{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T02:18:41Z","timestamp":1767838721823,"version":"3.49.0"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T00:00:00Z","timestamp":1641168000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T00:00:00Z","timestamp":1641168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11042-021-11682-6","type":"journal-article","created":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T08:06:54Z","timestamp":1641197214000},"page":"5929-5955","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Design of 24-by-24-replacement-matrix: a functionality to astronomical visual"],"prefix":"10.1007","volume":"81","author":[{"given":"Tariq","family":"Shah","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0417-019X","authenticated-orcid":false,"given":"Tanveer","family":"ul Haq","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,3]]},"reference":[{"issue":"1\u20133","key":"11682_CR1","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/S0024-3795(98)10163-5","volume":"286","author":"AA De Andrade","year":"1999","unstructured":"De Andrade AA, Palazzo R Jr (1999) Construction and decoding of BCH codes over finite commutative rings. Linear Algebra Appl 286(1\u20133):69\u201385","journal-title":"Linear Algebra Appl"},{"key":"11682_CR2","doi-asserted-by":"publisher","first-page":"102428","DOI":"10.1016\/j.jisa.2019.102428","volume":"50","author":"KC Jithin","year":"2020","unstructured":"Jithin KC, Sankar S (2020) Colour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot set. J Inform Secu Applic 50:102428. https:\/\/doi.org\/10.1016\/j.jisa.2019.102428","journal-title":"J Inform Secu Applic"},{"key":"11682_CR3","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1007\/s00521-015-1887-y","volume":"27","author":"M Khan","year":"2016","unstructured":"Khan M, Shah T, Batool SI (2016) Construction and applications of chaotic S-boxes in image encryption. Neural Comput Applic 27:677\u2013685","journal-title":"Neural Comput Applic"},{"key":"11682_CR4","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.optlaseng.2013.07.015","volume":"52","author":"M Kumar","year":"2014","unstructured":"Kumar M, Mishra DC, Sharma RK (2014) A first approach on an RGB image encryption. Opt Lasers Eng 52:27\u201334","journal-title":"Opt Lasers Eng"},{"issue":"3","key":"11682_CR5","doi-asserted-by":"publisher","first-page":"274","DOI":"10.3390\/e22030274","volume":"22","author":"F Masood","year":"2020","unstructured":"Masood F, Ahmad J, Shah SA, Jamal SS, Hussain I (2020) A novel hybrid secure image encryption based on julia set of fractals and 3D Lorenz chaotic map. Entropy 22(3):274","journal-title":"Entropy"},{"issue":"4\u20136","key":"11682_CR6","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1080\/19393555.2016.1241323","volume":"25","author":"DC Mishra","year":"2016","unstructured":"Mishra DC, Sharma RK (2016) An approach for security of color image data in coordinate, geometric, and frequency domains. Inform Security J: Global Perspective 25(4\u20136):213\u2013234. https:\/\/doi.org\/10.1080\/19393555.2016.1241323","journal-title":"Inform Security J: Global Perspective"},{"key":"11682_CR7","doi-asserted-by":"publisher","first-page":"2968","DOI":"10.12928\/telkomnika.v17i6.10488","volume":"17","author":"O Omoruyi","year":"2019","unstructured":"Omoruyi O, Okereke C, Okokpujie KO, Noma-Osaghae E, Okoyeigbo O, John SN (2019) Evaluation of the quality of an image encrytion scheme. Telkomnika 17:2968\u20132974","journal-title":"Telkomnika"},{"issue":"2","key":"11682_CR8","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/TIFS.2012.2185227","volume":"7","author":"F Pareschi","year":"2012","unstructured":"Pareschi F, Rovatti R, Setti G (2012) On statistical tests for randomness included in the NIST SP800-22 test suite and based on the binomial distribution. IEEE Trans Inform Forensics Sec 7(2):491\u2013505","journal-title":"IEEE Trans Inform Forensics Sec"},{"key":"11682_CR9","doi-asserted-by":"crossref","unstructured":"Shah T, Ali A, Khan M, Farooq G, de Andrade AA (2020) Galois ring $$ GR\\left ({2^{3}, 8}\\right) $$ GR23, 8 dependent $ $24\\times 24$ $24\u00d7 24 S-box design: an RGB image encryption application. Wirel Pers Commun 113(2):1201\u20131224","DOI":"10.1007\/s11277-020-07274-6"},{"key":"11682_CR10","doi-asserted-by":"publisher","first-page":"52609","DOI":"10.1109\/access.2020.2978083","volume":"8","author":"T Shah","year":"2020","unstructured":"Shah T, Haq TU, Farooq G (2020) Improved SERPENT