{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T22:17:22Z","timestamp":1773872242741,"version":"3.50.1"},"reference-count":38,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers and Electrical Engineering"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.compeleceng.2026.111099","type":"journal-article","created":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T10:48:19Z","timestamp":1773830899000},"page":"111099","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Bio-LCPQ: Biometric logistic cubic post-quantum-based encryption scheme for securing medical images"],"prefix":"10.1016","volume":"134","author":[{"given":"Nilaja A.","family":"Deshmukh","sequence":"first","affiliation":[]},{"given":"Amit K","family":"Gaikwad","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"8","key":"10.1016\/j.compeleceng.2026.111099_bib0001","doi-asserted-by":"crossref","first-page":"166","DOI":"10.3390\/computers12080166","article-title":"Enhancing data security: A cutting-edge approach utilizing protein chains in cryptography and steganography","volume":"12","author":"Mawla","year":"2023","journal-title":"Computers"},{"issue":"14","key":"10.1016\/j.compeleceng.2026.111099_bib0002","doi-asserted-by":"crossref","first-page":"22213","DOI":"10.1007\/s11042-022-13343-8","article-title":"An efficient medical image encryption scheme for (WBAN) based on adaptive DNA and modern multi chaotic map","volume":"82","author":"Abdelfatah","year":"2023","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.compeleceng.2026.111099_bib0003","doi-asserted-by":"crossref","first-page":"37855","DOI":"10.1109\/ACCESS.2021.3063237","article-title":"A new image encryption algorithm for grey and color medical images","volume":"9","author":"Kamal","year":"2021","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111099_bib0004","doi-asserted-by":"crossref","first-page":"467","DOI":"10.18280\/ijsse.120407","article-title":"Medical image encryption based on frequency domain and chaotic map","volume":"12","author":"Yousif","year":"2022","journal-title":"Int. J. Safety Secur. Eng."},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111099_bib0005","doi-asserted-by":"crossref","DOI":"10.1155\/2023\/6758406","article-title":"A privacy protection framework for medical image security without key dependency based on visual cryptography and trusted computing","volume":"2023","author":"Zhang","year":"2023","journal-title":"Comput Intell Neurosci"},{"issue":"10","key":"10.1016\/j.compeleceng.2026.111099_bib0006","doi-asserted-by":"crossref","first-page":"6099","DOI":"10.3390\/app13106099","article-title":"A medical image encryption scheme for secure fingerprint-based authenticated transmission","volume":"13","author":"Castro","year":"2023","journal-title":"Appl Sci"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111099_bib0007","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s13721-021-00306-6","article-title":"Hybrid image encryption scheme for secure E-health systems","volume":"10","author":"Elamir","year":"2021","journal-title":"Netw Model Anal Health Inform Bioinform"},{"key":"10.1016\/j.compeleceng.2026.111099_bib0008","doi-asserted-by":"crossref","first-page":"1925","DOI":"10.1007\/s11042-020-09672-1","article-title":"A new efficient medical image cipher based on hybrid chaotic map and DNA code","volume":"80","author":"Guesmi","year":"2021","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.compeleceng.2026.111099_bib0009","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1016\/j.jbiomech.2018.09.019","article-title":"MRI vs CT-based 2D-3D auto-registration accuracy for quantifying shoulder motion using biplane video-radiography","volume":"82","author":"Akbari-Shandiz","year":"2019","journal-title":"J Biomech"},{"key":"10.1016\/j.compeleceng.2026.111099_bib0010","article-title":"Privacy-preserving deep learning with learnable image encryption on medical images","volume":"10","author":"Huang","year":"2022","journal-title":"IEEE Access"},{"issue":"9","key":"10.1016\/j.compeleceng.2026.111099_bib0011","doi-asserted-by":"crossref","first-page":"6785","DOI":"10.1016\/j.aej.2021.12.023","article-title":"Double image encryption algorithm based on compressive sensing and elliptic curve","volume":"61","author":"Ye","year":"2022","journal-title":"Alexandria Eng J"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111099_bib0012","article-title":"Improved chaos-based cryptosystem for medical image encryption and decryption","volume":"2020","author":"Gafsi","year":"2020","journal-title":"Sci Progr"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111099_bib0013","doi-asserted-by":"crossref","first-page":"1405","DOI":"10.1007\/s11277-021-08584-z","article-title":"A lightweight chaos-based medical image encryption scheme using random shuffling and XOR operations","volume":"127","author":"Masood","year":"2022","journal-title":"Wirel Pers Commun"},{"key":"10.1016\/j.compeleceng.2026.111099_bib0014","doi-asserted-by":"crossref","first-page":"160433","DOI":"10.1109\/ACCESS.2020.3020746","article-title":"Framework for efficient medical image encryption using dynamic S-boxes and chaotic maps","volume":"8","author":"Ibrahim","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.111099_bib0015","doi-asserted-by":"crossref","first-page":"194289","DOI":"10.1109\/ACCESS.2020.3032403","article-title":"Efficient image encryption scheme using Henon map, dynamic S-boxes, and elliptic curve cryptography","volume":"8","author":"Ibrahim","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.111099_bib0016","unstructured":"Rajan, A.A., 2024. Qmedshield: A novel quantum chaos-based image encryption scheme for secure medical image storage in the cloud. arXiv preprint arXiv:2405.09191."