{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T15:25:03Z","timestamp":1773933903812,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T00:00:00Z","timestamp":1767571200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T00:00:00Z","timestamp":1767571200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10586-025-05844-6","type":"journal-article","created":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T14:46:10Z","timestamp":1767624370000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Medisecure: a hybrid approach for enhancing multimedia data protection in healthcare"],"prefix":"10.1007","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0807-4624","authenticated-orcid":false,"given":"Sachikanta","family":"Dash","sequence":"first","affiliation":[]},{"given":"Sasmita","family":"Padhy","sequence":"additional","affiliation":[]},{"given":"Naween","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Anand","family":"Nayyar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,5]]},"reference":[{"issue":"1","key":"5844_CR1","first-page":"1045","volume":"14","author":"R Kaur","year":"2021","unstructured":"Kaur, R., Ali, A.: A novel blockchain model for securing iot based data transmission. Int. J. Grid Distrib. Comput. 14(1), 1045\u20131055 (2021)","journal-title":"Int. J. Grid Distrib. Comput."},{"issue":"1","key":"5844_CR2","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1109\/JETCAS.2018.2886642","volume":"9","author":"C Jia","year":"2018","unstructured":"Jia, C., Zhang, X., Wang, S., Wang, S., Ma, S.: Light field image compression using generative adversarial network-based view synthesis. IEEE J. Emerg. Sel. Topics Circuits Syst. 9(1), 177\u2013189 (2018)","journal-title":"IEEE J. Emerg. Sel. Topics Circuits Syst."},{"key":"5844_CR3","unstructured":"Dash, S., Panda, R., Padhy, S.: Blockchain-based intelligent medical iot healthcare system. SPAST Abstracts 1(01) (2021)"},{"key":"5844_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120622","volume":"231","author":"S Dash","year":"2023","unstructured":"Dash, S., Padhy, S., Devi, S.A., Sachi, S., Patro, K.A.K.: An efficient intra-inter pixel encryption scheme to secure healthcare images for an iot environment. Expert Syst. Appl. 231, 120622 (2023)","journal-title":"Expert Syst. Appl."},{"key":"5844_CR5","doi-asserted-by":"crossref","unstructured":"Pranitha, G., Rukmini, T., Shankar, T., Sah, B., Kumar, N., Padhy, S.: Utilization of blockchain in e-voting system. In: 2022 2nd International Conference on Intelligent Technologies (CONIT), pp. 1\u20135 (2022). IEEE","DOI":"10.1109\/CONIT55038.2022.9847995"},{"key":"5844_CR6","doi-asserted-by":"crossref","unstructured":"Padhy, S., Dash, S., Shankar, T., Rachapudi, V., Kumar, S., Nayyar, A.: A hybrid crypto-compression model for secure brain mri image transmission. Multimedia Tools and Applications, 1\u201321 (2023)","DOI":"10.1007\/s11042-023-16359-w"},{"issue":"15","key":"5844_CR7","doi-asserted-by":"publisher","first-page":"23319","DOI":"10.1007\/s11042-021-10527-6","volume":"80","author":"SE El-Khamy","year":"2021","unstructured":"El-Khamy, S.E., Mohamed, A.G.: An efficient dna-inspired image encryption algorithm based on hyper-chaotic maps and wavelet fusion. Multimed. Tools Appl 80(15), 23319\u201323335 (2021)","journal-title":"Multimed. Tools Appl"},{"key":"5844_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/8937676","volume":"2020","author":"M Gafsi","year":"2020","unstructured":"Gafsi, M., Hajjaji, M.A., Malek, J., Mtibaa, A.: Efficient encryption system for numerical image safe transmission. J. electr. comput. eng. 2020, 1\u201312 (2020)","journal-title":"J. electr. comput. eng."},{"key":"5844_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107563","volume":"172","author":"G Ye","year":"2020","unstructured":"Ye, G., Pan, C., Dong, Y., Shi, Y., Huang, X.: Image encryption and hiding algorithm based on compressive sensing and random numbers insertion. Signal Process. 172, 107563 (2020)","journal-title":"Signal Process."},{"key":"5844_CR10","doi-asserted-by":"crossref","unstructured":"Wu, L., Huang, K., Shen, H.: A gan-based tunable image compression system. