{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T10:43:33Z","timestamp":1769337813984,"version":"3.49.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T00:00:00Z","timestamp":1537574400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s10916-018-1053-z","type":"journal-article","created":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T00:08:57Z","timestamp":1537574937000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":77,"title":["Medical Image Security Using Dual Encryption with Oppositional Based Optimization Algorithm"],"prefix":"10.1007","volume":"42","author":[{"given":"T.","family":"Avudaiappan","sequence":"first","affiliation":[]},{"given":"R.","family":"Balasubramanian","sequence":"additional","affiliation":[]},{"given":"S. Sundara","family":"Pandiyan","sequence":"additional","affiliation":[]},{"given":"M.","family":"Saravanan","sequence":"additional","affiliation":[]},{"given":"S. K.","family":"Lakshmanaprabu","sequence":"additional","affiliation":[]},{"given":"K.","family":"Shankar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,22]]},"reference":[{"key":"1053_CR1","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.optlaseng.2017.11.005","volume":"103","author":"MH Annaby","year":"2018","unstructured":"Annaby, M. H., Rushdi, M. A., and Nehary, E. A., Color image encryption using random transforms, phase retrieval, chaotic maps, and diffusion. Opt. Lasers Eng. 103:9\u201323, 2018.","journal-title":"Opt. Lasers Eng."},{"key":"1053_CR2","doi-asserted-by":"publisher","unstructured":"Abdel-Basset, M., Gunasekaran, M., Mohamed, M. et al., A novel method for solving the fully neutrosophic linear programming problems. Neural Comput & Applic. 1\u201311, 2018. \n                    https:\/\/doi.org\/10.1007\/s00521-018-3404-6\n                    \n                  .","DOI":"10.1007\/s00521-018-3404-6"},{"key":"1053_CR3","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.ijleo.2017.09.099","volume":"153","author":"X Liao","year":"2018","unstructured":"Liao, X., Hahsmi, M. A., and Haider, R., An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos. Optik 153:117\u2013134, 2018.","journal-title":"Optik"},{"key":"1053_CR4","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlastec.2017.09.008","volume":"99","author":"J Chen","year":"2018","unstructured":"Chen, J., Zhang, Y., Qi, L., Fu, C., and Xu, L., Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression. Opt. Laser Technol. 99:238\u2013248, 2018.","journal-title":"Opt. Laser Technol."},{"key":"1053_CR5","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.optlaseng.2017.10.010","volume":"101","author":"Y Xiong","year":"2018","unstructured":"Xiong, Y., Quan, C., and Tay, C. J., Multiple image encryption scheme based on pixel exchange operation and vector decomposition. Opt. Lasers Eng. 101:113\u2013121, 2018.","journal-title":"Opt. Lasers Eng."},{"key":"1053_CR6","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.future.2018.06.024","volume":"89","author":"Mohamed Abdel-Basset","year":"2018","unstructured":"Abdel-Basset, M., Gunasekaran, M., Mohamed, M. and Chilamkurti, N., Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem. Future Generation Computer Systems. 89:19\u201330, 2018.","journal-title":"Future Generation Computer Systems"},{"key":"1053_CR7","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.jare.2018.01.009","volume":"10","author":"Samar M. Ismail","year":"2018","unstructured":"Ismail, S. M., Said, L. A., Radwan, A. G., Madian, A. H. and Abu-Elyazeed, M. F., Generalized double-humped logistic map-based medical image encryption. Journal of Advanced Research. 10:85\u201398, 2018.","journal-title":"Journal of Advanced Research"},{"key":"1053_CR8","doi-asserted-by":"publisher","unstructured":"Abdel-Basset, M., Manogaran, G., Fakhry, A.E. and El-Henawy, I., 2-Levels of clustering strategy to detect and locate copy-move forgery in digital images. Multimedia Tools and Applications. 1\u201319, 2018.\u00a0\n                    https:\/\/doi.org\/10.1007\/s11042-018-6266-0\n                    \n                  .","DOI":"10.1007\/s11042-018-6266-0"},{"key":"1053_CR9","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.sigpro.2016.10.003","volume":"132","author":"W Cao","year":"2017","unstructured":"Cao, W., Zhou, Y., Chen, C. P., and Xia, L., Medical image encryption using edge maps. Signal Process. 132:96\u2013109, 2017.","journal-title":"Signal Process."