{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T19:15:26Z","timestamp":1770146126195,"version":"3.49.0"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"JKSTIC","award":["JKST&IC\/SRE\/874-77"],"award-info":[{"award-number":["JKST&IC\/SRE\/874-77"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19281-x","type":"journal-article","created":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T07:02:49Z","timestamp":1714978969000},"page":"8929-8964","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Lightweight medical-image encryption technique for IoMT based healthcare applications"],"prefix":"10.1007","volume":"84","author":[{"given":"Malik Obaid Ul","family":"Islam","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5983-0912","authenticated-orcid":false,"given":"Shabir A.","family":"Parah","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bilal A.","family":"Malik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shahid A.","family":"Malik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,5,6]]},"reference":[{"key":"19281_CR1","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1109\/ACCESS.2017.2777869","volume":"6","author":"AA Abd El-Latif","year":"2017","unstructured":"Abd El-Latif AA, Abd-El-Atty B, Talha M (2017) Robust encryption of quantum medical images. IEEE Access 6:1073\u20131081","journal-title":"IEEE Access"},{"key":"19281_CR2","doi-asserted-by":"crossref","unstructured":"Adeleke IT, Abdul QBS (2020) Opinions on cyber security, electronic health records, and medical confidentiality: emerging issues on internet of medical things from Nigeria. In: Incorporating the internet of things in healthcare applications and wearable devices. IGI Global, pp 199\u2013211","DOI":"10.4018\/978-1-7998-1090-2.ch012"},{"key":"19281_CR3","doi-asserted-by":"publisher","first-page":"100123","DOI":"10.1016\/j.iot.2019.100123","volume":"8","author":"F Alsubaei","year":"2019","unstructured":"Alsubaei F, Abuhussein A, Shandilya V, Shiva S (2019) Internet of medical things security assessment framework. Int Things 8:100123","journal-title":"Int Things"},{"key":"19281_CR4","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1016\/j.comcom.2019.12.030","volume":"150","author":"F Al-Turjman","year":"2020","unstructured":"Al-Turjman F, Nawaz MH, Ulusar UD (2020) Intelligence in the internet of medical things era: A systematic review of current and future trends. Comput Commun 150:644\u2013660","journal-title":"Comput Commun"},{"key":"19281_CR5","doi-asserted-by":"crossref","unstructured":"Aswatha AR, Sasi S, Santhosh B, Mehta D, Babuprasad S (2020) Design and implementation of unreliable CFDP protocol over elliptic curve cryptography. In: Smart intelligent computing and applications: proceedings of the third international conference on smart computing and informatics, vol 2. Springer, Singapore, pp 627\u2013638","DOI":"10.1007\/978-981-32-9690-9_68"},{"key":"19281_CR6","doi-asserted-by":"publisher","first-page":"164000","DOI":"10.1016\/j.ijleo.2019.164000","volume":"203","author":"A Babaei","year":"2020","unstructured":"Babaei A, Motameni H, Enayatifar R (2020) A new permutation-diffusion-based image encryption technique using cellular automata and DNA sequence. Optik 203:164000","journal-title":"Optik"},{"issue":"2","key":"19281_CR7","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1016\/j.chaos.2006.05.011","volume":"35","author":"S BehniaAkhshani","year":"2008","unstructured":"BehniaAkhshani S, Mahmodi AH, Akhavan AJCS (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons Fractals 35(2):408\u2013419","journal-title":"Chaos, Solitons Fractals"},{"key":"19281_CR8","doi-asserted-by":"crossref","unstructured":"Brahim AH, Pacha AA, and Said HN (2023) A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes. Inf Sec J: Glob Perspect 32(2):1\u201317","DOI":"10.1080\/19393555.2021.1943572"},{"key":"19281_CR9","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.sigpro.2016.10.003","volume":"132","author":"W Cao","year":"2017","unstructured":"Cao W, Zhou Y, Chen CP, Xia L (2017) Medical image encryption using edge maps. Signal Processing 132:96\u2013109","journal-title":"Signal