{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T12:05:10Z","timestamp":1778241910883,"version":"3.51.4"},"reference-count":74,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T00:00:00Z","timestamp":1721865600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Data security is one of the biggest concerns in the modern world due to advancements in technology, and cryptography ensures that the privacy, integrity, and authenticity of such information are safeguarded in today\u2019s digitally connected world. In this article, we introduce a new technique for the construction of non-linear components in block ciphers. The proposed S-box generation process is a transformational procedure through which the elements of a finite field are mapped onto highly nonlinear permutations. This transformation is achieved through a series of algebraic and combinatorial operations. It involves group actions on some pairs of two Galois fields to create an initial S-box Pr\u00a0Sbox, which induces a rich algebraic structure. The post S-box Po\u00a0Sbox, which is derived from heuristic group-based optimization, leads to high nonlinearity and other important cryptographic parameters. The proposed S-box demonstrates resilience against various attacks, making the system resistant to statistical vulnerabilities. The investigation reveals remarkable attributes, including a nonlinearity score of 112, an average Strict Avalanche Criterion score of 0.504, and LAP (Linear Approximation Probability) score of 0.062, surpassing well-established S-boxes that exhibit desired cryptographic properties. This novel methodology suggests an encouraging approach for enhancing the security framework of block ciphers. In addition, we also proposed a three-step image encryption technique comprising of Row Permutation, Bitwise XOR, and block-wise substitution using Po\u00a0Sbox. These operations contribute to adding more levels of randomness, which improves the dispersion across the cipher image and makes it equally intense. Therefore, we were able to establish that the approach works to mitigate against statistical and cryptanalytic attacks. The PSNR, UACI, MSE, NCC, AD, SC, MD, and NAE data comparisons with existing methods are also provided to prove the efficiency of the encryption algorithm.<\/jats:p>","DOI":"10.3390\/sym16080954","type":"journal-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T14:31:07Z","timestamp":1721917867000},"page":"954","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Group-Action-Based S-box Generation Technique for Enhanced Block Cipher Security and Robust Image Encryption Scheme"],"prefix":"10.3390","volume":"16","author":[{"given":"Souad Ahmad","family":"Baowidan","sequence":"first","affiliation":[{"name":"Information Technology Department, Faculty of Computing and IT, King Abdulaziz University, Jeddah 21589, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1249-6424","authenticated-orcid":false,"given":"Ahmed","family":"Alamer","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Faculty of Science, University of Tabuk, Tabuk 71491, Saudi Arabia"}]},{"given":"Mudassir","family":"Hassan","sequence":"additional","affiliation":[{"name":"Department of Mathematics, The Islamia University of Bahawalpur, Bahawalpur 63100, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3507-9367","authenticated-orcid":false,"given":"Awais","family":"Yousaf","sequence":"additional","affiliation":[{"name":"Department of Mathematics, The Islamia University of Bahawalpur, Bahawalpur 63100, Pakistan"}]}],"member":"1968","published-online":{"date-parts":[[2024,7,25]]},"reference":[{"key":"ref_1","unstructured":"Caesar, G.I. (1851). Commentarii de Bello Gallico, Seidel."},{"key":"ref_2","unstructured":"Van Oorschot, P.C., Menezes, A.J., and Vanstone, S.A. (1996). Handbook of Applied Cryptography, CRC Press."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communication theory of secrecy systems","volume":"28","author":"Hannon","year":"1949","journal-title":"Bell Syst. Tech. J."},{"key":"ref_4","unstructured":"FIPS PUB (2024, July 16). Data Encryption Standard (des), Available online: https:\/\/csrc.nist.gov\/files\/pubs\/fips\/46-3\/final\/docs\/fips46-3.pdf."},{"key":"ref_5","unstructured":"Joan, D., and Vincent, R. (2002). The Design of Rijndael: AES-the Advanced Encryption Standard. Information Security and Cryptography, Springer."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Diffie, W., and Hellman, M.E. (2022). New directions in cryptography. Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, ACM.","DOI":"10.1145\/3549993.3550007"},{"key":"ref_7","unstructured":"Rivest, R.L. (1987). A Method for Obtaining Digital Signature and Public-Key Cryptosystems, ACM."},{"key":"ref_8","unstructured":"Miller, V.S. (1985, January 18\u201322). Use of elliptic curves in cryptography. Proceedings of the Conference on the Theory and Application of Cryptographic Techniques, Berlin, Germany."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Cohen, H., Frey, G., Avanzi, R., Doche, C., Lange, T., Nguyen, K., and Vercauteren, F. (2005). Handbook of Elliptic and Hyperelliptic Curve Cryptography, CRC Press.","DOI":"10.1201\/9781420034981"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Smart, N.P. (2016). The enigma machine. Cryptography Made Simple, Springer International Publishing.","DOI":"10.1007\/978-3-319-21936-3"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1109\/MAHC.1981.10033","article-title":"How Polish mathematicians deciphered the Enigma","volume":"3","author":"Rejewski","year":"1981","journal-title":"Ann. Hist. Comput."