{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T08:37:23Z","timestamp":1772267843958,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,2,5]],"date-time":"2024-02-05T00:00:00Z","timestamp":1707091200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,5]],"date-time":"2024-02-05T00:00:00Z","timestamp":1707091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s11760-023-02984-3","type":"journal-article","created":{"date-parts":[[2024,2,5]],"date-time":"2024-02-05T06:02:16Z","timestamp":1707112936000},"page":"3213-3228","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":40,"title":["Image encryption algorithm based on a new 2D polynomial chaotic map and dynamic S-box"],"prefix":"10.1007","volume":"18","author":[{"given":"WanQing","family":"Wu","sequence":"first","affiliation":[]},{"given":"LingShuai","family":"Kong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,5]]},"reference":[{"key":"2984_CR1","volume":"168","author":"JIM Bezerra","year":"2023","unstructured":"Bezerra, J.I.M., Machado, G., Molter, A., Soares, R.I., Camargo, V.: A novel simultaneous permutation-diffusion image encryption scheme based on a discrete space map. Chaos Solitons Fractals 168, 113160 (2023)","journal-title":"Chaos Solitons Fractals"},{"key":"2984_CR2","doi-asserted-by":"crossref","first-page":"628","DOI":"10.1016\/j.ins.2022.08.027","volume":"613","author":"R Zhao","year":"2022","unstructured":"Zhao, R., Zhang, Y., Nan, Y., Wen, W., Chai, X., Lan, R.: Primitively visually meaningful image encryption: a new paradigm. Inf. Sci. 613, 628\u2013648 (2022)","journal-title":"Inf. Sci."},{"key":"2984_CR3","volume":"164","author":"X Wang","year":"2022","unstructured":"Wang, X., Liu, C., Jiang, D.: Visually meaningful image encryption scheme based on new-designed chaotic map and random scrambling diffusion strategy. Chaos Solitons Fractals 164, 112625 (2022)","journal-title":"Chaos Solitons Fractals"},{"key":"2984_CR4","volume":"164","author":"H Zhao","year":"2022","unstructured":"Zhao, H., Wang, S., Wang, X.: Fast image encryption algorithm based on multi-parameter fractal matrix and MPMCML system. Chaos Solitons Fractals 164, 112742 (2022)","journal-title":"Chaos Solitons Fractals"},{"key":"2984_CR5","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/j.neunet.2023.03.037","volume":"163","author":"F Shang","year":"2023","unstructured":"Shang, F., Lan, Y., Yang, J., Li, E., Kang, X.: Robust data hiding for JPEG images with invertible neural network. Neural Netw. 163, 219\u2013232 (2023)","journal-title":"Neural Netw."},{"key":"2984_CR6","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2022.112628","volume":"164","author":"R Tuli","year":"2022","unstructured":"Tuli, R., Soneji, H.N., Churi, P.: PixAdapt: a novel approach to adaptive image encryption. Chaos Solitons Fractals 164, 112628 (2022)","journal-title":"Chaos Solitons Fractals"},{"key":"2984_CR7","volume":"224","author":"J Wang","year":"2023","unstructured":"Wang, J., Wu, D., Li, L., Zhao, J., Wu, H., Tang, Y.: Robust periodic blind watermarking based on sub-block map and block encryption. Exp. Syst. Appl. 224, 119981 (2023)","journal-title":"Exp. Syst. Appl."},{"key":"2984_CR8","doi-asserted-by":"crossref","first-page":"1131","DOI":"10.1007\/s11042-022-13278-0","volume":"82","author":"RH Sani","year":"2023","unstructured":"Sani, R.H., Behnia, S., Ziaei, J.: Construction of S-box based on chaotic piecewise map: watermark application. Multimed Tools Appl. 82, 1131\u20131148 (2023)","journal-title":"Multimed Tools Appl."