},{"key":"1053_CR10","doi-asserted-by":"crossref","unstructured":"Abdel-Nabi, H., Al-Haj, A., Medical imaging security using partial encryption and histogram shifting watermarking. In: Information Technology (ICIT), 2017 8th International Conference on (pp. 802\u2013807). IEEE., 2017.","DOI":"10.1109\/ICITECH.2017.8079950"},{"issue":"2","key":"1053_CR11","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/CC.2017.7868160","volume":"14","author":"K Shankar","year":"2017","unstructured":"Shankar, K., and Eswaran, P., RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun. 14(2):118\u2013130, 2017.","journal-title":"China Commun."},{"key":"1053_CR12","first-page":"705","volume-title":"Advances in Intelligent Systems and Computing","author":"K. Shankar","year":"2016","unstructured":"Shankar, K., and Eswaran, P., An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm. Artificial Intelligence and Evolutionary Computations in Engineering Systems. Springer, New Delhi. 705\u2013714, 2016."},{"key":"1053_CR13","doi-asserted-by":"crossref","unstructured":"Puech, W., Image encryption and compression for medical image security. In: Image Processing Theory, Tools and Applications, 2008. IPTA 2008. First Workshops on (pp. 1\u20132). IEEE, 2008.","DOI":"10.1109\/IPTA.2008.4743800"},{"key":"1053_CR14","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/j.procs.2017.08.026","volume":"112","author":"MK Abdmouleh","year":"2017","unstructured":"Abdmouleh, M. K., Khalfallah, A., and Bouhlel, M. S., A novel selective encryption scheme for medical images transmission based-on JPEG compression algorithm. Procedia Comput. Sci. 112:369\u2013376, 2017.","journal-title":"Procedia Comput. Sci."},{"key":"1053_CR15","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1016\/j.procs.2015.08.070","volume":"58","author":"QA Kester","year":"2015","unstructured":"Kester, Q. A., Nana, L., Pascu, A. C., Gire, S., Eghan, J. M., and Quaynor, N. N., A cryptographic technique for security of medical images in health information systems. Procedia Comput. Sci. 58:538\u2013543, 2015.","journal-title":"Procedia Comput. Sci."},{"key":"1053_CR16","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.ijleo.2017.08.028","volume":"147","author":"DS Laiphrakpam","year":"2017","unstructured":"Laiphrakpam, D. S., and Khumanthem, M. S., Medical image encryption based on improved ElGamal encryption technique. Optik 147:88\u2013102, 2017.","journal-title":"Optik"},{"key":"1053_CR17","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1016\/j.procs.2015.10.080","volume":"70","author":"K Shankar","year":"2015","unstructured":"Shankar, K., and Eswaran, P., Sharing a secret image with encapsulated shares in visual cryptography. Procedia Comput. Sci. 70:462\u2013468, 2015.","journal-title":"Procedia Comput. Sci."},{"issue":"9","key":"1053_CR18","first-page":"130","volume":"4","author":"A Mahmood","year":"2013","unstructured":"Mahmood, A., Hamed, T., Obimbo, C., and Dony, R., Improving the security of the medical images. Int. J. Adv. Comput. Sci. Appl. 4(9):130\u2013136, 2013.","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"3","key":"1053_CR19","first-page":"30","volume":"104","author":"S Madhu","year":"2014","unstructured":"Madhu, S., and Hussain, M. A., Securing medical images by image encryption usingthekey image. Int. J. Comput. Appl. 104(3):30\u201334, 2014.","journal-title":"Int. J. Comput. Appl."},{"key":"1053_CR20","doi-asserted-by":"publisher","unstructured":"Abdel-Basset, M., Manogaran, G., Rashad, H. and Zaied, A. N. H., A comprehensive review of quadratic assignment problem: variants, hybrids and applications. Journal of Ambient Intelligence and Humanized Computing. 1\u201324, 2018.\u00a0\n                    https:\/\/doi.org\/10.1007\/s12652-018-0917-x\n                    \n                  .","DOI":"10.1007\/s12652-018-0917-x"},{"key":"1053_CR21","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1016\/j.procs.2015.08.070","volume":"58","author":"QA Kester","year":"2015","unstructured":"Kester, Q. A., Nana, L., Pascu, A. C., Gire, S., Eghan, J. M., and Quaynor, N. N., A cryptographic technique for security of medical images in health information systems. Procedia Comput. Sci. 58:538\u2013543, 2015.","journal-title":"Procedia Comput. Sci."},{"key":"1053_CR22","doi-asserted-by":"crossref","unstructured":"Abdel-Basset, M., Manogaran, G., Gamal, A., Smarandache, F., A hybrid approach of neutrosophic sets and DEMATEL method for developing supplier selection criteria. Des. Autom. Embed. Syst.:1\u201322, 2018.","DOI":"10.1007\/s10617-018-9203-6"},{"key":"1053_CR23","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.cnsns.2014.12.005","volume":"24","author":"A Kanso","year":"2015","unstructured":"Kanso, A., and Ghebleh, M., An efficient and robust image encryption scheme for medical applications. Communications in Nonlinear Science and Numerical Simulation. 