{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T19:20:47Z","timestamp":1767986447283,"version":"3.49.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2024,2,19]],"date-time":"2024-02-19T00:00:00Z","timestamp":1708300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,19]],"date-time":"2024-02-19T00:00:00Z","timestamp":1708300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1007\/s00521-024-09508-1","type":"journal-article","created":{"date-parts":[[2024,2,19]],"date-time":"2024-02-19T18:02:00Z","timestamp":1708365720000},"page":"7705-7723","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["New optimized chaotic encryption with BCOVIDOA for efficient security of medical images in IoMT systems"],"prefix":"10.1007","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4268-7918","authenticated-orcid":false,"given":"Yousef S.","family":"Alsahafi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3218-7386","authenticated-orcid":false,"given":"Asmaa M.","family":"Khalid","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1008-2612","authenticated-orcid":false,"given":"Hanaa M.","family":"Hamza","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8065-8977","authenticated-orcid":false,"given":"Khalid M.","family":"Hosny","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,19]]},"reference":[{"key":"9508_CR1","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.enpol.2016.12.047","volume":"103","author":"C Wilson","year":"2017","unstructured":"Wilson C, Hargreaves T, Hauxwell-Baldwin R (2017) Benefits and risks of smart home technologies. Energy Policy 103:72\u201383","journal-title":"Energy Policy"},{"issue":"5","key":"9508_CR2","doi-asserted-by":"publisher","first-page":"976","DOI":"10.1007\/s10900-013-9681-1","volume":"38","author":"ST Syed","year":"2013","unstructured":"Syed ST, Gerber BS, Sharp LK (2013) Traveling towards disease: transportation barriers to health care access. J Comm Health 38(5):976\u2013993","journal-title":"J Comm Health"},{"key":"9508_CR3","first-page":"3","volume":"1","author":"YIN Yuehong","year":"2016","unstructured":"Yuehong YIN, Zeng Y, Chen X, Fan Y (2016) The internet of things in healthcare: an overview. J Ind Inf Integr 1:3\u201313","journal-title":"J Ind Inf Integr"},{"key":"9508_CR4","doi-asserted-by":"publisher","first-page":"61656","DOI":"10.1109\/ACCESS.2019.2916503","volume":"7","author":"H Jin","year":"2019","unstructured":"Jin H, Luo Y, Li P, Mathew J (2019) A review of secure and privacy-preserving medical data sharing. IEEE Access 7:61656\u201361669","journal-title":"IEEE Access"},{"key":"9508_CR5","doi-asserted-by":"publisher","first-page":"77212","DOI":"10.1109\/ACCESS.2018.2879919","volume":"6","author":"KM Hosny","year":"2018","unstructured":"Hosny KM, Darwish MM, Li K, Salah A (2018) Parallel multi-core CPU and GPU for fast and robust medical image watermarking. IEEE Access 6:77212\u201377225","journal-title":"IEEE Access"},{"key":"9508_CR6","doi-asserted-by":"publisher","first-page":"47425","DOI":"10.1109\/ACCESS.2021.3068211","volume":"9","author":"KM Hosny","year":"2021","unstructured":"Hosny KM, Darwish MM, Fouda MM (2021) Robust color images watermarking using new fractional-order exponent moments. IEEE Access 9:47425\u201347435","journal-title":"IEEE Access"},{"issue":"13","key":"9508_CR7","doi-asserted-by":"publisher","first-page":"4927","DOI":"10.1007\/s00500-018-3151-8","volume":"23","author":"Z Zhou","year":"2019","unstructured":"Zhou Z, Mu Y, Wu QJ (2019) Coverless image steganography using partial-duplicate image retrieval. Soft Comput 23(13):4927\u20134938","journal-title":"Soft Comput"},{"key":"9508_CR8","doi-asserted-by":"publisher","first-page":"7277992","DOI":"10.1155\/2022\/7277992","volume":"2022","author":"M Samiullah","year":"2022","unstructured":"Samiullah M, Aslam W, Khan MA, Alshahrani HM, Mahgoub H, Abdullah AM, Chen CM (2022) Rating of modern color image cryptography: a next-generation computing perspective.