{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T23:16:01Z","timestamp":1771888561555,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T00:00:00Z","timestamp":1746144000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T00:00:00Z","timestamp":1746144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-03961-y","type":"journal-article","created":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T13:02:55Z","timestamp":1746190975000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Securing Telehealth Electronic Health Records with Adaptive Chaotic Encryption and Dynamic Key Generation"],"prefix":"10.1007","volume":"6","author":[{"given":"Venkatala Venkatappa","family":"Leelavathi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bajanemane Krishnamurthy","family":"Rashmi Priyadarshini","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kiran","family":"Puttegowda","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,5,2]]},"reference":[{"key":"3961_CR1","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-031-19647-8_17","volume-title":"International conference on applied informatics","author":"SA Ajagbe","year":"2022","unstructured":"Ajagbe SA, Florez H, Awotunde JB. AESRSA: a new cryptography key for electronic health record security. In: International conference on applied informatics. Cham: Springer International Publishing; 2022. p. 237\u201351."},{"issue":"18","key":"3961_CR2","doi-asserted-by":"publisher","first-page":"25101","DOI":"10.1007\/s11042-022-11956-7","volume":"81","author":"M Magdy","year":"2022","unstructured":"Magdy M, Hosny KM, Ghali NI, Ghoniemy S. Security of medical images for telemedicine: a systematic review. Multimed Tools Appl. 2022;81(18):25101\u201345.","journal-title":"Multimed Tools Appl"},{"issue":"05","key":"3961_CR3","doi-asserted-by":"publisher","first-page":"2250097","DOI":"10.1142\/S0218126622500979","volume":"31","author":"K Amine","year":"2022","unstructured":"Amine K, Fares K, Redouane KM, Salah E. Medical image watermarking for telemedicine application security. J Circuits Syst Comput. 2022;31(05):2250097.","journal-title":"J Circuits Syst Comput"},{"key":"3961_CR4","doi-asserted-by":"publisher","first-page":"104490","DOI":"10.1016\/j.micpro.2022.104490","volume":"90","author":"MS Moad","year":"2022","unstructured":"Moad MS, Kafi MR, Khaldi A. A wavelet based medical image watermarking scheme for secure transmission in telemedicine applications. Microprocess Microsyst. 2022;90:104490.","journal-title":"Microprocess Microsyst"},{"key":"3961_CR5","doi-asserted-by":"crossref","unstructured":"Kang SW, Choi US (2021) ROI image encryption using YOLO and chaotic systems. Int J Adv Comput Sci Appl. 2021; 12(7)","DOI":"10.14569\/IJACSA.2021.0120754"},{"issue":"5","key":"3961_CR6","doi-asserted-by":"publisher","first-page":"7323","DOI":"10.1007\/s11042-021-11799-8","volume":"81","author":"P Ping","year":"2022","unstructured":"Ping P, Zhang X, Yang X, Hashems YAA. A novel medical image encryption based on cellular automata with ROI position embedded. Multimed Tools Appl. 2022;81(5):7323\u201343.","journal-title":"Multimed Tools Appl"},{"key":"3961_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/6624809","volume":"2021","author":"Li Shanshan","year":"2021","unstructured":"Shanshan Li, Li Z, Na Y. Medical image encryption based on 2D zigzag confusion and dynamic diffusion. Secur Commun Netw. 2021;2021:1\u201323. https:\/\/doi.org\/10.1155\/2021\/6624809.","journal-title":"Secur Commun Netw"},{"key":"3961_CR8","first-page":"83","volume":"21","author":"JC Dagadu","year":"2019","unstructured":"Dagadu JC, Li J, Aboagye EO, Deynu FK. Medical image encryption scheme based on multiple chaos and DNA coding. Int J Netw Secur. 2019;21:83\u201390.","journal-title":"Int J Netw Secur"},{"issue":"1","key":"3961_CR9","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1364\/AO.410329","volume":"60","author":"X Wang","year":"2021","unstructured":"Wang X, Zhu Z, Wang F, Ni R, Wang J, Hu Y. Medical image encryption based on biometric keys and lower-upper decomposition with partial pivoting. Appl Opt. 2021;60(1):24\u201332. https:\/\/doi.org\/10.1364\/AO.410329.","journal-title":"Appl Opt"},{"key":"3961_CR10","doi-asserted-by":"publisher","unstructured":"Das S, Sanyal MK. Medical Image Encryption Using 3D Unified Chaotic System and Dynamic DNA coding. Res Square. 