},{"key":"ref_12","unstructured":"Biham, E., and Shamir, A. (2012). Differential Cryptanalysis of the Data Encryption Standard, Springer Science & Business Media."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Kocher, P.C. (1996, January 18\u201322). Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Proceedings of the Advances in Cryptology\u2014CRYPTO\u201996: 16th Annual International Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/3-540-68697-5_9"},{"key":"ref_14","unstructured":"Fips Pub (2024, July 16). Secure Hash Standard (shs), Available online: https:\/\/csrc.nist.gov\/files\/pubs\/fips\/180-4\/upd1\/final\/docs\/fips180-4-draft-aug2014.pdf."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"28987","DOI":"10.1007\/s11042-022-11898-0","article-title":"A lightweight image encryption algorithm based on patterns in Rubik\u2019s revenge cube","volume":"81","author":"Yousaf","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref_16","first-page":"75","article-title":"A substitution box for lightweight ciphers to secure internet of things","volume":"35","author":"Panchami","year":"2023","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"10563","DOI":"10.1007\/s13369-022-06651-6","article-title":"A lightweight block cipher utilizing key cross approach via probability density function","volume":"47","author":"Das","year":"2022","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"7584","DOI":"10.1109\/ACCESS.2024.3351794","article-title":"Fuzzy logic-based substitution-box for robust medical image encryption in telemedicine","volume":"12","author":"Razaq","year":"2024","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2057","DOI":"10.1007\/s11277-021-08981-4","article-title":"A group theoretic construction of large number of AES-like substitution-boxes","volume":"122","author":"Razaq","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"125749","DOI":"10.1109\/ACCESS.2023.3331320","article-title":"Machine Learning in Chaos-Based Encryption: Theory, Implementations, and Applications","volume":"11","author":"Hwang","year":"2023","journal-title":"IEEE Access"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"8771","DOI":"10.1007\/s11071-023-08281-5","article-title":"Image compression and encryption algorithm based on uniform non-degeneracy chaotic system and fractal coding","volume":"111","author":"Liu","year":"2023","journal-title":"Nonlinear Dyn."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Ma, Y., Tian, Y., Zhang, L., and Zuo, P. (2024). Two-dimensional hyperchaotic effect coupled mapping lattice and its application in dynamic S-box generation. Nonlinear Dyn., 1\u201332.","DOI":"10.1007\/s11071-024-09907-y"},{"key":"ref_23","unstructured":"Singh, B., and Delhibabu, R. (2024, July 16). Searching for S-Boxes with Better Diffusion Using Evolutionary Algorithm; Cryptology ePrint Archive, 2023. Available online: https:\/\/eprint.iacr.org\/2023\/353."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"121684","DOI":"10.1016\/j.eswa.2023.121684","article-title":"A new cost function for heuristic search of nonlinear substitutions","volume":"237","author":"Kuznetsov","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"123190","DOI":"10.1016\/j.eswa.2024.123190","article-title":"Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption","volume":"246","author":"Feng","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"110397","DOI":"10.1109\/ACCESS.2020.3001868","article-title":"Bijective S-boxes method using improved chaotic map-based heuristic search and algebraic group structures","volume":"8","author":"Ahmad","year":"2020","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"39781","DOI":"10.1109\/ACCESS.2020.2975880","article-title":"Comparison of pre and post-action of a finite abelian group over certain nonlinear schemes","volume":"8","author":"Yousaf","year":"2020","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1007\/s40314-023-02215-y","article-title":"A novel algebraic construction of strong S-boxes over double GF (27) structures and image protection","volume":"42","author":"Razaq","year":"2023","journal-title":"Comput. Appl. Math."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"116132","DOI":"10.1109\/ACCESS.2020.3004449","article-title":"Particle swarm optimization based highly nonlinear substitution-boxes generation for security applications","volume":"8","author":"Ahmad","year":"2020","journal-title":"IEEE Access"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"835","DOI":"10.1007\/s11277-023-10456-7","article-title":"A new S-box generator algorithm based on 3D chaotic maps and whale optimization algorithm","volume":"131","year":"2023","journal-title":"Wirel. Pers. Commun."