{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T01:54:54Z","timestamp":1771466094808,"version":"3.50.1"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T00:00:00Z","timestamp":1652227200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T00:00:00Z","timestamp":1652227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s00521-022-06994-z","type":"journal-article","created":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T14:03:22Z","timestamp":1652277802000},"page":"10629-10653","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Proposed neural SAE-based medical image cryptography framework using deep extracted features for smart IoT healthcare applications"],"prefix":"10.1007","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7509-2120","authenticated-orcid":false,"given":"Walid","family":"El-Shafai","sequence":"first","affiliation":[]},{"given":"Fatma","family":"Khallaf","sequence":"additional","affiliation":[]},{"given":"El-Sayed M.","family":"El-Rabaie","sequence":"additional","affiliation":[]},{"given":"Fathi E.","family":"Abd El-Samie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,11]]},"reference":[{"issue":"23","key":"6994_CR1","doi-asserted-by":"publisher","first-page":"30911","DOI":"10.1007\/s11042-018-6036-z","volume":"77","author":"W El-Shafai","year":"2018","unstructured":"El-Shafai W, El-Rabaie ESM, El-Halawany M, Abd El-Samie FE (2018) Efficient multi-level security for robust 3D color-plus-depth HEVC. Multimed Tools Appl 77(23):30911\u201330937","journal-title":"Multimed Tools Appl"},{"key":"6994_CR2","doi-asserted-by":"crossref","unstructured":"Raghuwanshi P, Nair JS, Jain S (2016) A secure transmission of 2D image using randomized chaotic mapping. In: 2016 Symposium on Colossal Data Analysis and Networking (CDAN), pp 1\u20135. IEEE","DOI":"10.1109\/CDAN.2016.7570870"},{"key":"6994_CR3","doi-asserted-by":"crossref","unstructured":"El-Shafai W (2015) Joint adaptive pre-processing resilience and post-processing concealment schemes for 3D video transmission. 3D Res, 6(1):10","DOI":"10.1007\/s13319-015-0042-y"},{"key":"6994_CR4","doi-asserted-by":"publisher","first-page":"77145","DOI":"10.1109\/ACCESS.2018.2874026","volume":"6","author":"K Shankar","year":"2018","unstructured":"Shankar K, Elhoseny M, Chelvi ED, Lakshmanaprabu SK, Wu W (2018) An efficient optimal key based chaos function for medical image security. IEEE Access 6:77145\u201377154","journal-title":"IEEE Access"},{"issue":"19","key":"6994_CR5","doi-asserted-by":"publisher","first-page":"25709","DOI":"10.1007\/s11042-018-5814-y","volume":"77","author":"KA Al-Afandy","year":"2018","unstructured":"Al-Afandy KA, El-Shafai W, El-Rabaie ESM, Abd El-Samie FE, Faragallah OS, El-Mhalaway A, Shehata AM, El-Banb GM, El-Halawany MM (2018) Robust hybrid watermarking techniques for different color imaging systems. Multimed Tools Appl 77(19):25709\u201325759","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"6994_CR6","doi-asserted-by":"publisher","first-page":"13145","DOI":"10.1007\/s11042-017-4936-y","volume":"77","author":"W El-Shafai","year":"2018","unstructured":"El-Shafai W, El-Rabaie S, El-Halawany MM, Abd El-Samie FE (2018) Encoder-independent decoder-dependent depth-assisted error concealment algorithm for wireless 3D video communication. Multimed Tools Appl 77(11):13145\u201313172","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"6994_CR7","first-page":"63","volume":"15","author":"R Gupta","year":"2018","unstructured":"Gupta R, Pachauri R, Singh AK (2018) An effective approach of secured medical image transmission using encryption method. Mol