},{"key":"2984_CR9","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.119076","volume":"213","author":"U Erkan","year":"2023","unstructured":"Erkan, U., Toktas, A., Lai, Q.: 2D hyperchaotic system based on Schaffer function for image encryption. Exp. Syst. Appl. 213, 119076 (2023)","journal-title":"Exp. Syst. Appl."},{"key":"2984_CR10","volume":"213","author":"Q Lai","year":"2023","unstructured":"Lai, Q., Hu, G., Erkan, U., Toktas, A.: A novel pixel-split image encryption scheme based on 2D Salomon map. Exp. Syst. Appl. 213, 118845 (2023)","journal-title":"Exp. Syst. Appl."},{"key":"2984_CR11","volume":"442","author":"Q Lai","year":"2023","unstructured":"Lai, Q., Hu, G., Erkan, U., Toktas, A.: High-efficiency medical image encryption method based on 2D Logistic-Gaussian hyperchaotic map. Appl. Math. Comput. 442, 127738 (2023)","journal-title":"Appl. Math. Comput."},{"key":"2984_CR12","volume":"376","author":"H Liu","year":"2020","unstructured":"Liu, H., Kadir, A., Xu, C.: Cryptanalysis and constructing S-Box based on chaotic map and backtracking. Appl. Math. Comput. 376, 125153 (2020)","journal-title":"Appl. Math. Comput."},{"key":"2984_CR13","first-page":"238","volume":"35","author":"AA Neamah","year":"2023","unstructured":"Neamah, A.A.: An image encryption scheme based on a seven-dimensional hyperchaotic system and Pascal\u2019s matrix. J. King Saud Univ. Comput. Inf. Sci. 35, 238\u2013248 (2023)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"2984_CR14","doi-asserted-by":"crossref","unstructured":"Wang, X., Guan, N.: 2D sine-logistic-tent-coupling map for image encryption. J. Ambient Intell. Human Comput. (2022)","DOI":"10.1007\/s12652-022-03794-0"},{"key":"2984_CR15","doi-asserted-by":"crossref","unstructured":"Ding, Y., Duan, Z., Li, S.: 2D arcsine and sine combined logistic map for image encryption. Vis. Comput. (2022)","DOI":"10.1007\/s00371-022-02426-0"},{"key":"2984_CR16","volume":"70","author":"M Hussain","year":"2022","unstructured":"Hussain, M., Iqbal, N., Bashir, Z.: A chaotic image encryption scheme based on multi-directional confusion and diffusion operations. J. Inf. Security Appl. 70, 103347 (2022)","journal-title":"J. Inf. Security Appl."},{"key":"2984_CR17","doi-asserted-by":"crossref","unstructured":"Li, Q., Chen, L.: An image encryption algorithm based on 6-dimensional hyper chaotic system and DNA encoding. Multimed. Tools Appl. (2023)","DOI":"10.1007\/s11042-023-15550-3"},{"key":"2984_CR18","volume":"66","author":"A Belazi","year":"2022","unstructured":"Belazi, A., Kharbech, S., Aslam, M.N., Talha, M., Xiang, W., Iliyasu, A.M., El-Latif, A.A.A.: Improved Sine-Tangent chaotic map with application in medical images encryption. J. Inf. Security Appl. 66, 103131 (2022)","journal-title":"J. Inf. Security Appl."},{"key":"2984_CR19","volume":"69","author":"D Li","year":"2022","unstructured":"Li, D., Li, J., Di, X.: A novel exponential one-dimensional chaotic map enhancer and its application in an image encryption scheme using modified ZigZag transform. J. Inf. Security Appl. 69, 103304 (2022)","journal-title":"J. Inf. Security Appl."},{"key":"2984_CR20","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.matcom.2022.07.030","volume":"204","author":"L Liu","year":"2023","unstructured":"Liu, L., Wang, J.: A cluster of 1D quadratic chaotic map and its applications in image encryption. Math. Comput. Simul. 204, 89\u2013114 (2023)","journal-title":"Math. Comput. Simul."},{"key":"2984_CR21","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1016\/j.matcom.2022.12.025","volume":"207","author":"S Zhu","year":"2023","unstructured":"Zhu, S., Deng, X., Zhang, W., Zhu, C.: Secure image encryption scheme based on a new robust chaotic map and strong S-box. Math. Comput. Simul. 