{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T13:25:03Z","timestamp":1773753903052,"version":"3.50.1"},"reference-count":90,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2023,8,5]],"date-time":"2023-08-05T00:00:00Z","timestamp":1691193600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,5]],"date-time":"2023-08-05T00:00:00Z","timestamp":1691193600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Med Biol Eng Comput"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s11517-023-02874-3","type":"journal-article","created":{"date-parts":[[2023,8,5]],"date-time":"2023-08-05T05:01:43Z","timestamp":1691211703000},"page":"2971-3002","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["A variable dimensional chaotic map-based medical image encryption algorithm with multi-mode"],"prefix":"10.1007","volume":"61","author":[{"given":"Bin","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6920-8112","authenticated-orcid":false,"given":"Bahbibi","family":"Rahmatullah","sequence":"additional","affiliation":[]},{"given":"Shir Li","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Haifa Matar","family":"Almutairi","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Xinjuan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhaoyan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,5]]},"reference":[{"key":"2874_CR1","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1109\/ACCESS.2017.2777869","volume":"6","author":"AA Abd El-Latif","year":"2017","unstructured":"Abd El-Latif AA, Abd-El-Atty B, Talha M (2017) Robust encryption of quantum medical images. IEEE Access 6:1073\u20131081. https:\/\/doi.org\/10.1109\/ACCESS.2017.2777869","journal-title":"IEEE Access"},{"key":"2874_CR2","doi-asserted-by":"publisher","unstructured":"Abdmouleh MK, Khalfallah A, Bouhlel MS (2017) A novel selective encryption DWT-based algorithm for medical image. In: 2017 14th International Conference on Computer Graphics, Imaging and Visualization, Marrakesh, Morocco, pp 79\u201384. https:\/\/doi.org\/10.1109\/CGiV.2017.10","DOI":"10.1109\/CGiV.2017.10"},{"issue":"6","key":"2874_CR3","doi-asserted-by":"publisher","first-page":"1663","DOI":"10.1080\/09720529.2021.1884378","volume":"24","author":"AS Abdulbaqi","year":"2021","unstructured":"Abdulbaqi AS, Obaid AJ, Mohammed AH (2021) ECG signals recruitment to implement a new technique for medical image encryption. J Discret Math Sci Crypt 24(6):1663\u20131673. https:\/\/doi.org\/10.1080\/09720529.2021.1884378","journal-title":"J Discret Math Sci Crypt"},{"issue":"2","key":"2874_CR4","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1080\/19393555.2020.1718248","volume":"29","author":"PT Akkasaligar","year":"2020","unstructured":"Akkasaligar PT, Biradar S (2020) Selective medical image encryption using DNA cryptography. Inf Secur J: Glob Perspect 29(2):91\u2013101. https:\/\/doi.org\/10.1080\/19393555.2020.1718248","journal-title":"Inf Secur J: Glob Perspect"},{"issue":"08","key":"2874_CR5","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcation Chaos 16(08):2129\u20132151","journal-title":"Int J Bifurcation Chaos"},{"issue":"12","key":"2874_CR6","doi-asserted-by":"publisher","first-page":"2770","DOI":"10.1049\/ipr2.12261","volume":"15","author":"I Aouissaoui","year":"2021","unstructured":"Aouissaoui I, Bakir T, Sakly A (2021) Robustly correlated key-medical image for DNA-chaos based encryption. IET Image Proc 15(12):2770\u20132786. https:\/\/doi.org\/10.1049\/ipr2.12261","journal-title":"IET Image Proc"},{"key":"2874_CR7","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.jbi.2018.08.010","volume":"86","author":"S Arumugham","year":"2018","unstructured":"Arumugham S, Rajagopalan S, Bosco J, Rayappan B, Amirtharajan R (2018) Networked medical data sharing on secure medium\u2013a web publishing mode for DICOM viewer with three layer authentication. J Biomed Inform 86:90\u2013105. https:\/\/doi.org\/10.1016\/j.jbi.2018.08.010","journal-title":"J Biomed Inform"},{"key":"2874_CR8","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.measurement.2019.02.069","volume":"139","author":"S Arunkumar","year":"2019","unstructured":"Arunkumar S, Subramaniyaswamy V, Vijayakumar V, Chilamkurti N, Logesh R (2019) SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement 139:426\u2013437. https:\/\/doi.org\/10.1016\/j.measurement.2019.02.069","journal-title":"Measurement"},{"key":"2874_CR9","doi-asserted-by":"publisher","first-page":"7167","DOI":"10.1007\/s11042-020-09981-5","volume":"80","author":"K