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 2334\u20132342 (2020)","DOI":"10.1109\/WACV45572.2020.9093387"},{"key":"5844_CR11","doi-asserted-by":"crossref","unstructured":"Shankar, T., Padhy, S., Dash, S., Teja, M.B., Yashwant, S.: Induction of secure data repository in blockchain over ipfs. In: 2022 6th International Conference on Trends in Electronics and Informatics (ICOEI), pp. 738\u2013743 (2022). IEEE","DOI":"10.1109\/ICOEI53556.2022.9776967"},{"issue":"35","key":"5844_CR12","doi-asserted-by":"publisher","first-page":"26369","DOI":"10.1007\/s11042-020-09264-z","volume":"79","author":"OA Khashan","year":"2020","unstructured":"Khashan, O.A., AlShaikh, M.: Edge-based lightweight selective encryption scheme for digital medical images. Multimed. Tools Appl. 79(35), 26369\u201326388 (2020)","journal-title":"Multimed. Tools Appl."},{"key":"5844_CR13","doi-asserted-by":"crossref","unstructured":"Gafsi, M., Ajili, S., Hajjaji, M.A., Malek, J., Mtibaa, A.: High securing cryptography system for digital image transmission. In: Proceedings of the 8th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT\u201918), Vol. 1, pp. 311\u2013322 (2020). Springer","DOI":"10.1007\/978-3-030-21005-2_30"},{"key":"5844_CR14","doi-asserted-by":"crossref","unstructured":"Roy, M., Chakraborty, S., Mali, K., Swarnakar, R., Ghosh, K., Banerjee, A., Chatterjee, S.: Data security techniques based on dna encryption. In: Proceedings of International Ethical Hacking Conference 2019: eHaCON 2019, Kolkata, India, pp. 239\u2013249 (2020). Springer","DOI":"10.1007\/978-981-15-0361-0_19"},{"issue":"5","key":"5844_CR15","doi-asserted-by":"publisher","first-page":"5413","DOI":"10.1007\/s12652-020-02028-5","volume":"12","author":"K Madhusudhan","year":"2021","unstructured":"Madhusudhan, K., Sakthivel, P.: Retracted article: A secure medical image transmission algorithm based on binary bits and arnold map. J. Ambient. Intell. Humaniz. Comput. 12(5), 5413\u20135420 (2021)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"5844_CR16","doi-asserted-by":"crossref","unstructured":"Padhy, S., Dash, S., Routray, S., Ahmad, S., Nazeer, J., Alam, A., et al.: Iot-based hybrid ensemble machine learning model for efficient diabetes mellitus prediction. Computational Intelligence and Neuroscience (2022)","DOI":"10.1155\/2022\/2389636"},{"issue":"22","key":"5844_CR17","doi-asserted-by":"publisher","first-page":"8476","DOI":"10.1002\/anie.202001162","volume":"59","author":"RN Grass","year":"2020","unstructured":"Grass, R.N., Heckel, R., Dessimoz, C., Stark, W.J.: Genomic encryption of digital data stored in synthetic dna. Angew. Chem. Int. Ed. 59(22), 8476\u20138480 (2020)","journal-title":"Angew. Chem. Int. Ed."},{"issue":"1","key":"5844_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJISP.303669","volume":"16","author":"S Dash","year":"2022","unstructured":"Dash, S., Padhy, S., Parija, B., Rojashree, T., Patro, K.A.K.: A simple and fast medical image encryption system using chaos-based shifting techniques. Int. J. Inf. Secur. Priv. (IJISP) 16(1), 1\u201324 (2022)","journal-title":"Int. J. Inf. Secur. Priv. (IJISP)"},{"key":"5844_CR19","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.aej.2022.09.031","volume":"65","author":"AI Taloba","year":"2023","unstructured":"Taloba, A.I., Elhadad, A., Rayan, A., Abd El-Aziz, R.M., Salem, M., Alzahrani, A.A., Alharithi, F.S., Park, C.: A blockchain-based hybrid platform for multimedia data processing in iot-healthcare. Alex. Eng. J. 65, 263\u2013274 (2023)","journal-title":"Alex. Eng. J."},{"key":"5844_CR20","doi-asserted-by":"crossref","unstructured":"Arunprasath, S., Annamalai, S.: Improving patient centric data retrieval and cyber security in healthcare: privacy preserving solutions for a secure future. Multimedia Tools and Applications, 1\u201331 (2024)","DOI":"10.1007\/s11042-024-18253-5"},{"key":"5844_CR21","doi-asserted-by":"crossref","unstructured":"Ranjan, A.K., Kumar, P.: Ensuring the privacy and security of iot-medical data: a hybrid deep learning-based encryption and blockchain-enabled transmission. Multimedia Tools and Applications, 1\u201326 (2024)","DOI":"10.1007\/s11042-023-18043-5"},{"key":"5844_CR22","doi-asserted-by":"crossref","unstructured":"Shakor, M.Y., Surameery, N.M.S., Khlaif, Z.N.: Hybrid security model for medical image protection in cloud. Diyala Journal of Engineering Sciences, 68\u201377 (2023)","DOI":"10.24237\/djes.2023.16107"},{"issue":"7","key":"5844_CR23","doi-asserted-by":"publisher","first-page":"3612","DOI":"10.3390\/s23073612","volume":"23","author":"A