{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:56:41Z","timestamp":1771700201616,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T00:00:00Z","timestamp":1505174400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s10916-017-0809-1","type":"journal-article","created":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T04:16:47Z","timestamp":1505189807000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Medical Images are Safe \u2013 an Enhanced Chaotic Scrambling Approach"],"prefix":"10.1007","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5843-5512","authenticated-orcid":false,"given":"M. Y.","family":"Mohamed Parvees","sequence":"first","affiliation":[]},{"given":"J.","family":"Abdul Samath","sequence":"additional","affiliation":[]},{"given":"B.","family":"Parameswaran Bose","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,12]]},"reference":[{"issue":"4\u20136","key":"809_CR1","doi-asserted-by":"publisher","first-page":"1296","DOI":"10.1016\/j.neucom.2008.11.005","volume":"72","author":"SG Lian","year":"2009","unstructured":"Lian, S.G., A bloc cipher based on chaotic neural networks. Neurocomputing. 72(4\u20136):1296\u20131301, 2009 \nhttps:\/\/doi.org\/10.1016\/j.neucom.2008.11.005\n\n.","journal-title":"Neurocomputing"},{"key":"809_CR2","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich, J., Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos. 8:1259\u20131284, 1998 \nhttps:\/\/doi.org\/10.1142\/S021812749800098X\n\n.","journal-title":"Int J Bifurcat Chaos"},{"key":"809_CR3","doi-asserted-by":"publisher","unstructured":"Parvees, M.Y.M., Samath, J.A., Raj, I.K., Bose, B.P., (2016) International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 1067\u20131072. \nhttps:\/\/doi.org\/10.1109\/ICEEOT.2016.7754851","DOI":"10.1109\/ICEEOT.2016.7754851"},{"key":"809_CR4","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","volume":"128","author":"A Belazi","year":"2016","unstructured":"Belazi, A., Ahmed, A., El-Latif, A., and Belghith, S., A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process. 128:155\u2013170, 2016. \nhttps:\/\/doi.org\/10.1016\/j.sigpro.2016.03.021\n\n.","journal-title":"Signal Process"},{"key":"809_CR5","doi-asserted-by":"publisher","unstructured":"Assad, S.E., and Farajallah, M., A new chaos-based image encryption system. Signal process. Image Commun. 41:144\u2013157, 2016. \nhttps:\/\/doi.org\/10.1016\/j.image.2015.10.004\n\n.","DOI":"10.1016\/j.image.2015.10.004"},{"issue":"3","key":"809_CR6","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1016\/j.cnsns.2014.06.032","volume":"20","author":"J Chen","year":"2015","unstructured":"Chen, J., Zhu, Z., Fu, C., Yu, H., and Zhang, L., A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Commun Nonlinear Sci Numer Simul. 20(3):846\u2013860, 2015 \nhttps:\/\/doi.org\/10.1016\/j.cnsns.2014.06.032\n\n.","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"809_CR7","doi-asserted-by":"publisher","unstructured":"Ye, G., Huang, X., (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Security Comm Netw., \nhttps:\/\/doi.org\/10.1002\/sec.1458\n\n.","DOI":"10.1002\/sec.1458"},{"issue":"18","key":"809_CR8","doi-asserted-by":"publisher","first-page":"3335","DOI":"10.1002\/sec.1257","volume":"8","author":"P Praveenkumar","year":"2015","unstructured":"Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., and Rayappan, J.B.B., Triple chaotic image scrambling on RGB \u2013 A random image encryption approach. Security Comm Netw. 8(18):3335\u20133345, 2015 \nhttps:\/\/doi.org\/10.1002\/sec.1257\n\n.","journal-title":"Security Comm Netw"},{"key":"809_CR9","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.compbiomed.2016.03.020","volume":"72","author":"D Ravichandran","year":"2016","unstructured":"Ravichandran, D., Praveenkumar, P., Rayappan, J.B.B., and Amirtharajan, R., Chaos based crossover and mutation for securing DICOM image. Comp Biol and Med. 72:170\u2013184, 2016 \nhttps:\/\/doi.org\/10.1016\/j.compbiomed.2016.03.020\n\n.","journal-title":"Comp Biol and Med"},{"key":"809_CR10","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/s10916-016-0611-5","volume":"40","author":"MYM Parvees","year":"2016","unstructured":"Parvees, M.Y.M., Samath, J.A., and Bose, B.P., Secured medical images - a chaotic pixel scrambling approach. J Med Syst. 40:232, 2016 \nhttps:\/\/doi.org\/10.1007\/s10916-016-0611-5\n\n.","journal-title":"J Med Syst."