{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T04:58:15Z","timestamp":1775969895129,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T00:00:00Z","timestamp":1676419200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T00:00:00Z","timestamp":1676419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003009","name":"Science and Technology Development Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003009","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Amidst the growth of the internet and communication technologies, the requirements for the security of data transmitted via these technologies are increasing. Visual data, like images and videos, are commonly utilized for representing the majority of data due to its having more detailed information. Until now, the physical implementation of quantum computers does not have enough capability for hacking any traditional image cryptosystem, but amidst the growth of quantum resources, enough capability may be available in the near future. Most data represented by images has a long lifetime, like personal, medical, military, etc. Therefore, new quantum-inspired-based designs for image cryptosystems are required to be performed on digital resources and have the capability of defying the potential attacks from digital and quantum resources. In this study, a new substitution box (S-box) mechanism is proposed, which is based on quantum-inspired quantum walks, H\u00e9non map, and a customized particle swarm optimization algorithm. Performance analysis of the suggested S-box proves its effectiveness and its reliability in designing various cryptosystems. Based on the effectiveness of the presented S-box, a new image cryptosystem is proposed, in which its experiential outcomes prove its efficacy and security against various attacks. The average outcome of entropy is 7.99977, UACI is 33.484%, NPCR is 99.618%, and Chi-square is 249.481 for the constructed cipher images.<\/jats:p>","DOI":"10.1007\/s40747-023-00988-7","type":"journal-article","created":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T06:56:25Z","timestamp":1676616985000},"page":"4817-4835","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["Efficient S-box construction based on quantum-inspired quantum walks with PSO algorithm and its application to image cryptosystem"],"prefix":"10.1007","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4739-0037","authenticated-orcid":false,"given":"Bassem","family":"Abd-El-Atty","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,15]]},"reference":[{"key":"988_CR1","doi-asserted-by":"publisher","first-page":"3241","DOI":"10.1007\/s40747-021-00515-6","volume":"7","author":"M Uddin","year":"2021","unstructured":"Uddin M, Jahan F, Islam MK, Hassan MR (2021) A novel DNA-based key scrambling technique for image encryption. Complex Intell Syst 7:3241\u20133258","journal-title":"Complex Intell Syst"},{"key":"988_CR2","doi-asserted-by":"publisher","first-page":"2291","DOI":"10.1007\/s40747-022-00644-6","volume":"8","author":"Z Gan","year":"2022","unstructured":"Gan Z, Chai X, Bi J, Chen X (2022) Content-adaptive image compression and encryption via optimized compressive sensing with double random phase encoding driven by chaos. Complex Intell Syst 8:2291\u20132309","journal-title":"Complex Intell Syst"},{"key":"988_CR3","doi-asserted-by":"crossref","unstructured":"Maazouz M, Toubal A, Bengherbia B, Houhou O, Batel N (2022) FPGA implementation of a chaos-based image encryption algorithm. J King Saud Univ Comput Inf Sci 34(10):9926\u20139941","DOI":"10.1016\/j.jksuci.2021.12.022"},{"key":"988_CR4","first-page":"102829","volume":"59","author":"Y Naseer","year":"2021","unstructured":"Naseer Y, Shah T, Shah D (2021) A novel hybrid permutation substitution base colored image encryption scheme for multimedia data. J Inf Secur Appl 59:102829","journal-title":"J Inf Secur Appl"},{"key":"988_CR5","first-page":"102919","volume":"61","author":"S Roy","year":"2021","unstructured":"Roy S, Shrivastava M, Rawat U, Pandey CV, Nayak SK (2021) IESCA: an efficient image encryption scheme