{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T04:02:25Z","timestamp":1763092945453,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","license":[{"start":{"date-parts":[[2024,5,4]],"date-time":"2024-05-04T00:00:00Z","timestamp":1714780800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,4]],"date-time":"2024-05-04T00:00:00Z","timestamp":1714780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19217-5","type":"journal-article","created":{"date-parts":[[2024,5,4]],"date-time":"2024-05-04T04:01:43Z","timestamp":1714795303000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Chaos in fractals on FPGA \u2013 privacy preservation for a secure IoT node"],"prefix":"10.1007","author":[{"given":"M.","family":"Thalaimalaichamy","sequence":"first","affiliation":[]},{"given":"S.","family":"Radhakrishnan","sequence":"additional","affiliation":[]},{"given":"S.","family":"Baskaran","sequence":"additional","affiliation":[]},{"given":"S.","family":"Saravanan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4826-6890","authenticated-orcid":false,"given":"V. G.","family":"Rajendran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,4]]},"reference":[{"key":"19217_CR1","unstructured":"Rivera J, Van der Muelen R. Gartner Says the Internet of Things Installed Base Will Grow to 26 Billion Units By 2020.\u00a0https:\/\/www.finyear.com\/Gartner-Says-the-Internet-of-Things-Installed-Base-Will-Grow-to-26-Billion-Units-By-2020_a27901.html. Accessed on 2019"},{"issue":"5","key":"19217_CR2","first-page":"28","volume":"25","author":"Y Tan","year":"2018","unstructured":"Tan Y, Zhang X, Sharif K, Liang C, Zhang Q, Li Y (2018) Covert timing channels for IoT over mobile networks. IEEE Wireless Commun 25(5):28","journal-title":"IEEE Wireless Commun"},{"issue":"6","key":"19217_CR3","doi-asserted-by":"publisher","first-page":"1934","DOI":"10.1109\/JIOT.2017.2690522","volume":"4","author":"Z Guan","year":"2017","unstructured":"Guan Z, Li J, Wu L, Zhang Y, Wu J, Du X (2017) Achieving efficient and secure data acquisition for cloud-supported Internet of Things in smart grid\u2019\u2019. IEEE Internet Things J 4(6):1934\u20131944","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"19217_CR4","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","volume":"10","author":"L Da Xu","year":"2014","unstructured":"Da Xu L, He W, Li S (2014) Internet of things in industries: A survey. IEEE Trans Ind Informat 10(4):2233\u20132243","journal-title":"IEEE Trans Ind Informat"},{"key":"19217_CR5","doi-asserted-by":"publisher","first-page":"1380","DOI":"10.1109\/JIOT.2017.2732357","volume":"4","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Huang H, Xiang Y et al (2017) Harnessing the Hybrid Cloud for Secure Big Image Data Service. IEEE Internet Things J 4:1380\u20131388","journal-title":"IEEE Internet Things J"},{"key":"19217_CR6","doi-asserted-by":"publisher","first-page":"3652","DOI":"10.3390\/s140203652","volume":"14","author":"M Sajjad","year":"2014","unstructured":"Sajjad M, Mehmood I, Baik SW (2014) Sparse representations-based super-resolution of key-frames extracted from frames-sequences generated by a visual sensor network. Sensors 14:3652\u20133674","journal-title":"Sensors"},{"key":"19217_CR7","doi-asserted-by":"publisher","first-page":"6165","DOI":"10.3390\/s110606165","volume":"11","author":"J Lloret","year":"2011","unstructured":"Lloret J, Bosch I, Sendra S, Serrano A (2011) A wireless sensornetwork for vineyard monitoring that uses image processing. Sensors 11:6165\u20136196","journal-title":"Sensors"},{"issue":"March","key":"19217_CR8","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.maturitas.2018.04.008","volume":"113","author":"L Coventry","year":"2018","unstructured":"Coventry L, Branley D (2018) Cybersecurity in healthcare\u202f: a narrative review of trends, threats and ways forward. Maturitas 113(March):48\u201352","journal-title":"Maturitas"},{"issue":"7","key":"19217_CR9","doi-asserted-by":"publisher","first-page":"1354","DOI":"10.1049\/iet-ipr.2019.0562","volume":"14","author":"S Rajagopalan","year":"2020","unstructured":"Rajagopalan S et al (2020) Chua\u2019s diode and strange attractor: a three-layer hardware-software co-design for medical image confidentiality. IET