{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:23:24Z","timestamp":1740122604074,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T00:00:00Z","timestamp":1642636800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T00:00:00Z","timestamp":1642636800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s11277-022-09519-y","type":"journal-article","created":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T20:02:59Z","timestamp":1642708979000},"page":"3413-3444","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Approach of Secret Sharing Technique Based on Convolution Neural Network and DNA Sequence for Data Security in Wireless Communication"],"prefix":"10.1007","volume":"124","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2149-7138","authenticated-orcid":false,"given":"Anirban","family":"Bhowmik","sequence":"first","affiliation":[]},{"given":"Sunil","family":"Karforma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,20]]},"reference":[{"key":"9519_CR1","unstructured":"Stallings, W. (2015). Cryptography and network security (pp. 111\u2013155). Pearson Education Service."},{"issue":"2","key":"9519_CR2","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/TIT.1983.1056651","volume":"29","author":"C Asmuth","year":"1983","unstructured":"Asmuth, C., & Bloom, J. (1983). A modular to key safeguarding. IEEE Transaction on Information Theory, 29(2), 208\u2013210.","journal-title":"IEEE Transaction on Information Theory"},{"key":"9519_CR3","doi-asserted-by":"crossref","unstructured":"Blakley, G. R. (1979). Safeguarding cryptographic keys. In Proceedings of AFIPS International Worhshop on Managing Requirements Knowledge, pp. 313.","DOI":"10.1109\/MARK.1979.8817296"},{"issue":"10","key":"9519_CR4","doi-asserted-by":"publisher","first-page":"1338","DOI":"10.1016\/j.ins.2005.02.010","volume":"176","author":"HF Huang","year":"2006","unstructured":"Huang, H. F., & Chang, C. C. (2006). A novel efficient (t, n) threshold proxy signature scheme. Information Sciences, 176(10), 1338\u20131349.","journal-title":"Information Sciences"},{"key":"9519_CR5","doi-asserted-by":"crossref","unstructured":"De Santis, A., Desmedt, Y., Frankel, Y., & Yung, M. (1994). How to share a function securely. In\u00a0Proceedings of the twenty-sixth annual ACM symposium on Theory of computing\u00a0(pp. 522-533).","DOI":"10.1145\/195058.195405"},{"issue":"3","key":"9519_CR6","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/LGRS.2016.2643000","volume":"14","author":"J Dong","year":"2017","unstructured":"Dong, J., Wang, H., Yang, Y., & Liu, L. (2017). Learning and transferring convolutional neural network knowledge to ocean front recognition. IEEE Geoscience and Remote Sensing Letters, 14(3), 354\u2013358.","journal-title":"IEEE Geoscience and Remote Sensing Letters"},{"issue":"7","key":"9519_CR7","doi-asserted-by":"publisher","first-page":"12","DOI":"10.5120\/2375-3129","volume":"19","author":"PK Naskar","year":"2011","unstructured":"Naskar, P. K., Khan, H. N., Chaudhuri, A., & Chaudhuri, A. (2011). Ultra secured and authentic key distribution protocol using a novel secret sharing technique. International Journal of Computer Applications, 19(7), 12\u201315.","journal-title":"International Journal of Computer Applications"},{"key":"9519_CR8","unstructured":"Sushma, L., & Lakshmi, K. P. (2020). An analysis of convolution neural network for image classification using different models. In International Journal of Engineering Research and Technology (IJERT) Volume 09, Issue 10 (October 2020),"},{"key":"9519_CR9","doi-asserted-by":"publisher","first-page":"3119","DOI":"10.1007\/s10586-017-1009-y","volume":"20","author":"Y Zhang","year":"2017","unstructured":"Zhang, Y., et al. (2017). An optimized DNA based encryption scheme with enforced secure key distribution. Cluster Computing, 20, 3119\u20133130. https:\/\/doi.org\/10.1007\/s10586-017-1009-y","journal-title":"Cluster Computing"},{"key":"9519_CR10","first-page":"818","volume-title":"European Conference on Computer Vision","author":"MD Zeiler","year":"2014","unstructured":"Zeiler, M. D., & Fergus, R. (2014). Visualizing and understanding convolutional networks. European Conference on Computer Vision (pp. 818\u2013833). Cham: Springer."