Almalawi","year":"2023","unstructured":"Almalawi, A., Khan, A.I., Alsolami, F., Abushark, Y.B., Alfakeeh, A.S.: Managing security of healthcare data for a modern healthcare system. Sensors 23(7), 3612 (2023)","journal-title":"Sensors"},{"issue":"7","key":"5844_CR24","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.3390\/math10071071","volume":"10","author":"J Jain","year":"2022","unstructured":"Jain, J., Jain, A., Srivastava, S.K., Verma, C., Raboaca, M.S., Ill\u00e9s, Z.: Improved security of e-healthcare images using hybridized robust zero-watermarking and hyper-chaotic system along with rsa. Mathematics 10(7), 1071 (2022)","journal-title":"Mathematics"},{"issue":"3","key":"5844_CR25","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1080\/13682199.2023.2180140","volume":"71","author":"S Yempally","year":"2023","unstructured":"Yempally, S., Singh, S.K., Sarveshwaran, V.: A secure and efficient authentication and multimedia data sharing approach in iot-healthcare. Imaging Sci. J. 71(3), 277\u2013298 (2023)","journal-title":"Imaging Sci. J."},{"issue":"3","key":"5844_CR26","doi-asserted-by":"publisher","first-page":"99","DOI":"10.3390\/fi15030099","volume":"15","author":"OC Abikoye","year":"2023","unstructured":"Abikoye, O.C., Oladipupo, E.T., Imoize, A.L., Awotunde, J.B., Lee, C.-C., Li, C.-T.: Securing critical user information over the internet of medical things platforms using a hybrid cryptography scheme. Future Internet 15(3), 99 (2023)","journal-title":"Future Internet"},{"issue":"1","key":"5844_CR27","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1186\/s13677-023-00425-7","volume":"12","author":"C Rupa","year":"2023","unstructured":"Rupa, C., Greeshmanth Shah, M.A.: Novel secure data protection scheme using martino homomorphic encryption. Journal of Cloud Computing 12(1), 47 (2023)","journal-title":"Journal of Cloud Computing"},{"issue":"1","key":"5844_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13635-023-00150-3","volume":"2024","author":"J Lv","year":"2024","unstructured":"Lv, J.: Research on privacy and secure storage protection of personalized medical data based on hybrid encryption. EURASIP J. Inf. Secur. 2024(1), 1 (2024)","journal-title":"EURASIP J. Inf. Secur."},{"key":"5844_CR29","doi-asserted-by":"crossref","unstructured":"Rehman, M.U., Shafique, A., Khan, M.S., Driss, M., Boulila, W., Ghadi, Y.Y., Changalasetty, S.B., Alhaisoni, M., Ahmad, J.: A novel medical image data protection scheme for smart healthcare system. CAAI Transactions on Intelligence Technology (2024)","DOI":"10.1049\/cit2.12292"},{"issue":"1","key":"5844_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.101932","volume":"36","author":"B Meng","year":"2024","unstructured":"Meng, B., Yuan, X., Zhang, Q., Lam, C.-T., Huang, G.: Encryption-then-embedding-based hybrid data hiding scheme for medical images. Journal of King Saud University-Computer and Information Sciences 36(1), 101932 (2024)","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"issue":"1","key":"5844_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-022-2193-3","volume":"18","author":"A Singh","year":"2024","unstructured":"Singh, A., Kumar, A., Namasudra, S.: Dnacds: Cloud ioe big data security and accessing scheme based on dna cryptography. Front. Comp. Sci. 18(1), 181801 (2024)","journal-title":"Front. Comp. Sci."},{"issue":"8","key":"5844_CR32","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1080\/09720529.2021.2011102","volume":"24","author":"A Yadav","year":"2021","unstructured":"Yadav, A., Saini, B., Verma, V.K., Pal, V.: A joint medical image compression and encryption using ambtc and hybrid chaotic system. Journal of Discrete Mathematical Sciences and Cryptography 24(8), 2233\u20132244 (2021)","journal-title":"Journal of Discrete Mathematical Sciences and Cryptography"},{"issue":"2","key":"5844_CR33","doi-asserted-by":"publisher","first-page":"287","DOI":"10.3390\/e24020287","volume":"24","author":"Y Chen","year":"2022","unstructured":"Chen, Y., Xie, S., Zhang, J.: A hybrid domain image encryption algorithm based on improved henon map. Entropy 24(2), 287 (2022)","journal-title":"Entropy"},{"key":"5844_CR34","first-page":"909","volume":"134","author":"P El-kafrawy","year":"2023","unstructured":"El-kafrawy, P., Aboghazalah, M., Ahmed, A.M., Torkey, H., El-Sayed, A.: An efficient encryption and compression of sensed iot medical images using auto-encoder. Comput. Model. Eng. Sci. 134, 909\u2013926 (2023)","journal-title":"Comput. Model. Eng. Sci."