{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:19:45Z","timestamp":1763457585091},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T00:00:00Z","timestamp":1474416000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s10916-016-0611-5","type":"journal-article","created":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T04:15:05Z","timestamp":1474431305000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["Secured Medical Images - a Chaotic Pixel Scrambling Approach"],"prefix":"10.1007","volume":"40","author":[{"given":"M. Y. Mohamed","family":"Parvees","sequence":"first","affiliation":[]},{"given":"J. Abdul","family":"Samath","sequence":"additional","affiliation":[]},{"given":"B. Parameswaran","family":"Bose","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,21]]},"reference":[{"issue":"1","key":"611_CR1","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.ejrad.2009.10.018","volume":"73","author":"P Ruotsalainen","year":"2010","unstructured":"Ruotsalainen, P., Privacy and security in teleradiology. Eur. J. Radiol. 73(1):31\u201335, 2010. doi: 10.1016\/j.ejrad.2009.10.018 .","journal-title":"Eur. J. Radiol."},{"key":"611_CR2","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.compbiomed.2016.03.020","volume":"72","author":"D Ravichandran","year":"2016","unstructured":"Ravichandran, D., Praveenkumar, P., Rayappan, J.B.B., and Amirtharajan, R., Chaos based crossover and mutation for securing DICOM image. Comp. Biol. Med. 72:170\u2013184, 2016. doi: 10.1016\/j.compbiomed.2016.03.020 .","journal-title":"Comp. Biol. Med."},{"issue":"10","key":"611_CR3","doi-asserted-by":"publisher","first-page":"2755","DOI":"10.1016\/j.cnsns.2009.11.010","volume":"15","author":"V Patidar","year":"2010","unstructured":"Patidar, V., and Pareek, N., Sud K Modified substitution-diffusion image cipher using chaotic standard and logistic maps. Comm. Nonlinear. Sci. Numer. Simul. 15(10):2755\u20132765, 2010. doi: 10.1016\/j.cnsns.2009.11.010 .","journal-title":"Comm. Nonlinear. Sci. Numer. Simul."},{"issue":"5","key":"611_CR4","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1007\/s12652-013-0217-4","volume":"6","author":"X Li","year":"2015","unstructured":"Li, X., Zhang, G., and Zhang, X., Image encryption algorithm with compound chaotic maps. J. Ambient. Intell. Humaniz. Comput. 6(5):563\u2013570, 2015. doi: 10.1007\/s12652-013-0217-4 .","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"611_CR5","doi-asserted-by":"publisher","unstructured":"Zhang, S., and Gao, T., An image encryption scheme based on DNA coding and permutation of hyper-image. Multimed. Tools. Appl.:1\u201314, 2015. doi: 10.1007\/s11042-015-2982-x .","DOI":"10.1007\/s11042-015-2982-x"},{"issue":"3","key":"611_CR6","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1007\/s11042-013-1699-y","volume":"74","author":"B Norouzi","year":"2015","unstructured":"Norouzi, B., Mohammad Seyedzadeh, S., Mirzakuchaki, S., and Mosavi, M.R., A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed. Tools. Appl. 74(3):781\u2013811, 2015. doi: 10.1007\/s11042-013-1699-y .","journal-title":"Multimed. Tools. Appl"},{"key":"611_CR7","doi-asserted-by":"publisher","unstructured":"Chai, X., Yang, K., and Gan, Z., A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimed. Tools. Appl1\u201321, 2016. doi: 10.1007\/s11042-016-3585-x .","DOI":"10.1007\/s11042-016-3585-x"},{"issue":"1","key":"611_CR8","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011.","volume":"11","author":"Y Wang","year":"2011","unstructured":"Wang, Y., Wong, K.W., Liao, X.F., and Chen, G.R., A new chaos-based fast image encryption algorithm. Appl. Soft. Comput. 11(1):514\u2013522, 2011. doi: 10.1016\/j.asoc.2009.12.011.","journal-title":"Soft. Comput."},{"issue":"5","key":"611_CR9","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1016\/j.optcom.2011.10.098","volume":"285","author":"XY Wang","year":"2012","unstructured":"Wang, X.Y., and Zhao, J.F., A new image encryption algorithm based on chaos. Optics. Commun. 285(5):562\u2013566, 2012. doi: 10.1016\/j.optcom.2011.10.098 .","journal-title":"Optics. Commun."},{"issue":"1\u20133","key":"611_CR10","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.physleta.2005.08.006.","volume":"346","author":"ZH Guan","year":"2005","unstructured":"Guan, Z.H., Huang, F., and Guan, W., Chaos-based image encryption algorithm. Phys. Lett. A. 346(1\u20133):153\u2013157, 2005. doi: 10.1016\/j.physleta.2005.08.006.","journal-title":"Phys. Lett. A."