\u00a0Wireless Commun\u00a0Mob Comput\u00a02022:7277992. https:\/\/doi.org\/10.1155\/2022\/7277992","journal-title":"Wireless Commun Mob Comput"},{"key":"9508_CR9","unstructured":"Daemen J, Rijmen V (2001) Reijndael: the advanced encryption standard. Dr. Dobb's J: Softw Tools Prof Program. 26(3): 137\u2013139"},{"issue":"5","key":"9508_CR10","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1109\/5.4441","volume":"76","author":"ME Smid","year":"1988","unstructured":"Smid ME, Branstad DK (1988) Data encryption standard: past and future. Proc IEEE 76(5):550\u2013559","journal-title":"Proc IEEE"},{"issue":"15","key":"9508_CR11","first-page":"15","volume":"13","author":"P Mahajan","year":"2013","unstructured":"Mahajan P, Sachdeva A (2013) A study of encryption algorithms AES, DES and RSA for security. Glob J Comput Sci Technol 13(15):15\u201322","journal-title":"Glob J Comput Sci Technol"},{"issue":"6","key":"9508_CR12","doi-asserted-by":"publisher","first-page":"4295","DOI":"10.1007\/s00521-021-06552-z","volume":"34","author":"A Toktas","year":"2022","unstructured":"Toktas A, Erkan U (2022) 2D fully chaotic map for image encryption constructed through a quadruple-objective optimization via artificial bee colony algorithm. Neural Comput Appl 34(6):4295\u20134319","journal-title":"Neural Comput Appl"},{"issue":"29","key":"9508_CR13","doi-asserted-by":"publisher","first-page":"20665","DOI":"10.1007\/s11042-019-08322-5","volume":"79","author":"IF Elashry","year":"2020","unstructured":"Elashry IF, El-Shafai W, Hasan ES, El-Rabaie S, Abbas AM, El-Samie A, Faragallah OS (2020) Efficient chaotic-based image cryptosystem with different modes of operation. Multimed Tools Appl 79(29):20665\u201320687","journal-title":"Multimed Tools Appl"},{"key":"9508_CR14","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129\u2013137","journal-title":"Signal Process"},{"issue":"27","key":"9508_CR15","doi-asserted-by":"publisher","first-page":"20263","DOI":"10.1007\/s11042-020-08879-6","volume":"79","author":"A Kamrani","year":"2020","unstructured":"Kamrani A, Zenkouar K, Najah S (2020) A new set of image encryption algorithms based on discrete orthogonal moments and chaos theory. Multimed Tools Appl 79(27):20263\u201320279","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"9508_CR16","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1007\/s12652-021-03675-y","volume":"13","author":"KM Hosny","year":"2022","unstructured":"Hosny KM, Kamal ST, Darwish MM (2022) Novel encryption for color images using fractional-order hyperchaotic system. J Ambient Intell Humaniz Comput 13(2):973\u2013988","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"1","key":"9508_CR17","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s12065-018-0159-z","volume":"11","author":"S Koppu","year":"2018","unstructured":"Koppu S, Viswanatham VM (2018) Medical image security enhancement using two-dimensional chaotic mapping optimized by self-adaptive grey wolf algorithm. Evol Intel 11(1):53\u201371","journal-title":"Evol Intel"},{"issue":"7","key":"9508_CR18","doi-asserted-by":"publisher","first-page":"5299","DOI":"10.1007\/s00500-020-05528-w","volume":"25","author":"S Saravanan","year":"2021","unstructured":"Saravanan S, Sivabalakrishnan M (2021) A hybrid chaotic map with coefficient improved whale optimization-based parameter tuning for enhanced image encryption. Soft Comput 25(7):5299\u20135322","journal-title":"Soft Comput"},{"key":"9508_CR19","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/1444676","author":"Y Zhou","year":"2022","unstructured":"Zhou Y, Wang E, Song X, Shi M (2022) Image encryption algorithm based on artificial bee colony algorithm and chaotic system. