{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T09:37:48Z","timestamp":1774949868060,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,10,2]],"date-time":"2022-10-02T00:00:00Z","timestamp":1664668800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,10,2]],"date-time":"2022-10-02T00:00:00Z","timestamp":1664668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502154"],"award-info":[{"award-number":["61502154"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003819","name":"Natural Science Foundation of Hubei Province","doi-asserted-by":"publisher","award":["2015CFB236"],"award-info":[{"award-number":["2015CFB236"]}],"id":[{"id":"10.13039\/501100003819","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The smart healthcare system (SHCS) facilitates the healthcare process with the widespread use of medical data through the internet of medical things (IoMT). Widespread use of medical data, especially medical images can also lead to privacy issues. Traditional encryption algorithms can address some problems; however, they cannot deter the redistribution of decrypted content. To prevent the decrypted content from being used illegally, the paper proposes a combination scheme of encryption and fingerprinting based on the game of life (GOL) and singular value decomposition (SVD) with the purpose of protecting medical images. First, medical images are performed with discrete wavelet transform (DWT). Second, the highest coefficients bit planes of the approximation component are selected to confuse with GOL. Third, the other bit planes and other detail components are chosen to embed fingerprints. Finally, all subbands are diffused with SVD computing. The proposed privacy protection scheme, as far as we know, is the first privacy protection scheme for the SHCS using GOL and SVD based on a chaotic cellular neural network (CNN). The proposed scheme can provide double-level privacy protection for the SHCS. The experimental results and discussion verify it is effective for the privacy protection of the SHCS.<\/jats:p>","DOI":"10.1007\/s40747-022-00881-9","type":"journal-article","created":{"date-parts":[[2022,10,2]],"date-time":"2022-10-02T13:02:26Z","timestamp":1664715746000},"page":"1653-1670","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Secure medical image sharing for smart healthcare system based on cellular neural network"],"prefix":"10.1007","volume":"9","author":[{"given":"Conghuan","family":"Ye","sequence":"first","affiliation":[]},{"given":"Cong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,2]]},"reference":[{"key":"881_CR1","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.future.2020.04.034","volume":"111","author":"PH Mohan","year":"2020","unstructured":"Mohan PH (2020) Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography. Future Generation Comput Syst 111:213\u2013225","journal-title":"Future Generation Comput Syst"},{"key":"881_CR2","doi-asserted-by":"crossref","unstructured":"Mohamed E, Shankar K, Lakshmanaprabu SK, Andino M, Arunkumar N, (AUG, (2020) Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Comput Appl 32(15):10979\u201310993","DOI":"10.1007\/s00521-018-3801-x"},{"key":"881_CR3","doi-asserted-by":"crossref","unstructured":"Yang Y, Xianghan Z, Wenzhong G, Ximeng L, Victor C, (APR, (2019) Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system. Inform Sci 479:567\u2013592","DOI":"10.1016\/j.ins.2018.02.005"},{"key":"881_CR4","unstructured":"Randhir K, Rakesh T (2021) Towards design and implementation of security and privacy framework for Internet of Medical Things (IoMT) by leveraging blockchain and IPFS technology. J Supercomput"},{"key":"881_CR5","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.comcom.2020.02.018","volume":"153","author":"J Hathaliya Jigna","year":"2020","unstructured":"Hathaliya Jigna J, Sudeep T (2020) An exhaustive survey on security and privacy issues in Healthcare 4.0. Comput Commun 153:311\u2013335","journal-title":"Comput Commun"},{"key":"881_CR6","doi-asserted-by":"crossref","unstructured":"Wei J, Chen X, Huang X, Hu X, Susilo W (2019) Rs-habe: Revocable-storage and hierarchical attribute-based access scheme for secure sharing of e-health records in public cloud. IEEE Trans Dependable Secure Comput, pages 1\u20131","DOI":"10.1109\/TDSC.2019.2947920"},{"issue":"1","key":"881_CR7","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1109\/TIP.2018.2868388","volume":"28","author":"M