},{"key":"5844_CR35","doi-asserted-by":"publisher","first-page":"163524","DOI":"10.1109\/ACCESS.2020.3022398","volume":"8","author":"H Dong","year":"2020","unstructured":"Dong, H., Bai, E., Jiang, X.-Q., Wu, Y.: Color image compression-encryption using fractional-order hyperchaotic system and dna coding. IEEE Access 8, 163524\u2013163540 (2020)","journal-title":"IEEE Access"},{"key":"5844_CR36","volume":"98","author":"I Ahmad","year":"2021","unstructured":"Ahmad, I., Shin, S.: A novel hybrid image encryption-compression scheme by combining chaos theory and number theory. Signal Processing: Image Communication 98, 116418 (2021)","journal-title":"Signal Processing: Image Communication"},{"key":"5844_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.169357","volume":"263","author":"Y Lu","year":"2022","unstructured":"Lu, Y., Gong, M., Huang, Z., Zhang, J., Chai, X., Zhou, C.: Exploiting compressed sensing (cs) and rna operations for effective content-adaptive image compression and encryption. Optik 263, 169357 (2022)","journal-title":"Optik"},{"issue":"1","key":"5844_CR38","doi-asserted-by":"publisher","first-page":"238","DOI":"10.23919\/JCC.2022.01.017","volume":"19","author":"N Gupta","year":"2022","unstructured":"Gupta, N., Vijay, R.: Hybrid image compression-encryption scheme based on multilayer stacked autoencoder and logistic map. China Communications 19(1), 238\u2013252 (2022)","journal-title":"China Communications"},{"key":"5844_CR39","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.comcom.2022.07.049","volume":"193","author":"KN Singh","year":"2022","unstructured":"Singh, K.N., Singh, O.P., Singh, A.K.: Ecis: encryption prior to compression for digital image security with reduced memory. Comput. Commun. 193, 410\u2013417 (2022)","journal-title":"Comput. Commun."},{"key":"5844_CR40","doi-asserted-by":"publisher","first-page":"1001","DOI":"10.1016\/j.ins.2022.06.011","volume":"607","author":"L Zhu","year":"2022","unstructured":"Zhu, L., Jiang, D., Ni, J., Wang, X., Rong, X., Ahmad, M.: A visually secure image encryption scheme using adaptive-thresholding sparsification compression sensing model and newly-designed memristive chaotic map. Inf. Sci. 607, 1001\u20131022 (2022)","journal-title":"Inf. Sci."},{"key":"5844_CR41","doi-asserted-by":"publisher","unstructured":"Rupa, e.a.: Meaningful cipher data generation: Novel encipher using fuzzy logic for reducing cyber data attacks. In: 2023 International Conference on Intelligent Pervasive Computing and Advanced Communication Technology (i-PACT), pp. 1\u20136 (2023). https:\/\/doi.org\/10.1109\/i-PACT58649.2023.10434566","DOI":"10.1109\/i-PACT58649.2023.10434566"},{"key":"5844_CR42","doi-asserted-by":"publisher","unstructured":"Sree, e.a.: A novel substantial cipher against passive attacks using fuzzy logic based approach. In: AIP Conference Proceedings, 3073, 020013, (2024) https:\/\/doi.org\/10.1063\/5.0217284","DOI":"10.1063\/5.0217284"},{"key":"5844_CR43","doi-asserted-by":"publisher","first-page":"31014","DOI":"10.1109\/ACCESS.2024.3369912","volume":"12","author":"S Nasir","year":"2024","unstructured":"Nasir, S., Khan, R.A., Bai, S.: Ethical framework for harnessing the power of ai in healthcare and beyond. IEEE Access 12, 31014\u201331035 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3369912","journal-title":"IEEE Access"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05844-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05844-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05844-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T13:07:20Z","timestamp":1773925640000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05844-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,5]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["5844"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05844-6","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,5]]},"assertion":[{"value":"30 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 October 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest that could influence the reported work in the article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"75"}}