{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T16:53:13Z","timestamp":1772988793618,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T00:00:00Z","timestamp":1769990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T00:00:00Z","timestamp":1769990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-026-21346-y","type":"journal-article","created":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T19:25:33Z","timestamp":1770060333000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["New genetic algorithm combined with three Feistel towers acting at the RNA level for the encryption of medical images"],"prefix":"10.1007","volume":"85","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-2470-0998","authenticated-orcid":false,"given":"Hassan","family":"Tabti","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0203-2769","authenticated-orcid":false,"given":"Hamid","family":"El Bourakkadi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8090-5210","authenticated-orcid":false,"given":"Mariem","family":"Jarjar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7119-2068","authenticated-orcid":false,"given":"Abdellatif","family":"Jarjar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4169-3443","authenticated-orcid":false,"given":"Said","family":"Najah","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6241-2981","authenticated-orcid":false,"given":"Khalid","family":"Zenkouar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,2]]},"reference":[{"issue":"3","key":"21346_CR1","doi-asserted-by":"publisher","first-page":"2811","DOI":"10.1007\/s11071-024-10324-4","volume":"113","author":"Y Zheng","year":"2025","unstructured":"Zheng Y, Huang Q, Cai S, Xiong X, Huang L (2025) Image encryption based on novel hill cipher variant and 2d-igscm hyper-chaotic map. Nonlinear Dyn 113(3):2811\u20132829. https:\/\/doi.org\/10.1007\/s11071-024-10324-4","journal-title":"Nonlinear Dyn"},{"issue":"3\u20134","key":"21346_CR2","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1504\/IJESDF.2013.058652","volume":"5","author":"B Karthikeyan","year":"2013","unstructured":"Karthikeyan B, Chakravarthy J, Vaithiyanathan V (2013) An enhanced hill cipher approach for image encryption in steganography. Int J Electronic Sec Digital Forensics 5(3\u20134):178\u2013187. https:\/\/doi.org\/10.1504\/IJESDF.2013.058652","journal-title":"Int J Electronic Sec Digital Forensics"},{"issue":"20","key":"21346_CR3","doi-asserted-by":"publisher","first-page":"3878","DOI":"10.3390\/math10203878","volume":"10","author":"PN Lone","year":"2022","unstructured":"Lone PN, Singh D, Stoffov\u2019a\u2019 V, Mishra DC, Mir UH, Kumar N (2022) Cryptanalysis and improved image encryption scheme using elliptic curve and affine hill cipher. Mathematics 10(20):3878. https:\/\/doi.org\/10.3390\/math10203878","journal-title":"Mathematics"},{"key":"21346_CR4","doi-asserted-by":"publisher","unstructured":"Tabti H, El\u00a0Bourakkadi H, Chemlal A, Jarjar A, Najah S, Zenkouar K (2024) Novel cryptosystem integrating the vigenere cipher and one feistel round for color image encryption. Int J Electrical Comput Eng (2088-8708) 14(5). https:\/\/doi.org\/10.11591\/ijece.v14i5.pp5701-5714","DOI":"10.11591\/ijece.v14i5.pp5701-5714"},{"key":"21346_CR5","doi-asserted-by":"publisher","unstructured":"El Bourakkadi H, Chemlal A, Tabti H, Kattass M, Jarjar A, Benazzi A (2025) A novel image cipher system based on hybrid vigenere-affine approach. Multimed Tools Appl 1\u201327. https:\/\/doi.org\/10.1007\/s11042-024-20532-0","DOI":"10.1007\/s11042-024-20532-0"},{"key":"21346_CR6","doi-asserted-by":"publisher","unstructured":"Abid A, Jarjar M, Kattass M, Rrghout H, Jarjar A, Benazzi A (2024) Genetic algorithm using feistel and genetic operator acting at the bit level for images