2022. https:\/\/doi.org\/10.21203\/rs.3.rs-2244229\/v1.","DOI":"10.21203\/rs.3.rs-2244229\/v1"},{"issue":"4","key":"3961_CR11","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1049\/ccs2.12070","volume":"4","author":"Li Mingzhen","year":"2022","unstructured":"Mingzhen Li, Shuaihao P, Weiming M, Guoyong W, ZhiHang Ji, Lin W. Medical image encryption algorithm based on hyper-chaotic system and DNA coding. Cogn Comput Syst. 2022;4(4):378\u201390. https:\/\/doi.org\/10.1049\/ccs2.12070.","journal-title":"Cogn Comput Syst"},{"issue":"2","key":"3961_CR12","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1504\/ijsse.2023.131238","volume":"13","author":"JH Selvi","year":"2023","unstructured":"Selvi JH, Rajendran T. Encryption of medical images using a chaotic multi-level scheme. Int J Syst Syst Eng. 2023;13(2):160\u201380. https:\/\/doi.org\/10.1504\/ijsse.2023.131238.","journal-title":"Int J Syst Syst Eng"},{"issue":"4","key":"3961_CR13","doi-asserted-by":"publisher","first-page":"467","DOI":"10.18280\/ijsse.120407","volume":"12","author":"NA Yousif","year":"2022","unstructured":"Yousif NA, Mahdi GS, Hashim AT. Medical image encryption based on frequency domain and chaotic map. Int J Saf Secur Eng. 2022;12(4):467\u201373. https:\/\/doi.org\/10.18280\/ijsse.120407.","journal-title":"Int J Saf Secur Eng"},{"key":"3961_CR14","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1109\/TII.2022.3194590","volume":"19","author":"Wu Yiru","year":"2023","unstructured":"Yiru Wu, Lilai Z, Stefano B, Shaohua W. Medical image encryption by content-aware dna computing for secure healthcare. IEEE Trans Industr Inf. 2023;19:2089\u201398. https:\/\/doi.org\/10.1109\/TII.2022.3194590.","journal-title":"IEEE Trans Industr Inf"},{"issue":"2","key":"3961_CR15","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1109\/tii.2022.3194590","volume":"19","author":"Y Wu","year":"2023","unstructured":"Wu Y, Zhang L, Berretti S, Wan S. Medical Image Encryption by Content-Aware DNA Computing for Secure Healthcare. IEEE Trans Industr Inf. 2023;19(2):2089\u201398. https:\/\/doi.org\/10.1109\/tii.2022.3194590.","journal-title":"IEEE Trans Industr Inf"},{"key":"3961_CR16","doi-asserted-by":"publisher","DOI":"10.24996\/ijs.2024.65.5.21","author":"MJ Obaid","year":"2024","unstructured":"Obaid MJ, Al Saffar NF. Asymmetric image encryption based on singular cubic curve with chaotic map. Iraqi J Sci. 2024. https:\/\/doi.org\/10.24996\/ijs.2024.65.5.21.","journal-title":"Iraqi J Sci"},{"key":"3961_CR17","doi-asserted-by":"publisher","DOI":"10.4018\/979-8-3693-2691-6.ch010","author":"DA Laila","year":"2024","unstructured":"Laila DA, Al-Na\u2019amneh Q, Aljaidi M, Nasayreh AN, Gharaibeh H, Al Mamlook R, Alshammari M. Enhancing 2D logistic chaotic map for gray image encryption. Adv IT Stand Stand Res Ser. 2024. https:\/\/doi.org\/10.4018\/979-8-3693-2691-6.ch010.","journal-title":"Adv IT Stand Stand Res Ser"},{"key":"3961_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2022.127738","volume":"442","author":"Q Lai","year":"2023","unstructured":"Lai Q, Genwen Hu, Erkan U, Toktas A. High-efficiency medical image encryption method based on 2D Logistic-Gaussian hyperchaotic map. Appl Math Comput. 2023;442: 127738.","journal-title":"Appl Math Comput"},{"key":"3961_CR19","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3415411","author":"MS Khan","year":"2024","unstructured":"Khan MS, Ahmad J, Al-Dubai A, Pitropakis N, Ghaleb B, Ullah A, Khan MA, Buchanan WJ. Chaotic quantum encryption to secure image data in post quantum consumer technology. IEEE Trans Consum Electron. 2024. https:\/\/doi.org\/10.1109\/TCE.2024.3415411.","journal-title":"IEEE Trans Consum Electron"},{"issue":"6","key":"3961_CR20","doi-asserted-by":"publisher","first-page":"8179","DOI":"10.1007\/s11042-022-11917-0","volume":"81","author":"M Lyle","year":"2022","unstructured":"Lyle M, Sarosh P, Parah SA. Adaptive image encryption based on twin chaotic maps. Multimed Tools Appl. 2022;81(6):8179\u201398.","journal-title":"Multimed Tools Appl"},{"key":"3961_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/S11517-021-02328-8","author":"D Ravichandran","year":"2021","unstructured":"Ravichandran D, Banu SA, Murthy BK, Balasubramanian V, Fathima S, Amirtharajan R. An efficient medical image encryption using hybrid DNA computing and chaos in transform domain. Med Biol Eng Comput. 2021. https:\/\/doi.org\/10.1007\/S11517-021-02328-8.","journal-title":"Med Biol Eng Comput"},{"issue":"2","key":"3961_CR22","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1109\/TII.2022.3194590","volume":"19","author":"Y Wu","year":"2022","unstructured":"Wu Y, Zhang L, Berretti S, Wan S. Medical image encryption by content-aware DNA computing for secure healthcare. IEEE Trans Ind Inf. 2022;19(2):2089\u201398.","journal-title":"IEEE Trans Ind Inf"},{"key":"3961_CR23","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1109\/ACCESS.2021.3138718","volume":"10","author":"I Yasser","year":"2021","unstructured":"Yasser I, Khalil AT, Mohamed MA, Samra AS, Khalifa F. A robust chaos-based technique for medical image encryption. IEEE Access. 