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2022\/1444676","journal-title":"Secur Commun Netw"},{"issue":"15","key":"9508_CR20","doi-asserted-by":"publisher","first-page":"11859","DOI":"10.1007\/s00521-019-04668-x","volume":"32","author":"S Suri","year":"2020","unstructured":"Suri S, Vijay R (2020) A pareto-optimal evolutionary approach of image encryption using coupled map lattice and DNA. Neural Comput Appl 32(15):11859\u201311873","journal-title":"Neural Comput Appl"},{"issue":"3","key":"9508_CR21","first-page":"247","volume":"10","author":"M Ahmad","year":"2018","unstructured":"Ahmad M, Alam MZ, Umayya Z, Khan S, Ahmad F (2018) An image encryption approach using particle swarm optimization and chaotic map. Int J Inf Technol 10(3):247\u2013255","journal-title":"Int J Inf Technol"},{"key":"9508_CR22","doi-asserted-by":"publisher","first-page":"22465","DOI":"10.1007\/s00521-022-07639-x","volume":"34","author":"AM Khalid","year":"2022","unstructured":"Khalid AM, Hosny KM, Mirjalili S (2022) COVIDOA: a novel evolutionary optimization algorithm based on coronavirus replication lifecycle. Neural Comput Appl 34:22465\u201322492","journal-title":"Neural Comput Appl"},{"key":"9508_CR23","doi-asserted-by":"publisher","first-page":"108789","DOI":"10.1016\/j.knosys.2022.108789","volume":"248","author":"AM Khalid","year":"2022","unstructured":"Khalid AM, Hamza HM, Mirjalili S, Hosny KM (2022) BCOVIDOA: a novel binary coronavirus disease optimization algorithm for feature selection. Knowl-Based Syst 248:108789","journal-title":"Knowl-Based Syst"},{"issue":"3","key":"9508_CR24","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/s10278-007-9044-5","volume":"21","author":"DY Tsai","year":"2008","unstructured":"Tsai DY, Lee Y, Matsuyama E (2008) Information entropy measure for evaluation of image quality. J Digit Imaging 21(3):338\u2013347","journal-title":"J Digit Imaging"},{"key":"9508_CR25","doi-asserted-by":"publisher","first-page":"140876","DOI":"10.1109\/ACCESS.2020.3012912","volume":"8","author":"A Qayyum","year":"2020","unstructured":"Qayyum A, Ahmad J, Boulila W, Rubaiee S, Masood F, Khan F, Buchanan WJ (2020) Chaos-based confusion and diffusion of image pixels using dynamic substitution. IEEE Access 8:140876\u2013140895","journal-title":"IEEE Access"},{"issue":"1","key":"9508_CR26","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s11045-020-00739-8","volume":"32","author":"M Kaur","year":"2021","unstructured":"Kaur M, Singh D (2021) Multi-objective evolutionary optimization techniques based hyperchaotic map and their applications in image encryption. Multidimension Syst Signal Process 32(1):281\u2013301","journal-title":"Multidimension Syst Signal Process"},{"key":"9508_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/s40745-021-00364-7","author":"RB Naik","year":"2022","unstructured":"Naik RB, Singh U (2022) A review on applications of chaotic maps in pseudo-random number generators and encryption. Ann Data Sci. https:\/\/doi.org\/10.1007\/s40745-021-00364-7","journal-title":"Ann Data Sci"},{"key":"9508_CR28","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.pbiomolbio.2020.10.006","volume":"161","author":"L Guruprasad","year":"2021","unstructured":"Guruprasad L (2021) Human coronavirus spike protein-host receptor recognition. Prog Biophys Mol Biol 161:39\u201353","journal-title":"Prog Biophys Mol Biol"},{"key":"9508_CR29","doi-asserted-by":"publisher","first-page":"102360","DOI":"10.1016\/j.ceca.2021.102360","volume":"94","author":"Z Zhao","year":"2021","unstructured":"Zhao Z, Qin P, Huang YW (2021) Lysosomal ion channels involved in cellular entry and uncoating of enveloped