{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T09:47:32Z","timestamp":1775209652335,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"27","license":[{"start":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T00:00:00Z","timestamp":1735948800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T00:00:00Z","timestamp":1735948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-20575-3","type":"journal-article","created":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T04:17:56Z","timestamp":1735964276000},"page":"33219-33235","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Extended fractional transformation based S-box and applications in medical image encryption"],"prefix":"10.1007","volume":"84","author":[{"given":"Javed","family":"Ali","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5715-9299","authenticated-orcid":false,"given":"Muhammad Kamran","family":"Jamil","sequence":"additional","affiliation":[]},{"given":"Rashad","family":"Ali","sequence":"additional","affiliation":[]},{"family":"Gulraiz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,4]]},"reference":[{"key":"20575_CR1","unstructured":"Massey J, Lai X (1991) International data encryption algorithm. Signal Inf. Process. Lab,. Eidgenossische Technique Hoehschule (ETH) Zurich. Zurich, Switzerland, Tech. Rep. 9752"},{"key":"20575_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael-AES: The Advanced Encryption Standar","author":"J Daeman","year":"2002","unstructured":"Daeman J, Rijmen V (2002) The Design of Rijndael-AES: The Advanced Encryption Standar. Springer, Berlin, Germany"},{"key":"20575_CR3","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Labs Tech J 28:656\u2013715","journal-title":"Bell Labs Tech J"},{"issue":"7","key":"20575_CR4","doi-asserted-by":"publisher","first-page":"8759","DOI":"10.1007\/s11042-017-4772-0","volume":"77","author":"Z Gan","year":"2018","unstructured":"Gan Z, Chai X, Yuan K, Lu Y (2018) A novel image encryption algorithm based on LFT based S-boxes and chaos. Multimed Tools Appl 77(7):8759\u20138783","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"20575_CR5","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s00521-012-0914-5","volume":"23","author":"I Hussain","year":"2013","unstructured":"Hussain I, Shah T, Gondal MA, Khan WA, Mahmood H (2013) A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput Appl 23(1):97\u2013104","journal-title":"Neural Comput Appl"},{"issue":"12","key":"20575_CR6","first-page":"1779","volume":"14","author":"I Hussain","year":"2011","unstructured":"Hussain I, Shah T, Gondal MA, Khan M, Khan WA (2011) Construction of new S-box using a linear fractional transformation. World Appl Sci J 14(12):1779\u20131785","journal-title":"World Appl Sci J"},{"key":"20575_CR7","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s11071-012-0646-1","volume":"71","author":"I Hussain","year":"2013","unstructured":"Hussain I, Shah T, Gondal MA, Mahmood H (2013) An efficient approach for the construction of LFT S-boxes using chaotic logistic map. Nonlinear Dyn 71:133\u2013140","journal-title":"Nonlinear Dyn"},{"key":"20575_CR8","doi-asserted-by":"crossref","unstructured":"Ali R, Ali J, Ping P, Jamil MK (2024) A novel S-box generator using Frobenius automorphism and its applications in image encryption. Nonlinear Dyn 1\u201324","DOI":"10.1007\/s11071-024-10003-4"},{"issue":"3","key":"20575_CR9","doi-asserted-by":"publisher","first-page":"245","DOI":"10.3390\/e21030245","volume":"21","author":"A Zahid","year":"2019","unstructured":"Zahid A, Arshad M, Ahmad M (2019) A novel construction of efficient substitution-boxes using cubic fractional transformation. Entropy 21(3):245","journal-title":"Entropy"},{"key":"20575_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/6969312","volume":"2017","author":"Y Tian","year":"2017","unstructured":"Tian Y, Lu Z (2017) Chaotic S-Box: Intertwining Logistic Map and Bacterial Foraging Optimization. Math Probl Eng 2017:1\u201311","journal-title":"Math Probl Eng"},{"key":"20575_CR11","unstructured":"Webster AF, Tavares SE (1986) On the design of S-boxes, advances in cryptology. In: Proceedings of Crypto\u201985. Springer, Berlin, Germany"},{"issue":"4","key":"20575_CR12","first-page":"105","volume":"18","author":"B Arshad","year":"2020","unstructured":"Arshad B, Siddiqui N (2020) Construction of highly nonlinear substitution boxes (S-boxes) based on connected regular graphs. Int J Comput Sci Inf Secur 18(4):105\u2013122","journal-title":"Int J Comput Sci Inf