{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,29]],"date-time":"2023-10-29T04:45:26Z","timestamp":1698554726178},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"28","license":[{"start":{"date-parts":[[2023,4,13]],"date-time":"2023-04-13T00:00:00Z","timestamp":1681344000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,13]],"date-time":"2023-04-13T00:00:00Z","timestamp":1681344000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100010426","name":"UGC-DAE Consortium for Scientific Research, University Grants Commission","doi-asserted-by":"publisher","award":["415024"],"id":[{"id":"10.13039\/501100010426","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s11042-023-15033-5","type":"journal-article","created":{"date-parts":[[2023,4,13]],"date-time":"2023-04-13T16:02:54Z","timestamp":1681401774000},"page":"44277-44308","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security of medical images based on special orthogonal group and Galois field"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-0227-4032","authenticated-orcid":false,"given":"Anand B.","family":"Joshi","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3388-9067","authenticated-orcid":false,"given":"Abdul","family":"Gaffar","sequence":"additional","affiliation":[]},{"given":"Sonali","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,13]]},"reference":[{"issue":"8","key":"15033_CR1","doi-asserted-by":"publisher","first-page":"1353","DOI":"10.3844\/jcssp.2012.1353.1357","volume":"8","author":"WMF Abdel-Rehim","year":"2012","unstructured":"Abdel-Rehim WMF, Ismail IA, Morsy E (2012) Testing randomness: Poker test with hands of three numbers. J Comput Sci 8(8):1353\u20131357","journal-title":"J Comput Sci"},{"issue":"2","key":"15033_CR2","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1080\/19393555.2020.1718248","volume":"29","author":"PT Akkasaligar","year":"2020","unstructured":"Akkasaligar PT, Biradar S (2020) Selective medical image encryption using DNA cryptography. Inf Secur J: A Glob Perspect 29(2):91\u2013101. https:\/\/doi.org\/10.1080\/19393555.2020.1718248","journal-title":"Inf Secur J: A Glob Perspect"},{"key":"15033_CR3","doi-asserted-by":"publisher","first-page":"71974","DOI":"10.1109\/ACCESS.2020.2987615","volume":"8","author":"TS Ali","year":"2020","unstructured":"Ali TS, Ali R (2020) A novel medical image signcryption scheme using TLTS and Henon chaotic map. IEEE Access 8:71974\u201371992. https:\/\/doi.org\/10.1109\/ACCESS.2020.2987615","journal-title":"IEEE Access"},{"issue":"2","key":"15033_CR4","doi-asserted-by":"publisher","first-page":"67","DOI":"10.5815\/ijcnis.2022.02.06","volume":"14","author":"SF Alqazzaz","year":"2022","unstructured":"Alqazzaz SF, Elsharawy GA, Eid HF (2022) Robust 4-D hyperchaotic DNA framework for medical image encryption. Int J Comput Netw Inf Secur 14 (2):67\u201376. https:\/\/doi.org\/10.5815\/ijcnis.2022.02.06","journal-title":"Int J Comput Netw Inf Secur"},{"key":"15033_CR5","volume-title":"Pi \u2013 Unleashed","author":"J Arndt","year":"2006","unstructured":"Arndt J, Haenel C (2006) Pi \u2013 Unleashed. Springer, Berlin, Heidelberg"},{"key":"15033_CR6","unstructured":"Available from https:\/\/en.wikipedia.org\/wiki\/Peak_signal-to-noise_ratio. Accessed 06 Oct 2022"},{"key":"15033_CR7","unstructured":"Available from https:\/\/mathworld.wolfram.com\/Pi.html. Accessed 06 Oct 2022"},{"key":"15033_CR8","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/s10916-018-1053-z","volume":"42","author":"T Avudaiappan","year":"2018","unstructured":"Avudaiappan T, Balasubramanian R, Pandiyan SS, Saravanan M, Lakshmanaprabu MK, Shankar K (2018) Medical image security using dual encryption with oppositional based optimization algorithm. J Med Syst 42:208. https:\/\/doi.org\/10.1007\/s10916-018-1053-z","journal-title":"J Med Syst"},{"key":"15033_CR9","doi-asserted-by":"publisher","first-page":"10723","DOI":"10.1007\/s11042-020-09930-2","volume":"80","author":"RC Barik","year":"2021","unstructured":"Barik