{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T00:06:28Z","timestamp":1759017988827,"version":"3.44.0"},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"33","license":[{"start":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T00:00:00Z","timestamp":1743984000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T00:00:00Z","timestamp":1743984000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100002383","name":"King Saud University","doi-asserted-by":"publisher","award":["IFKSUOR-434-1"],"award-info":[{"award-number":["IFKSUOR-434-1"]}],"id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-025-20790-6","type":"journal-article","created":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T04:57:21Z","timestamp":1744001841000},"page":"41671-41711","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cybersecurity advancements for medical image transmission: a hybrid optical-based cryptosystem harnessing chaos, DNA sequences, and mandelbrot keys"],"prefix":"10.1007","volume":"84","author":[{"given":"Nasser","family":"Alalwan","sequence":"first","affiliation":[]},{"given":"Walid","family":"El-Shafai","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Amoon","sequence":"additional","affiliation":[]},{"given":"Bilel","family":"Benjdira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,7]]},"reference":[{"key":"20790_CR1","first-page":"1","volume":"5","author":"W El-Shafai","year":"2021","unstructured":"El-Shafai W, Khallaf F, El-Rabaie E, Abd El-Samie F (2021) Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications. J Ambient Intell Human Comput 5:1\u201329","journal-title":"J Ambient Intell Human Comput"},{"issue":"13","key":"20790_CR2","doi-asserted-by":"crossref","first-page":"3659","DOI":"10.1364\/AO.415523","volume":"60","author":"F Abd El-Samie","year":"2021","unstructured":"Abd El-Samie F, Nassar R, Safan M, Abdelhamed M, Khalaf A et al (2021) Efficient implementation of optical scanning holography in cancelable biometrics. Appl Optic 60(13):3659\u20133667","journal-title":"Appl Optic"},{"issue":"29","key":"20790_CR3","doi-asserted-by":"crossref","first-page":"20665","DOI":"10.1007\/s11042-019-08322-5","volume":"79","author":"I Elashry","year":"2020","unstructured":"Elashry I, El-Shafai W, Hasan E, El-Rabaie S, Abbas A et al (2020) Efficient chaotic-based image cryptosystem with different modes of operation. Multimed Tools Applic 79(29):20665\u201320687","journal-title":"Multimed Tools Applic"},{"key":"20790_CR4","doi-asserted-by":"crossref","first-page":"128548","DOI":"10.1109\/ACCESS.2020.3008644","volume":"8","author":"A Alarifi","year":"2020","unstructured":"Alarifi A, Sankar S, Altameem T, Jithin K, Amoon M et al (2020) A novel hybrid cryptosystem for secure streaming of high efficiency H. 265 compressed videos in IoT multimedia applications. IEEE Access 8:128548\u2013128573","journal-title":"IEEE Access"},{"key":"20790_CR5","doi-asserted-by":"crossref","first-page":"129262","DOI":"10.1016\/j.optcom.2023.129262","volume":"533","author":"IM Qasim","year":"2023","unstructured":"Qasim IM, Mohammed EA (2023) Optical image encryption based on linear canonical transform with sparse representation. Optic Commun 533:129262","journal-title":"Optic Commun"},{"issue":"3","key":"20790_CR6","doi-asserted-by":"crossref","first-page":"2495","DOI":"10.1007\/s11042-019-08190-z","volume":"79","author":"O Faragallah","year":"2020","unstructured":"Faragallah O, AlZain M, El-Sayed H, Al-Amri J, El-Shafai W et al (2020) Secure color image cryptosystem based on chaotic logistic in the FrFT domain. Multimed Tools Applic 79(3):2495\u20132519","journal-title":"Multimed Tools Applic"},{"key":"20790_CR7","doi-asserted-by":"crossref","unstructured":"Ibrahim S, Egila M, Shawky H, Elsaid M, El-Shafai W et al (2020) Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption.