{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T20:42:53Z","timestamp":1754599373512,"version":"3.41.0"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000110"},{"type":"electronic","value":"9783030000127"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00012-7_42","type":"book-chapter","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T18:15:30Z","timestamp":1536776130000},"page":"458-467","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A Survey on the New Development of Medical Image Security Algorithms"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9855-8234","authenticated-orcid":false,"given":"Yun","family":"Tan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7549-7731","authenticated-orcid":false,"given":"Jiaohua","family":"Qin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8779-0169","authenticated-orcid":false,"given":"Ling","family":"Tan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2202-0515","authenticated-orcid":false,"given":"Hao","family":"Tang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2778-7531","authenticated-orcid":false,"given":"Xuyu","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"key":"42_CR1","unstructured":"United States Department of Health and Human Services. HIPPA: medical privacy national standards to protect the privacy of personal health information. http:\/\/www.hhs.gov\/ocr\/privacy\/"},{"key":"42_CR2","unstructured":"Kromtech Security Discovers Health Data Breach of 150K Patients. http:\/\/healthitsecurity.com\/news\/kromtech-security-discovers-health-data-breach-of-150k-patients\/"},{"key":"42_CR3","unstructured":"Hacker Might Have Stolen the Healthcare Data for Half of Norway\u2019s Population. http:\/\/www.bleepingcomputer.com\/news\/security\/hacker-might-have-stolen-the-healthcare-data-for-half-of-norways-population\/"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Kavitha, P.K., Saraswathi, P.V.: A survey on medical image encryption. In: 1st International Conference on Applied Soft Computing Techniques, International Journal of Scientific Research in Science and Technology, vol. 3, pp. 1\u20138. India (2017)","DOI":"10.1109\/ICCIC.2018.8782432"},{"issue":"3","key":"42_CR5","first-page":"41","volume":"30","author":"A Umamageswari","year":"2011","unstructured":"Umamageswari, A., Ferni Ukrit, M., Suresh, G.R.: A survey on security in medical image communication. Int. J. Comput. Appl. 30(3), 41\u201345 (2011)","journal-title":"Int. J. Comput. Appl."},{"issue":"6","key":"42_CR6","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1007\/s10278-014-9700-5","volume":"27","author":"SM Mousavi","year":"2014","unstructured":"Mousavi, S.M., Naghsh, A., Abu-Bakar, S.A.: Watermarking techniques used in medical images: a survey. J. Digit. Imaging 27(6), 714\u2013729 (2014)","journal-title":"J. Digit. Imaging"},{"issue":"3","key":"42_CR7","first-page":"131","volume":"4","author":"M Nazeer","year":"2013","unstructured":"Nazeer, M., Kim, D.G., Nargis, B., Malik, Y.M.: A Fresnelet-based encryption of medical images using Arnold transform. Int. J. Adv. Comput. Sci. Appl. 4(3), 131\u2013140 (2013)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"3","key":"42_CR8","first-page":"20","volume":"4","author":"YL Xing","year":"2015","unstructured":"Xing, Y.L., Han, B.R., Shi, F.U.: A medical image scrambling method based on Arnold and Knights tour algorithm. J. Suzhou Vocat. Univ. 4(3), 20\u201325 (2015)","journal-title":"J. Suzhou Vocat. Univ."},{"issue":"5","key":"42_CR9","first-page":"76","volume":"19","author":"O Wahballa","year":"2017","unstructured":"Wahballa, O., Wahaballa, A., Li, F., Idris, I.I., Xu, C.: Medical image encryption scheme based on Arnold transformation and ID-AK protocol. Int. J. Netw. Secur. 