{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:37:14Z","timestamp":1732041434585},"reference-count":38,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["clinicalkey.fr","clinicalkey.jp","clinicalkey.com.au","clinicalkey.es","clinicalkey.com","elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers in Biology and Medicine"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1016\/j.compbiomed.2022.105542","type":"journal-article","created":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T00:24:46Z","timestamp":1650673486000},"page":"105542","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":29,"special_numbering":"C","title":["An efficient multi-level encryption scheme for stereoscopic medical images based on coupled chaotic system and Otsu threshold segmentation"],"prefix":"10.1016","volume":"146","author":[{"given":"Yuzhou","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Hongwei","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Jingyu","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4281-1461","authenticated-orcid":false,"given":"Hao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"first-page":"43","year":"1999","series-title":"Data encryption standard (des)","author":"Pub","key":"10.1016\/j.compbiomed.2022.105542_bib1"},{"article-title":"Advanced encryption standard","year":"2001","series-title":"Proceedings of Federal Information Processing Standards Publications","author":"Rijmen","key":"10.1016\/j.compbiomed.2022.105542_bib2"},{"key":"10.1016\/j.compbiomed.2022.105542_bib3","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1016\/j.patrec.2021.10.033","article-title":"Medical image encryption scheme using multiple chaotic maps","volume":"152","author":"Jain","year":"2021","journal-title":"Pattern Recogn. Lett."},{"key":"10.1016\/j.compbiomed.2022.105542_bib4","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1109\/ACCESS.2021.3138718","article-title":"A robust chaos-based technique for medical image encryption","volume":"10","author":"Yasser","year":"2022","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.compbiomed.2022.105542_bib5","doi-asserted-by":"crossref","first-page":"895","DOI":"10.32604\/cmc.2022.018545","article-title":"Secure and robust optical multi-stage medical image cryptosystem","volume":"70","author":"El-Shafai","year":"2022","journal-title":"Comput. Mater. Continua (CMC)"},{"issue":"2","key":"10.1016\/j.compbiomed.2022.105542_bib6","doi-asserted-by":"crossref","first-page":"3133","DOI":"10.32604\/cmc.2022.020454","article-title":"A fractional fourier based medical image authentication approach","volume":"70","author":"Alqahtani","year":"2022","journal-title":"Comput. Mater. Continua (CMC)"},{"issue":"2","key":"10.1016\/j.compbiomed.2022.105542_bib7","doi-asserted-by":"crossref","DOI":"10.3390\/s22020461","article-title":"Novel privacy preserving non-invasive sensing-based diagnoses of pneumonia disease leveraging deep network model","volume":"22","author":"Rehman","year":"2022","journal-title":"Sensors"},{"key":"10.1016\/j.compbiomed.2022.105542_bib8","doi-asserted-by":"crossref","first-page":"23008","DOI":"10.1109\/ACCESS.2022.3153069","article-title":"REAS-TMIS: resource-efficient authentication scheme for telecare medical information system","volume":"10","author":"Tanveer","year":"2022","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.compbiomed.2022.105542_bib9","doi-asserted-by":"crossref","first-page":"2159","DOI":"10.1007\/s11071-019-05113-3","article-title":"Chaotic system with bondorbital attractors","volume":"97","author":"Zhang","year":"2019","journal-title":"Nonlinear Dynam."},{"issue":"9","key":"10.1016\/j.compbiomed.2022.105542_bib10","doi-asserted-by":"crossref","DOI":"10.1063\/1.5116732","article-title":"Multi-scroll hidden attractors with two stable equilibrium points","volume":"29","author":"Deng","year":"2019","journal-title":"Chaos"},{"key":"10.1016\/j.compbiomed.2022.105542_bib11","doi-asserted-by":"crossref","DOI":"10.1155\/2019\/4047957","article-title":"Analysis and FPGA realization of a novel 5D hyperchaotic four-wing memristive system, active control synchronization, and secure communication application","volume":"2019","author":"Yu","year":"2019","journal-title":"Complexity"},{"key":"10.1016\/j.compbiomed.2022.105542_bib12","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","article-title":"Symmetric ciphers based on two-dimensional chaotic maps","volume":"8","author":"Fridrich","year":"1998","journal-title":"Int. J. Bifurcat. Chaos"},{"issue":"11","key":"10.1016\/j.compbiomed.2022.105542_bib13","doi-asserted-by":"crossref","DOI":"10.3390\/s21113925","article-title":"Medical