RC, Changder S (2021) A novel and efficient amino acid codon based medical image encryption scheme colligating multiple chaotic maps. Multimed Tools Appl 80:10723\u201310760. https:\/\/doi.org\/10.1007\/s11042-020-09930-2","journal-title":"Multimed Tools Appl"},{"key":"15033_CR10","doi-asserted-by":"publisher","first-page":"36667","DOI":"10.1109\/ACCESS.2019.2906292","volume":"7","author":"A Belazi","year":"2019","unstructured":"Belazi A, Talha M, Kharbech S, Xiang W (2019) Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access 7:36667\u201336681. https:\/\/doi.org\/10.1109\/ACCESS.2019.2906292","journal-title":"IEEE Access"},{"key":"15033_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential cryptanalysis of the Data Encryption Standard (DES)","author":"E Biham","year":"1993","unstructured":"Biham E, Shamir A (1993) Differential cryptanalysis of the Data Encryption Standard (DES). Springer, New York"},{"key":"15033_CR12","unstructured":"Bogart S (1999) What is pi, and how did it originate? Scientific American. Available from: https:\/\/www.scientificamerican.com\/article\/what-is-pi-and-how-did-it-originate\/. Accessed 06 Oct 2022"},{"key":"15033_CR13","unstructured":"CT-Training-BE001 database Available from: https:\/\/data.iplantcollaborative.org\/dav-anon\/iplant\/projects\/TCIA\/SPIE-AAPM%20Lung%20CT%20Challenge\/CT-Training-BE001\/1.2.840.113704.1.111.2112.1167842143.1\/1.2.840.113704.1.111.2112.1167842347.17\/. Accessed 06 Oct 2022"},{"issue":"1","key":"15033_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.matcom.2004.09.001","volume":"68","author":"JCH Castro","year":"2005","unstructured":"Castro JCH, Sierra JM, Seznec A, Izquierdo A, Ribagorda A (2005) The strict avalanche criterion randomness test. Math Comput Simul 68(1):1\u20137","journal-title":"Math Comput Simul"},{"key":"15033_CR15","doi-asserted-by":"publisher","first-page":"6729896","DOI":"10.1155\/2017\/6729896","volume":"2017","author":"J Chandrasekaran","year":"2017","unstructured":"Chandrasekaran J, Thiruvengadam SJ (2017) A hybrid chaotic and number theoretic approach for securing DICOM images. Secur Commun Netw 2017:6729896. https:\/\/doi.org\/10.1155\/2017\/6729896","journal-title":"Secur Commun Netw"},{"key":"15033_CR16","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/s11071-019-04791-3","volume":"96","author":"J Chen","year":"2019","unstructured":"Chen J, Chen L, Zhang LY, Zhu ZL (2019) Medical image cipher using hierarchical diffusion and non-sequential encryption. Nonlinear Dyn 96:301\u2013322. https:\/\/doi.org\/10.1007\/s11071-019-04791-3","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"15033_CR17","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1214\/aoms\/1177729380","volume":"23","author":"WG Cochran","year":"1952","unstructured":"Cochran WG (1952) The chi-square test of goodness of fit. Ann Math Stat 23(3):315\u2013345","journal-title":"Ann Math Stat"},{"key":"15033_CR18","unstructured":"Computed tomography images of Mikael H\u00e4ggstr\u00f6m\u2019s brain Available from: https:\/\/commons.wikimedia.org\/wiki\/Category:Computed_tomography_images_of_Mikael_H%C3%A4ggstr%C3%B6m%27s_brain. Accessed 06 Oct 2022"},{"key":"15033_CR19","unstructured":"CrypTool (2017) An open-source windows program for cryptography and cryptanalysis. Available from: https:\/\/www.cryptool.org\/en\/. Accessed 06 Oct 2022"},{"key":"15033_CR20","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/s11277-019-06420-z","volume":"108","author":"JC Dagadu","year":"2019","unstructured":"Dagadu JC, Li JP, Aboagye EO (2019) Medical image encryption based on hybrid chaotic DNA diffusion. Wirel Pers Commun 108:591\u2013612. https:\/\/doi.org\/10.1007\/s11277-019-06420-z","journal-title":"Wirel Pers Commun"},{"issue":"1","key":"15033_CR21","doi-asserted-by":"publisher","first-page":"83","DOI":"10.6633\/IJNS.20190121(1).10","volume":"21","author":"JC Dagadu","year":"2019","unstructured":"Dagadu JC, Li J, Aboagye EO, Deynu FK (2019) Medical image encryption