{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T03:52:54Z","timestamp":1774669974920,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T00:00:00Z","timestamp":1687824000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T00:00:00Z","timestamp":1687824000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11042-023-15818-8","type":"journal-article","created":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T18:02:05Z","timestamp":1687888925000},"page":"11147-11167","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["DeepEnc: deep learning-based CT image encryption approach"],"prefix":"10.1007","volume":"83","author":[{"given":"Essam","family":"Abdellatef","sequence":"first","affiliation":[]},{"given":"Ensherah A.","family":"Naeem","sequence":"additional","affiliation":[]},{"given":"Fathi E. Abd","family":"El-Samie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,27]]},"reference":[{"key":"15818_CR1","doi-asserted-by":"crossref","unstructured":"Aminanto M, Kim K (2016) Detecting impersonation attack in WiFi networks using deep learning approach. In: Proceedings of the international workshop on information security applications, pp 136\u2013147","DOI":"10.1007\/978-3-319-56549-1_12"},{"issue":"10","key":"15818_CR2","doi-asserted-by":"publisher","first-page":"6663","DOI":"10.1007\/s11227-019-02878-7","volume":"75","author":"A Arab","year":"2019","unstructured":"Arab A, Rostami MJ, Ghavami B (2019) An image encryption method based on chaos system and AES algorithm. J Supercomput 75(10):6663\u20136682","journal-title":"J Supercomput"},{"key":"15818_CR3","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","volume":"128","author":"A Belazi","year":"2016","unstructured":"Belazi A, Abd El-Latif A, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155\u2013170","journal-title":"Signal Process"},{"key":"15818_CR4","doi-asserted-by":"crossref","unstructured":"Bhilare S, Jaswal G, Kanhangad V (2018) Single-sensor hand-vein multimodal biometric recognition using multiscale deep pyramidal approach. J Mach Vis Appl:1\u201318","DOI":"10.1007\/s00138-018-0959-2"},{"key":"15818_CR5","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/11836810_13","volume-title":"Proceedings of the International Conference on Information Security","author":"CD Canniere","year":"2006","unstructured":"Canniere CD (2006) TRIVIUM: a stream cipher construction inspired by block cipher design principles. In: Proceedings of the International Conference on Information Security, pp 171\u2013186"},{"issue":"2","key":"15818_CR6","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MITP.2016.27","volume":"18","author":"M Carcary","year":"2016","unstructured":"Carcary M, Renaud K, Mclaughlin S (2016) A framework for information security governance and management. IT Prof 18(2):22\u201330","journal-title":"IT Prof"},{"key":"15818_CR7","doi-asserted-by":"crossref","unstructured":"Cui G, Qin L, Wang Y (2007) Information security technology based on DNA computing. In: Proceedings of the international workshop on anti-counterfeiting, security and identification (ASID), pp 288\u2013291","DOI":"10.1109\/IWASID.2007.373746"},{"key":"15818_CR8","doi-asserted-by":"crossref","unstructured":"Cui G, Li C, Li H (2009) DNA computing and its application to information security field. In: Proceedings of the international conference on natural computation (IEEE), pp 148\u2013152","DOI":"10.1109\/ICNC.2009.27"},{"issue":"4","key":"15818_CR9","first-page":"232","volume":"1","author":"J Dieu","year":"2014","unstructured":"Dieu J (2014) A fast image encryption algorithm based on chaotic maps and the linear Diophantine equation. Comput Sci Appl 1(4):232\u2013243","journal-title":"Comput Sci Appl"},{"key":"15818_CR10","unstructured":"Ding Y, Wu G, Chen D, Zhang N, Gong L, Cao M, Qin Z (2020) DLEDNet: a deep learning-based image encryption and decryption network for internet of medical things. arXiv:2004.05523v2"},{"key":"15818_CR11","doi-asserted-by":"crossref","unstructured":"Ding Y, Tan F, Qin Z, Cao M, Qin Z (2021) DeepKeyGen: a deep learning-based stream cipher generator for medical image encryption and decryption. IEEE Trans Neural Netw Learn Syst","DOI":"10.1109\/TNNLS.2021.3062754"},{"issue":"2","key":"15818_CR12","first-page":"221","volume":"6","author":"R Enayatifar","year":"2011","unstructured":"Enayatifar R (2011) Image encryption via logistic map function and heap tree. Int J Phys Sci 6(2):221\u2013228","journal-title":"Int J Phys Sci"},{"issue":"2","key":"15818_CR13","doi-asserted-by":"publisher","first-page":"1371","DOI":"10.1109\/TCOMM.2018.2878025","volume":"67","author":"A