{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,19]],"date-time":"2026-04-19T07:28:40Z","timestamp":1776583720222,"version":"3.51.2"},"reference-count":74,"publisher":"Springer Science and Business Media LLC","issue":"35","license":[{"start":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T00:00:00Z","timestamp":1746662400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T00:00:00Z","timestamp":1746662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72293574"],"award-info":[{"award-number":["72293574"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2022YFC3303303"],"award-info":[{"award-number":["2022YFC3303303"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-025-20882-3","type":"journal-article","created":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T23:31:41Z","timestamp":1746660701000},"page":"44145-44181","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["S-boxes on the combined dynamics of fractional-order chaotic systems and their application to provably secure image encryption"],"prefix":"10.1007","volume":"84","author":[{"given":"Saeed","family":"Ullah","sequence":"first","affiliation":[]},{"given":"Xinge","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Adil","family":"Waheed","sequence":"additional","affiliation":[]},{"given":"Shuailei","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,8]]},"reference":[{"issue":"6","key":"20882_CR1","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(6):1259\u20131284","journal-title":"Int J Bifurcation Chaos"},{"issue":"4","key":"20882_CR2","first-page":"289","volume":"9","author":"R Bhanot","year":"2015","unstructured":"Bhanot R, Hans R (2015) A review and comparative analysis of various encryption algorithms. Int J Secur Appl 9(4):289\u2013306","journal-title":"Int J Secur Appl"},{"key":"20882_CR3","doi-asserted-by":"publisher","first-page":"102099","DOI":"10.1016\/j.vlsi.2023.102099","volume":"94","author":"S Ullah","year":"2023","unstructured":"Ullah S, Liu X, Waheed A, Zhang S (2023) An efficient construction of S-box based on the fractional-order Rabinovich-Fabrikant chaotic system. Integration-VLSI J 94:102099","journal-title":"Integration-VLSI J"},{"key":"20882_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptology 4:3\u201372","journal-title":"J Cryptology"},{"issue":"12","key":"20882_CR5","doi-asserted-by":"publisher","first-page":"3349","DOI":"10.1109\/TCYB.2018.2846186","volume":"48","author":"T Zhang","year":"2018","unstructured":"Zhang T, Chen CP, Chen L, Xu X, Hu B (2018) Design of highly nonlinear substitution boxes based on I-Ching operators. IEEE T Cybern 48(12):3349\u20133358","journal-title":"IEEE T Cybern"},{"issue":"1","key":"20882_CR6","doi-asserted-by":"publisher","first-page":"23","DOI":"10.15388\/Informatica.2009.235","volume":"20","author":"K Kazlauskas","year":"2009","unstructured":"Kazlauskas K, Kazlauskas J (2009) Key-dependent S-box generation in AES block cipher system. Informatica 20(1):23\u201334","journal-title":"Informatica"},{"issue":"4","key":"20882_CR7","doi-asserted-by":"publisher","first-page":"3871","DOI":"10.1007\/s10773-019-04254-w","volume":"58","author":"F Firdousi","year":"2019","unstructured":"Firdousi F, Batool SI, Amin M (2019) A novel construction scheme for nonlinear component based on quantum map. Int J Theor Phys 58(4):3871\u20133898","journal-title":"Int J Theor Phys"},{"issue":"3","key":"20882_CR8","doi-asserted-by":"publisher","first-page":"245","DOI":"10.3390\/e21030245","volume":"21","author":"AH Zahid","year":"2019","unstructured":"Zahid AH, Arshad MJ, Ahmad M (2019) A novel construction of efficient substitution-boxes using cubic fractional transformation. Entropy 21(3):245","journal-title":"Entropy"},{"issue":"8","key":"20882_CR9","doi-asserted-by":"publisher","first-page":"790","DOI":"10.3390\/e21080790","volume":"21","author":"S Zhu","year":"2019","unstructured":"Zhu S, Wang G, Zhu C (2019) A secure and fast image encryption scheme based on double chaotic S-boxes. Entropy 