Balasamy","year":"2021","unstructured":"Balasamy K, Suganyadevi S (2021) A fuzzy based ROI selection for encryption and watermarking in medical image using DWT and SVD. Multimed Tools Appl 80:7167\u20137186","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"2874_CR10","doi-asserted-by":"publisher","first-page":"17667","DOI":"10.1007\/s11042-021-10564-1","volume":"80","author":"SA Banday","year":"2021","unstructured":"Banday SA, Pandit MK (2021) Texture maps and chaotic maps framework for secure medical image transmission. Multimed Tools Appl 80(12):17667\u201317683","journal-title":"Multimed Tools Appl"},{"key":"2874_CR11","doi-asserted-by":"crossref","unstructured":"Banu SA, Amirtharajan R (2020) A robust medical image encryption in dual domain\u202f: chaos-DNA-IWT combined approach. Med Biol Eng Compu 58(7):1445\u20131458","DOI":"10.1007\/s11517-020-02178-w"},{"key":"2874_CR12","doi-asserted-by":"publisher","first-page":"10723","DOI":"10.1007\/s11042-020-09930-2","volume":"80","author":"RC Barik","year":"2021","unstructured":"Barik RC, Changder S (2021) A novel and efficient amino acid codon based medical image encryption scheme colligating multiple chaotic maps. Multimed Tools Appl 80:10723\u201310760","journal-title":"Multimed Tools Appl"},{"key":"2874_CR13","doi-asserted-by":"publisher","first-page":"36667","DOI":"10.1109\/ACCESS.2019.2906292","volume":"7","author":"A Belazi","year":"2019","unstructured":"Belazi A, Talha M, Kharbech S, Xiang W (2019) Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access 7:36667\u201336681. https:\/\/doi.org\/10.1109\/ACCESS.2019.2906292","journal-title":"IEEE Access"},{"key":"2874_CR14","doi-asserted-by":"publisher","first-page":"106026","DOI":"10.1016\/j.optlaseng.2020.106026","volume":"128","author":"M Chen","year":"2020","unstructured":"Chen M, Ma G, Tang C, Lei Z (2020) Generalized optical encryption framework based on shearlets for medical image. Opt Lasers Eng 128:106026. https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106026","journal-title":"Opt Lasers Eng"},{"issue":"20","key":"2874_CR15","first-page":"8834","volume":"28","author":"X Chen","year":"2017","unstructured":"Chen X, Hu C-J (2017) Medical image encryption based on multiple chaotic mapping and wavelet transform. Biomed Res 28(20):8834\u20138837","journal-title":"Biomed Res"},{"issue":"8","key":"2874_CR16","doi-asserted-by":"publisher","first-page":"1821","DOI":"10.1016\/j.sjbs.2017.11.023","volume":"24","author":"X Chen","year":"2017","unstructured":"Chen X, Hu C (2017) Adaptive medical image encryption algorithm based on multiple chaotic mapping. Saudi J Biol Sci 24(8):1821\u20131827. https:\/\/doi.org\/10.1016\/j.sjbs.2017.11.023","journal-title":"Saudi J Biol Sci"},{"issue":"1","key":"2874_CR17","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/s11277-019-06420-z","volume":"108","author":"JC Dagadu","year":"2019","unstructured":"Dagadu JC, Li J, Aboagye EO (2019) Medical image encryption based on hybrid chaotic DNA diffusion. Wireless Pers Commun 108(1):591\u2013612. https:\/\/doi.org\/10.1007\/s11277-019-06420-z","journal-title":"Wireless Pers Commun"},{"issue":"4","key":"2874_CR18","doi-asserted-by":"publisher","first-page":"1657001","DOI":"10.1142\/S0218001416570019","volume":"30","author":"Y Dai","year":"2016","unstructured":"Dai Y, Wang H, Wang Y (2016) Chaotic medical image encryption algorithm based on bit-plane decomposition. Int J Pattern Recognit Artif Intell 30(4):1657001. https:\/\/doi.org\/10.1142\/S0218001416570019","journal-title":"Int J Pattern Recognit Artif Intell"},{"issue":"s2","key":"2874_CR19","doi-asserted-by":"publisher","first-page":"S435","DOI":"10.3233\/THC-161166","volume":"24","author":"Y Dai","year":"2016","unstructured":"Dai Y, Wang H, Zhou Z, Jin Z (2016) Research on medical image encryption in telemedicine systems. Technol Health Care 24(s2):S435\u2013S442. https:\/\/doi.org\/10.3233\/THC-161166","journal-title":"Technol Health Care"},{"issue":"13","key":"2874_CR20","doi-asserted-by":"publisher","first-page":"19803","DOI":"10.1007\/s11042-020-10308-7","volume":"80","author":"S Deb","year":"2021","unstructured":"Deb S, Bhuyan B (2021) Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR. Multimed Tools Appl 80(13):19803\u201319826","journal-title":"Multimed Tools Appl"},{"key":"2874_CR21","doi-asserted-by":"publisher","first-page":"10979","DOI":"10.1007\/s00521-018-3801-x","volume":"32","author":"M Elhoseny","year":"2020","unstructured":"Elhoseny M, Shankar K, Lakshmanaprabu SK, Maseleno