{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T11:38:33Z","timestamp":1770291513143,"version":"3.49.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/mlsp.2013.6661920","type":"proceedings-article","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T21:47:34Z","timestamp":1385588854000},"page":"1-6","source":"Crossref","is-referenced-by-count":19,"title":["An adaptive encryption based genetic algorithms for medical images"],"prefix":"10.1109","author":[{"given":"Ahmed","family":"Mahmood","sequence":"first","affiliation":[]},{"given":"Robert","family":"Dony","sequence":"additional","affiliation":[]},{"given":"Shawki","family":"Areibi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","author":"barr","year":"2013","journal-title":"Medical Image Samples"},{"key":"11","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/978-3-540-95972-4_16","article-title":"Image encryption using chaotic maps","author":"wong","year":"2009","journal-title":"Intelligent Computing Based on Chaos"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCITechnology.2013.6579519"},{"key":"3","first-page":"213","article-title":"Evaluating the performance of symmetric encryption algorithms","volume":"10","author":"elminaam","year":"2010","journal-title":"International Journal of Network Security"},{"key":"2","doi-asserted-by":"crossref","first-page":"3707","DOI":"10.1109\/IEMBS.2009.5334799","article-title":"A lossless encryption method for medical images using edge maps","author":"zhou","year":"2009","journal-title":"Proceedings of the 31st Annual International Conference in Medicine and Biology Society EMBC 2009 Minneapolis MN"},{"key":"1","year":"2008","journal-title":"Digital Imaging and Communications in Medicine (DICOM) Part 15 Security and System Management Profiles"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SSD.2008.4632785"},{"key":"7","author":"vaudenay","year":"2006","journal-title":"A Classical Introduction to Cryptography Applications for Communications Security"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73814-5_6"},{"key":"5","first-page":"596","article-title":"Segmentation based encryption method for medical images","author":"mahmood","year":"2011","journal-title":"6th Interna- Tional Conference for Internet Technology and Secured Transactions (ICITST)"},{"key":"4","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/S0010-4825(02)00094-X","article-title":"Confidential storage and transmission of medical image data","volume":"33","author":"norcen","year":"2003","journal-title":"Computers in Biology and Medicine"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/179290"},{"key":"8","first-page":"170","article-title":"An overview of genetic algorithms: Part 1. Fundamentals","volume":"15","author":"beasley","year":"1993","journal-title":"University Computing"}],"event":{"name":"2013 IEEE International Workshop on Machine Learning for Signal Processing (MLSP)","location":"Southampton, United Kingdom","start":{"date-parts":[[2013,9,22]]},"end":{"date-parts":[[2013,9,25]]}},"container-title":["2013 IEEE International Workshop on Machine Learning for Signal Processing (MLSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6648476\/6661888\/06661920.pdf?arnumber=6661920","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T03:16:28Z","timestamp":1498101388000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6661920\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/mlsp.2013.6661920","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}