19(5), 76\u201378 (2017)","journal-title":"Int. J. Netw. Secur."},{"issue":"5","key":"42_CR10","first-page":"893","volume":"8","author":"M Sui","year":"2013","unstructured":"Sui, M., Li, J., Dong, C., Bai, Y.: The encrypted watermarking for medical image based on Arnold scrambling and DWT. J. Converg. Inf. Technol. 8(5), 893\u2013902 (2013)","journal-title":"J. Converg. Inf. Technol."},{"key":"42_CR11","doi-asserted-by":"publisher","unstructured":"Venkateswarlu, L., Reddy, B.E., Rao, N.V.: Arnold-wavelet based robust watermarking technique for medical images. In: International Conference on ICT in Business Industry & Government, pp. 1\u20135. IEEE, Indore (2016). https:\/\/doi.org\/10.1109\/ICTBIG.2016.7892689","DOI":"10.1109\/ICTBIG.2016.7892689"},{"key":"42_CR12","unstructured":"Liu, Y., Li, J.: The medical image watermarking algorithm using DWT-DCT and logistic. In: International Conference on Computing & Convergence Technology, vol. 3(2), pp. 599\u2013603. IEEE, Seoul (2012)"},{"issue":"3","key":"42_CR13","first-page":"458","volume":"6","author":"J Lu","year":"2015","unstructured":"Lu, J., Wang, M., Dai, J., Huang, Q., Li, L., Chang: C.-C.: Multiple watermark scheme based on DWT-DCT quantization for medical images. J. Inf. Hiding Multimed. Signal Process. 6(3), 458\u2013472 (2015)","journal-title":"J. Inf. Hiding Multimed. Signal Process."},{"issue":"6","key":"42_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-016-3514-z","volume":"76","author":"AK Singh","year":"2017","unstructured":"Singh, A.K.: Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed. Tools Appl. 76(6), 1\u201318 (2017)","journal-title":"Multimed. Tools Appl."},{"issue":"8","key":"42_CR15","doi-asserted-by":"publisher","first-page":"1000","DOI":"10.1016\/j.compbiomed.2013.05.005","volume":"43","author":"C Fu","year":"2013","unstructured":"Fu, C., Meng, W.H., Zhan, Y.F., Zhu, Z.L., Lau, F.C.: An efficient and secure medical image protection scheme based on chaotic maps. Comput. Biol. Med. 43(8), 1000\u20131010 (2013)","journal-title":"Comput. Biol. Med."},{"issue":"8","key":"42_CR16","first-page":"1","volume":"1","author":"S Zhang","year":"2014","unstructured":"Zhang, S., Gao, T., Gao, L.: A novel encryption frame for medical image with watermark based on hyperchaotic system. Math. Probl. Eng. 1(8), 1\u201311 (2014)","journal-title":"Math. Probl. Eng."},{"issue":"1","key":"42_CR17","first-page":"53","volume":"5","author":"X Chai","year":"2016","unstructured":"Chai, X., Cheng, Y.: A novel medical image encryption algorithm based on four-dimensional memristive hyper-chaotic system. Comput. Era 5(1), 53\u201358 (2016)","journal-title":"Comput. Era"},{"issue":"3","key":"42_CR18","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.cnsns.2014.12.005","volume":"24","author":"A Kanso","year":"2015","unstructured":"Kanso, A., Ghebleh, M.: An efficient and robust image encryption scheme for medical applications. Commun. Nonlinear Sci. Numer. Simul. 24(3), 98\u2013116 (2015)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"20","key":"42_CR19","first-page":"9001","volume":"28","author":"X Chen","year":"2017","unstructured":"Chen, X., Hu, C.J.: Medical image encryption based on multiple chaotic mapping and wavelet transform. Biomed. Res. 28(20), 9001\u20139008 (2017)","journal-title":"Biomed. Res."},{"issue":"4","key":"42_CR20","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1142\/S0218001416570019","volume":"30","author":"Y Dai","year":"2016","unstructured":"Dai, Y., Wang, H., Wang, Y.: Chaotic medical image encryption algorithm based on bit-plane decomposition. Int. J. Pattern Recognit. Artif. Intell. 30(4), 643\u2013660 (2016)","journal-title":"Int. J. Pattern Recognit. Artif. Intell."