{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T07:00:44Z","timestamp":1776150044089,"version":"3.50.1"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2021,3,13]],"date-time":"2021-03-13T00:00:00Z","timestamp":1615593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,13]],"date-time":"2021-03-13T00:00:00Z","timestamp":1615593600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11042-021-10723-4","type":"journal-article","created":{"date-parts":[[2021,3,13]],"date-time":"2021-03-13T12:02:52Z","timestamp":1615636972000},"page":"21165-21202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":70,"title":["Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems"],"prefix":"10.1007","volume":"80","author":[{"given":"R.","family":"Denis","sequence":"first","affiliation":[]},{"given":"P.","family":"Madhubala","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,13]]},"reference":[{"issue":"11","key":"10723_CR1","doi-asserted-by":"publisher","first-page":"3108","DOI":"10.3390\/s20113108","volume":"20","author":"B Abd-El-Atty","year":"2020","unstructured":"Abd-El-Atty B, Iliyasu AM, Alaskar H, Abd El-Latif AA (2020) A robust quasi-quantum walks-based steganography protocol for secure transmission of images on cloud-based E-healthcare platforms. Sensors. 20(11):3108","journal-title":"Sensors."},{"key":"10723_CR2","first-page":"1","volume":"10","author":"S Ahmad","year":"2017","unstructured":"Ahmad S, Thanikaiselvan V, Amitharajan R (2017) Data security through data hiding in images: a review. J Artif Intell 10:1\u201321","journal-title":"J Artif Intell"},{"key":"10723_CR3","doi-asserted-by":"crossref","unstructured":"Ahmad M, Doja M, Sufyan Beg M (2018) Security analysis and enhancements of an image cryptosystem based on hyperchaotic system, J. King Saud Univ Comput Inf Sci:1\u20139","DOI":"10.1016\/j.jksuci.2018.02.002"},{"key":"10723_CR4","doi-asserted-by":"publisher","unstructured":"Ahmed DEM, Khalifa OO Robust and Secure Image Steganography Based on Elliptic Curve Cryptography, vol 2014. 2014 International conference on computer and communication engineering, Kuala Lumpur, pp 288\u2013291. https:\/\/doi.org\/10.1109\/ICCCE.2014.88","DOI":"10.1109\/ICCCE.2014.88"},{"key":"10723_CR5","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1109\/ICPCSI.2017.8391793","volume-title":"Secure M-commerce data using post quantum cryptography","author":"MS Alam","year":"2017","unstructured":"Alam MS (2017) Secure M-commerce data using post quantum cryptography. 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), Chennai, pp 649\u2013654. https:\/\/doi.org\/10.1109\/ICPCSI.2017.8391793"},{"key":"10723_CR6","doi-asserted-by":"publisher","first-page":"2818","DOI":"10.12928\/TELKOMNIKA.v17i6.13201","volume":"17","author":"I Al-barazanchi","year":"2019","unstructured":"Al-barazanchi I, Shawkat S, Hameed M, Al-badri K (2019) Modified RSA-based algorithm: a double secure approach. Telkomnika Indonesian J Electric Eng 17:2818\u20132825. https:\/\/doi.org\/10.12928\/TELKOMNIKA.v17i6.13201","journal-title":"Telkomnika Indonesian J Electric Eng"},{"key":"10723_CR7","first-page":"7","volume":"3","author":"A Anwar","year":"2015","unstructured":"Anwar A, A.Ghany K, Elmahdy H (2015) Improving the security of images transmission. Int J Bio-Med Informat e-Health 3:7\u201313","journal-title":"Int J Bio-Med Informat e-Health"},{"key":"10723_CR8","doi-asserted-by":"publisher","unstructured":"B. PUSHPA (2020) Hybrid Data Encryption Algorithm for Secure Medical Data Transmission in Cloud Environment,\u201d 2020 Fourth international conference on computing methodologies and communication (ICCMC), Erode, India, pp. 329\u2013334, DOI: https:\/\/doi.org\/10.1109\/ICCMC48092.2020.ICCMC-00062.","DOI":"10.1109\/ICCMC48092.2020.ICCMC-00062"},{"key":"10723_CR9","doi-asserted-by":"publisher","unstructured":"Anupam Kumar Bairagi, Rahmatullah Khondoker, and Rafiqul Islam. 