using 2-d cellular automata. J Inf Secur Appl 61:102919","journal-title":"J Inf Secur Appl"},{"key":"988_CR6","doi-asserted-by":"publisher","first-page":"9639","DOI":"10.1007\/s11042-020-10110-5","volume":"80","author":"NA Khan","year":"2020","unstructured":"Khan NA, Altaf M, Khan FA (2020) Selective encryption of JPEG images with chaotic based novel s-box. Multimedia Tools Appl 80:9639\u20139656","journal-title":"Multimedia Tools Appl"},{"key":"988_CR7","doi-asserted-by":"publisher","first-page":"2434","DOI":"10.3390\/math10142434","volume":"10","author":"AAA El-Latif","year":"2022","unstructured":"El-Latif AAA, Ramadoss J, Abd-El-Atty B, Khalifa HS, Nazarimehr F (2022) A novel chaos-based cryptography algorithm and its performance analysis. Mathematics 10:2434","journal-title":"Mathematics"},{"key":"988_CR8","doi-asserted-by":"publisher","first-page":"5111","DOI":"10.1007\/s00521-020-05304-9","volume":"33","author":"N Hematpour","year":"2020","unstructured":"Hematpour N, Ahadpour S (2020) Execution examination of chaotic s-box dependent on improved PSO algorithm. Neural Comput Appl 33:5111\u20135133","journal-title":"Neural Comput Appl"},{"key":"988_CR9","doi-asserted-by":"publisher","first-page":"115305","DOI":"10.1016\/j.eswa.2021.115305","volume":"182","author":"KZ Zamli","year":"2021","unstructured":"Zamli KZ (2021) Optimizing s-box generation based on the adaptive agent heroes and cowards algorithm. Expert Syst Appl 182:115305","journal-title":"Expert Syst Appl"},{"key":"988_CR10","doi-asserted-by":"publisher","first-page":"5299","DOI":"10.1007\/s00500-020-05528-w","volume":"25","author":"S Saravanan","year":"2021","unstructured":"Saravanan S, Sivabalakrishnan M (2021) A hybrid chaotic map with coefficient improved whale optimization-based parameter tuning for enhanced image encryption. Soft Comput 25:5299\u20135322","journal-title":"Soft Comput"},{"key":"988_CR11","doi-asserted-by":"publisher","first-page":"25569","DOI":"10.1007\/s11042-018-5807-x","volume":"77","author":"S Noshadian","year":"2018","unstructured":"Noshadian S, Ebrahimzade A, Kazemitabar SJ (2018) Optimizing chaos based image encryption. Multimedia Tools Appl 77:25569\u201325590","journal-title":"Multimedia Tools Appl"},{"key":"988_CR12","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s11721-007-0002-0","volume":"1","author":"R Poli","year":"2007","unstructured":"Poli R, Kennedy J, Blackwell T (2007) Particle swarm optimization. Swarm Intell 1:33\u201357","journal-title":"Swarm Intell"},{"key":"988_CR13","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1016\/j.asoc.2007.05.007","volume":"8","author":"D Karaboga","year":"2008","unstructured":"Karaboga D, Basturk B (2008) On the performance of artificial bee colony (ABC) algorithm. Appl Soft Comput 8:687\u2013697","journal-title":"Appl Soft Comput"},{"key":"988_CR14","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MCI.2006.329691","volume":"1","author":"M Dorigo","year":"2006","unstructured":"Dorigo M, Birattari M, Stutzle T (2006) Ant colony optimization. IEEE Comput Intell Mag 1:28\u201339","journal-title":"IEEE Comput Intell Mag"},{"key":"988_CR15","doi-asserted-by":"publisher","first-page":"5409","DOI":"10.1007\/s00500-021-06554-y","volume":"26","author":"Y Luo","year":"2022","unstructured":"Luo Y, Ouyang X, Liu J, Cao L, Zou Y (2022) An image encryption scheme based on particle swarm optimization algorithm and hyperchaotic system. Soft Comput 26:5409\u20135435","journal-title":"Soft Comput"},{"key":"988_CR16","doi-asserted-by":"crossref","unstructured":"Abd-El-Atty B, ElAffendi M, El-Latif AAA (2022) A novel image cryptosystem using gray code, quantum walks, and Henon map for cloud applications. Complex Intell Syst","DOI":"10.1007\/s40747-022-00829-z"},{"key":"988_CR17","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1007\/s10773-018-3989-7","volume":"58","author":"N Jiang","year":"2019","unstructured":"Jiang N, Dong X, Hu H, Ji Z, Zhang W (2019) Quantum image encryption based on Henon mapping. Int J Theor Phys 58:979\u2013991","journal-title":"Int J Theor