{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T06:40:05Z","timestamp":1759992005877},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,7,7]],"date-time":"2023-07-07T00:00:00Z","timestamp":1688688000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,7]],"date-time":"2023-07-07T00:00:00Z","timestamp":1688688000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11227-023-05512-9","type":"journal-article","created":{"date-parts":[[2023,7,7]],"date-time":"2023-07-07T03:36:08Z","timestamp":1688700968000},"page":"1037-1058","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform"],"prefix":"10.1007","volume":"80","author":[{"given":"Tariq","family":"Shah","sequence":"first","affiliation":[]},{"given":"Tanveer","family":"ul Haq","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,7]]},"reference":[{"issue":"3","key":"5512_CR1","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379\u2013423. https:\/\/doi.org\/10.1002\/j.1538-7305.1948.tb01338.x","journal-title":"Bell Syst Tech J"},{"issue":"4","key":"5512_CR2","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656\u2013715. https:\/\/doi.org\/10.1002\/j.1538-7305.1949.tb00928.x","journal-title":"Bell Syst Tech J"},{"issue":"3","key":"5512_CR3","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1007\/s11045-019-00689-w","volume":"31","author":"D Shah","year":"2019","unstructured":"Shah D, Shah T, Jamal SS (2019) A novel efficient image encryption algorithm based on affine transformation combine with linear fractional transformation. Multidimens Syst Signal Process 31(3):885\u2013905. https:\/\/doi.org\/10.1007\/s11045-019-00689-w","journal-title":"Multidimens Syst Signal Process"},{"key":"5512_CR4","doi-asserted-by":"publisher","unstructured":"Javeed A, Shah T, and Attaullah (2019) Design of an S-box using Rabinovich-Fabrikant system of differential equations perceiving third order nonlinearity. Multimed Tools Appl 79(9\u201310): 6649\u20136660, doi: https:\/\/doi.org\/10.1007\/s11042-019-08393-4","DOI":"10.1007\/s11042-019-08393-4"},{"issue":"3","key":"5512_CR5","doi-asserted-by":"publisher","first-page":"2841","DOI":"10.1007\/s11071-022-07956-9","volume":"111","author":"Y Su","year":"2023","unstructured":"Su Y, Tong X, Zhang M, Wang Z (2023) A new S-box three-layer optimization method and its application. Nonlinear Dyn 111(3):2841\u20132867. https:\/\/doi.org\/10.1007\/s11071-022-07956-9","journal-title":"Nonlinear Dyn"},{"issue":"22","key":"5512_CR6","doi-asserted-by":"publisher","first-page":"24027","DOI":"10.1007\/s11042-016-4090-y","volume":"76","author":"M Khan","year":"2016","unstructured":"Khan M, Shah T, Batool SI (2016) A new approach for image encryption and watermarking based on substitution box over the classes of chain rings. Multimed Tools Appl 76(22):24027\u201324062. https:\/\/doi.org\/10.1007\/s11042-016-4090-y","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"5512_CR7","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1109\/tit.1979.1056063","volume":"25","author":"P Shankar","year":"1979","unstructured":"Shankar P (1979) On BCH codes over arbitrary integer tings (Corresp.). IEEE Trans Inf Theory 25(4):480\u2013483. https:\/\/doi.org\/10.1109\/tit.1979.1056063","journal-title":"IEEE Trans Inf Theory"},{"issue":"1\u20133","key":"5512_CR8","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/s0024-3795(98)10163-5","volume":"286","author":"AA de Andrade","year":"1999","unstructured":"de Andrade AA, Palazzo R (1999) Construction and decoding of BCH codes over finite commutative rings. Linear Algebra Appl 286(1\u20133):69\u201385. https:\/\/doi.org\/10.1016\/s0024-3795(98)10163-5","journal-title":"Linear Algebra Appl"},{"key":"5512_CR9","doi-asserted-by":"publisher","DOI":"10.1186\/2251-7456-6-51","author":"T Shah","year":"2012","unstructured":"Shah T, Qamar A, de Andrade AA (2012) Construction and decoding of BCH codes over chain of commutative rings. Math Sci. https:\/\/doi.org\/10.1186\/2251-7456-6-51","journal-title":"Math