{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:39:06Z","timestamp":1776926346193,"version":"3.51.2"},"reference-count":41,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.065356","type":"journal-article","created":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T07:42:27Z","timestamp":1752219747000},"page":"5527-5553","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":2,"title":["Secure Medical Image Transmission Using Chaotic Encryption and Blockchain-Based Integrity Verification"],"prefix":"10.32604","volume":"84","author":[{"given":"Rim","family":"Amdouni","sequence":"first","affiliation":[]},{"given":"Mahdi","family":"Madani","sequence":"additional","affiliation":[]},{"given":"Mohamed Ali","family":"Hajjaji","sequence":"additional","affiliation":[]},{"given":"El Bay","family":"Bourennane","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Atri","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1049\/PBHE060E_ch13","author":"Manju Bala","year":"2024","journal-title":"Exploring intelligent healthcare with quantum computing"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1366","DOI":"10.1109\/TKDE.2017.2781227","article-title":"Untangling blockchain: a data processing view of blockchain systems","volume":"30","author":"Dinh","year":"2018","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"175","DOI":"10.3390\/e22020175","article-title":"A blockchain-based secure image encryption scheme for the industrial Internet of Things","volume":"22","author":"Khan","year":"2020","journal-title":"Entropy"},{"key":"ref4","first-page":"102771","article-title":"Blockchain-Enabled healthcare system for detection of diabetes","volume":"58","author":"Chen","year":"2021","journal-title":"J Inf Secur Appl"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/978-3-031-19647-8_17","author":"Ajagbe","year":"2022","journal-title":"Applied informatics"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.jnca.2019.06.018","article-title":"Blockchain for smart communities: applications, challenges and opportunities","volume":"144","author":"Aggarwal","year":"2019","journal-title":"J Netw Comput Appl"},{"key":"ref7","series-title":"IEEE 98th Vehicular Technology Conference (VTC2023-Fall)","first-page":"1","article-title":"Blockchain-based robust SDN framework for digital twin-enabled IoT networks","author":"Bhardwaj"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"e38917","DOI":"10.1016\/j.heliyon.2024.e38917","article-title":"Enhancing data security and privacy in energy applications: integrating IoT and blockchain technologies","volume":"10","author":"Rai","year":"2024","journal-title":"Heliyon"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"5934","DOI":"10.3390\/su15075934","article-title":"Toward designing a secure authentication protocol for IoT environments","volume":"15","author":"Hosseinzadeh","year":"2023","journal-title":"Sustainability"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"10217","DOI":"10.1007\/s11042-017-5406-2","article-title":"A digital image encryption algorithm based on bit-planes and an improved logistic map","volume":"77","author":"Liu","year":"2018","journal-title":"Multimed Tools Appl"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1007\/s12652-019-01385-0","article-title":"A chaotic colour image encryption scheme combining Walsh-Hadamard transform and Arnold-Tent maps","volume":"11","author":"Sneha","year":"2020","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"9711","DOI":"10.1007\/s11042-019-07835-3","article-title":"A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology","volume":"79","author":"Rathee","year":"2020","journal-title":"Multimed Tools Appl"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/s00779-021-01583-8","article-title":"Blockchain-assisted secured data management framework for health information analysis based on Internet of Medical Things","volume":"28","author":"Abbas","year":"2024","journal-title":"Pers Ubiquitous Comput"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.eij.2022.02.004","article-title":"BlockMedCare: a healthcare system based on IoT, Blockchain and IPFS for data management security","volume":"23","author":"Azbeg","year":"2022","journal-title":"Egypt Inform J"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"2877","DOI":"10.1007\/s11071-020-05625-3","article-title":"A robust image encryption scheme using chaotic tent map and cellular automata","volume":"100","author":"Naskar","year":"2020","journal-title":"Nonlinear Dyn"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"30931","DOI":"10.1007\/s11042-022-12844-w","article-title":"A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map","volume":"81","author":"Masood","year":"2022","journal-title":"Multimed Tools Appl"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"194289","DOI":"10.1109\/ACCESS.2020.3032403","article-title":"Efficient image encryption scheme using henon map, dynamic S-boxes and elliptic curve cryptography","volume":"8","author":"Ibrahim","year":"2020","journal-title":"IEEE Access"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"11541","DOI":"10.1109\/ACCESS.2023.3242311","article-title":"Color image encryption through chaos and KAA map","volume":"11","author":"Alexan","year":"2023","journal-title":"IEEE Access"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3561513","article-title":"EiMOL: a secure medical image encryption algorithm based on optimization and the Lorenz system","volume":"19","author":"Singh","year":"2023","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.comcom.2020.01.038","article-title":"An improved DWT-SVD domain watermarking for medical information security","volume":"152","author":"Anand","year":"2020","journal-title":"Comput