{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:34Z","timestamp":1740122854179,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T00:00:00Z","timestamp":1601596800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T00:00:00Z","timestamp":1601596800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11042-020-09934-y","type":"journal-article","created":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T18:02:51Z","timestamp":1601661771000},"page":"5021-5046","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A novel secure solution of using mixed reality in data transmission for bowel and jaw surgical telepresence: enhanced rivest cipher RC6 block cipher"],"prefix":"10.1007","volume":"80","author":[{"given":"Risto","family":"Donev","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2309-3540","authenticated-orcid":false,"given":"Abeer","family":"Alsadoon","sequence":"additional","affiliation":[]},{"given":"P. W. C.","family":"Prasad","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Dawoud","sequence":"additional","affiliation":[]},{"given":"Sami","family":"Haddad","sequence":"additional","affiliation":[]},{"given":"Ahmad","family":"Alrubaie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,2]]},"reference":[{"issue":"7","key":"9934_CR1","doi-asserted-by":"publisher","first-page":"8025","DOI":"10.1364\/OE.21.008025","volume":"21","author":"A Alfalou","year":"2013","unstructured":"Alfalou A, Brosseau C, Abdallah N, Jridi M (2013) Assessing the performance of a method of simultaneous compression and encryption of multiple images and its resistance against various attacks. Opt Express 21(7):8025\u20138043","journal-title":"Opt Express"},{"issue":"24","key":"9934_CR2","doi-asserted-by":"publisher","first-page":"24023","DOI":"10.1364\/OE.19.024023","volume":"19","author":"C Alfalou","year":"2011","unstructured":"Alfalou C, Brosseau NA, Jridi M (2011) Simultaneous fusion, compression, and encryption of multiple images. Opt Express 19(24):24023\u201324029","journal-title":"Opt Express"},{"key":"9934_CR3","doi-asserted-by":"crossref","unstructured":"Al-Maadeed S, Al-Ali A, Abdalla T, Bouridane A (2012) A new chaos-based image-encryption and compression algorithm. J Electr Comput Eng 2012:1\u201311","DOI":"10.1155\/2012\/179693"},{"key":"9934_CR4","volume-title":"Fundamentals of WiMAX: understanding broadband wireless networking","author":"JG Andrews","year":"2007","unstructured":"Andrews JG, Ghosh A, Muhamed R (2007) Fundamentals of WiMAX: understanding broadband wireless networking. Prentice Hall, Upper Saddle River, NJ"},{"issue":"4","key":"9934_CR5","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1016\/j.dsp.2012.02.005","volume":"22","author":"G Bhatnagar","year":"2012","unstructured":"Bhatnagar G, Jonathan Wu QM (2012) Selective image encryption based on pixels of interest and singular value decomposition. Digital Signal Processing 22(4):648\u2013663","journal-title":"Digital Signal Processing"},{"issue":"9","key":"9934_CR6","doi-asserted-by":"publisher","first-page":"2359","DOI":"10.1109\/TCSVT.2017.2703946","volume":"28","author":"S Chen","year":"2018","unstructured":"Chen S, Yu S, L\u00fc J, Chen G, He J (2018) Design and FPGA-based realization of a chaotic secure video communication system. IEEE Transactions on Circuits and Systems for Video Technology 28(9):2359\u20132371","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"14","key":"9934_CR7","doi-asserted-by":"publisher","first-page":"19229","DOI":"10.1007\/s11042-019-7256-6","volume":"78","author":"SM Darwish","year":"2019","unstructured":"Darwish SM (2019) A modified image selective encryption-compression technique based on 3D chaotic maps and arithmetic coding. Multimed Tools Appl 78(14):19229\u201319252","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"9934_CR8","doi-asserted-by":"publisher","first-page":"14173","DOI":"10.1007\/s11042-018-6765-z","volume":"78","author":"E El-Bakary","year":"2019","unstructured":"El-Bakary E, El-Shafai W, El-Rabaie S, Zahran O, El-Halawany M, Abd El-Samie F (2019) Proposed enhanced hybrid framework for efficient 3D-MVC and 3D-HEVC wireless communication. Multimed Tools Appl 78(11):14173\u201314193","journal-title":"Multimed Tools Appl"},{"key":"9934_CR9","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.image.2016.01.009","volume":"42","author":"Z Fawaz","year":"2016","unstructured":"Fawaz Z, Noura H, Mostefaoui A (2016) An efficient and secure cipher scheme for images confidentiality preservation. Signal Process Image Commun 42:90\u2013108","journal-title":"Signal Process Image Commun"},{"key":"9934_CR10","doi-asserted-by":"crossref","unstructured":"Haque SA, Aziz SM, Rahman M (2014) Review of cyber-physical system in healthcare. Int J Distrib Sens Netw 