):1\u201310","journal-title":"IEEE Trans Consum Electron"},{"key":"11497_CR25","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.icte.2019.08.002","volume":"7","author":"O Pal","year":"2019","unstructured":"Pal O, Alam B, Thakur V, Singh S (2019) Key management for blockchain technology. ICT Express 7:76\u201380","journal-title":"ICT Express"},{"issue":"8","key":"11497_CR26","doi-asserted-by":"publisher","first-page":"140","DOI":"10.3390\/buildings10080140","volume":"10","author":"MNN Rodrigo","year":"2020","unstructured":"Rodrigo MNN, Perera S, Senaratne S, Jin XH (2020) Potential application of blockchain technology for embodied carbon estimating in construction supply chains. Buildings 10(8):140","journal-title":"Buildings"},{"key":"11497_CR27","unstructured":"Saba S (2018) Generating all balanced parentheses: a deep dive into an interview question, MathCode. Available at https:\/\/sahandsaba.com\/interview-question-generating-all-balanced. Accessed 30 Jun 2021"},{"issue":"6","key":"11497_CR28","doi-asserted-by":"publisher","first-page":"3488","DOI":"10.1214\/19-AOS1939","volume":"48","author":"J Sanders","year":"2020","unstructured":"Sanders J, Proutiere A, Yun SY (2020) Clustering in block markov chains. Ann Stat 48(6):3488\u20133512","journal-title":"Ann Stat"},{"issue":"2","key":"11497_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJHISI.20210401.oa1","volume":"16","author":"R Sapra","year":"2021","unstructured":"Sapra R, Dhaliwal P (2021) Blockchain: the perspective future of technology. Int J Healthc Inform Syst Inform 16(2):1\u201320","journal-title":"Int J Healthc Inform Syst Inform"},{"issue":"7","key":"11497_CR30","doi-asserted-by":"crossref","first-page":"91","DOI":"10.12700\/APH.15.7.2018.7.5","volume":"15","author":"M Sara\u010devi\u0107","year":"2018","unstructured":"Sara\u010devi\u0107 M, Adamovic S, Bisevac E (2018) Applications of Catalan numbers and lattice path combinatorial problem in cryptography. Acta Polytech Hung 15(7):91\u2013110","journal-title":"Acta Polytech Hung"},{"key":"11497_CR31","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.future.2019.05.010","volume":"100","author":"M Sara\u010devi\u0107","year":"2019","unstructured":"Sara\u010devi\u0107 M, Adamovic S, Miskovic V, Macek N, Sarac M (2019) A novel approach to steganography based on the properties of Catalan numbers and Dyck words. Futur Gener Comput Syst 100:186\u2013197","journal-title":"Futur Gener Comput Syst"},{"issue":"2","key":"11497_CR32","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1109\/TR.2020.3010973","volume":"70","author":"MH Sara\u010devi\u0107","year":"2020","unstructured":"Sara\u010devi\u0107 MH, Adamovi\u0107 SZ, Mi\u0161kovic VA, Elhoseny M, Ma\u010dek ND, Selim MM, Shankar K (2020) Data encryption for Internet of Things applications based on Catalan objects and two combinatorial structures. IEEE Trans Reliab 70(2):819\u2013830","journal-title":"IEEE Trans Reliab"},{"issue":"11","key":"11497_CR33","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.1049\/iet-its.2019.0855","volume":"14","author":"M Sara\u010devi\u0107","year":"2020","unstructured":"Sara\u010devi\u0107 M, Adamovi\u0107 S, Macek N, Elhoseny M, Sarhan S (2020) Cryptographic keys exchange model for smart city applications. IET Intel Transport Syst 14(11):1456\u20131464","journal-title":"IET Intel Transport Syst"},{"issue":"2","key":"11497_CR34","first-page":"469","volume":"37","author":"M Sara\u010devi\u0107","year":"2021","unstructured":"Sara\u010devi\u0107 M, Adamovi\u0107 S, Ma\u010dek N, Selimi A, Pepic S (2021) Source and channel models for secret-key agreement based on Catalan numbers and the lattice path combinatorial approach. J Inf Sci Eng 37(2):469\u2013482","journal-title":"J Inf Sci Eng"},{"key":"11497_CR35","doi-asserted-by":"publisher","DOI":"10.1177\/1063293X211008586","author":"A Siva Kumar","year":"2021","unstructured":"Siva Kumar A, Godfrey Winster S, Ramesh R (2021) Efficient sensitivity orient blockchain encryption for improved data security in cloud. Concurr Eng. https:\/\/doi.org\/10.1177\/1063293X211008586","journal-title":"Concurr Eng"},{"key":"11497_CR36","volume-title":"Catalan addendum to enumerative combinatorics","author":"R Stanley","year":"2005","unstructured":"Stanley R (2005) Catalan addendum to enumerative combinatorics. MIT Mathematics, Cambridge"},{"issue":"7","key":"11497_CR37","doi-asserted-by":"publisher","first-page":"9355","DOI":"10.1007\/s11042-018-6516-1","volume":"78","author":"A Ur Rehman","year":"2019","unstructured":"Ur Rehman A, Xiao D, Kulsoom A, Hashmi MA, Abbas SA (2019) Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules. Multimed Tools Appl 78(7):9355\u20139382","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"11497_CR38","first-page":"1774","volume":"27","author":"J Wang","year":"2020","unstructured":"Wang J, Wang XM, Cheng HX (2020) Application of blockchain technology in the governance of executive corruption in context of national audit. TehnickiVjesnik\u2014Tech Gaz 27(6):1774\u20131780","journal-title":"TehnickiVjesnik\u2014Tech Gaz"},{"issue":"4","key":"11497_CR39","doi-asserted-by":"publisher","first-page":"2050060","DOI":"10.1142\/S0218127420500601","volume":"30","author":"C Xu","year":"2020","unstructured":"Xu C, Sun JR, Wang CH (2020) An image encryption algorithm based on random walk and hyperchaotic systems. Int J Bifurc Chaos 30(4):2050060","journal-title":"Int J Bifurc Chaos"},{"issue":"10","key":"11497_CR40","doi-asserted-by":"publisher","first-page":"1503","DOI":"10.1109\/TC.2010.242","volume":"60","author":"C Yang","year":"2011","unstructured":"Yang C, Chiu C, Wu G (2011) Efficient encoding\/decoding for second-order spectral-null codes by reducing random walks. IEEE Trans Comput 60(10):1503\u20131510","journal-title":"IEEE Trans Comput"},{"key":"11497_CR41","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1111\/bcpt.13303","volume":"126","author":"HJ Zhang","year":"2020","unstructured":"Zhang HJ, Wu SF, Wang SK, Xia N (2020) Application of blockchain technology in pet medical industry. Basic Clin Pharmacol Toxicol 126:183\u2013183","journal-title":"Basic Clin Pharmacol Toxicol"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11497-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11497-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11497-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T23:29:04Z","timestamp":1699486144000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11497-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,17]]},"references-count":41,"journal-issue":{"issue":"25","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["11497"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11497-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,17]]},"assertion":[{"value":"24 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human and\/or animal participants"}},{"value":"The authors declare that they have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}