algorithm: design to RGB image encryption implementation. IEEE Access 8:52609\u201352621. https:\/\/doi.org\/10.1109\/access.2020.2978083","journal-title":"IEEE Access"},{"issue":"2","key":"11682_CR11","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1007\/s40314-015-0265-9","volume":"36","author":"T Shah","year":"2017","unstructured":"Shah T, Jahangir S, de Andrade AA (2017) Design of new $ $4\\times 4$$ S-box from finite commutative chain rings. Comput Appl Math 36(2):843\u2013857","journal-title":"Comput Appl Math"},{"key":"11682_CR12","doi-asserted-by":"publisher","unstructured":"Shah T, Jamal SS (2020) An improved chaotic cryptosystem for image encryption and digital watermarking. Wireless personal communications, 110(3), 1429-1442, https:\/\/doi.org\/10.1007\/s11277-019-06793-1","DOI":"10.1007\/s11277-019-06793-1"},{"issue":"3","key":"11682_CR13","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1007\/s40314-015-0281-9","volume":"36","author":"T Shah","year":"2017","unstructured":"Shah T, Mehmood N, de Andrade AA, Palazzo R (2017) Maximal cyclic subgroups of the groups of units of Galois rings: a computational approach. Comput Appl Math 36(3):1273\u20131297","journal-title":"Comput Appl Math"},{"issue":"1","key":"11682_CR14","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1186\/2251-7456-6-51","volume":"6","author":"T Shah","year":"2012","unstructured":"Shah T, Qamar A, de Andrade AA (2012) Construction and decoding of BCH codes over chain of commutative rings. Math Sci 6(1):51","journal-title":"Math Sci"},{"issue":"8\u20139","key":"11682_CR15","doi-asserted-by":"publisher","first-page":"567","DOI":"10.5560\/zna.2013-0021","volume":"68","author":"T Shah","year":"2013","unstructured":"Shah T, Qamar A, Hussain I (2013) Substitution box on maximal cyclic subgroup of units of a Galois ring. Zeitschrift f\u00fcr Naturforschung A 68(8\u20139):567\u2013572","journal-title":"Zeitschrift f\u00fcr Naturforschung A"},{"key":"11682_CR16","doi-asserted-by":"publisher","unstructured":"Shah D, Shah T, Jamal SS (2019) Digital audio signals encryption by Mobius transformation and H\u00e9non map. Multimedia systems, 1-11, https:\/\/doi.org\/10.1007\/s00530-019-00640-w","DOI":"10.1007\/s00530-019-00640-w"},{"issue":"4","key":"11682_CR17","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1109\/TIT.1979.1056063","volume":"25","author":"P Shankar","year":"1979","unstructured":"Shankar P (1979) On BCH codes over arbitrary integer tings (Corresp.). IEEE Trans Inf Theory 25(4):480\u2013483","journal-title":"IEEE Trans Inf Theory"},{"issue":"3","key":"11682_CR18","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379\u2013423","journal-title":"Bell Syst Tech J"},{"issue":"4","key":"11682_CR19","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656\u2013715","journal-title":"Bell Syst Tech J"},{"key":"11682_CR20","doi-asserted-by":"publisher","unstructured":"ul Haq T, Shah T (2020) 12\u00d7 12 S-box Design and its Application to RGB Image Encryption Optik, 164922, https:\/\/doi.org\/10.1016\/j.ijleo.2020.164922","DOI":"10.1016\/j.ijleo.2020.164922"},{"issue":"4","key":"11682_CR21","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"11682_CR22","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.asoc.2015.08.008","volume":"37","author":"X Wu","year":"2015","unstructured":"Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24\u201339","journal-title":"Appl Soft Comput"},{"issue":"2","key":"11682_CR23","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. J Selected Areas Telecommun (JSAT) 1(2):31\u201338","journal-title":"J Selected Areas Telecommun (JSAT)"},{"key":"11682_CR24","unstructured":"Yadav AK, Purwar RK (2008) Complexity analysis of image encryption technique. In IC3: international conference on contemporary computing (pp. 115-121)."}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11682-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11682-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11682-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T06:25:13Z","timestamp":1645511113000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11682-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,3]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["11682"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11682-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,3]]},"assertion":[{"value":"21 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 October 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}