\u00a0 Multimed Tools Applic. 79(2):14053\u201314078","DOI":"10.1007\/s11042-019-08462-8"},{"issue":"7","key":"20790_CR8","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20(7):767\u2013769","journal-title":"Opt Lett"},{"key":"20790_CR9","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1016\/j.matcom.2022.12.025","volume":"207","author":"S Zhu","year":"2023","unstructured":"Zhu S, Deng X, Zhang W, Zhu C (2023) Secure image encryption scheme based on a new robust chaotic map and strong S-box. Math Comput Simul 207:322\u2013346","journal-title":"Math Comput Simul"},{"key":"20790_CR10","doi-asserted-by":"crossref","first-page":"103200","DOI":"10.1109\/ACCESS.2020.2994583","volume":"8","author":"O Faragallah","year":"2020","unstructured":"Faragallah O, Afifi A, El-Shafai W, El-Sayed H, Alzain M et al (2020) Efficiently encrypting color images with few details based on rc6 and different operation modes for cybersecurity applications. IEEE Access 8:103200\u2013103218","journal-title":"IEEE Access"},{"issue":"1","key":"20790_CR11","doi-asserted-by":"crossref","first-page":"231","DOI":"10.3390\/math11010231","volume":"11","author":"S Zhu","year":"2023","unstructured":"Zhu S, Deng X, Zhang W, Zhu C (2023) Image encryption scheme based on newly designed chaotic map and parallel DNA coding. Mathematics 11(1):231","journal-title":"Mathematics"},{"key":"20790_CR12","doi-asserted-by":"crossref","first-page":"109033","DOI":"10.1016\/j.optlastec.2022.109033","volume":"160","author":"Q Liang","year":"2023","unstructured":"Liang Q, Zhu C (2023) A new one-dimensional chaotic map for image encryption scheme based on random DNA coding. Opt Laser Technol 160:109033","journal-title":"Opt Laser Technol"},{"key":"20790_CR13","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/j.apm.2023.10.004","volume":"125","author":"X Kong","year":"2024","unstructured":"Kong X, Yu F, Yao W, Xu C, Zhang J, Cai S, Wang C (2024) A class of 2n+ 1 dimensional simplest hamiltonian conservative chaotic systems and fast image encryption schemes. Appl Math Model 125:351\u2013374","journal-title":"Appl Math Model"},{"issue":"7","key":"20790_CR14","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.3390\/e25071005","volume":"25","author":"Y Zhang","year":"2023","unstructured":"Zhang Y, Dong W, Zhang J, Ding Q (2023) An Image Encryption Transmission Scheme Based on a Polynomial Chaotic Map. Entropy 25(7):1005","journal-title":"Entropy"},{"issue":"05","key":"20790_CR15","doi-asserted-by":"crossref","first-page":"2350061","DOI":"10.1142\/S021812742350061X","volume":"33","author":"X Ma","year":"2023","unstructured":"Ma X, Wang C, Qiu W, Yu F (2023) A fast hyperchaotic image encryption scheme. Int J Bifurcation Chaos 33(05):2350061","journal-title":"Int J Bifurcation Chaos"},{"issue":"14","key":"20790_CR16","doi-asserted-by":"crossref","first-page":"22213","DOI":"10.1007\/s11042-022-13343-8","volume":"82","author":"RI Abdelfatah","year":"2023","unstructured":"Abdelfatah RI, Saqr HM, Nasr ME (2023) An efficient medical image encryption scheme for (WBAN) based on adaptive DNA and modern multi chaotic map. Multimed Tools Applic 82(14):22213\u201322227","journal-title":"Multimed Tools Applic"},{"key":"20790_CR17","doi-asserted-by":"crossref","first-page":"113909","DOI":"10.1016\/j.chaos.2023.113909","volume":"175","author":"S Zhou","year":"2023","unstructured":"Zhou S, Qiu Y, Qi G, Zhang Y (2023) A new conservative chaotic system and its application in image encryption. Chaos, Solitons Fractals 175:113909","journal-title":"Chaos, Solitons Fractals"},{"issue":"10","key":"20790_CR18","doi-asserted-by":"crossref","first-page":"4955","DOI":"10.1007\/s00371-022-02640-w","volume":"39","author":"J Tang","year":"2023","unstructured":"Tang