2016. An efficient steganographic approach for protecting communication in the Internet of Things IoT critical infrastructures. Inf. Sec. J.: A Global Perspective 25, 4\u20136 (2016), 197\u2013212. DOI: https:\/\/doi.org\/10.1080\/19393555.2016.1206640","DOI":"10.1080\/19393555.2016.1206640"},{"key":"10723_CR10","doi-asserted-by":"publisher","first-page":"36","DOI":"10.5120\/5723-7785","volume":"42","author":"A Bashir Abugharsa","year":"2012","unstructured":"Bashir Abugharsa A, Basari AS, Almangush H (2012) A New Image Encryption Approach using the Integration of a Shifting Technique and the AES Algorithm. Int J Comput Appl 42:36\u201345. https:\/\/doi.org\/10.5120\/5723-7785","journal-title":"Int J Comput Appl"},{"key":"10723_CR11","doi-asserted-by":"publisher","first-page":"33837","DOI":"10.1007\/s11042-019-08166-z","volume":"78","author":"N Chidambaram","year":"2019","unstructured":"Chidambaram N, Raj P, Thenmozhi K, Rajagopalan S, Amirtharajan R (2019) A cloud compatible DNA coded security solution for multimedia file sharing & storage. Multimed Tools Appl 78:33837\u201333863. https:\/\/doi.org\/10.1007\/s11042-019-08166-z","journal-title":"Multimed Tools Appl"},{"key":"10723_CR12","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1109\/CSCS.2017.70","volume-title":"Secure Communication Method Based on Encryption and Steganography","author":"A Duluta","year":"2017","unstructured":"Duluta A, Mocanu S, Pietraru R, Merezeanu D, Saru D (2017) Secure Communication Method Based on Encryption and Steganography. 2017 21st international conference on control systems and computer science (CSCS), Bucharest, pp 453\u2013458. https:\/\/doi.org\/10.1109\/CSCS.2017.70"},{"key":"10723_CR13","doi-asserted-by":"publisher","first-page":"830","DOI":"10.1016\/j.asoc.2015.08.057","volume":"37","author":"NN El-Emam","year":"2015","unstructured":"El-Emam NN, Al-Diabat M (2015) A novel algorithm for colour image steganography using a new intelligent technique based on three phases. Appl Soft Comput 37:830\u2013846","journal-title":"Appl Soft Comput"},{"key":"10723_CR14","doi-asserted-by":"publisher","first-page":"20596","DOI":"10.1109\/ACCESS.2018.2817615","volume":"6","author":"M Elhoseny","year":"2018","unstructured":"Elhoseny M, Ram\u00edrez-Gonz\u00e1lez G, Abu-Elnasr OM, Shawkat SA, Arunkumar N, Farouk A (2018) Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6:20596\u201320608","journal-title":"IEEE Access"},{"key":"10723_CR15","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.advengsoft.2012.03.001","volume":"49","author":"K Gupta","year":"2012","unstructured":"Gupta K, Silakari S (2012) Novel approach for fast compressed hybrid color image cryptosystem. Adv Eng Softw 49:29\u201342","journal-title":"Adv Eng Softw"},{"issue":"8","key":"10723_CR16","first-page":"108","volume":"3","author":"RK Gupta","year":"2013","unstructured":"Gupta RK, Singh P (2013) A new way to design and implementation of hybrid crypto system for security of the information in public network. Int J Emerg Technol Adv Eng 3(8):108\u2013115","journal-title":"Int J Emerg Technol Adv Eng"},{"key":"10723_CR17","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1109\/RADIOELEK.2016.7477370","volume-title":"Image steganography with using QR code and cryptography","author":"V Hajduk","year":"2016","unstructured":"Hajduk V, Broda M, Kovac O, Levicky D (2016) Image steganography with using QR code and cryptography. 2016 26th International Conference Radioelektronika (RADIOELEKTRONIKA), Kosice, pp 350\u2013353. https:\/\/doi.org\/10.1109\/RADIOELEK.2016.7477370"},{"key":"10723_CR18","doi-asserted-by":"publisher","unstructured":"Hashim MM, Taha MS, Aman AHM, Hashim AHA, Rahim MSM, Islam S Securing Medical Data Transmission Systems Based on Integrating Algorithm of Encryption and Steganography, vol 2019. 2019 7th international conference on mechatronics engineering (ICOM), Putrajaya, pp 1\u20136. https:\/\/doi.org\/10.1109\/ICOM47790.2019.8952061","DOI":"10.1109\/ICOM47790.2019.8952061"},{"key":"10723_CR19","unstructured":"Input images available URL (2021), \u201chtttps:\/\/homepages.cae.wisc.edu\/~ece533\/images\/\u201d."