encryption. Int J Safety Sec Eng 14(1). https:\/\/doi.org\/10.18280\/ijsse.140102","DOI":"10.18280\/ijsse.140102"},{"key":"21346_CR7","doi-asserted-by":"publisher","first-page":"16529","DOI":"10.1007\/s11042-016-3926-9","volume":"76","author":"R Bansal","year":"2017","unstructured":"Bansal R, Gupta S, Sharma G (2017) An innovative image encryption scheme based on chaotic map and vigen\u00e8re scheme. Multimed Tools Appl 76:16529\u201316562. https:\/\/doi.org\/10.1007\/s11042-016-3926-9","journal-title":"Multimed Tools Appl"},{"key":"21346_CR8","doi-asserted-by":"publisher","unstructured":"Upadhyaya A, Rai CS, Aithal G (2024) Xor vector space based s-box generation and its application to des and aes for the time-efficient image encryption. Int J Electrical Eng Inf 16(2):180\u2013195. https:\/\/doi.org\/10.15676\/ijeei.2024.16.2.3","DOI":"10.15676\/ijeei.2024.16.2.3"},{"key":"21346_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3436558","author":"E Winarno","year":"2024","unstructured":"Winarno E, Hadikurniawati W, Nugroho K, Lusiana V (2024) Integrating quadratic polynomial and symbolic chaotic map-based feistel network to improve image encryption performance. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2024.3436558","journal-title":"IEEE Access"},{"key":"21346_CR10","doi-asserted-by":"crossref","unstructured":"Crane M, Ranjbarzadeh R, Keles A, Anari S, Bendechache M (2024) Secure and decentralized collaboration in oncology: A blockchain approach to tumor segmentation. In: 2024 IEEE 48th annual computers, software, and applications conference (COMPSAC) 10(20):1681\u20131686","DOI":"10.1109\/COMPSAC61105.2024.00265"},{"issue":"2","key":"21346_CR11","doi-asserted-by":"publisher","first-page":"1170","DOI":"10.1007\/s12596-023-01232-8","volume":"53","author":"A Hadj Brahim","year":"2024","unstructured":"Hadj Brahim A, Ali Pacha A, Hadj Said N (2024) An image encryption scheme based on a modified aes algorithm by using a variable s-box. J Optics 53(2):1170\u20131185. https:\/\/doi.org\/10.1007\/s12596-023-01232-8","journal-title":"J Optics"},{"key":"21346_CR12","doi-asserted-by":"publisher","first-page":"26334","DOI":"10.1109\/AC-CESS.2024.3351119","volume":"12","author":"MY Shakor","year":"2024","unstructured":"Shakor MY, Khaleel MI, Safran M, Alfarhood S, Zhu M (2024) Dynamic aes encryption and blockchain key management: a novel solution for cloud data security. IEEE Access 12:26334\u201326343. https:\/\/doi.org\/10.1109\/AC-CESS.2024.3351119","journal-title":"IEEE Access"},{"key":"21346_CR13","unstructured":"Khan C, Ayesha T, Fahomida M, Alam SJ, Hossain NN (2024) Advancing medical image security: a hybrid dna-aes based cryptosystem"},{"key":"21346_CR14","doi-asserted-by":"publisher","unstructured":"Mohammed SG, Al-Mothafar NS (2024) Evaluation of rijndael algorithm for audio encryption by brute force attack. J Eng 30(11):128\u2013141. https:\/\/doi.org\/10.31026\/j.eng.2024.11.08","DOI":"10.31026\/j.eng.2024.11.08"},{"key":"21346_CR15","doi-asserted-by":"publisher","unstructured":"Jasim SH, Hoomod HK, Hussein KA (2024) Image encryption based on hybrid parallel algorithm: Des-present using 2d-chaotic system. Int J Safety Sec Eng 14(2):2. https:\/\/doi.org\/10.18280\/ijsse.140229","DOI":"10.18280\/ijsse.140229"},{"key":"21346_CR16","doi-asserted-by":"publisher","unstructured":"Wen H, Lin Y, Kang S, Zhang X, Zou K (2024) Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion. IScience 27(1). https:\/\/doi.org\/10.1016\/j.isci.2023.108610","DOI":"10.1016\/j.isci.2023.108610"},{"issue":"9","key":"21346_CR17","doi-asserted-by":"publisher","first-page":"11923","DOI":"10.1007\/s11227-024-05906-3","volume":"80","author":"S Bhattacharjee","year":"2024","unstructured":"Bhattacharjee S, Sharma H, Choudhury T, Abdelmoniem