{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T01:49:13Z","timestamp":1774576153753,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T00:00:00Z","timestamp":1769644800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T00:00:00Z","timestamp":1769644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-026-21149-1","type":"journal-article","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T14:41:59Z","timestamp":1769697719000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A novel S-box design over prime field and its applications in image encryption"],"prefix":"10.1007","volume":"85","author":[{"given":"Rashad","family":"Ali","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5715-9299","authenticated-orcid":false,"given":"Muhammad Kamran","family":"Jamil","sequence":"additional","affiliation":[]},{"given":"Munazza","family":"Habib","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,29]]},"reference":[{"issue":"7","key":"21149_CR1","doi-asserted-by":"publisher","first-page":"8759","DOI":"10.1007\/s11042-017-4772-0","volume":"77","author":"Z Gan","year":"2018","unstructured":"Gan Z, Chai X, Yuan K, Lu Y (2018) A novel image encryption algorithm based on LFT based S-boxes and chaos. Multimed Tools Appl 77(7):8759\u20138783","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"21149_CR2","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s00521-012-0914-5","volume":"23","author":"I Hussain","year":"2013","unstructured":"Hussain I, Shah T, Gondal MA, Khan WA, Mahmood H (2013) A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput Appl 23(1):97\u2013104","journal-title":"Neural Comput Appl"},{"issue":"12","key":"21149_CR3","first-page":"1779","volume":"14","author":"I Hussain","year":"2011","unstructured":"Hussain I, Shah T, Gondal MA, Khan M, Khan WA (2011) Construction of new S-box using a linear fractional transformation. World Appl Sci J 14(12):1779\u20131785","journal-title":"World Appl Sci J"},{"key":"21149_CR4","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s11071-012-0646-1","volume":"71","author":"I Hussain","year":"2013","unstructured":"Hussain I, Shah T, Gondal MA, Mahmood H (2013) An efficient approach for the construction of LFT S-boxes using chaotic logistic map. Nonlinear Dyn 71:133\u2013140","journal-title":"Nonlinear Dyn"},{"key":"21149_CR5","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1155\/2017\/6969312","volume":"2017","author":"Y Tian","year":"2017","unstructured":"Tian Y, Lu Z (2017) Chaotic S-Box: Intertwining Logistic Map and Bacterial Foraging Optimization. Math Probl Eng 2017:111","journal-title":"Math Probl Eng"},{"issue":"4","key":"21149_CR6","first-page":"105","volume":"18","author":"B Arshad","year":"2020","unstructured":"Arshad B, Siddiqui N (2020) Construction of highly nonlinear substitution boxes (S-boxes) based on connected regular graphs. Int J Comput Sci Inf Secur 18(4):105\u2013122","journal-title":"Int J Comput Sci Inf Secur"},{"issue":"3","key":"21149_CR7","doi-asserted-by":"publisher","first-page":"437","DOI":"10.3390\/sym11030437","volume":"11","author":"A Zahid","year":"2019","unstructured":"Zahid A, Arshad M (2019) An innovative design of substitution-boxes using cubic polynomial mapping. Symmetry 11(3):437","journal-title":"Symmetry"},{"key":"21149_CR8","doi-asserted-by":"crossref","unstructured":"Ayd\u0131n Y, Garipcan AM, Ozkaynak F (2025) A novel post-processing approach for improving minimum nonlinearity in S-boxes: A case study based on 2D hyper chaotic Schaffer transformation map. Expert Syst Appl 