{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:48:38Z","timestamp":1769748518151,"version":"3.49.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s11036-023-02158-y","type":"journal-article","created":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T17:02:54Z","timestamp":1695402174000},"page":"1489-1503","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Enhancing Security of Medical Images Using Deep Learning, Chaotic Map, and Hash Table"],"prefix":"10.1007","volume":"29","author":[{"given":"Piyush","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Mobashshirur","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Suyel","family":"Namasudra","sequence":"additional","affiliation":[]},{"given":"Nageswara Rao","family":"Moparthi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,22]]},"reference":[{"issue":"04","key":"2158_CR1","first-page":"507","volume":"05","author":"M Javaid","year":"2020","unstructured":"Javaid M, Haleem A, Singh RP, Haq MI, Raina A, Suman R (2020) Industry 5.0: Potential applications in covid-19. J Ind Integration and Management 05(04):507\u2013530","journal-title":"J Ind Integration and Management"},{"issue":"5","key":"2158_CR2","doi-asserted-by":"publisher","first-page":"2412","DOI":"10.1002\/int.22384","volume":"36","author":"S Kumari","year":"2021","unstructured":"Kumari S, Yadav RJ, Namasudra S, Hsu CH (2021) Intelligent deception techniques against adversarial attack on industrial system. Int J Intell Syst 36(5):2412\u20132437. https:\/\/doi.org\/10.1002\/int.22384","journal-title":"Int J Intell Syst"},{"key":"2158_CR3","doi-asserted-by":"publisher","unstructured":"Namasudra S, Roy P (2015) Size based access control model in cloud computing. Proc of the International Conference on Electrical, Electronics, Signals, Communication and Optimization, IEEE, Visakhapatnam, India, pp 1\u20134, 24\u201325 January. https:\/\/doi.org\/10.1109\/EESCO.2015.7253753","DOI":"10.1109\/EESCO.2015.7253753"},{"key":"2158_CR4","doi-asserted-by":"crossref","unstructured":"Gutub A (2022) Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing. CAAI Transactions on Intelligence Technology","DOI":"10.1049\/cit2.12093"},{"key":"2158_CR5","doi-asserted-by":"crossref","unstructured":"Hua Z, Zhou Y (2017) Design of image cipher using block-based scrambling and image filtering. Inf Sci 396:97\u2013113","DOI":"10.1016\/j.ins.2017.02.036"},{"key":"2158_CR6","first-page":"1340003","volume":"13","author":"P Kumar","year":"2015","unstructured":"Kumar P, Agrawal A (2015) GPU-accelerated interactive visualization of 3D volumetric data using CUDA. World Scientific Journal of Image and Graphics 13:1340003\u20131340018","journal-title":"World Scientific Journal of Image and Graphics"},{"issue":"1","key":"2158_CR7","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1049\/cit2.12053","volume":"7","author":"FS Hassan","year":"2021","unstructured":"Hassan FS, Gutub A (2021) Improving data hiding within colour images using hue component of HSV colour space. CAAI Transactions on Intelligence Technology 7(1):56\u201368","journal-title":"CAAI Transactions on Intelligence Technology"},{"key":"2158_CR8","doi-asserted-by":"publisher","unstructured":"Das S, Namasudra S (2022) Multi-authority CP-ABE-based access control model for IoT-enabled healthcare infrastructure. IEEE Transactions on Industrial Informatics. https:\/\/doi.org\/10.1109\/TII.2022.3167842 (SCI, IEEE, ISSN: 1941-0050) (IF: 10.215)","DOI":"10.1109\/TII.2022.3167842"},{"key":"2158_CR9","doi-asserted-by":"publisher","first-page":"1380","DOI":"10.1016\/j.procs.2020.03.349","volume":"167","author":"P Kumar","year":"2020","unstructured":"Kumar P, Parmar A (2020) Versatile Approaches for Medical Image Compression: A Review. Procedia Computer Science 167:1380\u20131389","journal-title":"Procedia Computer Science"},{"key":"2158_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON54134.2021.9707278","volume-title":"Deep learning model based segmentation of medical diseases from MRI and CT images","author":"A Murmu","year":"2021","unstructured":"Murmu A, Kumar P (2021) Deep learning model based segmentation of medical diseases from MRI and CT