{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:56:41Z","timestamp":1771700201356,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T00:00:00Z","timestamp":1562198400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T00:00:00Z","timestamp":1562198400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s10916-019-1389-z","type":"journal-article","created":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T14:35:29Z","timestamp":1562250929000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":54,"title":["Fast and Secure Medical Image Encryption Based on Non Linear 4D Logistic Map and DNA Sequences (NL4DLM_DNA)"],"prefix":"10.1007","volume":"43","author":[{"given":"Shalini","family":"Stalin","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Priti","family":"Maheshwary","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Piyush Kumar","family":"Shukla","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Manish","family":"Maheshwari","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bhupesh","family":"Gour","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ankur","family":"Khare","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,7,4]]},"reference":[{"key":"1389_CR1","doi-asserted-by":"publisher","first-page":"28","DOI":"10.3390\/e17010028","volume":"17","author":"X Huang","year":"2015","unstructured":"Huang, X., Sun, T., Li, Y., and Liang, J., A color image encryption algorithm based on a fractional-order Hyperchaotic system. Entropy, MDPI 17:28\u201338, 2015. \n                              https:\/\/doi.org\/10.3390\/e17010028\n                              \n                           .","journal-title":"Entropy, MDPI"},{"key":"1389_CR2","doi-asserted-by":"publisher","first-page":"181","DOI":"10.3390\/e17010181","volume":"17","author":"X Tong","year":"2015","unstructured":"Tong, X., Yang, L., Zhang, M., Xu, H., and Zhu, W., An image encryption scheme based on Hyperchaotic Ra, binovich and exponential Chaos maps. Entropy, MDPI 17:181\u2013196, 2015. \n                              https:\/\/doi.org\/10.3390\/e17010181\n                              \n                           .","journal-title":"Entropy, MDPI"},{"issue":"4","key":"1389_CR3","first-page":"609","volume":"80","author":"X Huang","year":"2012","unstructured":"Huang, X., A new digital image encryption algorithm based on 4D chaotic system. International Journal of Pure and Applied Mathematics 80(4):609\u2013616, 2012.","journal-title":"International Journal of Pure and Applied Mathematics"},{"key":"1389_CR4","doi-asserted-by":"crossref","unstructured":"Tian, Y., and Lu, Z., Novel permutation-diffusion image encryption algorithm with chaotic dynamic S-box and DNA sequence operation. AIP Advances:1\u201323, 2017.","DOI":"10.1063\/1.4994860"},{"issue":"11","key":"1389_CR5","first-page":"1","volume":"56","author":"S Sun","year":"2017","unstructured":"Sun, S., Chaotic image encryption scheme using two-by-two deoxyribonucleic acid complementary rules. Optical Engineering 56(11):1\u201310, 2017.","journal-title":"Optical Engineering"},{"key":"1389_CR6","first-page":"27","volume":"3","author":"F Elamrawy","year":"2018","unstructured":"Elamrawy, F., Sharkas, M., and Nasser, A. M., An image encryption based on DNA coding and 2DLogistic chaotic map. International Journal of Signal Processing 3:27\u201332, 2018.","journal-title":"International Journal of Signal Processing"},{"key":"1389_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/8402578","volume":"2018","author":"Guodong Ye","year":"2018","unstructured":"Ye, G., Jiao, K., Pan, C., and Huang, X., An effective framework for chaotic image encryption based on 3D logistic map. Hindawi Security and Communication Networks:1\u201311, 2018. \n                              https:\/\/doi.org\/10.1155\/2018\/8402578\n                              \n                           .","journal-title":"Security and Communication Networks"},{"key":"1389_CR8","doi-asserted-by":"publisher","first-page":"6954","DOI":"10.3390\/e17106954","volume":"17","author":"C Song","year":"2015","unstructured":"Song, C., and Qiao, Y., A novel image encryption algorithm based on DNA encoding and spatiotemporal Chaos. MDPI, Entropy 17:6954\u20136968, 2015. \n                              https:\/\/doi.org\/10.3390\/e17106954\n                              \n                           .","journal-title":"MDPI, Entropy"},{"issue":"15","key":"1389_CR9","doi-asserted-by":"publisher","first-page":"2533","DOI":"10.1109\/JLT.2013.2267891","volume":"31","author":"AM Elshamy","year":"2013","unstructured":"Elshamy, A. M., Rashed, A. N. Z., Mohamed, A. E.