{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:18:44Z","timestamp":1726064324803},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T00:00:00Z","timestamp":1642377600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T00:00:00Z","timestamp":1642377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"DST FIST Fund India","award":["SR\/FST\/ET-II\/2018\/221(C)"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Med Biol Eng Comput"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s11517-021-02499-4","type":"journal-article","created":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T20:02:12Z","timestamp":1642449732000},"page":"701-717","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["A simple embed over encryption scheme for DICOM images using B\u00fclban Map"],"prefix":"10.1007","volume":"60","author":[{"given":"Veerappan","family":"Manikandan","sequence":"first","affiliation":[]},{"given":"Rengarajan","family":"Amirtharajan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,17]]},"reference":[{"key":"2499_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102398","volume":"49","author":"A Banik","year":"2019","unstructured":"Banik A, Shamsi Z, Laiphrakpam DS (Dec. 2019) An encryption scheme for securing multiple medical images. J Inf Secur Appl 49:102398. https:\/\/doi.org\/10.1016\/j.jisa.2019.102398","journal-title":"J Inf Secur Appl"},{"key":"2499_CR2","unstructured":"Adedokun EA, Akan JB, Umoh IJ, Nwosu RI, Ibrahim Y (2020) A Secure Chaotic Framework for Medical Image Encryption using a 3D Logistic Map. Appl Model Simul 4(0): 141\u2013148. Accessed: Nov. 27, 2020. [Online]. Available: http:\/\/arqiipubl.com\/ams"},{"issue":"6","key":"2499_CR3","doi-asserted-by":"publisher","first-page":"1209","DOI":"10.1049\/iet-ipr.2019.0042","volume":"14","author":"M Boussif","year":"2020","unstructured":"Boussif M, Aloui N, Cherif A (May 2020) Securing DICOM images by a new encryption algorithm using Arnold transform and Vigen\u00e8re cipher. IET Image Process 14(6):1209\u20131216. https:\/\/doi.org\/10.1049\/iet-ipr.2019.0042","journal-title":"IET Image Process"},{"key":"2499_CR4","doi-asserted-by":"publisher","unstructured":"Han B, Jia Y, Huang G, Cai L (2020) A Medical Image Encryption Algorithm Based on Hermite Chaotic Neural Network,\u201d in Proceedings of 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2020. 2644\u20132648. https:\/\/doi.org\/10.1109\/ITNEC48623.2020.9085079.","DOI":"10.1109\/ITNEC48623.2020.9085079"},{"key":"2499_CR5","doi-asserted-by":"crossref","unstructured":"Banday SA, Mir AH, Malik S (2020) \u201cMultilevel medical image encryption for secure communication,\u201d in Advances in Computational Techniques for Biomedical Image Analysis. Elsevier, pp. 233\u2013252","DOI":"10.1016\/B978-0-12-820024-7.00012-8"},{"key":"2499_CR6","doi-asserted-by":"publisher","unstructured":"Dai Y, Wang H, Wang Y (2016) Chaotic Medical Image Encryption Algorithm Based on Bit-Plane Decomposition. Int J Pattern Recognit Artif Intell. 30 (4). https:\/\/doi.org\/10.1142\/S0218001416570019.","DOI":"10.1142\/S0218001416570019"},{"key":"2499_CR7","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/s11277-019-06420-z","volume":"108","author":"JC Dagadu","year":"2019","unstructured":"Dagadu JC, Li JP, Aboagye EO (2019) Medical image encryption based on hybrid chaotic DNA diffusion. Wirel Pers Commun 108:591\u2013612. https:\/\/doi.org\/10.1007\/s11277-019-06420-z","journal-title":"Wirel Pers Commun"},{"key":"2499_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05447-9","author":"C Lakshmi","year":"2020","unstructured":"Lakshmi C, Thenmozhi K, Rayappan JBB et al (2020) Neural-assisted image-dependent encryption scheme for medical image cloud storage. Neural Comput & Applic. https:\/\/doi.org\/10.1007\/s00521-020-05447-9","journal-title":"Neural Comput & Applic"},{"key":"2499_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09501-5","author":"S Aashiq Banu","year":"2020","unstructured":"Aashiq Banu S, Amirtharajan R (2020) Tri-level scrambling and enhanced diffusion for DICOM image cipher- DNA and chaotic fused approach. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-020-09501-5","journal-title":"Multimed Tools Appl"},{"key":"2499_CR10","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.2000071","author":"BS Aashiq","year":"2020","unstructured":"Aashiq BS, Amirtharajan R (2020) Bio-inspired cryptosystem on reciprocal domain-DNA strands mutate to secure health data. Front Inf Technol Electron Eng. https:\/\/doi.org\/10.1631\/FITEE.2000071","journal-title":"Front Inf Technol Electron Eng"},{"key":"2499_CR11","doi-asserted-by":"publisher","first-page":"1445","DOI":"10.1007\/s11517-020-02178-w","volume":"58","author":"BS Aashiq","year":"2020","unstructured":"Aashiq BS, Amirtharajan R (2020) A robust medical image encryption in dual domain: chaos-DNA-IWT combined approach. Med Biol Eng Comput 58:1445\u20131458. https:\/\/doi.org\/10.1007\/s11517-020-02178-w","journal-title":"Med Biol Eng Comput"},{"issue":"1","key":"2499_CR12","doi-asserted-by":"publisher","first-page":"12053","DOI":"10.1088\/1742-6596\/1447\/1\/012053","volume":"1447","author":"R Ismail Abdelfattah","year":"2020","unstructured":"Ismail Abdelfattah R, Mohamed H, Nasr ME (2020) Secure Image Encryption Scheme Based on DNA and New Multi Chaotic Map. J Phys Conf Ser 1447(1):12053. https:\/\/doi.org\/10.1088\/1742-6596\/1447\/1\/012053","journal-title":"J Phys Conf Ser"},{"issue":"14","key":"2499_CR13","doi-asserted-by":"publisher","first-page":"15561","DOI":"10.1007\/s11042-016-3858-4","volume":"76","author":"X Chai","year":"2017","unstructured":"Chai X, Gan Z, Zhang M (Jul. 2017) A fast chaos-based image encryption scheme with a novel plain image-related swapping block permutation and block diffusion. Multimed Tools Appl 76(14):15561\u201315585. https:\/\/doi.org\/10.1007\/s11042-016-3858-4","journal-title":"Multimed Tools Appl"},{"key":"2499_CR14","doi-asserted-by":"publisher","unstructured":"Talhaoui MZ, Wang X, Midoun MA (2020) Fast image encryption algorithm with high security level using the B\u00fclban chaotic map. J Real-Time Image Process. pp. 1\u201314. https:\/\/doi.org\/10.1007\/s11554-020-00948-1","DOI":"10.1007\/s11554-020-00948-1"},{"key":"2499_CR15","doi-asserted-by":"publisher","first-page":"1535","DOI":"10.1049\/iet-ipr.2019.0051","volume":"13","author":"M Guan","year":"2019","unstructured":"Guan M, Yang X, Hu W (2019) Chaotic image encryption algorithm using frequency-domain DNA encoding. IET Image Proc 13:1535\u20131539. https:\/\/doi.org\/10.1049\/iet-ipr.2019.0051","journal-title":"IET Image Proc"},{"key":"2499_CR16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s12652-020-02028-5","volume":"1","author":"KN Madhusudhan","year":"2020","unstructured":"Madhusudhan KN, Sakthivel P (May 2020) A secure medical image transmission algorithm based on binary bits and Arnold map. J Ambient Intell Humaniz Comput 1:3. https:\/\/doi.org\/10.1007\/s12652-020-02028-5","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"2499_CR17","doi-asserted-by":"publisher","unstructured":"Priya S, Santhi B (2019) A Novel Visual Medical Image Encryption for Secure Transmission of Authenticated Watermarked Medical Images. Mob Networks Appl. 1\u20138. https:\/\/doi.org\/10.1007\/s11036-019-01213-x.","DOI":"10.1007\/s11036-019-01213-x"},{"key":"2499_CR18","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.sigpro.2016.10.003","volume":"132","author":"W Cao","year":"2017","unstructured":"Cao W, Zhou Y, Chen CLP, Xia L (Mar. 2017) Medical image encryption using edge maps. Signal Process 132:96\u2013109. https:\/\/doi.org\/10.1016\/j.sigpro.2016.10.003","journal-title":"Signal Process"},{"key":"2499_CR19","doi-asserted-by":"publisher","unstructured":"Zhang LB, Zhu ZL, Yang BQ, Liu WY, Zhu HF, Zou MY (2015) Medical image encryption and compression scheme using compressive sensing and pixel swapping based permutation approach. Math Probl Eng. 2015. https:\/\/doi.org\/10.1155\/2015\/940638.","DOI":"10.1155\/2015\/940638"},{"key":"2499_CR20","doi-asserted-by":"publisher","unstructured":"Akkasaligar PT, Biradar