{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T02:19:13Z","timestamp":1772504353104,"version":"3.50.1"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"22","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16777-w","type":"journal-article","created":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T20:01:41Z","timestamp":1725220901000},"page":"25749-25803","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Blockchain-based color medical image cryptosystem for industrial Internet of Healthcare Things (IoHT)"],"prefix":"10.1007","volume":"84","author":[{"given":"Fatma","family":"Khallaf","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7509-2120","authenticated-orcid":false,"given":"Walid","family":"El-Shafai","sequence":"additional","affiliation":[]},{"given":"El-Sayed M.","family":"El-Rabaie","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8749-9518","authenticated-orcid":false,"given":"Fathi E. Abd","family":"El-Samie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,2]]},"reference":[{"issue":"5","key":"16777_CR1","doi-asserted-by":"publisher","first-page":"8076","DOI":"10.1109\/JIOT.2019.2920987","volume":"6","author":"HN Dai","year":"2019","unstructured":"Dai HN, Zheng Z, Zhang Y (2019) Blockchain for Internet of Things: A survey. IEEE Internet Things J 6(5):8076\u20138094","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"16777_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3316481","volume":"52","author":"R Zhang","year":"2019","unstructured":"Zhang R, Xue R, Liu L (2019) Security and privacy on blockchain. ACM Computing Surveys (CSUR) 52(3):1\u201334","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"16777_CR3","doi-asserted-by":"publisher","first-page":"149935","DOI":"10.1109\/ACCESS.2019.2947613","volume":"7","author":"L Ismail","year":"2019","unstructured":"Ismail L, Materwala H, Zeadally S (2019) Lightweight blockchain for healthcare. IEEE Access 7:149935\u2013149951","journal-title":"IEEE Access"},{"key":"16777_CR4","doi-asserted-by":"publisher","first-page":"148550","DOI":"10.1109\/ACCESS.2019.2946983","volume":"7","author":"M Raikwar","year":"2019","unstructured":"Raikwar M, Gligoroski D, Kralevska K (2019) SoK of used cryptography in blockchain. IEEE Access 7:148550\u2013148575","journal-title":"IEEE Access"},{"key":"16777_CR5","first-page":"183","volume":"59","author":"M Nofer","year":"2017","unstructured":"Nofer M, Gomber P, Hinz O, Schiereck D (2017) Blockchain. Business & Information. Syst Eng 59:183\u2013187","journal-title":"Syst Eng"},{"issue":"10","key":"16777_CR6","doi-asserted-by":"publisher","first-page":"1743","DOI":"10.1109\/TLA.2020.9387645","volume":"18","author":"FD Giraldo","year":"2020","unstructured":"Giraldo FD, Gamboa CE (2020) Electronic voting using blockchain and smart contracts: Proof of concept. IEEE Lat Am Trans 18(10):1743\u20131751","journal-title":"IEEE Lat Am Trans"},{"issue":"3","key":"16777_CR7","doi-asserted-by":"publisher","first-page":"2009","DOI":"10.1109\/COMST.2020.2989392","volume":"22","author":"K Gai","year":"2020","unstructured":"Gai K, Guo J, Zhu L, Yu S (2020) Blockchain meets cloud computing: A survey. IEEE Commun Surv Tutorials 22(3):2009\u20132030","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"4","key":"16777_CR8","doi-asserted-by":"publisher","first-page":"78","DOI":"10.23919\/JCC.2020.04.008","volume":"17","author":"J Xu","year":"2020","unstructured":"Xu J, Wang S, Zhou A, Yang F (2020) Edgence: A blockchain-enabled edge-computing platform for intelligent IoT-based dApps. China Commun 17(4):78\u201387","journal-title":"China Commun"},{"issue":"6","key":"16777_CR9","doi-asserted-by":"publisher","first-page":"3668","DOI":"10.1109\/TSC.2021.3085913","volume":"15","author":"R