-N. A., Faragalla, O. S., Yi, M., Alshebeili, S. A., and Abd El-Samie, F. E., Optical image encryption based on chaotic baker map and double random phase encoding. Journal Of Lightwave Technology 31(15):2533\u20132539, 2013.","journal-title":"Journal Of Lightwave Technology"},{"issue":"201","key":"1389_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/e18050201","volume":"18","author":"A Khare","year":"2016","unstructured":"Khare, A., Shukla, P. K., Rizvi, M. A., and Stalin, S., An intelligent and fast chaotic encryption using digital logic circuits for ad-hoc and ubiquitous computing. Entropy, MDPI 18(201):1\u201327, 2016. \n                              https:\/\/doi.org\/10.3390\/e18050201\n                              \n                           .","journal-title":"Entropy, MDPI"},{"issue":"1","key":"1389_CR11","first-page":"47","volume":"41","author":"AC D_asc_alescu","year":"2014","unstructured":"D_asc_alescu, A. C., Boriga, R., and Mih_ailescu, M. I., A novel chaos-based image encryption scheme. Annals of the University of Craiova, Mathematics and Computer Science Series 41(1):47\u201358, 2014.","journal-title":"Annals of the University of Craiova, Mathematics and Computer Science Series"},{"key":"1389_CR12","doi-asserted-by":"crossref","unstructured":"Bakhache, B., Ahmad, K., and Assad, S. E. I., Chaos based improvement of the security of ZigBee and Wi-fi networks used for industrial controls. IEEE:139\u2013145, 2011.","DOI":"10.1109\/i-Society18435.2011.5978525"},{"key":"1389_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2013\/537934","volume":"2013","author":"Xizhong Wang","year":"2013","unstructured":"Wang, X., and Chen, D., A parallel encryption algorithm based on piecewise linear chaotic map. Mathematical problems in engineering, Hindawi:1\u20138, 2013. \n                              https:\/\/doi.org\/10.1155\/2013\/537934\n                              \n                           .","journal-title":"Mathematical Problems in Engineering"},{"key":"1389_CR14","first-page":"17","volume":"28","author":"A Haddush Fitwi","year":"2011","unstructured":"Haddush Fitwi, A., and Nouh, S., Performance analysis of chaotic encryption using a shared image as a key. Journal of EEA 28:17\u201329, 2011.","journal-title":"Journal of EEA"},{"issue":"1","key":"1389_CR15","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s11277-015-2378-2","volume":"83","author":"Dianli Guo","year":"2015","unstructured":"Guo, D., Wen, Q., Li, W., Zhang, H., and Jin, Z., Analysis and improvement of \u2018chaotic map based Mobile dynamic ID authenticated key agreement scheme. Wireless Pers Commun, springer science+business media New York:1\u201314, 2015. \n                              https:\/\/doi.org\/10.1007\/s11277-015-2378-2)\n                              \n                           .","journal-title":"Wireless Personal Communications"},{"key":"1389_CR16","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/j.chaos.2005.08.110","volume":"29","author":"H Gao","year":"2006","unstructured":"Gao, H., Zhang, Y., Liang, S., and Li, D., A new chaotic algorithm for image encryption. Chaos, Solitons and Fractals, Elsevier 29:393\u2013399, 2006. \n                              https:\/\/doi.org\/10.1016\/j.chaos.2005.08.110\n                              \n                           .","journal-title":"Chaos, Solitons and Fractals, Elsevier"},{"issue":"276","key":"1389_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/e18080276","volume":"18","author":"H Zhu","year":"2016","unstructured":"Zhu, H., Zhang, X., Yu, H., Zhao, C., and Zhu, Z., A novel image encryption scheme using the composite discrete chaotic system. Entropy , MDPI 18(276):1\u201327, 2016. \n                              https:\/\/doi.org\/10.3390\/e18080276\n                              \n                           .","journal-title":"Entropy , MDPI"},{"key":"1389_CR18","doi-asserted-by":"publisher","first-page":"1518","DOI":"10.1016\/j.chaos.2005.11.090","volume":"32","author":"HS Kwok","year":"2007","unstructured":"Kwok, H. S., and Tang, W. K. S., A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons and Fractals, Elsevier 32:1518\u20131529, 2007. \n                              https:\/\/doi.org\/10.1016\/j.chaos.2005.11.090\n                              \n                           .","journal-title":"Chaos, Solitons and Fractals, Elsevier"},{"issue":"5","key":"1389_CR19","doi-asserted-by":"publisher","first-page":"25","DOI":"10.5815\/ijcnis.2015.05.04","volume":"7","author":"Ma