images. IEEE Int Conf on TENCON Auckland, New Zealand"},{"key":"2158_CR11","doi-asserted-by":"crossref","unstructured":"Jin C, Wang T, Li X, Tie CJ, Tie Y, Liu S, Yan M, Li Y, Wang J, Huang S (2021) A transformer generative Adversarial Network for multi-track music generation. CAAI Transactions on Intelligence Technology","DOI":"10.1049\/cit2.12065"},{"issue":"11","key":"2158_CR12","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2020) Generative Adversarial Networks. Commun ACM 63(11):139\u2013144","journal-title":"Commun ACM"},{"key":"2158_CR13","unstructured":"Ding Y, Tan F, Qin Z, Cao M, Choo K-KR, Qin Z (2021) DeepKeyGen: A deep learning-based stream cipher generator for medical image encryption and decryption. IEEE Transactions on Neural Networks and Learning Systems, pp 1\u201315"},{"issue":"11","key":"2158_CR14","first-page":"14379","volume":"78","author":"HA Mohammed","year":"2018","unstructured":"Mohammed HA, Dridi M, Mtibaa A (2018) A medical image crypto-compression algorithm based on neural network and pwlcm. Multimedia Tools and Applications 78(11):14379\u201314396","journal-title":"Multimedia Tools and Applications"},{"key":"2158_CR15","doi-asserted-by":"publisher","first-page":"36667","DOI":"10.1109\/ACCESS.2019.2906292","volume":"7","author":"A Belazi","year":"2019","unstructured":"Belazi A, Talha M, Kharbech S, Xiang W (2019) Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access 7:36667\u201336681","journal-title":"IEEE Access"},{"issue":"6","key":"2158_CR16","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1007\/s00530-021-00764-y","volume":"27","author":"CT Selvi","year":"2021","unstructured":"Selvi CT, Amudha J, Sudhakar R (2021) Medical image encryption and compression by adaptive sigma filterized SYNORR certificateless signcryptive Levenshtein entropy-coding-based deep neural learning. Multimedia Systems 27(6):1059\u20131074","journal-title":"Multimedia Systems"},{"issue":"3","key":"2158_CR17","doi-asserted-by":"publisher","first-page":"1504","DOI":"10.1109\/JIOT.2020.3012452","volume":"8","author":"Y Ding","year":"2021","unstructured":"Ding Y, Wu G, Chen D, Zhang N, Gong L, Cao M, Qin Z (2021) DeepEDN: A deep-learning-based image encryption and decryption network for internet of medical things. IEEE Internet of Things Journal 8(3):1504\u20131518","journal-title":"IEEE Internet of Things Journal"},{"issue":"11","key":"2158_CR18","doi-asserted-by":"publisher","first-page":"2517","DOI":"10.1007\/s11517-019-02037-3","volume":"57","author":"S Kumar","year":"2019","unstructured":"Kumar S, Panna B, Jha RK (2019) Medical image encryption using fractional discrete cosine transform with chaotic function. Medical & amp; Biological Engineering &amp; Computing 57(11):2517\u20132533","journal-title":"Medical & amp; Biological Engineering &amp; Computing"},{"issue":"10","key":"2158_CR19","doi-asserted-by":"publisher","first-page":"9007","DOI":"10.1007\/s12652-020-02597-5","volume":"12","author":"W El-Shafai","year":"2021","unstructured":"El-Shafai W, Khallaf F, El-Rabaie E-SM, El-Samie FE (2021) Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications. J Ambient Intelligence and Humanized Computing 12(10):9007\u20139035","journal-title":"J Ambient Intelligence and Humanized Computing"},{"key":"2158_CR20","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.sigpro.2016.10.003","volume":"132","author":"W Cao","year":"2017","unstructured":"Cao W, Zhou Y, Chen CLP, Xia L (2017) Medical image encryption using edge maps. Signal Proc 132:96\u2013109","journal-title":"Signal Proc"},{"key":"2158_CR21","doi-asserted-by":"publisher","first-page":"37855","DOI":"10.1109\/ACCESS.2021.3063237","volume":"9","author":"ST Kamal","year":"2021","unstructured":"Kamal ST, Hosny KM, Elgindy TM, Darwish MM, Fouda MM (2021) A New Image Encryption Algorithm for Grey and Color Medical Images. In IEEE Access 9:37855\u201337865. https:\/\/doi.org\/10.1109\/ACCESS.2021.3063237","journal-title":"In IEEE Access"},{"issue":"3","key":"2158_CR22","doi-asserted-by":"publisher","first-page":"3373","DOI":"10.1007\/s12652-020-02399-9","volume":"12","author":"S Jeevitha","year":"2020","unstructured":"Jeevitha S, Amutha Prabha