Cell Biomech 15(2):63\u201383","journal-title":"Mol Cell Biomech"},{"issue":"19","key":"6994_CR8","doi-asserted-by":"publisher","first-page":"27211","DOI":"10.1007\/s11042-019-7448-0","volume":"78","author":"W El-Shafai","year":"2019","unstructured":"El-Shafai W, El-Rabaie S, El-Halawany MM, Abd El-Samie FE (2019) Security of 3D-HEVC transmission based on fusion and watermarking techniques. Multimed Tools Appl 78(19):27211\u201327244","journal-title":"Multimed Tools Appl"},{"key":"6994_CR9","doi-asserted-by":"crossref","unstructured":"Benssalah M, Rhaskali Y, Azzaz MS (2018) Medical images encryption based on elliptic curve cryptography and chaos theory. In: 2018 International conference on smart communications in network technologies (SaCoNeT), pp 222\u2013226. IEEE","DOI":"10.1109\/SaCoNeT.2018.8585512"},{"key":"6994_CR10","doi-asserted-by":"crossref","unstructured":"Abdel-Nabi H, Al-Haj A (2017) Medical imaging security using partial encryption and histogram shifting watermarking. In: 2017 8th International Conference on Information Technology (ICIT), pp 802\u2013807. IEEE","DOI":"10.1109\/ICITECH.2017.8079950"},{"key":"6994_CR11","doi-asserted-by":"crossref","unstructured":"Abdmouleh MK, Khalfallah A, Bouhlel MS (2017) A novel selective encryption DWT-based algorithm for medical images. In: 2017 14th international conference on computer graphics, imaging and visualization, pp. 79\u201384) IEEE","DOI":"10.1109\/CGiV.2017.10"},{"key":"6994_CR12","doi-asserted-by":"crossref","unstructured":"Bharghavi G, Kumar PS, Geetha K, Devi NS (2018) An implementation of SLICE algorithm to enforce security for medical images using DNA approach. In: 2018 International conference on communication and signal processing (ICCSP), pp 0984\u20130988. IEEE","DOI":"10.1109\/ICCSP.2018.8524413"},{"key":"6994_CR13","doi-asserted-by":"crossref","unstructured":"Dagadu JC, Li JP, Shah F, Mustafa N, Kumar K (2016) DWT based encryption technique for medical images. In: 2016 13th international computer conference on wavelet active media technology and information processing (ICCWAMTIP), pp 252\u2013255. IEEE","DOI":"10.1109\/ICCWAMTIP.2016.8079849"},{"key":"6994_CR14","doi-asserted-by":"crossref","unstructured":"Dagadu JC, Li J, Shah F (2017) An efficient di-chaotic diffusion based medical image cryptosystem. In 2017 14th international computer conference on wavelet active media technology and information processing (ICCWAMTIP), pp 206\u2013210. IEEE","DOI":"10.1109\/ICCWAMTIP.2017.8301480"},{"key":"6994_CR15","doi-asserted-by":"crossref","unstructured":"El\u2010Shafai W, El\u2010Rabaie S, El\u2010Halawany MM, Abd El\u2010Samie FE (2018) Efficient hybrid watermarking schemes for robust and secure 3D\u2010MVC communication. Int J Commun Syst, 31(4): e3478","DOI":"10.1002\/dac.3478"},{"key":"6994_CR16","doi-asserted-by":"crossref","unstructured":"Parameshachari BD, Panduranga HT, Naveenkumar SK (2017) Partial encryption of medical images by dual DNA addition using DNA encoding. In: 2017 international conference on recent innovations in signal processing and embedded systems (RISE), pp 310\u2013314. IEEE","DOI":"10.1109\/RISE.2017.8378172"},{"key":"6994_CR17","doi-asserted-by":"crossref","unstructured":"El-Shafai W (2015) Pixel-level matching based multi-hypothesis error concealment modes for wireless 3D H. 264\/MVC communication. 