{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:31:20Z","timestamp":1772119880466,"version":"3.50.1"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,3,11]],"date-time":"2021-03-11T00:00:00Z","timestamp":1615420800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,3,11]],"date-time":"2021-03-11T00:00:00Z","timestamp":1615420800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s11277-021-08357-8","type":"journal-article","created":{"date-parts":[[2021,3,11]],"date-time":"2021-03-11T15:02:40Z","timestamp":1615474960000},"page":"635-655","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Opposition Based Joint Grey Wolf-Whale Optimization Algorithm Based Attribute Based Encryption in Secure Wireless Communication"],"prefix":"10.1007","volume":"127","author":[{"given":"M.","family":"Raja","sequence":"first","affiliation":[]},{"given":"S.","family":"Dhanasekaran","sequence":"additional","affiliation":[]},{"given":"V.","family":"Vasudevan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,11]]},"reference":[{"key":"8357_CR1","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.jnca.2018.01.011","volume":"107","author":"Y Tan","year":"2018","unstructured":"Tan, Y., Xue, Y., Liang, C., Zheng, J., Zhang, Q., Zheng, J., & Li, Y. (2018). A root privilege management scheme with revocable authorization for android devices. Journal of Network and Computer Applications, 107, 69\u201382.","journal-title":"Journal of Network and Computer Applications"},{"issue":"2","key":"8357_CR2","first-page":"197","volume":"54","author":"Y Cao","year":"2018","unstructured":"Cao, Y., Zhou, Z., Sun, X., & Gao, C. (2018). Coverless information hiding based on the molecular structure images of material. Computers, Materials and Continua, 54(2), 197\u2013207.","journal-title":"Computers, Materials and Continua"},{"issue":"3","key":"8357_CR3","doi-asserted-by":"publisher","first-page":"2099","DOI":"10.1166\/jnn.2013.6872","volume":"13","author":"X Deng","year":"2013","unstructured":"Deng, X., Chen, Z., Zeng, F., Zhang, Y., & Mao, Y. (2013). Authentication and recovery of medical diagnostic image using dual reversible digital watermarking. Journal of Nanoscience and Nanotechnology, 13(3), 2099\u20132107.","journal-title":"Journal of Nanoscience and Nanotechnology"},{"issue":"5","key":"8357_CR4","doi-asserted-by":"publisher","first-page":"3339","DOI":"10.1007\/s10916-012-9827-1","volume":"36","author":"S Das","year":"2012","unstructured":"Das, S., & Kundu, M. K. (2012). Effective management of medical information through a novel blind watermarking technique. Journal of Medical Systems, 36(5), 3339\u20133351.","journal-title":"Journal of Medical Systems"},{"key":"8357_CR5","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.cnsns.2014.12.005","volume":"24","author":"A Kanso","year":"2015","unstructured":"Kanso, A., & Ghebleh, M. (2015). An efficient and robust image encryption scheme for medical applications. Communications in Nonlinear Science and Numerical Simulation, 24, 98\u2013116.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"key":"8357_CR6","first-page":"1","volume":"35","author":"JB Lima","year":"2015","unstructured":"Lima, J. B., Madeiro, F., & Sales, F. J. R. (2015). Encryption of medical images based on the cosine number transform. Signal Processing: Image Communication, 35, 1\u20138.","journal-title":"Signal Processing: Image Communication"},{"key":"8357_CR7","doi-asserted-by":"crossref","unstructured":"Mukhedkar, M., Powar, P., Gaikwad, P. (2015). Secure nonreal time image encryption algorithm development using cryptography & Steganography. In India conference (INDICON), 2015 annual IEEE (pp. 1\u20136). IEEE.","DOI":"10.1109\/INDICON.2015.7443808"},{"key":"8357_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.02.004","author":"RM Daniel","year":"2018","unstructured":"Daniel, R. M., Rajsingh, E. B., & Silas, S. A. (2018). Forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography. Journal of King Saud University-Computer and Information Sciences. https:\/\/doi.org\/10.1016\/j.jksuci.2018.02.004","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"8357_CR9","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.eswa.2016.03.047","volume":"57","author":"E Nabil","year":"2016","unstructured":"Nabil, E. (2016). A modified flower pollination algorithm for global optimization. Expert Systems with Applications, 57, 192\u2013203.","journal-title":"Expert Systems with Applications"},{"key":"8357_CR10","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1016\/j.future.2018.04.051","volume":"86","author":"M Abdel-Basset","year":"2018","unstructured":"Abdel-Basset, M., Manogaran, G., & Mohamed, M. (2018). Internet of Things (IoT) and its impact on supply chain: A framework for building smart, secure and efficient systems. Future Generation Computer Systems., 86, 614\u2013628.","journal-title":"Future Generation Computer Systems."},{"key":"8357_CR11","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.future.2018.03.020","volume":"85","author":"M Abdel-Basset","year":"2018","unstructured":"Abdel-Basset, M., Manogaran, G., El-Shahat, D., & Mirjalili, S. (2018). A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem. Future Generation Computer Systems, 85, 129\u2013145.","journal-title":"Future Generation Computer Systems"},{"key":"8357_CR12","first-page":"1","volume":"2019","author":"Y Song","year":"2019","unstructured":"Song, Y., Wang, H., Wei, X., & Wu, L. (2019). Efficient attribute-based encryption with privacy-preserving key generation and its application in industrial cloud.\u00a0Security and Communication Networks,\u00a02019, 1\u20139.","journal-title":"Security and Communication Networks"},{"issue":"11","key":"8357_CR13","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/s10916-018-1053-z","volume":"42","author":"T Avudaiappan","year":"2018","unstructured":"Avudaiappan, T., Balasubramanian, R., Pandiyan, S. S., Saravanan, M., Lakshmanaprabu, S. K., & Shankar, K. (2018). Medical image security using dual encryption with oppositional based optimization algorithm. Journal of Medical Systems, 42(11), 208.","journal-title":"Journal of Medical Systems"},{"key":"8357_CR14","doi-asserted-by":"publisher","first-page":"120321","DOI":"10.1109\/ACCESS.2020.3005808","volume":"8","author":"M Sivaram","year":"2020","unstructured":"Sivaram, M., Lydia, E. L., Pustokhina, I. V., Pustokhin, D. A., Elhoseny, M., Joshi, G. P., & Shankar, K. (2020). An optimal least square support vector machine based earnings prediction of blockchain financial products. IEEE Access, 8, 120321\u2013120330.","journal-title":"IEEE Access"},{"issue":"4","key":"8357_CR15","doi-asserted-by":"publisher","first-page":"e5122","DOI":"10.1002\/cpe.5122","volume":"32","author":"K Shankar","year":"2020","unstructured":"Shankar, K., Lakshmanaprabu, S. K., Gupta, D., Khanna, A., & de Albuquerque, V. H. C. (2020). Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience, 32(4), e5122.","journal-title":"Concurrency and Computation: Practice and Experience"}],"updated-by":[{"DOI":"10.1007\/s11277-021-08444-w","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2021,4,2]],"date-time":"2021-04-02T00:00:00Z","timestamp":1617321600000}}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08357-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08357-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08357-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T08:21:55Z","timestamp":1671006115000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08357-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,11]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["8357"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08357-8","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-175337\/v1","asserted-by":"object"}]},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,11]]},"assertion":[{"value":"19 February 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2021","order":3,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":4,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11277-021-08444-w","URL":"https:\/\/doi.org\/10.1007\/s11277-021-08444-w","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no conflict of interest. The manuscript was written through contributions of all authors. All authors have given approval to the final version of the manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}