Zhang","year":"2021","unstructured":"Zhang R, Xue R, Liu L (2021) Security and privacy for healthcare blockchains. IEEE Trans Serv Comput 15(6):3668\u20133686","journal-title":"IEEE Trans Serv Comput"},{"key":"16777_CR10","doi-asserted-by":"publisher","first-page":"32979","DOI":"10.1109\/ACCESS.2018.2842685","volume":"6","author":"TM Fern\u00e1ndez-Caram\u00e9s","year":"2018","unstructured":"Fern\u00e1ndez-Caram\u00e9s TM, Fraga-Lamas P (2018) A Review on the Use of Blockchain for the Internet of Things. Ieee Access 6:32979\u201333001","journal-title":"Ieee Access"},{"key":"16777_CR11","doi-asserted-by":"publisher","first-page":"164595","DOI":"10.1109\/ACCESS.2019.2952942","volume":"7","author":"EY Daraghmi","year":"2019","unstructured":"Daraghmi EY, Daraghmi YA, Yuan SM (2019) MedChain: a design of blockchain-based system for medical records access and permissions management. IEEE Access 7:164595\u2013164613","journal-title":"IEEE Access"},{"key":"16777_CR12","doi-asserted-by":"publisher","first-page":"88012","DOI":"10.1109\/ACCESS.2019.2925625","volume":"7","author":"R Guo","year":"2019","unstructured":"Guo R, Shi H, Zheng D, Jing C, Zhuang C, Wang Z (2019) Flexible and efficient blockchain-based ABE scheme with multi-authority for medical on demand in telemedicine system. IEEE Access 7:88012\u201388025","journal-title":"IEEE Access"},{"issue":"5","key":"16777_CR13","doi-asserted-by":"publisher","first-page":"2755","DOI":"10.1109\/TSC.2021.3078119","volume":"15","author":"F Li","year":"2021","unstructured":"Li F, Liu K, Zhang L, Huang S, Wu Q (2021) EHRChain: a blockchain-based ehr system using attribute-based and homomorphic cryptosystem. IEEE Trans Serv Comput 15(5):2755\u20132765","journal-title":"IEEE Trans Serv Comput"},{"key":"16777_CR14","doi-asserted-by":"crossref","unstructured":"Madine, M M, Battah, AA, Yaqoob, I, Salah, K, Jayaraman, R, Al-Hammadi, Y., ..., Ellahham, S (2020) Blockchain for giving patients control over their medical records.\u00a0IEEE Access,\u00a08, 193102\u2013193115","DOI":"10.1109\/ACCESS.2020.3032553"},{"key":"16777_CR15","doi-asserted-by":"publisher","first-page":"37936","DOI":"10.1109\/ACCESS.2021.3063152","volume":"9","author":"L Ricci","year":"2021","unstructured":"Ricci L, Maesa DDF, Favenza A, Ferro E (2021) Blockchains for covid-19 contact tracing and vaccine support: A systematic review. Ieee Access 9:37936\u201337950","journal-title":"Ieee Access"},{"key":"16777_CR16","doi-asserted-by":"publisher","first-page":"21091","DOI":"10.1109\/ACCESS.2020.2968985","volume":"8","author":"TM Fernandez-Carames","year":"2020","unstructured":"Fernandez-Carames TM, Fraga-Lamas P (2020) Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks. IEEE access 8:21091\u201321116","journal-title":"IEEE access"},{"key":"16777_CR17","doi-asserted-by":"publisher","first-page":"118771","DOI":"10.1109\/ACCESS.2021.3107591","volume":"9","author":"J Tao","year":"2021","unstructured":"Tao J, Ling L (2021) Practical medical files sharing scheme based on blockchain and decentralized attribute-based encryption. IEEE Access 9:118771\u2013118781","journal-title":"IEEE Access"},{"key":"16777_CR18","doi-asserted-by":"publisher","first-page":"136704","DOI":"10.1109\/ACCESS.2019.2943153","volume":"7","author":"Y Wang","year":"2019","unstructured":"Wang Y, Zhang A, Zhang P, Wang H (2019) Cloud-assisted EHR sharing with security and privacy preservation via consortium blockchain. Ieee Access 7:136704\u2013136719","journal-title":"Ieee Access"},{"key":"16777_CR19","doi-asserted-by":"publisher","first-page":"45468","DOI":"10.1109\/ACCESS.2020.2976894","volume":"8","author":"X