{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T14:34:38Z","timestamp":1769956478597,"version":"3.49.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2023,1,21]],"date-time":"2023-01-21T00:00:00Z","timestamp":1674259200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,21]],"date-time":"2023-01-21T00:00:00Z","timestamp":1674259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s11042-023-14394-1","type":"journal-article","created":{"date-parts":[[2023,1,21]],"date-time":"2023-01-21T04:43:19Z","timestamp":1674276199000},"page":"25559-25583","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["S-box generation algorithm based on hyperchaotic system and its application in image encryption"],"prefix":"10.1007","volume":"82","author":[{"given":"Sen","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xiaojun","family":"Tong","sequence":"additional","affiliation":[]},{"given":"Zhu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Miao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,21]]},"reference":[{"key":"14394_CR1","doi-asserted-by":"publisher","first-page":"106465","DOI":"10.1016\/j.optlastec.2020.106465","volume":"132","author":"AA Abbasi","year":"2020","unstructured":"Abbasi AA, Mazinani M, Hosseini R (2020) Chaotic evolutionary-based image encryption using RNA codons and amino acid truth table[J]. Opt Laser Technol 132:106465","journal-title":"Opt Laser Technol"},{"key":"14394_CR2","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1016\/j.procs.2015.07.394","volume":"57","author":"M Ahmad","year":"2015","unstructured":"Ahmad M, Bhatia D, Hassan Y (2015) A novel ant colony optimization based scheme for substitution box design[J]. Procedia Comput Sci 57:572\u2013580","journal-title":"Procedia Comput Sci"},{"issue":"5","key":"14394_CR3","doi-asserted-by":"publisher","first-page":"7333","DOI":"10.1007\/s11042-020-10048-8","volume":"80","author":"HS Alhadawi","year":"2021","unstructured":"Alhadawi HS, Majid MA, Lambi\u0107 D, Ahmad M (2021) A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm[J]. Multimed Tools Appl 80(5):7333\u20137350","journal-title":"Multimed Tools Appl"},{"key":"14394_CR4","doi-asserted-by":"publisher","first-page":"1438","DOI":"10.1016\/j.ijleo.2016.11.152","volume":"130","author":"A Belazi","year":"2017","unstructured":"Belazi A, Abd El-Latif AA (2017) A simple yet efficient S-box method based on chaotic sine map[J]. Optik 130:1438\u20131444","journal-title":"Optik"},{"issue":"1","key":"14394_CR5","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s11071-016-3046-0","volume":"87","author":"A Belazi","year":"2017","unstructured":"Belazi A, Khan M, Abd El-Latif AA et al (2017) Efficient cryptosystem approaches: S-boxes and permutation\u2013substitution-based encryption[J]. Nonlinear Dyna 87(1):337\u2013361","journal-title":"Nonlinear Dyna"},{"issue":"2","key":"14394_CR6","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1007\/s11071-016-3099-0","volume":"87","author":"\u00dc \u00c7avu\u015fo\u011flu","year":"2017","unstructured":"\u00c7avu\u015fo\u011flu \u00dc, Zengin A, Pehlivan I, Ka\u00e7ar S (2017) A novel approach for strong S-box generation algorithm design based on chaotic scaled Zhongtang system[J]. Nonlinear Dyna 87(2):1081\u20131094","journal-title":"Nonlinear Dyna"},{"key":"14394_CR7","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations[J]. Opt Lasers Eng 88:197\u2013213","journal-title":"Opt Lasers Eng"},{"issue":"4","key":"14394_CR8","doi-asserted-by":"publisher","first-page":"2399","DOI":"10.1007\/s11071-018-4332-9","volume":"93","author":"J Chen","year":"2018","unstructured":"Chen J, Han F, Qian W, Yao YD, Zhu ZL (2018) Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map[J]. Nonlinear Dyna 93(4):2399\u20132413","journal-title":"Nonlinear Dyna"},{"key":"14394_CR9","doi-asserted-by":"publisher","first-page":"167286","DOI":"10.1016\/j.ijleo.2021.167286","volume":"243","author":"Q Cun","year":"2021","unstructured":"Cun Q, Tong X, Wang Z, Zhang M (2021) Selective image encryption method based on dynamic DNA coding and new chaotic map[J]. Optik 243:167286","journal-title":"Optik"},{"issue":"8","key":"14394_CR10","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.3390\/electronics9081280","volume":"9","author":"L Ding","year":"2020","unstructured":"Ding L, Ding Q (2020) A novel image encryption scheme based on 2D fractional chaotic map, DWT and 4D hyper-chaos[J]. Electronics 9(8):1280","journal-title":"Electronics"},{"issue":"11","key":"14394_CR11","doi-asserted-by":"publisher","first-page":"e0242110","DOI":"10.1371\/journal.pone.0242110","volume":"15","author":"D Fang","year":"2020","unstructured":"Fang D, Sun S (2020) A new secure image encryption algorithm