N (2020) Novel medical image encryption using DWT block-based scrambling and edge maps. J Ambient Intelligence and Humanized Computing 12(3):3373\u20133388","journal-title":"J Ambient Intelligence and Humanized Computing"},{"key":"2158_CR23","doi-asserted-by":"crossref","unstructured":"Gafsi M, Abbassi N, Hajjaji MA, Malek J, Mtibaa A (2020) Improved chaos-based cryptosystem for medical image encryption and decryption. Sci Program 2020:1\u201322","DOI":"10.1155\/2020\/6612390"},{"key":"2158_CR24","doi-asserted-by":"crossref","unstructured":"Masood F, Driss M, Boulila W, Ahmad J, Rehman SU, Jan SU, Qayyum A, Buchanan WJ (2021) A lightweight chaos-based medical image encryption scheme using random shuffling and XOR operations. Wirel Pers Commun","DOI":"10.1007\/s11277-021-08584-z"},{"key":"2158_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102711","volume":"58","author":"JS Khan","year":"2021","unstructured":"Khan JS, Kayhan SK (2021) Chaos and compressive sensing based novel Image Encryption Scheme. Journal of Information Security and Applications 58:102711","journal-title":"Journal of Information Security and Applications"},{"key":"2158_CR26","doi-asserted-by":"crossref","unstructured":"Rahman M, Kumar P (2022) 2D-CTM and DNA-based Computing for Medical Image Encryption. Springer 10th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), NIT Mizoram, June. [In press]","DOI":"10.1007\/978-981-19-7524-0_20"},{"issue":"11","key":"2158_CR27","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.1002\/tee.23480","volume":"16","author":"S Amoh","year":"2021","unstructured":"Amoh S, Zhang X, Chen G, Ueta T (2021) Bifurcation analysis of a class of generalized H\u00e9non maps with Hidden Dynamics. IEEJ Transactions on Electrical and Electronic Engineering 16(11):1456\u20131462","journal-title":"IEEJ Transactions on Electrical and Electronic Engineering"},{"key":"2158_CR28","doi-asserted-by":"publisher","DOI":"10.1145\/3539223","author":"S Malviya","year":"2022","unstructured":"Malviya S, Kumar P, Namasudra S, Tiwary US (2022) Experience replay-based deep reinforcement learning for dialogue management optimisation. ACM Transactions on Asian and Low-Resource Language Information Processing. https:\/\/doi.org\/10.1145\/3539223","journal-title":"ACM Transactions on Asian and Low-Resource Language Information Processing"},{"issue":"1","key":"2158_CR29","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/272991.272995","volume":"8","author":"M Matsumoto","year":"1998","unstructured":"Matsumoto M, Nishimura T (1998) Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Transactions on Modeling and Computer Simulation (TOMACS) 8(1):3\u201330","journal-title":"ACM Transactions on Modeling and Computer Simulation (TOMACS)"},{"key":"2158_CR30","doi-asserted-by":"crossref","unstructured":"Singh A, Khehra BS, Kohli GK (2019) Differential Huffman Coding Approach for Lossless Compression of Medical Images. In International Conference on Intelligent Computing and Communication, pp 579\u2013589","DOI":"10.1007\/978-981-15-1084-7_56"},{"key":"2158_CR31","unstructured":"MedPix (2022) U.S. National Library of Medicine. [Online]. Available: https:\/\/medpix.nlm.nih.gov\/home. Accessed 24 Mar 2022"},{"issue":"5\u20136","key":"2158_CR32","first-page":"3957","volume":"79","author":"S Kayalvizhi","year":"2019","unstructured":"Kayalvizhi S, Malarvizhi S (2019) A novel encrypted compressive sensing of images based on fractional order hyper chaotic Chen system and DNA operations. Multimedia Tools and Applications 79(5\u20136):3957\u20133974","journal-title":"Multimedia Tools and Applications"},{"issue":"27\u201328","key":"2158_CR33","doi-asserted-by":"publisher","first-page":"19853","DOI":"10.1007\/s11042-020-08850-5","volume":"79","author":"TS Ali","year":"2020","unstructured":"Ali TS, Ali R (2020) A new chaos based color image encryption algorithm using permutation substitution and boolean operation. Multimedia Tools and Applications 79(27\u201328):19853\u201319873","journal-title":"Multimedia Tools and Applications"},{"key":"2158_CR34","doi-asserted-by":"publisher","first-page":"25664","DOI":"10.1109\/ACCESS.2020.2970806","volume":"8","author":"Q