Processing"},{"key":"19281_CR10","doi-asserted-by":"publisher","first-page":"106026","DOI":"10.1016\/j.optlaseng.2020.106026","volume":"128","author":"M Chen","year":"2020","unstructured":"Chen M, Ma G, Tang C, Lei Z (2020) Generalized optical encryption framework based on Shearlets for medical image. Optics Lasers Eng 128:106026","journal-title":"Optics Lasers Eng"},{"issue":"8","key":"19281_CR11","doi-asserted-by":"publisher","first-page":"1821","DOI":"10.1016\/j.sjbs.2017.11.023","volume":"24","author":"X Chen","year":"2017","unstructured":"Chen X, Hu CJ (2017) Adaptive medical image encryption algorithm based on multiple chaotic mapping. Saudi J Biol Sci 24(8):1821\u20131827","journal-title":"Saudi J Biol Sci"},{"issue":"9","key":"19281_CR12","doi-asserted-by":"publisher","first-page":"3771","DOI":"10.1007\/s12652-019-01580-z","volume":"11","author":"M Dua","year":"2020","unstructured":"Dua M, Wesanekar A, Gupta V, Bhola M, Dua S (2020) Differential evolution optimization of intertwining logistic map-DNA based image encryption technique. J Ambient Intell Human Comput 11(9):3771\u20133786","journal-title":"J Ambient Intell Human Comput"},{"issue":"4","key":"19281_CR13","doi-asserted-by":"publisher","first-page":"3041","DOI":"10.1007\/s11071-019-05413-8","volume":"99","author":"MA Farah","year":"2020","unstructured":"Farah MA, Farah A, Farah T (2020) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn 99(4):3041\u20133064","journal-title":"Nonlinear Dyn"},{"key":"19281_CR14","doi-asserted-by":"publisher","first-page":"99470","DOI":"10.1109\/ACCESS.2019.2927415","volume":"7","author":"R Ge","year":"2019","unstructured":"Ge R, Yang G, Wu J, Chen Y, Coatrieux G, Luo L (2019) A novel chaos-based symmetric image encryption using bit-pair level process. IEEE Access 7:99470\u201399480","journal-title":"IEEE Access"},{"key":"19281_CR15","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1016\/j.ins.2019.01.070","volume":"527","author":"R Hamza","year":"2020","unstructured":"Hamza R, Yan Z, Muhammad K, Bellavista P, Titouna F (2020) A privacy-preserving cryptosystem for IoT E-healthcare. Inf Sci 527:493\u2013510","journal-title":"Inf Sci"},{"key":"19281_CR16","doi-asserted-by":"publisher","first-page":"47731","DOI":"10.1109\/ACCESS.2021.3061710","volume":"9","author":"MK Hasan","year":"2021","unstructured":"Hasan MK, Islam S, Sulaiman R, Khan S, Hashim AHA, Habib S, Hassan AM (2021) Lightweight encryption technique to enhance medical image security on internet of medical things applications. IEEE Access 9:47731\u201347742","journal-title":"IEEE Access"},{"key":"19281_CR17","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.sigpro.2017.10.004","volume":"144","author":"Z Hua","year":"2018","unstructured":"Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134\u2013144","journal-title":"Signal Process"},{"issue":"2","key":"19281_CR18","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1109\/TII.2019.2923553","volume":"16","author":"Z Hua","year":"2019","unstructured":"Hua Z, Zhou Y, Bao B (2019) Two-dimensional sine chaotification system with hardware implementation. In IEEE Trans Ind Inform 16(2):887\u2013897","journal-title":"In IEEE Trans Ind Inform"},{"key":"19281_CR19","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1016\/j.future.2018.12.036","volume":"94","author":"NN Hurrah","year":"2019","unstructured":"Hurrah NN, Parah SA, Loan NA, Sheikh JA, Elhoseny M, Muhammad K (2019) Dual watermarking framework for privacy protection and content authentication of multimedia. Future Gen Comput Syst 94:654\u2013673","journal-title":"Future Gen Comput Syst"},{"key":"19281_CR20","doi-asserted-by":"publisher","first-page":"101083","DOI":"10.1016\/j.iot.2024.101083","volume":"25","author":"UOM Islam","year":"2024","unstructured":"Islam UOM, Parah AS (2024) Fast and Lightweight Image Cryptosystem for IoMT Applications. Internet of Things 25:101083","journal-title":"Internet of Things"},{"key":"19281_CR21","doi-asserted-by":"crossref","unstructured":"Islam UOM, Parah AS, Malik AB (2022) Computationally efficient image encryption technique based on selective pixel diffusion. In: 2022 IEEE bombay section signature conference (IBSSC).