A, Arunkumar N (2020) Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Comput Appl 32:10979\u201310993. https:\/\/doi.org\/10.1007\/s00521-018-3801-x","journal-title":"Neural Comput Appl"},{"issue":"6","key":"2874_CR22","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8(6):1259\u20131284","journal-title":"Int J Bifurc Chaos"},{"issue":"8","key":"2874_CR23","doi-asserted-by":"publisher","first-page":"1000","DOI":"10.1016\/j.compbiomed.2013.05.005","volume":"43","author":"C Fu","year":"2013","unstructured":"Fu C, Meng W, Zhan Y, Zhu Z, Lau FC, Chi KT, Ma H (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43(8):1000\u20131010","journal-title":"Comput Biol Med"},{"issue":"3","key":"2874_CR24","doi-asserted-by":"publisher","first-page":"1083","DOI":"10.32604\/cmes.2020.013039","volume":"125","author":"J Ge","year":"2020","unstructured":"Ge J (2020) Alcencryption\u202f: A secure and efficient algorithm for medical. IEEE Sig Process Lett 125(3):1083\u20131100. https:\/\/doi.org\/10.32604\/cmes.2020.013039","journal-title":"IEEE Sig Process Lett"},{"key":"2874_CR25","doi-asserted-by":"publisher","first-page":"104031","DOI":"10.1016\/j.bspc.2022.104031","volume":"79","author":"V G\u00f6reke","year":"2023","unstructured":"G\u00f6reke V (2023) A novel method based on Wiener filter for denoising Poisson noise from medical X-Ray images. Biomed Sig Process Control 79:104031","journal-title":"Biomed Sig Process Control"},{"issue":"1\u20133","key":"2874_CR26","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/0167-2789(83)90126-4","volume":"7","author":"C Grebogi","year":"1983","unstructured":"Grebogi C, Ott E, Yorke JA (1983) Crises, sudden changes in chaotic attractors, and transient chaos. Physica D 7(1\u20133):181\u2013200","journal-title":"Physica D"},{"issue":"2","key":"2874_CR27","doi-asserted-by":"publisher","first-page":"63","DOI":"10.3970\/mcb.2018.00114","volume":"15","author":"R Gupta","year":"2018","unstructured":"Gupta R, Pachauri R, Singh AK (2018) An effective approach of secured medical image transmission using encryption method. Mol Cell Biomech 15(2):63. https:\/\/doi.org\/10.3970\/mcb.2018.00114","journal-title":"Mol Cell Biomech"},{"key":"2874_CR28","first-page":"1","volume":"2021","author":"A Hafsa","year":"2021","unstructured":"Hafsa A, Gafsi M, Malek J, Machhout M (2021) FPGA implementation of improved security approach for medical image encryption and decryption. Sci Program 2021:1\u201320","journal-title":"Sci Program"},{"key":"2874_CR29","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.sigpro.2017.10.004","volume":"144","author":"Z Hua","year":"2018","unstructured":"Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Sig Process 144:134\u2013144. https:\/\/doi.org\/10.1016\/j.sigpro.2017.10.004","journal-title":"Sig Process"},{"key":"2874_CR30","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.jare.2018.01.009","volume":"10","author":"SM Ismail","year":"2018","unstructured":"Ismail SM, Said LA, Radwan AG, Madian AH, Abu-elyazeed MF (2018) Generalized double-humped logistic map-based medical image encryption. J Adv Res 10:85\u201398. https:\/\/doi.org\/10.1016\/j.jare.2018.01.009","journal-title":"J Adv Res"},{"key":"2874_CR31","unstructured":"ISO 27799:2016(en) Health informatics \u2014 Information security management in health using ISO\/IEC 27002, 2016.\u00a0https:\/\/www.iso.org\/standard\/62777.html"},{"key":"2874_CR32","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1016\/j.patrec.2021.10.033","volume":"152","author":"K Jain","year":"2021","unstructured":"Jain K, Aji A, Krishnan P (2021) Medical image encryption scheme using multiple chaotic maps. Pattern Recogn Lett 152:356\u2013364. https:\/\/doi.org\/10.1016\/j.patrec.2021.10.033","journal-title":"Pattern Recogn Lett"},{"key":"2874_CR33","doi-asserted-by":"publisher","unstructured":"Jain M, Choudhary RC, Kumar A (2016) Secure medical image steganography with RSA cryptography using decision tree. In: 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), pp 291\u2013295. https:\/\/doi.org\/10.1109\/IC3I.2016.7917977","DOI":"10.1109\/IC3I.2016.7917977"},{"key":"2874_CR34","doi-asserted-by":"publisher","first-page":"102832","DOI":"10.1016\/j.jisa.2021.102832","volume":"59","author":"T Janani","year":"2021","unstructured":"Janani T, Brindha M (2021) A secure medical image transmission scheme aided by quantum representation. J Inf Secur Appl 59:102832. https:\/\/doi.org\/10.1016\/j.jisa.2021.102832","journal-title":"J Inf Secur