},{"issue":"716","key":"10.1016\/j.compeleceng.2026.111099_bib0017","first-page":"22","article-title":"A New Image Encryption Algorithm Based on Chaos","volume":"20","author":"SHA","year":"2019","journal-title":"Entropy Image Anal"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111099_bib0018","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/TSMC.2019.2903785","article-title":"Securing data in the Internet of Things (IoT) using cryptography and steganography techniques","volume":"50","author":"Khari","year":"2019","journal-title":"IEEE Trans Syst, Man, Cybernet: Syst"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111099_bib0019","doi-asserted-by":"crossref","first-page":"2081","DOI":"10.1007\/s11042-020-09775-9","article-title":"An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography","volume":"80","author":"Benssalah","year":"2021","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.compeleceng.2026.111099_bib0020","doi-asserted-by":"crossref","first-page":"74048","DOI":"10.1109\/ACCESS.2023.3294570","article-title":"Lightweight biomedical image encryption approach","volume":"11","author":"Kaur","year":"2023","journal-title":"IEEE Access"},{"issue":"9","key":"10.1016\/j.compeleceng.2026.111099_bib0021","doi-asserted-by":"crossref","first-page":"4915","DOI":"10.1109\/TNNLS.2021.3062754","article-title":"DeepKeyGen: a deep learning-based stream cipher generator for medical image encryption and decryption","volume":"33","author":"Ding","year":"2021","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111099_bib0022","first-page":"816","article-title":"An optimization of color halftone visual cryptography scheme based on Bat algorithm","volume":"30","author":"Aswad","year":"2021","journal-title":"J Intell Syst"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111099_bib0023","first-page":"91","article-title":"Selective medical image encryption using DNA cryptography","volume":"29","author":"Akkasaligar","year":"2020","journal-title":"Inform Secur J: A Glob Perspect"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111099_bib0024","doi-asserted-by":"crossref","DOI":"10.1016\/j.heliyon.2023.e23652","article-title":"A medical image encryption scheme based on Mobius transformation and Galois field","volume":"10","author":"Ali","year":"2024","journal-title":"Heliyon"},{"key":"10.1016\/j.compeleceng.2026.111099_bib0025","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2024.3404088","article-title":"Medical image encryption through chaotic asymmetric cryptosystem","author":"Ningthoukhongjam","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.111099_bib0026","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2024.3426935","article-title":"Enhancing Healthcare Imaging Security: Color Secret Sharing Protocol for the Secure Transmission of Medical Images","author":"Sankaranarayanan","year":"2024","journal-title":"IEEE Access"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111099_bib0027","doi-asserted-by":"crossref","first-page":"2187","DOI":"10.1007\/s40747-023-01258-2","article-title":"Reversibly selective encryption for medical images based on coupled chaotic maps and steganography","volume":"10","author":"Zhang","year":"2024","journal-title":"Complex Intell Syst"},{"issue":"24","key":"10.1016\/j.compeleceng.2026.111099_bib0028","doi-asserted-by":"crossref","first-page":"3948","DOI":"10.3390\/math12243948","article-title":"A Dynamic Hill Cipher with Arnold Scrambling Technique for Medical Images Encryption","volume":"12","author":"Xi","year":"2024","journal-title":"Mathematics"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111099_bib0029","doi-asserted-by":"crossref","first-page":"6685","DOI":"10.1038\/s41598-025-90725-6","article-title":"Cascading quantum walks with Chebyshev map for designing a robust medical image encryption algorithm","volume":"15","author":"Alblehai","year":"2025","journal-title":"Sci Rep"},{"key":"10.1016\/j.compeleceng.2026.111099_bib0030","doi-asserted-by":"crossref","first-page":"69164","DOI":"10.1109\/ACCESS.2023.3289932","article-title":"Double medical image cryptosystem based on the quantum walk","volume":"11","author":"Abd-El-Atty","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.111099_bib0031","doi-asserted-by":"crossref","DOI":"10.1016\/j.rinp.2023.107057","article-title":"Research and application of big data encryption technology based on quantum lightweight image encryption","volume":"54","author":"Ma","year":"2023","journal-title":"Results Phys"},{"key":"10.1016\/j.compeleceng.2026.111099_bib0032","unstructured":"BraTS Dataset: https:\/\/www.kaggle.com\/datasets\/awsaf49\/brats2020-training-data accessed on June 2025."},{"key":"10.1016\/j.compeleceng.2026.111099_bib0033","unstructured":"LUNA 16:https:\/\/luna16.grand-challenge.org\/Download\/ accessed on June 2025."},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111099_bib0034","first-page":"598","article-title":"Image encryption using binary bit plane and rotation method for image security","volume":"5","author":"Aarthi","year":"2017","journal-title":"Int J Eng Dev Res"},{"key":"10.1016\/j.compeleceng.2026.111099_bib0035","series-title":"Progress in Advanced Computing and Intelligent Engineering: Proceedings of ICACIE 2017","first-page":"329","article-title":"A fast image encryption technique using Henon chaotic map","volume":"1","author":"Mishra","year":"2019"},{"key":"10.1016\/j.compeleceng.2026.111099_bib0036","unstructured":"Medical Segmentation Decathlon dataset: http:\/\/medicaldecathlon.com\/dataaws\/, accessed on February 6,2026."},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111099_bib0037","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/s10916-023-02003-5","article-title":"Medical image encryption using biometric image texture fusion","volume":"47","author":"Liu","year":"2023","journal-title":"J Med Syst"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111099_bib0038","doi-asserted-by":"crossref","first-page":"2382","DOI":"10.1109\/JIOT.2023.3293165","article-title":"Encrypted domain secret medical-image sharing with secure outsourcing computation in IoT environment","volume":"11","author":"Huang","year":"2023","journal-title":"IEEE Internet Things J"}],"container-title":["Computers and Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626001710?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626001710?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:51:21Z","timestamp":1773845481000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790626001710"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":38,"alternative-id":["S0045790626001710"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111099","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Bio-LCPQ: Biometric logistic cubic post-quantum-based encryption scheme for securing medical images","name":"articletitle","label":"Article Title"},{"value":"Computers and Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111099","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"111099"}}