{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T07:00:44Z","timestamp":1776150044512,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,1,27]],"date-time":"2024-01-27T00:00:00Z","timestamp":1706313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,27]],"date-time":"2024-01-27T00:00:00Z","timestamp":1706313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-023-02539-w","type":"journal-article","created":{"date-parts":[[2024,1,27]],"date-time":"2024-01-27T10:02:23Z","timestamp":1706349743000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["CloudSec: A Lightweight and Agile Approach to Secure Medical Image Transmission in the Cloud Computing Environment"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-1016-2778","authenticated-orcid":false,"given":"Avijit","family":"Mondal","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5532-725X","authenticated-orcid":false,"given":"Pinaki Sankar","family":"Chatterjee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,27]]},"reference":[{"key":"2539_CR1","unstructured":"HIPAA Journal. Healthcare data breach statistics. https:\/\/www.hipaajournal.com\/healthcare-data-breach-statistics\/ (2021). Accessed 20 Mar 2022."},{"key":"2539_CR2","doi-asserted-by":"publisher","unstructured":"Mondal A, Chatterjee PS. 2022 OITS International Conference on Information Technology (OCIT). 2022. p. 451\u20136. https:\/\/doi.org\/10.1109\/ocit56763.2022.00090.","DOI":"10.1109\/ocit56763.2022.00090"},{"issue":"05","key":"2539_CR3","doi-asserted-by":"publisher","first-page":"1750069","DOI":"10.1142\/S0129183117500693","volume":"28","author":"X Chai","year":"2017","unstructured":"Chai X, Gan Z, Lu Y, Chen Y, Han D. A novel image encryption algorithm based on the chaotic system and DNA computing. Int J Mod Phys C. 2017;28(05):1750069.","journal-title":"Int J Mod Phys C"},{"issue":"3","key":"2539_CR4","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1007\/s11071-015-2561-1","volume":"83","author":"R Guesmi","year":"2016","unstructured":"Guesmi R, Farah M, Kachouri A, Samet M. A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dynam. 2016;83(3):1123\u201336. https:\/\/doi.org\/10.1007\/s11071-015-2561-1.","journal-title":"Nonlinear Dynam"},{"issue":"1","key":"2539_CR5","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s11071-016-3144-2","volume":"87","author":"T Hu","year":"2017","unstructured":"Hu T, Liu Y, Gong LH, Ouyang CJ. An image encryption scheme combining chaos with cycle operation for DNA sequences. Nonlinear Dynam. 2017;87(1):51\u201366. https:\/\/doi.org\/10.1007\/s11071-016-3144-2.","journal-title":"Nonlinear Dynam"},{"issue":"1","key":"2539_CR6","doi-asserted-by":"publisher","first-page":"110","DOI":"10.6633\/ijns-201801019","volume":"20","author":"X Li","year":"2018","unstructured":"Li X, Zhou C, Xu N. A secure and efficient image encryption algorithm based on DNA coding and spatiotemporal chaos. Int J Netw Secur. 2018;20(1):110\u201320. https:\/\/doi.org\/10.6633\/ijns-201801019.","journal-title":"Int J Netw Secur"},{"key":"2539_CR7","doi-asserted-by":"crossref","unstructured":"Cui G, Liu Y, Zhang X, Zhou Z. International conference on bio-inspired computing: theories and applications. Berlin: Springer; 2017. p. 286\u2013303.","DOI":"10.1007\/978-981-10-7179-9_22"},{"issue":"01","key":"2539_CR8","doi-asserted-by":"crossref","first-page":"1850002","DOI":"10.1142\/S0218126618500020","volume":"27","author":"HM Zhou","year":"2018","unstructured":"Zhou HM. Noise reduction multi-carrier differential chaos shift keying system. J Circuit Syst Comp. 2018;27(01):1850002.","journal-title":"J Circuit Syst Comp"},{"key":"2539_CR9","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","volume":"90","author":"AY Niyat","year":"2017","unstructured":"Niyat AY, Moattar MH, Torshiz MN. Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng. 2017;90:225\u201337.","journal-title":"Opt Lasers Eng"},{"issue":"8","key":"2539_CR10","doi-asserted-by":"publisher","first-page":"1663","DOI":"10.1140\/epjst\/e2014-02119-9","volume":"223","author":"H Panduranga","year":"2014","unstructured":"Panduranga H, Kumar S. Image encryption based on permutation-substitution using chaotic map and Latin square image cipher. Eur Phys J Spec Top. 2014;223(8):1663\u201377.","journal-title":"Eur Phys J Spec Top"},{"key":"2539_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102832","author":"T Janani","year":"2021","unstructured":"Janani T, Brindha M. A secure medical image transmission scheme aided by quantum representation. J Inf Secur Appl. 2021. https:\/\/doi.org\/10.1016\/j.jisa.2021.102832.","journal-title":"J Inf Secur Appl"},{"issue":"5187","key":"2539_CR12","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1126\/science.7973651","volume":"266","author":"LM Adleman","year":"1994","unstructured":"Adleman LM. Molecular computation of solutions to combinatorial problems. Science. 1994;266(5187):1021\u20134.","journal-title":"Science"},{"issue":"5","key":"2539_CR13","doi-asserted-by":"publisher","first-page":"6229","DOI":"10.1007\/s11042-016-3311-8","volume":"76","author":"X Wang","year":"2017","unstructured":"Wang X, Liu C. A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed Tools Appl. 2017;76(5):6229\u201345.","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"2539_CR14","doi-asserted-by":"publisher","first-page":"1269","DOI":"10.1007\/s11071-015-2234-7","volume":"82","author":"XY Wang","year":"2015","unstructured":"Wang XY, Zhang YQ, Zhao YY. A novel image encryption scheme based on 2-d logistic map and DNA sequence operations. Nonlinear Dyn. 2015;82(3):1269\u201380.","journal-title":"Nonlinear Dyn"},{"key":"2539_CR15","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"XY Wang","year":"2015","unstructured":"Wang XY, Zhang YQ, Bao XM. A novel chaotic image encryption scheme using DNA sequence operations. Optics Lasers Eng. 2015;73:53\u201361.","journal-title":"Optics Lasers Eng"},{"key":"2539_CR16","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/917147","author":"J Zhang","year":"2014","unstructured":"Zhang J, Fang D, Ren H. Image encryption algorithm based on DNA encoding and chaotic maps. Math Prob Eng. 2014. https:\/\/doi.org\/10.1155\/2014\/917147.","journal-title":"Math Prob Eng"},{"issue":"11\u201312","key":"2539_CR17","doi-asserted-by":"publisher","first-page":"2028","DOI":"10.1016\/j.mcm.2010.06.005","volume":"52","author":"Q Zhang","year":"2010","unstructured":"Zhang Q, Guo L, Wei X. Image encryption using DNA addition combined with chaotic maps. Math Comput Model. 2010;52(11\u201312):2028\u201335.","journal-title":"Math Comput Model"},{"issue":"49","key":"2539_CR18","doi-asserted-by":"publisher","first-page":"32235","DOI":"10.1039\/C7CP06601E","volume":"19","author":"MA Budroni","year":"2017","unstructured":"Budroni MA, Calabrese I, Miele Y. Control of chemical chaos through medium viscosity in a batch ferroin-catalyzed Belousov\u2013Zhabotinsky reaction. Phys Chem Chem Phys. 2017;19(49):32235\u201341.","journal-title":"Phys Chem Chem Phys"},{"issue":"1","key":"2539_CR19","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/0161-118991863745","volume":"13","author":"R Matthews","year":"1989","unstructured":"Matthews R. On the derivation of a chaotic encryption algorithm. Cryptologia. 1989;13(1):29\u201342.","journal-title":"Cryptologia"},{"issue":"06","key":"2539_CR20","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos. 1998;8(06):1259\u201384.","journal-title":"Int J Bifurcation Chaos"},{"key":"2539_CR21","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"YC Zhou","year":"2014","unstructured":"Zhou YC, Bao L, Chen CLP. A new 1d chaotic system for image encryption. Signal Process. 