\u00a0IEEE, pp 1\u20136","DOI":"10.1109\/IBSSC56953.2022.10037561"},{"issue":"4","key":"19281_CR22","doi-asserted-by":"publisher","first-page":"29","DOI":"10.4018\/IJCVIP.2020100102","volume":"10","author":"Z Jeelani","year":"2020","unstructured":"Jeelani Z (2020) Digital image encryption based on chaotic cellular automata. Int J Comput Vision Image Process (IJCVIP) 10(4):29\u201342","journal-title":"Int J Comput Vision Image Process (IJCVIP)"},{"key":"19281_CR23","doi-asserted-by":"publisher","first-page":"37855","DOI":"10.1109\/ACCESS.2021.3063237","volume":"9","author":"ST Kamal","year":"2021","unstructured":"Kamal ST, Hosny KM, Elgindy TM, Darwish MM, Fouda MM (2021) A new image encryption algorithm for grey and color medical images. IEEE Access 9:37855\u201337865","journal-title":"IEEE Access"},{"key":"19281_CR24","doi-asserted-by":"crossref","unstructured":"Kaur M, Singh S, Kaur M, Singh A, Singh D (2021) A systematic review of metaheuristic-based image encryption techniques. In:  Archives of computational methods in engineering, pp 1\u201315","DOI":"10.1155\/2021\/5012496"},{"key":"19281_CR25","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.measurement.2018.11.074","volume":"135","author":"G Ke","year":"2019","unstructured":"Ke G, Wang H, Zhou S, Zhang H (2019) Encryption of medical image with most significant bit and high capacity in piecewise linear chaos graphics. Measurement 135:385\u2013391","journal-title":"Measurement"},{"issue":"17","key":"19281_CR26","doi-asserted-by":"publisher","first-page":"2116","DOI":"10.3390\/electronics10172116","volume":"10","author":"MK Khairullah","year":"2021","unstructured":"Khairullah MK, Alkahtani AA, Bin Baharuddin MZ, Al-Jubari AM (2021) Designing 1D chaotic maps for fast chaotic image encryption. Electronics 10(17):2116","journal-title":"Electronics"},{"key":"19281_CR27","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.35940\/ijeat.F1202.0886S19","volume":"8","author":"S Khond","year":"2019","unstructured":"Khond S, Vijayakumar B (2019) Secure medical image processing using Chaos and Dna encryption enhanced using reversible data hiding. Int J Eng Adv Technol 8:1062\u20131067","journal-title":"Int J Eng Adv Technol"},{"key":"19281_CR28","first-page":"23","volume":"2021","author":"S Li","year":"2021","unstructured":"Li S, Zhao L, Yang N (2021) Medical image encryption based on 2D zigzag confusion and dynamic diffusion. Sec Commun Netw 2021:23","journal-title":"Sec Commun Netw"},{"key":"19281_CR29","doi-asserted-by":"publisher","first-page":"211676","DOI":"10.1109\/ACCESS.2020.3039643","volume":"8","author":"X Li","year":"2020","unstructured":"Li X, Xiao D, Mou H, Lu D, Peng M (2020) A compressive sensing based image encryption and compression algorithm with identity authentication and blind signcryption. IEEE Access 8:211676\u2013211690","journal-title":"IEEE Access"},{"issue":"12","key":"19281_CR30","doi-asserted-by":"publisher","first-page":"2050173","DOI":"10.1142\/S0218127420501734","volume":"30","author":"H Liu","year":"2020","unstructured":"Liu H, Kadir A, Xu C (2020) Color image encryption with cipher feedback and coupling chaotic map. Int J Bifurcation Chaos 30(12):2050173","journal-title":"Int J Bifurcation Chaos"},{"key":"19281_CR31","first-page":"125153","volume":"376","author":"H Liu","year":"2020","unstructured":"Liu H, Kadir A, Xu C (2020) Cryptanalysis and constructing S-box based on chaotic map and backtracking. Appl Math Comput 376:125153","journal-title":"Appl Math Comput"},{"key":"19281_CR32","doi-asserted-by":"publisher","first-page":"38507","DOI":"10.1109\/ACCESS.2019.2906052","volume":"7","author":"Y Luo","year":"2019","unstructured":"Luo Y, Ouyang X, Liu J, Cao L (2019) An image encryption method based on elliptic curve elgamal encryption and chaotic systems. IEEE Access 7:38507\u201338522","journal-title":"IEEE Access"},{"key":"19281_CR33","doi-asserted-by":"publisher","first-page":"25664","DOI":"10.1109\/ACCESS.2020.2970806","volume":"8","author":"Q Lu","year":"2020","unstructured":"Lu Q, Zhu C, Deng X (2020) An efficient image encryption scheme based on the LSS chaotic map and single S-box. IEEE Access 8:25664\u201325678","journal-title":"IEEE