{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T15:09:19Z","timestamp":1764601759825,"version":"3.37.3"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11042-022-11928-x","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T12:03:28Z","timestamp":1646136208000},"page":"15793-15814","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["4D chaotic system as random Substitution-Box"],"prefix":"10.1007","volume":"81","author":[{"given":"Tayseer Karam","family":"Alshekly","sequence":"first","affiliation":[]},{"given":"Ekhlas Abbas","family":"Albahrani","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7000-8337","authenticated-orcid":false,"given":"Sadeq H.","family":"Lafta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"issue":"4","key":"11928_CR1","doi-asserted-by":"publisher","first-page":"4","DOI":"10.32523\/2306-6172-2019-7-4-4-17","volume":"7","author":"EA Abbas","year":"2019","unstructured":"Abbas EA, Karam TA, Abbas AK (2019) Image cipher system based on RSA and chaotic maps. Eurasian J Math Comput Appl 7(4):4\u201317. https:\/\/doi.org\/10.32523\/2306-6172-2019-7-4-4-17","journal-title":"Eurasian J Math Comput Appl"},{"key":"11928_CR2","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-642-40576-1_13","volume":"377 CCIS","author":"M Ahmad","year":"2013","unstructured":"Ahmad M, Chugh H, Goel A, Singla P (2013) A chaos based method for efficient cryptographic S-box design. Commun Comput Inf Sci 377 CCIS:130\u2013137. https:\/\/doi.org\/10.1007\/978-3-642-40576-1_13","journal-title":"Commun Comput Inf Sci"},{"doi-asserted-by":"publisher","unstructured":"Albahrani EA, Riyam NJ, Kadhum (2019) A new cipher based on feistel structure and chaotic maps.. Baghdad Sci J 16(1). https:\/\/doi.org\/10.21123\/bsj.2019.16.1(Suppl.).0270","key":"11928_CR3","DOI":"10.21123\/bsj.2019.16.1(Suppl.).0270"},{"doi-asserted-by":"publisher","unstructured":"Albahrani EA, Maryoosh AA, Lafta SH (2020) Block image encryption based on modified playfair and chaotic system. J Inf Secur Appl 51. https:\/\/doi.org\/10.1016\/j.jisa.2019.102445","key":"11928_CR4","DOI":"10.1016\/j.jisa.2019.102445"},{"key":"11928_CR5","doi-asserted-by":"publisher","first-page":"24801","DOI":"10.1007\/s11042-021-10695-5","volume":"80","author":"TA Al-Maadeed","year":"2021","unstructured":"Al-Maadeed TA, Hussain I, Anees A et al (2021) A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes. Multimed Tools Appl 80:24801\u201324822. https:\/\/doi.org\/10.1007\/s11042-021-10695-5","journal-title":"Multimed Tools Appl"},{"unstructured":"Rukhin A, Soto J, Levenson J, Vangel M, Banks D, Heckert A, Dray J, Vo S (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication Revision 1a, vol 800","key":"11928_CR6"},{"issue":"4","key":"11928_CR7","first-page":"34","volume":"37","author":"A Awad","year":"2010","unstructured":"Awad A, Saadane A (2010) New chaotic permutation methods for image encryption. IAENG Int J Comput Sci 37(4):34\u201339","journal-title":"IAENG Int J Comput Sci"},{"doi-asserted-by":"publisher","unstructured":"Soto J, Bassham L (2000) Randomness testing of the advanced encryption standard finalist candidates. NIST Interagency\/Internal Report (NISTIR), National Institute of Standards and Technology, Gaithersburg, MD, [online]. https:\/\/doi.org\/10.6028\/NIST.IR.6483, https:\/\/tsapps.nist.gov\/publication\/get_pdf.cfm?pub_id=151216. Accessed 19 Jan 2022","key":"11928_CR8","DOI":"10.6028\/NIST.IR.6483"},{"doi-asserted-by":"publisher","unstructured":"Bin Faheem Z, Ali A, Khan MA, Ul-Haq ME, Ahmad W (2019) Highly dispersive substitution box (S-box) design using chaos. ETRI J (March):1\u201314. https:\/\/doi.org\/10.4218\/etrij.2019-0138","key":"11928_CR9","DOI":"10.4218\/etrij.2019-0138"},{"doi-asserted-by":"publisher","unstructured":"Cassal-Quiroga BB, Campos-Cant\u00f3n E (2020) Generation of dynamical S-Boxes for block ciphers via extended logistic map. Math Probl Eng 