J, Zhang F, Ni H (2023) A novel fast image encryption scheme based on a new one-dimensional compound sine chaotic system. Vis Comput 39(10):4955\u20134983","journal-title":"Vis Comput"},{"issue":"3","key":"20790_CR19","doi-asserted-by":"crossref","first-page":"476","DOI":"10.3390\/e25030476","volume":"25","author":"X Chen","year":"2023","unstructured":"Chen X, Wang Q, Fan L, Yu S (2023) A Novel Chaotic Image Encryption Scheme Armed with Global Dynamic Selection. Entropy 25(3):476","journal-title":"Entropy"},{"key":"20790_CR20","doi-asserted-by":"crossref","first-page":"119166","DOI":"10.1016\/j.ins.2023.119166","volume":"642","author":"C Wang","year":"2023","unstructured":"Wang C, Song L (2023) An image encryption scheme based on chaotic system and compressed sensing for multiple application scenarios. Inf Sci 642:119166","journal-title":"Inf Sci"},{"key":"20790_CR21","doi-asserted-by":"crossref","first-page":"122030","DOI":"10.1016\/j.eswa.2023.122030","volume":"238","author":"SS Jamal","year":"2024","unstructured":"Jamal SS, Hazzazi MM, Khan MF, Bassfar Z, Aljaedi A, Ul Islam Z (2024) Region of interest-based medical image encryption technique based on chaotic S-boxes. Expert Syst Applic 238:122030","journal-title":"Expert Syst Applic"},{"issue":"3","key":"20790_CR22","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1007\/s12652-019-01385-0","volume":"11","author":"PS Sneha","year":"2020","unstructured":"Sneha PS, Sankar S, Kumar AS (2020) A chaotic colour image encryption scheme combining Walsh-Hadamard transform and Arnold-Tent maps. J Ambient Intell Humaniz Comput 11(3):1289\u20131308","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"3","key":"20790_CR23","doi-asserted-by":"crossref","first-page":"2815","DOI":"10.1007\/s11071-022-07942-1","volume":"111","author":"M Hu","year":"2023","unstructured":"Hu M, Li J, Di X (2023) Quantum image encryption scheme based on 2D S ine 2-L ogistic chaotic map. Nonlinear Dyn 111(3):2815\u20132839","journal-title":"Nonlinear Dyn"},{"issue":"7","key":"20790_CR24","doi-asserted-by":"crossref","first-page":"9907","DOI":"10.1007\/s11042-016-3585-x","volume":"76","author":"X Chai","year":"2017","unstructured":"Chai X, Yang K, Gan Z (2017) A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimed Tools Applic 76(7):9907\u20139927","journal-title":"Multimed Tools Applic"},{"key":"20790_CR25","doi-asserted-by":"crossref","first-page":"171181","DOI":"10.1016\/j.ijleo.2023.171181","volume":"288","author":"S Liu","year":"2023","unstructured":"Liu S, Ye G (2023) Asymmetric image encryption algorithm using a new chaotic map and an improved radial diffusion. Optik 288:171181","journal-title":"Optik"},{"key":"20790_CR26","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","volume":"90","author":"AY Niyat","year":"2017","unstructured":"Niyat AY, Moattar MH, Torshiz MN (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng 90:225\u2013237","journal-title":"Opt Lasers Eng"},{"issue":"11","key":"20790_CR27","doi-asserted-by":"crossref","first-page":"32789","DOI":"10.1007\/s11042-023-16817-5","volume":"83","author":"A Kumar","year":"2023","unstructured":"Kumar A, Dua M (2023) Image encryption using a novel hybrid chaotic map and dynamic permutation\u2212 diffusion. Multimed Tools Applic 83(11):32789\u201332812","journal-title":"Multimed Tools Applic"},{"key":"20790_CR28","doi-asserted-by":"crossref","unstructured":"Zhang T, Ma Y (2023) Stable Image Encryption Algorithm Based on Expanded One-dimensional Chaotic Jumping and Parallel Encoding Operation Grouping. IEEE Access 11:108746\u2013108760","DOI":"10.1109\/ACCESS.2023.3312611"},{"key":"20790_CR29","first-page":"128340","volume":"462","author":"A Toktas","year":"2024","unstructured":"Toktas A, Erkan U, Gao S, Pak C (2024) A robust