{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T03:29:48Z","timestamp":1773890988542,"version":"3.50.1"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,9,11]],"date-time":"2020-09-11T00:00:00Z","timestamp":1599782400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,11]],"date-time":"2020-09-11T00:00:00Z","timestamp":1599782400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11042-020-09775-9","type":"journal-article","created":{"date-parts":[[2020,9,11]],"date-time":"2020-09-11T15:09:36Z","timestamp":1599836976000},"page":"2081-2107","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":55,"title":["An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3654-4531","authenticated-orcid":false,"given":"Mustapha","family":"Benssalah","sequence":"first","affiliation":[]},{"given":"Yesser","family":"Rhaskali","sequence":"additional","affiliation":[]},{"given":"Karim","family":"Drouiche","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,11]]},"reference":[{"key":"9775_CR1","unstructured":"http:\/\/sipi.usc.edu\/database\/database.php?volume=miscZ, Access date November 2019"},{"key":"9775_CR2","doi-asserted-by":"crossref","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2014) .. In: International conference on research in security standardisation. Springer, pp 151\u2013166","DOI":"10.1007\/978-3-319-14054-4_10"},{"issue":"1","key":"9775_CR3","first-page":"14","volume":"1","author":"B Acharya","year":"2007","unstructured":"Acharya B, Rath GS, Patra SK, Panigrahy SK (2007) Novel methods of generating self-invertible matrix for Hill Cipher algorithm. Int J Secur 1 (1):14","journal-title":"Int J Secur"},{"key":"9775_CR4","unstructured":"Ali TS, Ali R (2020) A new chaos based color image encryption algorithm using permutation substitution and Boolean operation. Multimedia Tools and Applications, 1\u201321"},{"key":"9775_CR5","doi-asserted-by":"crossref","unstructured":"Allaf AH, Kbir MA (2018) A review of digital watermarking applications for medical image exchange security. The proceedings of the third international conference on smart city applications, pp 472\u2013480","DOI":"10.1007\/978-3-030-11196-0_40"},{"issue":"3","key":"9775_CR6","doi-asserted-by":"publisher","first-page":"3669","DOI":"10.1007\/s11042-016-3928-7","volume":"76","author":"HS Alshanbari","year":"2017","unstructured":"Alshanbari HS (2017) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimedia Tools and Applications 76(3):3669","journal-title":"Multimedia Tools and Applications"},{"key":"9775_CR7","doi-asserted-by":"crossref","unstructured":"Alshanbari HS (2020) Medical image watermarking for ownership & tamper detection, Multimedia Tools and Applications, pp 1\u201316","DOI":"10.1007\/s11042-020-08814-9"},{"key":"9775_CR8","doi-asserted-by":"publisher","first-page":"36667","DOI":"10.1109\/ACCESS.2019.2906292","volume":"7","author":"A Belazi","year":"2019","unstructured":"Belazi A, Talha M, Kharbech S, Xiang W (2019) Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access 7:36667","journal-title":"IEEE Access"},{"key":"9775_CR9","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.sigpro.2016.10.003","volume":"132","author":"W Cao","year":"2017","unstructured":"Cao W, Zhou Y, Chen CP, Xia L (2017) Medical image encryption using edge maps. Signal Process 132:96","journal-title":"Signal Process"},{"issue":"14","key":"9775_CR10","doi-asserted-by":"publisher","first-page":"15561","DOI":"10.1007\/s11042-016-3858-4","volume":"76","author":"X Chai","year":"2017","unstructured":"Chai X, Gan Z, Zhang M (2017) A fast chaos-based image encryption scheme with a novel plain image-related swapping block permutation and block diffusion. Multimedia Tools and Applications 76(14):15561","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"9775_CR11","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1007\/s11071-014-1318-0","volume":"77","author":"Y Chen","year":"2014","unstructured":"Chen Y, Yang Q (2014) Dynamics of a hyperchaotic Lorenz-type system. Nonlinear Dynamics 77(3):569","journal-title":"Nonlinear Dynamics"},{"key":"9775_CR12","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","volume":"142","author":"J Chen","year":"2018","unstructured":"Chen J, Zhu Zl, Zhang Lb, Zhang Y, Yang Bq (2018) Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption. Signal Processing 142:340","journal-title":"Signal Processing"},{"issue":"3","key":"9775_CR13","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.jksuci.2017.06.004","volume":"30","author":"ZE