207, 322\u2013346 (2023)","journal-title":"Math. Comput. Simul."},{"key":"2984_CR22","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1016\/j.ins.2023.02.057","volume":"631","author":"NA Azam","year":"2023","unstructured":"Azam, N.A., Zhu, J., Hayat, U., Shurbevski, A.: Towards provably secure asymmetric image encryption schemes. Inf. Sci. 631, 164\u2013184 (2023)","journal-title":"Inf. Sci."},{"key":"2984_CR23","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1007\/s11071-021-06308-3","volume":"104","author":"Z Hua","year":"2021","unstructured":"Hua, Z., Li, J., Chen, Y., Yi, S.: Design and application of an S-box using complete Latin square. Nonlinear Dyn. 104, 807\u2013825 (2021)","journal-title":"Nonlinear Dyn."},{"key":"2984_CR24","doi-asserted-by":"crossref","first-page":"2841","DOI":"10.1007\/s11071-022-07956-9","volume":"111","author":"Y Su","year":"2023","unstructured":"Su, Y., Tong, X., Zhang, M., Wang, Z.: A new S-box three-layer optimization method and its application. Nonlinear Dyn. 111, 2841\u20132867 (2023)","journal-title":"Nonlinear Dyn."},{"key":"2984_CR25","doi-asserted-by":"crossref","first-page":"3225","DOI":"10.1140\/epjs\/s11734-022-00638-y","volume":"231","author":"M Wang","year":"2022","unstructured":"Wang, M., Liu, H., Zhao, M.: Bit-level image encryption algorithm based on random-time S-Box substitution. Eur. Phys. J. Spec. Top. 231, 3225\u20133237 (2022)","journal-title":"Eur. Phys. J. Spec. Top."},{"key":"2984_CR26","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/s11045-021-00786-9","volume":"33","author":"RH Sani","year":"2022","unstructured":"Sani, R.H., Behnia, S., Akhshani, A.: Creation of S-box based on a hierarchy of Julia sets: image encryption approach. Multidimen. Syst. Sign. Process. 33, 39\u201362 (2022)","journal-title":"Multidimen. Syst. Sign. Process."},{"key":"2984_CR27","doi-asserted-by":"crossref","first-page":"24801","DOI":"10.1007\/s11042-021-10695-5","volume":"80","author":"TA Al-Maadeed","year":"2021","unstructured":"Al-Maadeed, T.A., Hussain, I., Anees, A., Mustafa, M.T.: A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes. Multimed Tools Appl. 80, 24801\u201324822 (2021)","journal-title":"Multimed Tools Appl."},{"key":"2984_CR28","doi-asserted-by":"crossref","first-page":"15703","DOI":"10.1007\/s10489-022-03174-3","volume":"52","author":"J Zheng","year":"2022","unstructured":"Zheng, J., Zeng, Q.: An image encryption algorithm using a dynamic S-box and chaotic maps. Appl. Intell. 52, 15703\u201315717 (2022)","journal-title":"Appl. Intell."},{"key":"2984_CR29","doi-asserted-by":"crossref","first-page":"9571","DOI":"10.1007\/s11071-023-08312-1","volume":"111","author":"S Zhou","year":"2023","unstructured":"Zhou, S., Qiu, Y., Wang, X., Zhang, Y.: Novel image cryptosystem based on new 2D hyperchaotic map and dynamical chaotic S-box. Nonlinear Dyn. 111, 9571\u20139589 (2023)","journal-title":"Nonlinear Dyn."},{"key":"2984_CR30","doi-asserted-by":"crossref","first-page":"20585","DOI":"10.1007\/s11042-022-12268-6","volume":"81","author":"TS Ali","year":"2022","unstructured":"Ali, T.S., Ali, R.: A novel color image encryption scheme based on a new dynamic compound chaotic map and S-box. Multimed Tools Appl. 81, 20585\u201320609 (2022)","journal-title":"Multimed Tools Appl."},{"key":"2984_CR31","doi-asserted-by":"crossref","first-page":"13985","DOI":"10.1007\/s00500-022-07443-8","volume":"26","author":"R Hoseini","year":"2022","unstructured":"Hoseini, R., Behnia, S., Sarmady, S., Fathizadeh, S.: Construction of dynamical S-boxes based on image encryption approach. Soft Comput. 