},{"key":"809_CR11","doi-asserted-by":"publisher","unstructured":"Liu, G., Li, J., and Liu, H., Chaos-based color pathological image encryption scheme using one-time keys. Comput Biol Med. 45:111\u2013117. , 2014. \nhttps:\/\/doi.org\/10.1016\/j.compbiomed.2013.11.010\n\n.","DOI":"10.1016\/j.compbiomed.2013.11.010"},{"key":"809_CR12","doi-asserted-by":"publisher","unstructured":"Fu, C., Meng, W.H, Zhan, Y.F, Zhu, Z.L, Lau, F.C., Tse, C.K., and Ma, H.F, An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med. 43:1000\u20131010, 2013  https:\/\/doi.org\/10.1016\/j.compbiomed.2013.05.005  .","DOI":"10.1016\/j.compbiomed.2013.05.005"},{"key":"809_CR13","doi-asserted-by":"publisher","unstructured":"Zhang, S., Gao, T., and Gao, L., A novel encryption frame for medical image with watermark based on hyperchaotic system. Math Probl Eng., 2014 \nhttps:\/\/doi.org\/10.1155\/2014\/240749\n\n.","DOI":"10.1155\/2014\/240749"},{"key":"809_CR14","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1016\/j.compbiomed.2015.04.031","volume":"62","author":"P Praveenkumar","year":"2015","unstructured":"Praveenkumar, P., Amirtharajan, R., and Thenmozhi, K., Medical data sheet in safe havens \u2013 A tri-layer cryptic solution. Comput Biol Med. 62:264\u2013276, 2015 \nhttps:\/\/doi.org\/10.1016\/j.compbiomed.2015.04.031\n\n.","journal-title":"Comput Biol Med"},{"key":"809_CR15","doi-asserted-by":"publisher","unstructured":"Dzwonkowski, M., Papaj, M., and Rykaczewski, R., A new quaternion-based encryption method for DICOM images. IEEE Trans Image Process, 2015 \nhttps:\/\/doi.org\/10.1109\/TIP.2015.2467317\n\n.","DOI":"10.1109\/TIP.2015.2467317"},{"key":"809_CR16","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1049\/iet-ifs.2014.0245","volume":"9","author":"A Al-Haj","year":"2015","unstructured":"Al-Haj, A., Abandah, G., and Hussein, N., Crypto-based algorithms for secured medical. IET Info Secur. 9:365\u2013373, 2015 \nhttps:\/\/doi.org\/10.1049\/iet-ifs.2014.0245\n\n.","journal-title":"IET Info Secur"},{"key":"809_CR17","doi-asserted-by":"publisher","unstructured":"Jeyamala, C., and Thiruvengadam, S.J., A hybrid chaotic and number theoretic approach for securing DICOM images. Security and Communications Networks, 2017. \nhttps:\/\/doi.org\/10.1155\/2017\/6729896\n\n.","DOI":"10.1155\/2017\/6729896"},{"key":"809_CR18","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.sigpro.2016.10.003","volume":"132","author":"W Cao","year":"2017","unstructured":"Cao, W., Zhou, Y., Philip, C.L.P., and Xia, L., Medical image encryption using edge maps. Signal Processing. 132:96\u2013109, 2017.","journal-title":"Signal Processing."},{"issue":"11","key":"809_CR19","doi-asserted-by":"publisher","first-page":"1650193","DOI":"10.1142\/S0218127416501935","volume":"26","author":"D Xiao","year":"2016","unstructured":"Xiao, D., Fu, Q., Xiang, T., and Zhang, Y., Chaotic image encryption of regions of interest. International Journal of Bifurcation and Chaos. 26(11):1650193, 2016. \nhttps:\/\/doi.org\/10.1142\/S0218127416501935\n\n.","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"809_CR20","doi-asserted-by":"publisher","first-page":"e115773","DOI":"10.1371\/journal.pone.0115773","volume":"9","author":"C Fu","year":"2014","unstructured":"Fu, C., Zhang, G., Bian, O., Lei, W., and Ma, H., A novel medical image protection scheme using a 3-dimensional chaotic system. PLoS One. 9:e115773, 2014 \nhttps:\/\/doi.org\/10.1371\/journal.pone.0115773\n\n.","journal-title":"PLoS One"},{"key":"809_CR21","doi-asserted-by":"publisher","first-page":"2943","DOI":"10.1016\/j.cnsns.2011.11.030","volume":"17","author":"A Kanso","year":"2012","unstructured":"Kanso, A., and Ghebleh, M., A novel image encryption algorithm based on a 3D chaotic map. Commun. Nonlinear Sci Numer Simul. 