bit-level image encryption based on Bessel map. Appl Math Comput 462:128340","journal-title":"Appl Math Comput"},{"issue":"11","key":"20790_CR30","doi-asserted-by":"crossref","first-page":"2971","DOI":"10.1007\/s11517-023-02874-3","volume":"61","author":"B Zhang","year":"2023","unstructured":"Zhang B, Rahmatullah B, Wang SL, Almutairi HM, Xiao Y, Liu X, Liu Z (2023) A variable dimensional chaotic map-based medical image encryption algorithm with multi-mode. Med Biol Eng Compu 61(11):2971\u20133002","journal-title":"Med Biol Eng Compu"},{"key":"20790_CR31","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.optcom.2014.12.043","volume":"342","author":"X Wang","year":"2015","unstructured":"Wang X, Zhang HL (2015) A color image encryption with heterogeneous bit-permutation and correlated chaos. Optics Commun 342:51\u201360","journal-title":"Optics Commun"},{"issue":"1","key":"20790_CR32","first-page":"8","volume":"3","author":"W Auyporn","year":"2015","unstructured":"Auyporn W, Vongpradhip S (2015) A robust image encryption method based on bit plane decomposition and multiple chaotic maps. Int J Signal Process Syst 3(1):8\u201313","journal-title":"Int J Signal Process Syst"},{"key":"20790_CR33","first-page":"73","volume":"58","author":"W Hamidouche","year":"2017","unstructured":"Hamidouche W, Farajallah M, Sidaty N, El Assad S, D\u00e9forges O (2017) Real-time selective video encryption based on the chaos system in scalable HEVC extension. Signal Process: Image Commun 58:73\u201386","journal-title":"Signal Process: Image Commun"},{"issue":"12","key":"20790_CR34","doi-asserted-by":"crossref","first-page":"542","DOI":"10.1140\/epjp\/i2017-11819-7","volume":"132","author":"D Valli","year":"2017","unstructured":"Valli D, Ganesan K (2017) Chaos based video encryption using maps and Ikeda time delay system. Eur Phys J Plus 132(12):542","journal-title":"Eur Phys J Plus"},{"issue":"1","key":"20790_CR35","first-page":"2036","volume":"5","author":"SR Maniyath","year":"2016","unstructured":"Maniyath SR, Kaiselvan TV (2016) A novel DNA based encryption algorithm for multimedia information. Compusoft 5(1):2036","journal-title":"Compusoft"},{"key":"20790_CR36","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.optlaseng.2016.02.002","volume":"82","author":"YQ Zhang","year":"2016","unstructured":"Zhang YQ, Wang XY, Liu J, Chi ZL (2016) An image encryption scheme based on the MLNCML system using DNA sequences. Opt Lasers Eng 82:95\u2013103","journal-title":"Opt Lasers Eng"},{"issue":"5","key":"20790_CR37","doi-asserted-by":"crossref","first-page":"6243","DOI":"10.1007\/s11042-017-4534-z","volume":"77","author":"XY Wang","year":"2018","unstructured":"Wang XY, Li P, Zhang YQ, Liu LY, Zhang H, Wang X (2018) A novel color image encryption scheme using DNA permutation based on the Lorenz system. Multimed Tools Applic 77(5):6243\u20136265","journal-title":"Multimed Tools Applic"},{"key":"20790_CR38","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.jvcir.2017.02.017","volume":"45","author":"MN Asghar","year":"2017","unstructured":"Asghar MN, Kousar R, Majid H, Fleury M (2017) Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes. J Vis Commun Image Represent 45:122\u2013136","journal-title":"J Vis Commun Image Represent"},{"issue":"6","key":"20790_CR39","doi-asserted-by":"crossref","first-page":"7841","DOI":"10.1007\/s11042-018-6496-1","volume":"78","author":"X Zhang","year":"2019","unstructured":"Zhang X, Wang X (2019) Multiple-image encryption algorithm based on DNA encoding and chaotic system. Multimed Tools Applic 78(6):7841\u20137869","journal-title":"Multimed Tools Applic"},{"issue":"12","key":"20790_CR40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/s18124307","volume":"18","author":"S Oueida","year":"2018","unstructured":"Oueida