21(8):790","journal-title":"Entropy"},{"issue":"2","key":"20882_CR10","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1140\/epjp\/s13360-020-00187-0","volume":"135","author":"A Shafique","year":"2020","unstructured":"Shafique A (2020) A new algorithm for the construction of substitution box by using chaotic map. Eur Phys J Plus 135(2):194","journal-title":"Eur Phys J Plus"},{"issue":"1","key":"20882_CR11","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1007\/s11071-020-05503-y","volume":"100","author":"D Lambi\u0107","year":"2020","unstructured":"Lambi\u0107 D (2020) A new discrete-space chaotic map based on the multiplication of integer numbers and its application in S-box design. Nonlinear Dyn 100(1):699\u2013711","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"20882_CR12","doi-asserted-by":"publisher","first-page":"39781","DOI":"10.1109\/ACCESS.2020.2975880","volume":"8","author":"MA Yousaf","year":"2020","unstructured":"Yousaf MA, Alolaiyan H, Ahmad M, Dilbar M, Razaq A (2020) Comparison of pre and post-action of a finite abelian group over certain nonlinear schemes. IEEE Access 8(1):39781\u201339792","journal-title":"IEEE Access"},{"issue":"11","key":"20882_CR13","doi-asserted-by":"publisher","first-page":"e0241890","DOI":"10.1371\/journal.pone.0241890","volume":"15","author":"N Siddiqui","year":"2020","unstructured":"Siddiqui N, Yousaf F, Murtaza F, Ehatisham-ul-Haq M, Ashraf MU, Alghamdi AM, Alfakeeh AS (2020) A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field. PLoS ONE 15(11):e0241890","journal-title":"PLoS ONE"},{"key":"20882_CR14","doi-asserted-by":"publisher","first-page":"197630","DOI":"10.1109\/ACCESS.2020.3034832","volume":"8","author":"N Siddiqui","year":"2020","unstructured":"Siddiqui N, Khalid H, Murtaza F, Ehatisham-Ul-Haq M, Azam MA (2020) A novel algebraic technique for design of computational substitution-boxes using action of matrices on Galois field. IEEE Access 8:197630\u2013197643","journal-title":"IEEE Access"},{"key":"20882_CR15","first-page":"102671","volume":"55","author":"HS Alhadawi","year":"2020","unstructured":"Alhadawi HS, Lambic D, Zolkipli MF, Ahmad M (2020) Globalized firefly algorithm and chaos for designing substitution box. J Inf Secur Appl 55:102671","journal-title":"J Inf Secur Appl"},{"issue":"9","key":"20882_CR16","doi-asserted-by":"publisher","first-page":"095248","DOI":"10.1088\/1402-4896\/ad6d0e","volume":"99","author":"S Ullah","year":"2024","unstructured":"Ullah S, Liu X, Waheed A, Zhang S, Li S (2024) Novel grayscale image encryption based on 4D fractional-order hyperchaotic system, 2D Henon map and knight tour algorithm. Phys Scr 99(9):095248","journal-title":"Phys Scr"},{"issue":"12","key":"20882_CR17","doi-asserted-by":"publisher","first-page":"2115","DOI":"10.3390\/sym12122115","volume":"12","author":"J Wang","year":"2020","unstructured":"Wang J, Zhu Y, Zhou C, Qi Z (2020) Construction method and performance analysis of chaotic S-box based on a memorable simulated annealing algorithm. Symmetry 12(12):2115","journal-title":"Symmetry"},{"issue":"11","key":"20882_CR18","doi-asserted-by":"publisher","first-page":"4163","DOI":"10.1007\/s11042-021-11635-z","volume":"81","author":"A Razaq","year":"2022","unstructured":"Razaq A, Akhter S, Yousaf A, Shuaib U, Ahmad M (2022) A group theoretic construction of highly nonlinear substitution box and its applications in image encryption. Multimed Tools Appl 81(11):4163\u20134184","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"20882_CR19","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1007\/s11071-021-06308-3","volume":"104","author":"Z Hua","year":"2021","unstructured":"Hua Z, Li J, Chen Y, Yi S (2021) Design and application of an S-box using complete Latin square. Nonlinear Dyn 104(1):807\u2013825","journal-title":"Nonlinear Dyn"},{"issue":"11","key":"20882_CR20","doi-asserted-by":"publisher","first-page":"1313","DOI":"10.3390\/electronics10111313","volume":"10","author":"W Yan","year":"2021","unstructured":"Yan W, Ding Q (2021) A