{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T15:54:46Z","timestamp":1745855686725},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T00:00:00Z","timestamp":1684800000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T00:00:00Z","timestamp":1684800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004410","name":"T\u00fcrkiye Bilimsel ve Teknolojik Ara\u015ft\u0131rma Kurumu","doi-asserted-by":"publisher","award":["1059B192000947"],"award-info":[{"award-number":["1059B192000947"]}],"id":[{"id":"10.13039\/501100004410","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11042-023-15240-0","type":"journal-article","created":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T12:02:19Z","timestamp":1684843339000},"page":"4167-4194","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A novel method for image encryption using time signature-dependent s-boxes based on latin squares and the playfair system of cryptography"],"prefix":"10.1007","volume":"83","author":[{"given":"Steven T.","family":"Dougherty","sequence":"first","affiliation":[]},{"given":"Serap","family":"Sahinkaya","sequence":"additional","affiliation":[]},{"given":"Deniz","family":"Ustun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,23]]},"reference":[{"issue":"3","key":"15240_CR1","doi-asserted-by":"publisher","first-page":"2003","DOI":"10.1007\/s11071-018-4471-z","volume":"94","author":"JA Aboytes-Gonzalez","year":"2018","unstructured":"Aboytes-Gonzalez JA, Murguia JS, Mejia-Carlos M, Gonzalez-Aguilar H, Ramirez-Torres MT (2018) Design of a strong S-Box based on a matrix approach. Nonlinear Dyn 94(3):2003\u20132012","journal-title":"Nonlinear Dyn"},{"key":"15240_CR2","doi-asserted-by":"publisher","first-page":"7201","DOI":"10.1007\/s00521-018-3557-3","volume":"31","author":"HA Ahmed","year":"2018","unstructured":"Ahmed HA, Zolkipli MF, Ahmad M (2018) A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput Applic 31:7201\u20137210","journal-title":"Neural Comput Applic"},{"key":"15240_CR3","doi-asserted-by":"publisher","first-page":"7333","DOI":"10.1007\/s11042-020-10048-8","volume":"80","author":"HS Alhadawi","year":"2021","unstructured":"Alhadawi HS, Majid M, Lambi D et al (2021) A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm. Multimed Tools Appl 80:7333\u20137350","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"15240_CR4","first-page":"337","volume":"87","author":"A Belazi","year":"2017","unstructured":"Belazi A, Khan M, El-Latif AAA, Belghith S (2017) Efficient cryptosystem approaches: S-Boxes and permutation-substitution- based encryption. Wirel Pers Commun 87(1):337\u2013361","journal-title":"Wirel Pers Commun"},{"key":"15240_CR5","doi-asserted-by":"publisher","unstructured":"Cassal-Quiroga BB, Campos-Canton E (2020) Geration of dynamical S-Boxes for block ciphers via extended logistic map. Math Probl Eng. https:\/\/doi.org\/10.1155\/2020\/2702653","DOI":"10.1155\/2020\/2702653"},{"issue":"1","key":"15240_CR6","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s00521-017-2993-9","volume":"31","author":"XL Chai","year":"2019","unstructured":"Chai XL et al (2019) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput Appl 31(1):219\u2013237","journal-title":"Neural Comput Appl"},{"key":"15240_CR7","doi-asserted-by":"publisher","first-page":"xv+\u2009369","DOI":"10.1007\/978-3-030-56395-0","volume-title":"Combinatorics and finite geometry, Springer undergraduate mathematics series","author":"ST Dougherty","year":"2020","unstructured":"Dougherty ST (2020) Combinatorics and finite geometry, Springer undergraduate mathematics series. Springer, Cham, p xv+\u2009369. ISBN: 978-3-030-56395-0978-3-030-56394-3 05-01"},{"key":"15240_CR8","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1007\/s11071-021-06308-3","volume":"104","author":"Z Hua","year":"2021","unstructured":"Hua Z, Li J, Chen Y et al (2021) Design and application of an S-Box using complete Latin square. Nonlinear Dyn 