Ferdowsi","year":"2019","unstructured":"Ferdowsi A, Saad W (2019) Deep learning for signal authentication and security in massive internet of things systems. IEEE Trans Commun 67(2):1371\u20131387","journal-title":"IEEE Trans Commun"},{"key":"15818_CR14","unstructured":"FERET Database. https:\/\/www.nist.gov\/itl\/iad\/image-group\/feret-database. Accessed Dec 2021"},{"issue":"8","key":"15818_CR15","doi-asserted-by":"publisher","first-page":"1000","DOI":"10.1016\/j.compbiomed.2013.05.005","volume":"43","author":"C Fu","year":"2013","unstructured":"Fu C, Meng W, Zhan Y (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43(8):1000\u20131010","journal-title":"Comput Biol Med"},{"key":"15818_CR16","doi-asserted-by":"crossref","unstructured":"Garcia-Bosque M, Sanchez-Azqueta C, Perez A, Martinez A, Celma S (2017) Fast and secure chaotic stream cipher with a MEMSbased seed generator. In: Proceedings of the IEEE Int. Instrum. Meas. Technol. Conf. (I2MTC), pp 1\u20136","DOI":"10.1109\/I2MTC.2017.7969881"},{"key":"15818_CR17","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun C-M, Chen CP (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80\u201394","journal-title":"Inf Sci"},{"key":"15818_CR18","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.cnsns.2014.12.005","volume":"24","author":"A Kanso","year":"2015","unstructured":"Kanso A, Ghebleh M (2015) An efficient and robust image encryption scheme for medical applications. Commun Nonlinear Sci Numer Simul 24:98\u2013116","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"4","key":"15818_CR19","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1007\/s11045-018-0589-x","volume":"30","author":"J Khan","year":"2019","unstructured":"Khan J, Ahmad J (2019) Chaos based efficient selective image encryption. Multidim Syst Sign Process 30(4):943\u2013961","journal-title":"Multidim Syst Sign Process"},{"key":"15818_CR20","doi-asserted-by":"publisher","first-page":"668","DOI":"10.1016\/j.ins.2017.08.048","volume":"418","author":"M Kumar","year":"2017","unstructured":"Kumar M, Mao Y, Wang Y, Qiu T, Yang C, Zhang W (2017) Fuzzy theoretic approach to signals and systems: static systems. Inf Sci 418:668\u2013702","journal-title":"Inf Sci"},{"key":"15818_CR21","doi-asserted-by":"crossref","unstructured":"Le T, Aono Y, Hayashi T (2017) Privacy-preserving deep learning: revisited and enhanced. In: Proceedings of the international conference on applications and techniques in information security, pp 100\u2013110","DOI":"10.1007\/978-981-10-5421-1_9"},{"key":"15818_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2755-6","volume-title":"Audio encryption based on the cosine number transform","author":"J Lima","year":"2016","unstructured":"Lima J, Neto E (2016) Audio encryption based on the cosine number transform. Kluwer Academic Publishers"},{"key":"15818_CR23","doi-asserted-by":"crossref","unstructured":"Lu L, Zhang J, Chen G, Khurram M, Alghathbar K (2011) Two-directional two-dimensional random projection and its variations for face and palmprint recognition. In: Proceedings of the international conference on computational science and its applications, pp 458\u2013470","DOI":"10.1007\/978-3-642-21934-4_37"},{"key":"15818_CR24","unstructured":"Lu L, Zhang S, Bi X, Khurram M (2012) Two-dimensional cancelable biometric sheme. In: Proceedings of the 2012 international conference on wavelet analysis and pattern recognition"},{"issue":"10","key":"15818_CR25","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1002\/sec.1399","volume":"9","author":"C Manifavas","year":"2016","unstructured":"Manifavas C, Hatzivasilis G, Fysarakis K, Papaefstathiou Y (2016) A survey of lightweight stream ciphers for embedded systems. Secur Commun Netw 9(10):1226\u20131246","journal-title":"Secur Commun Netw"},{"key":"15818_CR26","doi-asserted-by":"crossref","unstructured":"Mannai O, Becheikh R, Rhouma R (2018) A new stream cipher based on nonlinear dynamic system. In: Proceedings of the 26th Eur. Signal process. Conf. (EUSIPCO), pp 316\u2013320","DOI":"10.23919\/EUSIPCO.2018.8553449"},{"key":"15818_CR27","doi-asserted-by":"crossref","unstructured":"Mizuchi Y, Hagiwara Y, Suzuki A (2013) Monocular 3D palm posture estimation based on feature-points robust against finger motion. In: Proceedings of the 13th international conference on control, automation and systems (ICCAS), pp 1014\u20131019","DOI":"10.1109\/ICCAS.2013.6704065"},{"key":"15818_CR28","first-page":"1","volume-title":"Proceedings of the IEEE INDICON, India","author":"M Mukhedkar","year":"2015","unstructured":"Mukhedkar M, Powar P, Gaikwad P (2015) Secure non real time image