images encryption based on adaptive-robust multi-mode synchronization of Chen hyper-chaotic systems","volume":"21","author":"Javan","year":"2021","journal-title":"Sensors"},{"key":"10.1016\/j.compbiomed.2022.105542_bib14","doi-asserted-by":"crossref","DOI":"10.1016\/j.bspc.2021.102465","article-title":"A modified salp swarm algorithm (SSA) combined with a chaotic coupled map lattices (CML) approach for the secured encryption and compression of medical images during data transmission","volume":"66","author":"Thirumarai Selvi","year":"2021","journal-title":"Biomed. Signal Process Control"},{"key":"10.1016\/j.compbiomed.2022.105542_bib15","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.cosrev.2017.11.003","article-title":"Digital watermarking: applicability for developing trust in medical imaging workflows state of the art review","volume":"27","author":"Qasim","year":"2018","journal-title":"Comput. Sci. Rev"},{"issue":"6","key":"10.1016\/j.compbiomed.2022.105542_bib16","doi-asserted-by":"crossref","first-page":"714","DOI":"10.1007\/s10278-014-9700-5","article-title":"Watermarking techniques used in medical images: a survey","volume":"27","author":"Mousavi","year":"2014","journal-title":"J. Digit. Imag."},{"key":"10.1016\/j.compbiomed.2022.105542_bib17","doi-asserted-by":"crossref","DOI":"10.1016\/j.bspc.2019.101695","article-title":"Improving the management of medical imaging by using robust and secure dual watermarking","volume":"56","author":"Cedillo Hernandez","year":"2020","journal-title":"Biomed. Signal Process Control"},{"issue":"9","key":"10.1016\/j.compbiomed.2022.105542_bib18","doi-asserted-by":"crossref","first-page":"1883","DOI":"10.1007\/s00607-020-00881-y","article-title":"Bio-signal data sharing security through watermarking: a technical survey","volume":"103","author":"Sharma","year":"2021","journal-title":"Computing"},{"key":"10.1016\/j.compbiomed.2022.105542_bib19","doi-asserted-by":"crossref","first-page":"132662","DOI":"10.1109\/ACCESS.2019.2940972","article-title":"A survey on reversible watermarking for multimedia content: a robustness overview","volume":"7","author":"Menendez Ortiz","year":"2019","journal-title":"IEEE Access"},{"issue":"2","key":"10.1016\/j.compbiomed.2022.105542_bib20","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/s10278-012-9527-x","article-title":"A review of medical image watermarking requirements for teleradiology","volume":"26","author":"Nyeem","year":"2013","journal-title":"J. Digit. Imag."},{"issue":"5","key":"10.1016\/j.compbiomed.2022.105542_bib21","doi-asserted-by":"crossref","first-page":"3339","DOI":"10.1007\/s10916-012-9827-1","article-title":"Effective management of medical information through a novel blind watermarking technique","volume":"36","author":"Das","year":"2012","journal-title":"J. Med. Syst."},{"key":"10.1016\/j.compbiomed.2022.105542_bib22","doi-asserted-by":"crossref","first-page":"166589","DOI":"10.1109\/ACCESS.2020.3022779","article-title":"Digital steganography and watermarking for digital images: a review of current research directions","volume":"8","author":"Evsutin","year":"2020","journal-title":"IEEE Access"},{"issue":"8","key":"10.1016\/j.compbiomed.2022.105542_bib23","doi-asserted-by":"crossref","first-page":"3221","DOI":"10.1007\/s12652-019-01500-1","article-title":"Digital watermarking techniques for image security: a review","volume":"11","author":"Mohanarathinam","year":"2019","journal-title":"J. Ambient Intell. Hum. Comput."},{"key":"10.1016\/j.compbiomed.2022.105542_bib24","doi-asserted-by":"crossref","DOI":"10.1016\/j.image.2021.116523","article-title":"Watermarking schemes for digital images: robustness overview","volume":"100","author":"Evsutin","year":"2022","journal-title":"Signal Process. Image Commun."},{"issue":"4","key":"10.1016\/j.compbiomed.2022.105542_bib25","first-page":"1366","article-title":"An efficient medical image watermarking scheme based on FDCuT\u2013DCT, Engineering Science and Technology","volume":"20","author":"Thanki","year":"2017","journal-title":"Int. J."},{"key":"10.1016\/j.compbiomed.2022.105542_bib26","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.jvcir.2019.05.012","article-title":"Locally optimum image watermark decoder by modeling NSCT domain difference coefficients with vector based Cauchy distribution","volume":"62","author":"Wang","year":"2019","journal-title":"J. Vis. Commun. Image Represent."