S (2020) Selective medical image encryption using DNA cryptography. Inf Secur J. 29(2). Taylor and Francis Inc. 91\u2013101. https:\/\/doi.org\/10.1080\/19393555.2020.1718248","DOI":"10.1080\/19393555.2020.1718248"},{"key":"2499_CR21","doi-asserted-by":"publisher","first-page":"122210","DOI":"10.1109\/ACCESS.2020.3007550","volume":"8","author":"J Zhou","year":"2020","unstructured":"Zhou J, Li J, Di X (2020) A Novel Lossless Medical Image Encryption Scheme Based on Game Theory with Optimised ROI Parameters and Hidden ROI Position. IEEE Access 8:122210\u2013122228. https:\/\/doi.org\/10.1109\/ACCESS.2020.3007550","journal-title":"IEEE Access"},{"key":"2499_CR22","doi-asserted-by":"publisher","unstructured":"Chandrasekaran J, Thiruvengadam SJ (2017) A hybrid chaotic and number theoretic approach for securing DICOM images. Secur Commun Networks. 2017. https:\/\/doi.org\/10.1155\/2017\/6729896","DOI":"10.1155\/2017\/6729896"},{"key":"2499_CR23","doi-asserted-by":"publisher","unstructured":"Dagadu JC, Li JP, Shah F, Mustafa N, Kumar K (2017) \u201cDWT based encryption technique for medical images,\u201d in 2016 13th International Computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2017. pp. 252\u2013255. https:\/\/doi.org\/10.1109\/ICCWAMTIP.2016.8079849","DOI":"10.1109\/ICCWAMTIP.2016.8079849"},{"issue":"2","key":"2499_CR24","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1007\/s11071-014-1475-1","volume":"78","author":"O Alpar","year":"2014","unstructured":"Alpar O (2014) Analysis of a new simple one dimensional chaotic map. Nonlinear Dyn 78(2):771\u2013778. https:\/\/doi.org\/10.1007\/s11071-014-1475-1","journal-title":"Nonlinear Dyn"},{"key":"2499_CR25","unstructured":"\u201cOSF | dicom_archive_v2.tar.gz.aa.\u201d https:\/\/osf.io\/rytmh\/?view_only=c67e3d4393404981bc6829b6314364fb (accessed Nov. 27, 2020)"},{"issue":"Suppl 14","key":"2499_CR26","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1186\/s12911-020-01328-2.PMID:33323108;PMCID:PMC7739464","volume":"20","author":"J Li","year":"2020","unstructured":"Li J, Zhang Z, Li S, Benton R, Huang Y, Kasukurthi MV, Li D, Lin J, Borchert GM, Tan S, Li G, Ma B, Yang M, Huang J (2020 Dec 15) A partial encryption algorithm for medical images based on quick response code and reversible data hiding technology. BMC Med Inform Decis Mak 20(Suppl 14):297. https:\/\/doi.org\/10.1186\/s12911-020-01328-2.PMID:33323108;PMCID:PMC7739464","journal-title":"BMC Med Inform Decis Mak"},{"key":"2499_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42452-019-1685-8","volume":"2","author":"S Chirakkarottu","year":"2020","unstructured":"Chirakkarottu S, Mathew S (2020) A novel encryption method for medical images using 2D Zaslavski map and DNA cryptography. SN Appl Sci 2:1. https:\/\/doi.org\/10.1007\/s42452-019-1685-8","journal-title":"SN Appl Sci"},{"key":"2499_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.107286","volume":"167","author":"Y Chen","year":"2020","unstructured":"Chen Y, Tang C, Ye R (2020) Cryptanalysis and improvement of medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 167:107286. https:\/\/doi.org\/10.1016\/j.sigpro.2019.107286","journal-title":"Signal Process"}],"container-title":["Medical & Biological Engineering & Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11517-021-02499-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11517-021-02499-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11517-021-02499-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,17]],"date-time":"2022-02-17T06:18:38Z","timestamp":1645078718000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11517-021-02499-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,17]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["2499"],"URL":"https:\/\/doi.org\/10.1007\/s11517-021-02499-4","relation":{},"ISSN":["0140-0118","1741-0444"],"issn-type":[{"value":"0140-0118","type":"print"},{"value":"1741-0444","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,17]]},"assertion":[{"value":"18 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}