based on a 5D hyperchaotic map[J]. PLoS One 15(11):e0242110","journal-title":"PLoS One"},{"issue":"2","key":"14394_CR12","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1007\/s11071-016-3295-y","volume":"88","author":"T Farah","year":"2017","unstructured":"Farah T, Rhouma R, Belghith S (2017) A novel method for designing S-box based on chaotic map and teaching\u2013learning-based optimization[J]. Nonlinear Dyna 88(2):1059\u20131074","journal-title":"Nonlinear Dyna"},{"key":"14394_CR13","doi-asserted-by":"publisher","first-page":"223","DOI":"10.46912\/napas.125","volume":"2","author":"T Gbaden","year":"2019","unstructured":"Gbaden T (2019) A Chaos based image encryption scheme using one dimensional exponential logistic map[J]. Nigerian Annals Pure App Sci 2:223\u2013237","journal-title":"Nigerian Annals Pure App Sci"},{"issue":"10","key":"14394_CR14","doi-asserted-by":"publisher","first-page":"5111","DOI":"10.1007\/s00521-020-05304-9","volume":"33","author":"N Hematpour","year":"2021","unstructured":"Hematpour N, Ahadpour S (2021) Execution examination of chaotic S-box dependent on improved PSO algorithm[J]. Neural Comput Applic 33(10):5111\u20135133","journal-title":"Neural Comput Applic"},{"issue":"9","key":"14394_CR15","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.3390\/electronics10091066","volume":"10","author":"KM Hosny","year":"2021","unstructured":"Hosny KM, Kamal ST, Darwish MM, Papakostas GA (2021) New image encryption algorithm using hyperchaotic system and fibonacci q-matrix[J]. Electronics 10(9):1066","journal-title":"Electronics"},{"key":"14394_CR16","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"Z Hua","year":"2019","unstructured":"Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption[J]. Inf Sci 480:403\u2013419","journal-title":"Inf Sci"},{"issue":"6","key":"14394_CR17","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1007\/s11760-013-0577-4","volume":"9","author":"M Khan","year":"2015","unstructured":"Khan M, Shah T (2015) An efficient construction of substitution box with fractional chaotic system[J]. SIViP 9(6):1335\u20131338","journal-title":"SIViP"},{"issue":"4","key":"14394_CR18","doi-asserted-by":"publisher","first-page":"2407","DOI":"10.1007\/s11071-016-3199-x","volume":"87","author":"D Lambi\u0107","year":"2017","unstructured":"Lambi\u0107 D (2017) A novel method of S-box design based on discrete chaotic map[J]. Nonlinear Dyna 87(4):2407\u20132413","journal-title":"Nonlinear Dyna"},{"issue":"4","key":"14394_CR19","doi-asserted-by":"publisher","first-page":"1867","DOI":"10.1007\/s11071-015-2283-y","volume":"82","author":"G Liu","year":"2015","unstructured":"Liu G, Yang W, Liu W, Dai Y (2015) Designing S-boxes based on 3-D four-wing autonomous chaotic system[J]. Nonlinear Dyna 82(4):1867\u20131877","journal-title":"Nonlinear Dyna"},{"issue":"4","key":"14394_CR20","doi-asserted-by":"publisher","first-page":"1740004","DOI":"10.1142\/S0218348X17400047","volume":"25","author":"S Liu","year":"2017","unstructured":"Liu S, Pan Z, Cheng X (2017) A novel fast fractal image compression method based on distance clustering in high dimensional sphere surface[J]. Fractals 25(4):1740004","journal-title":"Fractals"},{"key":"14394_CR21","doi-asserted-by":"crossref","first-page":"2016976","DOI":"10.1155\/2018\/2016976","volume":"2018","author":"S Liu","year":"2018","unstructured":"Liu S, Bai W, Liu G et al (2018) Parallel fractal compression method for big video data[J]. Complexity 2018:2016976","journal-title":"Complexity"},{"issue":"12","key":"14394_CR22","doi-asserted-by":"publisher","first-page":"2650","DOI":"10.3390\/app8122650","volume":"8","author":"L Liu","year":"2018","unstructured":"Liu L, Zhang Y, Wang X (2018) A novel method for constructing the S-box based on spatiotemporal chaotic dynamics[J]. Appl Sci 8(12):2650","journal-title":"Appl Sci"},{"key":"14394_CR23","first-page":"125153","volume":"376","author":"H Liu","year":"2020","unstructured":"Liu H, Kadir A, Xu C (2020) Cryptanalysis and constructing S-box based on chaotic map and backtracking[J]. Appl Math Comput 376:125153","journal-title":"Appl Math Comput"},{"issue":"1","key":"14394_CR24","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/TFUZZ.2020.3006520","volume":"29","author":"S Liu","year":"2021","unstructured":"Liu S, Wang S, Liu X, Lin CT, Lv Z (2021) Fuzzy detection aided real-time and robust visual tracking under complex environments[J]. IEEE Trans Fuzzy Syst 29(1):90\u2013102","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"14394_CR25","doi-asserted-by":"publisher","first-page":"163505","DOI":"10.1016\/j.ijleo.2019.163505","volume":"202","author":"H Nematzadeh","year":"2020","unstructured":"Nematzadeh H, Enayatifar