},{"key":"9519_CR11","doi-asserted-by":"crossref","unstructured":"Sakshi, I., et al. (2018) Conceptual understanding of convolutional neural network\u2014A deep learning approach. In Proceedings of the International Conference on Computational Intelligence and Data Science (ICCIDS 2018), 132 (2018) 679\u2013688.","DOI":"10.1016\/j.procs.2018.05.069"},{"key":"9519_CR12","volume-title":"Handbook of Natural Computing","author":"L Kari","year":"2012","unstructured":"Kari, L., Seki, S., & Sosk, P. (2012). DNA computing\u2014Foundations and implications. Handbook of Natural Computing. Berlin: Springer."},{"key":"9519_CR13","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1155\/2020\/8856801","volume":"2020","author":"MI Uddin","year":"2020","unstructured":"Uddin, M. I., Shah, S. A. A., & Al-Khasawneh, M. A. (2020). A novel deep convolutional neural network model to monitor people following guidelines to avoid COVID-19. Journal of Sensors, 2020, 15. https:\/\/doi.org\/10.1155\/2020\/8856801","journal-title":"Journal of Sensors"},{"issue":"19","key":"9519_CR14","doi-asserted-by":"publisher","first-page":"28154","DOI":"10.1364\/OE.402958","volume":"28","author":"L Chen","year":"2020","unstructured":"Chen, L., Peng, BoYan, Gan, W., & Liu, Y. (2020). Plaintext attack on joint transforms correlation encryption system by convolutional neural network. Optics Express, 28(19), 28154\u201328163.","journal-title":"Optics Express"},{"key":"9519_CR15","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/OJITS.2020.2996063","volume":"1","author":"VM Lidkea","year":"2020","unstructured":"Lidkea, V. M., Muresan, R., & Al-Dweik, A. (2020). Convolutional neural network framework for encrypted image classification in cloud-based ITS. IEEE Open Journal of Intelligent Transportation Systems, 1, 35\u201350. https:\/\/doi.org\/10.1109\/OJITS.2020.2996063","journal-title":"IEEE Open Journal of Intelligent Transportation Systems"},{"issue":"2","key":"9519_CR16","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1109\/TSM.2017.2676245","volume":"30","author":"KB Lee","year":"2017","unstructured":"Lee, K. B., Cheon, S., & Kim, C. O. (2017). A convolutional neural network for fault classification and diagnosis in semiconductor manufacturing processes. IEEE Transactions on Semiconductor Manufacturing, 30(2), 135\u2013142.","journal-title":"IEEE Transactions on Semiconductor Manufacturing"},{"issue":"11","key":"9519_CR17","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A. (1979). How to share a secret? Comm ACM, 22(11), 612\u2013613.","journal-title":"Comm ACM"},{"key":"9519_CR18","doi-asserted-by":"crossref","unstructured":"Desmedt, Y. (1997). Some recent research aspects of threshold Cryptography. Proceeding of ISW\u201f97 1st International Information Security Workshop vol. 1196 of LNCS (pp. 158\u2013173). Springer.","DOI":"10.1007\/BFb0030418"},{"issue":"3","key":"9519_CR19","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/S1005-8885(08)60109-0","volume":"15","author":"F Zheng","year":"2008","unstructured":"Zheng, F., Tian, X. J., Song, J. Y., & Li, X. Y. (2008). Pseudo-random sequence generator based on the generalized henon map. The Journal of China Universities of Posts and Telecommunications, 15(3), 64\u201368.","journal-title":"The Journal of China Universities of Posts and Telecommunications"},{"key":"9519_CR20","doi-asserted-by":"crossref","unstructured":"Desmedt, Y. (1997). Some recent research aspects of threshold cryptography. Proc of ISW\u201997 1st International information security workshop, vol 1196 of LNCS paper (pp. 