Appl"},{"issue":"2","key":"2874_CR35","first-page":"1064","volume":"13","author":"G Jiao","year":"2019","unstructured":"Jiao G, Peng X, Duan K (2019) Image encryption with the cross diffusion of two chaotic maps. KSII Trans Internet Inf Syst (TIIS) 13(2):1064\u20131079","journal-title":"KSII Trans Internet Inf Syst (TIIS)"},{"issue":"5","key":"2874_CR36","doi-asserted-by":"publisher","first-page":"1436","DOI":"10.23940\/ijpe.19.05.p20.14361444","volume":"15","author":"G Jiao","year":"2019","unstructured":"Jiao G, Zhou S, Li L, Zou Y (2019) Hybrid chaotic encryption algorithm for securing dicom systems. Int J Performability Eng 15(5):1436\u20131444. https:\/\/doi.org\/10.23940\/ijpe.19.05.p20.14361444","journal-title":"Int J Performability Eng"},{"key":"2874_CR37","doi-asserted-by":"publisher","first-page":"37855","DOI":"10.1109\/ACCESS.2021.3063237","volume":"9","author":"ST Kamal","year":"2021","unstructured":"Kamal ST, Hosny KM, Member S, Elgindy TM, Darwish MM, Fouda MM (2021) A new image encryption algorithm for grey and color medical images. IEEE Access 9:37855\u201337865","journal-title":"IEEE Access"},{"issue":"1\u20133","key":"2874_CR38","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.cnsns.2014.12.005","volume":"24","author":"A Kanso","year":"2015","unstructured":"Kanso A, Ghebleh M (2015) An efficient and robust image encryption scheme for medical applications. Commun Nonlinear Sci Numer Simul 24(1\u20133):98\u2013116. https:\/\/doi.org\/10.1016\/j.cnsns.2014.12.005","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"35","key":"2874_CR39","doi-asserted-by":"publisher","first-page":"26369","DOI":"10.1007\/s11042-020-09264-z","volume":"79","author":"OA Khashan","year":"2020","unstructured":"Khashan OA, Alshaikh M (2020) Edge-based lightweight selective encryption scheme for digital medical images. Multimed Tools Appl 79(35):26369\u201326388","journal-title":"Multimed Tools Appl"},{"issue":"6S","key":"2874_CR40","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.35940\/ijeat.F1202.0886S19","volume":"8","author":"S Khond","year":"2019","unstructured":"Khond S, Vijayakumar B (2019) Secure medical image processing using chaos and DNA encryption enhanced using reversible data hiding. Int J Eng Adv Technol (IJEAT) 8(6S):1062\u20131067. https:\/\/doi.org\/10.35940\/ijeat.F1202.0886S19","journal-title":"Int J Eng Adv Technol (IJEAT)"},{"issue":"2","key":"2874_CR41","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.32604\/iasc.2022.024023","volume":"33","author":"KS Krishnan","year":"2022","unstructured":"Krishnan KS, Suhaila S, Raja SP (2022) A novel medical image encryption using R\u00f6ssler system. Intell Autom Soft Comput 33(2):1081\u20131101. https:\/\/doi.org\/10.32604\/iasc.2022.024023","journal-title":"Intell Autom Soft Comput"},{"issue":"48","key":"2874_CR42","first-page":"2381","volume":"9","author":"CV Kumar","year":"2015","unstructured":"Kumar CV, Natarajan V, Poonguzhali P (2015) Secured patient information transmission using reversible watermarking and DNA encrytion for medical images. Appl Math Sci 9(48):2381\u20132391","journal-title":"Appl Math Sci"},{"issue":"12","key":"2874_CR43","doi-asserted-by":"publisher","first-page":"18941","DOI":"10.1007\/s11042-020-10325-6","volume":"80","author":"M Kumar","year":"2021","unstructured":"Kumar M, Gupta P (2021) A new medical image encryption algorithm based on the 1D logistic map associated with pseudo-random numbers. Multimed Tools Appl 80(12):18941\u201318967","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"2874_CR44","doi-asserted-by":"publisher","first-page":"2517","DOI":"10.1007\/s11517-019-02037-3","volume":"57","author":"S Kumar","year":"2019","unstructured":"Kumar S, Panna B, Kumar R (2019) Medical image encryption using fractional discrete cosine transform with chaotic function. Med Biol Eng Compu 57(11):2517\u20132533","journal-title":"Med Biol Eng Compu"},{"key":"2874_CR45","first-page":"6624809","volume":"2021","author":"S Li","year":"2021","unstructured":"Li S, Zhao L, Yang N (2021) Medical image encryption based on 2d zigzag confusion and dynamic diffusion. Secur Commun Netw 2021:6624809","journal-title":"Secur Commun Netw"},{"key":"2874_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.image.2015.03.005","volume":"35","author":"JB Lima","year":"2015","unstructured":"Lima JB, Madeiro F, Sales FJR (2015) Encryption of medical images based on the cosine number transform. Sig Process\u202f: Image Commun 35:1\u20138. https:\/\/doi.org\/10.1016\/j.image.2015.03.005","journal-title":"Sig