Phys"},{"key":"988_CR18","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.ins.2020.06.030","volume":"539","author":"X Wang","year":"2020","unstructured":"Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf Sci 539:195\u2013214","journal-title":"Inf Sci"},{"key":"988_CR19","doi-asserted-by":"crossref","unstructured":"Rupa C, Harshita M, Srivastava G, Gadekallu TR, Maddikunta PKR (2022) Securing multimedia using a deep learning based chaotic logistic map. IEEE J Biomed Health Inform, p 1","DOI":"10.1109\/JBHI.2022.3178629"},{"key":"988_CR20","doi-asserted-by":"publisher","first-page":"44","DOI":"10.3390\/e21010044","volume":"21","author":"S Askar","year":"2019","unstructured":"Askar S, Karawia A, Al-Khedhairi A, Al-Ammar F (2019) An algorithm of image encryption using logistic and two-dimensional chaotic economic maps. Entropy 21:44","journal-title":"Entropy"},{"key":"988_CR21","doi-asserted-by":"crossref","unstructured":"S. Vaidyanathan, A. Sambas, E. Tlelo-Cuautle, A. A. A. El-Latif, B. Abd-El-Atty, O. Guillen-Fernandez, K. Benkouider, M. A. Mohamed, M. Mamat, and M. A. H. Ibrahim, \u201cA new 4-d multi-stable hyperchaotic system with no balance point: Bifurcation analysis, circuit simulation, FPGA realization and image cryptosystem,\u201d IEEE Access, vol. 9, pp. 144555\u2013144573, (2021)","DOI":"10.1109\/ACCESS.2021.3121428"},{"key":"988_CR22","doi-asserted-by":"crossref","unstructured":"Rehman MU, Shafique A, Ghadi YY, Boulila W, Jan SU, Gadekallu TR, Driss M, Ahmad J (2022) A novel chaos-based privacy-preserving deep learning model for cancer diagnosis. IEEE Trans Netw Sci Eng 9(6):4322\u20134337","DOI":"10.1109\/TNSE.2022.3199235"},{"key":"988_CR23","doi-asserted-by":"publisher","first-page":"1392","DOI":"10.3390\/electronics10121392","volume":"10","author":"AAA El-Latif","year":"2021","unstructured":"El-Latif AAA, Abd-El-Atty B, Belazi A, Iliyasu AM (2021) Efficient chaos-based substitution-box and its application to image encryption. Electronics 10:1392","journal-title":"Electronics"},{"key":"988_CR24","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s11071-016-3046-0","volume":"87","author":"A Belazi","year":"2016","unstructured":"Belazi A, Khan M, El-Latif AAA, Belghith S (2016) Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption. Nonlinear Dyn 87:337\u2013361","journal-title":"Nonlinear Dyn"},{"key":"988_CR25","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1007\/s11071-021-06308-3","volume":"104","author":"Z Hua","year":"2021","unstructured":"Hua Z, Li J, Chen Y, Yi S (2021) Design and application of an s-box using complete Latin square. Nonlinear Dyn 104:807\u2013825","journal-title":"Nonlinear Dyn"},{"key":"988_CR26","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1007\/s00521-016-2511-5","volume":"29","author":"M Khan","year":"2016","unstructured":"Khan M, Asghar Z (2016) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and s8 permutation. Neural Comput Appl 29:993\u2013999","journal-title":"Neural Comput Appl"},{"key":"988_CR27","doi-asserted-by":"publisher","first-page":"16641","DOI":"10.1007\/s00521-021-06260-8","volume":"33","author":"KZ Zamli","year":"2021","unstructured":"Zamli KZ, Kader A, Din F, Alhadawi HS (2021) Selective chaotic maps Tiki-Taka algorithm for the s-box generation and optimization. Neural Comput Appl 33:16641\u201316658","journal-title":"Neural Comput Appl"},{"key":"988_CR28","doi-asserted-by":"publisher","first-page":"7333","DOI":"10.1007\/s11042-020-10048-8","volume":"80","author":"HS Alhadawi","year":"2020","unstructured":"Alhadawi HS, Majid MA, Lambi\u0107 D, Ahmad M (2020) A novel method of s-box design based on discrete chaotic maps and cuckoo search algorithm. Multimedia Tools Appl 80:7333\u20137350","journal-title":"Multimedia Tools Appl"},{"key":"988_CR29","doi-asserted-by":"publisher","first-page":"3041","DOI":"10.1007\/s11071-019-05413-8","volume":"99","author":"MAB Farah","year":"2019","unstructured":"Farah MAB, Farah A, Farah T (2019) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn 99:3041\u20133064","journal-title":"Nonlinear Dyn"},{"key":"988_CR30","doi-asserted-by":"crossref","unstructured":"E. Tanyildizi