Secur"},{"issue":"11","key":"20575_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0241890","volume":"15","author":"N Siddiqui","year":"2020","unstructured":"Siddiqui N, Yousaf F, Murtaza F, Haq ME, Ashraf MU, Alghamdi AM, Alfakeeh ASAS (2020) A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field. PLoS One 15(11):1\u201316","journal-title":"PLoS One"},{"issue":"3","key":"20575_CR14","doi-asserted-by":"publisher","first-page":"437","DOI":"10.3390\/sym11030437","volume":"11","author":"A Zahid","year":"2019","unstructured":"Zahid A, Arshad M (2019) An innovative design of substitution-boxes using cubic polynomial mapping. Symmetry 11(3):437","journal-title":"Symmetry"},{"key":"20575_CR15","doi-asserted-by":"crossref","unstructured":"Ali J, Jamil MK, Alali AS, Ali R (2023) A medical image encryption scheme based on Mobius transformation and Galois field. Heliyon 10(1)","DOI":"10.1016\/j.heliyon.2023.e23652"},{"key":"20575_CR16","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/ACCESS.2021.3095618","volume":"9","author":"A Zahid","year":"2021","unstructured":"Zahid A, Tawalbeh L, Ahmad M, Alkhayyat A, Hassan MT, Manzoor A, Farhan AK (2021) Efficient dynamic S-box generation using linear trigonometric transformation for security applications. IEEE Access 9:2\u201317","journal-title":"IEEE Access"},{"key":"20575_CR17","doi-asserted-by":"publisher","first-page":"132908","DOI":"10.1109\/ACCESS.2022.3230141","volume":"10","author":"A Mahboob","year":"2022","unstructured":"Mahboob A, Asif M, Nadeem M, Saleem A, Eldin SM, Siddique I (2022) A Cryptographic Scheme for Construction of Substitution Boxes Using Quantic Fractional Transformation. IEEE Access 10:132908\u2013132916","journal-title":"IEEE Access"},{"key":"20575_CR18","doi-asserted-by":"publisher","first-page":"84980","DOI":"10.1109\/ACCESS.2019.2925081","volume":"7","author":"MF Khan","year":"2019","unstructured":"Khan MF, Ahmed A, Saleem K, Shah T (2019) A novel design of cryptographic SP-network based on gold sequences and chaotic logistic tent system. IEEE Access 7:84980\u201384991","journal-title":"IEEE Access"},{"issue":"2","key":"20575_CR19","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1080\/19393555.2020.1718248","volume":"29","author":"PT Akkasaligar","year":"2020","unstructured":"Akkasaligar PT, Biradar S (2020) Selective medical image encryption using DNA cryptography. Inf Secur J Global Perspect 29(2):91\u2013101","journal-title":"Inf Secur J Global Perspect"},{"key":"20575_CR20","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.sigpro.2016.10.003","volume":"132","author":"W Cao","year":"2017","unstructured":"Cao W, Zhou Y, Chen CP, Xia L (2017) Medical image encryption using edge maps. Signal Process 132:96\u2013109","journal-title":"Signal Process"},{"key":"20575_CR21","doi-asserted-by":"publisher","first-page":"37855","DOI":"10.1109\/ACCESS.2021.3063237","volume":"9","author":"ST Kamal","year":"2021","unstructured":"Kamal ST, Hosny KM, Elgindy TM, Darwish MM, Fouda MM (2021) A new image encryption algorithm for grey and color medical images. IEEE Access 9:37855\u201337865","journal-title":"IEEE Access"},{"key":"20575_CR22","doi-asserted-by":"crossref","unstructured":"Alali AS, Ali R, Jamil MK, Ali J, Gulraiz (2024) Dynamic S-box construction using mordell elliptic curves over Galois field and its applications in image encryption. Mathematics 12(4):587","DOI":"10.3390\/math12040587"},{"key":"20575_CR23","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.sigpro.2017.10.004","volume":"144","author":"Z Hua","year":"2018","unstructured":"Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134\u2013144","journal-title":"Signal Process"},{"key":"20575_CR24","doi-asserted-by":"publisher","first-page":"109107","DOI":"10.1016\/j.sigpro.2023.109107","volume":"211","author":"NR Zhou","year":"2023","unstructured":"Zhou NR, Tong LJ, Zou WP (2023) Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation. Signal Process 211:109107","journal-title":"Signal Process"},{"key":"20575_CR25","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.apm.2024.04.012","volume":"131","author":"Z Guo","year":"2024","unstructured":"Guo Z, Chen SH, Zhou L, Gong LH (2024) Optical image encryption and authentication scheme with computational ghost imaging. Appl Math Model 131:49\u201366","journal-title":"Appl Math Model"},{"key":"20575_CR26","doi-asserted-by":"publisher","first-page":"109665","DOI":"10.1016\/j.optlastec.2023.109665","volume":"167","author":"LH Gong","year":"2023","unstructured":"Gong LH, Luo HX (2023) Dual