Yang","year":"2020","unstructured":"Yang X, Li T, Pei X, Wen L, Wang C (2020) Medical data sharing scheme based on attribute cryptosystem and blockchain technology. IEEE Access 8:45468\u201345476","journal-title":"IEEE Access"},{"key":"16777_CR20","doi-asserted-by":"publisher","first-page":"216856","DOI":"10.1109\/ACCESS.2020.3040240","volume":"8","author":"J Indumathi","year":"2020","unstructured":"Indumathi J, Shankar A, Ghalib MR, Gitanjali J, Hua Q, Wen Z, Qi X (2020) Block chain based internet of medical things for uninterrupted, ubiquitous, user-friendly, unflappable, unblemished, unlimited health care services (bc iomt u 6 hcs). IEEE Access 8:216856\u2013216872","journal-title":"IEEE Access"},{"issue":"14","key":"16777_CR21","doi-asserted-by":"publisher","first-page":"6376","DOI":"10.3390\/app11146376","volume":"11","author":"SM Umran","year":"2021","unstructured":"Umran SM, Lu S, Abduljabbar ZA, Zhu J, Wu J (2021) Secure data of industrial internet of things in a cement factory based on a Blockchain technology. Appl Sci 11(14):6376","journal-title":"Appl Sci"},{"issue":"2","key":"16777_CR22","doi-asserted-by":"publisher","first-page":"175","DOI":"10.3390\/e22020175","volume":"22","author":"PW Khan","year":"2020","unstructured":"Khan PW, Byun Y (2020) A blockchain-based secure image encryption scheme for the industrial Internet of Things. Entropy 22(2):175","journal-title":"Entropy"},{"issue":"4","key":"16777_CR23","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng Z, Xie S, Dai HN, Chen X, Wang H (2018) Blockchain challenges and opportunities: A survey. Int J Web Grid Serv 14(4):352\u2013375","journal-title":"Int J Web Grid Serv"},{"key":"16777_CR24","doi-asserted-by":"crossref","unstructured":"Gaurav AB, Kumar P, Kumar V, Thakur RS (2023) Conceptual insights in blockchain technology: Security and applications. In: Research anthology on convergence of blockchain, internet of things, and security. IGI Global, pp 841\u2013851","DOI":"10.4018\/978-1-6684-7132-6.ch046"},{"issue":"4","key":"16777_CR25","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MCE.2018.2816299","volume":"7","author":"D Puthal","year":"2018","unstructured":"Puthal D, Malik N, Mohanty SP, Kougianos E, Das G (2018) Everything you wanted to know about the blockchain: Its promise, components, processes, and problems. IEEE Consumer Electronics Magazine 7(4):6\u201314","journal-title":"IEEE Consumer Electronics Magazine"},{"key":"16777_CR26","unstructured":"Wang G (2021) Sok: Applying blockchain technology in industrial internet of things.\u00a0Cryptology ePrint Archive"},{"issue":"4","key":"16777_CR27","first-page":"215","volume":"10","author":"OMA Zaid","year":"2013","unstructured":"Zaid OMA, El-Fishawy NA, Nigm EM (2013) Cryptosystem Algorithm Based on Chaotic Systems for Encrypting Colored Images. Int J Comput Sci Issues (IJCSI) 10(4):215","journal-title":"Int J Comput Sci Issues (IJCSI)"},{"key":"16777_CR28","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s11831-018-9298-8","volume":"27","author":"M Kaur","year":"2020","unstructured":"Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods Eng 27:15\u201343","journal-title":"Arch Comput Methods Eng"},{"key":"16777_CR29","doi-asserted-by":"publisher","first-page":"6229","DOI":"10.1007\/s11042-016-3311-8","volume":"76","author":"X Wang","year":"2017","unstructured":"Wang X, Liu C (2017) A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed Tools Appl 76:6229\u20136245","journal-title":"Multimed Tools Appl"},{"key":"16777_CR30","doi-asserted-by":"crossref","unstructured":"Zhong W, Qin C, Liu C, Li H, Wang H (2012) The edge detection of rice image based on mathematical morphology and wavelet