Lu","year":"2020","unstructured":"Lu Q, Zhu C, Deng X (2020) An efficient image encryption scheme based on the LSS chaotic map and single S-box. IEEE Access 8:25664\u201325678","journal-title":"IEEE Access"},{"key":"2158_CR35","unstructured":"Mooney P (2018) Chest X-ray images (pneumonia). Kaggle, 24-Mar-2018. [Online]. Available: https:\/\/www.kaggle.com\/paultimothymooney\/chest-xray-pneumonia. Accessed 09 June 2022"},{"key":"2158_CR36","unstructured":"Sipi Image Database (2022) [Online]. Available: https:\/\/sipi.usc.edu\/database\/. Accessed 31 May 2022"},{"issue":"3","key":"2158_CR37","first-page":"93","volume":"2","author":"M Zheng","year":"2022","unstructured":"Zheng M, Zhi K, Zeng J, Tian C, You L (2022) A hybrid CNN for image denoising. J Artif Intell Technol 2(3):93\u201399","journal-title":"J Artif Intell Technol"},{"issue":"3","key":"2158_CR38","first-page":"100","volume":"2","author":"J Meng","year":"2022","unstructured":"Meng J, Li Y, Liang H, Ma Y (2022) Single-image dehazing based on two-stream convolutional neural network. J Artif Intell Technol 2(3):100\u2013110","journal-title":"J Artif Intell Technol"},{"issue":"4","key":"2158_CR39","first-page":"152","volume":"2","author":"S Shafqat","year":"2022","unstructured":"Shafqat S, Majeed H, Javaid Q, Ahmad HF (2022) Standard ner tagging scheme for big data healthcare analytics built on unified medical corpora. J Artif Intell Technol 2(4):152\u2013157","journal-title":"J Artif Intell Technol"},{"issue":"1","key":"2158_CR40","first-page":"1","volume":"5","author":"H Taherdoost","year":"2023","unstructured":"Taherdoost H, Madanchian M (2023) Decision Making: Models, Processes. Techniques. Cloud Comput Data Sci 5(1):1\u201314","journal-title":"Techniques. Cloud Comput Data Sci"},{"key":"2158_CR41","doi-asserted-by":"publisher","first-page":"2115","DOI":"10.1007\/s11517-023-02824-z","volume":"61","author":"A Murmu","year":"2023","unstructured":"Murmu A, Kumar P (2023) A novel Gateaux derivatives with efficient DCNN-Resunet method for segmenting multi-class brain tumor. Med Biol Eng Comput 61:2115\u20132138","journal-title":"Med Biol Eng Comput"},{"key":"2158_CR42","doi-asserted-by":"crossref","unstructured":"Jiang S, Gu Y, Kumar E (2023) Magnetic Resonance Imaging (MRI) Brain Tumor Image Classification Based on Five Machine Learning Algorithms. Cloud Comput Data Sci 4(2):122\u201333. https:\/\/ojs.wiserpub.com\/index.php\/CCDS\/article\/view\/2740","DOI":"10.37256\/ccds.4220232740"},{"key":"2158_CR43","unstructured":"Murmu A, Rahman M, Kumar P (2023) A novel DNA Computing with Chaos for Improving Security of Medical Image, Springer 4th International Conference on Machine Learning, Image Processing, Network Security and Data Sciences. [In Press]"},{"key":"2158_CR44","unstructured":"Khasim S, Basha SS (2022) An Improved Fast and Secure CAMEL Based Authenticated Key in Smart Health Care System. Cloud Comput Data Sci 3(2):77\u201391. Available from: https:\/\/ojs.wiserpub.com\/index.php\/CCDS\/article\/view\/1423"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02158-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-023-02158-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02158-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T05:17:23Z","timestamp":1745299043000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-023-02158-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,22]]},"references-count":44,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["2158"],"URL":"https:\/\/doi.org\/10.1007\/s11036-023-02158-y","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,22]]},"assertion":[{"value":"8 July 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Informed consent is not required for this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent Statement"}},{"value":"This paper is original, unpublished, and not being considered for publication elsewhere. All the authors have approved this paper, and there are no animal and human participants in this work.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Statement"}},{"value":"There is no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interest Statement"}}]}}