104:807\u2013825. https:\/\/doi.org\/10.1007\/s11071-021-06308-3","journal-title":"Nonlinear Dyn"},{"issue":"6","key":"15240_CR9","first-page":"135","volume":"79","author":"B Idrees","year":"2020","unstructured":"Idrees B et al (2020) Image encryption algorithm using S-box and dynamic Henon bit level permutation. Multimed Tools Appl 79(6):135\u20136162","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"15240_CR10","doi-asserted-by":"publisher","first-page":"2033","DOI":"10.1007\/s11277-016-3436-0","volume":"90","author":"SS Jamal","year":"2016","unstructured":"Jamal SS, Khan MU, Shah T (2016) A watermarking technique with chaotic fractional S-Box transformation. Wirel Pers Commun 90(4):2033\u20132049","journal-title":"Wirel Pers Commun"},{"key":"15240_CR11","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1007\/s00521-016-2511-5","volume":"29","author":"M Khan","year":"2018","unstructured":"Khan M, Asghar Z (2018) A novel construction of substitution box for image encryption applications with Ginger breadman chaotic map and S8 permutation. Neural Comput Appli 29:993\u2013999","journal-title":"Neural Comput Appli"},{"issue":"3","key":"15240_CR12","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1007\/s00521-015-1887-y","volume":"27","author":"M Khan","year":"2016","unstructured":"Khan M, Shah T, Batool S (2016) Construction of S-Box based on chaotic Boolean functions and its application in image encryption. Neural Comput Appl 27(3):677\u2013685","journal-title":"Neural Comput Appl"},{"key":"15240_CR13","doi-asserted-by":"publisher","unstructured":"Kumar CM, Vidhya R, Brindha M (2021) An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function. Appl Intell. https:\/\/doi.org\/10.1007\/s10489-021-02508-x","DOI":"10.1007\/s10489-021-02508-x"},{"issue":"12","key":"15240_CR14","doi-asserted-by":"publisher","first-page":"2050173","DOI":"10.1142\/S0218127420501734","volume":"30","author":"H Liu","year":"2020","unstructured":"Liu H, Kadir A, Xu C (2020) Color image encryption with cipher feedback and coupling chaotic map. International Journal of bifurcation and chaos 30(12):2050173","journal-title":"International Journal of bifurcation and chaos"},{"key":"15240_CR15","first-page":"125","volume":"376","author":"H Liu","year":"2020","unstructured":"Liu H, Kadir A, Xu C (2020) Cryptanalysis and constructing S-Box based on chaotic map and backtracking. Appl Math Comput 376:125","journal-title":"Appl Math Comput"},{"issue":"01","key":"15240_CR16","first-page":"2019","volume":"1303","author":"L Liu","year":"2090","unstructured":"Liu L, Lei Z (2090) An approach for constructing the S-Box using the CML system. J Phys Conf Ser 1303(01):2019","journal-title":"J Phys Conf Ser"},{"issue":"11","key":"15240_CR17","doi-asserted-by":"publisher","first-page":"2250163","DOI":"10.1142\/S0218127422501632","volume":"32","author":"H Liu","year":"2022","unstructured":"Liu H, Wang X, Zhao M, Niu Y (2022) Constructing strong S-Box by 2D chaotic map with application to irreversible parallel key expansion. Int J Bifurcation and Chaos 32(11):2250163","journal-title":"Int J Bifurcation and Chaos"},{"key":"15240_CR18","doi-asserted-by":"publisher","unstructured":"Manjula G, Mohan H (2016) Constructing key dependent dynamic S-box for AES block cipher system. In: 2016 2nd International conference on applied and theoretical computing and communication technology, pp 613\u2013617. https:\/\/doi.org\/10.1109\/ICATCCT.2016.7912073","DOI":"10.1109\/ICATCCT.2016.7912073"},{"key":"15240_CR19","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.sigpro.2019.02.016","volume":"160","author":"A Moatsum","year":"2019","unstructured":"Moatsum A et al (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45\u201348","journal-title":"Signal Process"},{"key":"15240_CR20","unstructured":"Naseer A, Siddiqui N (2020) A novel approach for construction of S-Box using modified Pascal\u2019s triangle. Int J Comput Sci Inf Sec, vol 