Process : Image Commun"},{"key":"2874_CR47","doi-asserted-by":"publisher","first-page":"118624","DOI":"10.1109\/ACCESS.2021.3107608","volume":"9","author":"C Lin","year":"2021","unstructured":"Lin C, Wu J, Chen P, Lai H, Li C, Kuo C, Pai N (2021) Intelligent symmetric cryptography with chaotic map and quantum based key generator for medical images infosecurity. IEEE Access 9:118624\u2013118639. https:\/\/doi.org\/10.1109\/ACCESS.2021.3107608","journal-title":"IEEE Access"},{"issue":"2","key":"2874_CR48","doi-asserted-by":"publisher","first-page":"889","DOI":"10.32604\/cmc.2019.06034","volume":"61","author":"J Liu","year":"2019","unstructured":"Liu J, Li J, Cheng J, Ma J, Sadiq N, Han B, Geng Q, Ai Y (2019) A novel robust watermarking algorithm for encrypted medical image based on DTCWT-DCT and chaotic map. Comput Mater Continua 61(2):889\u2013910. https:\/\/doi.org\/10.32604\/cmc.2019.06034","journal-title":"Comput Mater Continua"},{"issue":"S1","key":"2874_CR49","doi-asserted-by":"publisher","first-page":"185","DOI":"10.3233\/THC-218019","volume":"29","author":"S Liu","year":"2021","unstructured":"Liu S, Liu L, Pang M (2021) Encryption method and security analysis of medical images based on stream cipher enhanced logical mapping. Technol Health Care 29(S1):185\u2013193. https:\/\/doi.org\/10.3233\/THC-218019","journal-title":"Technol Health Care"},{"key":"2874_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/3570904","volume":"2021","author":"N Manikandan","year":"2021","unstructured":"Manikandan N, Muthaiah R, Teekaraman Y, Kuppusamy R, Radhakrishnan A (2021) A novel random error approximate adder-based lightweight medical image encryption scheme for secure remote monitoring of health data. Secur Commun Netw 2021:1\u201314","journal-title":"Secur Commun Netw"},{"issue":"15","key":"2874_CR51","doi-asserted-by":"publisher","first-page":"23511","DOI":"10.1007\/s11042-021-10943-8","volume":"80","author":"V Manikandan","year":"2021","unstructured":"Manikandan V, Amirtharajan R (2021) On dual encryption with RC6 and combined logistic tent map for grayscale and DICOM. Multimed Tools Appl 80(15):23511\u201323540","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"2874_CR52","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1007\/s11517-021-02499-4","volume":"60","author":"V Manikandan","year":"2022","unstructured":"Manikandan V, Amirtharajan R (2022) A simple embed over encryption scheme for DICOM images using B\u00fclban map. Med Biol Eng Compu 60(3):701\u2013717. https:\/\/doi.org\/10.1007\/s11517-021-02499-4","journal-title":"Med Biol Eng Compu"},{"key":"2874_CR53","doi-asserted-by":"publisher","unstructured":"Masood F, Driss M, Boulila W, Ahmad J, Rehman SU, Jan SU, Qayyum A, Buchanan WJ (2022) A lightweight chaos-based medical image encryption scheme using random shuffling and XOR operations. Wirel\u00a0Pers\u00a0Commun 127(2):1405\u20131432. https:\/\/doi.org\/10.1007\/s11277-021-08584-z","DOI":"10.1007\/s11277-021-08584-z"},{"issue":"3","key":"2874_CR54","doi-asserted-by":"publisher","first-page":"1731","DOI":"10.1007\/s12652-021-03410-7","volume":"14","author":"P Mishra","year":"2023","unstructured":"Mishra P, Bhaya C, Pal AK, Singh AK (2023) A medical image cryptosystem using bit-level diffusion with DNA coding. J Ambient Intell Humaniz Comput 14(3):1731\u20131752. https:\/\/doi.org\/10.1007\/s12652-021-03410-7","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"2874_CR55","doi-asserted-by":"publisher","first-page":"100396","DOI":"10.1016\/j.imu.2020.100396","volume":"20","author":"S Mortajez","year":"2020","unstructured":"Mortajez S, Tahmasbi M, Zarei J, Jamshidnezhad A (2020) A novel chaotic encryption scheme based on efficient secret keys and confusion technique for confidential of DICOM images. Inform Med Unlocked 20:100396. https:\/\/doi.org\/10.1016\/j.imu.2020.100396","journal-title":"Inform Med Unlocked"},{"issue":"2022","key":"2874_CR56","doi-asserted-by":"publisher","first-page":"168416","DOI":"10.1016\/j.ijleo.2021.168416","volume":"251","author":"JS Muthu","year":"2022","unstructured":"Muthu JS, Murali P (2022) A novel DICOM image encryption with JSMP map. Optik 251(2022):168416. https:\/\/doi.org\/10.1016\/j.ijleo.2021.168416","journal-title":"Optik"},{"key":"2874_CR57","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-1-4842-8105-5_8","volume-title":"Cryptography and Cryptanalysis in Java","author":"SL Nita","year":"2022","unstructured":"Nita SL, Mihailescu MI (2022) Hash functions. In: Cryptography and cryptanalysis in java. Apress, pp 101\u2013112. https:\/\/doi.org\/10.1007\/978-1-4842-8105-5_8"},{"issue":"3","key":"2874_CR58","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/S0010-4825(02)00094-X","volume":"33","author":"R Norcen","year":"2003","unstructured":"Norcen R, Podesser M, Pommer A, Schmidt H-P, Uhl A (2003) Confidential storage and transmission of medical image data. Comput Biol Med 33(3):277\u2013292. https:\/\/doi.org\/10.1016\/S0010-4825(02)00094-X","journal-title":"Comput Biol Med"},{"issue":"23","key":"2874_CR59","doi-asserted-by":"publisher","first-page":"31397","DOI":"10.1007\/s11042-018-6051-0","volume":"77","author":"M Noura","year":"2018","unstructured":"Noura M, Noura H, Chehab A, Mansour MM, Sleem L, Couturier R (2018) A dynamic approach for a lightweight and secure cipher for medical images. Multimed Tools Appl 77(23):31397\u201331426","journal-title":"Multimed Tools Appl"},{"key":"2874_CR60","doi-asserted-by":"crossref","unstructured":"Prabhavathi K, Sathisha C, Ravikumar K (2017) Region of interest based selective medical image encryption using multi chaotic system. In: 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), pp 1\u20135","DOI":"10.1109\/ICEECCOT.2017.8284614"},{"issue":"7","key":"2874_CR61","doi-asserted-by":"publisher","first-page":"8393","DOI":"10.1007\/s11042-017-4741-7","volume":"77","author":"P Praveenkumar","year":"2018","unstructured":"Praveenkumar P, Devi NK, Ravichandran D, Avila J, Thenmozhi K, Rayappan JBB, Amirtharajan R (2018) Transreceiving of encrypted medical image-a cognitive approach. Multimed Tools Appl 77(7):8393\u20138418. https:\/\/doi.org\/10.1007\/s11042-017-4741-7","journal-title":"Multimed Tools Appl"},{"key":"2874_CR62","unstructured":"PRC Cryptography Law art (2019) The 14th Meeting of the Standing Committee of the Thirteenth National People\u2019s.\u00a0http:\/\/www.npc.gov.cn\/englishnpc\/c23934\/202009\/dfb74a30d80b4a2bb5c19678b89a4a14.shtml"},{"issue":"3","key":"2874_CR63","first-page":"1248","volume":"20","author":"KR Qasim","year":"2020","unstructured":"Qasim KR, Qasim SS (2020) Encrypt medical image using Csalsa20 stream algorithm. Medico-Legal Update 20(3):1248\u20131256","journal-title":"Medico-Legal Update"},{"key":"2874_CR64","doi-asserted-by":"publisher","unstructured":"Rahmatullah B, Noble JA (2014) Anatomical object detection in fetal ultrasound: computer-expert agreements. In: Pham TD, Ichikawa K, Oyama-Higa M, Coomans D, Jiang X (eds) Biomedical informatics and technology. ACBIT 2013. Communications in computer and information science. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-54121-6_18","DOI":"10.1007\/978-3-642-54121-6_18"},{"issue":"04","key":"2874_CR65","doi-asserted-by":"publisher","first-page":"1850028","DOI":"10.1142\/S0219691318500285","volume":"16","author":"S Raja","year":"2018","unstructured":"Raja S (2018) Secured medical image compression using DES encryption technique in Bandelet multiscale transform. Int J Wavelets Multiresolut Inf Process 16(04):1850028. https:\/\/doi.org\/10.1142\/S0219691318500285","journal-title":"Int J Wavelets Multiresolut Inf Process"},{"issue":"05","key":"2874_CR66","doi-asserted-by":"publisher","first-page":"1950034","DOI":"10.1142\/S0219691319500346","volume":"17","author":"S Raja","year":"2019","unstructured":"Raja S (2019) Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique. Int J Wavelets Multiresolut Inf Process 17(05):1950034. https:\/\/doi.org\/10.1142\/S0219691319500346","journal-title":"Int J Wavelets Multiresolut Inf Process"},{"issue":"16","key":"2874_CR67","doi-asserted-by":"publisher","first-page":"24221","DOI":"10.1007\/s11042-021-10798-z","volume":"80","author":"S Rajendran","year":"2021","unstructured":"Rajendran S, Krithivasan K, Doraipandian M (2021) A novel cross cosine map based medical image cryptosystem using dynamic bit-level diffusion. Multimed Tools Appl 80(16):24221\u201324243","journal-title":"Multimed Tools Appl"},{"key":"2874_CR68","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.compbiomed.2016.03.020","volume":"72","author":"D Ravichandran","year":"2016","unstructured":"Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170\u2013184. https:\/\/doi.org\/10.1016\/j.compbiomed.2016.03.020","journal-title":"Comput Biol Med"},{"issue":"8","key":"2874_CR69","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1109\/TNB.2017.2780881","volume":"16","author":"D Ravichandran","year":"2017","unstructured":"Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) DNA