{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T06:48:38Z","timestamp":1767422918097},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T00:00:00Z","timestamp":1726790400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T00:00:00Z","timestamp":1726790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Princess Nourah bint Abdulrahman University, Saudi Arabia","award":["PNURSP2024R409"],"award-info":[{"award-number":["PNURSP2024R409"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s11554-024-01547-0","type":"journal-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T13:33:10Z","timestamp":1727184790000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Fast encryption of color medical videos for Internet of Medical Things"],"prefix":"10.1007","volume":"21","author":[{"given":"Eman Abdullah","family":"Aldakheel","sequence":"first","affiliation":[]},{"given":"Doaa Sami","family":"Khafaga","sequence":"additional","affiliation":[]},{"given":"Mohamed A.","family":"Zaki","sequence":"additional","affiliation":[]},{"given":"Nabil A.","family":"Lashin","sequence":"additional","affiliation":[]},{"given":"Hanaa M.","family":"Hamza","sequence":"additional","affiliation":[]},{"given":"Khalid M.","family":"Hosny","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,20]]},"reference":[{"key":"1547_CR1","doi-asserted-by":"publisher","first-page":"106750","DOI":"10.1109\/ACCESS.2022.3211657","volume":"10","author":"KM Hosny","year":"2022","unstructured":"Hosny, K.M., Zaki, M.A., Hamza, H.M., Fouda, M.M., Lashin, N.A.: Privacy protection in surveillance videos using block scrambling-based encryption and DCNN-based face detection. IEEE Access 10, 106750\u2013106769 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3211657","journal-title":"IEEE Access"},{"issue":"12","key":"1547_CR2","doi-asserted-by":"publisher","first-page":"17185","DOI":"10.1007\/s11042-022-12037-5","volume":"81","author":"KM Hosny","year":"2022","unstructured":"Hosny, K.M., Magdi, A., Lashin, N.A., El-Komy, O., Salah, A.: Robust color image watermarking using multi-core Raspberry pi cluster. Multimed. Tools Appl. 81(12), 17185\u201317204 (2022). https:\/\/doi.org\/10.1007\/s11042-022-12037-5","journal-title":"Multimed. Tools Appl."},{"issue":"4","key":"1547_CR3","doi-asserted-by":"publisher","first-page":"3851","DOI":"10.1007\/S11071-022-07993-4\/METRICS","volume":"111","author":"J Yu Sun","year":"2023","unstructured":"Yu Sun, J., Cai, H., Bo Gao, Z., Peng Wang, C., Zhang, H.: A novel non-equilibrium hyperchaotic system and application on color image steganography with FPGA implementation. Nonlinear Dyn. 111(4), 3851\u20133868 (2023). https:\/\/doi.org\/10.1007\/S11071-022-07993-4\/METRICS","journal-title":"Nonlinear Dyn."},{"key":"1547_CR4","doi-asserted-by":"publisher","first-page":"128548","DOI":"10.1109\/ACCESS.2020.3008644","volume":"8","author":"A Alarifi","year":"2020","unstructured":"Alarifi, A., Sankar, S., Altameem, T., Jithin, K.C., Amoon, M., El-Shafai, W.: A novel hybrid cryptosystem for secure streaming of high efficiency H.265 compressed videos in iot multimedia applications. IEEE Access 8, 128548\u2013128573 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3008644","journal-title":"IEEE Access"},{"issue":"33\u201334","key":"1547_CR5","doi-asserted-by":"publisher","first-page":"23995","DOI":"10.1007\/S11042-020-09200-1\/FIGURES\/12","volume":"79","author":"X Li","year":"2020","unstructured":"Li, X., Yu, H., Zhang, H., Jin, X., Sun, H., Liu, J.: Video encryption based on hyperchaotic system. Multimed. Tools Appl. 79(33\u201334), 23995\u201324011 (2020). https:\/\/doi.org\/10.1007\/S11042-020-09200-1\/FIGURES\/12","journal-title":"Multimed. Tools Appl."},{"issue":"11","key":"1547_CR6","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.3390\/E22111253","volume":"22","author":"I Yasser","year":"2020","unstructured":"Yasser, I., Mohamed, M.A., Samra, A.S., Khalifa, F.: A chaotic-based encryption\/decryption framework for secure multimedia communications. Entropy 22(11), 1253 (2020). https:\/\/doi.org\/10.3390\/E22111253","journal-title":"Entropy"},{"key":"1547_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-022-02711-y","author":"KM Hosny","year":"2022","unstructured":"Hosny, K.M., Zaki, M.A., Lashin, N.A., Hamza, H.M.: Fast colored video encryption using block scrambling and multi-key generation. Vis. Comput. (2022). https:\/\/doi.org\/10.1007\/s00371-022-02711-y. (accessed: Nov. 28, 2022. [Online])","journal-title":"Vis. Comput."