2020. https:\/\/doi.org\/10.1155\/2020\/2702653","key":"11928_CR10","DOI":"10.1155\/2020\/2702653"},{"issue":"12","key":"11928_CR11","doi-asserted-by":"publisher","first-page":"1392","DOI":"10.3390\/electronics10121392","volume":"10","author":"AAA El-Latif","year":"2021","unstructured":"El-Latif AAA, Abd-El-Atty B, Belazi A, Iliyasu AM (2021) Efficient chaos-based Substitution-Box and its application to image encryption. Electronics 10(12):1392. https:\/\/doi.org\/10.3390\/electronics10121392","journal-title":"Electronics"},{"issue":"2","key":"11928_CR12","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1007\/s11071-016-3295-y","volume":"88","author":"T Farah","year":"2017","unstructured":"Farah T, Rhouma R, Belghith S (2017) A novel method for designing S-box based on chaotic map and Teaching\u2013Learning-Based Optimization. Nonlinear Dyn 88(2):1059\u20131074. https:\/\/doi.org\/10.1007\/s11071-016-3295-y","journal-title":"Nonlinear Dyn"},{"doi-asserted-by":"publisher","unstructured":"Francois M, Grosges T,\u00a0Barchiesi D, Erra R (2013) A new pseudo-random number generator based on two chaotic maps. Informatica 24(2):181\u2013197.\u00a0https:\/\/doi.org\/10.15388\/Informatica.2013.391","key":"11928_CR13","DOI":"10.15388\/Informatica.2013.391"},{"issue":"7","key":"11928_CR14","doi-asserted-by":"publisher","first-page":"2415","DOI":"10.1007\/s00521-017-3199-x","volume":"31","author":"M Ghebleh","year":"2019","unstructured":"Ghebleh M, Kanso A (2019) A novel efficient image encryption scheme based on chained skew tent maps. Neural Comput Appl 31(7):2415\u20132430. https:\/\/doi.org\/10.1007\/s00521-017-3199-x","journal-title":"Neural Comput Appl"},{"key":"11928_CR15","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun CM, Chen CLP (2015) 2D Sine Logistic modulation map for image encryption. Inf Sci (Ny) 297:80\u201394. https:\/\/doi.org\/10.1016\/j.ins.2014.11.018","journal-title":"Inf Sci (Ny)"},{"issue":"3","key":"11928_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/sym11030351","volume":"11","author":"I Hussain","year":"2019","unstructured":"Hussain I, Anees A, Al-Maadeed TA, Mustafa MT (2019) Construction of S-Box based on chaotic map and algebraic structures. Symmetry (Basel) 11(3):1\u201311. https:\/\/doi.org\/10.3390\/sym11030351","journal-title":"Symmetry (Basel)"},{"issue":"5","key":"11928_CR17","doi-asserted-by":"publisher","first-page":"1671","DOI":"10.1016\/j.ijleo.2013.09.040","volume":"125","author":"A Kadir","year":"2014","unstructured":"Kadir A, Hamdulla A, Guo WQ (2014) Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik (Stuttg) 125(5):1671\u20131675. https:\/\/doi.org\/10.1016\/j.ijleo.2013.09.040","journal-title":"Optik (Stuttg)"},{"issue":"4","key":"11928_CR18","doi-asserted-by":"publisher","first-page":"1509","DOI":"10.3233\/IFS-141434","volume":"28","author":"M Khan","year":"2015","unstructured":"Khan M, Shah T (2015) A novel construction of substitution box with Zaslavskii chaotic map and symmetric group. J Intell Fuzzy Syst 28(4):1509\u20131517. https:\/\/doi.org\/10.3233\/IFS-141434","journal-title":"J Intell Fuzzy Syst"},{"issue":"12","key":"11928_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0225031","volume":"14","author":"M Khan","year":"2019","unstructured":"Khan M, Masood F, Alghafis A, Amin M, Naqvi SIB (2019) A novel image encryption technique using hybrid method of discrete dynamical chaotic maps and Brownian motion. PLoS ONE 14(12):1\u201323. https:\/\/doi.org\/10.1371\/journal.pone.0225031","journal-title":"PLoS ONE"},{"unstructured":"Kim S, Umeno K, Hasegawa A (2004) Corrections of the NIST statistical test suite for randomness. Cryptography eprint Archive, Tech Rep","key":"11928_CR20"},{"key":"11928_CR21","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.chaos.2013.11.001","volume":"58","author":"D Lambi\u0107","year":"2014","unstructured":"Lambi\u0107 D (2014) A novel method of S-box design based on chaotic map and composition method. Chaos Solit Fract 