26, 13985\u201313997 (2022)","journal-title":"Soft Comput."},{"key":"2984_CR32","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.matcom.2023.01.036","volume":"209","author":"MI Haider","year":"2023","unstructured":"Haider, M.I., Shah, T., Ali, A., Shah, D., Khalid, I.: An Innovative approach towards image encryption by using novel PRNs and S-boxes Modeling techniques. Math. Comput. Simul. 209, 153\u2013168 (2023)","journal-title":"Math. Comput. Simul."},{"key":"2984_CR33","volume":"274","author":"NA Azam","year":"2023","unstructured":"Azam, N.A., Murtaza, G., Hayat, U.: A novel image encryption scheme based on elliptic curves and coupled map lattices. Optik 274, 170517 (2023)","journal-title":"Optik"},{"key":"2984_CR34","first-page":"219","volume":"35","author":"MAM Khan","year":"2023","unstructured":"Khan, M.A.M., Azam, N.A., Hayat, U., Kamarulhaili, H.: A novel deterministic substitution box generator over elliptic curves for real-time applications. J. King Saud Univ. Comput. Inf. Sci. 35, 219\u2013236 (2023)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"2984_CR35","doi-asserted-by":"crossref","unstructured":"Artu\u01e7er, F.: A new S-box generator algorithm based on 3D chaotic maps and whale optimization algorithm. Wireless Pers. Commun. (2023)","DOI":"10.1007\/s11277-023-10456-7"},{"key":"2984_CR36","doi-asserted-by":"crossref","first-page":"5111","DOI":"10.1007\/s00521-020-05304-9","volume":"33","author":"N Hematpour","year":"2021","unstructured":"Hematpour, N., Ahadpour, S.: Execution examination of chaotic S-box dependent on improved PSO algorithm. Neural Comput. Appl. 33, 5111\u20135133 (2021)","journal-title":"Neural Comput. Appl."},{"key":"2984_CR37","doi-asserted-by":"crossref","first-page":"20203","DOI":"10.1007\/s00521-022-07589-4","volume":"34","author":"F Artu\u01e7er","year":"2022","unstructured":"Artu\u01e7er, F., \u00f6zkaynak, F.: SBOX-CGA: substitution box generator based on chaos and genetic algorithm. Neural Comput. Appl. 34, 20203\u201320211 (2022)","journal-title":"Neural Comput. Appl."},{"key":"2984_CR38","volume":"19","author":"Y Qobbi","year":"2023","unstructured":"Qobbi, Y., Abid, A., Jarjar, M., Kaddouhi, S.E., Jarjar, A., Benazzi, A.: Adaptation of a genetic operator and a dynamic S-box for chaotic encryption of medical and color images. Sci. Afr. 19, e01551 (2023)","journal-title":"Sci. Afr."},{"key":"2984_CR39","doi-asserted-by":"crossref","first-page":"16641","DOI":"10.1007\/s00521-021-06260-8","volume":"33","author":"KZ Zamli","year":"2021","unstructured":"Zamli, K.Z., Kader, A., Din, F., Alhadawi, H.S.: Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization. Neural Comput. Appl . 33, 16641\u201316658 (2021)","journal-title":"Neural Comput. Appl ."},{"key":"2984_CR40","doi-asserted-by":"crossref","first-page":"7333","DOI":"10.1007\/s11042-020-10048-8","volume":"80","author":"HS Alhadawi","year":"2021","unstructured":"Alhadawi, H.S., Majid, M.A., Lambi\u0107, D., Ahmad, M.: A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm. Multimed Tools Appl. 80, 7333\u20137350 (2021)","journal-title":"Multimed Tools Appl."},{"issue":"4","key":"2984_CR41","first-page":"857","volume":"12","author":"H Broer","year":"2010","unstructured":"Broer, H., Takens, F.: Dynamical systems and chaos. Handbook Math. 12(4), 857\u2013908 (2010)","journal-title":"Handbook Math."},{"key":"2984_CR42","doi-asserted-by":"crossref","unstructured":"Detombe, J., Tavares, S.: Coustructing large crypographically strong S-boxes, pp. 165\u2013181. Springer, Berlin Heidelberg (1993)","DOI":"10.1007\/3-540-57220-1_60"},{"issue":"1","key":"2984_CR43","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/BF00203967","volume":"3","author":"C Adams","year":"1990","unstructured":"Adams, C., Tavares, S.: The structured design of cryptographically good S-boxes. J. Cryptol. 