24:98\u2013116, 2015.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"key":"1053_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.image.2015.03.005","volume":"35","author":"JB Lima","year":"2015","unstructured":"Lima, J. B., Madeiro, F., and Sales, F. J. R., Encryption of medical images based on the cosine number transform. Signal Process. Image Commun. 35:1\u20138, 2015.","journal-title":"Signal Process. Image Commun."},{"key":"1053_CR25","doi-asserted-by":"crossref","unstructured":"Mukhedkar, M., Powar, P., Gaikwad, P., Secure nonreal time image encryption algorithm development using cryptography & Steganography. In: India Conference (INDICON), 2015 Annual IEEE (pp. 1\u20136). IEEE, 2015.","DOI":"10.1109\/INDICON.2015.7443808"},{"key":"1053_CR26","doi-asserted-by":"publisher","unstructured":"Daniel, R. M., Rajsingh, E. B. and Silas, S. A., Forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography. Journal of King Saud University-Computer and Information Sciences. 2018. \n                    https:\/\/doi.org\/10.1016\/j.jksuci.2018.02.004","DOI":"10.1016\/j.jksuci.2018.02.004"},{"key":"1053_CR27","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.eswa.2016.03.047","volume":"57","author":"E Nabil","year":"2016","unstructured":"Nabil, E., A modified flower pollination algorithm for global optimization. Expert Syst. Appl. 57:192\u2013203, 2016.","journal-title":"Expert Syst. Appl."},{"key":"1053_CR28","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1016\/j.future.2018.04.051","volume":"86","author":"Mohamed Abdel-Basset","year":"2018","unstructured":"Abdel-Basset, M., Manogaran, G. and Mohamed, M., Internet of Things (IoT) and its impact on supply chain: A framework for building smart, secure and efficient systems. Future Generation Computer Systems. 86:614\u2013628, 2018.","journal-title":"Future Generation Computer Systems"},{"issue":"9","key":"1053_CR29","first-page":"22","volume":"7","author":"K Shankar","year":"2018","unstructured":"Shankar, K., and Lakshmanaprabu, S. K., Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. International Journal of Engineering & Technology 7(9):22\u201327, 2018.","journal-title":"International Journal of Engineering & Technology"},{"key":"1053_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.micpro.2017.10.013","volume":"56","author":"S Janakiraman","year":"2018","unstructured":"Janakiraman, S., Thenmozhi, K., Rayappan, J. B. B., and Amirtharajan, R., Lightweight chaotic image encryption algorithm for the real-time embedded system: Implementation and analysis on the32-bit microcontroller. Microprocess. Microsyst. 56:1\u201312, 2018.","journal-title":"Microprocess. Microsyst."},{"issue":"11","key":"1053_CR31","doi-asserted-by":"publisher","first-page":"1650138","DOI":"10.1142\/S0218126616501383","volume":"25","author":"K Shankar","year":"2016","unstructured":"Shankar, K., and Eswaran, P., RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. J. Circuits Syst. Comp. 25(11):1650138, 2016.","journal-title":"J. Circuits Syst. Comp."},{"key":"1053_CR32","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.future.2018.03.020","volume":"85","author":"M Abdel-Basset","year":"2018","unstructured":"Abdel-Basset, M., Manogaran, G., El-Shahat, D., and Mirjalili, S., A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem. Futur. Gener. Comput. Syst. 85:129\u2013145, 2018.","journal-title":"Futur. Gener. Comput. Syst."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-018-1053-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-018-1053-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-018-1053-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T19:08:07Z","timestamp":1569092887000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-018-1053-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,22]]},"references-count":32,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["1053"],"URL":"https:\/\/doi.org\/10.1007\/s10916-018-1053-z","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,22]]},"assertion":[{"value":"20 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 September 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"All the authors declare that there is no conflict of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"208"}}