10(4):1\u201320","DOI":"10.1155\/2014\/217415"},{"issue":"2","key":"9934_CR11","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/S0304-3975(99)00243-1","volume":"240","author":"T Hofmeister","year":"2000","unstructured":"Hofmeister T, Krause M, Simon H (2000) Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theor Comput Sci 240(2):471\u2013485","journal-title":"Theor Comput Sci"},{"key":"9934_CR12","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.optlaseng.2017.10.007","volume":"102","author":"M Jridi","year":"2018","unstructured":"Jridi M, Alfalou A (2018) Real-time and encryption efficiency improvements of simultaneous fusion, compression and encryption method based on chaotic generators. Opt Lasers Eng 102:59\u201369","journal-title":"Opt Lasers Eng"},{"issue":"8","key":"9934_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSEN.2017.2671241","volume":"17","author":"Y Li","year":"2017","unstructured":"Li Y, Zhang S, Yin Y, Xiao W, Zhang J (2017) A novel online sequential extreme learning machine for gas utilization ratio prediction in blast furnaces. Sensors 17(8):1\u201324","journal-title":"Sensors"},{"issue":"7","key":"9934_CR14","doi-asserted-by":"publisher","first-page":"1203","DOI":"10.1109\/TCSVT.2014.2369711","volume":"25","author":"Z Lin","year":"2015","unstructured":"Lin Z, Yu S, L\u00fc J, Cai S, Chen G (2015) Design an ARM-embedded implementation of a chaotic map-based real-time secure video communication system. IEEE Transactions on Circuits and Systems for Video Technology 25(7):1203\u20131216","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"1","key":"9934_CR15","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s11554-017-0727-y","volume":"14","author":"M Long","year":"2018","unstructured":"Long M, Peng F, Li H-y (2018) Separable reversible data hiding and encryption for HEVC video. J Real-Time Image Proc 14(1):171\u2013182","journal-title":"J Real-Time Image Proc"},{"issue":"17","key":"9934_CR16","doi-asserted-by":"publisher","first-page":"7858","DOI":"10.1016\/j.eswa.2014.06.011","volume":"41","author":"C Mishra","year":"2014","unstructured":"Mishra C, Agarwal AS, Bedi P (2014) Optimized gray-scale image watermarking using DWT\u2013SVD and firefly algorithm. Expert Syst Appl 41(17):7858\u20137867","journal-title":"Expert Syst Appl"},{"issue":"8","key":"9934_CR17","doi-asserted-by":"publisher","first-page":"10013","DOI":"10.1007\/s11042-018-6612-2","volume":"78","author":"YPK Nkandeu","year":"2019","unstructured":"Nkandeu YPK, Tiedeu A (2019) An image encryption algorithm based on substitution technique and chaos mixing. Multimed Tools Appl 78(8):10013\u201310034","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"9934_CR18","doi-asserted-by":"publisher","first-page":"14837","DOI":"10.1007\/s11042-018-6845-0","volume":"78","author":"H Noura","year":"2019","unstructured":"Noura H, Noura M, Chehab A, Mansour M, Couturier R (2019) Efficient and secure cipher scheme for multimedia contents. Multimed Tools Appl 78(11):14837\u201314866","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"9934_CR19","doi-asserted-by":"publisher","first-page":"15457","DOI":"10.1007\/s11042-017-5124-9","volume":"77","author":"H Noura","year":"2018","unstructured":"Noura H, Sleem L, Noura M, Mansour M, Chehab A, Couturier R (2018) A new efficient lightweight and secure image cipher scheme. Multimed Tools Appl 77(12):15457\u201315484","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"9934_CR20","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1007\/s00500-014-1539-7","volume":"20","author":"N Pareek","year":"2016","unstructured":"Pareek N, Patidar V (2016) Medical image protection using genetic algorithm operations. Soft Comput 20(2):763\u2013772","journal-title":"Soft Comput"},{"key":"9934_CR21","doi-asserted-by":"crossref","unstructured":"Preishuber M, Hutter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans Inf Forensic Secur 13(9):2137\u20132150","DOI":"10.1109\/TIFS.2018.2812080"},{"issue":"8","key":"9934_CR22","doi-asserted-by":"publisher","first-page":"9577","DOI":"10.1007\/s11042-018-6534-z","volume":"78","author":"R Premkumar","year":"2019","unstructured":"Premkumar R, Anand S (2019) Secured and compound 3-D chaos image encryption using hybrid mutation and crossover operator. Multimed Tools Appl 78(8):9577\u20139593","journal-title":"Multimed Tools Appl"},{"key":"9934_CR23","doi-asserted-by":"crossref","unstructured":"Rajpal AM, Bala R (2019) A novel fuzzy frame selection based watermarking scheme for MPEG-4 videos using Bi-directional extreme learning machine. Appl Soft Comput J 74:603\u2013620","DOI":"10.1016\/j.asoc.2018.10.043"},{"issue":"3","key":"9934_CR24","doi-asserted-by":"publisher","first-page":"853","DOI":"10.3390\/s18030853","volume":"18","author":"M Selecky","year":"2018","unstructured":"Selecky M, Faigl J, Rollo M (2018) Communication