{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T14:32:36Z","timestamp":1777905156745,"version":"3.51.4"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61370073"],"award-info":[{"award-number":["61370073"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National High Technology Research and Development Program of China","award":["2007AA01Z423"],"award-info":[{"award-number":["2007AA01Z423"]}]},{"DOI":"10.13039\/501100004829","name":"Department of Science and Technology of Sichuan Province","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004829","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Sichuan Yin Ten Gu Technology Company Ltd"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2966656","type":"journal-article","created":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T16:08:33Z","timestamp":1579018113000},"page":"15747-15767","source":"Crossref","is-referenced-by-count":65,"title":["SMSH: Secure Surveillance Mechanism on Smart Healthcare IoT System With Probabilistic Image Encryption"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7402-6498","authenticated-orcid":false,"given":"Jalaluddin","family":"Khan","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2192-1450","authenticated-orcid":false,"given":"Jian Ping","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2873-0294","authenticated-orcid":false,"given":"Bilal","family":"Ahamad","sequence":"additional","affiliation":[{"name":"College of Computing and Information Technology, Shaqra University, Sharqra, Saudi Arabia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4270-9248","authenticated-orcid":false,"given":"Shadma","family":"Parveen","sequence":"additional","affiliation":[{"name":"School of Management and Economics, University of Electronic Science and Technology of China, Chengdu, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7774-5604","authenticated-orcid":false,"given":"Amin","family":"Ul Haq","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2532-9550","authenticated-orcid":false,"given":"Ghufran Ahmad","family":"Khan","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0229-2460","authenticated-orcid":false,"given":"Arun Kumar","family":"Sangaiah","sequence":"additional","affiliation":[{"name":"School of Computing Science and Engineering, Vellore Institute of Technology (VIT), Vellore, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","article-title":"YOLOv3: An incremental improvement","author":"redmon","year":"2018"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2017.2695368"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.02.016"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijleo.2019.06.021","article-title":"A fast color image encryption technique based on three dimensional chaotic map","volume":"193","author":"valandar","year":"2019","journal-title":"Optik"},{"key":"ref31","article-title":"A privacy-preserving cryptosystem for IoT E-healthcare","author":"hamza","year":"0","journal-title":"Inf Sci"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.12.048"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2019.01.039"},{"key":"ref36","first-page":"23","article-title":"An efficient colour image encryption scheme based on 1-D chaotic maps","volume":"46","author":"patro","year":"2019","journal-title":"J Inf Secur Appl"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.01.010"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.11.010"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2018.11.010"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.09.029"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.005"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.025"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.031"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.12.038"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.07.131"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.12.001"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.03.011"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/1625678"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2018.11.015"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2923111"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.08.009"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.11648\/j.ajmse.20190403.12"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.10.019"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.04.016"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2016.12.007"},{"key":"ref56","author":"smart","year":"2019","journal-title":"Algorithms Key Size and Protocols Report (2018)"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2018.06.029"},{"key":"ref54","article-title":"A privacy-preserving cryptosystem for IoT E-healthcare","author":"hamza","year":"0","journal-title":"Inf Sci"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/917147"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127418500207"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5376-4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2791944"},{"key":"ref40","author":"redmon","year":"2016","journal-title":"Darknet Open Source Neural Network Framework"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","article-title":"Internet of Things in industries: A survey","volume":"10","author":"da xu","year":"2014","journal-title":"IEEE Trans Ind Informat"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7619-z"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/s140203652"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1108\/EC-09-2018-0431"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2014.07.002"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2502590"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2763589"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.01.028"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2018.12.005"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.010"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2018.022021657"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.02.014"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1287\/deca.2017.0360"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-017-0937-3"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1080\/08982112.2018.1481216"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.223"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.10.027"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.12.048"},{"key":"ref48","first-page":"31","article-title":"NPCR and UACI randomness tests for image encryption","author":"wu","year":"2011","journal-title":"Cyber J Multidisciplinary J Sci Technol J Sel Areas Telecommun"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2017.10.024"},{"key":"ref42","author":"delac","year":"2019","journal-title":"Face recognition homepage"},{"key":"ref41","year":"2019","journal-title":"WIDER FACE A face detection benchmark"},{"key":"ref44","year":"2017","journal-title":"USC-SIPI Image Database for Research in Image Processing Image Analysis and Machine Vision"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127406015970"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/08959209.pdf?arnumber=8959209","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T05:59:52Z","timestamp":1769493592000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8959209\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2966656","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}