17:2943\u20132959, 2012 \nhttps:\/\/doi.org\/10.1016\/j.cnsns.2011.11.030\n\n.","journal-title":"Commun. Nonlinear Sci Numer Simul"},{"key":"809_CR22","doi-asserted-by":"publisher","first-page":"1202","DOI":"10.1016\/j.sigpro.2011.11.004","volume":"92","author":"SM Seyedzadeh","year":"2012","unstructured":"Seyedzadeh, S.M., and Mirzakuchaki, S., A fast color image encryption algorithm based on coupled two-dimensinal piecewise chaotic map. Signal Process. 92:1202\u20131215, 2012 \nhttps:\/\/doi.org\/10.1016\/j.sigpro.2011.11.004\n\n.","journal-title":"Signal Process"},{"key":"809_CR23","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.cnsns.2014.12.005","volume":"24","author":"A Kanso","year":"2015","unstructured":"Kanso, A., and Ghebleh, M., An efficient and robust image encryption scheme for medical applications. Commun Nonlinear Sci Numer Simul. 24:98\u2013116, 2015 \nhttps:\/\/doi.org\/10.1016\/j.cnsns.2014.12.005\n\n.","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"809_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3923\/rjit.2016.1.9","volume":"8","author":"P Padmapriya","year":"2016","unstructured":"Padmapriya, P., Rajalakshmi, P., Thenmozhi, K., Rayappan, J.B.B., and Amirtharajan, R., Horse DNA runs on image: A novel road to image encryption. Res J Inform Technol. 8:1\u20139, 2016 \nhttps:\/\/doi.org\/10.3923\/rjit.2016.1.9\n\n.","journal-title":"Res J Inform Technol"},{"issue":"8","key":"809_CR25","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1109\/42.938246","volume":"20","author":"XQ Zhou","year":"2001","unstructured":"Zhou, X.Q., Huang, H.K., and Lou, S.L., Authenticity and integrity of digital mammography images. IEEE Trans Med Imag. 20(8):784\u2013791, 2001. \nhttps:\/\/doi.org\/10.1109\/42.938246\n\n.","journal-title":"IEEE Trans Med Imag."},{"issue":"4","key":"809_CR26","doi-asserted-by":"publisher","first-page":"582","DOI":"10.5120\/4905-7416","volume":"13","author":"LOM Kobayashi","year":"2009","unstructured":"Kobayashi, L.O.M., Furuie, S.S., and Barreto, P.S.L.M., Providing integrity and authenticity in DICOM images: A novel approach. IEEE Trans Inf Technol Biomed. 13(4):582\u2013589, 2009. \nhttps:\/\/doi.org\/10.5120\/4905-7416\n\n.","journal-title":"IEEE Trans Inf Technol Biomed"},{"issue":"3","key":"809_CR27","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1007\/s10278-010-9295-4","volume":"24","author":"CK Tan","year":"2011","unstructured":"Tan, C.K., Ng, J.C., Xu, X., Poh, C.L., Guan, Y.L., and Sheah, K., Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging. 24(3):528\u2013540, 2011. \nhttps:\/\/doi.org\/10.1007\/s10278-010-9295-4\n\n.","journal-title":"J Digit Imaging"},{"issue":"14","key":"809_CR28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v008.i14","volume":"8","author":"G Marsaglia","year":"2003","unstructured":"Marsaglia, G., Xorshift RNGs. J Stat Softw. 8(14):1\u20136, 2003 \nhttp:\/\/dx.doi.org\/10.18637\/jss.v008.i14\n\n.","journal-title":"J Stat Softw"},{"key":"809_CR29","volume-title":"A first course in Monte Carlo","author":"GS Fishman","year":"2006","unstructured":"Fishman, G.S., A first course in Monte Carlo. Thomson Brooks\/Cole, Belmont, CA, 2006."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-017-0809-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-017-0809-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-017-0809-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,21]],"date-time":"2017-09-21T23:41:13Z","timestamp":1506037273000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-017-0809-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,12]]},"references-count":29,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["809"],"URL":"https:\/\/doi.org\/10.1007\/s10916-017-0809-1","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9,12]]},"article-number":"167"}}