color images watermarking scheme with geometric correction based on quaternion FrOOFMMs and LS-SVR. Opt Laser Technol 167:109665","journal-title":"Opt Laser Technol"},{"key":"20575_CR27","doi-asserted-by":"publisher","first-page":"122052","DOI":"10.1016\/j.eswa.2023.122052","volume":"238","author":"NR Zhou","year":"2024","unstructured":"Zhou NR, Hu LL, Huang ZW, Wang MM, Luo GS (2024) Novel multiple color images encryption and decryption scheme based on a bit-level extension algorithm. Expert Syst Appl 238:122052","journal-title":"Expert Syst Appl"},{"issue":"10","key":"20575_CR28","doi-asserted-by":"publisher","first-page":"1550127","DOI":"10.1142\/S0218127415501278","volume":"25","author":"Y Wang","year":"2015","unstructured":"Wang Y, Lei P, Wong KW (2015) A method for constructing bijective S-box with high nonlinearity based on chaos and optimization. Int J Bifurcation Chaos 25(10):1550127","journal-title":"Int J Bifurcation Chaos"},{"key":"20575_CR29","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.ins.2020.03.025","volume":"523","author":"Y Wang","year":"2020","unstructured":"Wang Y, Zhang Z, Zhang LY, Feng J, Gao J, Lei P (2020) A genetic algorithm for constructing bijective substitution boxes with high nonlinearity. Inf Sci 523:152\u2013166","journal-title":"Inf Sci"},{"issue":"8","key":"20575_CR30","doi-asserted-by":"publisher","first-page":"6695","DOI":"10.1007\/s11071-024-09353-w","volume":"112","author":"C Luo","year":"2024","unstructured":"Luo C, Wang Y, Fu Y, Zhou P, Wang M (2024) Constructing dynamic S-boxes based on chaos and irreducible polynomials for image encryption. Nonlinear Dyn 112(8):6695\u20136713","journal-title":"Nonlinear Dyn"},{"issue":"16","key":"20575_CR31","doi-asserted-by":"publisher","first-page":"23899","DOI":"10.1007\/s11042-022-12069-x","volume":"82","author":"H Liu","year":"2023","unstructured":"Liu H, Liu J, Ma C (2023) Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption. Multimed Tools Appl 82(16):23899\u201323914","journal-title":"Multimed Tools Appl"},{"key":"20575_CR32","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/j.vlsi.2022.10.011","volume":"88","author":"Y Si","year":"2023","unstructured":"Si Y, Liu H, Zhao M (2023) Constructing keyed strong S-box with higher nonlinearity based on 2D hyper chaotic map and algebraic operation. Integration 88:269\u2013277","journal-title":"Integration"},{"key":"20575_CR33","doi-asserted-by":"publisher","first-page":"135880","DOI":"10.1109\/ACCESS.2023.3337443","volume":"11","author":"R Ali","year":"2023","unstructured":"Ali R, Jamil MK, Alali AS, Ali J, Afzal G (2023) A robust S box design using cyclic groups and image encryption. IEEE Access 11:135880\u2013135890","journal-title":"IEEE Access"},{"key":"20575_CR34","doi-asserted-by":"crossref","unstructured":"Artuger F (2024) Strong S-box construction approach based on Josephus problem. Soft Comput 1\u201313","DOI":"10.1007\/s00500-024-09751-7"},{"key":"20575_CR35","doi-asserted-by":"crossref","unstructured":"Savadkouhi MB, Tootkaboni MA (2024) S-boxes design based on the Lu-Chen system and their application in image encryption. Soft Comput 1-22","DOI":"10.21203\/rs.3.rs-2427480\/v1"},{"key":"20575_CR36","doi-asserted-by":"publisher","first-page":"122030","DOI":"10.1016\/j.eswa.2023.122030","volume":"238","author":"SS Jamal","year":"2024","unstructured":"Jamal SS, Hazzazi MM, Khan MF, Bassfar Z, Aljaedi A, ul Islam Z (2024) Region of interest-based medical image encryption technique based on chaotic S-boxes. Expert Syst Appl 238:122030","journal-title":"Expert Syst Appl"},{"key":"20575_CR37","doi-asserted-by":"crossref","unstructured":"Ma Y, Tian Y, Zhang L, Zuo P (2024) Two-dimensional hyperchaotic effect coupled mapping lattice and its application in dynamic S-box generation. Nonlinear Dyn 1\u201332","DOI":"10.1007\/s11071-024-09907-y"},{"key":"20575_CR38","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.vlsi.2023.05.006","volume":"92","author":"M Zhao","year":"2023","unstructured":"Zhao M, Liu H, Niu Y (2023) Batch generating keyed strong S-Boxes with high nonlinearity using 2D hyper chaotic map. Integration 92:91\u201398","journal-title":"Integration"},{"key":"20575_CR39","doi-asserted-by":"publisher","first-page":"124904","DOI":"10.1016\/j.eswa.2024.124904","volume":"256","author":"D Ustun","year":"2024","unstructured":"Ustun D, Sahinkaya S, Atli N (2024) Developing a secure image encryption technique using a novel S-box constructed through real-coded genetic algorithm\u2019s crossover and mutation operators. Expert