Image Process 14(7):1354\u20131365","journal-title":"IET Image Process"},{"key":"19217_CR10","first-page":"12","volume":"2017","author":"J Chandrasekaran","year":"2017","unstructured":"Chandrasekaran J, Thiruvengadam SJ (2017) A hybrid chaotic and number theoretic approach for securing DICOM images. Secur Commun Networks 2017:12","journal-title":"Secur Commun Networks"},{"issue":"1\u20133","key":"19217_CR11","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.cnsns.2014.11.021","volume":"23","author":"JX Chen","year":"2015","unstructured":"Chen JX, Zhu ZL, Fu C, Zhang LB, Zhang Y (2015) An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Commun Nonlinear Sci Numer Simul 23(1\u20133):294\u2013310","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"19217_CR12","doi-asserted-by":"publisher","unstructured":"Banday SA, Mir AH, Malik S (2020) Chapter 12. Multilevel medical image encryption for secure communication. INC, 233\u2013252. https:\/\/doi.org\/10.1016\/B978-0-12-820024-7.00012-8","DOI":"10.1016\/B978-0-12-820024-7.00012-8"},{"key":"19217_CR13","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.chaos.2016.12.018","volume":"95","author":"\u00dc \u00c7avu\u015fo\u011flu","year":"2017","unstructured":"\u00c7avu\u015fo\u011flu \u00dc, Pehlivan I, Ka\u00e7ar S (2017) Secure image encryption algorithm design using a novel chaos based S- box. Chaos Solitons Fractals 95:92\u2013101","journal-title":"Chaos Solitons Fractals"},{"key":"19217_CR14","doi-asserted-by":"publisher","first-page":"22787","DOI":"10.1007\/s11042-017-5534-8","volume":"77","author":"J Liu","year":"2018","unstructured":"Liu J, Ma Y, Li S et al (2018) A new simple chaotic system and its application in medical image encryption. Multimed Tools Appl 77:22787\u201322808. https:\/\/doi.org\/10.1007\/s11042-017-5534-8","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"19217_CR15","first-page":"1","volume":"2161","author":"D Desiato","year":"2018","unstructured":"Desiato D, Tortora G (2018) A methodology for GDPR compliant data processing. CEUR Workshop Proc 2161(1):1\u20134","journal-title":"CEUR Workshop Proc"},{"issue":"8","key":"19217_CR16","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1109\/TNB.2017.2780881","volume":"16","author":"D Ravichandran","year":"2017","unstructured":"Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) DNA Chaos Blend to Secure Medical Privacy. IEEE Trans Nanobiosci 16(8):850\u2013858","journal-title":"IEEE Trans Nanobiosci"},{"key":"19217_CR17","first-page":"11","volume":"2014","author":"S Zhang","year":"2014","unstructured":"Zhang S, Gao T, Gao L (2014) A novel encryption frame for medical image with watermark based on hyperchaotic system. Math Probl Eng 2014:11","journal-title":"Math Probl Eng"},{"issue":"October","key":"19217_CR18","first-page":"102626","volume":"55","author":"V Sangavi","year":"2020","unstructured":"Sangavi V, Thangavel P (2020) An exotic multi-dimensional conceptualisation for medical image encryption exerting Rossler system and Sine map. J Inf Secur Appl 55(October):102626","journal-title":"J Inf Secur Appl"},{"key":"19217_CR19","first-page":"110044","volume":"139","author":"X Peng","year":"2020","unstructured":"Peng X, Zeng Y (2020) \u201cImage encryption application in a system for compounding self-excited and hidden attractors. Chaos, Solitons Fractals Interdiscip J Nonlinear Sci Nonequilibrium Complex Phenom 139:110044","journal-title":"Chaos, Solitons Fractals Interdiscip J Nonlinear Sci Nonequilibrium Complex Phenom"},{"key":"19217_CR20","doi-asserted-by":"publisher","first-page":"148495","DOI":"10.1109\/ACCESS.2019.2946807","volume":"7","author":"MCEM Kasapba\u015fi","year":"2019","unstructured":"Kasapba\u015fi MCEM (2019) A new chaotic image steganography technique based on Huffman compression of Turkish texts and fractal encryption with post-quantum security. IEEE Access 7:148495\u2013148510","journal-title":"IEEE Access"},{"key":"19217_CR21","doi-asserted-by":"crossref","unstructured":"S. Kamal, A. G. Radwan, S. H. A. Haleem, and M. L. Barakat, \u201cA fractal-based image encryption system,\u201d IET Image Process., vol. 8, no. December 2013, pp. 742\u2013752, 2014. https:\/\/rightstartmath.com\/level-g-lesson-110\/. Accessed 1st Sept 