Access"},{"issue":"10","key":"19281_CR34","doi-asserted-by":"publisher","first-page":"1004","DOI":"10.3390\/e21101004","volume":"21","author":"Q Lu","year":"2019","unstructured":"Lu Q, Zhu C, Wang G (2019) A novel S-box design algorithm based on a new compound chaotic system. Entropy 21(10):1004","journal-title":"Entropy"},{"key":"19281_CR35","doi-asserted-by":"publisher","first-page":"14284","DOI":"10.1109\/ACCESS.2021.3052161","volume":"9","author":"AG Mohamed","year":"2021","unstructured":"Mohamed AG, Korany NO, El-Khamy SE (2021) New DNA coded fuzzy based (DNAFZ) S-boxes: Application to robust image encryption using hyperchaotic maps. IEEE Access 9:14284\u201314305","journal-title":"IEEE Access"},{"key":"19281_CR36","doi-asserted-by":"crossref","unstructured":"Peng SL, Pal S, Huang L (eds) (2020) Principles of internet of things (IoT) ecosystem. In: Insight paradigm.\u00a0Springer International Publishing, pp 263\u2013276","DOI":"10.1007\/978-3-030-33596-0"},{"key":"19281_CR37","doi-asserted-by":"crossref","unstructured":"Porras J, P\u00e4nk\u00e4l\u00e4inen J, Knutas A, Khakurel J (2018) Security in the internet of things-a systematic mapping study","DOI":"10.24251\/HICSS.2018.473"},{"key":"19281_CR38","doi-asserted-by":"crossref","unstructured":"Priya S, Santhi B (2021) A novel visual medical image encryption for secure transmission of authenticated watermarked medical images. Mobile Netw Appl 26(6):2501\u20132508","DOI":"10.1007\/s11036-019-01213-x"},{"key":"19281_CR39","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.procs.2018.08.212","volume":"135","author":"MF Putranto","year":"2018","unstructured":"Putranto MF, Barmawi AM, Wahyudi BA (2018) Permutation modification of reversible data hiding using difference histogram shifting in encrypted medical image. Procedia Comput Sci 135:727\u2013735","journal-title":"Procedia Comput Sci"},{"key":"19281_CR40","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1016\/j.future.2019.01.021","volume":"98","author":"M Rajasekaran","year":"2019","unstructured":"Rajasekaran M, Yassine A, Hossain MS, Alhamid MF, Guizani M (2019) Autonomous monitoring in the healthcare environment: Reward-based energy charging mechanism for IoMT wireless sensing nodes. Future Gen Comput Syst 98:565\u2013576","journal-title":"Future Gen Comput Syst"},{"key":"19281_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-023-16698-8","volume":"83","author":"I Sabha","year":"2023","unstructured":"Sabha I, Parah AS, Sarosh P, Islam UOM (2023) CESCAL: A joint compression-encryption scheme based on convolutional autoencoder and logistic map. Multimed Tools App 83:1\u201330","journal-title":"Multimed Tools App"},{"issue":"3","key":"19281_CR42","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1166\/jmihi.2019.2571","volume":"9","author":"AS Salama","year":"2019","unstructured":"Salama AS, Mokhtar MA, Tayel MB (2019) A triple-layer encryption-based watermarking technique for improving the security of medical images. J Med Imaging Health Inform 9(3):610\u2013619","journal-title":"J Med Imaging Health Inform"},{"key":"19281_CR43","first-page":"102626","volume":"55","author":"V Sangavi","year":"2020","unstructured":"Sangavi V, Thangavel P (2020) An exotic multi-dimensional conceptualization for medical image encryption exerting Rossler system and Sine map. J Inform Sec App 55:102626","journal-title":"J Inform Sec App"},{"issue":"4","key":"19281_CR44","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656\u2013715","journal-title":"Bell Syst Tech J"},{"key":"19281_CR45","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.future.2019.06.004","volume":"101","author":"L Syed","year":"2019","unstructured":"Syed L, Jabeen S, Manimala S, Alsaeedi A (2019) Smart healthcare framework for ambient assisted living using IoMT and big data analytics techniques. Futur Gener Comput Syst 101:136\u2013151","journal-title":"Futur Gener Comput Syst"},{"issue":"17","key":"19281_CR46","doi-asserted-by":"publisher","first-page":"24765","DOI":"10.1007\/s11042-019-7602-8","volume":"78","author":"J Tang","year":"2019","unstructured":"Tang J, Yu Z, Liu L (2019) A delay coupling method to reduce the dynamical degradation of digital chaotic maps and its application for image encryption. Multimed Tools App 78(17):24765\u201324788","journal-title":"Multimed Tools App"},{"key":"19281_CR47","unstructured":"The HIPAA Journal. Accessed: May. 1, 2022. [Online]. Available at www.hipaajournal.com"},{"key":"19281_CR48","unstructured":"The Stanford Volume Data Archive. Accessed: May. 9, 2022. [Online]. Available at https:\/\/graphics.stanford.edu\/data\/voldata\/"},{"key":"19281_CR49","unstructured":"U.S. Department of Health and Human Services Office for Civil Rights: May.1,2022.