{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:03:07Z","timestamp":1772283787488,"version":"3.50.1"},"reference-count":35,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T00:00:00Z","timestamp":1685750400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61976176"],"award-info":[{"award-number":["61976176"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2022JM-017"],"award-info":[{"award-number":["2022JM-017"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100017596","name":"Natural Science Basic Research Program of Shaanxi Province","doi-asserted-by":"publisher","award":["61976176"],"award-info":[{"award-number":["61976176"]}],"id":[{"id":"10.13039\/501100017596","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100017596","name":"Natural Science Basic Research Program of Shaanxi Province","doi-asserted-by":"publisher","award":["2022JM-017"],"award-info":[{"award-number":["2022JM-017"]}],"id":[{"id":"10.13039\/501100017596","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Ensuring the privacy and secrecy of digital medical images has become a pressing issue as a result of the quick development of smart medical technology and the exponential growth in the quantity of medical images transmitted and stored in networks. The lightweight multiple-image encryption approach for medical images that is suggested in this research can encrypt\/decrypt any number of medical photos of varied sizes with just one encryption operation and has a computational cost that is similar to encrypting a single image. The plaintext images with different sizes are filled at the right and bottom of the image to ensure that the size of all plaintext images is uniform; then, all the filled images are stacked to obtain a superimposed image. The initial key, which is generated using the SHA-256 technique, is then used as the starting value of the linear congruence algorithm to create the encryption key sequence. The cipher picture is then created by encrypting the superimposed image with the encryption key and DNA encoding. The algorithm can be made even more secure by implementing a decryption mechanism that decrypts the image independently in order to reduce the possibility of information leaking during the decryption process. The outcomes of the simulation experiment demonstrate the algorithm\u2019s strong security and resistance to interference such as noise pollution and lost image content.<\/jats:p>","DOI":"10.3390\/e25060898","type":"journal-article","created":{"date-parts":[[2023,6,5]],"date-time":"2023-06-05T02:57:47Z","timestamp":1685933867000},"page":"898","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding"],"prefix":"10.3390","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4097-6799","authenticated-orcid":false,"given":"Junfeng","family":"Wu","sequence":"first","affiliation":[{"name":"Department of Applied Mathematics, Xi\u2019an University of Technology, Xi\u2019an 710049, China"}]},{"given":"Jialu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Applied Mathematics, Xi\u2019an University of Technology, Xi\u2019an 710049, China"}]},{"given":"Dong","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Applied Mathematics, Xi\u2019an University of Technology, Xi\u2019an 710049, China"}]},{"given":"Xiaofeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Applied Mathematics, Xi\u2019an University of Technology, Xi\u2019an 710049, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,6,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"20596","DOI":"10.1109\/ACCESS.2018.2817615","article-title":"Secure medical data transmission model for iot-based healthcare systems","volume":"6","author":"Elhoseny","year":"2018","journal-title":"IEEE Access"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"10979","DOI":"10.1007\/s00521-018-3801-x","article-title":"Hybrid optimization with cryptography encryption for medical image security in internet of things","volume":"32","author":"Elhoseny","year":"2020","journal-title":"Neural Comput. Appl."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1007\/s00500-014-1539-7","article-title":"Medical image protection using genetic algorithm operations","volume":"20","author":"Pareek","year":"2016","journal-title":"Soft Comput."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.sigpro.2016.10.003","article-title":"Medical image encryption using edge maps","volume":"132","author":"Cao","year":"2017","journal-title":"Signal Process."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.ijleo.2017.08.028","article-title":"Medical image encryption based on improved elgamal encryption technique","volume":"147","author":"Laiphrakpam","year":"2017","journal-title":"Optik"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1016\/j.sigpro.2017.10.004","article-title":"Medical image encryption using high-speed scrambling and pixel adaptive diffusion","volume":"144","author":"Hua","year":"2018","journal-title":"Signal Process."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"22787","DOI":"10.1007\/s11042-017-5534-8","article-title":"A new simple chaotic system and its application in medical image encryption","volume":"77","author":"Liu","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.optlaseng.2018.05.009","article-title":"Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices","volume":"110","author":"Nematzadeh","year":"2018","journal-title":"Opt. Lasers Eng."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"35419","DOI":"10.1007\/s11042-019-08168-x","article-title":"Medical image encryption algorithm based on latin square and memristive chaotic system","volume":"78","author":"Chai","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1016\/j.patrec.2021.10.033","article-title":"Medical image encryption scheme using multiple chaotic maps","volume":"152","author":"Jain","year":"2021","journal-title":"Pattern Recognit. Lett."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1109\/ACCESS.2021.3138718","article-title":"A robust chaos-based technique for medical image encryption","volume":"10","author":"Yasser","year":"2022","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"105542","DOI":"10.1016\/j.compbiomed.2022.105542","article-title":"An efficient multi-level encryption scheme for stereoscopic medical images based on coupled chaotic system and otsu threshold segmentation","volume":"146","author":"Zhang","year":"2022","journal-title":"Comput. Biol. Med."