2020","DOI":"10.1049\/iet-ipr.2013.0570"},{"issue":"2","key":"19217_CR22","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1109\/TCAD.2008.2009166","volume":"28","author":"Z Wang","year":"2009","unstructured":"Wang Z, Fang H, Chakrabarty K, Bienek M (2009) Deviation-based LFSR reseeding for test-data compression. IEEE Trans Comput Des Integr Circuits Syst 28(2):259\u2013271","journal-title":"IEEE Trans Comput Des Integr Circuits Syst"},{"key":"19217_CR23","doi-asserted-by":"publisher","unstructured":"\u00a0Bassham LE, Rukhin AL,\u00a0 Soto J, Nechvatal JR, Smid ME, Leigh SD, Levenson M, Vangel M, Heckert NA, Banks DL (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. https:\/\/doi.org\/10.1017\/S000156600001014X","DOI":"10.1017\/S000156600001014X"},{"key":"19217_CR24","doi-asserted-by":"crossref","unstructured":"Hanley N, ONeill M (2012) \u201cHardware comparison of the ISO\/IEC 29192\u20132 Block Ciphers. In: 2012 IEEE computer society annual symposium on VLSI, pp 57\u201362","DOI":"10.1109\/ISVLSI.2012.25"},{"key":"19217_CR25","first-page":"1","volume":"2018","author":"M Imran","year":"2018","unstructured":"Imran M, Rashid M, Shafi I (2018) \u201cLopez Dahab based elliptic crypto processor (ECP) over GF(2163) for low-area applications on FPGA\u201d, in. Int Conf Eng Emerg Technol (ICEET) 2018:1\u20136","journal-title":"Int Conf Eng Emerg Technol (ICEET)"},{"key":"19217_CR26","doi-asserted-by":"crossref","unstructured":"Imran M, Shafi I, Jafri AR, Rashid M (2017) Hardware design and implementation of ECC based crypto processor for low-area-applications on FPGA. In: 2017 International conference on open source systems technologies (ICOSST), pp 54\u201359","DOI":"10.1109\/ICOSST.2017.8279005"},{"issue":"11","key":"19217_CR27","doi-asserted-by":"publisher","first-page":"2050179","DOI":"10.1142\/S0218126620501790","volume":"29","author":"M Rashid","year":"2020","unstructured":"Rashid M, Imran M, Jafri AR, Mehmood Z (2020) A 4-Stage Pipelined Architecture for Point Multiplication of Binary Huff Curves. J Circuits Syst Comput 29(11):2050179. https:\/\/doi.org\/10.1142\/S0218126620501790","journal-title":"J Circuits Syst Comput"},{"issue":"8","key":"19217_CR28","first-page":"5715","volume":"13","author":"RK Hiware","year":"2018","unstructured":"Hiware RK, Padole DV (2018) Efficient Implementation of selective image encryption technique on multi-core reconfigurable system. Int J Appl Eng Res 13(8):5715\u20135721","journal-title":"Int J Appl Eng Res"},{"issue":"7","key":"19217_CR29","first-page":"870","volume":"32","author":"NA Hikal","year":"2020","unstructured":"Hikal NA, Eid MM (2020) A new approach for palmprint image encryption based on hybrid chaotic maps. J King Saud Univ - Comput Inf Sci 32(7):870\u2013882","journal-title":"J King Saud Univ - Comput Inf Sci"},{"issue":"5","key":"19217_CR30","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/s11265-018-1337-z","volume":"91","author":"D Ravichandran","year":"2019","unstructured":"Ravichandran D, Rajagopalan S, Upadhyay HN, Rayappan JBB, Amirtharajan R (2019) Encrypted Biography of Biomedical Image - a Pentalayer Cryptosystem on FPGA. J Signal Process Syst 91(5):475\u2013501","journal-title":"J Signal Process Syst"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19217-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19217-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19217-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,4]],"date-time":"2024-05-04T04:11:33Z","timestamp":1714795893000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19217-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,4]]},"references-count":30,"alternative-id":["19217"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19217-5","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,5,4]]},"assertion":[{"value":"26 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 May 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interests regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}},{"value":"The authors declare that they have no known competing financial or personal relationships that could be viewed as influencing the work reported in this paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of interest"}}]}}