R, Yadollahi M, Lee M, Jeong G (2020) Binary search tree image encryption with DNA[J]. Optik 202:163505","journal-title":"Optik"},{"issue":"2","key":"14394_CR26","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1016\/j.chaos.2004.04.023","volume":"23","author":"G Tang","year":"2005","unstructured":"Tang G, Liao X, Chen Y (2005) A novel method for designing S-boxes based on chaotic maps[J]. Chaos, Solitons Fractals 23(2):413\u2013419","journal-title":"Chaos, Solitons Fractals"},{"issue":"4","key":"14394_CR27","doi-asserted-by":"publisher","first-page":"2757","DOI":"10.1007\/s11071-017-3409-1","volume":"88","author":"A Ullah","year":"2017","unstructured":"Ullah A, Jamal SS, Shah T (2017) A novel construction of substitution box using a combination of chaotic maps with improved chaotic range[J]. Nonlin Dyna 88(4):2757\u20132769","journal-title":"Nonlin Dyna"},{"key":"14394_CR28","doi-asserted-by":"publisher","first-page":"164884","DOI":"10.1016\/j.ijleo.2020.164884","volume":"217","author":"X Wang","year":"2020","unstructured":"Wang X, Yang J (2020) A novel image encryption scheme of dynamic S-boxes and random blocks based on spatiotemporal chaotic system[J]. Optik 217:164884","journal-title":"Optik"},{"issue":"6\u20137","key":"14394_CR29","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1016\/j.physleta.2012.01.009","volume":"376","author":"Y Wang","year":"2012","unstructured":"Wang Y, Wong KW, Li C, Li Y (2012) A novel method to design S-box based on chaotic map and genetic algorithm[J]. Phys Lett A 376(6\u20137):827\u2013833","journal-title":"Phys Lett A"},{"key":"14394_CR30","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.ins.2019.02.049","volume":"486","author":"X Wang","year":"2019","unstructured":"Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system[J]. Inf Sci 486:340\u2013358","journal-title":"Inf Sci"},{"key":"14394_CR31","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.ins.2020.03.025","volume":"523","author":"Y Wang","year":"2020","unstructured":"Wang Y, Zhang Z, Zhang LY, Feng J, Gao J, Lei P (2020) A genetic algorithm for constructing bijective substitution boxes with high nonlinearity[J]. Inf Sci 523:152\u2013166","journal-title":"Inf Sci"},{"key":"14394_CR32","doi-asserted-by":"publisher","first-page":"110309","DOI":"10.1016\/j.chaos.2020.110309","volume":"141","author":"X Wang","year":"2020","unstructured":"Wang X, Xue W, An J (2020) Image encryption algorithm based on Tent-Dynamics coupled map lattices and diffusion of Household[J]. Chaos, Solitons Fractals 141:110309","journal-title":"Chaos, Solitons Fractals"},{"issue":"6","key":"14394_CR33","doi-asserted-by":"publisher","first-page":"1884","DOI":"10.1016\/j.cnsns.2013.10.025","volume":"19","author":"X Wu","year":"2014","unstructured":"Wu X, Bai C, Kan H (2014) A new color image cryptosystem via hyperchaos synchronization[J]. Commun Nonlinear Sci Numer Simul 19(6):1884\u20131897","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"14394_CR34","doi-asserted-by":"publisher","first-page":"106553","DOI":"10.1016\/j.optlastec.2020.106553","volume":"133","author":"Y Yang","year":"2021","unstructured":"Yang Y, Wang L, Duan S, Luo L (2021) Dynamical analysis and image encryption application of a novel memristive hyperchaotic system[J]. Opt Laser Technol 133:106553","journal-title":"Opt Laser Technol"},{"issue":"6","key":"14394_CR35","doi-asserted-by":"publisher","first-page":"7841","DOI":"10.1007\/s11042-018-6496-1","volume":"78","author":"X Zhang","year":"2019","unstructured":"Zhang X, Wang X (2019) Multiple-image encryption algorithm based on DNA encoding and chaotic system[J]. Multimed Tools Appl 78(6):7841\u20137869","journal-title":"Multimed Tools Appl"},{"key":"14394_CR36","doi-asserted-by":"publisher","first-page":"107484","DOI":"10.1016\/j.sigpro.2020.107484","volume":"171","author":"M Zhou","year":"2020","unstructured":"Zhou M, Wang C (2020) A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks[J]. Signal Process 171:107484","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14394-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-14394-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14394-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T18:25:11Z","timestamp":1728757511000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-14394-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,21]]},"references-count":36,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["14394"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-14394-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,21]]},"assertion":[{"value":"28 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 June 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}