packet. In: Proceedings of 2012 International Conference on Measurement, Information and Control\u00a0(Vol. 2). IEEE, pp 801\u2013804","DOI":"10.1109\/MIC.2012.6273410"},{"key":"16777_CR31","doi-asserted-by":"crossref","unstructured":"Podder P, Parvez AMS, Yeasmin MN, Khalil MI (2018) Relative performance analysis of edge detection techniques in iris recognition system. In: 2018 international conference on current trends towards converging technologies (ICCTCT). IEEE, pp 1\u20136","DOI":"10.1109\/ICCTCT.2018.8551023"},{"key":"16777_CR32","doi-asserted-by":"crossref","unstructured":"Mou H, Li X, Li G, Lu D, Zhang R (2018) A self-adaptive and dynamic image encryption based on latin square and high-dimensional chaotic system. In: 2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC). IEEE, pp 684\u2013690","DOI":"10.1109\/ICIVC.2018.8492876"},{"issue":"3","key":"16777_CR33","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749\u2013761","journal-title":"Chaos, Solitons Fractals"},{"key":"16777_CR34","doi-asserted-by":"crossref","unstructured":"Al-Dmour H, Al-Ani A (2015) Quality optimized medical image steganography based on edge detection and hamming code. In: 2015 IEEE 12th International Symposium on Biomedical Imaging (ISBI). IEEE, pp 1486\u20131489","DOI":"10.1109\/ISBI.2015.7164158"},{"key":"16777_CR35","doi-asserted-by":"publisher","first-page":"9007","DOI":"10.1007\/s12652-020-02597-5","volume":"12","author":"W El-Shafai","year":"2021","unstructured":"El-Shafai W, Khallaf F, El-Rabaie ESM, El-Samie FEA (2021) Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications. J Ambient Intell Humaniz Comput 12:9007\u20139035","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"16777_CR36","doi-asserted-by":"publisher","first-page":"128548","DOI":"10.1109\/ACCESS.2020.3008644","volume":"8","author":"A Alarifi","year":"2020","unstructured":"Alarifi A, Sankar S, Altameem T, Jithin KC, Amoon M, El-Shafai W (2020) A novel hybrid cryptosystem for secure streaming of high efficiency H. 265 compressed videos in IoT multimedia applications. IEEE Access 8:128548\u2013128573","journal-title":"IEEE Access"},{"key":"16777_CR37","doi-asserted-by":"crossref","unstructured":"El-Shafai W, Khallaf F, El-Rabaie ESM, El-Samie FEA (2022) Proposed 3D chaos-based medical image cryptosystem for secure cloud-IoMT eHealth communication services.\u00a0J Ambient Intell Human Comput 1\u201328","DOI":"10.1007\/s12652-022-03832-x"},{"issue":"22","key":"16777_CR38","doi-asserted-by":"publisher","first-page":"3786","DOI":"10.3390\/electronics11223786","volume":"11","author":"IS Farahat","year":"2022","unstructured":"Farahat IS, Aladrousy W, Elhoseny M, Elmougy S, Tolba AE (2022) Improving Healthcare Applications Security Using Blockchain. Electronics 11(22):3786","journal-title":"Electronics"},{"key":"16777_CR39","doi-asserted-by":"crossref","unstructured":"\u200fMohanty MD, Das A, Mohanty MN, Altameem A, Nayak SR, Saudagar AKJ, Poonia RC (2022) Design of smart and secured healthcare service using deep learning with modified SHA-256 algorithm. In: Healthcare\u00a0(Vol. 10, No. 7). MDPI, p 1275","DOI":"10.3390\/healthcare10071275"},{"key":"16777_CR40","doi-asserted-by":"publisher","first-page":"78887","DOI":"10.1109\/ACCESS.2022.3194195","volume":"10","author":"AA Khan","year":"2022","unstructured":"Khan AA, Wagan AA, Laghari AA, Gilal AR, Aziz IA, Talpur BA (2022) BIoMT: a state-of-the-art consortium serverless network architecture for healthcare system using blockchain smart contracts. IEEE Access 10:78887\u201378898","journal-title":"IEEE Access"},{"key":"16777_CR41","doi-asserted-by":"crossref","unstructured":"Egala BS, Pradhan AK, Dey P, Badarla V, Mohanty SP (2023) Fortified-chain 2.0: intelligent blockchain for decentralized smart healthcare system.