AM (2024) Leveraging chaos for enhancing encryption and compression in large cloud data transfers. J Supercomput 80(9):11923\u201311957. https:\/\/doi.org\/10.1007\/s11227-024-05906-3","journal-title":"J Supercomput"},{"issue":"24","key":"21346_CR18","doi-asserted-by":"publisher","first-page":"22463","DOI":"10.1007\/s11071-024-10191-z","volume":"112","author":"X Huang","year":"2024","unstructured":"Huang X, Tang J, Zhang Z (2024) Efficient and secure image encryption algorithm using 2d lim map and latin square matrix. Nonlinear Dyn 112(24):22463\u201322483. https:\/\/doi.org\/10.1007\/s11071-024-10191-z","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"21346_CR19","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s00530-024-01334-8","volume":"30","author":"A Kumar","year":"2024","unstructured":"Kumar A, Dua M (2024) A novel exponent-sine-cosine chaos map-based multiple-image encryption technique. Multimed Syst 30(3):141. https:\/\/doi.org\/10.1007\/s00530-024-01334-8","journal-title":"Multimed Syst"},{"key":"21346_CR20","doi-asserted-by":"publisher","first-page":"140876","DOI":"10.1109\/ACCESS.2020.3012912","volume":"8","author":"A Qayyum","year":"2020","unstructured":"Qayyum A, Ahmad J, Boulila W, Rubaiee S, Masood F, Khan F, Buchanan WJ et al (2020) Chaos-based confusion and diffusion of image pixels using dynamic substitution. IEEE Access 8:140876\u2013140895. https:\/\/doi.org\/10.1109\/ACCESS.2020.3012912","journal-title":"IEEE Access"},{"issue":"4","key":"21346_CR21","doi-asserted-by":"publisher","first-page":"2851","DOI":"10.1007\/s00500-023-09333-z","volume":"28","author":"EA Naeem","year":"2024","unstructured":"Naeem EA, Joshi AB, Kumar D, El-Samie FEA (2024) Few-detail image encryption algorithm based on diffusion and confusion using henon and baker chaotic maps. Soft Comput 28(4):2851\u20132861. https:\/\/doi.org\/10.1007\/s00500-023-09333-z","journal-title":"Soft Comput"},{"issue":"4","key":"21346_CR22","doi-asserted-by":"publisher","first-page":"2851","DOI":"10.1007\/s00542-024-06688-9","volume":"28","author":"EA Naeem","year":"2024","unstructured":"Naeem EA, Joshi AB, Kumar D, El-Samie FEA (2024) Few-detail image encryption algorithm based on diffusion and confusion using henon and baker chaotic maps. Soft Comput 28(4):2851\u20132861. https:\/\/doi.org\/10.1007\/s00542-024-06688-9","journal-title":"Soft Comput"},{"key":"21346_CR23","doi-asserted-by":"publisher","unstructured":"Wang X, Leng Z (2024) Image encryption algorithm based on face recognition, facial features recognition and bitonic sequence. Multimed Tools Appl 83(11). https:\/\/doi.org\/10.1007\/s11042-023-16787-8","DOI":"10.1007\/s11042-023-16787-8"},{"key":"21346_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103791","volume":"83","author":"M Alawida","year":"2024","unstructured":"Alawida M (2024) A novel dna tree-based chaotic image encryption algorithm. J Inf Sec Appl 83:103791. https:\/\/doi.org\/10.1016\/j.jisa.2024.103791","journal-title":"J Inf Sec Appl"},{"key":"21346_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2024.3407809","volume":"83","author":"L Huang","year":"2024","unstructured":"Huang L, Gao H (2024) Multi-image encryption algorithm based on novel spatiotemporal chaotic system and fractal geometry. IEEE Trans Circuits Syst I Regular Papers 83:103791. https:\/\/doi.org\/10.1109\/TCSI.2024.3407809","journal-title":"IEEE Trans Circuits Syst I Regular Papers"},{"key":"21346_CR26","doi-asserted-by":"publisher","unstructured":"Majeed ND, Al-Askery A, Hasan FS (2024) Hybrid video steganography and cryptography techniques. In: AIP conference proceedings, vol 3232. AIP Publishing. https:\/\/doi.org\/10.1063\/5.0236185","DOI":"10.1063\/5.0236185"},{"issue":"1","key":"21346_CR27","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/s11042-023-15677-3","volume":"83","author":"M