},{"key":"ref_31","first-page":"38949","article-title":"A new algorithm to generate aes-like substitution boxes based on sine cosine optimization algorithm","volume":"83","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref_32","first-page":"751","article-title":"A new S-box structure named affine-power-affine","volume":"3","author":"Cui","year":"2007","journal-title":"Int. J. Innov. Comput. Inf. Control"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Tran, M.T., Bui, D.K., and Duong, A.D. (2008, January 13\u201317). Gray S-box for advanced encryption standard. Proceedings of the International Conference on Computational Intelligence and Security, Suzhou, China.","DOI":"10.1109\/CIS.2008.205"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"20585","DOI":"10.1007\/s11042-022-12268-6","article-title":"A novel color image encryption scheme based on a new dynamic compound chaotic map and S-box","volume":"81","author":"Ali","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1007\/s00521-023-09095-7","article-title":"A novel algorithm based on DNA coding for substitution box generation problem","volume":"36","year":"2024","journal-title":"Neural Comput. Appl."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"98460","DOI":"10.1109\/ACCESS.2021.3095618","article-title":"Efficient dynamic S-box generation using linear trigonometric transformation for security applications","volume":"9","author":"Zahid","year":"2021","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"41213","DOI":"10.1007\/s11042-023-17046-6","article-title":"An S-Box construction from exponentiation in finite fields and its application in RGB color image encryption","volume":"83","author":"Dougherty","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"12329","DOI":"10.1007\/s11042-019-08478-0","article-title":"A novel method of dynamic S-box design based on combined chaotic map and fitness function","volume":"79","author":"Zhu","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_39","first-page":"181","article-title":"S-Box design method based on improved one-dimensional discrete chaotic map","volume":"2","author":"Lambic","year":"2018","journal-title":"J. Inf. Telecommun."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"2407","DOI":"10.1007\/s11071-016-3199-x","article-title":"A novel method of S-box design based on discrete chaotic map","volume":"87","author":"Lambic","year":"2017","journal-title":"Nonlinear Dyn."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"7333","DOI":"10.1007\/s11042-020-10048-8","article-title":"A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm","volume":"80","author":"Alhadawi","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.chaos.2013.11.001","article-title":"A novel method of S-box design based on chaotic map and composition method","volume":"58","author":"Lambic","year":"2014","journal-title":"Chaos Solitons Fractals"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"160433","DOI":"10.1109\/ACCESS.2020.3020746","article-title":"Framework for efficient medical image encryption using dynamic S-boxes and chaotic maps","volume":"8","author":"Ibrahim","year":"2020","journal-title":"IEEE Access"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"86144","DOI":"10.1109\/ACCESS.2021.3069965","article-title":"S-Box design based on discrete chaotic map and improved artificial bee colony algorithm","volume":"9","author":"Long","year":"2021","journal-title":"IEEE Access"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"7461","DOI":"10.1007\/s00500-021-06459-w","article-title":"A new color image encryption technique using DNA computing and chaos-based substitution box","volume":"26","author":"Masood","year":"2022","journal-title":"Soft Comput."},{"key":"ref_46","first-page":"3011","article-title":"Dynamic S-Box Generation Using Novel Chaotic Map with Nonlinearity Tweaking","volume":"75","author":"Zahid","year":"2023","journal-title":"Comput. Mater. Contin. CMC"},{"key":"ref_47","unstructured":"Webster, A.F., and Tavares, S.E. (, January 18\u2013August). On the design of S-boxes. Proceedings of the CRYPTO\u201985, Santa Barbara, CA, USA."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Liu, J., Tong, X., Zhang, M., and Wang, Z. (2020, January 24\u201326). The design of S-box based on combined chaotic map. Proceedings of the AEMCSE, Shenzhen, China.","DOI":"10.1109\/AEMCSE50948.2020.00082"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"1059","DOI":"10.1007\/s11071-016-3295-y","article-title":"A novel method for designing S-box based on chaotic map and teaching\u2013learning-based optimization","volume":"88","author":"Farah","year":"2017","journal-title":"Nonlinear Dyn."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Jiang, Z., and Ding, Q. (2021). Construction of an S-box based on chaotic and bent functions. Symmetry, 13.","DOI":"10.3390\/sym13040671"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"699","DOI":"10.1007\/s11071-020-05503-y","article-title":"A new discrete-space chaotic map based on the multiplication of integer numbers and its application in S-box design","volume":"100","author":"Lambic","year":"2020","journal-title":"Nonlinear Dyn."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1140\/epjp\/s13360-020-00187-0","article-title":"A new algorithm for the construction of substitution box by using chaotic map","volume":"135","author":"Shafique","year":"2020","journal-title":"Eur. Phys. J. Plus"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"282","DOI":"10.5560\/zna.2012-0022","article-title":"Generalized majority logic criterion to analyze the statistical strength of S-boxes","volume":"65","author":"Hussain","year":"2012","journal-title":"Z. Naturforschung A"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","article-title":"Image encryption using chaotic logistic map","volume":"24","author":"Pareek","year":"2006","journal-title":"Image Vis. Comput."