},{"issue":"1","key":"1547_CR8","doi-asserted-by":"publisher","first-page":"177","DOI":"10.32604\/IASC.2022.019348","volume":"31","author":"OS Faragallah","year":"2022","unstructured":"Faragallah, O.S., Sallam, A.I., El-Sayed, H.S.: Visual protection using RC5 selective encryption in telemedicine. Intell. Autom. Soft Comput. 31(1), 177\u2013190 (2022). https:\/\/doi.org\/10.32604\/IASC.2022.019348","journal-title":"Intell. Autom. Soft Comput."},{"issue":"2","key":"1547_CR9","doi-asserted-by":"publisher","first-page":"2319","DOI":"10.1007\/s11042-020-09654-3","volume":"80","author":"N Dolati","year":"2021","unstructured":"Dolati, N., Beheshti, A., Azadegan, H.: A selective encryption for H.264\/AVC videos based on scrambling. Multimed. Tools Appl. 80(2), 2319\u20132338 (2021). https:\/\/doi.org\/10.1007\/s11042-020-09654-3","journal-title":"Multimed. Tools Appl."},{"issue":"2","key":"1547_CR10","doi-asserted-by":"publisher","first-page":"1215","DOI":"10.1007\/s12652-020-02832-z","volume":"13","author":"OS Faragallah","year":"2022","unstructured":"Faragallah, O.S., et al.: Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication. J. Ambient. Intell. Humaniz. Comput. 13(2), 1215\u20131239 (2022). https:\/\/doi.org\/10.1007\/s12652-020-02832-z","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"issue":"5","key":"1547_CR11","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1109\/TCSVT.2011.2129090","volume":"21","author":"Z Shahid","year":"2011","unstructured":"Shahid, Z., Chaumont, M., Puech, W.: Fast protection of H.264\/AVC by selective encryption of CAVLC and CABAC for i and P frames. IEEE Trans. Circuits Syst. Video Technol. 21(5), 565\u2013576 (2011). https:\/\/doi.org\/10.1109\/TCSVT.2011.2129090","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"12","key":"1547_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1140\/EPJP\/I2017-11819-7","volume":"132","author":"D Valli","year":"2017","unstructured":"Valli, D., Ganesan, K.: Chaos based video encryption using maps and Ikeda time delay system. Eur. Phys. J. Plus 132(12), 1\u201318 (2017). https:\/\/doi.org\/10.1140\/EPJP\/I2017-11819-7","journal-title":"Eur. Phys. J. Plus"},{"key":"1547_CR13","doi-asserted-by":"publisher","unstructured":"Ranjith Kumar, R., Ganeshkumar, D., Suresh, A., Manigandan, K.: A new one round video encryption scheme based on 1D chaotic maps. In: 2019 5th International Conference on Advanced Computing and Communication Systems ICACCS 2019, pp. 439\u2013444 (2019). https:\/\/doi.org\/10.1109\/ICACCS.2019.8728443","DOI":"10.1109\/ICACCS.2019.8728443"},{"key":"1547_CR14","doi-asserted-by":"publisher","first-page":"6564","DOI":"10.3390\/S23146564","volume":"23","author":"S Ahmed","year":"2023","unstructured":"Ahmed, S., Naga Srinivasu, P., Alhumam, A.: A software framework for intelligent security measures regarding sensor data in the context of ambient assisted technology. Sensors 23, 6564 (2023). https:\/\/doi.org\/10.3390\/S23146564","journal-title":"Sensors"},{"key":"1547_CR15","doi-asserted-by":"publisher","unstructured":"Song, X.H., Wang, H.Q., Venegas-Andraca, S.E., Abd El-Latif, A.A.: Quantum video encryption based on qubit-planes controlled-XOR operations and improved logistic map. Phys. A Stat. Mech. Appl. 537, 122660 (2020). https:\/\/doi.org\/10.1016\/J.PHYSA.2019.122660","DOI":"10.1016\/J.PHYSA.2019.122660"},{"key":"1547_CR16","first-page":"201","volume-title":"Chaos-Based Uncompressed Frame Level Video Encryption","author":"J Sethi","year":"2022","unstructured":"Sethi, J., Bhaumik, J., Chowdhury, A.S.: Chaos-Based Uncompressed Frame Level Video Encryption, pp. 201\u2013217. Springer, Singapore (2022)"},{"issue":"2","key":"1547_CR17","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1049\/IET-IPR.2018.5250","volume":"14","author":"H Elkamchouchi","year":"2020","unstructured":"Elkamchouchi, H., Salama, W.M., Abouelseoud, Y.: New video encryption schemes based on chaotic maps. IET Image Process. 14(2), 397\u2013406 (2020). https:\/\/doi.org\/10.1049\/IET-IPR.2018.5250","journal-title":"IET Image Process."