S, Kotb Y, Aloqaily M, Jararweh Y, Baker T (2018) An edge computing based smart healthcare framework for resource management. Sensors 18(12):1\u201322","journal-title":"Sensors"},{"issue":"11","key":"20790_CR41","doi-asserted-by":"crossref","first-page":"13145","DOI":"10.1007\/s11042-017-4936-y","volume":"77","author":"W El-Shafai","year":"2018","unstructured":"El-Shafai W, El-Rabaie S, El-Halawany M, Abd El-Samie F (2018) Encoder-independent decoder-dependent depth-assisted error concealment algorithm for wireless 3D video communication. Multimed Tools Applic 77(11):13145\u201313172","journal-title":"Multimed Tools Applic"},{"issue":"3","key":"20790_CR42","first-page":"1","volume":"6","author":"W El-Shafai","year":"2015","unstructured":"El-Shafai W (2015) Pixel-level matching based multi-hypothesis error concealment modes for wireless 3D H. 264\/MVC communication. Research 6(3):1\u201311","journal-title":"Research"},{"issue":"17","key":"20790_CR43","doi-asserted-by":"crossref","first-page":"22787","DOI":"10.1007\/s11042-017-5534-8","volume":"77","author":"J Liu","year":"2018","unstructured":"Liu J, Ma Y, Li S, Lian J, Zhang X (2018) A new simple chaotic system and its application in medical image encryption. Multimed Tools Applic 77(17):22787\u201322808","journal-title":"Multimed Tools Applic"},{"issue":"2","key":"20790_CR44","first-page":"63","volume":"15","author":"R Gupta","year":"2018","unstructured":"Gupta R, Pachauri R, Singh A (2018) An effective approach of secured medical image transmission using encryption method. Mol Cell Biomech 15(2):63\u201383","journal-title":"Mol Cell Biomech"},{"key":"20790_CR45","doi-asserted-by":"crossref","unstructured":"Usman M, Usman M (2018) Using image steganography for providing enhanced medical data security. In: Proc. IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV. IEEE pp 2\u20136","DOI":"10.1109\/CCNC.2018.8319263"},{"key":"20790_CR46","doi-asserted-by":"crossref","unstructured":"Benssalah M, Rhaskali Y, Azzaz M (2018) Medical images encryption based on elliptic curve cryptography and chaos theory. In Proc. IEEE International Conference on Smart Communications in Network Technologies (SaCoNeT), El Oued. IEEE pp 222\u2013226","DOI":"10.1109\/SaCoNeT.2018.8585512"},{"key":"20790_CR47","doi-asserted-by":"crossref","unstructured":"Abdel-Nabi H, Al-Haj A (2019) Medical imaging security using partial encryption and histogram shifting watermarking. In: Proc. IEEE 8th International Conference on Information Technology (ICIT), Amman. IEEE pp 802\u2013807","DOI":"10.1109\/ICITECH.2017.8079950"},{"key":"20790_CR48","doi-asserted-by":"crossref","unstructured":"Abdmouleh M, Khalfallah A, Bouhlel M (2017) A novel selective encryption DWT-based algorithm for medical images. In: Proc. IEEE 14th International Conference on Computer Graphics, Imaging and Visualization, Marrakesh. IEEE pp 79\u201384","DOI":"10.1109\/CGiV.2017.10"},{"key":"20790_CR49","doi-asserted-by":"crossref","unstructured":"Bharghavi G, Kumar P, Geetha K, Devi N (2018) An implementation of SLICE algorithm to enforce security for medical images using DNA approach. In: Proc. IEEE International Conference on Communication and Signal Processing (ICCSP), Chennai. IEEE pp 0984\u20130988","DOI":"10.1109\/ICCSP.2018.8524413"},{"key":"20790_CR50","doi-asserted-by":"crossref","unstructured":"Dagadu J, Li J, Shah F, Mustafa N, Kumar K (2016) DWT based encryption technique for medical images. In: Proc. IEEE 13th International computer conference on wavelet active media technology and information processing (ICCWAMTIP), Chengdu. IEEE pp 252\u2013255","DOI":"10.1109\/ICCWAMTIP.2016.8079849"},{"key":"20790_CR51","doi-asserted-by":"crossref","unstructured":"Dagadu J, Li J, Shah F (2017) An efficient di-chaotic diffusion based medical image