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Liu, H., Kadir, A., and Xu, C. (2020). Color image encryption with cipher feedback and coupling chaotic map. Int. J. Bifurc. Chaos, 30.","DOI":"10.1142\/S0218127420501734"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"080701","DOI":"10.1088\/1674-1056\/27\/8\/080701","article-title":"Efficient image encryption scheme with synchronous substitution and diffusion based on double S-boxes","volume":"27","author":"Zhang","year":"2018","journal-title":"Chin. Phys. B"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11042-021-11635-z","article-title":"A group theoretic construction of highly nonlinear substitution box and its applications in image encryption","volume":"81","author":"Razaq","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"20191","DOI":"10.1007\/s11042-021-10587-8","article-title":"A novel finite rings based algebraic scheme of evolving secure S-boxes for images encryption","volume":"80","author":"Razaq","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/j.matcom.2020.06.007","article-title":"Advance image encryption technique utilizing compression, dynamical system and S-boxes","volume":"178","author":"Naseer","year":"2020","journal-title":"Math. Comput. Simul."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"1839","DOI":"10.1007\/s11071-015-2281-0","article-title":"Chaos-based diffusion for highly autocor related data in encryption algorithms","volume":"82","author":"Ahmad","year":"2015","journal-title":"Nonlinear Dyn."},{"key":"ref_61","first-page":"301","article-title":"Remarks on Shannon\u2019s secrecy systems","volume":"11","author":"Ahlswede","year":"1982","journal-title":"Probl. Contr. Inform. Theory"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"21081","DOI":"10.1038\/s41598-023-47607-6","article-title":"A study of text-theoretical approach to S-box construction with image encryption applications","volume":"131","author":"Mahboob","year":"2023","journal-title":"Sci. Rep."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1016\/j.cjph.2019.05.038","article-title":"Construction of new substitution boxes using linear fractional transformation and enhanced chaos","volume":"60","author":"Jamal","year":"2019","journal-title":"Chin. J. Phys."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"2959","DOI":"10.1109\/26.477498","article-title":"Image quality measures and their performance","volume":"43","author":"Eskicioglu","year":"1995","journal-title":"IEEE Trans. Commun."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1007\/s11071-012-0675-9","article-title":"An efcient method for the construction of block cipher with multi-chaotic systems","volume":"71","author":"Khan","year":"2013","journal-title":"Nonlinear Dyn."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1049\/el:20080522","article-title":"Scope of validity of PSNR in image\/video quality assessment","volume":"44","author":"Ghanbari","year":"2008","journal-title":"Electron. Lett."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.asoc.2015.08.008","article-title":"A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps","volume":"37","author":"Wu","year":"2015","journal-title":"Appl. Soft Comput."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"3015","DOI":"10.1007\/s11277-020-07832-y","article-title":"A novel scheme of substitution-box design based on modified Pascal\u2019s triangle and elliptic curve","volume":"116","author":"Siddiqui","year":"2020","journal-title":"Wirel. Pers. Commun."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"150326","DOI":"10.1109\/ACCESS.2020.3016401","article-title":"A novel modular approach based substitution-box design for image encryption","volume":"8","author":"Zahid","year":"2020","journal-title":"IEEE Access"},{"key":"ref_70","unstructured":"Bhosale, A.G., and Bidkar, P.S. (2014). A Modified Image Template for FELICS Algorithm for Lossless Image Compression. Int. J. Curr. Eng. Technol., 4."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","article-title":"Differential cryptanalysis of DES-like cryptosystems","volume":"4","author":"Biham","year":"1991","journal-title":"J. Cryptol."},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Liang, H., Zhang, G., Hou, W., Huang, P., Liu, B., and Li, S. (2021). A novel asymmetric hyperchaotic image encryption scheme based on elliptic curve cryptography. Appl. Sci., 11.","DOI":"10.3390\/app11125691"},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"135880","DOI":"10.1109\/ACCESS.2023.3337443","article-title":"A robust S box design using cyclic groups and image encryption","volume":"11","author":"Ali","year":"2023","journal-title":"IEEE Access"},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Li, Z., Peng, C., Tan, W., and Li, L. (2020). A novel chaos-based color image encryption scheme using bit-level permutation. Symmetry, 12.","DOI":"10.3390\/sym12091497"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/16\/8\/954\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:23:27Z","timestamp":1760109807000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/16\/8\/954"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,25]]},"references-count":74,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2024,8]]}},"alternative-id":["sym16080954"],"URL":"https:\/\/doi.org\/10.3390\/sym16080954","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,25]]}}}