128067","DOI":"10.1016\/j.eswa.2025.128067"},{"key":"21149_CR9","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.aej.2025.03.109","volume":"125","author":"SS Jamal","year":"2025","unstructured":"Jamal SS, Ali R, Jamil MK, Nooh SA, Alblehai F (2025) Secure S-box construction with 1D chaotic maps and finite field theory for block cipher encryption. Alex Eng J 125:278\u2013296","journal-title":"Alex Eng J"},{"key":"21149_CR10","doi-asserted-by":"crossref","unstructured":"Mahboob A, Asif M, Nadeem M, Eldin A, SM, Siddique I (2022) A Cryptographic Scheme for Construction of Substitution Boxes Using Quantic Fractional Transformation. IEEE Access 10:132908\u2013132916","DOI":"10.1109\/ACCESS.2022.3230141"},{"issue":"3","key":"21149_CR11","doi-asserted-by":"publisher","first-page":"245","DOI":"10.3390\/e21030245","volume":"21","author":"A Zahid","year":"2019","unstructured":"Zahid A, Arshad M, Ahmad M (2019) A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation. Entropy 21(3):245","journal-title":"Entropy"},{"key":"21149_CR12","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1016\/j.cjph.2019.05.038","volume":"60","author":"SS Jamal","year":"2019","unstructured":"Jamal SS, Shah T, AlKhaldi AH, Tufil MN (2019) Construction of new substitution boxes using linear fractional transformation and enhanced chaos. Chin J Phys 60:564\u2013572","journal-title":"Chin J Phys"},{"issue":"5","key":"21149_CR13","doi-asserted-by":"publisher","first-page":"826","DOI":"10.3390\/sym12050826","volume":"12","author":"LCN Chew","year":"2020","unstructured":"Chew LCN, Ismail ES (2020) S-box construction based on linear fractional transformation and permutation function. Symmetry 12(5):826","journal-title":"Symmetry"},{"key":"21149_CR14","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1007\/s11045-019-00689-w","volume":"31","author":"D Shah","year":"2020","unstructured":"Shah D, Shah T, Jamal SS (2020) A novel efficient image encryption algorithm based on affine transformation combine with linear fractional transformation. Multidimension Syst Signal Process 31:885\u2013905","journal-title":"Multidimension Syst Signal Process"},{"key":"21149_CR15","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1007\/s00521-012-0870-0","volume":"22","author":"I Hussain","year":"2013","unstructured":"Hussain I, Shah T, Gondal MA, Mahmood H (2013) A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Computer and Applic 22:1085\u20131093","journal-title":"Neural Computer and Applic"},{"key":"21149_CR16","first-page":"16","volume":"48","author":"A Razaq","year":"2017","unstructured":"Razaq A, Yousaf A, Shuaib U, Siddiqui N, Ullah A, Waheed A (2017) A novel construction of substitution box involving coset diagram and a bijective map. Secur Commun Netw 48:16","journal-title":"Secur Commun Netw"},{"key":"21149_CR17","doi-asserted-by":"publisher","first-page":"119244","DOI":"10.1109\/ACCESS.2022.3218643","volume":"10","author":"A Mahboob","year":"2022","unstructured":"Mahboob A, Asif M, Siddique I, Saleem A, Nadeem M, Grzelczyk D, Awrejcewicz J (2022) A novel construction of substitution box based on polynomial mapped and finite field with image encryption application. IEEE Access 10:119244\u2013119258","journal-title":"IEEE Access"},{"key":"21149_CR18","doi-asserted-by":"crossref","unstructured":"Razaq A, Akhter S, Yousaf A, Shuaib U, Ahmad M (2022) A group theoretic construction of highly nonlinear substitution box and its applications in image encryption. Multimed Tools Appl 1\u201322","DOI":"10.1007\/s11042-021-11635-z"},{"issue":"4","key":"21149_CR19","doi-asserted-by":"publisher","first-page":"3869","DOI":"10.1007\/s11071-024-10414-3","volume":"113","author":"AS