novel S-box dynamic design based on nonlinear-transform of 1D chaotic maps. Electronics 10(11):1313","journal-title":"Electronics"},{"issue":"4","key":"20882_CR21","doi-asserted-by":"publisher","first-page":"671","DOI":"10.3390\/sym13040671","volume":"13","author":"Z Jiang","year":"2021","unstructured":"Jiang Z, Ding Q (2021) Construction of an S-box based on chaotic and bent functions. Symmetry 13(4):671","journal-title":"Symmetry"},{"issue":"13","key":"20882_CR22","doi-asserted-by":"publisher","first-page":"15703","DOI":"10.1007\/s10489-022-03174-3","volume":"52","author":"J Zheng","year":"2022","unstructured":"Zheng J, Zeng Q (2022) An image encryption algorithm using a dynamic S-box and chaotic maps. Appl Intell 52(13):15703\u201315717","journal-title":"Appl Intell"},{"issue":"16","key":"20882_CR23","doi-asserted-by":"publisher","first-page":"23899","DOI":"10.1007\/s11042-022-12069-x","volume":"82","author":"H Liu","year":"2023","unstructured":"Liu H, Liu J, Ma C (2023) Constructing dynamic strong S-box using 3D chaotic map and application to image encryption. Multimed Tools Appl 82(16):23899\u201323914","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"20882_CR24","doi-asserted-by":"publisher","first-page":"7333","DOI":"10.1007\/s11042-020-10048-8","volume":"80","author":"HS Alhadawi","year":"2021","unstructured":"Alhadawi HS, Majid MA, Lambic D, Ahmad M (2021) A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm. Multimed Tools Appl 80(7):7333\u20137350","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"20882_CR25","doi-asserted-by":"publisher","first-page":"9571","DOI":"10.1007\/s11071-023-08312-1","volume":"111","author":"S Zhou","year":"2023","unstructured":"Zhou S, Qiu Y, Wang X, Zhang Y (2023) Novel image cryptosystem based on new 2D hyperchaotic map and dynamical chaotic S-box. Nonlinear Dyn 111(10):9571\u20139589","journal-title":"Nonlinear Dyn"},{"key":"20882_CR26","doi-asserted-by":"publisher","first-page":"103980","DOI":"10.1016\/j.csi.2025.103980","volume":"93","author":"S Ullah","year":"2025","unstructured":"Ullah S, Liu X, Waheed A, Zhang S (2025) S-box using fractional-order 4D hyperchaotic system and its application to RSA cryptosystem-based color image encryption. Comput Stand Interfaces 93:103980","journal-title":"Comput Stand Interfaces"},{"issue":"21","key":"20882_CR27","doi-asserted-by":"publisher","first-page":"30931","DOI":"10.1007\/s11042-022-12844-w","volume":"81","author":"F Masood","year":"2022","unstructured":"Masood F, Boulila W, Alsaeedi A, Khan JS, Ahmad J, Khan MA, Rehman SU (2022) A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map. Multimed Tools Appl 81(21):30931\u201330959","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"20882_CR28","doi-asserted-by":"publisher","first-page":"1392","DOI":"10.3390\/electronics10121392","volume":"10","author":"AAA El-Latif","year":"2021","unstructured":"El-Latif AAA, Abd-El-Atty B, Belazi A, Iliyasu AM (2021) Efficient chaos-based substitution-box and its application to image encryption. Electronics 10(12):1392","journal-title":"Electronics"},{"issue":"16","key":"20882_CR29","doi-asserted-by":"publisher","first-page":"3239","DOI":"10.1140\/epjs\/s11734-022-00643-1","volume":"231","author":"CE Dong","year":"2022","unstructured":"Dong CE (2022) Constructing a discrete memristor chaotic map and application to hash function with dynamic S-box. Eur Phys J Spec Top 231(16):3239\u20133247","journal-title":"Eur Phys J Spec Top"},{"issue":"14","key":"20882_CR30","doi-asserted-by":"publisher","first-page":"40361","DOI":"10.1007\/s11042-023-17206-8","volume":"83","author":"JY Sun","year":"2023","unstructured":"Sun JY, Cai H, Zhang H (2023) A novel image encryption algorithm combined complex order chaotic system and modified AES. Multimed Tools Appl 83(14):40361\u201340376","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"20882_CR31","doi-asserted-by":"publisher","first-page":"10409","DOI":"10.1007\/s11042-023-15971-0","volume":"83","author":"B