Sci"},{"issue":"8\u20139","key":"5512_CR10","doi-asserted-by":"publisher","first-page":"567","DOI":"10.5560\/zna.2013-0021","volume":"68","author":"T Shah","year":"2013","unstructured":"Shah T, Qamar A, Hussain I (2013) Substitution box on maximal cyclic subgroup of units of a Galois Ring. Zeitschrift f\u00fcr Naturforschung A 68(8\u20139):567\u2013572. https:\/\/doi.org\/10.5560\/zna.2013-0021","journal-title":"Zeitschrift f\u00fcr Naturforschung A"},{"issue":"4356","key":"5512_CR11","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1038\/171737a0","volume":"171","author":"JD Watson","year":"1953","unstructured":"Watson JD, Crick FHC (1953) Molecular structure of nucleic acids: a structure for deoxyribose nucleic acid. Nature 171(4356):737\u2013738. https:\/\/doi.org\/10.1038\/171737a0","journal-title":"Nature"},{"key":"5512_CR12","doi-asserted-by":"publisher","unstructured":"Mondal B (2020) A secure steganographic scheme based on chaotic map and DNA computing. In: Micro-electronics and telecommunication engineering: proceedings of 3rd ICMETE 2019, pp. 545\u2013554, Springer: Singapore, doi: https:\/\/doi.org\/10.1007\/978-981-15-2329-8_55","DOI":"10.1007\/978-981-15-2329-8_55"},{"key":"5512_CR13","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.asoc.2015.08.008","volume":"37","author":"X Wu","year":"2015","unstructured":"Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24\u201339. https:\/\/doi.org\/10.1016\/j.asoc.2015.08.008","journal-title":"Appl Soft Comput"},{"key":"5512_CR14","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"X Chai","year":"2019","unstructured":"Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and Chaos. Signal Process 155:44\u201362. https:\/\/doi.org\/10.1016\/j.sigpro.2018.09.029","journal-title":"Signal Process"},{"key":"5512_CR15","doi-asserted-by":"publisher","first-page":"109","DOI":"10.5555\/3138886.3139067","volume":"141","author":"J Wu","year":"2017","unstructured":"Wu J, Liao X, Yang B (2017) Color image encryption based on chaotic systems and elliptic curve elgamal scheme. Signal Process 141:109\u2013124. https:\/\/doi.org\/10.5555\/3138886.3139067","journal-title":"Signal Process"},{"issue":"5","key":"5512_CR16","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457\u20131466. https:\/\/doi.org\/10.1016\/j.asoc.2012.01.016","journal-title":"Appl Soft Comput"},{"issue":"12","key":"5512_CR17","doi-asserted-by":"publisher","first-page":"2959","DOI":"10.1109\/26.477498","volume":"43","author":"AM Eskicioglu","year":"1995","unstructured":"Eskicioglu AM, Fisher PS (1995) Image quality measures and their performance. IEEE Trans Commun 43(12):2959\u20132965. https:\/\/doi.org\/10.1109\/26.477498","journal-title":"IEEE Trans Commun"},{"issue":"13","key":"5512_CR18","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1049\/el:20080522","volume":"44","author":"Q Huynh-Thu","year":"2008","unstructured":"Huynh-Thu Q, Ghanbari M (2008) Scope of validity of PSNR in image\/video quality assessment. Electron Lett 44(13):800. https:\/\/doi.org\/10.1049\/el:20080522","journal-title":"Electron Lett"},{"issue":"3","key":"5512_CR19","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/97.995823","volume":"9","author":"Z Wang","year":"2002","unstructured":"Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Process Lett 9(3):81\u201384. https:\/\/doi.org\/10.1109\/97.995823","journal-title":"IEEE Signal Process Lett"},{"issue":"4","key":"5512_CR20","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/tip.