Dawahdeh","year":"2018","unstructured":"Dawahdeh ZE, Yaakob SN, bin Othman RR (2018) A new image encryption technique combining elliptic curve cryptosystem with Hill Cipher. Journal of King Saud University-Computer and Information Sciences 30(3):349","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"issue":"3","key":"9775_CR14","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1109\/TCSI.2018.2878598","volume":"66","author":"J Ding","year":"2018","unstructured":"Ding J, Li S, Gu Z (2018) High-speed ECC processor over NIST prime fields applied with Toom\u2013Cook multiplication. IEEE Transactions on Circuits and Systems I: Regular Papers 66(3):1003","journal-title":"IEEE Transactions on Circuits and Systems I: Regular Papers"},{"issue":"11","key":"9775_CR15","doi-asserted-by":"publisher","first-page":"4614","DOI":"10.1109\/TIP.2015.2467317","volume":"24","author":"M Dzwonkowski","year":"2015","unstructured":"Dzwonkowski M, Papaj M, Rykaczewski R (2015) A new quaternion-based encryption method for DICOM images. IEEE Trans Image Process 24 (11):4614","journal-title":"IEEE Trans Image Process"},{"key":"9775_CR16","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.image.2015.10.004","volume":"41","author":"S El Assad","year":"2016","unstructured":"El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144","journal-title":"Signal Process Image Commun"},{"issue":"2","key":"9775_CR17","first-page":"179","volume":"7","author":"MS Farash","year":"2013","unstructured":"Farash MS (2013) Cryptography: A New Approach of Classical Hill Cipher. International Journal of Security and Its Applications 7(2):179","journal-title":"International Journal of Security and Its Applications"},{"key":"9775_CR18","doi-asserted-by":"crossref","unstructured":"Farwa S, Bibi N, Muhammad N (2020) An efficient image encryption scheme using Fresnelet transform and elliptic curve based scrambling. Multimedia Tools and Applications, pp 1\u201314","DOI":"10.1007\/s11042-020-09324-4"},{"key":"9775_CR19","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1016\/j.sigpro.2018.10.011","volume":"155","author":"U Hayat","year":"2019","unstructured":"Hayat U, Azam NA (2019) A novel image encryption scheme based on an elliptic curve. Signal Process 155:391","journal-title":"Signal Process"},{"issue":"6","key":"9775_CR20","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1080\/00029890.1929.11986963","volume":"36","author":"LS Hill","year":"1929","unstructured":"Hill LS (1929) Cryptography in an algebraic alphabet. American Mathematical Monthly 36(6):306","journal-title":"American Mathematical Monthly"},{"key":"9775_CR21","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.ins.2017.02.036","volume":"396","author":"Z Hua","year":"2017","unstructured":"Hua Z, Zhou Y (2017) Design of image cipher using block-based scrambling and image filtering. Information sciences 396:97","journal-title":"Information sciences"},{"key":"9775_CR22","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.sigpro.2017.10.004","volume":"144","author":"Z Hua","year":"2018","unstructured":"Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134","journal-title":"Signal Process"},{"key":"9775_CR23","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.sigpro.2017.10.004","volume":"144","author":"Z Hua","year":"2018","unstructured":"Hua Z, Yi S, Zhou Y (2018) A new plaintext-related image encryption scheme based on chaotic sequence. Signal Processing 144:134","journal-title":"Signal Processing"},{"key":"9775_CR24","doi-asserted-by":"crossref","unstructured":"Huang H, He Y, Yang S, Ye R (2020) Chaotic image encryption based on bidimensional empirical mode decomposition and double random phase encoding. Multimedia Tools and Applications, pp 1\u201314","DOI":"10.1007\/s11042-020-09378-4"},{"key":"9775_CR25","doi-asserted-by":"crossref","unstructured":"Kannammal A, Rani SS (2012) DICOM image authentication and encryption based on RSA and AES algorithms. In: International conference on intelligent robotics, automation, and manufacturing. Springer, pp 349\u2013360","DOI":"10.1007\/978-3-642-35197-6_39"},{"key":"9775_CR26","doi-asserted-by":"crossref","unstructured":"Kamrani A, Zenkouar K, Najah S (2020) A new set of image encryption algorithms based on discrete orthogonal moments and Chaos theory. Multimedia Tools and Applications, pp 1\u201317","DOI":"10.1007\/s11042-020-08879-6"},{"key":"9775_CR27","unstructured":"Karmakar