Arshad","year":"2024","unstructured":"Arshad B, Ehatisham-ul-Haq M, Hussain Z, Asghar A (2024) A novel approach for designing secure substitution boxes based on Catalan number and elliptic curve. Multimed Tools Appl 83(4):10409\u201310425","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"20882_CR32","doi-asserted-by":"publisher","first-page":"1004","DOI":"10.3390\/e21101004","volume":"21","author":"Q Lu","year":"2019","unstructured":"Lu Q, Zhu C, Wang G (2019) A novel S-box design algorithm based on a new compound chaotic system. Entropy 21(10):1004","journal-title":"Entropy"},{"issue":"12","key":"20882_CR33","doi-asserted-by":"publisher","first-page":"2087","DOI":"10.3390\/sym12122087","volume":"12","author":"D Zhu","year":"2020","unstructured":"Zhu D, Tong X, Zhang M, Wang Z (2020) A new S-box generation method and advanced design based on combined chaotic system. Symmetry 12(12):2087","journal-title":"Symmetry"},{"key":"20882_CR34","doi-asserted-by":"publisher","first-page":"2115","DOI":"10.1007\/s11071-018-4478-5","volume":"94","author":"T Ye","year":"2018","unstructured":"Ye T, Zhimao L (2018) Chaotic S-box: Six-dimensional fractional Lorenz-Duffing chaotic system and O-shaped path scrambling. Nonlinear Dyn 94:2115\u20132126","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"20882_CR35","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/s11071-012-0675-9","volume":"71","author":"M Khan","year":"2013","unstructured":"Khan M, Shah T, Mahmood H, Gondal MA (2013) An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn 71(3):489\u2013492","journal-title":"Nonlinear Dyn"},{"key":"20882_CR36","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1007\/s11760-016-1007-1","volume":"11","author":"F \u00d6zkaynak","year":"2017","unstructured":"\u00d6zkaynak F, \u00c7elik V, \u00d6zer AB (2017) A new S-box construction method based on the fractional-order chaotic Chen system. Signal Image Video Process 11:659\u2013664","journal-title":"Signal Image Video Process"},{"issue":"1\u20132","key":"20882_CR37","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.physleta.2007.05.081","volume":"367","author":"MS Tavazoei","year":"2007","unstructured":"Tavazoei MS, Haeri M (2007) A necessary condition for double scroll attractor existence in fractional-order systems. Phys Lett A 367(1\u20132):102\u2013113","journal-title":"Phys Lett A"},{"issue":"13","key":"20882_CR38","doi-asserted-by":"publisher","first-page":"3361","DOI":"10.1016\/j.apm.2013.11.054","volume":"38","author":"M Srivastava","year":"2014","unstructured":"Srivastava M, Agrawal SK, Vishal K, Das S (2014) Chaos control of fractional order Rabinovich-Fabrikant system and synchronization between chaotic and chaos controlled fractional order Rabinovich-Fabrikant system. Appl Math Model 38(13):3361\u20133372","journal-title":"Appl Math Model"},{"issue":"8","key":"20882_CR39","doi-asserted-by":"publisher","first-page":"10013","DOI":"10.1007\/s11042-018-6612-2","volume":"78","author":"YPK Nkandeu","year":"2019","unstructured":"Nkandeu YPK, Tiedeu A (2019) An image encryption algorithm based on substitution technique and chaos mixing. Multimed Tools Appl 78(8):10013\u201310034","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"20882_CR40","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/BF00203967","volume":"3","author":"C Adams","year":"1990","unstructured":"Adams C, Tavares S (1990) The structured design of cryptographically good S-boxes. J Cryptology 3(1):27\u201341","journal-title":"J Cryptology"},{"issue":"6","key":"20882_CR41","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1049\/ip-e.1988.0044","volume":"135","author":"J Pieprzyk","year":"1988","unstructured":"Pieprzyk J, Finkelstein G (1988) Towards effective nonlinear cryptosystem design. IEE Proc E-Comput Digit Tech 135(6):325\u2013335","journal-title":"IEE Proc E-Comput Digit Tech"},{"key":"20882_CR42","unstructured":"Feng D, Wu W (2000) Design and analysis of block ciphers. Dissertation, Ruhr University