scheme based on multiple chaos and DNA coding. Int J Netw Secur 21 (1):83\u201390. https:\/\/doi.org\/10.6633\/IJNS.20190121(1).10","journal-title":"Int J Netw Secur"},{"issue":"4","key":"15033_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S0218001416570019","volume":"30","author":"Y Dai","year":"2016","unstructured":"Dai Y, Wang H (2016) Chaotic medical image encryption algorithm based on bit-plane decomposition. Int J Pattern Recognit Artif Intell 30(4):1\u201315. https:\/\/doi.org\/10.1142\/S0218001416570019","journal-title":"Int J Pattern Recognit Artif Intell"},{"key":"15033_CR23","unstructured":"Digital Imaging and Communications in Medicine (DICOM) documentation Available from: http:\/\/medical.nema.org\/standard.html. Accessed 06 Oct 2022"},{"key":"15033_CR24","volume-title":"Abstract algebra","author":"D Dummit","year":"2004","unstructured":"Dummit D, Foote R (2004) Abstract algebra, 3rd. Wiley, New Jersey","edition":"3rd"},{"key":"15033_CR25","unstructured":"ECRYPT II yearly report on algorithms and keysizes (2011\u20132012) Editor Nigel Smart (BRIS). Available from: https:\/\/www.ecrypt.eu.org\/ecrypt2\/documents\/D.SPA.20.pdf. Accessed 06 Oct 2022"},{"key":"15033_CR26","unstructured":"Euclidean Algorithm Encyclopedia of Mathematics. Available from: http:\/\/encyclopediaofmath.org\/index.php?title=Euclidean_algorithm&oldid=35888. Accessed 06 Oct 2022"},{"key":"15033_CR27","unstructured":"Field. Encyclopedia of Mathematics. Available from http:\/\/encyclopediaofmath.org\/index.php?title=Field&oldid=17014. Accessed 06 Oct 2022"},{"issue":"5","key":"15033_CR28","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1038\/scientificamerican0573-15","volume":"228","author":"H Fiestel","year":"1973","unstructured":"Fiestel H (1973) Cryptography and computer privacy. Sci Am 228 (5):15\u201323. https:\/\/doi.org\/10.1038\/scientificamerican0573-15","journal-title":"Sci Am"},{"key":"15033_CR29","unstructured":"Fisher RA, Yates F (1958) Statistical Methods for Research Workers, 13th edn. US, New York: Hafner"},{"issue":"6612390","key":"15033_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/6612390","volume":"2020","author":"M Gafsi","year":"2020","unstructured":"Gafsi M, Abbassi N, Hajjaji MA, Malek J, Mtibaa A (2020) Improved chaos-based cryptosystem for medical image encryption and decryption. Sci Program 2020(6612390):1\u201322. https:\/\/doi.org\/10.1155\/2020\/6612390","journal-title":"Sci Program"},{"key":"15033_CR31","unstructured":"Galois field. Encyclopedia of Mathematics. Available from http:\/\/encyclopediaofmath.org\/index.php?title=Galois_field&oldid=34238. Accessed 06 Oct 2022"},{"issue":"1","key":"15033_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJSSCI.285593","volume":"14","author":"A Gaurav","year":"2022","unstructured":"Gaurav A, Psannis K, Perakovi\u0107 D (2022) Security of cloud-based Medical Internet of Things (MIoTs): A survey. Int J Software Sci Comput Intell 14(1):1\u201316. https:\/\/doi.org\/10.4018\/IJSSCI.285593","journal-title":"Int J Software Sci Comput Intell"},{"key":"15033_CR33","doi-asserted-by":"publisher","first-page":"1925","DOI":"10.1007\/s11042-020-09672-1","volume":"80","author":"R Guesmi","year":"2021","unstructured":"Guesmi R, Farah MAB (2021) A new efficient medical image cipher based on hybrid chaotic map and DNA code. Multimed Tool Appl 80:1925\u20131944. https:\/\/doi.org\/10.1007\/s11042-020-09672-1","journal-title":"Multimed Tool Appl"},{"key":"15033_CR34","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.sigpro.2017.10.004","volume":"144","author":"Z Hua","year":"2018","unstructured":"Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high speed scrambling and pixel adaptive diffusion. Signal Process 144:134\u2013144. https:\/\/doi.org\/10.1016\/j.sigpro.2017.10.004","journal-title":"Signal Process"},{"key":"15033_CR35","doi-asserted-by":"publisher","first-page":"160433","DOI":"10.1109\/ACCESS.2020.3020746","volume":"8","author":"S Ibrahim","year":"2020","unstructured":"Ibrahim