Junming","year":"2015","unstructured":"Junming, M., and Ruisong, Y., An image encryption scheme based on hybrid orbit of hyper-chaotic systems. I. J. Computer Network and Information Security, MECS (5):25\u201333, 2015. \n                              https:\/\/doi.org\/10.5815\/ijcnis.2015.05.04\n                              \n                           .","journal-title":"International Journal of Computer Network and Information Security"},{"issue":"289","key":"1389_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40064-016-1959-1","volume":"5","author":"L Liu","year":"2016","unstructured":"Liu, L., and Miao, S., A new image encryption algorithm based on logistic chaotic map with varying parameter. Springer Plus 5(289):1\u201312, 2016. \n                              https:\/\/doi.org\/10.1186\/s40064-016-1959-1\n                              \n                           .","journal-title":"Springer Plus"},{"key":"1389_CR21","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1016\/j.procs.2015.07.494","volume":"57","author":"M Ahmada","year":"2015","unstructured":"Ahmada, M., Shamsib, U., and Khan, I. R., An Enhanced Image Encryption Algorithm Using Fractional Chaotic Systems. Third International convention on Recent Trends in Computing, Procedia Computer Science, Elsevier 57:852\u2013859, 2015. \n                              https:\/\/doi.org\/10.1016\/j.procs.2015.07.494\n                              \n                           .","journal-title":"Third International convention on Recent Trends in Computing, Procedia Computer Science, Elsevier"},{"issue":"1","key":"1389_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0168207","volume":"12","author":"M Usama","year":"2017","unstructured":"Usama, M., and Zakaria, N., Chaos-based simultaneous compression and encryption for Hadoop. PLoS ONE 12(1):1\u201329, 2017. \n                              https:\/\/doi.org\/10.1371\/journal.pone.0168207\n                              \n                           .","journal-title":"PLoS ONE"},{"issue":"4","key":"1389_CR23","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.18576\/amis\/100407","volume":"10","author":"O Reyad","year":"2016","unstructured":"Reyad, O., Kotulski, Z., and Abd-Elhafiez, W. M., Image encryption using Chaos-driven elliptic curve Pseudo-random number generators. Appl. Math. Inf. Sci. 10(4):1283\u20131292, 2016. \n                              https:\/\/doi.org\/10.18576\/amis\/100407\n                              \n                           .","journal-title":"Appl. Math. Inf. Sci."},{"key":"1389_CR24","doi-asserted-by":"publisher","first-page":"1387 1410","DOI":"10.3390\/e17031387","volume":"17","author":"PK Shukla","year":"2015","unstructured":"Shukla, P. K., Khare, A., Rizvi, M. A., Stalin, S., and Kumar, S., Applied cryptography using Chaos function for fast digital logic-based Systems in Ubiquitous Computing. Entropy, MDPI 17:1387 1410, 2015. \n                              https:\/\/doi.org\/10.3390\/e17031387\n                              \n                           .","journal-title":"Entropy, MDPI"},{"issue":"2","key":"1389_CR25","doi-asserted-by":"publisher","first-page":"90","DOI":"10.2478\/jee-2014-0013","volume":"65","author":"X Wei","year":"2014","unstructured":"Wei, X., Wang, B., Zhang, Q., and Che, C., Image encryption based on chaotic map and reversible integer wavelet transform. Journal of Electrical Engineering 65(2):90\u201396, 2014.","journal-title":"Journal of Electrical Engineering"},{"issue":"5","key":"1389_CR26","doi-asserted-by":"publisher","first-page":"1202","DOI":"10.1016\/j.sigpro.2011.11.004","volume":"92","author":"Seyed Mohammad Seyedzadeh","year":"2012","unstructured":"Seyed Mohammad Seyedzadeh and Sattar Mirzakuchaki, \u201cA fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map\u201d, Signal Processing, Elsevier, vol. 92, 1202\u20131215, 2012. doi:\n                              https:\/\/doi.org\/10.1016\/j.sigpro.2011.11.004","journal-title":"Signal Processing"},{"key":"1389_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/536930","volume":"2014","author":"Ali Soleymani","year":"2014","unstructured":"Soleymani, A., Nordin, M. J., and Sundararajan, E., A chaotic cryptosystem for images based on Henon and Arnold cat map. The scientific world journal, Hindawi:1\u201321, 2014. \n                              https:\/\/doi.org\/10.1155\/2014\/536930\n                              \n                           .","journal-title":"The Scientific World Journal"},{"key":"1389_CR28","first-page":"1","volume":"2016","author":"Shu-Ying