{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T19:31:31Z","timestamp":1770060691714,"version":"3.49.0"},"reference-count":44,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1016\/j.jisa.2026.104374","type":"journal-article","created":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T06:39:08Z","timestamp":1768977548000},"page":"104374","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Block-based image encryption inspired by NTRU using self-invertible matrices"],"prefix":"10.1016","volume":"97","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4833-781X","authenticated-orcid":false,"given":"Ammar","family":"Ali Neamah","sequence":"first","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.jisa.2026.104374_bib0001","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun ACM"},{"key":"10.1016\/j.jisa.2026.104374_bib0002","first-page":"1","article-title":"Federal information processing standards publication 46","volume":"23","author":"Standard","year":"1977","journal-title":"National Bureau of Standards, US Department of Commerce"},{"key":"10.1016\/j.jisa.2026.104374_bib0003","unstructured":"Daemen J., Rijmen V.. AES proposal: Rijndael1999. AES Proposal: Rijndael, 1999. Available online: https:\/\/www.cs.miami.edu\/home\/burt\/learning\/Csc688.012\/rijndael\/rijndael_doc_V2.pdf (accessed on May 2, 2025)."},{"issue":"5","key":"10.1016\/j.jisa.2026.104374_bib0004","doi-asserted-by":"crossref","first-page":"4839","DOI":"10.1007\/s11071-024-10429-w","article-title":"A novel one-dimensional cosine within sine chaotic map and novel permutation-diffusion based medical image encryption","volume":"113","author":"Khurana","year":"2025","journal-title":"Nonlinear Dyn"},{"key":"10.1016\/j.jisa.2026.104374_bib0005","doi-asserted-by":"crossref","first-page":"766","DOI":"10.1016\/j.ins.2022.11.121","article-title":"EFR-CSTp: encryption for face recognition based on the chaos and semi-tensor product theory","volume":"621","author":"Gao","year":"2023","journal-title":"Inf Sci"},{"issue":"12","key":"10.1016\/j.jisa.2026.104374_bib0006","doi-asserted-by":"crossref","first-page":"887","DOI":"10.3390\/fractalfract7120887","article-title":"Exploiting newly designed fractional-order 3D lorenz chaotic system and 2D discrete polynomial hyper-chaotic map for high-performance multi-image encryption","volume":"7","author":"Feng","year":"2023","journal-title":"Fractal Fract"},{"issue":"7","key":"10.1016\/j.jisa.2026.104374_bib0007","doi-asserted-by":"crossref","first-page":"7277","DOI":"10.1007\/s11071-024-10480-7","article-title":"A robust image encryption technique based on an improved fractional order chaotic map","volume":"113","author":"Jackson","year":"2025","journal-title":"Nonlinear Dyn"},{"key":"10.1016\/j.jisa.2026.104374_bib0008","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2024.115001","article-title":"Text visualization encryption based on coordinate substitution and chaotic system","volume":"184","author":"Lu","year":"2024","journal-title":"Chaos Solitons Fractals"},{"key":"10.1016\/j.jisa.2026.104374_bib0009","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2025.128237","article-title":"A reliable color image encryption scheme based on a novel dual-wing hyperchaotic map","author":"Obaid","year":"2025","journal-title":"Expert Syst Appl"},{"key":"10.1016\/j.jisa.2026.104374_bib0010","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1016\/j.aej.2024.11.040","article-title":"An image encryption approach combining cross-interaction region scrambling and plainimage-related diffusion using a dynamic external key","volume":"114","author":"Alsubaei","year":"2025","journal-title":"Alex Eng J"},{"issue":"4","key":"10.1016\/j.jisa.2026.104374_bib0011","doi-asserted-by":"crossref","DOI":"10.1088\/1402-4896\/adb918","article-title":"An image encryption algorithm based on a novel 4D hyperchaotic system and improved Knight\u2019s tour scrambling algorithm","volume":"100","author":"Deng","year":"2025","journal-title":"Phys Scr"},{"issue":"11","key":"10.1016\/j.jisa.2026.104374_bib0012","doi-asserted-by":"crossref","DOI":"10.1088\/1402-4896\/ad0268","article-title":"A novel color image encryption scheme using elliptic curve cryptography and hyperchaotic system","volume":"98","author":"Fang","year":"2023","journal-title":"Phys Scr"},{"issue":"1","key":"10.1016\/j.jisa.2026.104374_bib0013","doi-asserted-by":"crossref","DOI":"10.1515\/eng-2022-0552","article-title":"An image encryption method based on modified elliptic curve Diffie-Hellman key exchange protocol and hill cipher","volume":"14","author":"Hadi","year":"2024","journal-title":"Open Eng"},{"key":"10.1016\/j.jisa.2026.104374_bib0014","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.aej.2024.11.012","article-title":"Research on cloud dynamic public key information security based on