S, Alhumyani H, Masud M, Alshamrani SS, Cheikhrouhou O, Muhammad G, Hossain MS, Abbas AM (2020) Framework for efficient medical image encryption using dynamic S-Boxes and chaotic maps. IEEE Access 8:160433\u2013160449. https:\/\/doi.org\/10.1109\/ACCESS.2020.3020746","journal-title":"IEEE Access"},{"key":"15033_CR36","doi-asserted-by":"publisher","unstructured":"Ismail R, Fattah A, Saqr HM, Nasr ME (2022) An efficient medical image encryption schemefor (WBAN) based on adaptive DNA and modern multi-chaotic map. Multimed Tool Appl. https:\/\/doi.org\/10.1007\/s11042-022-13343-8","DOI":"10.1007\/s11042-022-13343-8"},{"key":"15033_CR37","doi-asserted-by":"publisher","unstructured":"Jeevitha S, Prabha NA (2021) Novel medical image encryption using DWT block based scrambling and edge maps, vol 12. https:\/\/doi.org\/10.1007\/s12652-020-02399-9","DOI":"10.1007\/s12652-020-02399-9"},{"key":"15033_CR38","doi-asserted-by":"publisher","first-page":"37855","DOI":"10.1109\/ACCESS.2021.3063237","volume":"9","author":"ST Kamal","year":"2021","unstructured":"Kamal ST, Hosny KM, Elgindy TM, Darwish MM, Fouda MM (2021) A new image encryption algorithm for grey and color medical images. IEEE Access 9:37855\u201337865. https:\/\/doi.org\/10.1109\/ACCESS.2021.3063237","journal-title":"IEEE Access"},{"key":"15033_CR39","doi-asserted-by":"publisher","first-page":"2517","DOI":"10.1007\/s11517-019-02037-3","volume":"57","author":"S Kumar","year":"2019","unstructured":"Kumar S, Panna B, Jha RK (2019) Medical image encryption using fractional discrete cosine transform with chaotic function. Med Biol Eng Comput 57:2517\u20132533. https:\/\/doi.org\/10.1007\/s11517-019-02037-3","journal-title":"Med Biol Eng Comput"},{"key":"15033_CR40","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/s10278-013-9657-9","volume":"27","author":"M Larobina","year":"2014","unstructured":"Larobina M, Murino L (2014) Medical image file formats. J Digit Imaging 27:200\u2013206. https:\/\/doi.org\/10.1007\/s10278-013-9657-9","journal-title":"J Digit Imaging"},{"key":"15033_CR41","doi-asserted-by":"publisher","unstructured":"Li M, Pan S, Meng W, Guoyong W, Ji Z, Wang L (2022) Medical image encryption algorithm based on hyper-chaotic system and DNA coding. Cognitive Computation and Systems, pp 1\u201313. https:\/\/doi.org\/10.1049\/ccs2.12070","DOI":"10.1049\/ccs2.12070"},{"key":"15033_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/6624809","volume":"6624809","author":"S Li","year":"2021","unstructured":"Li S, Zhao L, Yang N (2021) Medical image encryption based on 2D zigzag confusion and dynamic diffusion. Secur Commun Netw 6624809:1\u201323. https:\/\/doi.org\/10.1155\/2021\/6624809","journal-title":"Secur Commun Netw"},{"key":"15033_CR43","first-page":"1","volume":"35","author":"JB Lima","year":"2015","unstructured":"Lima JB, Madeiro F, Sales FJR (2015) Encryption of medical images based on the cosine number transform. Signal Process: Image Commun 35:1\u20138. 10.1016\/j.image.2015.03.005","journal-title":"Signal Process: Image Commun"},{"key":"15033_CR44","doi-asserted-by":"publisher","first-page":"1637","DOI":"10.1007\/s11045-018-0622-0","volume":"30","author":"J Liu","year":"2019","unstructured":"Liu J, Tang S, Lian J, Ma Y, Zhang X (2019) A novel fourth order chaotic system and its algorithm for medical image encryption. Multidimens Syst Signal Process 30:1637\u20131657. https:\/\/doi.org\/10.1007\/s11045-018-0622-0","journal-title":"Multidimens Syst Signal Process"},{"key":"15033_CR45","unstructured":"Medical Image Samples Available from: https:\/\/barre.dev\/medical\/samples\/. Accessed 06 Oct 2022"},{"key":"15033_CR46","doi-asserted-by":"publisher","first-page":"100396","DOI":"10.1016\/j.imu.2020.100396","volume":"20","author":"S Mortajez","year":"2020","unstructured":"Mortajez S, Tahmasbi M, Zarei J, Jamshidnezhad A (2020) A novel chaotic encryption scheme based on efficient secret keys and confusion technique for confidential of DICOM images. Inform