{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T11:18:08Z","timestamp":1762341488701,"version":"3.37.3"},"reference-count":76,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3021055","type":"journal-article","created":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T20:36:51Z","timestamp":1598992611000},"page":"160158-160176","source":"Crossref","is-referenced-by-count":18,"title":["An Efficient Generation and Security Analysis of Substitution Box Using Fingerprint Patterns"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2186-927X","authenticated-orcid":false,"given":"Oznur","family":"Sengel","sequence":"first","affiliation":[]},{"given":"Muhammed Ali","family":"Aydin","sequence":"additional","affiliation":[]},{"given":"Ahmet","family":"Sertbas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2911395"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2936447"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2925081"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2893176"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2979827"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-020-05503-y"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2846186"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970806"},{"key":"ref38","first-page":"1","article-title":"A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map","volume":"11","author":"ahmed","year":"2018","journal-title":"Neural Comput Appl"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.394"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2012.01.009"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2014.7073265"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/1023697X.2012.10669006"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-016-3295-y"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.pisc.2016.06.001"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6969312"},{"key":"ref34","first-page":"232","article-title":"S-box: Six-dimensional compound hyperchaotic map and artificial bee colony algorithm","volume":"27","author":"tian","year":"2016","journal-title":"Journal of Systems Engineering and Electronics"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/AIC-MITCSA.2016.7759926"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827372"},{"key":"ref61","first-page":"331","article-title":"A new approach to generate multi s-boxes based on RNA computing","volume":"16","author":"farhan","year":"2020","journal-title":"Int J Innov Comput Inf Control"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-X_41"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2511-5"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_56"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2283-y"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.3390\/e21101004"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1186\/s40064-016-3298-7"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2013.11.001"},{"key":"ref67","first-page":"751","article-title":"A new S-box structure named affine-power-affine","volume":"3","author":"cui","year":"2007","journal-title":"Int J Innov Comput Inf Control"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2008.205"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1063\/1.4978264"},{"article-title":"Block cipher cryptographic","year":"1974","author":"feistel","key":"ref2"},{"article-title":"Advanced encryption standard (AES) (FIPS PUB 197)","year":"2001","author":"dworkin","key":"ref1"},{"key":"ref20","first-page":"88","article-title":"A novel cryptographic key generation method using image features","volume":"4","author":"santhi","year":"2012","journal-title":"Res J Inf Technol"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIE.2010.5559741"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTAC.2016.7567340"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2006.08.003"},{"key":"ref23","first-page":"215","article-title":"A survey on white box cryptography model for mobile payment systems","author":"aydin","year":"2019","journal-title":"IEEE Int Conf Telecommun"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-016-3199-x"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1007\/s11071-016-3099-0","article-title":"A novel approach for strong S-Box generation algorithm design based on chaotic scaled zhongtang system","volume":"87","author":"?avu?o?lu","year":"2017","journal-title":"Nonlinear Dyn"},{"key":"ref50","first-page":"49","article-title":"New s-box calculation for Rijndael-AES based on an artificial neural network","volume":"6","author":"arra\u00f1aga","year":"2017","journal-title":"Electr&#x00F3;nica"},{"key":"ref51","first-page":"3185","article-title":"S-boxes generated using affine transformation giving maximum avalanche effect","volume":"3","author":"shama","year":"2011","journal-title":"International Journal of Computational Science and Engineering (IJCSE)"},{"key":"ref59","first-page":"1","article-title":"A new DNA-based S-box","volume":"15","author":"al-wattar","year":"2015","journal-title":"International Journal of Engineering & Technology IJET-IJENS"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.12783\/ijcsa.2015.0401.04"},{"key":"ref57","article-title":"A pseudo DNA cryptography method","volume":"abs 903 2693","author":"ning","year":"2009","journal-title":"CoRR"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24635-0_12"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/IC3.2015.7346738"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2013.12.443"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CODIS.2012.6422263"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.14429\/dsj.62.1439"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2015.11.188"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_32"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-017-3409-1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48116-5_9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1117\/12.304705"},{"journal-title":"Biometric cryptography key generation using feature and parametric aggregation","year":"2004","author":"costanzo","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.25195\/ijci.v41i1.101"},{"key":"ref16","first-page":"28","article-title":"Secured cryptographic key generation from multimodal biometrics: Feature level fusion of fingerprint and Iris","volume":"7","author":"jagadeesan","year":"2010","journal-title":"Int J Comput Sci Inf Secur"},{"key":"ref17","first-page":"237","article-title":"Using voice to generate cryptographic keys","author":"monrose","year":"2001","journal-title":"Proc A Speaker Odyssey&#x2014 Speaker Recognition Workshop"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DICTA.2007.4426824"},{"key":"ref19","first-page":"6","article-title":"An efficient approach to generating cryptographic keys from face and iris biometrics fused at the feature level","volume":"15","author":"abuguba","year":"2015","journal-title":"Int J Comput Sci Netw Secur"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/10721064_26"},{"key":"ref3","article-title":"S Kutulainda do?rusal e?itlik","author":"sakalli","year":"2006","journal-title":"Proc Sinyal ??leme ve ?leti?im UygulamalarI Kurultayi-S?U"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_6"},{"journal-title":"The Design of RIJNDAEL AES-The Advanced Encryption Standard","year":"2002","author":"daemen","key":"ref5"},{"key":"ref8","first-page":"2203","article-title":"Biometrics-based cryptographic key generation","author":"chang","year":"2004","journal-title":"Proc IEEE Int Conf Multimedia Expo (ICME)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2017.7983280"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEOT.2016.7754809"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2013.12.161"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/COGINF.2011.6016156"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.3390\/e20070525"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.23956\/ijarcsse\/V7I1\/01112"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2871557"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-017-3287-y"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/s11277-017-5054-x","article-title":"A novel algebraic technique for the construction of strong substitution box","volume":"99","author":"jamal","year":"2018","journal-title":"Wireless Pers Commun"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-018-4478-5"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3143344.3143355"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09184045.pdf?arnumber=9184045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:55:38Z","timestamp":1639770938000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9184045\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":76,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3021055","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}