},{"key":"611_CR11","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/341729","author":"SS Askar","year":"2015","unstructured":"Askar, S.S., Karawia, A.A., and Alshamrani, A., Image encryption algorithm based on chaotic economic model. Math. Probl. Eng., 2015. doi: 10.1155\/2015\/341729 .","journal-title":"Math. Probl. Eng."},{"key":"611_CR12","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","volume":"128","author":"A Belazi","year":"2016","unstructured":"Belazi, A., Ahmed, A., El-Latif, A., and Belghith, S., A novel image encryption scheme based on substitution-permutation network and chaos. Signal. Process. 128:155\u2013170, 2016. doi: 10.1016\/j.sigpro.2016.03.021 .","journal-title":"Signal. Process."},{"key":"611_CR13","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.image.2015.10.004","volume":"41","author":"SE Assad","year":"2016","unstructured":"Assad, S.E., and Farajallah, M., A new chaos-based image encryption system. Signal. Process. Image. Commun. 41:144\u2013157, 2016. doi: 10.1016\/j.image.2015.10.004 .","journal-title":"Signal. Process. Image. Commun."},{"issue":"3","key":"611_CR14","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1016\/j.cnsns.2014.06.032","volume":"20","author":"J Chen","year":"2015","unstructured":"Chen, J., Zhu, Z., Fu, C., Yu, H., and Zhang, L., A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Commun. Nonlinear. Sci. Numer. Simul. 20(3):846\u2013860, 2015. doi: 10.1016\/j.cnsns.2014.06.032 .","journal-title":"Commun. Nonlinear. Sci. Numer. Simul."},{"key":"611_CR15","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1458","author":"G Ye","year":"2016","unstructured":"Ye, G., and Huang, X., A secure image encryption algorithm based on chaotic maps and SHA-3. Security. Comm. Netw., 2016. doi: 10.1002\/sec.1458 .","journal-title":"Security. Comm. Netw."},{"issue":"18","key":"611_CR16","doi-asserted-by":"publisher","first-page":"3335","DOI":"10.1002\/sec.1257","volume":"8","author":"P Praveenkumar","year":"2015","unstructured":"Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., and Rayappan, J.B.B., Triple chaotic image scrambling on RGB \u2013 a random image encryption approach. Security. Comm. Netw. 8(18):3335\u20133345, 2015. doi: 10.1002\/sec.1257 .","journal-title":"Security. Comm. Netw."},{"key":"611_CR17","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.compbiomed.2013.11.010","volume":"45","author":"G Liu","year":"2014","unstructured":"Liu, G., Li, J., and Liu, H., Chaos-based color pathological image encryption scheme using one-time keys. Compu.t Biol. Med. 45:111\u2013117, 2014. doi: 10.1016\/j.compbiomed.2013.11.010 .","journal-title":"Compu.t Biol. Med."},{"key":"611_CR18","doi-asserted-by":"publisher","first-page":"1000","DOI":"10.1016\/j.compbiomed.2013.05.005","volume":"43","author":"C Fu","year":"2013","unstructured":"Fu, C., Meng, W., Zhan, Y., Zhu, Z., Lau, F.C.M., Tse, C.K., and Ma, H., An efficient and secure medical image protection scheme based on chaotic maps. Comput. Biol. Med. 43:1000\u20131010, 2013. doi: 10.1016\/j.compbiomed.2013.05.005 .","journal-title":"Comput. Biol. Med."},{"key":"611_CR19","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/240749","author":"S Zhang","year":"2014","unstructured":"Zhang, S., Gao, T., and Gao, L., A novel encryption frame for medical image with watermark based on hyperchaotic system. Math. Probl. Eng., 2014. doi: 10.1155\/2014\/240749 .","journal-title":"Math. Probl. Eng."},{"key":"611_CR20","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.cnsns.2014.11.021","volume":"23","author":"J Chen","year":"2015","unstructured":"Chen, J., Zhu, Z., Fu, C., Zhang, L., and Zhang, Y., An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Commun. Nonlinear. Sci. Numer. Simul. 23:294\u2013310, 2015. doi: 10.1016\/j.cnsns.2014.11.021 .","journal-title":"Commun. Nonlinear. Sci. Numer. Simul."},{"key":"611_CR21","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1016\/j.compbiomed.2015.04.031.","volume":"62","author":"P Praveenkumar","year":"2015","unstructured":"Praveenkumar, P., Amirtharajan, R., and Thenmozhi, K., Medical data sheet in safe havens \u2013 a tri-layer cryptic solution. Comp. Biol Med. 62:264\u2013276, 2015. doi: 10.1016\/j.compbiomed.2015.04.031.","journal-title":"Biol Med"},{"key":"611_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2467317","author":"M Dzwonkowski","year":"2015","unstructured":"Dzwonkowski, M., Papaj, M., and Rykaczewski, R., A new Quaternion-based Encryption Method for DICOM Images. IEEE. Trans. Image. Process., 2015. doi: 10.1109\/TIP.2015.2467317 .","journal-title":"IEEE. Trans. Image. Process."