viruses: implications for therapeutic strategies against SARS-CoV-2. Cell Calcium 94:102360","journal-title":"Cell Calcium"},{"issue":"2","key":"9508_CR30","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1261\/rna.078825.121","volume":"28","author":"CP Jones","year":"2022","unstructured":"Jones CP, Ferr\u00e9-D\u2019Amar\u00e9 AR (2022) Crystal structure of the severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) frameshifting pseudoknot. RNA 28(2):239\u2013249","journal-title":"RNA"},{"issue":"17","key":"9508_CR31","doi-asserted-by":"publisher","first-page":"3349","DOI":"10.1021\/acs.accounts.1c00316","volume":"54","author":"VS Anokhina","year":"2021","unstructured":"Anokhina VS, Miller BL (2021) Targeting ribosomal frameshifting as an antiviral strategy: from HIV-1 to SARS-CoV-2. Acc Chem Res 54(17):3349\u20133361","journal-title":"Acc Chem Res"},{"key":"9508_CR32","doi-asserted-by":"publisher","first-page":"e57309","DOI":"10.7554\/eLife.57309","volume":"9","author":"YM Bar-On","year":"2020","unstructured":"Bar-On YM, Flamholz A, Phillips R, Milo R (2020) Science forum: SARS-CoV-2 (COVID-19) by the numbers. Elife 9:e57309","journal-title":"Elife"},{"key":"9508_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.swevo.2012.09.002","volume":"9","author":"S Mirjalili","year":"2013","unstructured":"Mirjalili S, Lewis A (2013) S-shaped versus V-shaped transfer functions for binary particle swarm optimization. Swarm Evol Comput 9:1\u201314","journal-title":"Swarm Evol Comput"},{"issue":"5","key":"9508_CR34","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1049\/iet-ipr.2016.0040","volume":"11","author":"H Liu","year":"2017","unstructured":"Liu H, Kadir A, Sun X (2017) Chaos-based fast colour image encryption scheme with true random number keys from environmental noise. IET Image Proc 11(5):324\u2013332","journal-title":"IET Image Proc"},{"key":"9508_CR35","doi-asserted-by":"publisher","first-page":"105821","DOI":"10.1016\/j.optlaseng.2019.105821","volume":"124","author":"Z-J Huang","year":"2020","unstructured":"Huang Z-J, Cheng S, Gong L-H, Zhou N-R (2020) Nonlinear optical multi-image encryption scheme with two-dimensional linear canonical transform. Opt Lasers Eng 124:105821","journal-title":"Opt Lasers Eng"},{"issue":"10","key":"9508_CR36","doi-asserted-by":"publisher","first-page":"9007","DOI":"10.1007\/s12652-020-02597-5","volume":"12","author":"W El-Shafai","year":"2021","unstructured":"El-Shafai W, Khallaf F, El-Rabaie ESM, El-Samie FEA (2021) Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications. J Ambient Intell Humaniz Comput 12(10):9007\u20139035","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"9508_CR37","doi-asserted-by":"publisher","first-page":"105851","DOI":"10.1016\/j.optlaseng.2019.105851","volume":"125","author":"X Wang","year":"2020","unstructured":"Wang X, Wang Y, Zhu X, Luo C (2020) A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level. Opt Lasers Eng 125:105851","journal-title":"Opt Lasers Eng"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-09508-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-024-09508-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-09508-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T20:11:28Z","timestamp":1713039088000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-024-09508-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,19]]},"references-count":37,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2024,5]]}},"alternative-id":["9508"],"URL":"https:\/\/doi.org\/10.1007\/s00521-024-09508-1","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,19]]},"assertion":[{"value":"6 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants performed by any authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}