Wang","year":"2016","unstructured":"Shu-Ying Wang, Jian-Feng Zhao, Xian-Feng Li and Li-Tao Zhang, Image blocking encryption algorithm based on laser Chaos synchronization, journal of electrical and computer engineering, Hindawi, pp-1-15, 2016.","journal-title":"Journal of Electrical and Computer Engineering"},{"key":"1389_CR29","first-page":"133","volume":"32","author":"TS Kumar","year":"2016","unstructured":"Kumar, T. S., and Venkatesan, R., A new Image Encryption Method Based on Knight\u2019s Travel path and True random number. Journalof Information Science and Engineering 32:133\u2013152, 2016.","journal-title":"Journalof Information Science and Engineering"},{"key":"1389_CR30","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1016\/j.cnsns.2007.10.011","volume":"14","author":"W Xing-yuan","year":"2009","unstructured":"Xing-yuan, W., and Qing, Y., A block encryption algorithm based on dynamic sequences of multiple chaotic systems. Communications in Nonlinear Science and Numerical Simulation, Elsevier 14:574\u2013581, 2009. \n                              https:\/\/doi.org\/10.1016\/j.cnsns.2007.10.011\n                              \n                           .","journal-title":"Communications in Nonlinear Science and Numerical Simulation, Elsevier"},{"issue":"4","key":"1389_CR31","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1016\/j.jksuci.2016.02.003","volume":"29","author":"Bhaskar Mondal","year":"2017","unstructured":"Mondal, B., and Mandal, T., A light weight secure image encryption scheme based on chaos & DNA computing. Journal of King Saud University, Computer and Information Sciences:1\u20136, 2016. \n                              https:\/\/doi.org\/10.1016\/j.jksuci.2016.02.003\n                              \n                           .","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"issue":"2","key":"1389_CR32","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1515\/jee-2016-0012","volume":"67","author":"H Niu","year":"2016","unstructured":"Niu, H., Zhou, C., Wang, B., Zheng, X., and Zhou, S., Splicing model and hyper\u2013chaotic system for image encryption. Journal of Electrical Engineering 67(2):78\u201386, 2016. \n                              https:\/\/doi.org\/10.1515\/jee-2016-0012\n                              \n                           .","journal-title":"Journal of Electrical Engineering"},{"key":"1389_CR33","doi-asserted-by":"publisher","unstructured":"Keuninckx, L., Soriano, M. C., Fischer, I., Mirasso, C. R., Nguimdo, R. M., and Van der Sande, G., Encryption key distribution via chaos synchronization. Scientific Reports:1\u201314, 2017. \n                              https:\/\/doi.org\/10.1038\/srep43428\n                              \n                           .","DOI":"10.1038\/srep43428"},{"issue":"197","key":"1389_CR34","doi-asserted-by":"publisher","first-page":"180","DOI":"10.15446\/dyna.v83n197.53506","volume":"83","author":"Maricela Jim\u00e9nez Rodr\u00edguez","year":"2016","unstructured":"Jim\u00e9nez-Rodr\u00edguez, M., Gonz\u00e1lez-Novoa, M. G., Estrada-Guti\u00e9rrez, J. C., Acosta-L\u00faaa, C., and Flores-Siordia, O., Secure point-to-point communication using chaos. Universidad Nacional de Colombia, DYNA 83(197):180\u2013186. June, 2016. \n                              https:\/\/doi.org\/10.15446\/dyna.v83n197.53506\n                              \n                           .","journal-title":"DYNA"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-019-1389-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-019-1389-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-019-1389-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,2]],"date-time":"2020-07-02T23:21:26Z","timestamp":1593732086000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-019-1389-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,4]]},"references-count":34,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["1389"],"URL":"https:\/\/doi.org\/10.1007\/s10916-019-1389-z","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,4]]},"assertion":[{"value":"20 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 June 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"Shalini Stalin declares that she has no conflict of interest. Priti Maheshwari declares that she has no conflict of interest. Piyush Kumar Shukla declares that he has no conflict of interest. Manish Maheshwari declares that he has no conflict of interest. Bhupesh Gour declares that he has no conflict of interest. Ankur Khare declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"267"}}