58:16\u201321. https:\/\/doi.org\/10.1016\/j.chaos.2013.11.001","journal-title":"Chaos Solit Fract"},{"issue":"0","key":"11928_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/24751839.2018.1434723","volume":"0","author":"D Lambi\u0107","year":"2018","unstructured":"Lambi\u0107 D (2018)S-box design method based on improved one-dimensional discrete chaotic map. J Inf Telecommun 0(0):1\u201311. https:\/\/doi.org\/10.1080\/24751839.2018.1434723","journal-title":"J Inf Telecommun"},{"issue":"5","key":"11928_CR23","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1109\/JSTSP.2020.3002391","volume":"14","author":"X Liao","year":"2020","unstructured":"Liao X, Li K, Zhu X, Liu KJR (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Sel Top Signal Process 14(5):955\u2013968. https:\/\/doi.org\/10.1109\/JSTSP.2020.3002391","journal-title":"IEEE J Sel Top Signal Process"},{"key":"11928_CR24","doi-asserted-by":"publisher","first-page":"7431","DOI":"10.1016\/j.ijleo.2016.05.073","volume":"127","author":"H Liu","year":"2016","unstructured":"Liu H, Kadir A, Li Y (2016) Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik (Stuttg) 127:7431\u20137438. https:\/\/doi.org\/10.1016\/j.ijleo.2016.05.073","journal-title":"Optik (Stuttg)"},{"key":"11928_CR25","doi-asserted-by":"publisher","first-page":"125153","DOI":"10.1016\/j.amc.2020.125153","volume":"376","author":"H Liu","year":"2020","unstructured":"Liu H, Kadir A, Xu C (2020) Cryptanalysis and constructing S-Box based on chaotic map and backtracking. Appl Math Comput 376:125153. https:\/\/doi.org\/10.1016\/j.amc.2020.125153","journal-title":"Appl Math Comput"},{"doi-asserted-by":"publisher","unstructured":"Lu Q, Zhu C, Wang G (2019) A novelS-Box design algorithm based on a new compound chaotic system. Entropy: 1004. https:\/\/doi.org\/10.3390\/e21101004","key":"11928_CR26","DOI":"10.3390\/e21101004"},{"doi-asserted-by":"crossref","unstructured":"Lu, Zhu, Wang (2019) A novel S-Box design algorithm based on a new compound chaotic system. Entropy 21(10):1004","key":"11928_CR27","DOI":"10.3390\/e21101004"},{"key":"11928_CR28","doi-asserted-by":"publisher","first-page":"25664","DOI":"10.1109\/ACCESS.2020.2970806","volume":"8","author":"Q Lu","year":"2020","unstructured":"Lu Q, Zhu C, Deng X (2020) An efficient image encryption scheme based on the LSS chaotic map and single S-Box. IEEE Access 8:25664\u201325678. https:\/\/doi.org\/10.1109\/ACCESS.2020.2970806","journal-title":"IEEE Access"},{"issue":"1","key":"11928_CR29","doi-asserted-by":"publisher","first-page":"101","DOI":"10.11591\/ijeecs.v18.i1.pp101-111","volume":"18","author":"SA Mahmood","year":"2019","unstructured":"Mahmood SA, Hussein KA, Jurn YN, Albahrani EA (2019) Parallelizable cipher of color image based on two-dimensional chaotic system. Indones J Electr Eng Comput Sci 18(1):101\u2013111. https:\/\/doi.org\/10.11591\/ijeecs.v18.i1.pp101-111","journal-title":"Indones J Electr Eng Comput Sci"},{"unstructured":"Daemen J, Rijmen V (2011) The design of Rijndael \u2014 AES, the advanced encryption standard. Springer","key":"11928_CR30"},{"issue":"8","key":"11928_CR31","doi-asserted-by":"publisher","first-page":"3317","DOI":"10.1007\/s00521-017-3287-y","volume":"31","author":"F \u00d6zkaynak","year":"2017","unstructured":"\u00d6zkaynak F (2017) Construction of robust substitution boxes based on chaotic systems. Neural Comput Appl 31(8):3317\u20133326. https:\/\/doi.org\/10.1007\/s00521-017-3287-y","journal-title":"Neural Comput Appl"},{"issue":"4","key":"11928_CR32","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1007\/s11760-016-1007-1","volume":"11","author":"F \u00d6zkaynak","year":"2017","unstructured":"\u00d6zkaynak F, \u00c7elik V, \u00d6zer AB (2017) A new S-box construction method based on the fractional-order chaotic Chen system. Signal, Image Video Process 11(4):659\u2013664. https:\/\/doi.org\/10.1007\/s11760-016-1007-1","journal-title":"Signal, Image Video