\u00a0IEEE Int Things J","DOI":"10.1109\/JIOT.2023.3247452"},{"key":"16777_CR42","doi-asserted-by":"crossref","unstructured":"Andrew J, Isravel DP, Sagayam KM, Bhushan B, Sei Y, Eunice J (2023) Blockchain for healthcare systems: architecture, security challenges, trends and future directions.\u00a0J Netw Comput Appl 103633","DOI":"10.1016\/j.jnca.2023.103633"},{"key":"16777_CR43","doi-asserted-by":"crossref","unstructured":"El-Shafai W, Khallaf F, El-Rabaie ESM, El-Samie A, Fathi E (2022) Proposed neural SAE-based medical image cryptography framework using deep extracted features for smart IoT healthcare applications. Neural Comput Appl 1\u201325","DOI":"10.1007\/s00521-022-06994-z"},{"issue":"3","key":"16777_CR44","doi-asserted-by":"publisher","first-page":"3599","DOI":"10.32604\/csse.2023.037655","volume":"46","author":"W El-Shafai","year":"2023","unstructured":"El-Shafai W, Khallaf F, El-Rabaie EM, El-Samie FEA, Almomani I (2023) A multi-stage security solution for medical color images in healthcare applications. Comput Syst Sci Eng 46(3):3599\u20133618","journal-title":"Comput Syst Sci Eng"},{"key":"16777_CR45","doi-asserted-by":"publisher","first-page":"155184","DOI":"10.1109\/ACCESS.2020.3019216","volume":"8","author":"SF Yousif","year":"2020","unstructured":"Yousif SF, Abboud AJ, Radhi HY (2020) Robust image encryption with scanning technology, the El-Gamal algorithm and chaos theory. IEEE Access 8:155184\u2013155209","journal-title":"IEEE Access"},{"issue":"19","key":"16777_CR46","doi-asserted-by":"publisher","first-page":"27453","DOI":"10.1007\/s11042-022-12762-x","volume":"81","author":"SF Yousif","year":"2022","unstructured":"Yousif SF, Abboud AJ, Alhumaima RS (2022) A new image encryption based on bit replacing, chaos and DNA coding techniques. Multimed Tools Appl 81(19):27453\u201327493","journal-title":"Multimed Tools Appl"},{"key":"16777_CR47","doi-asserted-by":"publisher","first-page":"20739","DOI":"10.1007\/s11042-016-3971-4","volume":"76","author":"X Liao","year":"2017","unstructured":"Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76:20739\u201320753","journal-title":"Multimed Tools Appl"},{"key":"16777_CR48","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.jvcir.2014.12.007","volume":"28","author":"X Liao","year":"2015","unstructured":"Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28:21\u201327","journal-title":"J Vis Commun Image Represent"},{"key":"16777_CR49","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.image.2017.07.006","volume":"58","author":"X Liao","year":"2017","unstructured":"Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146\u2013156","journal-title":"Signal Process Image Commun"},{"issue":"2","key":"16777_CR50","doi-asserted-by":"publisher","first-page":"3133","DOI":"10.32604\/cmc.2022.020454","volume":"70","author":"F Alqahtani","year":"2022","unstructured":"Alqahtani F, Amoon M, El-Shafai W (2022) A fractional fourier based medical image authentication approach. CMC-Comput Mater Continua 70(2):3133\u20133150","journal-title":"CMC-Comput Mater Continua"},{"key":"16777_CR51","doi-asserted-by":"publisher","first-page":"35004","DOI":"10.1109\/ACCESS.2021.3062403","volume":"9","author":"W El-Shafai","year":"2021","unstructured":"El-Shafai W, Almomani IM, Alkhayer A (2021) Optical bit-plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication. IEEE Access 9:35004\u201335026","journal-title":"IEEE Access"},{"issue":"1","key":"16777_CR52","doi-asserted-by":"publisher","first-page":"895","DOI":"10.32604\/cmc.2022.018545","volume":"70","author":"W