J, Nandi D, Mandal M (2020) A novel hyper-chaotic image encryption with sparserepresentation based compression. Multimedia Tools and Applications, pp 1\u201324"},{"key":"9775_CR28","unstructured":"Kahn D (1996) The Codebreakers: The comprehensive history of secret communication from ancient times to the internet, Simon and Schuster"},{"issue":"2-3","key":"9775_CR29","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1023\/A:1008354106356","volume":"19","author":"N Koblitz","year":"2000","unstructured":"Koblitz N, Menezes A, Vanstone S (2000) The state of elliptic curve cryptography. Designs, codes and cryptography 19(2-3):173","journal-title":"Designs, codes and cryptography"},{"key":"9775_CR30","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.sigpro.2016.01.017","volume":"125","author":"M Kumar","year":"2016","unstructured":"Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography. Signal Process 125:187","journal-title":"Signal Process"},{"key":"9775_CR31","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.ijleo.2017.08.028","volume":"147","author":"DS Laiphrakpam","year":"2017","unstructured":"Laiphrakpam DS, Khumanthem MS (2017) Medical image encryption based on improved ElGamal encryption technique. Optik-International Journal for Light and Electron Optics 147:88","journal-title":"Optik-International Journal for Light and Electron Optics"},{"issue":"7","key":"9775_CR32","doi-asserted-by":"publisher","first-page":"8629","DOI":"10.1007\/s11042-017-4755-1","volume":"77","author":"DS Laiphrakpam","year":"2018","unstructured":"Laiphrakpam DS, Khumanthem MS (2018) A robust image encryption scheme based on chaotic system and elliptic curve over finite field. Multimedia Tools and Applications 77(7):8629","journal-title":"Multimedia Tools and Applications"},{"issue":"4","key":"9775_CR33","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.1016\/j.sigpro.2011.10.020","volume":"92","author":"L Li","year":"2012","unstructured":"Li L, El-Latif AAA, Niu X (2012) Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images. Signal Process 92 (4):1069","journal-title":"Signal Process"},{"key":"9775_CR34","unstructured":"Miller VS (1985) .. In: Conference on the theory and application of cryptographic techniques. Springer, pp 417\u2013426"},{"issue":"18","key":"9775_CR35","doi-asserted-by":"publisher","first-page":"18985","DOI":"10.1007\/s11042-017-4420-8","volume":"76","author":"K Muhammad","year":"2017","unstructured":"Muhammad K, Ahmad J, Rho S, Baik SW (2017) Baik, Image steganography for authenticity of visual contents in social networks. Multimedia Tools and Applications 76(18):18985","journal-title":"Multimedia Tools and Applications"},{"key":"9775_CR36","doi-asserted-by":"crossref","unstructured":"Ostad-Sharif A, Abbasinezhad-Mood D, Nikooghadam M (2019) An enhanced anonymous and unlinkable user authentication and key agreement protocol for TMIS by utilization of ECC. Int J Commun Syst, p e3913","DOI":"10.1002\/dac.3913"},{"issue":"10","key":"9775_CR37","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s10916-017-0809-1","volume":"41","author":"MM Parvees","year":"2017","unstructured":"Parvees MM, Samath JA, Bose BP (2017) Medical images are safe-an enhanced chaotic scrambling approach. J Med Sys 41(10):167","journal-title":"J Med Sys"},{"key":"9775_CR38","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.compbiomed.2016.03.020","volume":"72","author":"D Ravichandran","year":"2016","unstructured":"Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Computers in Biology and Medicine 72:170","journal-title":"Computers in Biology and Medicine"},{"issue":"4","key":"9775_CR39","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1080\/01611190008984253","volume":"24","author":"S Saeednia","year":"2000","unstructured":"Saeednia S (2000) How to make the Hill cipher secure. Cryptologia 24(4):353","journal-title":"Cryptologia"},{"key":"9775_CR40","doi-asserted-by":"publisher","first-page":"30344","DOI":"10.1109\/ACCESS.2019.2901302","volume":"7","author":"M Shang","year":"2019","unstructured":"Shang M, Yan Z, Zeguo Y, Jianhao H, Xin L (2019) A new plaintext-related image encryption scheme based on chaotic sequence. IEEE Access 7:30344","journal-title":"IEEE Access"},{"key":"9775_CR41","doi-asserted-by":"crossref","unstructured":"Soualmi A, Alti A, Laouamer L (2018) A new blind medical image watermarking based on Weber descriptors and Arnold chaotic map. Arabian, Journal