3D Res, 6(3): 31.","DOI":"10.1007\/s13319-015-0064-5"},{"key":"6994_CR18","doi-asserted-by":"crossref","unstructured":"Puech W(2008) Image encryption and compression for medical image security. In 2008 first workshops on image processing theory, tools and applications, pp 1\u20132. IEEE","DOI":"10.1109\/IPTA.2008.4743800"},{"issue":"1","key":"6994_CR19","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s11277-017-4503-x","volume":"97","author":"W El-Shafai","year":"2017","unstructured":"El-Shafai W, El-Rabaie S, El-Halawany M, Abd El-Samie FE (2017) Enhancement of wireless 3d video communication using color-plus-depth error restoration algorithms and Bayesian Kalman filtering. Wireless Pers Commun 97(1):245\u2013268","journal-title":"Wireless Pers Commun"},{"key":"6994_CR20","doi-asserted-by":"crossref","unstructured":"Saraswathi PV, Venkatesulu M (2017) A novel stream cipher using pesudo random binary sequence generator for medical image encryption. In: 2017 international conference on trends in electronics and informatics (ICEI), pp. 425\u2013429. IEEE","DOI":"10.1109\/ICOEI.2017.8300961"},{"key":"6994_CR21","doi-asserted-by":"crossref","unstructured":"El-Shafai W, Khallaf F, El-Rabaie ESM, Abd El-Samie FE (2021) Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications. J Amb Intell Human Comput, 1\u201329","DOI":"10.1007\/s12652-020-02597-5"},{"issue":"29","key":"6994_CR22","doi-asserted-by":"publisher","first-page":"20665","DOI":"10.1007\/s11042-019-08322-5","volume":"79","author":"IF Elashry","year":"2020","unstructured":"Elashry IF, El-Shafai W, Hasan ES, El-Rabaie S, Abbas AM, Abd El-Samie FE, Fathi E, El-sayed HS, Faragallah OS (2020) Efficient chaotic-based image cryptosystem with different modes of operation. Multimed Tools Appl 79(29):20665\u201320687","journal-title":"Multimed Tools Appl"},{"key":"6994_CR23","doi-asserted-by":"publisher","first-page":"106333","DOI":"10.1016\/j.optlaseng.2020.106333","volume":"137","author":"OS Faragallah","year":"2021","unstructured":"Faragallah OS, El-sayed HS, Afifi A, El-Shafai W (2021) Efficient and secure opto-cryptosystem for color images using 2D logistic-based fractional Fourier transform. Opt Lasers Eng 137:106333","journal-title":"Opt Lasers Eng"},{"issue":"3","key":"6994_CR24","doi-asserted-by":"publisher","first-page":"2495","DOI":"10.1007\/s11042-019-08190-z","volume":"79","author":"OS Faragallah","year":"2020","unstructured":"Faragallah OS, AlZain MA, El-Sayed HS, Al-Amri JF, El-Shafai W, Afifi A, Naeem EA, Soh B (2020) Secure color image cryptosystem based on chaotic logistic in the FrFT domain. Multimed Tools Appl 79(3):2495\u20132519","journal-title":"Multimed Tools Appl"},{"key":"6994_CR25","doi-asserted-by":"publisher","first-page":"103200","DOI":"10.1109\/ACCESS.2020.2994583","volume":"8","author":"OS Faragallah","year":"2020","unstructured":"Faragallah OS, Afifi A, El-Shafai W, El-Sayed HS, Alzain MA, Al-Amri JF, Abd El-Samie FE (2020) Efficiently encrypting color images with few details based on RC6 and different operation modes for cybersecurity applications. IEEE Access 8:103200\u2013103218","journal-title":"IEEE Access"},{"key":"6994_CR26","unstructured":"Ibrahim S, Egila MG, Shawky H, Elsaid MK, El-Shafai W, Abd El-Samie FE (2020) Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption. Multimed Tools Appl, 1\u201326"},{"key":"6994_CR27","doi-asserted-by":"publisher","first-page":"167069","DOI":"10.1109\/ACCESS.2020.3019840","volume":"8","author":"OS Faragallah","year":"2020","unstructured":"Faragallah OS, Afifi A, El-Sayed HS, Alzain MA, Al-Amri JF, Abd El-Samie FE, El-Shafai W (2020) Efficient HEVC integrity verification scheme for multimedia cybersecurity applications. IEEE Access 8:167069\u2013167089","journal-title":"IEEE Access"},{"key":"6994_CR28","doi-asserted-by":"publisher","first-page":"128548","DOI":"10.1109\/ACCESS.2020.3008644","volume":"8","author":"A