{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T09:37:32Z","timestamp":1771234652833,"version":"3.50.1"},"reference-count":31,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T00:00:00Z","timestamp":1639699200000},"content-version":"vor","delay-in-days":350,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004054","name":"King Abdulaziz University","doi-asserted-by":"publisher","award":["D.1432-26-611"],"award-info":[{"award-number":["D.1432-26-611"]}],"id":[{"id":"10.13039\/501100004054","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Computational Intelligence and Neuroscience"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>The nonlinear transformation concedes as S\u2010box which is responsible for the certainty of contemporary block ciphers. Many kinds of S\u2010boxes are planned by various authors in the literature. Construction of S\u2010box with a powerful cryptographic analysis is the vital step in scheming block cipher. Through this paper, we give more powerful and worthy S\u2010boxes and compare their characteristics with some previous S\u2010boxes employed in cryptography. The algorithm program planned in this paper applies the action of projective general linear group <jats:italic>P<\/jats:italic><jats:italic>G<\/jats:italic><jats:italic>L<\/jats:italic>(2, <jats:italic>G<\/jats:italic><jats:italic>F<\/jats:italic>(2<jats:sup>8<\/jats:sup>)) on Galois field <jats:italic>G<\/jats:italic><jats:italic>F<\/jats:italic>(2<jats:sup>8<\/jats:sup>). The proposed S\u2010boxes are constructed by using Mobius transformation and elements of Galois field. By using this approach, we will encrypt an image which is the preeminent application of S\u2010boxes. These S\u2010boxes offer a strong algebraic quality and powerful confusion capability. We have tested the strength of the proposed S\u2010boxes by using different tests, BIC, SAC, DP, LP, and nonlinearity. Furthermore, we have applied these S\u2010boxes in image encryption scheme. To check the strength of image encryption scheme, we have calculated contrast, entropy, correlation, energy, and homogeneity. The results assured that the proposed scheme is better. The advantage of this scheme is that we can secure our confidential image data during transmission.<\/jats:p>","DOI":"10.1155\/2021\/1912859","type":"journal-article","created":{"date-parts":[[2021,12,18]],"date-time":"2021-12-18T02:50:48Z","timestamp":1639795848000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["A Novel Image Encryption Technique Based on Mobius Transformation"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5684-4737","authenticated-orcid":false,"given":"Muhammad","family":"Asif","sequence":"first","affiliation":[]},{"given":"Sibgha","family":"Mairaj","sequence":"additional","affiliation":[]},{"given":"Zafar","family":"Saeed","sequence":"additional","affiliation":[]},{"given":"M. Usman","family":"Ashraf","sequence":"additional","affiliation":[]},{"given":"Kamal","family":"Jambi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2656-8679","authenticated-orcid":false,"given":"Rana Muhammad","family":"Zulqarnain","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,12,17]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.03.021"},{"key":"e_1_2_9_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2012.06.011"},{"key":"e_1_2_9_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-012-0440-0"},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-012-0723-5"},{"key":"e_1_2_9_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-1214-z"},{"key":"e_1_2_9_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2014.10.021"},{"key":"e_1_2_9_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-1086-2"},{"key":"e_1_2_9_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2173-3"},{"key":"e_1_2_9_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-014-1445-7"},{"key":"e_1_2_9_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s40815-017-0371-5"},{"key":"e_1_2_9_11_2","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6853826"},{"key":"e_1_2_9_12_2","article-title":"Optimized on system analysis using AES and X-tea","volume":"3","author":"Rashi K.","year":"2013","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"e_1_2_9_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2021.05.007"},{"key":"e_1_2_9_14_2","doi-asserted-by":"publisher","DOI":"10.3233\/jifs-190137"},{"key":"e_1_2_9_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3092512"},{"key":"e_1_2_9_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2018.12.003"},{"key":"e_1_2_9_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102829"},{"key":"e_1_2_9_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3083151"},{"key":"e_1_2_9_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2021.03.004"},{"key":"e_1_2_9_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09892-5"},{"key":"e_1_2_9_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3005087"},{"key":"e_1_2_9_22_2","doi-asserted-by":"publisher","DOI":"10.1090\/s0025-5718-1992-1134730-7"},{"key":"e_1_2_9_23_2","doi-asserted-by":"publisher","DOI":"10.1080\/01611190802653228"},{"key":"e_1_2_9_24_2","first-page":"1779","article-title":"Construction of new S-box using a linear fractional transformation","volume":"14","author":"Hussain I.","year":"2011","journal-title":"World Applied Sciences Journal"},{"key":"e_1_2_9_25_2","first-page":"751","article-title":"A new S-box structure named Affine-Power-Affine","volume":"3","author":"Cui L.","year":"2007","journal-title":"International Journal of Innovative Computing, Information and Control"},{"key":"e_1_2_9_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-012-0914-5"},{"key":"e_1_2_9_27_2","first-page":"111","article-title":"Some analysis of S-box based on residue of prime number","volume":"48","author":"Hussain I.","year":"2011","journal-title":"Proceedings of the Pakistan Academy of Sciences"},{"key":"e_1_2_9_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2012.05.017"},{"key":"e_1_2_9_29_2","unstructured":"FengD.andWuW. Design and analysis of block ciphers 2000 Ruhr University Bochum Bochum Germany Doctoral Dissertation."},{"key":"e_1_2_9_30_2","first-page":"386","volume-title":"Workshop on the Theory and Application of of Cryptographic Techniques","author":"Matsui M.","year":"1993"},{"key":"e_1_2_9_31_2","article-title":"New analysis methods on strict avalanche criterion of S-boxes","volume":"48","author":"Mar P. P.","year":"2008","journal-title":"World Academy of Science, Engineering and Technology"}],"container-title":["Computational Intelligence and Neuroscience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/cin\/2021\/1912859.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/cin\/2021\/1912859.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/1912859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T12:29:32Z","timestamp":1722947372000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/1912859"}},"subtitle":[],"editor":[{"given":"Ahmed Mostafa","family":"Khalil","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/1912859"],"URL":"https:\/\/doi.org\/10.1155\/2021\/1912859","archive":["Portico"],"relation":{},"ISSN":["1687-5265","1687-5273"],"issn-type":[{"value":"1687-5265","type":"print"},{"value":"1687-5273","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-10-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-10-29","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-12-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"1912859"}}