{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T12:04:25Z","timestamp":1777982665764,"version":"3.51.4"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T00:00:00Z","timestamp":1775088000000},"content-version":"vor","delay-in-days":1,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/100021020","name":"Nagoya Institute of Technology","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100021020","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evol. Intel."],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s12065-026-01171-w","type":"journal-article","created":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T05:44:30Z","timestamp":1775108670000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An enhanced multi-stage evolution strategy for large size magic square generation and extension to magic rectangles"],"prefix":"10.1007","volume":"19","author":[{"given":"Kazuki","family":"Takemi","sequence":"first","affiliation":[]},{"given":"Takuto","family":"Sakuma","sequence":"additional","affiliation":[]},{"given":"Shohei","family":"Kato","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,2]]},"reference":[{"key":"1171_CR1","doi-asserted-by":"crossref","unstructured":"AL-Hashemy RH, Mehdi SA (2019) A new algorithm based on magic square and a novel chaotic system for image encryption. J Intell Syst 29(1): 1202\u20131215 (2019)","DOI":"10.1515\/jisys-2018-0404"},{"key":"1171_CR2","unstructured":"Azuma T (1956) 18C-7 a group-theoretical study of magic squares and panmagic squares(in japanese). In: Proceedings of the Annual Meeting of the Physical Society of Japan, 11.8, p.\u00a026. The Physical Society of Japan"},{"key":"1171_CR3","unstructured":"B\u00e4ck T, Hoffmeister F, Schwefel HP (1991) A survey of evolution strategies. In: Proceedings of the fourt\u00e5h international conference on genetic algorithms, pp. 2\u20139. Citeseer"},{"issue":"4","key":"1171_CR4","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1006\/eujc.1993.1032","volume":"14","author":"T Bier","year":"1993","unstructured":"Bier T, Rogers DG (1993) Balanced magic rectangles. Eur J Comb 14(4):285\u2013299","journal-title":"Eur J Comb"},{"key":"1171_CR5","doi-asserted-by":"crossref","unstructured":"Channapragada RSR, Prasad MV (2015) Watermarking techniques in curvelet domain. In: Computational Intelligence in Data Mining-Volume 1: Proceedings of the International Conference on CIDM, 20-21 December 2014, pp. 199\u2013211. Springer","DOI":"10.1007\/978-81-322-2205-7_19"},{"issue":"1","key":"1171_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1111\/itor.13471","volume":"32","author":"P Codognet","year":"2025","unstructured":"Codognet P (2025) Comparing QUBO models for quantum annealing: integer encodings for permutation problems. Int Trans Oper Res 32(1):18\u201337. https:\/\/doi.org\/10.1111\/itor.13471","journal-title":"Int Trans Oper Res"},{"key":"1171_CR7","unstructured":"Dudeney HE (1958) Amusements in mathematics, vol. 473. Courier Corporation"},{"key":"1171_CR8","unstructured":"Erickson M (2009) John horton conway\u2019s lux method used in the construction of a magic square of order-6. In: The Mathematical Association of America pp.\u00a098"},{"issue":"8","key":"1171_CR9","first-page":"2038","volume":"13","author":"AS Farhan","year":"2018","unstructured":"Farhan AS, Abed SH, Awad FH (2018) Color image encryption with a key generated by using magic square. J Eng Appl Sci 13(8):2038\u20132041","journal-title":"J Eng Appl Sci"},{"issue":"4","key":"1171_CR10","first-page":"1755","volume":"14","author":"M Hasan","year":"2022","unstructured":"Hasan M, Polash MMA (2022) Ternary selection based hybrid evolutionary algorithm for maximizing water retention on magic squares. Int J Inf Technol 14(4):1755\u20131761","journal-title":"Int J Inf Technol"},{"key":"1171_CR11","doi-asserted-by":"publisher","first-page":"46382","DOI":"10.1109\/ACCESS.2023.3275019","volume":"11","author":"MU Hassan","year":"2023","unstructured":"Hassan MU, Alzayed A, Al-Awady AA, Iqbal N, Akram M, Ikram A (2023) A novel RGB image obfuscation technique using dynamically generated all order-4 magic squares. IEEE Access 11:46382\u201346398. https:\/\/doi.org\/10.1109\/ACCESS.2023.3275019","journal-title":"IEEE Access"},{"issue":"1","key":"1171_CR12","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1038\/scientificamerican0792-66","volume":"267","author":"JH Holland","year":"1992","unstructured":"Holland JH (1992) Genetic algorithms. Sci Am 267(1):66\u201373","journal-title":"Sci Am"},{"key":"1171_CR13","doi-asserted-by":"publisher","first-page":"4505","DOI":"10.1007\/s11071-021-06472-6","volume":"104","author":"Z Hua","year":"2021","unstructured":"Hua Z, Zhou Y (2021) Color image encryption using orthogonal latin squares and a new 2d chaotic system. Nonlinear Dyn 104:4505\u20134522","journal-title":"Nonlinear Dyn"},{"key":"1171_CR14","unstructured":"La\u00a0Loubere SD (1693) A new historical relation of the kingdom of Siam"},{"key":"1171_CR15","unstructured":"M K (1942) Magic squares. In: Mathematical Recreations. W. W. Norton & Company