Commun"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"9007","DOI":"10.1007\/s12652-020-02597-5","article-title":"Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications","volume":"12","author":"El-Shafai","year":"2021","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"10629","DOI":"10.1007\/s00521-022-06994-z","article-title":"Proposed neural SAE-based medical image cryptography framework using deep extracted features for smart IoT healthcare applications","volume":"34","author":"El-Shafai","year":"2022","journal-title":"Neural Comput Appl"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/s11220-021-00340-8","article-title":"Secure transmission of medical image for telemedicine","volume":"22","author":"Yepdia","year":"2021","journal-title":"Sens Imag"},{"key":"ref24","first-page":"466","article-title":"A novel image encryption based on feedback carry shift register and blockchain for secure communication","volume":"16","author":"Malika","year":"2021","journal-title":"Int J Appl Eng Res"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"24721","DOI":"10.1007\/s11042-022-12617-5","article-title":"Blockchain based security framework for sharing digital images using reversible data hiding and encryption","volume":"81","author":"Brabin","year":"2022","journal-title":"Multimed Tools Appl"},{"key":"ref26","series-title":"2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI); 2022 Jun 30\u2013July 1; Ploiesti, Romania","first-page":"1","article-title":"Image encryption using block chain and chaos for secure communication","author":"Ravi"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"577","DOI":"10.32604\/iasc.2021.016382","article-title":"Secure image authentication using watermarking and blockchain","volume":"28","author":"Abrar","year":"2021","journal-title":"Intell Autom Soft Comput"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1889","DOI":"10.32604\/iasc.2023.028850","article-title":"Secured cyber security algorithm for healthcare system using blockchain technology","volume":"35","author":"Doreen Hephzibah Miriam","year":"2023","journal-title":"Intell Autom Soft Comput"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"4733","DOI":"10.1007\/s10489-022-03730-x","article-title":"Blockchain based Chaotic Deep GAN Encryption scheme for securing medical images in a cloud environment","volume":"53","author":"Neela","year":"2023","journal-title":"Appl Intell"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"5678","DOI":"10.1038\/s41598-024-56364-z","article-title":"Blockchain based medical image encryption using Arnold\u2019s cat map in a cloud environment","volume":"14","author":"Inam","year":"2024","journal-title":"Sci Rep"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"e8092","DOI":"10.1002\/cpe.8092","article-title":"Multi-chaotic maps and blockchain based image encryption","volume":"36","author":"Kumari","year":"2024","journal-title":"Concurr Comput"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"12966","DOI":"10.1109\/ACCESS.2022.3146792","article-title":"A novel chaotic permutation-substitution image encryption scheme based on logistic map and random substitution","volume":"10","author":"Arif","year":"2022","journal-title":"IEEE Access"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"3670","DOI":"10.1103\/PhysRevE.51.3670","article-title":"Logistic map: a possible random-number generator","volume":"51","author":"Phatak","year":"1995","journal-title":"Phys Rev E"},{"key":"ref34","first-page":"181","author":"Kiran Parameshachari","year":"2021","journal-title":"Recent advances in artificial intelligence and data engineering"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1007\/978-0-387-21830-4_8","author":"H\u00e9non","year":"1976","journal-title":"The theory of chaotic attractors"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"33297","DOI":"10.1007\/s11042-021-11295-z","article-title":"A new scan pattern method for color image encryption based on 3D-Lorenzo chaotic map method","volume":"80","author":"Jawad","year":"2021","journal-title":"Multimed Tools Appl"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"106162","DOI":"10.1016\/j.asoc.2020.106162","article-title":"A novel image encryption scheme using both pixel level and bit level permutation with chaotic map","volume":"90","author":"Shahna","year":"2020","journal-title":"Appl Soft Comput"},{"key":"ref38","first-page":"102407","article-title":"Blockchain-based electronic healthcare record system for healthcare 4.0 applications","volume":"50","author":"Tanwar","year":"2020","journal-title":"J Inf Secur Appl"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1016\/j.procs.2020.07.089","article-title":"Blockchain and smart healthcare security: a survey","volume":"175","author":"Tariq","year":"2020","journal-title":"Procedia Comput Sci"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"032077","DOI":"10.1088\/1742-6596\/1168\/3\/032077","article-title":"Research on the application of cryptography on the blockchain","volume":"1168","author":"Zhai","year":"2019","journal-title":"J Phys Conf Ser"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","article-title":"Some basic cryptographic requirements for chaos-based cryptosystems","volume":"16","author":"Alvarez","year":"2006","journal-title":"Int J Bifurcation Chaos"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_65356\/TSP_CMC_65356.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:32Z","timestamp":1776923132000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63158"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":41,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.065356","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-03-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-05","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}