Alamsyah","year":"2025","unstructured":"Alamsyah AS, Putra AT, Budiman K, Muslim MA, Salahudin SN, Prasetiyo B (2025) AES S-box modification uses affine matrices exploration for increased S-box strength. Nonlinear Dyn 113(4):3869\u20133890","journal-title":"Nonlinear Dyn"},{"key":"21149_CR20","doi-asserted-by":"publisher","first-page":"150326","DOI":"10.1109\/ACCESS.2020.3016401","volume":"8","author":"AH Zahid","year":"2020","unstructured":"Zahid AH, Al-Solami E, Ahmad M (2020) A novel modular approach based substitution-box design for image encryption. IEEE Access 8:150326\u2013150340","journal-title":"IEEE Access"},{"key":"21149_CR21","doi-asserted-by":"publisher","first-page":"82390","DOI":"10.1109\/ACCESS.2021.3086717","volume":"9","author":"AH Zahid","year":"2021","unstructured":"Zahid AH, Rashid H, Shaban MU, Ahmad S, Ahmed E, Amjad MT, Baig MAT (2021) Dynamic S-box design using a novel square polynomial transformation and permutation. IEEE Access 9:82390\u201382401","journal-title":"IEEE Access"},{"issue":"10","key":"21149_CR22","doi-asserted-by":"publisher","first-page":"12263","DOI":"10.1007\/s11071-024-10677-w","volume":"113","author":"L Zhou","year":"2025","unstructured":"Zhou L, Chen H, Zhou X, Yuan Y, Zhu W, Zhou M (2025) A smart agriculture image protection scheme based on annealing algorithm and affine transformation is optimized for S-box generated by chaos. Nonlinear Dyn 113(10):12263\u201312287","journal-title":"Nonlinear Dyn"},{"key":"21149_CR23","doi-asserted-by":"publisher","first-page":"35818","DOI":"10.1109\/ACCESS.2023.3262313","volume":"11","author":"AA Alharbi","year":"2023","unstructured":"Alharbi AA, Jamal SS, Khan MF, Gondal MA, Abbasi AA (2023) Construction and Optimization of Dynamic S-Boxes Based on Gaussian Distribution. IEEE Access 11:35818\u201335829","journal-title":"IEEE Access"},{"key":"21149_CR24","doi-asserted-by":"crossref","unstructured":"Razaq A, Ahmad M, Abd El-Latif AA (2023) A novel algebraic construction of strong S-boxes over double GF (27) structures and image protection. Computat Appl Math 42(2):90","DOI":"10.1007\/s40314-023-02215-y"},{"key":"21149_CR25","doi-asserted-by":"crossref","unstructured":"Piccione E, Andreoli S, Budaghyan L, Carlet C, Dhooghe S, Nikova S, Petrides G, Rijmen V (2023) \u201cAn Optimal Universal Construction for the Threshold Implementation of Bijective S-boxes. IEEE Trans Inform Theory","DOI":"10.1109\/TIT.2023.3287534"},{"key":"21149_CR26","doi-asserted-by":"crossref","unstructured":"Arshad S (2023) Construction of 4$$\\times$$ 4 Substitution Box Using Elliptic Curves and Algebraic Group Structures. Wireless Personal Commun 1\u201315","DOI":"10.1007\/s11277-023-10526-w"},{"key":"21149_CR27","unstructured":"Rashidi B (2023) Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers. ISeCure, vol 15, no 1"},{"key":"21149_CR28","doi-asserted-by":"publisher","first-page":"124238","DOI":"10.1016\/j.eswa.2024.124238","volume":"252","author":"R Liu","year":"2024","unstructured":"Liu R, Liu H, Zhao M (2024) Cryptanalysis and construction of keyed strong S-Box based on random affine transformation matrix and 2D hyper chaotic map. Expert Syst Appl 252:124238","journal-title":"Expert Syst Appl"},{"issue":"12","key":"21149_CR29","doi-asserted-by":"publisher","first-page":"125281","DOI":"10.1088\/1402-4896\/ad91ed","volume":"99","author":"A Kadeer","year":"2024","unstructured":"Kadeer A, Tuersun Y, Liu H (2024) Constructing keyed strong S-Box with optimized nonlinearity using nondegenerate 2D hyper chaotic map. Phys Scr 