Inc, New York, pp. 142\u2013192"},{"key":"1171_CR16","unstructured":"Muurinen I, et\u00a0al. (2020) Fermat, magic squares and the idea of self-supporting blocks"},{"key":"1171_CR17","unstructured":"Omori K (2018) The world of magic squares, new edition (in Japanese). Nippon Hyoron Sha"},{"issue":"7","key":"1171_CR18","first-page":"120","volume":"4","author":"J Pappachan","year":"2015","unstructured":"Pappachan J, Baby J (2015) Tinkerbell maps based image encryption using magic square. Int J Adv Res Electrical Electron Instrum Eng 4(7):120\u2013126","journal-title":"Int J Adv Res Electrical Electron Instrum Eng"},{"key":"1171_CR19","doi-asserted-by":"crossref","unstructured":"Pickover CA (2011) The zen of magic squares, circles, and stars. In: The Zen of Magic Squares, Circles, and Stars. Princeton University Press","DOI":"10.1515\/9781400841516"},{"key":"1171_CR20","doi-asserted-by":"crossref","unstructured":"Rani N, Mishra V (2021) Application of magic squares in cryptography. In: International Conference on Intelligent Vision and Computing, pp. 321\u2013329. Springer","DOI":"10.1007\/978-3-030-97196-0_26"},{"key":"1171_CR21","doi-asserted-by":"publisher","first-page":"2869","DOI":"10.1007\/s11071-022-07958-7","volume":"111","author":"N Rani","year":"2023","unstructured":"Rani N, Mishra V, Sharma SR (2023) Image encryption model based on novel magic square with differential encoding and chaotic map. Nonlinear Dyn 111:2869\u20132893. https:\/\/doi.org\/10.1007\/s11071-022-07958-7","journal-title":"Nonlinear Dyn"},{"key":"1171_CR22","doi-asserted-by":"publisher","unstructured":"Santoso KA, Najah ML, Hasan M (2022) Image authentication based on magic square. In: Proceedings of the International Conference on Mathematics, Geometry, Statistics, and Computation (IC-MaGeStiC 2021), pp. 239\u2013243. Atlantis Press. https:\/\/doi.org\/10.2991\/acsr.k.220202.043","DOI":"10.2991\/acsr.k.220202.043"},{"key":"1171_CR23","volume":"133","author":"S Senthilnayaki","year":"2021","unstructured":"Senthilnayaki S et al (2021) Medical image encryption based on magic square and pso. Comput Biol Med 133:104399","journal-title":"Comput Biol Med"},{"issue":"1","key":"1171_CR24","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/s11042-023-15677-3","volume":"83","author":"M Tahbaz","year":"2024","unstructured":"Tahbaz M, Shirgahi H, Yamaghani MR (2024) Evolutionary-based image encryption using magic square chaotic algorithm and RNA codons truth table. Multimed Tools Appl 83(1):503\u2013526. https:\/\/doi.org\/10.1007\/s11042-023-15677-3","journal-title":"Multimed Tools Appl"},{"key":"1171_CR25","doi-asserted-by":"crossref","unstructured":"Takemi K, Sakuma T, Kato S (2024) Large size magic square generation using multi-stage evolutionary strategy. In: 2024 IEEE International Conference on Agents (ICA), pp. 114\u2013119. IEEE","DOI":"10.1109\/ICA63002.2024.00032"},{"key":"1171_CR26","doi-asserted-by":"crossref","unstructured":"Van\u00a0Laarhoven PJ, Aarts EH, van Laarhoven PJ, Aarts EH (1987) Simulated annealing. Springer","DOI":"10.1007\/978-94-015-7744-1_2"},{"issue":"3","key":"1171_CR27","doi-asserted-by":"publisher","first-page":"457","DOI":"10.3390\/math10030457","volume":"10","author":"J Wang","year":"2022","unstructured":"Wang J, Liu L (2022) A novel chaos-based image encryption using magic square scrambling and octree diffusing. Mathematics 10(3):457","journal-title":"Mathematics"},{"key":"1171_CR28","unstructured":"Weisstein EW (2026) Magic square. In: A Wolfram Web Resource. https:\/\/mathworld.wolfram.com\/MagicSquare.html"},{"key":"1171_CR29","doi-asserted-by":"crossref","unstructured":"Xie T, Kang L (2003) An evolutionary algorithm for magic squares. In: The 2003 Congress on Evolutionary Computation, 2003. CEC\u201903., vol.\u00a02, pp. 906\u2013913. IEEE","DOI":"10.1109\/CEC.2003.1299763"},{"issue":"5\u20136","key":"1171_CR30","first-page":"725","volume":"19","author":"Y Xie","year":"2020","unstructured":"Xie Y, Wang Y, Ma M (2020) Design of a hybrid digital watermarking algorithm with high robustness. J Web Eng 19(5\u20136):725\u2013746","journal-title":"J Web Eng"}],"container-title":["Evolutionary Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-026-01171-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12065-026-01171-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-026-01171-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T04:35:29Z","timestamp":1777091729000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12065-026-01171-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["1171"],"URL":"https:\/\/doi.org\/10.1007\/s12065-026-01171-w","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-7917518\/v1","asserted-by":"object"}]},"ISSN":["1864-5909","1864-5917"],"issn-type":[{"value":"1864-5909","type":"print"},{"value":"1864-5917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4]]},"assertion":[{"value":"21 October 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2026","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and consent to participate"}}],"article-number":"65"}}