Syst Appl 256:124904","journal-title":"Expert Syst Appl"},{"key":"20575_CR40","doi-asserted-by":"publisher","first-page":"122779","DOI":"10.1016\/j.eswa.2023.122779","volume":"241","author":"T Haider","year":"2024","unstructured":"Haider T, Azam NA, Hayat U (2024) Substitution box generator with enhanced cryptographic properties and minimal computation time. Expert Syst Appl 241:122779","journal-title":"Expert Syst Appl"},{"key":"20575_CR41","doi-asserted-by":"crossref","unstructured":"Artuger F (2024) A method for designing substitution boxes based on chaos with high nonlinearity. Wirel Pers Commun 1\u201316","DOI":"10.1007\/s11277-024-11104-4"},{"issue":"4","key":"20575_CR42","doi-asserted-by":"publisher","first-page":"102620","DOI":"10.1016\/j.asej.2023.102620","volume":"15","author":"M Vijayakumar","year":"2024","unstructured":"Vijayakumar M, Ahilan A (2024) An optimized chaotic S-box for real-time image encryption scheme based on 4-dimensional memristive hyperchaotic map. Ain Shams Eng J 15(4):102620","journal-title":"Ain Shams Eng J"},{"key":"20575_CR43","doi-asserted-by":"publisher","first-page":"3558","DOI":"10.1007\/s10773-020-04616-9","volume":"59","author":"T Shah","year":"2020","unstructured":"Shah T, Elmoasry A, Batool IS, Khan M (2020) Quantum harmonic oscillator and Schrodinger paradox based nonlinear confusion component. Int J Theor Phys 59:3558\u20133573","journal-title":"Int J Theor Phys"},{"issue":"13","key":"20575_CR44","doi-asserted-by":"publisher","first-page":"38949","DOI":"10.1007\/s11042-023-17200-0","volume":"83","author":"F Artuger","year":"2024","unstructured":"Artuger F, Ozkaynak F (2024) A new algorithm to generate aes-like substitution boxes based on sine cosine optimization algorithm. Multimed Tools Appl 83(13):38949\u201338964","journal-title":"Multimed Tools Appl"},{"key":"20575_CR45","doi-asserted-by":"publisher","first-page":"102099","DOI":"10.1016\/j.vlsi.2023.102099","volume":"94","author":"S Ullah","year":"2024","unstructured":"Ullah S, Liu X, Waheed A, Zhang S (2024) An efficient construction of S box based on the fractional order Rabinovich Fabrikant chaotic system. Integration 94:102099","journal-title":"Integration"},{"key":"20575_CR46","doi-asserted-by":"crossref","unstructured":"Ibrahim S, Abbas AM (2021) Efficient key-dependent dynamic S-boxes based on permutated elliptic curves. Inf Sci 246\u2013264","DOI":"10.1016\/j.ins.2021.01.014"},{"key":"20575_CR47","unstructured":"Jiale X, Fan C, Yu G (2024) Design and implementation of dynamic s-boxes based on non-degenerate discrete chaotic systems. Phys Scr"},{"issue":"2","key":"20575_CR48","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1007\/s11277-023-10456-7","volume":"131","author":"F Artuger","year":"2023","unstructured":"Artuger F (2023) A new S-box generator algorithm based on 3D chaotic maps and whale optimization algorithm. Wirel Pers Commun 131(2):835\u2013853","journal-title":"Wirel Pers Commun"},{"issue":"3","key":"20575_CR49","doi-asserted-by":"publisher","first-page":"2841","DOI":"10.1007\/s11071-022-07956-9","volume":"111","author":"Y Su","year":"2023","unstructured":"Su Y, Tong X, Zhang M, Wang Z (2023) A new S-box three-layer optimization method and its application. Nonlinear Dyn 111(3):2841\u20132867","journal-title":"Nonlinear Dyn"},{"issue":"14","key":"20575_CR50","doi-asserted-by":"publisher","first-page":"41213","DOI":"10.1007\/s11042-023-17046-6","volume":"83","author":"ST Dougherty","year":"2024","unstructured":"Dougherty ST, Klobusicky J, \u015eahinkaya S, Ustun D (2024) An S-Box construction from exponentiation in finite fields and its application in RGB color image encryption. Multimed Tools Appl 83(14):41213\u201341241","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20575-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-20575-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20575-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T02:37:12Z","timestamp":1757126232000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-20575-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,4]]},"references-count":50,"journal-issue":{"issue":"27","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["20575"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-20575-3","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,4]]},"assertion":[{"value":"27 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There are no perceived biases due to personal affiliations among the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}]}}