and F. Ozkaynak, \u201cA new chaotic s-box generation method using parameter optimization of one dimensional chaotic maps,\u201d IEEE Access, vol. 7, pp. 117829\u2013117838, (2019)","DOI":"10.1109\/ACCESS.2019.2936447"},{"key":"988_CR31","doi-asserted-by":"publisher","first-page":"106393","DOI":"10.1016\/j.optlaseng.2020.106393","volume":"137","author":"X Wang","year":"2021","unstructured":"Wang X, Li Y (2021) Chaotic image encryption algorithm based on hybrid multi-objective particle swarm optimization and DNA sequence. Opt Lasers Eng 137:106393","journal-title":"Opt Lasers Eng"},{"key":"988_CR32","first-page":"1","volume":"2021","author":"J Zeng","year":"2021","unstructured":"Zeng J, Wang C (2021) A novel hyperchaotic image encryption system based on particle swarm optimization algorithm and cellular automata. Secur Commun Netw 2021:1\u201315","journal-title":"Secur Commun Netw"},{"key":"988_CR33","first-page":"247","volume":"10","author":"M Ahmad","year":"2018","unstructured":"Ahmad M, Alam MZ, Umayya Z, Khan S, Ahmad F (2018) An image encryption approach using particle swarm optimization and chaotic map. Int J Inf Technol 10:247\u2013255","journal-title":"Int J Inf Technol"},{"key":"988_CR34","doi-asserted-by":"crossref","unstructured":"El-Latif AAA, Abd-El-Atty B, Amin M, Iliyasu AM (2020) Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications. Sci Rep 10:1930","DOI":"10.1038\/s41598-020-58636-w"},{"key":"988_CR35","doi-asserted-by":"crossref","unstructured":"Abd-El-Atty B (2023) A robust medical image steganography approach based on particle swarm optimization algorithm and quantum walks. Neural Comput Appl 35:773\u2013785","DOI":"10.1007\/s00521-022-07830-0"},{"key":"988_CR36","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1007\/s11128-012-0432-5","volume":"11","author":"SE Venegas-Andraca","year":"2012","unstructured":"Venegas-Andraca SE (2012) Quantum walks: a comprehensive review. Quantum Inf Process 11:1015\u20131106","journal-title":"Quantum Inf Process"},{"key":"988_CR37","first-page":"47","volume":"43","author":"Z Li","year":"2018","unstructured":"Li Z, He Y (2018) Steganography with pixel-value differencing and modulus function based on PSO. J Inf Secur Appl 43:47\u201352","journal-title":"J Inf Secur Appl"},{"key":"988_CR38","doi-asserted-by":"crossref","unstructured":"A. Belazi and A. A. A. El-Latif, \u201cA simple yet efficient s-box method based on chaotic sine map,\u201d Optik, 130, 1438\u20131444, (2017)","DOI":"10.1016\/j.ijleo.2016.11.152"},{"key":"988_CR39","doi-asserted-by":"crossref","unstructured":"Farah T, Rhouma R, Belghith S (2016) A novel method for designing s-box based on chaotic map and teaching-learning-based optimization. Nonlinear Dynamics 88:1059\u20131074","DOI":"10.1007\/s11071-016-3295-y"},{"key":"988_CR40","unstructured":"Sipi image database-misc. http:\/\/sipi.usc.edu\/database\/database.php?volume=misc. Accessed 18 July 2022"},{"key":"988_CR41","doi-asserted-by":"publisher","first-page":"7111","DOI":"10.1007\/s00521-018-3541-y","volume":"31","author":"ZH Gan","year":"2018","unstructured":"Gan ZH, Chai XL, Han DJ, Chen YR (2018) A chaotic image encryption algorithm based on 3-d bit-plane permutation. Neural Comput Appl 31:7111\u20137130","journal-title":"Neural Comput Appl"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-00988-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-023-00988-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-00988-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T17:11:00Z","timestamp":1695402660000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-023-00988-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,15]]},"references-count":41,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["988"],"URL":"https:\/\/doi.org\/10.1007\/s40747-023-00988-7","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,15]]},"assertion":[{"value":"4 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This research contains neither human nor animal studies.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}}]}}