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612. https:\/\/doi.org\/10.1109\/tip.2003.819861","journal-title":"IEEE Trans Image Process"},{"key":"5512_CR21","doi-asserted-by":"publisher","first-page":"164922","DOI":"10.1016\/j.ijleo.2020.164922","volume":"217","author":"T ul Haq","year":"2020","unstructured":"Haq T ul, Shah T (2020) 12\u00d712 S-box design and its application to RGB image encryption. Optik 217:164922. https:\/\/doi.org\/10.1016\/j.ijleo.2020.164922","journal-title":"Optik"},{"issue":"24","key":"5512_CR22","doi-asserted-by":"publisher","first-page":"34547","DOI":"10.1007\/s11042-021-11657-7","volume":"81","author":"B Mondal","year":"2020","unstructured":"Mondal B, Singh JP (2020) A lightweight image encryption scheme based on chaos and diffusion circuit. Multimed Tools Appl 81(24):34547\u201334571. https:\/\/doi.org\/10.1007\/s11042-021-11657-7","journal-title":"Multimed Tools Appl"},{"issue":"1\u20132","key":"5512_CR23","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1504\/IJAIP.2019.099944","volume":"13","author":"B Mondal","year":"2019","unstructured":"Mondal B, Mandal T, Choudhury T, Khan DA (2019) Use of\u2019A light weight secure image encryption scheme based on chaos and DNA computing\u2019for encrypted audio watermarking. Int J Adv Intell Paradig 13(1\u20132):67\u201379. https:\/\/doi.org\/10.1504\/IJAIP.2019.099944","journal-title":"Int J Adv Intell Paradig"},{"key":"5512_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05415-9","author":"P Kumari","year":"2023","unstructured":"Kumari P, Mondal B (2023) Lightweight image encryption algorithm using NLFSR and CBC mode. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-023-05415-9","journal-title":"J Supercomput"},{"key":"5512_CR25","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"Z Hua","year":"2019","unstructured":"Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403\u2013419. https:\/\/doi.org\/10.1016\/j.ins.2018.12.048","journal-title":"Inf Sci"},{"key":"5512_CR26","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.ins.2015.10.027","volume":"355","author":"AV Diaconu","year":"2016","unstructured":"Diaconu AV (2016) Circular inter\u2013intra pixels bit-level permutation and chaos-based image encryption. Inf Sci 355:314\u2013327. https:\/\/doi.org\/10.1016\/j.ins.2015.10.027","journal-title":"Inf Sci"},{"key":"5512_CR27","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.neucom.2017.12.048","volume":"283","author":"P Ping","year":"2018","unstructured":"Ping P, Xu F, Mao Y, Wang Z (2018) Designing permutation\u2013substitution image encryption networks with Henon map. Neurocomputing 283:53\u201363. https:\/\/doi.org\/10.1016\/j.neucom.2017.12.048","journal-title":"Neurocomputing"},{"key":"5512_CR28","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197\u2013213. https:\/\/doi.org\/10.1016\/j.optlaseng.2016.08.009","journal-title":"Opt Lasers Eng"},{"key":"5512_CR29","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.ins.2017.02.036","volume":"396","author":"Z Hua","year":"2017","unstructured":"Hua Z, Zhou Y (2017) Design of image cipher using block-based scrambling and image filtering. Inf Sci 396:97\u2013113. https:\/\/doi.org\/10.1016\/j.ins.2017.02.036","journal-title":"Inf Sci"},{"issue":"2","key":"5512_CR30","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/TIFS.2012.2185227","volume":"7","author":"F Pareschi","year":"2012","unstructured":"Pareschi F, Rovatti R, Setti G (2012) On statistical tests for randomness included in the NIST SP800-22 test suite and based on the binomial distribution. IEEE Trans Inf Forensics Secur 7(2):491\u2013505. https:\/\/doi.org\/10.1109\/TIFS.2012.2185227","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05512-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05512-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05512-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T11:28:36Z","timestamp":1704713316000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05512-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,7]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["5512"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05512-9","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,7]]},"assertion":[{"value":"22 June 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"The authors declare that the proposed work is original. It is neither published nor submitted elsewhere for publication.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}