Process"},{"key":"11928_CR33","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Sig Process 138:129\u2013137. https:\/\/doi.org\/10.1016\/j.sigpro.2017.03.011","journal-title":"Sig Process"},{"key":"11928_CR34","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1016\/j.physleta.2005.12.030","volume":"352","author":"GY Qi","year":"2006","unstructured":"Qi GY, Chen GR (2006) Analysis and circuit implementation of a new 4D chaotic system. Phys Lett A 352:386\u2013397. https:\/\/doi.org\/10.1016\/j.physleta.2005.12.030","journal-title":"Phys Lett A"},{"doi-asserted-by":"publisher","unstructured":"Tian Y, Lu Z (2017) Novel permutation-diffusion image encryption algorithm with chaotic dynamic S-box and DNA sequence operation. AIP Adv 7(8). https:\/\/doi.org\/10.1063\/1.4994860","key":"11928_CR35","DOI":"10.1063\/1.4994860"},{"doi-asserted-by":"publisher","unstructured":"Tian Y, Lu Z (2017) Chaotic S-Box: intertwining logistic map and bacterial foraging optimization. Math Probl Eng 2017. https:\/\/doi.org\/10.1155\/2017\/6969312","key":"11928_CR36","DOI":"10.1155\/2017\/6969312"},{"issue":"2","key":"11928_CR37","doi-asserted-by":"publisher","first-page":"171","DOI":"10.3390\/e22020171","volume":"22","author":"Y Wan","year":"2020","unstructured":"Wan Y, Gu S, Du B (2020) A new image encryption algorithm based on composite chaos and hyperchaos combined with DNA coding. Entropy 22(2):171","journal-title":"Entropy"},{"doi-asserted-by":"publisher","unstructured":"Wang X (2019)S-box based image encryption application using a chaotic system without equilibrium. Appl Sci 9(4). https:\/\/doi.org\/10.3390\/app9040781","key":"11928_CR38","DOI":"10.3390\/app9040781"},{"issue":"10","key":"11928_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S0218127415501278","volume":"25","author":"Y Wang","year":"2015","unstructured":"Wang Y, Lei P, Wong KW (2015) A Method for constructing bijective s-box with high nonlinearity based on chaos and optimization. Int J Bifurc Chaos 25(10):1\u201315. https:\/\/doi.org\/10.1142\/S0218127415501278","journal-title":"Int J Bifurc Chaos"},{"doi-asserted-by":"publisher","unstructured":"Yao W, Wu F,\u00a0Zhang X, Zheng Z, Wang Z, Wang W, Qiu W (2016) A fast color image encryption algorithm using 4-pixel feistel structure. PLoS One 11(11):e0165937. https:\/\/doi.org\/10.1371\/journal.pone.0165937","key":"11928_CR40","DOI":"10.1371\/journal.pone.0165937"},{"key":"11928_CR41","doi-asserted-by":"publisher","first-page":"53079","DOI":"10.1109\/ACCESS.2019.2911395","volume":"7","author":"L Yi","year":"2019","unstructured":"Yi L, Tong X, Wang Z, Zhang M, Zhu H, Liu J (2019) A novel block encryption algorithm based on chaotic S-Box for wireless sensor network. IEEE Access 7:53079\u201353090. https:\/\/doi.org\/10.1109\/ACCESS.2019.2911395","journal-title":"IEEE Access"},{"issue":"4","key":"11928_CR42","doi-asserted-by":"publisher","first-page":"4585","DOI":"10.1007\/s11042-017-4637-6","volume":"77","author":"C Yu","year":"2018","unstructured":"Yu C, Li J, Li X, Ren X, Gupta BB (2018)Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram., \u201d Multimed Tools Appl 77(4):4585\u20134608. doi: https:\/\/doi.org\/10.1007\/s11042-017-4637-6","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-11928-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-11928-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-11928-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T11:29:42Z","timestamp":1651490982000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-11928-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,1]]},"references-count":42,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["11928"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-11928-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2022,3,1]]},"assertion":[{"value":"14 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare that there is no conflict of interest concerns the publication of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}