chaos blend to secure medical privacy. IEEE Trans Nanobiosci 16(8):850\u2013858","journal-title":"IEEE Trans Nanobiosci"},{"issue":"5","key":"2874_CR70","doi-asserted-by":"publisher","first-page":"7795","DOI":"10.3233\/JIFS-201146","volume":"39","author":"O Reyad","year":"2020","unstructured":"Reyad O, Hamed K, Karar ME (2020) Hash-enhanced elliptic curve bit-string generator for medical image encryption. J Intell Fuzzy Syst 39(5):7795\u20137806. https:\/\/doi.org\/10.3233\/JIFS-201146","journal-title":"J Intell Fuzzy Syst"},{"issue":"10","key":"2874_CR71","doi-asserted-by":"publisher","first-page":"1215","DOI":"10.1016\/j.jksuci.2019.01.014","volume":"32","author":"N Sasikaladevi","year":"2019","unstructured":"Sasikaladevi N, Geetha K, Revathi A (2019) EMOTE \u2013 Multilayered encryption system for protecting medical images based on binary curve. J King Saud Univ - Comput Inf Sci 32(10):1215. https:\/\/doi.org\/10.1016\/j.jksuci.2019.01.014","journal-title":"J King Saud Univ - Comput Inf Sci"},{"key":"2874_CR72","doi-asserted-by":"publisher","first-page":"102465","DOI":"10.1016\/j.bspc.2021.102465","volume":"66","author":"CT Selvi","year":"2021","unstructured":"Selvi CT, Amudha J, Sudhakar R (2021) A modified salp swarm algorithm (SSA) combined with a chaotic coupled map lattices (CML) approach for the secured encryption and compression of medical images during data transmission. Biomed Sig Process Control 66:102465. https:\/\/doi.org\/10.1016\/j.bspc.2021.102465","journal-title":"Biomed Sig Process Control"},{"key":"2874_CR73","doi-asserted-by":"publisher","first-page":"59108","DOI":"10.1109\/ACCESS.2021.3071535","volume":"9","author":"A Shafique","year":"2021","unstructured":"Shafique A, Ahmed J, Rehman MUR, Hazzazi MM (2021) Noise-resistant image encryption scheme for medical images in the chaos and wavelet domain. IEEE Access 9:59108\u201359130. https:\/\/doi.org\/10.1109\/ACCESS.2021.3071535","journal-title":"IEEE Access"},{"key":"2874_CR74","doi-asserted-by":"publisher","first-page":"52858","DOI":"10.1109\/ACCESS.2019.2909554","volume":"7","author":"R Shahzadi","year":"2019","unstructured":"Shahzadi R, Anwar SM, Qamar F, Ali M, Rodrigues JJPC (2019) Chaos based enhanced RC5 algorithm for security and integrity of clinical images in remote health monitoring. IEEE Access 7:52858\u201352870. https:\/\/doi.org\/10.1109\/ACCESS.2019.2909554","journal-title":"IEEE Access"},{"key":"2874_CR75","doi-asserted-by":"publisher","first-page":"77145","DOI":"10.1109\/ACCESS.2018.2874026","volume":"6","author":"K Shankar","year":"2018","unstructured":"Shankar K, Elhoseny M, Dhiravida E, Lakshmanaprabu SK, Wu W (2018) An efficient optimal key based chaos function for medical image security. IEEE Access 6:77145\u201377154. https:\/\/doi.org\/10.1109\/ACCESS.2018.2874026","journal-title":"IEEE Access"},{"key":"2874_CR76","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.ijleo.2017.08.028","volume":"147","author":"LD Singh","year":"2017","unstructured":"Singh LD, Singh KM (2017) Medical image encryption based on improved ElGamal encryption technique. Optik - Int J Light Electron Opt 147:88\u2013102. https:\/\/doi.org\/10.1016\/j.ijleo.2017.08.028","journal-title":"Optik - Int J Light Electron Opt"},{"issue":"8","key":"2874_CR77","doi-asserted-by":"publisher","first-page":"9853","DOI":"10.1007\/s12652-021-03643-6","volume":"14","author":"W Song","year":"2021","unstructured":"Song W, Fu C, Zheng Y, Cao L, Tie M (2021) A practical medical image cryptosystem with parallel acceleration. J Ambient Intell Humaniz Comput 14(8):9853\u20139867. https:\/\/doi.org\/10.1007\/s12652-021-03643-6","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"8","key":"2874_CR78","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s10916-019-1389-z","volume":"43","author":"S Stalin","year":"2019","unstructured":"Stalin S, Maheshwary P, Shukla PK, Maheshwari M, Gour B, Khare A (2019) Fast and secure medical image encryption based on non linear 4D logistic map and DNA sequences (NL4DLM_DNA). J Med Syst 43(8):267","journal-title":"J Med Syst"},{"key":"2874_CR79","unstructured":"Summary of the HIPAA Security Rule (2021) Available: https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/laws-regulations\/index.html"},{"issue":"6","key":"2874_CR80","first-page":"843","volume":"8","author":"R Tamilselvi","year":"2015","unstructured":"Tamilselvi R, Ravindran G (2015) Comparison of encryption efficiency in DICOM images based on radon and block transform. Int J ChemTech