for Science and Engineering, pp 1\u201313","DOI":"10.1007\/s13369-018-3246-7"},{"key":"9775_CR42","doi-asserted-by":"publisher","unstructured":"Soualmi A, Alti A, Laouamer L (2018) A new blind medical image watermarking based on Weber descriptors and Arnold chaotic map. Arabian Journal for Science and Engineering, https:\/\/doi.org\/10.1007\/s13369-018-3246-7","DOI":"10.1007\/s13369-018-3246-7"},{"key":"9775_CR43","unstructured":"Vincent J (2018) 1.5 million affected by hack targeting Singapore\u2019s health data. https:\/\/www.theverge.com"},{"key":"9775_CR44","doi-asserted-by":"crossref","unstructured":"Washington LC (2003) Elliptic curves: number theory and cryptography. Chapman and Hall\/CRC","DOI":"10.4324\/9780203484029"},{"issue":"9.10","key":"9775_CR45","first-page":"1613","volume":"24","author":"DC Wu","year":"2003","unstructured":"Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Multimedia Tools and Applications 24(9.10):1613","journal-title":"Multimedia Tools and Applications"},{"issue":"2","key":"9775_CR46","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption, Cyber journals: multidisciplinary journals in science and technology. Journal of Selected Areas in Telecommunications (JSAT) 1(2):31","journal-title":"Journal of Selected Areas in Telecommunications (JSAT)"},{"key":"9775_CR47","first-page":"6429","volume":"5","author":"X Wu","year":"2017","unstructured":"Wu X, Zhu B, Hu Y, Ran Y (2017) A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access 5:6429","journal-title":"IEEE Access"},{"key":"9775_CR48","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1016\/j.sigpro.2017.06.014","volume":"142","author":"J Wu","year":"2018","unstructured":"Wu J, Liao X, Yang B (2018) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process 142:292","journal-title":"Signal Process"},{"key":"9775_CR49","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","volume":"222","author":"Y Wu","year":"2013","unstructured":"Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shannon entropy measure with statistical tests for image randomness. Inform Sci 222:323","journal-title":"Inform Sci"},{"issue":"1","key":"9775_CR50","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.cnsns.2013.06.031","volume":"19","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simul 19(1):74","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"6","key":"9775_CR51","doi-asserted-by":"publisher","first-page":"7841","DOI":"10.1007\/s11042-018-6496-1","volume":"78","author":"X Zhang","year":"2019","unstructured":"Zhang X, Wang X (2019) Multiple-image encryption algorithm based on DNA encoding and chaotic system. Multimedia Tools and Applications 78(6):7841","journal-title":"Multimedia Tools and Applications"},{"key":"9775_CR52","doi-asserted-by":"crossref","unstructured":"Zhang LB, Zhu ZL, Yang BQ, Liu WY, Zhu HF, Zou MY (2015) Medical image encryption and compression scheme using compressive sensing and pixel swapping based permutation approach, Mathematical Problems in Engineering 2015","DOI":"10.1155\/2015\/940638"},{"key":"9775_CR53","doi-asserted-by":"crossref","unstructured":"Zefreh EZ (2020) An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimedia Tools and Applications, 1\u201330","DOI":"10.1007\/s11042-020-09111-1"},{"key":"9775_CR54","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Bao L, Chen CP (2014) A new 1-D chaotic system for image encryption. Signal Process 97:172","journal-title":"Signal Process"},{"issue":"9","key":"9775_CR55","doi-asserted-by":"publisher","first-page":"2001","DOI":"10.1109\/TCYB.2014.2363168","volume":"45","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Hua Z, Pun CM, Chen CP (2014) Cascade chaotic system with applications. IEEE Trans Cybern 45(9):2001","journal-title":"IEEE Trans Cybern"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09775-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09775-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09775-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T23:30:45Z","timestamp":1668727845000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09775-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,11]]},"references-count":55,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["9775"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09775-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,11]]},"assertion":[{"value":"31 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}