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"4915","DOI":"10.1109\/TNNLS.2021.3062754","article-title":"Deepkeygen: A deep learning-based stream cipher generator for medical image encryption and decryption","volume":"33","author":"Ding","year":"2022","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"111175","DOI":"10.1016\/j.measurement.2022.111175","article-title":"Fastmie: Faster medical image encryption without compromising security","volume":"196","author":"Priyanka","year":"2022","journal-title":"Measurement"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"66345","DOI":"10.1109\/ACCESS.2022.3185206","article-title":"Privacy-preserving deep learning with learnable image encryption on medical images","volume":"10","author":"Huang","year":"2022","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"104546","DOI":"10.1016\/j.micpro.2022.104546","article-title":"Resource optimized selective image encryption of medical images using multiple chaotic systems","volume":"91","author":"Kiran","year":"2022","journal-title":"Microprocess. Microsyst."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"918","DOI":"10.1016\/j.procs.2023.01.072","article-title":"2d lorentz chaotic model coupled with logistic chaotic model for medical image encryption: Towards ensuring security for teleradiology","volume":"218","author":"John","year":"2023","journal-title":"Procedia Comput. Sci."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"100676","DOI":"10.1016\/j.measen.2023.100676","article-title":"Iot based medical image encryption using linear feedback shift register\u2014towards ensuring security for teleradiology applications","volume":"25","author":"John","year":"2023","journal-title":"Meas. Sens."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2089","DOI":"10.1109\/TII.2022.3194590","article-title":"Medical image encryption by content-aware DNA computing for secure healthcare","volume":"19","author":"Wu","year":"2023","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.vlsi.2023.01.008","article-title":"Real-time medical image encryption for h-iot applications using improved sequences from chaotic maps","volume":"90","year":"2023","journal-title":"Integration"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/j.ijleo.2018.06.029","article-title":"Multiple-image encryption by using robust chaotic map in wavelet transform domain","volume":"171","author":"Li","year":"2018","journal-title":"Optik"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"7841","DOI":"10.1007\/s11042-018-6496-1","article-title":"Multiple-image encryption algorithm based on DNA encoding and chaotic system","volume":"78","author":"Zhang","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"107073","DOI":"10.1016\/j.optlastec.2021.107073","article-title":"Multiple-image encryption algorithm based on the 3d scrambling model and dynamic DNA coding","volume":"141","author":"Zhang","year":"2021","journal-title":"Opt. Laser Technol."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"169624","DOI":"10.1016\/j.ijleo.2022.169624","article-title":"A novel multiple grayscale image encryption method based on 3d bit-scrambling and diffusion","volume":"266","year":"2022","journal-title":"Optik"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"168649","DOI":"10.1016\/j.ijleo.2022.168649","article-title":"Security-enhanced multiple-image encryption based on modified iterative phase retrieval algorithm with structured phase mask in fresnel domain","volume":"254","author":"Su","year":"2022","journal-title":"Optik"},{"key":"ref_26","first-page":"1535","article-title":"An effective multiple-image encryption algorithm based on 3d cube and hyperchaotic map","volume":"34","author":"Gao","year":"2022","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"116793","DOI":"10.1016\/j.image.2022.116793","article-title":"Multiple color image encryption based on cascaded quaternion gyrator transforms","volume":"107","author":"Wang","year":"2022","journal-title":"Signal Process. Image Commun."},{"key":"ref_28","first-page":"103408","article-title":"An exquisite multiple image encryption harnessing multi-scroll lu\u2013chen and chua chaotic systems employing domino strategy","volume":"72","author":"Sangavi","year":"2023","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"108609","DOI":"10.1016\/j.compeleceng.2023.108609","article-title":"Multi-layer security based multiple image encryption technique","volume":"106","author":"Sabir","year":"2023","journal-title":"Comput. Electr. Eng."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"107303","DOI":"10.1016\/j.optlaseng.2022.107303","article-title":"Multiple-image encryption using phase jump gradient factors -based oam multiplexing holography","volume":"160","author":"Li","year":"2023","journal-title":"Opt. Lasers Eng."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"943","DOI":"10.1007\/s11042-020-09533-x","article-title":"An efficient batch images encryption method based on DNA encoding and pwlcm","volume":"80","author":"Wang","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"83596","DOI":"10.1109\/ACCESS.2020.2991420","article-title":"Color image encryption algorithm based on DNA coding and double chaos system","volume":"8","author":"Liu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1016\/j.matcom.2021.06.012","article-title":"A novel image encryption algorithm based on spwlcm and DNA coding","volume":"190","author":"Zhang","year":"2021","journal-title":"Math. Comput. Simul."},{"key":"ref_34","first-page":"103340","article-title":"Image encryption algorithm based on improved zigzag transformation and quaternary DNA coding","volume":"70","author":"Wang","year":"2022","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Liu, J., Chang, H., Ran, W., and Wang, E. (2023). Research on Improved DNA Coding and Multidirectional Diffusion Image Encryption Algorithm. Entropy, 25.","DOI":"10.3390\/e25050746"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/25\/6\/898\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:48:30Z","timestamp":1760125710000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/25\/6\/898"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,3]]},"references-count":35,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2023,6]]}},"alternative-id":["e25060898"],"URL":"https:\/\/doi.org\/10.3390\/e25060898","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,3]]}}}