3(1), 27\u201341 (1990)","journal-title":"J. Cryptol."},{"key":"2984_CR44","doi-asserted-by":"crossref","unstructured":"Webster, A., Tavares, S.: On the design of S-boxes, pp. 523\u2013534. Springer, Berlin Heidelberg (1986)","DOI":"10.1007\/3-540-39799-X_41"},{"key":"2984_CR45","doi-asserted-by":"crossref","unstructured":"Adams, C., Tavares, S.: Good S-boxes are easy to find, pp. 612\u2013615. Springer, New York (1990)","DOI":"10.1007\/0-387-34805-0_56"},{"key":"2984_CR46","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DESlike cryptosystems. J. Cryptol. 4, 3\u201372 (1991)","journal-title":"J. Cryptol."},{"key":"2984_CR47","doi-asserted-by":"crossref","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher, pp. 386\u2013397. Springer, Berlin Heidelberg (1994)","DOI":"10.1007\/3-540-48285-7_33"},{"key":"2984_CR48","doi-asserted-by":"crossref","first-page":"6663","DOI":"10.1007\/s11227-019-02878-7","volume":"75","author":"A Arab","year":"2019","unstructured":"Arab, A., Rostami, M.J., Ghavami, B.: An image encryption method based on chaos system and AES algorithm. J. Supercomput. 75, 6663\u20136682 (2019)","journal-title":"J. Supercomput."},{"issue":"2","key":"2984_CR49","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J Sci. Technol. J. Selected Areas Telecommun. (JSAT) 1(2), 31\u201338 (2011)","journal-title":"Cyber J. Multidiscip. J Sci. Technol. J. Selected Areas Telecommun. (JSAT)"},{"key":"2984_CR50","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1016\/j.ins.2022.11.104","volume":"621","author":"S Zhou","year":"2023","unstructured":"Zhou, S., Wang, X., Zhang, Y.: Novel image encryption scheme based on chaotic signals with finite-precision error. Inf. Sci. 621, 782\u2013798 (2023)","journal-title":"Inf. Sci."},{"key":"2984_CR51","doi-asserted-by":"crossref","first-page":"43411","DOI":"10.1109\/ACCESS.2021.3065810","volume":"9","author":"AN Elghandour","year":"2021","unstructured":"Elghandour, A.N., Salah, A.M., Elmasry, Y.A., Karawia, A.A.: An image encryption algorithm based on bisection method and one-dimensional piecewise chaotic map. IEEE Access 9, 43411\u201343421 (2021)","journal-title":"IEEE Access"},{"issue":"1","key":"2984_CR52","doi-asserted-by":"crossref","first-page":"44","DOI":"10.3390\/e21010044","volume":"21","author":"SS Askar","year":"2019","unstructured":"Askar, S.S., Karawia, A.A., Al-Khedhairi, A., Al-Ammar, F.S.: An algorithm of image encryption using logistic and two-dimensional chaotic economic maps. Entropy 21(1), 44 (2019)","journal-title":"Entropy"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02984-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-023-02984-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02984-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T16:07:51Z","timestamp":1711382871000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-023-02984-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,5]]},"references-count":52,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["2984"],"URL":"https:\/\/doi.org\/10.1007\/s11760-023-02984-3","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,5]]},"assertion":[{"value":"20 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 December 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Data sharing not applicable to this article as no datasets were generated or analyzed during the current study","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Data sharing"}}]}}