elliptic curve and primitive pythagoras","volume":"113","author":"Man","year":"2025","journal-title":"Alex Eng J"},{"issue":"4","key":"10.1016\/j.jisa.2026.104374_bib0015","doi-asserted-by":"crossref","first-page":"7087","DOI":"10.1109\/TCE.2024.3415411","article-title":"Chaotic quantum encryption to secure image data in post quantum consumer technology","volume":"70","author":"Khan","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"issue":"4","key":"10.1016\/j.jisa.2026.104374_bib0016","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1007\/s10773-024-05630-x","article-title":"A quantum image encryption and watermarking algorithm based on QDCT and baker map","volume":"63","author":"Zhou","year":"2024","journal-title":"Int J Theor Phys"},{"issue":"1","key":"10.1016\/j.jisa.2026.104374_bib0017","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s10586-024-04743-6","article-title":"Quantum image encryption protocol for secure communication in healthcare networks","volume":"28","author":"Prajapat","year":"2025","journal-title":"Cluster Comput"},{"issue":"5","key":"10.1016\/j.jisa.2026.104374_bib0018","doi-asserted-by":"crossref","first-page":"1240","DOI":"10.1016\/j.compeleceng.2012.02.007","article-title":"A RGB image encryption algorithm based on DNA encoding and chaos map","volume":"38","author":"Liu","year":"2012","journal-title":"Comput Electr Eng"},{"key":"10.1016\/j.jisa.2026.104374_bib0019","article-title":"Image encryption algorithm based on improved zigzag transformation and quaternary DNA coding","volume":"70","author":"Wang","year":"2022","journal-title":"J Inf Secur Appl"},{"key":"10.1016\/j.jisa.2026.104374_bib0020","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1016\/j.ins.2021.01.014","article-title":"Efficient key-dependent dynamic S-boxes based on permutated elliptic curves","volume":"558","author":"Ibrahim","year":"2021","journal-title":"Inf Sci"},{"key":"10.1016\/j.jisa.2026.104374_bib0021","article-title":"Image encryption using dynamic S-boxes generated using elliptic curve points and chaotic system","volume":"83","author":"Singh","year":"2024","journal-title":"J Inf Secur Appl"},{"key":"10.1016\/j.jisa.2026.104374_bib0022","series-title":"International algorithmic number theory symposium","first-page":"267","article-title":"NTRU: a ring-based public key cryptosystem","author":"Hoffstein","year":"1998"},{"issue":"2","key":"10.1016\/j.jisa.2026.104374_bib0023","doi-asserted-by":"crossref","first-page":"29","DOI":"10.3390\/cryptography7020029","article-title":"Timing-attack-resistant acceleration of NTRU round 3 encryption on resource-constrained embedded systems","volume":"7","author":"Camacho-Ruiz","year":"2023","journal-title":"Cryptography"},{"issue":"5","key":"10.1016\/j.jisa.2026.104374_bib0024","doi-asserted-by":"crossref","first-page":"12985","DOI":"10.1007\/s11042-023-15880-2","article-title":"A novel structure of fast and efficient multiple image encryption","volume":"83","author":"Hoang","year":"2024","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"10.1016\/j.jisa.2026.104374_bib0025","doi-asserted-by":"crossref","first-page":"2029","DOI":"10.1007\/s10586-023-04084-w","article-title":"A novel and secure image encryption scheme based on two-dimensional logistic and arnold cat map","volume":"27","author":"Akraam","year":"2024","journal-title":"Cluster Comput"},{"key":"10.1016\/j.jisa.2026.104374_bib0026","doi-asserted-by":"crossref","first-page":"76191","DOI":"10.1109\/ACCESS.2021.3072075","article-title":"Image encryption and authentication with elliptic curve cryptography and multidimensional chaotic maps","volume":"9","author":"Parida","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.jisa.2026.104374_bib0027","doi-asserted-by":"crossref","DOI":"10.1016\/j.dsp.2022.103639","article-title":"Secret image encryption based on chaotic system and elliptic curve cryptography","volume":"129","author":"Banik","year":"2022","journal-title":"Digit Signal Process"},{"key":"10.1016\/j.jisa.2026.104374_bib0028","doi-asserted-by":"crossref","first-page":"107152","DOI":"10.1109\/ACCESS.2022.3212899","article-title":"Quantum image encryption using a self-adaptive hash function-controlled chaotic map (SAHF-CCM)","volume":"10","author":"Abdelfatah","year":"2022","journal-title":"IEEE Access"},{"issue":"8","key":"10.1016\/j.jisa.2026.104374_bib0029","doi-asserted-by":"crossref","first-page":"2930","DOI":"10.1007\/s10773-021-04862-5","article-title":"Quantum image encryption based on quantum image decomposition","volume":"60","author":"Zhang","year":"2021","journal-title":"Int J Theor Phys"},{"key":"10.1016\/j.jisa.2026.104374_bib0030","doi-asserted-by":"crossref","first-page":"81412","DOI":"10.1109\/ACCESS.2020.2990903","article-title":"Separable reversible data hiding scheme in homomorphic encrypted domain based