158\u2013173). Springer-Verlag.","DOI":"10.1007\/BFb0030418"},{"key":"9519_CR21","doi-asserted-by":"crossref","unstructured":"Mandal, B. K., Bhattacharyya, D., & Bandyopadhyay, S. K. (2013). Designing and performance analysis of a proposed symmetric cryptography algorithm In Proceedings of the International Conference on Communication Systems and Network Technologies (CSNT 2013), April 6\u20138 2013, Gwalior, India, pp. 453\u2013461.","DOI":"10.1109\/CSNT.2013.101"},{"key":"9519_CR22","doi-asserted-by":"crossref","unstructured":"Bhowmik, A., et al. (2020) Fuzzy-based session key as restorative power of symmetric key encryption for secured wireless communication. In Proceedings of the 2nd International Conference on Communication, Devices and Computing, Lecture Notes in Electrical Engineering 602. \u00a9 Springer Nature Singapore Pte Ltd.2020. pp.171\u2013184.","DOI":"10.1007\/978-981-15-0829-5_17"},{"issue":"4","key":"9519_CR23","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s41939-019-00049-y","volume":"2","author":"V Kakkad","year":"2019","unstructured":"Kakkad, V., Patel, M., & Shah, M. (2019). Biometric authentication and image encryption for image security in cloudframework. Multiscale and Multidisciplinary Modeling, Experiments and Design, 2(4), 233\u2013248.","journal-title":"Multiscale and Multidisciplinary Modeling, Experiments and Design"},{"issue":"2","key":"9519_CR24","first-page":"424","volume":"4","author":"S Khatri","year":"2016","unstructured":"Khatri, S., Mathur, A., & Sharma, S. (2016). Parallel implementation of cryptographic algorithm for image encryption. International Journal for Technological Research in Engineering, 4(2), 424\u2013426.","journal-title":"International Journal for Technological Research in Engineering"},{"issue":"7","key":"9519_CR25","first-page":"49","volume":"11","author":"HN Abdullah","year":"2015","unstructured":"Abdullah, H. N., Hreshee, S. S., & Jawad, A. K. (2015). Design of efficient noise reduction scheme for secure speech masked by chaotic signals. Journal of American Science, 11(7), 49\u201355.","journal-title":"Journal of American Science"},{"key":"9519_CR26","doi-asserted-by":"publisher","first-page":"1925","DOI":"10.1007\/s11042-020-09672-1","volume":"80","author":"R Guesmi","year":"2021","unstructured":"Guesmi, R., & Farah, M. A. B. (2021). A new efficient medical image cipher based on hybrid chaotic map and DNA code. Multimedia Tools and Applications, 80, 1925\u20131944. https:\/\/doi.org\/10.1007\/s11042-020-09672-1","journal-title":"Multimedia Tools and Applications"},{"key":"9519_CR27","doi-asserted-by":"crossref","unstructured":"Blakley, G. R. (1979). Safeguarding cryptographic keys. In\u00a0International Workshop on Managing Requirements Knowledge (pp. 313-313).","DOI":"10.1109\/MARK.1979.8817296"},{"key":"9519_CR28","doi-asserted-by":"publisher","first-page":"1535","DOI":"10.1049\/iet-ipr.2019.0051","volume":"13","author":"M Guan","year":"2019","unstructured":"Guan, M., Yang, X., & Hu, W. (2019). Chaotic image encryption algorithm using frequency-domain DNA encoding. IET Image Process, 13, 1535\u20131539.","journal-title":"IET Image Process"},{"issue":"9","key":"9519_CR29","doi-asserted-by":"publisher","first-page":"17","DOI":"10.5120\/ijca2016908497","volume":"135","author":"MF Abd Elzaher","year":"2016","unstructured":"Abd Elzaher, M. F., Shalaby, M., & El Ramly, S. H. (2016). Securing modern voice communication systems using multilevel chaotic approach. International Journal of Computer Applications, 135(9), 17\u201321.","journal-title":"International Journal of Computer Applications"},{"key":"9519_CR30","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai, X., Chen, Y., & Broyde, L. (2017). A novel chaos-based image encryption algorithm using DNA sequence operations. Optics and Lasers in Engineering, 88, 197\u2013213.","journal-title":"Optics and Lasers in Engineering"},{"issue":"12","key":"9519_CR31","first-page":"410","volume":"3","author":"P