2014;97:172\u201382.","journal-title":"Signal Process"},{"issue":"1","key":"2539_CR22","first-page":"129","volume":"10","author":"SL Sun","year":"2018","unstructured":"Sun SL. A novel hyperchaotic image encryption scheme based on DNA encoding, pixel-level scrambling and bit-level scrambling. IEEE Photonics J. 2018;10(1):129\u201337.","journal-title":"IEEE Photonics J"},{"key":"2539_CR23","unstructured":"Abdel-Nabi H, Al-Haj A. 2017 8th International Conference on Information Technology (ICIT) (Amman, Jordan, 2017). p. 802\u20137."},{"issue":"2","key":"2539_CR24","first-page":"29","volume":"10","author":"KK Jena","year":"2019","unstructured":"Jena KK, Mishra S, Mishra S, Bhoi SK. An edge based steganographic approach using a two level security scheme for digital image processing and analysis. Int J Emerg Technol. 2019;10(2):29\u201338.","journal-title":"Int J Emerg Technol"},{"issue":"5","key":"2539_CR25","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu H, Wang X. Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput. 2012;12(5):1457\u201366.","journal-title":"Appl Soft Comput"},{"issue":"24","key":"2539_CR26","doi-asserted-by":"publisher","first-page":"7166","DOI":"10.1016\/j.ijleo.2014.08.069","volume":"125","author":"T Xie","year":"2014","unstructured":"Xie T, Liu Y, Tang J. Breaking a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik-Int J Light Elect Optics. 2014;125(24):7166\u20139. https:\/\/doi.org\/10.1016\/j.ijleo.2014.08.069.","journal-title":"Optik-Int J Light Elect Optics"},{"issue":"10","key":"2539_CR27","doi-asserted-by":"publisher","first-page":"6954","DOI":"10.3390\/e17106954","volume":"17","author":"C Song","year":"2015","unstructured":"Song C, Qiao Y. A novel image encryption algorithm based on DNA encoding and spatiotemporal chaos. Entropy. 2015;17(10):6954\u201368. https:\/\/doi.org\/10.3390\/e17106954.","journal-title":"Entropy"},{"issue":"3","key":"2539_CR28","doi-asserted-by":"publisher","first-page":"246","DOI":"10.3390\/e21030246","volume":"21","author":"H Wen","year":"2019","unstructured":"Wen H, Yu S, L\u00fc J. Breaking an image encryption algorithm based on DNA encoding and spatiotemporal chaos. Entropy. 2019;21(3):246. https:\/\/doi.org\/10.3390\/e21030246.","journal-title":"Entropy"},{"issue":"4","key":"2539_CR29","doi-asserted-by":"publisher","first-page":"2607","DOI":"10.1007\/s11277-023-10248-z","volume":"129","author":"A Kakkar","year":"2023","unstructured":"Kakkar A, Singh M. Performance analysis of a lightweight robust chaotic image re-encryption scheme for 5g heterogeneous networks. Wireless Pers Commun. 2023;129(4):2607\u201331. https:\/\/doi.org\/10.1007\/s11277-023-10248-z.","journal-title":"Wireless Pers Commun"},{"key":"2539_CR30","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/978\/1\/012116","volume":"978","author":"D Rachmawati","year":"2018","unstructured":"Rachmawati D, Tarigan J, Ginting A. A comparative study of message digest 5(MD5) and SHA256 algorithm. J Phys Conf Ser. 2018;978: 012116. https:\/\/doi.org\/10.1088\/1742-6596\/978\/1\/012116.","journal-title":"J Phys Conf Ser"},{"issue":"10","key":"2539_CR31","doi-asserted-by":"publisher","first-page":"1439","DOI":"10.3844\/jcssp.2020.1439.1450","volume":"16","author":"T Velmurugan","year":"2020","unstructured":"Velmurugan T, Karthiga S. Security based approach of SHA 384 and SHA 512 algorithms in cloud environment. J Comput Sci. 2020;16(10):1439\u201350. https:\/\/doi.org\/10.3844\/jcssp.2020.1439.1450.","journal-title":"J Comput Sci"},{"key":"2539_CR32","unstructured":"Wolfram Research. Mathematica (version 12.3) (2021). https:\/\/www.wolfram.com\/mathematica\/. Computer software."