Med Unlocked 20:100396. https:\/\/doi.org\/10.1016\/j.imu.2020.100396","journal-title":"Inform Med Unlocked"},{"key":"15033_CR47","unstructured":"Mullican T (2019) Calculating pi: My attempt at breaking the pi world record. Bits and Bytes. Available from: https:\/\/blog.timothymullican.com\/calculating-pi-my-attempt-breaking-pi-record. Accessed 06 Oct 2022"},{"key":"15033_CR48","unstructured":"Mullican T (2020) Most accurate value of pi. Guinness World Records. Available from: https:\/\/www.guinnessworldrecords.com\/world-records\/66179-most-accurate-value-of-pi. Accessed 06 Oct 2022"},{"key":"15033_CR49","unstructured":"NIH image database Available from: https:\/\/nihcc.app.box.com\/v\/ChestXray-NIHCC\/folder\/37178474737 (images_001.tar.gz folder). Accessed 06 Oct 2022"},{"key":"15033_CR50","unstructured":"NLM\u2019s MedPix database Available from: https:\/\/medpix.nlm.nih.gov\/search?allen=true&allt=true&alli=true&query=Synpic57851. Accessed 06 Oct 2022"},{"key":"15033_CR51","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.optlaseng.2018.05.009","volume":"110","author":"H Nematzadeh","year":"2018","unstructured":"Nematzadeh H, Enayatifar R, Motameni H, Guimar\u00e3es FG, Coelho VN (2018) Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices. Opt Lasers Eng 110:24\u201332. https:\/\/doi.org\/10.1016\/j.optlaseng.2018.05.009","journal-title":"Opt Lasers Eng"},{"key":"15033_CR52","unstructured":"Orthogonal group. Encyclopedia of Mathematics. Available from: http:\/\/encyclopediaofmath.org\/index.php?title=Orthogonal_group&oldid=34320. Accessed 06 Oct 2022"},{"key":"15033_CR53","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1007\/s00500-014-1539-7","volume":"20","author":"NK Pareek","year":"2016","unstructured":"Pareek NK, Patidar V (2016) Medical image protection using genetic algorithm operations. Soft Comput 20:763\u2013772. https:\/\/doi.org\/10.1007\/s00500-014-1539-7","journal-title":"Soft Comput"},{"key":"15033_CR54","first-page":"343","volume":"186","author":"K Pearson","year":"1895","unstructured":"Pearson K (1895) Contributions to the mathematical theory of evolution.\u2013II. Skew variation in homogeneous material. Philos Trans Royal Soc: A Math Phys Eng Sci 186:343\u2013414","journal-title":"Philos Trans Royal Soc: A Math Phys Eng Sci"},{"issue":"5","key":"15033_CR55","first-page":"302:157","volume":"50","author":"K Pearson","year":"1900","unstructured":"Pearson K (1900) On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling. Philos Mag 50(5):302:157\u2013175","journal-title":"Philos Mag"},{"issue":"5","key":"15033_CR56","doi-asserted-by":"publisher","first-page":"7795","DOI":"10.3233\/JIFS-201146","volume":"39","author":"O Reyad","year":"2020","unstructured":"Reyad O, Hamed K, Karar ME (2020) Hash-enhanced elliptic curve bit-string generator for medical image encryption. J Intell Fuzzy Syst 39 (5):7795\u20137806. https:\/\/doi.org\/10.3233\/JIFS-201146","journal-title":"J Intell Fuzzy Syst"},{"key":"15033_CR57","doi-asserted-by":"publisher","first-page":"59108","DOI":"10.1109\/ACCESS.2021.3071535","volume":"9","author":"A Shafique","year":"2021","unstructured":"Shafique A, Ahmed J, Rehman MU, Hazzazi MM (2021) Noise-resistant image encryption scheme for medical images in the chaos and wavelet domain. IEEE Access 9:59108\u201359130. https:\/\/doi.org\/10.1109\/ACCESS.2021.3071535","journal-title":"IEEE Access"},{"key":"15033_CR58","doi-asserted-by":"publisher","first-page":"77145","DOI":"10.1109\/ACCESS.2018.2874026","volume":"6","author":"K Shankar","year":"2018","unstructured":"Shankar K, Elhoseny M, Chelvi ED, Lakshmanaprabu SK, Wanqing WU (2018) An efficient optimal key based chaos function for medical image security. IEEE Access 6:77145\u201377154. https:\/\/doi.org\/10.1109\/ACCESS.2018.2874026","journal-title":"IEEE Access"},{"issue":"3","key":"15033_CR59","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379\u2013423","journal-title":"Bell Syst Tech