cryptosystem. In: Proc. IEEE 14th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu. IEEE pp 206\u2013210","DOI":"10.1109\/ICCWAMTIP.2017.8301480"},{"key":"20790_CR52","doi-asserted-by":"crossref","unstructured":"Dai Y, Wang X (2012) Medical image encryption based on a composition of logistic maps and chebyshev maps. In: Proc. IEEE International Conference on Information and Automation (ICIA), Shenyang. IEEE pp 210\u2013214","DOI":"10.1109\/ICInfA.2012.6246810"},{"key":"20790_CR53","doi-asserted-by":"crossref","unstructured":"Parameshachari B, Panduranga H, Naveenkumar S (2017) Partial encryption of medical images by dual DNA addition using DNA encoding. In: Proc. IEEE International Conference on Recent Innovations in Signal Processing and Embedded Systems (RISE), Bhopal. IEEE pp 310\u2013314","DOI":"10.1109\/RISE.2017.8378172"},{"key":"20790_CR54","first-page":"1","volume-title":"\u201cImage encryption and compression for medical image security\u201d, in Proc","author":"W Puech","year":"2008","unstructured":"Puech W (2008) \u201cImage encryption and compression for medical image security\u201d, in Proc. IEEE First Workshops on Image Processing Theory, Tools and Applications (IPTTA), Sousse, Tunisia, pp 1\u20132"},{"key":"20790_CR55","doi-asserted-by":"crossref","unstructured":"Ranaee I, Nia M, Jahantigh R, Gharib A (2013) Introducing a new algorithm for medical image encryption based on chaotic feature of cellular automata. In: Proc. IEEE International Conference for Internet Technology and Secured Transactions (ICITST), London. IEEE pp 582\u2013587","DOI":"10.1109\/ICIST.2013.6747618"},{"key":"20790_CR56","doi-asserted-by":"crossref","unstructured":"Saraswathi P, Venkatesulu M (2017) A novel stream cipher using pesudo random binary sequence generator for medical image encryption. In: Proc. IEEE International Conference on Trends in Electronics and Informatics (ICEI), Tirunelveli. IEEE pp 425\u2013429","DOI":"10.1109\/ICOEI.2017.8300961"},{"key":"20790_CR57","doi-asserted-by":"crossref","unstructured":"Suganya G, Amudha K (2014) Medical image integrity control using joint encryption and watermarking techniques. In: Proc. IEEE International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE), Coimbatore. IEEE pp 1\u20135","DOI":"10.1109\/ICGCCEE.2014.6922265"},{"key":"20790_CR58","doi-asserted-by":"crossref","unstructured":"Zhou Y, Panetta K, Agaian S (2009) A lossless encryption method for medical images using edge maps. In: Proc. IEEE Annual International Conference of the Engineering in Medicine and Biology Society (ICEMBS), Minneapolis, MN. IEEE pp 3707\u20133710\u200f","DOI":"10.1109\/IEMBS.2009.5334799"},{"key":"20790_CR59","doi-asserted-by":"crossref","unstructured":"Chatterjee A, Dhanotia J, Bhatia V, Rana S, Prakash S (2017) Optical image encryption using fringe projection profilometry, Fourier Fringe analysis, and RSA algorithm. In: Proc. IEEE 14th IEEE India Council International Conference (INDICON), Roorkee. IEEE pp 1\u20135","DOI":"10.1109\/INDICON.2017.8487849"},{"key":"20790_CR60","doi-asserted-by":"crossref","unstructured":"Das R, Manna S, Dutta S (2017) Cumulative image encryption approach based on user defined operation, character repositioning, text key and image key encryption technique and secret sharing scheme. In: Proc. IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), Chennai. IEEE pp 748\u2013753","DOI":"10.1109\/ICPCSI.2017.8391813"},{"key":"20790_CR61","doi-asserted-by":"crossref","unstructured":"Jain S, Khunteta A (2018) Color image encryption by component based partial random phase encoding. In: Proc. IEEE International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore. IEEE pp 144\u2013148","DOI":"10.1109\/ICIRCA.2018.8597319"},{"key":"20790_CR62","doi-asserted-by":"crossref","unstructured":"Li