Bochum"},{"issue":"3","key":"20882_CR43","first-page":"137","volume":"26","author":"J Daemen","year":"2001","unstructured":"Daemen J, Rijmen V (2001) Reijndael: the advanced encryption standard. Dr Dobb J Softw Tools Prof Program 26(3):137\u2013139","journal-title":"Dr Dobb J Softw Tools Prof Program"},{"issue":"2","key":"20882_CR44","first-page":"137","volume":"9","author":"I Vergili","year":"2001","unstructured":"Vergili I, Y\u00fccel MD (2001) Avalanche and bit independence properties for the ensembles of randomly chosen n \u00d7 n S-boxes. Turk J Electr Eng Comput Sci 9(2):137\u2013146","journal-title":"Turk J Electr Eng Comput Sci"},{"key":"20882_CR45","doi-asserted-by":"crossref","unstructured":"Webster AF, Tavares SE (1986) On the design of S-boxes. Advances in Cryptology-Crypto\u2019 85\u00a0proceedings. pp 523\u2013534","DOI":"10.1007\/3-540-39799-X_41"},{"key":"20882_CR46","doi-asserted-by":"crossref","unstructured":"Matsui M (1993) Linear cryptanalysis method for DES cipher. In: Workshop on the theory and application of cryptographic techniques. pp 386\u2013397","DOI":"10.1007\/3-540-48285-7_33"},{"key":"20882_CR47","first-page":"125153","volume":"376","author":"H Liu","year":"2020","unstructured":"Liu H, Kadir A, Xu C (2020) Cryptanalysis and constructing S-box based on chaotic map and backtracking. Appl Math Comput 376:125153","journal-title":"Appl Math Comput"},{"issue":"2","key":"20882_CR48","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun 1(2):31\u201338","journal-title":"Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun"},{"key":"20882_CR49","doi-asserted-by":"publisher","first-page":"53079","DOI":"10.1109\/ACCESS.2019.2911395","volume":"7","author":"L Yi","year":"2019","unstructured":"Yi L, Tong X, Wang Z, Zhang M, Zhu H, Liu J (2019) A novel block encryption algorithm based on chaotic S-box for wireless sensor network. IEEE Access 7:53079\u201353090","journal-title":"IEEE Access"},{"key":"20882_CR50","first-page":"123","volume":"332","author":"VM Silva-Garc\u00eda","year":"2018","unstructured":"Silva-Garc\u00eda VM, Flores-Carapia R, Renter\u00eda-M\u00e1rquez C, Luna-Benoso B, Aldape-P\u00e9rez M (2018) Substitution box generation using chaos: An image encryption application. Appl Math Comput 332:123\u2013135","journal-title":"Appl Math Comput"},{"issue":"4","key":"20882_CR51","doi-asserted-by":"publisher","first-page":"2407","DOI":"10.1007\/s11071-016-3199-x","volume":"87","author":"D Lambi\u0107","year":"2017","unstructured":"Lambi\u0107 D (2017) A novel method of S-box design based on discrete chaotic map. Nonlinear Dyn 87(4):2407\u20132413","journal-title":"Nonlinear Dyn"},{"key":"20882_CR52","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s11277-017-5054-x","volume":"99","author":"Jamal SS Attaullah","year":"2018","unstructured":"Attaullah Jamal SS, Shah T (2018) A novel algebraic technique for the construction of strong substitution box. Wirel Pers Commun 99:213\u2013226","journal-title":"Wirel Pers Commun"},{"issue":"1","key":"20882_CR53","first-page":"232","volume":"27","author":"Y Tian","year":"2016","unstructured":"Tian Y, Lu Z (2016) S-box: Six-dimensional compound hyperchaotic map and artificial bee colony algorithm. J Syst Eng Electron 27(1):232\u2013241","journal-title":"J Syst Eng Electron"},{"issue":"8","key":"20882_CR54","doi-asserted-by":"publisher","first-page":"3317","DOI":"10.1007\/s00521-017-3287-y","volume":"31","author":"F \u00d6zkaynak","year":"2019","unstructured":"\u00d6zkaynak F (2019) Construction of robust substitution boxes based on chaotic systems. Neural Comput Appl 31(8):3317\u20133326","journal-title":"Neural Comput Appl"},{"issue":"5","key":"20882_CR55","doi-asserted-by":"publisher","first-page":"25559","DOI":"10.1007\/s11042-023-14394-1","volume":"82","author":"S Yang","year":"2023","unstructured":"Yang S, Tong X, Wang Z, Zhang M (2023) S-box generation algorithm based on hyperchaotic system and its application in image encryption. Multimed Tools Appl 82(5):25559\u201325583","journal-title":"Multimed Tools