},{"issue":"15","key":"2539_CR33","doi-asserted-by":"publisher","first-page":"22023","DOI":"10.1007\/s11042-019-7453-3","volume":"78","author":"Y Luo","year":"2019","unstructured":"Luo Y, Yu J, Lai W, Liu L. A novel chaotic image encryption algorithm based on improved Baker map and logistic map. Multimed Tools Appl. 2019;78(15):22023\u201343. https:\/\/doi.org\/10.1007\/s11042-019-7453-3.","journal-title":"Multimed Tools Appl"},{"key":"2539_CR34","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/j.compeleceng.2016.02.015","volume":"54","author":"E Yavuz","year":"2016","unstructured":"Yavuz E, Yaz\u0131c\u0131 R, Kasapbas\u0131 MC, Yama\u00e7 E. A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng. 2016;54:471\u201383. https:\/\/doi.org\/10.1016\/j.compeleceng.2016.02.015.","journal-title":"Comput Electr Eng"},{"issue":"33\u201334","key":"2539_CR35","doi-asserted-by":"publisher","first-page":"24993","DOI":"10.1007\/s11042-020-09111-1","volume":"79","author":"EZ Zefreh","year":"2020","unstructured":"Zefreh EZ. An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimed Tools Appl. 2020;79(33\u201334):24993\u20135022. https:\/\/doi.org\/10.1007\/s11042-020-09111-1.","journal-title":"Multimed Tools Appl"},{"key":"2539_CR36","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C Shannon","year":"1949","unstructured":"Shannon C. Communication theory of secrecy systems. Bell Labs Tech J. 1949;28:656\u2013715.","journal-title":"Bell Labs Tech J"},{"issue":"11","key":"2539_CR37","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0260014","volume":"16","author":"Z Liang","year":"2021","unstructured":"Liang Z, Qin Q, Zhou C, Wang N, Xu Y, Zhou W. Medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation. PloS ONE. 2021;16(11): e0260014. https:\/\/doi.org\/10.1371\/journal.pone.0260014.","journal-title":"PloS ONE"},{"issue":"2","key":"2539_CR38","doi-asserted-by":"publisher","first-page":"1925","DOI":"10.1007\/s11042-020-09672-1","volume":"80","author":"R Guesmi","year":"2020","unstructured":"Guesmi R, Farah MAB. A new efficient medical image cipher based on hybrid chaotic map and DNA code. Multimed Tools Appl. 2020;80(2):1925\u201344. https:\/\/doi.org\/10.1007\/s11042-020-09672-1.","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"2539_CR39","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.26.1.013021","volume":"26","author":"K Zhan","year":"2017","unstructured":"Zhan K, Wei D, Shi J, Yu J. Cross-utilizing hyperchaotic and DNA sequences for image encryption. J Electron Imaging. 2017;26(1): 013021.","journal-title":"J Electron Imaging"},{"issue":"1","key":"2539_CR40","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s00521-017-2993-9","volume":"31","author":"X Chai","year":"2019","unstructured":"Chai X, Gan Z, Yuan K, Chen Y, Liu X. A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput Appl. 2019;31(1):219\u201337.","journal-title":"Neural Comput Appl"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-02539-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-023-02539-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-02539-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,27]],"date-time":"2024-01-27T10:23:20Z","timestamp":1706351000000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-023-02539-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,27]]},"references-count":40,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024,2]]}},"alternative-id":["2539"],"URL":"https:\/\/doi.org\/10.1007\/s42979-023-02539-w","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,27]]},"assertion":[{"value":"17 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 December 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"237"}}