[Online]. Available at https:\/\/ocrportal.hhs.gov\/ocr\/breach\/breach_report.jsf"},{"key":"19281_CR50","doi-asserted-by":"publisher","first-page":"167658","DOI":"10.1016\/j.ijleo.2021.167658","volume":"245","author":"X Wang","year":"2021","unstructured":"Wang X, Si R (2021) A new chaotic image encryption scheme based on dynamic L-shaped scrambling and combined map diffusion. Optik 245:167658","journal-title":"Optik"},{"issue":"4","key":"19281_CR51","doi-asserted-by":"publisher","first-page":"2797","DOI":"10.1007\/s11071-018-4723-y","volume":"95","author":"X Wang","year":"2019","unstructured":"Wang X, Feng L, Li R, Zhang F (2019) A fast image encryption algorithm based on a non-adjacent dynamically coupled map lattice model. Nonlinear Dyn 95(4):2797\u20132824","journal-title":"Nonlinear Dyn"},{"issue":"4","key":"19281_CR52","doi-asserted-by":"publisher","first-page":"1773","DOI":"10.1016\/j.chaos.2008.07.031","volume":"41","author":"Y Wang","year":"2009","unstructured":"Wang Y, Wong KW, Liao X, Xiang T, Chen G (2009) A chaos-based image encryption algorithm with variable control parameters. Chaos, Solitons & Fractals 41(4):1773\u20131783","journal-title":"Chaos, Solitons & Fractals"},{"issue":"5","key":"19281_CR53","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1016\/j.patrec.2009.11.008","volume":"31","author":"G Ye","year":"2014","unstructured":"Ye G (2014) Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recog Lett 31(5):347\u2013354","journal-title":"Pattern Recog Lett"},{"issue":"8","key":"19281_CR54","doi-asserted-by":"publisher","first-page":"080701","DOI":"10.1088\/1674-1056\/27\/8\/080701","volume":"27","author":"XP Zhang","year":"2018","unstructured":"Zhang XP, Guo R, Chen HW, Zhao ZM, Wang JY (2018) Efficient image encryption scheme with synchronous substitution and diffusion based on double S-boxes. Chinese Physics B 27(8):080701","journal-title":"Chinese Physics B"},{"issue":"5","key":"19281_CR55","doi-asserted-by":"publisher","first-page":"504","DOI":"10.3390\/e21050504","volume":"21","author":"W Zhang","year":"2019","unstructured":"Zhang W, Zhu Z, Yu H (2019) A symmetric image encryption algorithm based on a coupled logistic\u2013Bernoulli map and cellular automata diffusion strategy. Entropy 21(5):504","journal-title":"Entropy"},{"issue":"6","key":"19281_CR56","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"ZL Zhu","year":"2011","unstructured":"Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171\u20131186","journal-title":"Inf Sci"},{"issue":"8","key":"19281_CR57","doi-asserted-by":"publisher","first-page":"790","DOI":"10.3390\/e21080790","volume":"21","author":"S Zhu","year":"2019","unstructured":"Zhu S, Wang G, Zhu C (2019) A secure and fast image encryption scheme based on double chaotic S-boxes. Entropy 21(8):790","journal-title":"Entropy"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19281-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19281-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19281-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T06:00:18Z","timestamp":1743660018000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19281-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":57,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["19281"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19281-x","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,6]]},"assertion":[{"value":"31 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.The authors have no financial or proprietary interests in any material discussed in this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}