99(12):125281","journal-title":"Phys Scr"},{"issue":"1","key":"21149_CR30","doi-asserted-by":"publisher","first-page":"1131","DOI":"10.1007\/s11042-022-13278-0","volume":"82","author":"RH Sani","year":"2023","unstructured":"Sani RH, Behnia S, Ziaei J (2023) Construction of S-box based on chaotic piecewise map: Watermark application. Multimed Tools Appl 82(1):1131\u20131148","journal-title":"Multimed Tools Appl"},{"key":"21149_CR31","doi-asserted-by":"crossref","unstructured":"Mariot L, Manzoni L (2023) A classification of S-boxes generated by Orthogonal Cellular Automata. arXiv:2303.05228","DOI":"10.21203\/rs.3.rs-2671311\/v1"},{"issue":"16","key":"21149_CR32","doi-asserted-by":"publisher","first-page":"23899","DOI":"10.1007\/s11042-022-12069-x","volume":"82","author":"H Liu","year":"2023","unstructured":"Liu H, Liu J, Ma C (2023) Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption. Multimed Tools Appl 82(16):23899\u201323914","journal-title":"Multimed Tools Appl"},{"issue":"21","key":"21149_CR33","doi-asserted-by":"publisher","first-page":"19463","DOI":"10.1007\/s11071-024-10003-4","volume":"112","author":"R Ali","year":"2024","unstructured":"Ali R, Ali J, Ping P, Jamil MK (2024) A novel S-box generator using Frobenius automorphism and its applications in image encryption. Nonlinear Dyn 112(21):19463\u201319486","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"21149_CR34","doi-asserted-by":"publisher","first-page":"55405","DOI":"10.1109\/ACCESS.2018.2871557","volume":"6","author":"AA Alzaidi","year":"2018","unstructured":"Alzaidi AA, Ahmad M, Doja MN, Solami EA, Beg MM (2018) A new 1D chaotic map and -hill climbing for generating substitution-boxes. IEEE Access 6(1):55405\u201355418","journal-title":"IEEE Access"},{"issue":"4","key":"21149_CR35","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1080\/1023697X.2012.10669006","volume":"19","author":"Y Wang","year":"2012","unstructured":"Wang Y, Peng L (2012) An Improved Method to Obtaining S-Box Based on Chaos and Genetic Algorithm. HKIE Transactions 19(4):53\u201358","journal-title":"HKIE Transactions"},{"issue":"8","key":"21149_CR36","doi-asserted-by":"publisher","first-page":"276","DOI":"10.3390\/e18080276","volume":"18","author":"H Zhu","year":"2016","unstructured":"Zhu H, Zhang X, Yu H, Zhao C, Zhu Z (2016) A novel image encryption scheme using the composite discrete chaotic system. Entropy 18(8):276","journal-title":"Entropy"},{"key":"21149_CR37","doi-asserted-by":"crossref","unstructured":"Wang P, Wang Y, Xiang J, Xiao X (2022) Fast image encryption algorithm for logistics-sine-cosine mapping. Sensors 22(24):9929","DOI":"10.3390\/s22249929"},{"key":"21149_CR38","doi-asserted-by":"crossref","unstructured":"Daoui A, Yamni M, Chelloug SM, Ahmad Wani M, Abd El-Latif AA (2023) Efficient image encryption scheme using novel 1D multiparametric dynamical tent map and parallel computing. Mathematics 11(7):1589","DOI":"10.3390\/math11071589"},{"issue":"2","key":"21149_CR39","doi-asserted-by":"publisher","first-page":"457","DOI":"10.3390\/math11020457","volume":"11","author":"H Mahalingam","year":"2023","unstructured":"Mahalingam H, Veeramalai T, Menon AR, Amirtharajan R (2023) Dual-Domain Image Encryption in Unsecure Medium- A Secure Communication Perspective. Mathematics 11(2):457","journal-title":"Mathematics"},{"key":"21149_CR40","doi-asserted-by":"publisher","first-page":"110397","DOI":"10.1109\/ACCESS.2020.3001868","volume":"8","author":"M Ahmad","year":"2020","unstructured":"Ahmad M, Al-Solami E, Alghamdi AM, Yousaf MA (2020) Bijective S-boxes method using improved chaotic map-based