on NTRU","volume":"8","author":"Zhou","year":"2020","journal-title":"IEEE Access"},{"issue":"5","key":"10.1016\/j.jisa.2026.104374_bib0031","doi-asserted-by":"crossref","first-page":"4003","DOI":"10.1007\/s11760-024-03008-4","article-title":"Image processing-based protection of privacy data in cloud using NTRU algorithm","volume":"18","author":"Karthika","year":"2024","journal-title":"Signal Image Video Process"},{"issue":"9","key":"10.1016\/j.jisa.2026.104374_bib0032","doi-asserted-by":"crossref","first-page":"1066","DOI":"10.3390\/electronics10091066","article-title":"New image encryption algorithm using hyperchaotic system and fibonacci Q-matrix","volume":"10","author":"Hosny","year":"2021","journal-title":"Electronics"},{"issue":"5","key":"10.1016\/j.jisa.2026.104374_bib0033","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1007\/s42979-025-04059-1","article-title":"A hybrid image encryption technique for grayscale and color image using tinkerbell and arnold cat map","volume":"6","author":"Parida","year":"2025","journal-title":"SN Comput Sci"},{"issue":"2","key":"10.1016\/j.jisa.2026.104374_bib0034","doi-asserted-by":"crossref","first-page":"15","DOI":"10.3390\/cryptography3020015","article-title":"Effect of self-invertible matrix on cipher hexagraphic polyfunction","volume":"3","author":"Ching","year":"2019","journal-title":"Cryptography"},{"issue":"1","key":"10.1016\/j.jisa.2026.104374_bib0035","first-page":"14","article-title":"Novel methods of generating self-invertible matrix for hill cipher algorithm","volume":"1","author":"Acharya","year":"2007","journal-title":"Int J Secur"},{"issue":"12","key":"10.1016\/j.jisa.2026.104374_bib0036","first-page":"16543","article-title":"Dynamic image encryption using self-invertible matrices generated via chaotic systems","volume":"78","author":"Zhang","year":"2019","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10.1016\/j.jisa.2026.104374_bib0037","doi-asserted-by":"crossref","first-page":"107","DOI":"10.47836\/mjms.18.1.07","article-title":"A novel image encryption algorithm involving a logistic map and a self-invertible matrix","volume":"18","author":"Al-Saffar","year":"2024","journal-title":"Malaysian J Math Sci"},{"key":"10.1016\/j.jisa.2026.104374_bib0038","unstructured":"California U.o. S.. USC-SIPI image database. 2025. http:\/\/sipi.usc.edu\/database\/."},{"key":"10.1016\/j.jisa.2026.104374_bib0039","doi-asserted-by":"crossref","first-page":"157106","DOI":"10.1109\/ACCESS.2021.3128177","article-title":"Construction of S-boxes using different maps over elliptic curves for image encryption","volume":"9","author":"Ramzan","year":"2021","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.jisa.2026.104374_bib0040","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-025-95263-9","article-title":"Image encryption scheme based on thorp shuffle and pseudo dequeue","volume":"15","author":"Geng","year":"2025","journal-title":"Sci Rep"},{"issue":"11","key":"10.1016\/j.jisa.2026.104374_bib0041","doi-asserted-by":"crossref","DOI":"10.1016\/j.heliyon.2024.e31618","article-title":"An efficient image encryption model based on 6D hyperchaotic system and symmetric matrix for color and gray images","volume":"10","author":"Panwar","year":"2024","journal-title":"Heliyon"},{"issue":"1","key":"10.1016\/j.jisa.2026.104374_bib0042","doi-asserted-by":"crossref","DOI":"10.1016\/j.heliyon.2024.e37239","article-title":"A novel chaotic system with one absolute term: stability, ultimate boundedness, and image encryption","volume":"11","author":"Shukur","year":"2025","journal-title":"Heliyon"},{"key":"10.1016\/j.jisa.2026.104374_bib0043","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.118845","article-title":"A novel pixel-split image encryption scheme based on 2D salomon map","volume":"213","author":"Lai","year":"2023","journal-title":"Expert Syst Appl"},{"key":"10.1016\/j.jisa.2026.104374_bib0044","series-title":"Tech. Rep.","article-title":"A statistical test suite for random and pseudorandom number generators for cryptographic applications","author":"Rukhin","year":"2001"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000049?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000049?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T08:13:30Z","timestamp":1770020010000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212626000049"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":44,"alternative-id":["S2214212626000049"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104374","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2026,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Block-based image encryption inspired by NTRU using self-invertible matrices","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104374","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104374"}}