P, Lo K (2015) Joint image compression and encryption based on alternating transforms with quality control. In: Proc. IEEE Visual Communications and Image Processing (VCIP), Singapore. IEEE pp 1\u20134","DOI":"10.1109\/VCIP.2015.7457867"},{"key":"20790_CR63","doi-asserted-by":"crossref","unstructured":"Ramaraju P, Raju G, Krishna P (2016) Image encryption after hiding (IEAH) technique for color images. In: Proc. International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), Paralakhemundi. IEEE pp 1202\u20131207","DOI":"10.1109\/SCOPES.2016.7955631"},{"key":"20790_CR64","doi-asserted-by":"crossref","first-page":"106911","DOI":"10.1016\/j.optlastec.2020.106911","volume":"138","author":"Y Shen","year":"2021","unstructured":"Shen Y, Tang C, Xu M, Lei Z (2021) Optical selective encryption based on the FRFCM algorithm and face biometric for the medical image. Opt Laser Technol 138:106911","journal-title":"Opt Laser Technol"},{"key":"20790_CR65","first-page":"1","volume":"2021","author":"A Hafsa","year":"2021","unstructured":"Hafsa A, Gafsi M, Malek J, Machhout M (2021) FPGA implementation of improved security approach for medical image encryption and decryption. Sci Program 2021:1\u201320","journal-title":"Sci Program"},{"key":"20790_CR66","doi-asserted-by":"crossref","first-page":"106333","DOI":"10.1016\/j.optlaseng.2020.106333","volume":"137","author":"OS Faragallah","year":"2021","unstructured":"Faragallah OS, El-sayed HS, Afifi A, El-Shafai W (2021) Efficient and secure opto-cryptosystem for color images using 2D logistic-based fractional Fourier transform. Opt Lasers Eng 137:106333","journal-title":"Opt Lasers Eng"},{"key":"20790_CR67","doi-asserted-by":"crossref","first-page":"106403","DOI":"10.1016\/j.optlaseng.2020.106403","volume":"138","author":"B Abd-El-Atty","year":"2021","unstructured":"Abd-El-Atty B, Iliyasu AM, Alanezi A, Abd El-latif AA (2021) Optical image encryption based on quantum walks. Opt Lasers Eng 138:106403","journal-title":"Opt Lasers Eng"},{"key":"20790_CR68","doi-asserted-by":"crossref","first-page":"105942","DOI":"10.1016\/j.optlastec.2019.105942","volume":"124","author":"AA Abd EL-Latif","year":"2020","unstructured":"Abd EL-Latif AA, Abd-El-Atty B, Abou-Nassar EM, Venegas-Andraca SE (2020) Controlled alternate quantum walks based privacy preserving healthcare images in internet of things. Optic Laser Technol 124:105942","journal-title":"Optic Laser Technol"},{"key":"20790_CR69","doi-asserted-by":"crossref","first-page":"106026","DOI":"10.1016\/j.optlaseng.2020.106026","volume":"128","author":"M Chen","year":"2020","unstructured":"Chen M, Ma G, Tang C, Lei Z (2020) Generalized optical encryption framework based on Shearlets for medical image. Opt Lasers Eng 128:106026","journal-title":"Opt Lasers Eng"},{"key":"20790_CR70","doi-asserted-by":"crossref","first-page":"106399","DOI":"10.1016\/j.optlaseng.2020.106399","volume":"137","author":"P Singh","year":"2021","unstructured":"Singh P (2021) Cascaded unequal modulus decomposition in Fresnel domain based cryptosystem to enhance the image security. Opt Lasers Eng 137:106399","journal-title":"Opt Lasers Eng"},{"key":"20790_CR71","doi-asserted-by":"crossref","first-page":"37855","DOI":"10.1109\/ACCESS.2021.3063237","volume":"9","author":"ST Kamal","year":"2021","unstructured":"Kamal ST, Hosny KM, Elgindy TM, Darwish MM, Fouda MM (2021) A new image encryption algorithm for grey and color medical images. IEEE Access 9:37855\u201337865","journal-title":"IEEE Access"},{"key":"20790_CR72","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.optlaseng.2018.05.009","volume":"110","author":"H Nematzadeh","year":"2018","unstructured":"Nematzadeh H, Enayatifar R, Motameni H, Guimar\u00e3es FG, Coelho VN (2018) Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices. Opt