Tahbaz","year":"2024","unstructured":"Tahbaz M, Shirgahi H, Yamaghani MR (2024) Evolutionary-based image encryption using magic square chaotic algorithm and rna codons truth table. Multimed Tools Appl 83(1):503\u2013526. https:\/\/doi.org\/10.1007\/s11042-023-15677-3","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"21346_CR28","doi-asserted-by":"publisher","first-page":"351","DOI":"10.3390\/e26050351","volume":"26","author":"H Shen","year":"2024","unstructured":"Shen H, Shan X (2024) An efficient image cryptosystem utilizing difference matrix and genetic algorithm. Entropy 26(5):351. https:\/\/doi.org\/10.3390\/e26050351","journal-title":"Entropy"},{"issue":"1","key":"21346_CR29","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/s11042-023-15677-3","volume":"83","author":"M Tahbaz","year":"2024","unstructured":"Tahbaz M, Shirgahi H, Yamaghani MR (2024) Evolutionary-based image encryption using magic square chaotic algorithm and rna codons truth table. Multimed Tools Appl 83(1):503\u2013526. https:\/\/doi.org\/10.1007\/s11042-023-15677-3","journal-title":"Multimed Tools Appl"},{"key":"21346_CR30","doi-asserted-by":"publisher","first-page":"23337","DOI":"10.1007\/s11042-020-10209-9","volume":"80","author":"X Wang","year":"2021","unstructured":"Wang X, Liu L (2021) Application of chaotic josephus scrambling and rna computing in image encryption. Multimed Tools Appl 80:23337\u201323358. https:\/\/doi.org\/10.1007\/s11042-020-10209-9","journal-title":"Multimed Tools Appl"},{"key":"21346_CR31","doi-asserted-by":"publisher","unstructured":"Zhao L, Zhao L, Cui F, Sun, (2024) Satellite image encryption based on rna and 7d complex chaotic system. Visual Comput 40(8):5659\u20135679. https:\/\/doi.org\/10.1007\/s00371-023-03128-x","DOI":"10.1007\/s00371-023-03128-x"},{"key":"21346_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2019.105818","volume":"121","author":"M Mahmud","year":"2020","unstructured":"Mahmud M, Lee M, Choi J-Y et al (2020) Evolutionary-based image encryption using rna codons truth table. Optics Laser Technol 121:105818. https:\/\/doi.org\/10.1016\/j.optlastec.2019.105818","journal-title":"Optics Laser Technol"},{"key":"21346_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2020.106465","volume":"132","author":"AA Abbasi","year":"2020","unstructured":"Abbasi AA, Mazinani M, Hosseini R (2020) Chaotic evolutionary-based image encryption using rna codons and amino acid truth table. Optics Laser Technol 132:106465. https:\/\/doi.org\/10.1016\/j.optlastec.2020.106465","journal-title":"Optics Laser Technol"},{"key":"21346_CR34","doi-asserted-by":"publisher","first-page":"12093","DOI":"10.1007\/s11042-019-08562-5","volume":"79","author":"RS Devi","year":"2020","unstructured":"Devi RS, Aravind AN, Vishal JC, Amritha D, Thenmozhi K, Rayappan JBB, Rengarajan A, Padmapriya P (2020) Image encryption through rna approach assisted with neural key sequences. Multimed Tools Appl 79:12093\u201312124. https:\/\/doi.org\/10.1007\/s11042-019-08562-5","journal-title":"Multimed Tools Appl"},{"key":"21346_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2024.102336","volume":"101","author":"S Zhou","year":"2025","unstructured":"Zhou S, Wei Y, Zhang Y, Iu HH-C, Zhang H (2025) Image encryption algorithm based on the dynamic rna computing and a new chaotic map. Integration 101:102336. https:\/\/doi.org\/10.1016\/j.vlsi.2024.102336","journal-title":"Integration"},{"key":"21346_CR36","doi-asserted-by":"publisher","unstructured":"Zhang J, Zuo J (2025) 3d-multiscroll chaotic attractors design, circuit implementation and application to medical image encryption. Integration 