},{"issue":"8","key":"42_CR21","first-page":"62","volume":"24","author":"C Xiao","year":"2017","unstructured":"Xiao, C., Hu, C.J.: Adaptive medical image encryption algorithm based on multiple chaotic mapping. Saudi J. Biol. Sci. 24(8), 62\u201370 (2017)","journal-title":"Saudi J. Biol. Sci."},{"issue":"11","key":"42_CR22","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"issue":"2","key":"42_CR23","first-page":"19","volume":"10","author":"M Sangeetha","year":"2015","unstructured":"Sangeetha, M., Arumugam, C., Senthilkumar, K.M.: Encryption for sharing of secret medical images. Res. J. Biotechnol. 10(2), 19\u201321 (2015)","journal-title":"Res. J. Biotechnol."},{"key":"42_CR24","doi-asserted-by":"publisher","unstructured":"Ahmad, T., Studiawan, H., Ahmad, H.S., Ijtihadie, R.M., Wibisono, W.: Shared secret-based steganography for protecting medical data. In: International Conference on Computer, pp. 1\u20135. IEEE, Bandung (2014). https:\/\/doi.org\/10.1109\/IC3INA.2014.7042606","DOI":"10.1109\/IC3INA.2014.7042606"},{"key":"42_CR25","doi-asserted-by":"publisher","unstructured":"Marwan, M., Kartit, A., Ouahmane, H.: Secure cloud-based medical image storage using secret share scheme. In: International Conference on Multimedia Computing & Systems, pp. 1\u20135. IEEE, Marrakech (2016). https:\/\/doi.org\/10.1109\/ICMCS.2016.7905649","DOI":"10.1109\/ICMCS.2016.7905649"},{"issue":"11","key":"42_CR26","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1126\/science.7973651","volume":"266","author":"LM Adleman","year":"1994","unstructured":"Adleman, L.M.: Molecular computation of solutions to combinatorial problems. Science 266(11), 1021\u20131024 (1994)","journal-title":"Science"},{"key":"42_CR27","doi-asserted-by":"publisher","unstructured":"Cui, G., Qin, L., Wang, Y., Zhang, X.: Information security technology based on DNA computing. In: IEEE International Workshop on Anti-counterfeiting, pp. 1\u20133. IEEE, Xiamen (2007). https:\/\/doi.org\/10.1109\/IWASID.2007.373746","DOI":"10.1109\/IWASID.2007.373746"},{"issue":"48","key":"42_CR28","first-page":"2381","volume":"9","author":"CV Kumar","year":"2015","unstructured":"Kumar, C.V., Natarajan, V., Poonguzhali, P.: Secured patient information transmission using reversible watermarking and DNA encryp-tion for medical images. Appl. Math. Sci. 9(48), 2381\u20132391 (2015)","journal-title":"Appl. Math. Sci."},{"issue":"8","key":"42_CR29","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1109\/TNB.2017.2780881","volume":"16","author":"D Ravichandran","year":"2017","unstructured":"Ravichandran, D., Praveenkumar, P., Rayappan, J., Amirtharajan, R.: DNA Chaos blend to secure medical privacy. IEEE Trans. Nanobiosci. 16(8), 850\u2013858 (2017)","journal-title":"IEEE Trans. Nanobiosci."},{"key":"42_CR30","doi-asserted-by":"publisher","unstructured":"Akkasaligar, P.T., Biradar, S.: Secure medical image encryption based on intensity level using Chaos theory and DNA cryptography. In: IEEE International Conference on Computational Intelligence & Computing Research, pp. 1\u201310. IEEE, Chennai (2016). https:\/\/doi.org\/10.1109\/ICCIC.2016.7919681","DOI":"10.1109\/ICCIC.2016.7919681"},{"issue":"8","key":"42_CR31","first-page":"1","volume":"2","author":"K Anusudha","year":"2016","unstructured":"Anusudha, K., Venkateswaran, N., Valarmathi, J.: Secured medical image watermarking with DNA codec. Multimed. Tools Appl. 2(8), 1\u201322 (2016)","journal-title":"Multimed. Tools Appl."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00012-7_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T03:45:58Z","timestamp":1751859958000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00012-7_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000110","9783030000127"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00012-7_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}