Alarifi","year":"2020","unstructured":"Alarifi A, Sankar S, Altameem T, Jithin KC, Amoon M, El-Shafai W (2020) A novel hybrid cryptosystem for secure streaming of high efficiency H. 265 compressed videos in IoT multimedia applications. IEEE Access 8:128548\u2013128573","journal-title":"IEEE Access"},{"key":"6994_CR29","doi-asserted-by":"publisher","first-page":"37855","DOI":"10.1109\/ACCESS.2021.3063237","volume":"9","author":"ST Kamal","year":"2021","unstructured":"Kamal ST, Hosny KM, Elgindy TM, Darwish MM, Fouda MM (2021) A new image encryption algorithm for grey and color medical images. IEEE Access 9:37855\u201337865","journal-title":"IEEE Access"},{"issue":"8","key":"6994_CR30","doi-asserted-by":"publisher","first-page":"12155","DOI":"10.1007\/s11042-020-10373-y","volume":"80","author":"YJ Sun","year":"2021","unstructured":"Sun YJ, Zhang H, Wang XY, Wang MX (2021) Bit-level color image encryption algorithm based on coarse-grained logistic map and fractional chaos. Multimed Tools Appl 80(8):12155\u201312173","journal-title":"Multimed Tools Appl"},{"key":"6994_CR31","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/LSP.2021.3050052","volume":"28","author":"L Gao","year":"2021","unstructured":"Gao L, Qi L, Guan L (2021) The property of frequency shift in 2D-frft domain with application to image encryption. IEEE Signal Process Lett 28:185\u2013189","journal-title":"IEEE Signal Process Lett"},{"key":"6994_CR32","doi-asserted-by":"crossref","unstructured":"Man Z, Li J, Di X (2021) Medical image encryption scheme based on self\u2010verification matrix. IET Image Process","DOI":"10.1049\/ipr2.12263"},{"key":"6994_CR33","doi-asserted-by":"publisher","first-page":"25911","DOI":"10.1109\/ACCESS.2021.3056037","volume":"9","author":"B Vaseghi","year":"2021","unstructured":"Vaseghi B, Mobayen S, Hashemi SS, Fekih A (2021) Fast reaching finite time synchronization approach for chaotic systems with application in medical image encryption. IEEE Access 9:25911\u201325925","journal-title":"IEEE Access"},{"key":"6994_CR34","doi-asserted-by":"publisher","first-page":"47731","DOI":"10.1109\/ACCESS.2021.3061710","volume":"9","author":"MK Hasan","year":"2021","unstructured":"Hasan MK, Islam S, Sulaiman R, Khan S, Hashim AHA, Habib S, Islam M, Alyahya S, Ahmed MM, Kamil S, Hassan MA (2021) Lightweight encryption technique to enhance medical image security on internet of medical things applications. IEEE Access 9:47731\u201347742","journal-title":"IEEE Access"},{"key":"6994_CR35","doi-asserted-by":"publisher","first-page":"59108","DOI":"10.1109\/ACCESS.2021.3071535","volume":"9","author":"A Shafique","year":"2021","unstructured":"Shafique A, Ahmed J, Rehman MU, Hazzazi MM (2021) Noise-resistant image encryption scheme for medical images in the chaos and wavelet domain. IEEE Access 9:59108\u201359130","journal-title":"IEEE Access"},{"key":"6994_CR36","doi-asserted-by":"crossref","unstructured":"Lakshmi C, Thenmozhi K, Rayappan JBB, Amirtharajan R (2019). Hopfield attractor-trusted neural network: an attack-resistant image encryption. Neural Comput Appl, 1\u201313","DOI":"10.1007\/s00521-019-04637-4"},{"issue":"7","key":"6994_CR37","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1049\/iet-cvi.2018.5195","volume":"12","author":"F Rundo","year":"2018","unstructured":"Rundo F, Conoci S, Banna GL, Ortis A, Stanco F, Battiato S (2018) Evaluation of Levenberg\u2013Marquardt neural networks and stacked autoencoders clustering for skin lesion analysis, screening and follow-up. IET Comput Vision 12(7):957\u2013962","journal-title":"IET Comput