Appl"},{"key":"20882_CR56","doi-asserted-by":"publisher","first-page":"164884","DOI":"10.1016\/j.ijleo.2020.164884","volume":"217","author":"X Wang","year":"2020","unstructured":"Wang X, Yang J (2020) A novel image encryption scheme of dynamic S-boxes and random blocks based on spatiotemporal chaotic system. Optik 217:164884","journal-title":"Optik"},{"issue":"5","key":"20882_CR57","doi-asserted-by":"publisher","first-page":"7419","DOI":"10.1007\/s11042-022-13600-w","volume":"82","author":"H Khan","year":"2023","unstructured":"Khan H, Jamal SS, Hazzazi MM, Khan M, Hussain I (2023) New image encryption scheme based on Arnold map and cuckoo search optimization algorithm. Multimed Tools Appl 82(5):7419\u20137441","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"20882_CR58","doi-asserted-by":"publisher","first-page":"21644","DOI":"10.3934\/math.20231104","volume":"8","author":"A Waheed","year":"2023","unstructured":"Waheed A, Subhan F, Suud MM, Malik MYH, Mirza A, Afzal F (2023) Construction of nonlinear component of block cipher using coset graph. AIMS Math 8(9):21644\u201321667","journal-title":"AIMS Math"},{"key":"20882_CR59","doi-asserted-by":"publisher","first-page":"2033","DOI":"10.1007\/s11277-016-3436-0","volume":"90","author":"SS Jamal","year":"2016","unstructured":"Jamal SS, Khan MU, Shah T (2016) A watermarking technique with chaotic fractional S-box transformation. Wirel Pers Commun 90:2033\u20132049","journal-title":"Wirel Pers Commun"},{"key":"20882_CR60","doi-asserted-by":"publisher","first-page":"2757","DOI":"10.1007\/s11071-017-3409-1","volume":"88","author":"A Ullah","year":"2017","unstructured":"Ullah A, Jamal SS, Shah T (2017) A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn 88:2757\u20132769","journal-title":"Nonlinear Dyn"},{"issue":"5","key":"20882_CR61","doi-asserted-by":"publisher","first-page":"282","DOI":"10.5560\/zna.2012-0022","volume":"67","author":"I Hussain","year":"2012","unstructured":"Hussain I, Shah T, Gondal MA, Mahmood H (2012) Generalized majority logic criterion to analyze the statistical strength of S-boxes. Z Naturforsch A 67(5):282\u2013288","journal-title":"Z Naturforsch A"},{"key":"20882_CR62","doi-asserted-by":"crossref","unstructured":"Abduljaleel IQ, Abdullah SM (2022) Color image encryption using S-box based on SHA-256 and chaos theory. In: 2022 international conference on data science and intelligent computing. pp 123\u2013128","DOI":"10.1109\/ICDSIC56987.2022.10075813"},{"issue":"3","key":"20882_CR63","doi-asserted-by":"publisher","first-page":"443","DOI":"10.3390\/sym14030443","volume":"14","author":"W Alexan","year":"2022","unstructured":"Alexan W, ElBeltagy M, Aboshousha A (2022) Rgb image encryption through cellular automata, s-box and the lorenz system. Symmetry 14(3):443","journal-title":"Symmetry"},{"key":"20882_CR64","doi-asserted-by":"publisher","first-page":"30993","DOI":"10.1007\/s11042-018-6145-8","volume":"77","author":"N Ben Slimane","year":"2018","unstructured":"Ben Slimane N, Aouf N, Bouallegue K, Machhout M (2018) A novel chaotic image cryptosystem based on DNA sequence operations and single neuron model. Multimed Tools Appl 77:30993\u201331019","journal-title":"Multimed Tools Appl"},{"issue":"20","key":"20882_CR65","doi-asserted-by":"publisher","first-page":"27017","DOI":"10.1007\/s11042-018-5902-z","volume":"77","author":"A Girdhar","year":"2018","unstructured":"Girdhar A, Kumar V (2018) A RGB image encryption technique using Lorenz and Rossler chaotic system on DNA sequences. Multimed Tools Appl 77(20):27017\u201327039","journal-title":"Multimed Tools Appl"},{"key":"20882_CR66","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.matcom.2020.07.007","volume":"178","author":"DS Malik","year":"2020","unstructured":"Malik DS, Shah T (2020) Color multiple image encryption scheme based on 3D-chaotic maps. Math Comput Simul 178:646\u2013666","journal-title":"Math Comput Simul"},{"key":"20882_CR67","doi-asserted-by":"publisher","first-page":"26257","DOI":"10.1109\/ACCESS.2022.3151174","volume":"10","author":"ZA