},{"key":"10723_CR20","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1109\/IC3I.2016.7917977","volume-title":"Secure medical image steganography with RSA cryptography using decision tree","author":"M Jain","year":"2016","unstructured":"Jain M, Choudhary RC, Kumar A (2016) Secure medical image steganography with RSA cryptography using decision tree. 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), Noida, pp 291\u2013295. https:\/\/doi.org\/10.1109\/IC3I.2016.7917977"},{"key":"10723_CR21","doi-asserted-by":"publisher","first-page":"2235","DOI":"10.1007\/s11277-020-07474-0","volume":"114","author":"KT Kadhim","year":"2020","unstructured":"Kadhim KT, Alsahlany AM, Wadi SM, Kadhum HT (2020) An overview of Patient\u2019s health status monitoring system based on internet of things (IoT). Wireless Pers Commun 114:2235\u20132262. https:\/\/doi.org\/10.1007\/s11277-020-07474-0","journal-title":"Wireless Pers Commun"},{"key":"10723_CR22","doi-asserted-by":"publisher","first-page":"22","DOI":"10.5815\/ijcnis.2017.02.03","volume":"9","author":"MI Khalil","year":"2017","unstructured":"Khalil MI (2017) Medical image steganography: study of medical image quality degradation when embedding data in the frequency domain. Int J Comput Network Inform Secur 9:22\u201328. https:\/\/doi.org\/10.5815\/ijcnis.2017.02.03","journal-title":"Int J Comput Network Inform Secur"},{"key":"10723_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICAETR.2014.7012788","volume-title":"An efficient and effective lossless symmetric key cryptography algorithm for an image","author":"N Kumar","year":"2014","unstructured":"Kumar N, Agrawal S (2014) An efficient and effective lossless symmetric key cryptography algorithm for an image. 2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014), Unnao, pp 1\u20135. https:\/\/doi.org\/10.1109\/ICAETR.2014.7012788"},{"key":"10723_CR24","doi-asserted-by":"publisher","first-page":"57","DOI":"10.5121\/ijdms.2012.4605","volume":"4","author":"S Laskar","year":"2012","unstructured":"Laskar S (2012) High capacity data hiding using LSB steganography and encryption. Int J Database Manag Syst 4:57\u201368. https:\/\/doi.org\/10.5121\/ijdms.2012.4605","journal-title":"Int J Database Manag Syst"},{"key":"10723_CR25","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1109\/GCCE.2015.7398667","volume-title":"Unequal security protection for secure multimedia communication","author":"Y Leung","year":"2015","unstructured":"Leung Y, Hou RY (2015) Unequal security protection for secure multimedia communication. 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE), Osaka, pp 570\u2013571. https:\/\/doi.org\/10.1109\/GCCE.2015.7398667"},{"key":"10723_CR26","doi-asserted-by":"publisher","first-page":"2293","DOI":"10.1007\/s10586-017-1345-y","volume":"22","author":"L Li","year":"2019","unstructured":"Li L, Hossain MS, El-Latif AAA et al (2019) Distortion less secret image sharing scheme for internet of things system. Cluster Comput 22:2293\u20132307. https:\/\/doi.org\/10.1007\/s10586-017-1345-y","journal-title":"Cluster Comput"},{"key":"10723_CR27","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.compeleceng.2017.08.020","volume":"67","author":"X Liao","year":"2018","unstructured":"Liao X, Yin J, Guo S, Li X, Sangaiah AK (2018) Medical JPEG image steganography based on preserving inter-block dependencies. Comput Electri Eng 67:320\u2013329, ISSN 0045-7906. https:\/\/doi.org\/10.1016\/j.compeleceng.2017.08.020","journal-title":"Comput Electri Eng"},{"key":"10723_CR28","doi-asserted-by":"publisher","unstructured":"Madhusudhan KN, Sakthivel P (2020) A secure medical image transmission algorithm based on binary bits and Arnold map. J Ambient Intell Human