Vision"},{"key":"6994_CR38","doi-asserted-by":"crossref","unstructured":"Thanikaiselvan V, Mantripragada N, Singh AP, Bhasin N (2019) Encrypting multiple images using stacked autoencoders. In 2019 international conference on vision towards emerging trends in communication and networking (ViTECoN), pp 1\u20136. IEEE","DOI":"10.1109\/ViTECoN.2019.8899495"},{"issue":"9","key":"6994_CR39","doi-asserted-by":"publisher","first-page":"5617","DOI":"10.1007\/s11042-019-08023-z","volume":"79","author":"KM Abdelwahab","year":"2020","unstructured":"Abdelwahab KM, Abd El-atty SM, El-Shafai W, El-Rabaie S, Abd El-Samie FE (2020) Efficient SVD-based audio watermarking technique in FRT domain. Multimed Tools Appl 79(9):5617\u20135648","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"6994_CR40","doi-asserted-by":"publisher","first-page":"11655","DOI":"10.1007\/s11042-020-10202-2","volume":"80","author":"X Wang","year":"2021","unstructured":"Wang X, Lin S, Li Y (2021) Bit-level image encryption algorithm based on BP neural network and gray code. Multimed Tools Appl 80(8):11655\u201311670","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"6994_CR41","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1080\/09500340.2021.1900440","volume":"68","author":"J Wu","year":"2021","unstructured":"Wu J, Xia W, Zhu G, Liu H, Ma L, Xiong J (2021) Image encryption based on adversarial neural cryptography and SHA controlled chaos. J Mod Opt 68(8):409\u2013418","journal-title":"J Mod Opt"},{"key":"6994_CR42","doi-asserted-by":"crossref","unstructured":"Bao Z, Xue R. Jin Y (2021) Image scrambling adversarial autoencoder based on the asymmetric encryption. Multimed Tools Appl, 1\u201337","DOI":"10.1007\/s11042-021-11043-3"},{"issue":"11","key":"6994_CR43","doi-asserted-by":"publisher","first-page":"2474","DOI":"10.1109\/TMI.2018.2836965","volume":"37","author":"J Guo","year":"2018","unstructured":"Guo J, Yang K, Liu H, Yin C, Xiang J, Li H, Ji R, Gao Y (2018) A stacked sparse autoencoder-based detector for automatic identification of neuromagnetic high frequency oscillations in epilepsy. IEEE Trans Med Imaging 37(11):2474\u20132482","journal-title":"IEEE Trans Med Imaging"},{"key":"6994_CR44","doi-asserted-by":"crossref","unstructured":"Srivastava S, Soman S, Rai A, Srivastava PK (2017) Deep learning for health informatics: Recent trends and future directions. In: 2017 international conference on advances in computing, communications and informatics (ICACCI) (pp. 1665\u20131670). IEEE.","DOI":"10.1109\/ICACCI.2017.8126082"},{"issue":"10","key":"6994_CR45","doi-asserted-by":"publisher","first-page":"4550","DOI":"10.1109\/TNNLS.2017.2766168","volume":"29","author":"F Xing","year":"2017","unstructured":"Xing F, Xie Y, Su H, Liu F, Yang L (2017) Deep learning in microscopy image analysis: a survey. IEEE Trans Neural Netw Learn Syst 29(10):4550\u20134568","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"1","key":"6994_CR46","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/s11071-019-04791-3","volume":"96","author":"J Chen","year":"2019","unstructured":"Chen J, Chen L, Zhang LY, Zhu ZL (2019) Medical image cipher using hierarchical diffusion and non-sequential encryption. Nonlinear Dyn 96(1):301\u2013322","journal-title":"Nonlinear Dyn"},{"key":"6994_CR47","doi-asserted-by":"crossref","unstructured":"Saha J, Chowdhury C, Biswas S (2020) Review of machine learning and deep learning based recommender systems for health informatics. In: Deep learning techniques for biomedical and health informatics, pp. 101\u2013126. Springer, Cham","DOI":"10.1007\/978-3-030-33966-1_6"},{"key":"6994_CR48","doi-asserted-by":"crossref","unstructured":"Rajawat