Abduljabbar","year":"2022","unstructured":"Abduljabbar ZA, Abduljaleel IQ, Ma J, Al Sibahee MA, Nyangaresi VO, Honi DG, Jiao X (2022) Provably secure and fast color image encryption algorithm based on s-boxes and hyperchaotic map. IEEE Access 10:26257\u201326270","journal-title":"IEEE Access"},{"key":"20882_CR68","doi-asserted-by":"publisher","first-page":"66409","DOI":"10.1109\/ACCESS.2022.3183990","volume":"10","author":"HAMA Basha","year":"2022","unstructured":"Basha HAMA, Mohra ASS, Diab TOM, El Sobky WI (2022) Efficient image encryption based on new substitution box using DNA coding and bent function. IEEE Access 10:66409\u201366429","journal-title":"IEEE Access"},{"issue":"21","key":"20882_CR69","doi-asserted-by":"publisher","first-page":"12879","DOI":"10.1007\/s00500-024-10319-8","volume":"28","author":"S Ullah","year":"2024","unstructured":"Ullah S, Liu X, Waheed A, Zhang S (2024) Provably secure color image encryption algorithm based on FO 4D-HCS and ACM. Soft Comput 28(21):12879\u201312896","journal-title":"Soft Comput"},{"key":"20882_CR70","doi-asserted-by":"publisher","first-page":"13951","DOI":"10.1007\/s11042-015-2973-y","volume":"75","author":"J Ahmad","year":"2016","unstructured":"Ahmad J, Hwang SO (2016) A secure image encryption scheme based on chaotic maps and affine transformation. Multimed Tools Appl 75:13951\u201313976","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"20882_CR71","doi-asserted-by":"publisher","first-page":"e0225031","DOI":"10.1371\/journal.pone.0225031","volume":"14","author":"M Khan","year":"2019","unstructured":"Khan M, Masood F, Alghafis A, Amin M, Batool Naqvi SI (2019) A novel image encryption technique using hybrid method of discrete dynamical chaotic maps and Brownian motion. PLoS ONE 14(12):e0225031","journal-title":"PLoS ONE"},{"issue":"3","key":"20882_CR72","doi-asserted-by":"publisher","first-page":"153","DOI":"10.51537\/chaos.1246581","volume":"5","author":"B Emin","year":"2023","unstructured":"Emin B, Musayev Z (2023) Chaos-based image encryption in embedded systems using Lorenz-Rossler system. Chaos Theory Appl 5(3):153\u2013159","journal-title":"Chaos Theory Appl"},{"key":"20882_CR73","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.vlsi.2022.10.002","volume":"88","author":"S Yan","year":"2023","unstructured":"Yan S, Li L, Gu B, Cui Y, Wang J, Song J (2023) Design of hyperchaotic system based on multi-scroll and its encryption algorithm in color image. Integration-VLSI J 88:203\u2013221","journal-title":"Integration-VLSI J"},{"issue":"15","key":"20882_CR74","doi-asserted-by":"publisher","first-page":"14513","DOI":"10.1007\/s11071-023-08538-z","volume":"111","author":"X Wang","year":"2023","unstructured":"Wang X, Xu X, Sun K, Jiang Z, Li M, Wen J (2023) A color image encryption and hiding algorithm based on hyperchaotic system and discrete cosine transform. Nonlinear Dyn 111(15):14513\u201314536","journal-title":"Nonlinear Dyn"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-025-20882-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-025-20882-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-025-20882-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T11:03:18Z","timestamp":1761390198000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-025-20882-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,8]]},"references-count":74,"journal-issue":{"issue":"35","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["20882"],"URL":"https:\/\/doi.org\/10.1007\/s11042-025-20882-3","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,8]]},"assertion":[{"value":"7 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 April 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 April 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This paper does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"As per journal policy.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"The author declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}