architecture in mixed-reality simulations of unmanned systems. Sensors 18(3):853\u2013872","journal-title":"Sensors"},{"key":"9934_CR25","unstructured":"Selva GM, Kumar SM (2019) Secure grayscale image communication using significant visual cryptography scheme in real-time applications. Multimed Tools Appl:1\u201320"},{"issue":"15","key":"9934_CR26","doi-asserted-by":"publisher","first-page":"21455","DOI":"10.1007\/s11042-019-7451-5","volume":"78","author":"RA Shah","year":"2019","unstructured":"Shah RA, Asghar MN, Abdullah S, Fleury M, Gohar N (2019) Effectiveness of crypto-transcoding for H.264\/AVC and HEVC video bit-streams. Multimed Tools Appl 78(15):21455\u201321484","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"9934_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s19092119","volume":"19","author":"G Sharma","year":"2019","unstructured":"Sharma G, Rathee R, Kumar H, Saini V, Vijaykumar YN, Chilamkurti N (2019) A secure, energy- and SLA-efficient (SESE) E-healthcare framework for quickest data transmission using cyber-physical system. Sensors 19(9):1\u201322","journal-title":"Sensors"},{"issue":"8","key":"9934_CR28","doi-asserted-by":"publisher","first-page":"3287","DOI":"10.1007\/s12652-018-1058-y","volume":"10","author":"KP Sridhar","year":"2018","unstructured":"Sridhar KP, Baskar S, Shakeel MP, Dhulipala SVR (2018) Developing brain abnormality recognize system using multi-objective pattern producing neural network. J Ambient Intell Humaniz Comput 10(8):3287\u20133295","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"5","key":"9934_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s18051554","volume":"18","author":"N Venckauskas","year":"2018","unstructured":"Venckauskas N, Morkevicius K, Bagdonas RD, Maskeliunas R (2018) A lightweight protocol for secure video streaming. Sensors 18(5):1\u201315","journal-title":"Sensors"},{"key":"9934_CR30","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10\u201318","journal-title":"Opt Lasers Eng"},{"key":"9934_CR31","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.asoc.2014.03.009","volume":"21","author":"T Xiang","year":"2014","unstructured":"Xiang T, Qu J, Xiao D (2014) Joint SPIHT compression and selective encryption. Applied Soft Computing Journal 21:159\u2013170","journal-title":"Applied Soft Computing Journal"},{"key":"9934_CR32","doi-asserted-by":"publisher","first-page":"66028","DOI":"10.1109\/ACCESS.2019.2916484","volume":"7","author":"D Xu","year":"2019","unstructured":"Xu D (2019) Commutative encryption and data hiding in HEVC video compression. IEEE Access 7:66028\u201366041","journal-title":"IEEE Access"},{"issue":"16","key":"9934_CR33","doi-asserted-by":"publisher","first-page":"21803","DOI":"10.1007\/s11042-017-5590-0","volume":"77","author":"B Yang","year":"2018","unstructured":"Yang B, Liao X (2018) A new color image encryption scheme based on logistic map over the finite field ZN. Multimed Tools Appl 77(16):21803\u201321821","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"9934_CR34","doi-asserted-by":"publisher","first-page":"4257","DOI":"10.1109\/TIE.2017.2772190","volume":"65","author":"J Yang","year":"2018","unstructured":"Yang J, Zhou C, Yang S, Xu H, Hu B (2018) Anomaly detection based on zone partition for security protection of industrial cyber-physical systems. IEEE Trans Ind Electron 65(5):4257\u20134267","journal-title":"IEEE Trans Ind Electron"},{"key":"9934_CR35","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1016\/j.sigpro.2016.05.004","volume":"128","author":"Y Yao","year":"2016","unstructured":"Yao Y, Zhang W, Yu N (2016) Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264\/AVC video bitstreams. Signal Process 128:531\u2013545","journal-title":"Signal Process"},{"issue":"8","key":"9934_CR36","doi-asserted-by":"publisher","first-page":"902","DOI":"10.1016\/j.image.2014.06.012","volume":"29","author":"X Zhang","year":"2014","unstructured":"Zhang X, Zhao Z, Wang J (2014) Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process Image Commun 29(8):902\u2013913","journal-title":"Signal Process Image Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09934-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09934-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09934-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,2]],"date-time":"2021-10-02T01:06:39Z","timestamp":1633136799000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09934-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,2]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["9934"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09934-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,10,2]]},"assertion":[{"value":"1 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 October 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}