Lasers Eng 110:24\u201332","journal-title":"Opt Lasers Eng"},{"key":"20790_CR73","doi-asserted-by":"crossref","first-page":"1445","DOI":"10.1007\/s11517-020-02178-w","volume":"58","author":"SA Banu","year":"2020","unstructured":"Banu SA, Amirtharajan R (2020) A robust medical image encryption in dual domain: chaos-DNA-IWT combined approach. Med Biol Eng Comput 58:1445\u20131458","journal-title":"Med Biol Eng Comput"},{"key":"20790_CR74","doi-asserted-by":"crossref","first-page":"22787","DOI":"10.1007\/s11042-017-5534-8","volume":"77","author":"J Liu","year":"2018","unstructured":"Liu J, Ma Y, Li S, Lian J, Zhang X (2018) A new simple chaotic system and its application in medical image encryption. Multimed Tools Applic 77:22787\u201322808","journal-title":"Multimed Tools Applic"},{"issue":"19","key":"20790_CR75","doi-asserted-by":"crossref","first-page":"27453","DOI":"10.1007\/s11042-022-12762-x","volume":"81","author":"SF Yousif","year":"2022","unstructured":"Yousif SF, Abboud AJ, Alhumaima RS (2022) A new image encryption based on bit replacing, chaos and DNA coding techniques. Multimed Tools Applic 81(19):27453\u201327493","journal-title":"Multimed Tools Applic"},{"key":"20790_CR76","doi-asserted-by":"crossref","first-page":"3373","DOI":"10.1007\/s12652-020-02399-9","volume":"12","author":"S Jeevitha","year":"2021","unstructured":"Jeevitha S, Amutha Prabha N (2021) Novel medical image encryption using DWT block-based scrambling and edge maps. J Ambient Intell Humaniz Comput 12:3373\u20133388","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"20790_CR77","doi-asserted-by":"crossref","first-page":"155184","DOI":"10.1109\/ACCESS.2020.3019216","volume":"8","author":"SF Yousif","year":"2020","unstructured":"Yousif SF, Abboud AJ, Radhi HY (2020) Robust image encryption with scanning technology, the El-Gamal algorithm and chaos theory. IEEE Access 8:155184\u2013155209","journal-title":"IEEE Access"},{"key":"20790_CR78","doi-asserted-by":"crossref","first-page":"105769","DOI":"10.1016\/j.optlastec.2019.105769","volume":"121","author":"K Zhou","year":"2020","unstructured":"Zhou K, Fan J, Fan H, Li M (2020) Secure image encryption scheme using double random-phase encoding and compressed sensing. Opt Laser Technol 121:105769","journal-title":"Opt Laser Technol"},{"key":"20790_CR79","doi-asserted-by":"crossref","unstructured":"Selvi CT, Amudha J, & Sudhakar R. (2021). Medical image encryption and compression by adaptive sigma filterized synorr certificateless signcryptive Levenshtein entropy-coding-based deep neural learning. Multimedia Systems, 1\u201316","DOI":"10.1007\/s00530-021-00764-y"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-025-20790-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-025-20790-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-025-20790-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T11:57:12Z","timestamp":1758974232000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-025-20790-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,7]]},"references-count":79,"journal-issue":{"issue":"33","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["20790"],"URL":"https:\/\/doi.org\/10.1007\/s11042-025-20790-6","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2025,4,7]]},"assertion":[{"value":"3 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 April 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable- The manuscript does not contain any human or animal studies.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All authors are accepting to submit and publish the submitted work.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"All authors are contributing and accepting to submit the current work.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}