},{"key":"1547_CR18","unstructured":"Kotel, S. et al.: FPGA-based real-time implementation of AES algorithm for video encryption. Recent Adv. Telecommun. Inform. Educ. Technol 27\u201336 (2014)"},{"key":"1547_CR19","doi-asserted-by":"publisher","unstructured":"Cheng, S., Wang, L., Ao, N., Han, Q.: A selective video encryption scheme based on coding characteristics. Symmetry 12(3), 332 (2020). https:\/\/doi.org\/10.3390\/SYM12030332","DOI":"10.3390\/SYM12030332"},{"issue":"2","key":"1547_CR20","doi-asserted-by":"publisher","first-page":"2275","DOI":"10.1007\/S11042-021-11668-4\/TABLES\/14","volume":"81","author":"A Hafsa","year":"2022","unstructured":"Hafsa, A., Fradi, M., Sghaier, A., Malek, J., Machhout, M.: Real-time video security system using chaos-improved advanced encryption standard (IAES). Multimed. Tools Appl. 81(2), 2275\u20132298 (2022). https:\/\/doi.org\/10.1007\/S11042-021-11668-4\/TABLES\/14","journal-title":"Multimed. Tools Appl."},{"key":"1547_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/J.CHAOS.2021.111318","volume":"152","author":"Z Man","year":"2021","unstructured":"Man, Z., Li, J., Di, X., Sheng, Y., Liu, Z.: Double image encryption algorithm based on neural network and chaos. Chaos Solitons Fract. 152, 111318 (2021). https:\/\/doi.org\/10.1016\/J.CHAOS.2021.111318","journal-title":"Chaos Solitons Fract."},{"key":"1547_CR22","doi-asserted-by":"publisher","unstructured":"Meng, X., Li, J., Di, X., Sheng, Y., Jiang, D.: An encryption algorithm for region of interest in medical DICOM based on one-dimensional e\u03bb-cos-cot map. Entropy (2022). https:\/\/doi.org\/10.3390\/E24070901","DOI":"10.3390\/E24070901"},{"issue":"3","key":"1547_CR23","doi-asserted-by":"publisher","first-page":"2815","DOI":"10.1007\/S11071-022-07942-1\/METRICS","volume":"111","author":"M Hu","year":"2023","unstructured":"Hu, M., Li, J., Di, X.: Quantum image encryption scheme based on 2D Sine2-Logistic chaotic map. Nonlinear Dyn. 111(3), 2815\u20132839 (2023). https:\/\/doi.org\/10.1007\/S11071-022-07942-1\/METRICS","journal-title":"Nonlinear Dyn."},{"key":"1547_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/J.COMPBIOMED.2022.105542","volume":"146","author":"Y Zhang","year":"2022","unstructured":"Zhang, Y., Xie, H., Sun, J., Zhang, H.: An efficient multi-level encryption scheme for stereoscopic medical images based on coupled chaotic system and Otsu threshold segmentation. Comput. Biol. Med. 146, 105542 (2022). https:\/\/doi.org\/10.1016\/J.COMPBIOMED.2022.105542","journal-title":"Comput. Biol. Med."},{"key":"1547_CR25","doi-asserted-by":"publisher","unstructured":"John, N., Surya, R., Ashwini, R., Sachin Kumar, S., Soman, K.P.: A low cost implementation of multi-label classification algorithm using mathematica on Raspberry Pi. Procedia Comput. Sci. 46, 306\u2013313 (2015). https:\/\/doi.org\/10.1016\/J.PROCS.2015.02.025","DOI":"10.1016\/J.PROCS.2015.02.025"},{"key":"1547_CR26","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011) [Online]. http:\/\/jmlr.csail.mit.edu\/papers\/v12\/pedregosa11a.html%5Cn. http:\/\/arxiv.org\/abs\/1201.0490. Accessed 10 Sept 2022"},{"issue":"1","key":"1547_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41597-021-00920-z","volume":"8","author":"PH Smedsrud","year":"2021","unstructured":"Smedsrud, P.H., et al.: Kvasir-Capsule, a video capsule endoscopy dataset. Sci. Data 8(1), 1\u201310 (2021). https:\/\/doi.org\/10.1038\/s41597-021-00920-z","journal-title":"Sci. Data"},{"key":"1547_CR28","unstructured":"Test sequences. https:\/\/pi4.informatik.uni-mannheim.de\/~kiess\/test_sequences\/download\/. Accessed 10 Sept 2022"}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-024-01547-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11554-024-01547-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-024-01547-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T15:24:32Z","timestamp":1729005872000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11554-024-01547-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,20]]},"references-count":28,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["1547"],"URL":"https:\/\/doi.org\/10.1007\/s11554-024-01547-0","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"type":"print","value":"1861-8200"},{"type":"electronic","value":"1861-8219"}],"subject":[],"published":{"date-parts":[[2024,9,20]]},"assertion":[{"value":"12 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest to report regarding the present study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"175"}}