18(1)"},{"issue":"10","key":"15240_CR21","doi-asserted-by":"publisher","first-page":"2150146","DOI":"10.1142\/S0218127421501467","volume":"31","author":"Y Si","year":"2021","unstructured":"Si Y, Liu H, Chen Y (2021) Constructing keyed strong S-Box using an enhanced quadratic map. Int J Bifurcation and Chaos 31(10):2150146","journal-title":"Int J Bifurcation and Chaos"},{"key":"15240_CR22","unstructured":"Sosa PM (2016) Calculating non-linearity of Boolean functions with Walsh-Hadamard Transform, UCSB, Santa Barbara, pp 1\u20134"},{"key":"15240_CR23","doi-asserted-by":"publisher","first-page":"4295","DOI":"10.1007\/s00521-021-06552-z","volume":"34","author":"A Toktas","year":"2022","unstructured":"Toktas A, Erkan U (2022) 2D Fully chaotic map for image encryption constructed through a quadruple-objective optimization via artificial bee colony algorithm. Neural Comput and Applic 34:4295\u20134319. https:\/\/doi.org\/10.1007\/s00521-021-06552-z","journal-title":"Neural Comput and Applic"},{"key":"15240_CR24","unstructured":"Trappe W, Washington CL (2006) Introduction to cryptography with coding theory, 2nd edition. Pearson Prentice Hall, Upper Saddle River, NJ. xiv+\u2009577 pp. ISBN: 0-13-186239-1"},{"issue":"4","key":"15240_CR25","doi-asserted-by":"publisher","first-page":"2757","DOI":"10.1007\/s11071-017-3409-1","volume":"88","author":"A Ullah","year":"2017","unstructured":"Ullah A, Jamal SS, Shah T (2017) A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn 88(4):2757\u20132769","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"15240_CR26","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s11071-017-3874-6","volume":"91","author":"A Ullah","year":"2018","unstructured":"Ullah A, Jamal SS, Shah T (2018) A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn 91(1):359\u2013370","journal-title":"Nonlinear Dyn"},{"key":"15240_CR27","doi-asserted-by":"publisher","first-page":"3101","DOI":"10.1007\/s10489-020-01697-1","volume":"50","author":"R Vidhya","year":"2020","unstructured":"Vidhya R, Brindha M, Gounden AN (2020) Analysis of zig-zag scan based modified feedback convolution algorithm against differential attacks and its application to image encryption. Appl Intell 50:3101\u20133124","journal-title":"Appl Intell"},{"key":"15240_CR28","doi-asserted-by":"publisher","unstructured":"Webster AF, Tavares SE (1986) On the Design of S-Boxes. In: Williams H. C. (ed) Advances in cryptology -CRYPTO-85 proceedings. CRYPTO 1985. Lecture notes in computer science, vol 218. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/3-540-39799-X-41","DOI":"10.1007\/3-540-39799-X-41"},{"key":"15240_CR29","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for Image encryption. Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun 1:31\u201338","journal-title":"Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun"},{"key":"15240_CR30","doi-asserted-by":"publisher","unstructured":"Zheng J, Zeng Q (2022) An image encryption algorithm using a dynamic S-box and chaotic maps. Appl Intell. https:\/\/doi.org\/10.1007\/s10489-022-03174-3","DOI":"10.1007\/s10489-022-03174-3"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15240-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15240-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15240-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,6]],"date-time":"2024-01-06T05:17:34Z","timestamp":1704518254000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15240-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,23]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["15240"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15240-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,23]]},"assertion":[{"value":"8 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Data sharing not applicable to this article as no datasets were generated or analyzed during the current study. The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Statements and Declarations"}}]}}