encryption algorithm development using cryptography & steganography. In: Proceedings of the IEEE INDICON, India, pp 1\u20136"},{"issue":"3","key":"15818_CR29","first-page":"1","volume":"10","author":"M Musleh","year":"2012","unstructured":"Musleh M, Ba I, Nofal K (2012) Improving information security in e-banking by using biometric fingerprint: a case of major bank in Malaysia. Int J Comput Sci Inf Secur 10(3):1\u20134","journal-title":"Int J Comput Sci Inf Secur"},{"key":"15818_CR30","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.procs.2016.07.018","volume":"90","author":"Q Natsheh","year":"2016","unstructured":"Natsheh Q, Li B, Gale AG (2016) Security of multi-frame DICOM images using XOR encryption approach. Procedia Comput Sci 90:175\u2013181","journal-title":"Procedia Comput Sci"},{"key":"15818_CR31","doi-asserted-by":"crossref","unstructured":"\u00d6zkaynak F (2017) Role of NPCR and UACI tests in security problems of chaos based image encryption algorithms and possible solution proposals. In: Proceedings of the International Conference on Computer Science and Engineering (UBMK)","DOI":"10.1109\/UBMK.2017.8093481"},{"key":"15818_CR32","doi-asserted-by":"crossref","unstructured":"Rao Y, Ni J (2017) A deep learning approach to detection of splicing and copy-move forgeries in images. In: Proceedings of the IEEE international workshop on information forensics and security (IEEE), pp 1\u20136","DOI":"10.1109\/WIFS.2016.7823911"},{"key":"15818_CR33","unstructured":"Shang J, Huang H (2011) Shallow fingerprint identification information security technology in the electronic commerce application. In: Proceedings of the international conference on computer science and service (IEEE), pp 1684\u20131687"},{"issue":"11","key":"15818_CR34","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J Ye","year":"2017","unstructured":"Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. J IEEE Trans Inf Forensics Secur 12(11):2545\u20132557","journal-title":"J IEEE Trans Inf Forensics Secur"},{"key":"15818_CR35","doi-asserted-by":"crossref","unstructured":"Yu W, Chi C, Wei X, Yang X (2010) Image encryption algorithm based on high-dimensional chaotic systems. In: Proceedings of the international conference on intelligent control and information procession, China, pp 463\u2013467","DOI":"10.1109\/ICICIP.2010.5564211"},{"key":"15818_CR36","doi-asserted-by":"crossref","unstructured":"Yuan Z, Liu Y, Yue J, Li J, Yang H (2017) CORAL: coarse-grained reconfigurable architecture for convolutional neural networks. In: Proceedings of the IEEE\/ACM international symposium on low power electronics and design (ISLPED), pp 1\u20136","DOI":"10.1109\/ISLPED.2017.8009162"},{"key":"15818_CR37","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.optlaseng.2017.04.009","volume":"96","author":"R Zahmoul","year":"2017","unstructured":"Zahmoul R, Ejbali R, Zaied M (2017) Image encryption based on new beta chaotic maps. Opt Lasers Eng 96:39\u201349","journal-title":"Opt Lasers Eng"},{"key":"15818_CR38","doi-asserted-by":"crossref","unstructured":"Zhou S, Lu X (2010) Fingerprint identification and its applications in information security fields. In: Proceedings of the International Conference of Information Science and Management Engineering (IEEE), pp 97\u201399","DOI":"10.1109\/ISME.2010.186"},{"issue":"9","key":"15818_CR39","doi-asserted-by":"publisher","first-page":"2001","DOI":"10.1109\/TCYB.2014.2363168","volume":"45","author":"Y Zhou","year":"2015","unstructured":"Zhou Y, Hua Z, Pun C-M, Chen CLP (2015) Cascade chaotic system with applications. IEEE Trans Cybern 45(9):2001\u20132012","journal-title":"IEEE Trans Cybern"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15818-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15818-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15818-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T09:45:10Z","timestamp":1704879910000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15818-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,27]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["15818"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15818-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,27]]},"assertion":[{"value":"19 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 May 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and\/or national research committee and with the 1964 Helsinki declaration and its later amendments or comparable ethical standards.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"The authors declare that they have no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}