},{"key":"611_CR23","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1016\/j.jnca.2009.02.009","volume":"32","author":"J Hu","year":"2009","unstructured":"Hu, J., and Han, F., A pixel-based scrambling scheme for digital medical images protection. J. Netw. Comp. Appl. 32:788\u2013794, 2009. doi: 10.1016\/j.jnca.2009.02.009 .","journal-title":"J. Netw. Comp. Appl."},{"key":"611_CR24","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1049\/iet-ifs.2014.0245","volume":"9","author":"A Al-Haj","year":"2015","unstructured":"Al-Haj, A., Abandah, G., and Hussein, N., Crypto-based algorithms for secured medical. IET. Info. Secur. 9:365\u2013373, 2015. doi: 10.1049\/iet-ifs.2014.0245 .","journal-title":"IET. Info. Secur."},{"key":"611_CR25","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/s10916-016-0514-5","volume":"40","author":"PLK Mantos","year":"2016","unstructured":"Mantos, P.L.K., and Maglogiannis, I., Sensitive patient data hiding using a ROI reversible steganography scheme for DICOM images. J Med Syst. 40:156, 2016. doi: 10.1007\/s10916-016-0514-5 .","journal-title":"J Med Syst"},{"key":"611_CR26","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1016\/j.image.2013.09.006","volume":"29","author":"C Dong","year":"2014","unstructured":"Dong, C., Colour image encryption using one-time keys and coupled chaotic systems. Signal. Process. Image. Commun. 29:628\u2013640, 2014. doi: 10.1016\/j.image.2013.09.006 .","journal-title":"Signal. Process. Image. Commun."},{"key":"611_CR27","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1016\/j.chaos.2006.05.011","volume":"35","author":"S Behnia","year":"2008","unstructured":"Behnia, S., Akhshani, A., Mahmodi, H., and Akhavan, A., A novel algorithm for image encryption based on mixture of chaotic maps. Chaos. Soliton. Fract. 35:408\u2013419, 2008. doi: 10.1016\/j.chaos.2006.05.011 .","journal-title":"Chaos. Soliton. Fract."},{"issue":"11\u201312","key":"611_CR28","doi-asserted-by":"publisher","first-page":"2028","DOI":"10.1016\/j.mcm.2010.06.005","volume":"52","author":"Q Zhang","year":"2010","unstructured":"Zhang, Q., Guo, L., and Wei, X., Image encryption using DNA addition combining with chaotic maps. Math. Comp. Model. 52(11\u201312):2028\u20132035, 2010. doi: 10.1016\/j.mcm.2010.06.005 .","journal-title":"Math. Comp. Model."},{"key":"611_CR29","doi-asserted-by":"publisher","first-page":"e115773","DOI":"10.1371\/journal.pone.0115773","volume":"9","author":"C Fu","year":"2014","unstructured":"Fu, C., Zhang, G., Bian, O., Lei, W., and Ma, H., A novel medical image protection scheme using a 3-dimensional chaotic system. PLoS. One. 9:e115773, 2014. doi: 10.1371\/journal.pone.0115773 .","journal-title":"PLoS. One."},{"key":"611_CR30","doi-asserted-by":"publisher","first-page":"2943","DOI":"10.1016\/j.cnsns.2011.11.030","volume":"17","author":"A Kanso","year":"2012","unstructured":"Kanso, A., and Ghebleh, M., A novel image encryption algorithm based on a 3D chaotic map. Commun. Nonlinear. Sci. Numer. Simul. 17:2943\u20132959, 2012. doi: 10.1016\/j.cnsns.2011.11.030 .","journal-title":"Commun. Nonlinear. Sci. Numer. Simul."},{"key":"611_CR31","doi-asserted-by":"publisher","first-page":"1202","DOI":"10.1016\/j.sigpro.2011.11.004","volume":"92","author":"SM Seyedzadeh","year":"2012","unstructured":"Seyedzadeh, S.M., and Mirzakuchaki, S., A fast color image encryption algorithm based on coupled two-dimensinal piecewise chaotic map. Signal. Process. 92:1202\u20131215, 2012. doi: 10.1016\/j.sigpro.2011.11.004 .","journal-title":"Signal. Process."},{"key":"611_CR32","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/240749","author":"S Zhang","year":"2014","unstructured":"Zhang, S., Gao, T., and Gao, L., A novel encryption frame for medical image with watermark based on hyperchaotic system. Math. Probl. Engg., 2014. doi: 10.1155\/2014\/240749 .","journal-title":"Math. Probl. Engg."},{"key":"611_CR33","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon, C.E., A mathematical theory of communication. Bell. Syst. Tech. J. 27:379\u2013423, 1948. doi: 10.1002\/j.1538-7305.1948.tb01338.x .","journal-title":"Bell. Syst. Tech. J."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0611-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0611-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0611-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T14:03:04Z","timestamp":1497967384000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0611-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,21]]},"references-count":33,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["611"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0611-5","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,21]]},"article-number":"232"}}