Res 8(6):843\u2013846","journal-title":"Int J ChemTech Res"},{"key":"2874_CR81","doi-asserted-by":"crossref","unstructured":"Tanveer SR, Alam KR, Morimoto Y (2022) A multi-stage chaotic encryption technique for medical image. Information Security Journal: A Global Perspective 31(6):657\u2013675","DOI":"10.1080\/19393555.2021.1934197"},{"issue":"2","key":"2874_CR82","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J: Multidiscip J Sci Technol J Sel Areas Telecommun (JSAT) 1(2):31\u201338","journal-title":"Cyber J: Multidiscip J Sci Technol J Sel Areas Telecommun (JSAT)"},{"issue":"8","key":"2874_CR83","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1080\/09720529.2021.2011102","volume":"24","author":"A Yadav","year":"2021","unstructured":"Yadav A, Saini B, Verma VK, Pal V (2021) A joint medical image compression and encryption using AMBTC and hybrid chaotic system. J Discret Math Sci Crypt 24(8):2233\u20132244. https:\/\/doi.org\/10.1080\/09720529.2021.2011102","journal-title":"J Discret Math Sci Crypt"},{"key":"2874_CR84","doi-asserted-by":"publisher","first-page":"96900","DOI":"10.1109\/ACCESS.2019.2929298","volume":"7","author":"Y Yang","year":"2019","unstructured":"Yang Y, Xiao X, Cai X, Zhang W (2019) A secure and high visual-quality framework for medical images by contrast-enhancement reversible data hiding and homomorphic encryption. IEEE Access 7:96900\u201396911","journal-title":"IEEE Access"},{"issue":"1","key":"2874_CR85","first-page":"409","volume":"9","author":"C Ye","year":"2015","unstructured":"Ye C, Xiong Z, Ding Y, Zhang X, Wang G, Xu F (2015) Joint fingerprinting\/encryption for medical image security. Int J Secur Its Appl 9(1):409\u2013418","journal-title":"Int J Secur Its Appl"},{"issue":"10","key":"2874_CR86","first-page":"15735","volume":"82","author":"B Zhang","year":"2023","unstructured":"Zhang B, Rahmatullah B, Wang SL, Liu Z (2023) A plain-image correlative semi-selective medical image encryption algorithm using enhanced 2D-logistic map. Multimed\u00a0Tools Appl 82(10):15735\u201315762","journal-title":"Multimed\u00a0Tools Appl"},{"issue":"14","key":"2874_CR87","first-page":"21867","volume":"82","author":"B Zhang","year":"2023","unstructured":"Zhang B, Rahmatullah B, Wang SL, Zaidan A, Zaidan B, Liu P (2023) A review of research on medical image confidentiality related technology coherent taxonomy, motivations, open challenges and recommendations. Multimed\u00a0Tools Appl 82(14):21867\u201321906","journal-title":"Multimed\u00a0Tools Appl"},{"key":"2874_CR88","first-page":"913476","volume":"2015","author":"L Zhang","year":"2015","unstructured":"Zhang L, Zhu Z, Yang B, Liu W, Zhu H, Zou M (2015) Cryptanalysis and improvement of an efficient and secure medical image protection scheme. Math Probl Eng 2015:913476","journal-title":"Math Probl Eng"},{"key":"2874_CR89","first-page":"940638","volume":"2015","author":"L Zhang","year":"2015","unstructured":"Zhang L, Zhu Z, Yang B, Liu W, Zhu H, Zou M (2015) Medical image encryption and compression scheme using compressive sensing and pixel swapping based permutation approach. Math Probl Eng 2015:940638","journal-title":"Math Probl Eng"},{"key":"2874_CR90","doi-asserted-by":"publisher","first-page":"122210","DOI":"10.1109\/ACCESS.2020.3007550","volume":"8","author":"J Zhou","year":"2020","unstructured":"Zhou J, Li J, Di X (2020) A novel lossless medical image encryption scheme based on game theory with optimized ROI parameters and hidden ROI position. IEEE Access 8:122210\u2013122228. https:\/\/doi.org\/10.1109\/ACCESS.2020.3007550","journal-title":"IEEE Access"}],"container-title":["Medical &amp; Biological Engineering &amp; Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11517-023-02874-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11517-023-02874-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11517-023-02874-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,18]],"date-time":"2023-10-18T01:08:12Z","timestamp":1697591292000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11517-023-02874-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,5]]},"references-count":90,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["2874"],"URL":"https:\/\/doi.org\/10.1007\/s11517-023-02874-3","relation":{},"ISSN":["0140-0118","1741-0444"],"issn-type":[{"value":"0140-0118","type":"print"},{"value":"1741-0444","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,5]]},"assertion":[{"value":"25 November 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}