2021;10:244\u201357.","journal-title":"IEEE Access"},{"issue":"2","key":"3961_CR24","doi-asserted-by":"publisher","first-page":"841","DOI":"10.32604\/iasc.2022.021636","volume":"32","author":"A Mashat","year":"2022","unstructured":"Mashat A, Bhatia S, Kumar A, Dadheech P, Alabdali A. Medical image transmission using novel crypto-compression scheme. Intell Autom Soft Comput. 2022;32(2):841\u201357.","journal-title":"Intell Autom Soft Comput"},{"issue":"1","key":"3961_CR25","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/s11042-021-11384-z","volume":"81","author":"KM Hosny","year":"2022","unstructured":"Hosny KM, Kamal ST, Darwish MM. A color image encryption technique using block scrambling and chaos. Multimed Tools Appl. 2022;81(1):505\u201325.","journal-title":"Multimed Tools Appl"},{"key":"3961_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104546","volume":"91","author":"P Kiran","year":"2022","unstructured":"Kiran P, Parameshachari BD. Resource optimized selective image encryption of medical images using multiple chaotic systems. Microprocess Microsyst. 2022;91: 104546.","journal-title":"Microprocess Microsyst"},{"key":"3961_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2023.104907","volume":"101","author":"K Prabhavathi","year":"2023","unstructured":"Prabhavathi K, Anandaraju MB. An efficient medical image encryption algorithm for telemedicine applications. Microprocess Microsyst. 2023;101: 104907.","journal-title":"Microprocess Microsyst"},{"issue":"1","key":"3961_CR28","doi-asserted-by":"publisher","first-page":"47","DOI":"10.3390\/info14010047","volume":"14","author":"Kiran","year":"2023","unstructured":"Kiran, Gururaj HL, Almeshari M, Alzamil Y, Ravi V, Sudeesh KV. Efficient SCAN and chaotic map encryption system for securing E-healthcare images. Information. 2023;14(1):47.","journal-title":"Information"},{"key":"3961_CR29","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-030-92166-8_9","volume-title":"Cybersecurity: a new approach using chaotic systems","author":"P Kiran","year":"2022","unstructured":"Kiran P, Panduranga HT, Yashwanth J. Efficient secure medical image transmission based on brownian system. In: Cybersecurity: a new approach using chaotic systems. Cham: Springer International Publishing; 2022. p. 207\u201320."},{"key":"3961_CR30","first-page":"1","volume":"15","author":"RM Alguliyev","year":"2019","unstructured":"Alguliyev RM, Aliguliyev RM, Abdullayeva FJ. Privacy-preserving deep learning algorithm for big personal data analysis. J Ind Inf Integr. 2019;15:1\u201314.","journal-title":"J Ind Inf Integr"},{"issue":"4","key":"3961_CR31","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1049\/cit2.12128","volume":"7","author":"FJ Abdullayeva","year":"2022","unstructured":"Abdullayeva FJ. Internet of things-based healthcare system on patient demographic data in health 4.0. CAAI Trans Intell Technol. 2022;7(4):644\u201357.","journal-title":"CAAI Trans Intell Technol"},{"key":"3961_CR32","doi-asserted-by":"publisher","first-page":"17131","DOI":"10.1007\/s11042-022-12649-x","volume":"81","author":"YK Nkandeu","year":"2022","unstructured":"Nkandeu YK, Tiedeu A, Abanda Y, et al. Image encryption using the logistic map coupled to a self-synchronizing streaming. Multimed Tools Appl. 2022;81:17131\u201354. https:\/\/doi.org\/10.1007\/s11042-022-12649-x.","journal-title":"Multimed Tools Appl"},{"key":"3961_CR33","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s11220-020-00318-y","volume":"21","author":"YPK Nkandeu","year":"2020","unstructured":"Nkandeu YPK, Mboupda Pone JR, Tiedeu A. Image encryption algorithm based on synchronized parallel diffusion and new combinations of 1D discrete maps. Sens Imaging. 2020;21:55. https:\/\/doi.org\/10.1007\/s11220-020-00318-y.","journal-title":"Sens Imaging"},{"issue":"1","key":"3961_CR34","doi-asserted-by":"publisher","first-page":"6624890","DOI":"10.1155\/2021\/6624890","volume":"2021","author":"Y Abanda","year":"2020","unstructured":"Abanda Y, Tiedeu A, Kom G. Image encryption with fusion of two maps. Secur Commun Netw. 2020;2021(1):6624890. https:\/\/doi.org\/10.1155\/2021\/6624890.","journal-title":"Secur Commun Netw"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03961-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-03961-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03961-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T13:03:01Z","timestamp":1746190981000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-03961-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,2]]},"references-count":34,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["3961"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-03961-y","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,2]]},"assertion":[{"value":"25 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research Involving Human and\/or Animals"}}],"article-number":"434"}}