Comput. https:\/\/doi.org\/10.1007\/s12652-020-02028-5","DOI":"10.1007\/s12652-020-02028-5"},{"key":"10723_CR29","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1007\/s11045-018-0575-3","volume":"30","author":"RF Mansour","year":"2019","unstructured":"Mansour RF, Abdelrahim EM (2019) An evolutionary computing enriched RS attack resilient medical image steganography model for telemedicine applications. Multidim Syst Sign Process 30:791\u2013814. https:\/\/doi.org\/10.1007\/s11045-018-0575-3","journal-title":"Multidim Syst Sign Process"},{"key":"10723_CR30","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/SIITME.2011.6102748","volume-title":"Secret data communication system using steganography, AES and RSA","author":"SF Mare","year":"2011","unstructured":"Mare SF, Vladutiu M, Prodan L (2011) Secret data communication system using steganography, AES and RSA. 2011 IEEE 17th International Symposium for Design and Technology in Electronic Packaging (SIITME), Timisoara, pp 339\u2013344. https:\/\/doi.org\/10.1109\/SIITME.2011.6102748"},{"issue":"2143897","key":"10723_CR31","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1155\/2018\/2143897","volume":"2018","author":"I Masood","year":"2018","unstructured":"Masood I, Wang Y, Daud A, Aljohani NR, Dawood H (2018) Towards Smart Healthcare: Patient Data Privacy and Security in Sensor-Cloud Infrastructure. Wireless Commun Mobile Comput 2018(2143897):23. https:\/\/doi.org\/10.1155\/2018\/2143897","journal-title":"Wireless Commun Mobile Comput"},{"key":"10723_CR32","unstructured":"May Zaw, Z., and S. W. Phyo. \u201cSecurity Enhancement System Based on the Integration of Cryptography and Steganography\u201d. Int J Comput (IJC), Vol. 19, no. 1, Oct. 2015, pp. 26\u201339."},{"key":"10723_CR33","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1016\/j.future.2016.11.029","volume":"86","author":"K Muhammad","year":"2018","unstructured":"Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2018) Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Future Gener Comput Syst 86:951\u2013960","journal-title":"Future Gener Comput Syst"},{"key":"10723_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/INDICON.2015.7443808","volume-title":"Secure non real time image encryption algorithm development using cryptography & steganography","author":"M Mukhedkar","year":"2015","unstructured":"Mukhedkar M, Powar P, Gaikwad P (2015) Secure non real time image encryption algorithm development using cryptography & steganography. 2015 Annual IEEE India Conference (INDICON), New Delhi, pp 1\u20136. https:\/\/doi.org\/10.1109\/INDICON.2015.7443808"},{"key":"10723_CR35","unstructured":"Nithyabharathi PV, Kowsalya T, Baskar V (2014) To Enhance Multimedia Security in Cloud Computing Environment Using RSA and AES. IJSETR 3(2)"},{"key":"10723_CR36","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1016\/j.sigpro.2014.10.012","volume":"108","author":"B Ou","year":"2015","unstructured":"Ou B, Li X, Zhao Y, Ni R (2015) Efficient color image reversible data hiding based on channel dependent payload partition and adaptive embedding. Signal Process 108:642\u2013657. https:\/\/doi.org\/10.1016\/j.sigpro.2014.10.012","journal-title":"Signal Process"},{"key":"10723_CR37","unstructured":"Panchal D (2015) An Approach Providing Two Phase Security of Images Using Encryption and Steganography in Image Processing. IJEDR 3(4) ISSN: 2321-9939"},{"key":"10723_CR38","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.future.2020.04.034","volume":"111","author":"HM Pandey","year":"2020","unstructured":"Pandey HM (2020) Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography. Future Gener Comput Syst 111:213\u2013225, ISSN 0167-739X. https:\/\/doi.org\/10.1016\/j.future.2020.04.034","journal-title":"Future Gener Comput Syst"},{"key":"10723_CR39","doi-asserted-by":"publisher","unstructured":"Parah SA, Sheikh JA, Ahad F, Bhat GM (2018) High capacity and secure electronic patient record (EPR) embedding in color images for IoT driven healthcare systems. In: Dey N, Hassanien A, Bhatt C, Ashour A, Satapathy S (eds) Internet of things and big data analytics toward next-generation intelligence. Studies in big data, vol 30. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-60435-0_17","DOI":"10.1007\/978-3-319-60435-0_17"},{"key":"10723_CR40","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.simpat.2012.08.002","volume":"34","author":"M Paschou","year":"2013","unstructured":"Paschou M, Sakkopoulos E, Sourla E, Tsakalidis A (2013) Health internet of things: metrics and methods for efficient data transfer. Simulation Modelling Practice and Theory 34:186\u2013199, ISSN 1569-190X. https:\/\/doi.org\/10.1016\/j.simpat.2012.08.002","journal-title":"Simulation Modelling Practice and Theory"},{"key":"10723_CR41","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1016\/j.procs.2016.02.108","volume":"78","author":"P Patil","year":"2016","unstructured":"Patil P, Narayankar P, Narayan DG, Meena SM (2016) A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Comput Sci 78:617\u2013624, ISSN 1877-0509. https:\/\/doi.org\/10.1016\/j.procs.2016.02.108","journal-title":"Procedia Comput Sci"},{"issue":"2","key":"10723_CR42","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.32604\/cmc.2020.011226","volume":"65","author":"N RajeshKumar","year":"2020","unstructured":"RajeshKumar N, Yuvaraj D, Manikandan G, Balakrishnan R, Karthikeyan B et al (2020) Secret image communication scheme based on visual cryptography and tetrolet tiling patterns. Comput Mater Continua 65(2):1283\u20131301","journal-title":"Comput Mater Continua"},{"key":"10723_CR43","doi-asserted-by":"publisher","unstructured":"Ramalingam B, Rengarajan A, Rayappan JBB (2017) Hybrid Image Crypto System for Secure Image Communication- A VLSI Approach. Microprocess Microsyst. https:\/\/doi.org\/10.1016\/j.micpro.2017.02.003","DOI":"10.1016\/j.micpro.2017.02.003"},{"key":"10723_CR44","doi-asserted-by":"publisher","unstructured":"Rathore S, Sharma PK, Loia V, Jeong Y-S, Park JH (2017) Social network security: Issues, challenges, threats, and solutions, Information Sciences, vol 421, pp 43\u201369, ISSN 0020-0255, https:\/\/doi.org\/10.1016\/j.ins.2017.08.063.","DOI":"10.1016\/j.ins.2017.08.063"},{"issue":"8","key":"10723_CR45","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1109\/TNB.2017.2780881","volume":"16","author":"D Ravichandran","year":"2017","unstructured":"Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) DNA Chaos blend to secure medical privacy. IEEE Trans NanoBiosci 16(8):850\u2013858. https:\/\/doi.org\/10.1109\/TNB.2017.2780881","journal-title":"IEEE Trans NanoBiosci"},{"key":"10723_CR46","doi-asserted-by":"crossref","unstructured":"Razzaq MA, Shaikh RA, Baig MA, Memon AA (2017) Digital image security: Fusion of encryption steganography and watermarking, Int. J Adv Comput Sci Appl 8(5):224\u2013228","DOI":"10.14569\/IJACSA.2017.080528"},{"key":"10723_CR47","doi-asserted-by":"publisher","first-page":"3519","DOI":"10.1007\/s11042-016-3811-6","volume":"76","author":"M Sajjad","year":"2017","unstructured":"Sajjad M, Muhammad K, Baik SW, Rho S, Jan Z, Yeo SS, Mehmood I (2017) Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices. Multimed Tools Appl 76:3519\u20133536. https:\/\/doi.org\/10.1007\/s11042-016-3811-6","journal-title":"Multimed Tools Appl"},{"key":"10723_CR48","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1016\/j.future.2017.11.013","volume":"108","author":"M Sajjad","year":"2020","unstructured":"Sajjad M, Nasir M, Muhammad K, Khan S, Jan Z, Sangaiah AK, Elhoseny M, Baik SW (2020) Raspberry Pi assisted face recognition framework for enhanced law-enforcement services in smart cities. Future Gener Comput Syst 108:995\u20131007, ISSN 0167-739X. https:\/\/doi.org\/10.1016\/j.future.2017.11.013","journal-title":"Future Gener Comput Syst"},{"key":"10723_CR49","doi-asserted-by":"publisher","unstructured":"Saleh ME, Aly AA, Omara FA (2016) Data security using cryptography and steganography