},{"key":"10.1016\/j.compbiomed.2022.105542_bib27","doi-asserted-by":"crossref","first-page":"169525","DOI":"10.1109\/ACCESS.2020.3024181","article-title":"A novel optimized semi-blind scheme for color image watermarking","volume":"8","author":"Cheema","year":"2020","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.compbiomed.2022.105542_bib28","doi-asserted-by":"crossref","first-page":"4307","DOI":"10.1007\/s11042-020-09941-z","article-title":"Multi-level security of medical images based on encryption and watermarking for telemedicine applications","volume":"80","author":"Thanki","year":"2020","journal-title":"Multimed. Tool. Appl."},{"key":"10.1016\/j.compbiomed.2022.105542_bib29","first-page":"1","article-title":"Fingerprint-based Robust Medical Image Watermarking in Hybrid Transform","author":"Vaidya","year":"2022","journal-title":"Vis Comput."},{"key":"10.1016\/j.compbiomed.2022.105542_bib30","doi-asserted-by":"crossref","DOI":"10.1016\/j.bspc.2021.103007","article-title":"New geometrically invariant multiple zero-watermarking algorithm for color medical images","volume":"70","author":"Hosny","year":"2021","journal-title":"Biomed. Signal Process Control"},{"key":"10.1016\/j.compbiomed.2022.105542_bib31","doi-asserted-by":"crossref","DOI":"10.1016\/j.bspc.2020.102403","article-title":"DCT & DWT based watermarking scheme for medical information security","volume":"66","author":"Fares","year":"2021","journal-title":"Biomed. Signal Process Control"},{"issue":"8","key":"10.1016\/j.compbiomed.2022.105542_bib32","doi-asserted-by":"crossref","first-page":"3221","DOI":"10.1007\/s12652-019-01500-1","article-title":"Digital watermarking techniques for image security: a review","volume":"11","author":"Mohanarathinam","year":"2019","journal-title":"J. Ambient Intell. Hum. Comput."},{"key":"10.1016\/j.compbiomed.2022.105542_bib33","first-page":"1","article-title":"B-DCT Based Watermarking Algorithm for Patient Data Protection in IoMT, International Conference on Information Security and Cryptology (ISCTURKEY)","author":"Elbasi","year":"2020","journal-title":"IEEE, Electr Network"},{"issue":"4","key":"10.1016\/j.compbiomed.2022.105542_bib34","doi-asserted-by":"crossref","DOI":"10.1007\/s11082-021-02831-0","article-title":"Realization of a novel chaotic system using coupling dual chaotic system","volume":"53","author":"Mousa","year":"2021","journal-title":"Opt. Quant. Electron."},{"key":"10.1016\/j.compbiomed.2022.105542_bib35","first-page":"49","article-title":"An encryption scheme for securing multiple medical images","author":"Banik","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.compbiomed.2022.105542_bib36","doi-asserted-by":"crossref","DOI":"10.1016\/j.compbiomed.2020.103772","article-title":"Encryption of 3D medical images based on a novel multiparameter cosine number transform","volume":"121","author":"Lima","year":"2020","journal-title":"Comput. Biol. Med."},{"issue":"2","key":"10.1016\/j.compbiomed.2022.105542_bib37","article-title":"A secured and robust medical image watermarking approach for protecting integrity of medical images","volume":"32","author":"Khare","year":"2020","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"14","key":"10.1016\/j.compbiomed.2022.105542_bib38","doi-asserted-by":"crossref","first-page":"8381","DOI":"10.1007\/s11042-015-2754-7","article-title":"Hybrid technique for robust and imperceptible multiple watermarking using medical images","volume":"75","author":"Singh","year":"2015","journal-title":"Multimed. Tool. Appl."}],"container-title":["Computers in Biology and Medicine"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0010482522003341?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0010482522003341?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,12,22]],"date-time":"2022-12-22T18:31:31Z","timestamp":1671733891000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0010482522003341"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7]]},"references-count":38,"alternative-id":["S0010482522003341"],"URL":"https:\/\/doi.org\/10.1016\/j.compbiomed.2022.105542","relation":{},"ISSN":["0010-4825"],"issn-type":[{"type":"print","value":"0010-4825"}],"subject":[],"published":{"date-parts":[[2022,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"An efficient multi-level encryption scheme for stereoscopic medical images based on coupled chaotic system and Otsu threshold segmentation","name":"articletitle","label":"Article Title"},{"value":"Computers in Biology and Medicine","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compbiomed.2022.105542","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"105542"}}