Dzwonkowski","year":"2019","unstructured":"Dzwonkowski M, Rykaczewski R (2019) Secure quaternion feistel cipher for dicom images. IEEE Trans Image Process 28(1):371\u2013380","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"881_CR8","first-page":"810","volume":"33","author":"Satendra Pal Singh and Gaurav Bhatnagar","year":"2021","unstructured":"Satendra Pal Singh and Gaurav Bhatnagar (2021) A novel biometric inspired robust security framework for medical images. IEEE Trans Knowl Data Eng 33(3):810\u2013823","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"881_CR9","unstructured":"Balasamy K, Suganyadevi S (2020) A fuzzy based ROI selection for encryption and watermarking in medical image using DWT and SVD. Multimedia Tools Appl"},{"key":"881_CR10","unstructured":"Rohit T, Ashish K (2020) Multi-level security of medical images based on encryption and watermarking for telemedicine applications. Multimedia Tools Appl"},{"key":"881_CR11","unstructured":"Dong X, Zhang W, Shah M, Wang B, Yu N (2020) Watermarking-based secure plaintext image protocols for storage, show, deletion and retrieval in the cloud. IEEE Trans Services Comput, pages 1\u20131"},{"key":"881_CR12","doi-asserted-by":"crossref","unstructured":"Thakur S, Singh AK, Ghrera SP (JAN 25 2021) NSCT domain-based secure multiple-watermarking technique through lightweight encryption for medical images. Concurrency Comput Practice Exp, 33(2, SI)","DOI":"10.1002\/cpe.5108"},{"issue":"3","key":"881_CR13","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MMUL.2020.2985973","volume":"27","author":"A Anand","year":"2020","unstructured":"Anand A, Singh AK (2020) Joint watermarking-encryption-ecc for patient record security in wavelet domain. IEEE MultiMedia 27(3):66\u201375","journal-title":"IEEE MultiMedia"},{"issue":"4","key":"881_CR14","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/MMUL.2020.2993269","volume":"27","author":"A Anand","year":"2020","unstructured":"Anand A, Singh AK, Lv Z, Bhatnagar G (2020) Compression-then-encryption-based secure watermarking technique for smart healthcare system. IEEE MultiMedia 27(4):133\u2013143","journal-title":"IEEE MultiMedia"},{"key":"881_CR15","doi-asserted-by":"publisher","first-page":"2556","DOI":"10.1109\/TIFS.2020.2972159","volume":"15","author":"S Haddad","year":"2020","unstructured":"Haddad S, Coatrieux G, Moreau-Gaudry A, Cozic M (2020) Joint watermarking-encryption-jpeg-ls for medical image reliability control in encrypted and compressed domains. IEEE Trans Inform Forensics Secur 15:2556\u20132569","journal-title":"IEEE Trans Inform Forensics Secur"},{"issue":"6","key":"881_CR16","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1109\/JPROC.2004.827356","volume":"92","author":"D Kundur","year":"2004","unstructured":"Kundur D, Karthik K (2004) Video fingerprinting and encryption principles for digital rights management. Proc IEEE 92(6):918\u2013932","journal-title":"Proc IEEE"},{"key":"881_CR17","doi-asserted-by":"crossref","unstructured":"Conghuan Y, Hefei L, Zenggang X, Fuhao Z, Cong L, Fang X (2016) Secure Social Multimedia Big Data Sharing Using Scalable JFE in the TSHWT Domain. ACM Trans Multimedia Comput Commun Appl, 12(4, S)","DOI":"10.1145\/2978571"},{"issue":"1","key":"881_CR18","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/6046.985560","volume":"4","author":"Ruizhen Liu","year":"2002","unstructured":"Liu Ruizhen, Tan Tieniu (2002) An svd-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimedia 4(1):121\u2013128","journal-title":"IEEE Trans Multimedia"},{"key":"881_CR19","doi-asserted-by":"crossref","unstructured":"Liu RZ, Tan TN, (MAR, (2002) An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimedia 4(1):121\u2013128","DOI":"10.1109\/6046.985560"},{"issue":"1","key":"881_CR20","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.diin.2005.01.004","volume":"2","author":"Eric Thompson","year":"2005","unstructured":"Thompson Eric (2005) Md5 collisions and the impact on computer forensics. Digital Investigation 2(1):36\u201340","journal-title":"Digital Investigation"},{"issue":"2","key":"881_CR21","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.istr.2006.03.007","volume":"11","author":"Carlos Cid","year":"2006","unstructured":"Cid Carlos (2006) Recent developments in cryptographic hash functions: security implications and future directions. Inform Secur