techniques. Int J Adv Comput Sci Appl (IJACSA) 7(6). https:\/\/doi.org\/10.14569\/IJACSA.2016.070651","DOI":"10.14569\/IJACSA.2016.070651"},{"key":"10723_CR50","doi-asserted-by":"publisher","unstructured":"Setyaningsih E, Wardoyo R, Sari AK (2020) Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution. Digital Commun Networks, ISSN 2352-8648. https:\/\/doi.org\/10.1016\/j.dcan.2020.02.001","DOI":"10.1016\/j.dcan.2020.02.001"},{"issue":"5","key":"10723_CR51","doi-asserted-by":"publisher","first-page":"1202","DOI":"10.1016\/j.sigpro.2011.11.004","volume":"92","author":"SM Seyedzadeh","year":"2012","unstructured":"Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92(5):1202\u20131215","journal-title":"Signal Process"},{"key":"10723_CR52","doi-asserted-by":"publisher","unstructured":"Shahzadi S, Iqbal M, Dagiuklas T, Qayyum ZU (2017) Multi-access edge computing: open issues, challenges and future perspectives. J Cloud Comput 6. https:\/\/doi.org\/10.1186\/s13677-017-0097-9","DOI":"10.1186\/s13677-017-0097-9"},{"key":"10723_CR53","doi-asserted-by":"publisher","first-page":"e5122","DOI":"10.1002\/cpe.5122","volume":"32","author":"K Shankar","year":"2020","unstructured":"Shankar K, Lakshmanaprabu SK, Gupta D, Khanna A, de Albuquerque VHC (2020) Adaptive optimal multi key-based encryption for digital image security. Concurrency Computat Pract Exper 32:e5122. https:\/\/doi.org\/10.1002\/cpe.5122","journal-title":"Concurrency Computat Pract Exper"},{"key":"10723_CR54","doi-asserted-by":"crossref","unstructured":"Shilpi Harnal RK Chauhan (2019) Hybrid Cryptography based E2EE for Integrity &Confidentiality in Multimedia Cloud Computing. IJITEE 10(8)","DOI":"10.35940\/ijitee.J9001.0881019"},{"key":"10723_CR55","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.jnca.2016.11.027","volume":"79","author":"A Singh","year":"2017","unstructured":"Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Network Comput Appl 79:88\u2013115, ISSN 1084-8045. https:\/\/doi.org\/10.1016\/j.jnca.2016.11.027","journal-title":"J Network Comput Appl"},{"key":"10723_CR56","doi-asserted-by":"publisher","unstructured":"Sivaswamy J, Krishnadas SR, Joshi GD, Jain M, Ujjwaft Syed Tabish A (2015) Drishti-GS: Retinal image dataset for optic nerve head (ONH) segmentation. 2014 IEEE 11th International Symposium on Biomedical Imaging, ISBI 2014. pp. 53\u201356. https:\/\/doi.org\/10.1109\/ISBI.2014.6867807","DOI":"10.1109\/ISBI.2014.6867807"},{"key":"10723_CR57","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPCT.2017.8074197","volume-title":"\"security enhancement in image steganography for medical integrity verification system,\" 2017 international conference on circuit","author":"MS Sreekutty","year":"2017","unstructured":"Sreekutty MS, Baiju PS (2017, pp. 1-5) \"security enhancement in image steganography for medical integrity verification system,\" 2017 international conference on circuit. Kollam, Power and Computing Technologies (ICCPCT). https:\/\/doi.org\/10.1109\/ICCPCT.2017.8074197"},{"issue":"5","key":"10723_CR58","doi-asserted-by":"publisher","first-page":"501","DOI":"10.3390\/e22050501","volume":"22","author":"B Stoyanov","year":"2020","unstructured":"Stoyanov B, Stoyanov B (2020) BOOST: medical image steganography using nuclear spin generator. Entropy. 22(5):501","journal-title":"Entropy."},{"key":"10723_CR59","doi-asserted-by":"publisher","first-page":"2071","DOI":"10.1109\/ITNEC.2019.8729488","volume-title":"Research on Data Encryption Standard Based on AES Algorithm in Internet of Things Environment","author":"N Su","year":"2019","unstructured":"Su N, Zhang Y, Li M (2019) Research on Data Encryption Standard Based on AES Algorithm in Internet of Things Environment. 