J"},{"issue":"4","key":"15033_CR60","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech 28(4):656\u2013715","journal-title":"Bell Syst Tech"},{"key":"15033_CR61","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.ijleo.2017.08.028","volume":"147","author":"LD Singh","year":"2017","unstructured":"Singh LD, Singh KM (2017) Medical image encryption based on improved ElGamal encryption technique. Optik \u2013 Int J Light Electron Optics 147:88\u2013102. doi:10.1016\/j.ijleo.2017.08.028","journal-title":"Optik \u2013 Int J Light Electron Optics"},{"key":"15033_CR62","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s10916-019-1389-z","volume":"43","author":"S Stalin","year":"2019","unstructured":"Stalin S, Maheshwary P, Shukla PK, Maheshwari M, Gour B, Khare A (2019) Fast and secure medical image encryption based on nonlinear 4D logistic map and DNA sequences. J Med Syst 43:267. https:\/\/doi.org\/10.1007\/s10916-019-1389-z","journal-title":"J Med Syst"},{"key":"15033_CR63","unstructured":"The mini-MIAS database of mammograms (2022) Available from: http:\/\/peipa.essex.ac.uk\/pix\/mias\/. Accessed 06 Oct 2022"},{"issue":"5","key":"15033_CR64","doi-asserted-by":"publisher","first-page":"776","DOI":"10.6633\/IJNS.201709.19(5).15","volume":"19","author":"O Wahballa","year":"2017","unstructured":"Wahballa O, Wahaballa A, Li F, Idris II, Xu C (2017) Medical image encryption scheme based on Arnold transformation and ID-AK protocol. Int J Netw Secur 19(5):776\u2013784. https:\/\/doi.org\/10.6633\/IJNS.201709.19(5).15","journal-title":"Int J Netw Secur"},{"key":"15033_CR65","doi-asserted-by":"publisher","first-page":"49945","DOI":"10.1109\/ACCESS.2019.2910563","volume":"7","author":"N Wang","year":"2019","unstructured":"Wang N, Di G, Lv X, Hou M, Liu D, Zhangi J, Duan X (2019) Galois field-based image encryption for remote transmission of tumor ultrasound images. IEEE Access 7:49945\u201349950. https:\/\/doi.org\/10.1109\/ACCESS.2019.2910563","journal-title":"IEEE Access"},{"key":"15033_CR66","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Journal of Selected Areas in Telecommunications, pp 31\u201338"},{"key":"15033_CR67","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1109\/ACCESS.2021.3138718","volume":"10","author":"I Yasser","year":"2022","unstructured":"Yasser I, Khalil AT, Mohamed MA, Samra AS, Khalifa F (2022) A robust chaos-based technique for medical image encryption. IEEE Access 10:244\u2013257. https:\/\/doi.org\/10.1109\/ACCESS.2021.3138718","journal-title":"IEEE Access"},{"key":"15033_CR68","doi-asserted-by":"publisher","unstructured":"Yin S, Li H (2020) GSAPSO-MQ: Medical image encryption based on genetic simulated annealing particle swarm optimization and modified quantum chaos system. Evolutionary Intelligence. https:\/\/doi.org\/10.1007\/s12065-020-00440-6","DOI":"10.1007\/s12065-020-00440-6"},{"issue":"3","key":"15033_CR69","doi-asserted-by":"publisher","first-page":"421","DOI":"10.6633\/IJNS.20200522(3).07","volume":"22","author":"S Yin","year":"2019","unstructured":"Yin S, Liu J, Teng L (2019) Improved elliptic curve cryptography with homomorphic encryption for medical image encryption. Int J Netw Secur 22(3):421\u2013426. https:\/\/doi.org\/10.6633\/IJNS.20200522(3).07","journal-title":"Int J Netw Secur"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15033-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15033-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15033-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T06:29:33Z","timestamp":1698474573000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15033-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,13]]},"references-count":69,"journal-issue":{"issue":"28","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["15033"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15033-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,13]]},"assertion":[{"value":"20 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 April 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}