Tech Rep 11(2):100\u2013107","journal-title":"Inform Secur Tech Rep"},{"key":"881_CR22","doi-asserted-by":"crossref","unstructured":"Wang Xiaoyun, Yu Hongbo (2005) How to break md5 and other hash functions. In Ronald Cramer, editor, Advances in Cryptology \u2013 EUROCRYPT 2005, pages 19\u201335, Berlin, Heidelberg. Springer Berlin Heidelberg","DOI":"10.1007\/11426639_2"},{"key":"881_CR23","doi-asserted-by":"crossref","unstructured":"Jungk Bernhard, Stoettinger Marc (2016) Serialized lightweight sha-3 fpga implementations. Microprocessors and Microsystems, 71, NOV 2019. International Conference on Reconfigurable Computing and FPGAs (ReConFig), Cancun, MEXICO, NOV 30-DEC 02","DOI":"10.1016\/j.micpro.2019.102857"},{"key":"881_CR24","unstructured":"Smah A (2022) Forensic hash value guidelines: Why md5 and sha1 should no longer be used and a recommendation for their replacement. 03"},{"key":"881_CR25","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.sigpro.2018.06.008","volume":"153","author":"Wu Jiahui","year":"2018","unstructured":"Jiahui Wu, Liao Xiaofeng, Yang Bo (2018) Image encryption using 2d h\u00e9non-sine map and dna approach. Signal Process 153:11\u201323","journal-title":"Signal Process"},{"key":"881_CR26","doi-asserted-by":"crossref","unstructured":"Wang Xingyuan Xu B, Huaguang Z (2010) A multi-ary number communication system based on hyperchaotic system of 6th-order cellular neural network. Communications in Nonlinear Science and Numerical Simulation 15(1):124\u2013133","DOI":"10.1016\/j.cnsns.2009.03.035"},{"key":"881_CR27","unstructured":"Wolfram S (2002) A new kind of science"},{"issue":"17","key":"881_CR28","doi-asserted-by":"publisher","first-page":"14113","DOI":"10.1007\/s00521-020-04808-8","volume":"32","author":"G Zhihua","year":"2020","unstructured":"Zhihua G, Xiuli C, Jitong Z, Yushu Z, Yiran C (2020) An effective image compression-encryption scheme based on compressive sensing (CS) and game of life (GOL). Neural Comput Appl 32(17):14113\u201314141","journal-title":"Neural Comput Appl"},{"issue":"17","key":"881_CR29","doi-asserted-by":"publisher","first-page":"26021","DOI":"10.1007\/s11042-021-10801-7","volume":"80","author":"A-H Ali","year":"2021","unstructured":"Ali A-H, Heba A-N (2021) An efficient watermarking algorithm for medical images. Multimedia Tools Appl 80(17):26021\u201326047","journal-title":"Multimedia Tools Appl"},{"issue":"5","key":"881_CR30","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1109\/TITB.2012.2207730","volume":"16","author":"D Bouslimi","year":"2012","unstructured":"Bouslimi D, Coatrieux G, Cozic M, Roux C (2012) A joint encryption\/watermarking system for verifying the reliability of medical images. IEEE Trans Inform Technol Biomed 16(5):891\u2013899","journal-title":"IEEE Trans Inform Technol Biomed"},{"issue":"6","key":"881_CR31","doi-asserted-by":"publisher","first-page":"1585","DOI":"10.1007\/s11517-022-02565-5","volume":"60","author":"K Omer","year":"2022","unstructured":"Omer K (2022) Secure medical image encryption with walsh-hadamard transform and lightweight cryptography algorithm. Med Biol Eng Comput 60(6):1585\u20131594","journal-title":"Med Biol Eng Comput"},{"key":"881_CR32","doi-asserted-by":"crossref","unstructured":"Anand A, Amit\u00a0Kumar S (2022) Dual watermarking for security of covid-19 patient record. IEEE Trans Dependable Secure Comput, pages 1\u20131","DOI":"10.1109\/TDSC.2022.3144657"},{"key":"881_CR33","doi-asserted-by":"crossref","unstructured":"Thakur Sriti, Singh Amit\u00a0Kumar, Ghrera Satya\u00a0Prakash, Elhoseny Mohamed (FEB 2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimedia Tools Appl, 78(3):3457\u20133470,","DOI":"10.1007\/s11042-018-6263-3"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00881-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-022-00881-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00881-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T09:30:04Z","timestamp":1681810204000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-022-00881-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,2]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["881"],"URL":"https:\/\/doi.org\/10.1007\/s40747-022-00881-9","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,2]]},"assertion":[{"value":"9 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 October 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}