El-Shafai","year":"2022","unstructured":"El-Shafai W, Aly M, Algarni A, Abd El-Samie FE, Soliman NF (2022) Secure and robust optical multi-stage medical image cryptosystem. CMC-Comput Mater Continua 70(1):895\u2013913","journal-title":"CMC-Comput Mater Continua"},{"key":"16777_CR53","volume":"64","author":"W El-Shafai","year":"2022","unstructured":"El-Shafai W, Mesrega AK, Ahmed HEH, El-Bahnasawy NA, Abd El-Samie FE (2022) An efficient multimedia compression-encryption scheme using latin squares for securing internet-of-things networks. J Inf Secur Appl 64:103039","journal-title":"J Inf Secur Appl"},{"key":"16777_CR54","doi-asserted-by":"crossref","unstructured":"Faragallah, OS, Alzain, MA, El-Sayed, HS, Al-Amri, JF, El-Shafai, W, Afifi, A, ..., Soh, B (2018) Block-based optical color image encryption based on double random phase encoding. IEEE Access, 7, 4184\u20134194","DOI":"10.1109\/ACCESS.2018.2879857"},{"key":"16777_CR55","doi-asserted-by":"crossref","unstructured":"Faragallah, OS, AlZain, MA, El-Sayed, HS, Al-Amri, JF, El-Shafai, W, Afifi, A, ..., Soh, B (2020) Secure color image cryptosystem based on chaotic logistic in the FrFT domain. Multimedia Tools and Applications, 79, 2495\u20132519","DOI":"10.1007\/s11042-019-08190-z"},{"key":"16777_CR56","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106333","volume":"137","author":"OS Faragallah","year":"2021","unstructured":"Faragallah OS, El-sayed HS, Afifi A, El-Shafai W (2021) Efficient and secure opto-cryptosystem for color images using 2D logistic-based fractional Fourier transform. Opt Lasers Eng 137:106333","journal-title":"Opt Lasers Eng"},{"key":"16777_CR57","doi-asserted-by":"crossref","unstructured":"Faragallah, O S, El-Shafai, W, Sallam, AI, Elashry, I, EL-Rabaie, ESM, Afifi, A, ..., El-sayed, HS (2022) Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication. J Ambient Intell Human Comput, 1\u201325","DOI":"10.1007\/s12652-020-02832-z"},{"key":"16777_CR58","doi-asserted-by":"crossref","unstructured":"Helmy M, El-Shafai W, El-Rabaie S, El-Dokany IM, El-Samie FEA (2021) Efficient security framework for reliable wireless 3d video transmission. Multidimension Syst Signal Process 1\u201341","DOI":"10.1007\/s11045-021-00796-7"},{"key":"16777_CR59","doi-asserted-by":"crossref","unstructured":"El-Shafai W, Almomani I, Ara A, Alkhayer A (2022) An optical-based encryption and authentication algorithm for color and grayscale medical images.\u00a0Multimed Tools Appl 1\u201336","DOI":"10.1007\/s11042-022-14093-3"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16777-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16777-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16777-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T00:37:39Z","timestamp":1757119059000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16777-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":59,"journal-issue":{"issue":"22","published-online":{"date-parts":[[2025,7]]}},"alternative-id":["16777"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16777-w","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,2]]},"assertion":[{"value":"10 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 August 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors contributed and accepted to submit the current work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors have neither relevant financial nor non-financial interests to disclose.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"The authors declare that they have no conflicts of interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All authors accept to submit and publish the submitted work.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}