102417. https:\/\/doi.org\/10.1016\/j.vlsi.2025.102417","DOI":"10.1016\/j.vlsi.2025.102417"},{"key":"21346_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.125854","volume":"264","author":"Q Lai","year":"2025","unstructured":"Lai Q, Hua H (2025) Cure medical image encryption scheme for health-care iot using novel hyperchaotic map and dna cubes. Expert Syst Appl 264:125854. https:\/\/doi.org\/10.1016\/j.eswa.2024.125854","journal-title":"Expert Syst Appl"},{"issue":"8","key":"21346_CR38","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1109\/JIOT.2022.3228781","volume":"10","author":"X Chai","year":"2022","unstructured":"Chai X, Fu J, Gan Z, Lu Y, Zhang Y, Han D (2022) Exploiting semi-tensor product compressed sensing and hybrid cloud for secure medical image transmission. IEEE Int Things J 10(8):380\u20137392. https:\/\/doi.org\/10.1109\/JIOT.2022.3228781","journal-title":"IEEE Int Things J"},{"issue":"20","key":"21346_CR39","doi-asserted-by":"publisher","first-page":"18527","DOI":"10.1007\/s11071-024-09966-1","volume":"112","author":"S Zhou","year":"2024","unstructured":"Zhou S, Zhang H, Zhang Y, Zhang H (2024) Novel hyperchaotic image encryption method using machine learning-rbf. Nonlinear Dyn 112(20):18527\u201318550. https:\/\/doi.org\/10.1007\/s11071-024-09966-1","journal-title":"Nonlinear Dyn"},{"key":"21346_CR40","first-page":"943","volume":"30","author":"JS Khan","year":"2019","unstructured":"Khan JS, Ahmad J (2019) Chaos-based efficient selective image encryption. Nonlinear Dyn 30:943\u2013961","journal-title":"Nonlinear Dyn"},{"key":"21346_CR41","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.ijleo.2017.08.028","volume":"147","author":"DS Laiphrakpam","year":"2017","unstructured":"Laiphrakpam DS, Khumanthem MS (2017) Medical image encryption based on improved elgamal encryption technique. Optik 147:88\u2013102","journal-title":"Optik"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21346-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-026-21346-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21346-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T19:25:34Z","timestamp":1770060334000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-026-21346-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,2]]},"references-count":41,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,2]]}},"alternative-id":["21346"],"URL":"https:\/\/doi.org\/10.1007\/s11042-026-21346-y","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,2]]},"assertion":[{"value":"10 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 April 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None of the group authors has received any grants from organizations or individuals.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"We declare that this manuscript is our original work and has not been published or submitted elsewhere. The research was conducted ethically with necessary approvals obtained for studies involving human or animal subjects. Data and findings are reported honestly.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"All participants took part voluntarily and were informed about the research purpose and procedures. Written informed consent was obtained before participation. The study followed the ethical standards of relevant institutional and national research committees and applicable international guidelines.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"I, Dr. Hassan Tabti, as the corresponding author, on behalf of all co-authors, hereby grant my consent for the publication of our research paper titled \u201cNew genetic algorithm combined with three Feistel towers acting at the RNA level for the encryption of medical images\u201d in the journal of \u201cMultimedia tools and applications\u201d.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}],"article-number":"101"}}