M, Tomar DS (2015) A Secure Watermarking and Tampering detection technique on RGB Image using 2 Level dwt. In: 2015 fifth international conference on communication systems and network technologies (pp. 638\u2013642). IEEE","DOI":"10.1109\/CSNT.2015.245"},{"key":"6994_CR49","doi-asserted-by":"crossref","unstructured":"Saif S, Biswas S, Chattopadhyay S (2020) Intelligent, secure big health data management using deep learning and blockchain technology: an overview. In: Deep Learning Techniques for Biomedical and Health Informatics, pp 187\u2013209. Springer, Cham","DOI":"10.1007\/978-3-030-33966-1_10"},{"key":"6994_CR50","doi-asserted-by":"crossref","unstructured":"Jyotiyana M, Kesswani N (2020) Deep learning and the future of biomedical image analysis. In Deep Learning Techniques for Biomedical and Health Informatics, pp 329\u2013345. Springer, Cham","DOI":"10.1007\/978-3-030-33966-1_15"},{"issue":"6","key":"6994_CR51","doi-asserted-by":"publisher","first-page":"1236","DOI":"10.1093\/bib\/bbx044","volume":"19","author":"R Miotto","year":"2018","unstructured":"Miotto R, Wang F, Wang S, Jiang X, Dudley JT (2018) Deep learning for healthcare: review, opportunities and challenges. Brief Bioinform 19(6):1236\u20131246","journal-title":"Brief Bioinform"},{"key":"6994_CR52","doi-asserted-by":"publisher","first-page":"70634","DOI":"10.1109\/ACCESS.2019.2919068","volume":"7","author":"J Zhang","year":"2019","unstructured":"Zhang J, Lin F, Xiong P, Du H, Zhang H, Liu M, Hou Z, Liu X (2019) Automated detection and localization of myocardial infarction with staked sparse autoencoder and treebagger. IEEE Access 7:70634\u201370642","journal-title":"IEEE Access"},{"key":"6994_CR53","doi-asserted-by":"crossref","unstructured":"Kemal ADEM, Kili\u00e7arslan S (2019) Performance analysis of optimization algorithms on stacked autoencoder. In: 2019 3rd international symposium on multidisciplinary studies and innovative technologies (ISMSIT), pp 1\u20134. IEEE","DOI":"10.1109\/ISMSIT.2019.8932880"},{"key":"6994_CR54","doi-asserted-by":"publisher","first-page":"52889","DOI":"10.1109\/ACCESS.2018.2869687","volume":"6","author":"D Pei","year":"2018","unstructured":"Pei D, Burns M, Chandramouli R, Vinjamuri R (2018) Decoding asynchronous reaching in electroencephalography using stacked autoencoders. IEEE Access 6:52889\u201352898","journal-title":"IEEE Access"},{"key":"6994_CR55","doi-asserted-by":"crossref","unstructured":"Costa B, Jain J (2019) Fuzzy deep stack of autoencoders for dealing with data uncertainty. In: 2019 IEEE international conference on fuzzy systems (FUZZ-IEEE), pp. 1\u20136. IEEE","DOI":"10.1109\/FUZZ-IEEE.2019.8859022"},{"key":"6994_CR56","doi-asserted-by":"crossref","unstructured":"Xu B, Ding X, Hou R, Zhu C (2018) A feature extraction method based on stacked denoising autoencoder for massive high dimensional data. In: 2018 14th international conference on natural computation, fuzzy systems and knowledge discovery (ICNC-FSKD), pp 206\u2013210. IEEE","DOI":"10.1109\/FSKD.2018.8687138"},{"issue":"4","key":"6994_CR57","doi-asserted-by":"publisher","first-page":"4045","DOI":"10.1007\/s11042-017-5174-z","volume":"78","author":"W Jia","year":"2019","unstructured":"Jia W, Muhammad K, Wang SH, Zhang YD (2019) Five-category classification of pathological brain images based on deep stacked sparse autoencoder. Multimed Tools Appl 78(4):4045\u20134064","journal-title":"Multimed Tools Appl"},{"key":"6994_CR58","doi-asserted-by":"crossref","unstructured":"Faragallah OS, El-Shafai W, Sallam AI, Elashry I, EL-Rabaie