2019 IEEE 3rd information technology, networking, electronic and automation control conference (ITNEC), Chengdu, pp 2071\u20132075. https:\/\/doi.org\/10.1109\/ITNEC.2019.8729488"},{"key":"10723_CR60","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/CCNC.2018.8319263","volume-title":"Using image steganography for providing enhanced medical data security","author":"MA Usman","year":"2018","unstructured":"Usman MA, Usman MR (2018) Using image steganography for providing enhanced medical data security. 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, pp 1\u20134. https:\/\/doi.org\/10.1109\/CCNC.2018.8319263"},{"issue":"3","key":"10723_CR61","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1080\/00051144.2019.1624409","volume":"60","author":"K Venkatraman","year":"2019","unstructured":"Venkatraman K, Geetha K (2019) Dynamic virtual cluster cloud security using hybrid steganographic image authentication algorithm. Automatika 60(3):314\u2013321. https:\/\/doi.org\/10.1080\/00051144.2019.1624409","journal-title":"Automatika"},{"key":"10723_CR62","unstructured":"Wajgade VM (2013) Enhancing Data Security Using Video Steganography. Int J Emerg Technol Adv Eng 3(4)"},{"key":"10723_CR63","unstructured":"Y. Wu, J. P. Noonan, S. Agaian, \u201cNPCR and UACI randomness tests for image encryption\u201d, Cyber J: Multidis J Sci Technol, J Select Areas Telecommun (JSAT), April Edition, 2011, pp.31\u201338, 2011."},{"key":"10723_CR64","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","volume":"90","author":"A Yaghouti Niyat","year":"2017","unstructured":"Yaghouti Niyat A, Moattar MH, Niazi Torshiz M (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Optic Laser Eng 90:225\u2013237","journal-title":"Optic Laser Eng"},{"key":"10723_CR65","doi-asserted-by":"publisher","unstructured":"Rupeng Yang, Qiuliang Xu, Man Ho Au, Zuoxia Yu, Hao Wang, Lu Zhou, Position based cryptography with location privacy: a step for fog computing, Future Gener Comput Syst, volume 78, Part 2, 2018, Pages 799\u2013806, ISSN 0167-739X, https:\/\/doi.org\/10.1016\/j.future.2017.05.035.","DOI":"10.1016\/j.future.2017.05.035"},{"key":"10723_CR66","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1109\/CICN.2012.195","volume-title":"The Application of Hybrid Encryption Algorithm in Software Security","author":"L Yu","year":"2012","unstructured":"Yu L, Wang Z, Wang W (2012) The Application of Hybrid Encryption Algorithm in Software Security. 2012 Fourth international conference on computational intelligence and communication networks, Mathura, pp 762\u2013765. https:\/\/doi.org\/10.1109\/CICN.2012.195"},{"issue":"1051394","key":"10723_CR67","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1155\/2020\/1051394","volume":"2020","author":"J Yu","year":"2020","unstructured":"Yu J, Li H, Liu D (2020) Modified Immune Evolutionary Algorithm for Medical Data Clustering and Feature Extraction under Cloud Computing Environment. J Healthcare Eng 2020(1051394):11. https:\/\/doi.org\/10.1155\/2020\/1051394","journal-title":"J Healthcare Eng"},{"issue":"24","key":"10723_CR68","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1007\/s11042-014-2227-4","volume":"74","author":"M Zhang","year":"2015","unstructured":"Zhang M, Tong X-J (2015) A new algorithm of image compression and encryption based on spatiotemporal cross chaotic system. Multimed Tool Appl 74(24):1125\u201311279","journal-title":"Multimed Tool Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10723-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10723-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10723-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T01:12:46Z","timestamp":1621905166000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10723-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,13]]},"references-count":68,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["10723"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10723-4","relation":{"is-referenced-by":[{"id-type":"doi","id":"10.1186\/s13677-025-00779-0","asserted-by":"object"}]},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,13]]},"assertion":[{"value":"18 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}