Singh","year":"2014","unstructured":"Singh, P., et al. (2014). Symmetric key cryptography: Current trends. International Journal of Computer Science and Mobile Computing, 3(12), 410\u2013415.","journal-title":"International Journal of Computer Science and Mobile Computing"},{"key":"9519_CR32","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1016\/j.ins.2018.02.060","volume":"479","author":"D Li","year":"2019","unstructured":"Li, D., Deng, L., Gupta, B. B., Wang, H., & Choi, C. (2019). A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Information Sciences, 479, 432\u2013447.","journal-title":"Information Sciences"},{"key":"9519_CR33","doi-asserted-by":"crossref","unstructured":"He, K., Gkioxari, G., Doll\u00e1r, P., & Girshick, R. (2017). Mask R-CNN. In Proceedings of the IEEE International Conference on Computer Vision (pp. 2961\u20132969).","DOI":"10.1109\/ICCV.2017.322"},{"issue":"4","key":"9519_CR34","doi-asserted-by":"publisher","first-page":"6500","DOI":"10.3390\/s140406500","volume":"14","author":"A Peinado","year":"2014","unstructured":"Peinado, A., Munilla, J., & F\u00faster-Sabater, A. (2014). EPCGen2 pseudorandom number generators: analysis of J3Gen. Sensors, 14(4), 6500\u20136515.","journal-title":"Sensors"},{"issue":"6","key":"9519_CR35","first-page":"169","volume":"10","author":"GA Sathishkumar","year":"2011","unstructured":"Sathishkumar, G. A., & Bhoopathy Bagan, K. (2011). A novel image encryption algorithm using pixel shuffling and BASE 64 encoding based chaotic block cipher. WSEAS Transactions on Computers, 10(6), 169\u2013178.","journal-title":"WSEAS Transactions on Computers"},{"issue":"12","key":"9519_CR36","first-page":"113","volume":"20","author":"K Loukhaoukha","year":"2011","unstructured":"Loukhaoukha, K., Chouinard, J.-Y., & Berdai, A. (2011). A secure image encryption algorithm based on Rubik\u2019s cube principle. Journal of Electrical and Computer Engineering, 20(12), 113.","journal-title":"Journal of Electrical and Computer Engineering"},{"key":"9519_CR37","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1007\/s11235-011-9556-7","volume":"52","author":"CK Huang","year":"2013","unstructured":"Huang, C. K., Liao, C. W., Hsu, S. L., & Jeng, Y. C. (2013). Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommunication Systems, 52, 563\u2013571.","journal-title":"Telecommunication Systems"},{"key":"9519_CR38","unstructured":"Sivakumar, T., & Venkatesan, R. (2014) Image encryption based on pixel shuffling and random key stream International Journal of Computer and Information Technology, volume 3- issue 06, pp.102-114"},{"key":"9519_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICEngTechnol.2017.8308186","volume":"2017","author":"S Albawi","year":"2017","unstructured":"Albawi, S., Mohammed, T. A., & Al-Zawi, S. (2017). Understanding of a convolutional neural network. International Conference on Engineering and Technology (ICET), 2017, pp.1\u20136. https:\/\/doi.org\/10.1109\/ICEngTechnol.2017.8308186","journal-title":"International Conference on Engineering and Technology (ICET)"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09519-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-022-09519-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09519-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,21]],"date-time":"2022-06-21T18:45:08Z","timestamp":1655837108000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-022-09519-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,20]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["9519"],"URL":"https:\/\/doi.org\/10.1007\/s11277-022-09519-y","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2022,1,20]]},"assertion":[{"value":"6 January 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors confirm that there is no conflict of interest to declare for this publication.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}