ESM, Afifi A, AlZain MA, Al-Amri JF, El-Samie FEA, El-sayed HS (2021) Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication. J Amb Intell Human Comput, 1\u201325","DOI":"10.1007\/s12652-020-02832-z"},{"issue":"3","key":"6994_CR59","doi-asserted-by":"publisher","first-page":"4789","DOI":"10.1007\/s11042-020-09881-8","volume":"80","author":"NF Soliman","year":"2021","unstructured":"Soliman NF, Khalil MI, Algarni AD, Ismail S, Marzouk R, El-Shafai W (2021) Efficient HEVC steganography approach based on audio compression and encryption in QFFT domain for secure multimedia communication. Multimed Tools Appl 80(3):4789\u20134823","journal-title":"Multimed Tools Appl"},{"key":"6994_CR60","doi-asserted-by":"publisher","first-page":"221246","DOI":"10.1109\/ACCESS.2020.3043689","volume":"8","author":"A Alarifi","year":"2020","unstructured":"Alarifi A, Amoon M, Aly MH, El-Shafai W (2020) Optical PTFT asymmetric cryptosystem-based secure and efficient cancelable biometric recognition system. IEEE Access 8:221246\u2013221268","journal-title":"IEEE Access"},{"issue":"5","key":"6994_CR61","doi-asserted-by":"publisher","first-page":"6229","DOI":"10.1007\/s11042-016-3311-8","volume":"76","author":"X Wang","year":"2017","unstructured":"Wang X, Liu C (2017) A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed Tools Appl 76(5):6229\u20136245","journal-title":"Multimed Tools Appl"},{"key":"6994_CR62","doi-asserted-by":"publisher","first-page":"35004","DOI":"10.1109\/ACCESS.2021.3062403","volume":"9","author":"W El-Shafai","year":"2021","unstructured":"El-Shafai W, Almomani IM, Alkhayer A (2021) Optical Bit-Plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication. IEEE Access 9:35004\u201335026","journal-title":"IEEE Access"},{"issue":"3","key":"6994_CR63","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1007\/s10772-019-09610-z","volume":"22","author":"A Sedik","year":"2019","unstructured":"Sedik A, Emara HM, Hamad A, Shahin EM, El-Hag NA, Khalil A, Ibrahim F, Elsherbeny ZM, Elreefy M, Zahran O, Abd El-Samie FE (2019) Efficient anomaly detection from medical signals and images. Int J Speech Technol 22(3):739\u2013767","journal-title":"Int J Speech Technol"},{"key":"6994_CR64","doi-asserted-by":"crossref","unstructured":"Podder P, Parvez AMS, Yeasmin MN, Khalil MI (2018) Relative performance analysis of edge detection techniques in iris recognition system. In: 2018 international conference on current trends towards converging technologies (ICCTCT), pp 1\u20136. IEEE","DOI":"10.1109\/ICCTCT.2018.8551023"},{"issue":"24","key":"6994_CR65","doi-asserted-by":"publisher","first-page":"35419","DOI":"10.1007\/s11042-019-08168-x","volume":"78","author":"X Chai","year":"2019","unstructured":"Chai X, Zhang J, Gan Z, Zhang Y (2019) Medical image encryption algorithm based on Latin square and memristive chaotic system. Multimed Tools Appl 78(24):35419\u201335453","journal-title":"Multimed Tools Appl"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-022-06994-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-022-06994-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-022-06994-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T11:37:27Z","timestamp":1727177847000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-022-06994-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,11]]},"references-count":65,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["6994"],"URL":"https:\/\/doi.org\/10.1007\/s00521-022-06994-z","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,11]]},"assertion":[{"value":"29 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}