heuristic search and algebraic group structures. IEEE Access 8:110397\u2013110411","journal-title":"IEEE Access"},{"issue":"2","key":"21149_CR41","first-page":"91","volume":"29","author":"PT Akkasaligar","year":"2020","unstructured":"Akkasaligar PT, Biradar S (2020) Selective medical image encryption using DNA cryptography. Inf Sec J Global Perspect 29(2):91\u2013101","journal-title":"Inf Sec J Global Perspect"},{"key":"21149_CR42","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.sigpro.2016.10.003","volume":"132","author":"W Cao","year":"2017","unstructured":"Cao W, Zhou Y, Chen CP, Xia L (2017) Medical image encryption using edge maps. Signal Process 132:96\u2013109","journal-title":"Signal Process"},{"key":"21149_CR43","doi-asserted-by":"publisher","first-page":"37855","DOI":"10.1109\/ACCESS.2021.3063237","volume":"9","author":"ST Kamal","year":"2021","unstructured":"Kamal ST, Hosny KM, Elgindy TM, Darwish MM, Fouda MM (2021) A new image encryption algorithm for grey and color medical images. IEEE Access 9:37855\u201337865","journal-title":"IEEE Access"},{"issue":"5","key":"21149_CR44","doi-asserted-by":"publisher","first-page":"3996","DOI":"10.11591\/ijece.v11i5.pp3996-4007","volume":"11","author":"F Abeer","year":"2021","unstructured":"Abeer F, Shimal B, Helal H, Ashwaq T (2021) Extended of TEA: A 256 bits block cipher algorithm for image encryption. Intern J Electric Comput Eng 11(5):3996\u20134007","journal-title":"Intern J Electric Comput Eng"},{"key":"21149_CR45","doi-asserted-by":"publisher","first-page":"6135","DOI":"10.1007\/s11042-019-08282-w","volume":"79","author":"B Idrees","year":"2020","unstructured":"Idrees B, Zafar S, Rashid T, Gao W (2020) Image encryption algorithm using S-box and dynamic H\u00e9non bit level permutation. Multimed Tools Appl 79:6135\u20136162","journal-title":"Multimed Tools Appl"},{"key":"21149_CR46","doi-asserted-by":"publisher","first-page":"57733","DOI":"10.1109\/ACCESS.2020.2982567","volume":"8","author":"A Al-Khedhairi","year":"2020","unstructured":"Al-Khedhairi A, Elsonbaty A, Elsadany AA, Hagras AA (2020) Hybrid cryptosystem based on pseudo chaos of novel fractional order map and elliptic curves. IEEE Access 8:57733\u201357748","journal-title":"IEEE Access"},{"key":"21149_CR47","doi-asserted-by":"publisher","first-page":"13821","DOI":"10.1007\/s11042-020-10429-z","volume":"80","author":"J Deng","year":"2021","unstructured":"Deng J, Zhou M, Wang C, Wang S, Xu C (2021) Image segmentation encryption algorithm with chaotic sequence generation participated by cipher and multi-feedback loops. Multimed Tools Appl 80:13821\u201313840","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21149-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-026-21149-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21149-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T14:42:03Z","timestamp":1769697723000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-026-21149-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,29]]},"references-count":47,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,2]]}},"alternative-id":["21149"],"URL":"https:\/\/doi.org\/10.1007\/s11042-026-21149-1","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,29]]},"assertion":[{"value":"24 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 December 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"This study did not involve human participants, animals, or any identifiable personal data. Therefore, ethical approval was not required.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}}],"article-number":"54"}}