{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T04:15:19Z","timestamp":1730002519560,"version":"3.28.0"},"reference-count":29,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1016\/j.future.2023.08.018","type":"journal-article","created":{"date-parts":[[2023,8,18]],"date-time":"2023-08-18T10:22:36Z","timestamp":1692354156000},"page":"1-9","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":9,"special_numbering":"C","title":["YOLO-based ROI selection for joint encryption and compression of medical images with reconstruction through super-resolution network"],"prefix":"10.1016","volume":"150","author":[{"family":"Priyanka","sequence":"first","affiliation":[]},{"given":"Naman","family":"Baranwal","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7359-2068","authenticated-orcid":false,"given":"Kedar Nath","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Amit Kumar","family":"Singh","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.future.2023.08.018_b1","article-title":"IoMT amid COVID-19 pandemic: Application, architecture, technology, and security","volume":"174","author":"Aman","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"10.1016\/j.future.2023.08.018_b2","doi-asserted-by":"crossref","DOI":"10.1109\/TCE.2021.3058501","article-title":"Introduction consumer technologies for smart healthcare","volume":"67","author":"Mohanty","year":"2021","journal-title":"IEEE Trans. Consum. Electron."},{"key":"10.1016\/j.future.2023.08.018_b3","first-page":"1","article-title":"A survey of image encryption for healthcare applications","author":"Singh","year":"2022","journal-title":"Evol. Intell."},{"key":"10.1016\/j.future.2023.08.018_b4","series-title":"2020 7th International Conference on Smart Structures and Systems (ICSSS)","first-page":"1","article-title":"An encryption-then-compression scheme using autoencoder based image compression for color images","author":"Sreelakshmi","year":"2020"},{"key":"10.1016\/j.future.2023.08.018_b5","doi-asserted-by":"crossref","DOI":"10.1016\/j.image.2021.116418","article-title":"A novel hybrid image encryption\u2013compression scheme by combining chaos theory and number theory","volume":"98","author":"Ahmad","year":"2021","journal-title":"Signal Process., Image Commun."},{"key":"10.1016\/j.future.2023.08.018_b6","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1016\/j.comcom.2022.07.049","article-title":"Ecis: encryption prior to compression for digital image security with reduced memory","volume":"193","author":"Singh","year":"2022","journal-title":"Comput. Commun."},{"key":"10.1016\/j.future.2023.08.018_b7","article-title":"A customized deep network based encryption-then-lossy-compression scheme of color images achieving arbitrary compression ratios","author":"Wang","year":"2023","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.future.2023.08.018_b8","doi-asserted-by":"crossref","first-page":"25433","DOI":"10.1007\/s11042-021-10884-2","article-title":"Image compression and encryption algorithm based on compressive sensing and nonlinear diffusion","volume":"80","author":"Liu","year":"2021","journal-title":"Multimedia Tools Appl."},{"issue":"3","key":"10.1016\/j.future.2023.08.018_b9","doi-asserted-by":"crossref","DOI":"10.1007\/s11704-022-1419-8","article-title":"Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform","volume":"17","author":"Huang","year":"2023","journal-title":"Front. Comput. Sci."},{"key":"10.1016\/j.future.2023.08.018_b10","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1007\/s11042-020-09779-5","article-title":"Double image compression-encryption algorithm based on fractional order hyper chaotic system and DNA approach","volume":"80","author":"Yang","year":"2021","journal-title":"Multimedia Tools Appl."},{"issue":"22","key":"10.1016\/j.future.2023.08.018_b11","doi-asserted-by":"crossref","first-page":"31329","DOI":"10.1007\/s11042-021-11796-x","article-title":"A secure image compression-encryption algorithm using DCT and hyperchaotic system","volume":"81","author":"Huang","year":"2022","journal-title":"Multimedia Tools Appl."},{"issue":"1","key":"10.1016\/j.future.2023.08.018_b12","doi-asserted-by":"crossref","first-page":"238","DOI":"10.23919\/JCC.2022.01.017","article-title":"Hybrid image compression-encryption scheme based on multilayer stacked autoencoder and logistic map","volume":"19","author":"Gupta","year":"2022","journal-title":"China Commun."},{"key":"10.1016\/j.future.2023.08.018_b13","article-title":"Joint jpeg compression and encryption scheme based on order-8-16 block transform","author":"Li","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.future.2023.08.018_b14","doi-asserted-by":"crossref","DOI":"10.1109\/TSC.2023.3258144","article-title":"A visually meaningful image encryption scheme based on lossless compression SPIHT coding","author":"Yang","year":"2023","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.future.2023.08.018_b15","first-page":"1","article-title":"Image compression and encryption algorithm based on uniform non-degeneracy chaotic system and fractal coding","author":"Liu","year":"2023","journal-title":"Nonlinear Dynam."},{"year":"2022","series-title":"YOLOv7: Trainable bag-of-freebies sets new state-of-the-art for real-time object detectors","author":"Wang","key":"10.1016\/j.future.2023.08.018_b16"},{"key":"10.1016\/j.future.2023.08.018_b17","doi-asserted-by":"crossref","first-page":"1066","DOI":"10.1016\/j.procs.2022.01.135","article-title":"A review of yolo algorithm developments","volume":"199","author":"Jiang","year":"2022","journal-title":"Procedia Comput. Sci."},{"key":"10.1016\/j.future.2023.08.018_b18","doi-asserted-by":"crossref","unstructured":"C.-Y. Wang, A. Bochkovskiy, H.-Y.M. Liao, Scaled-yolov4: Scaling cross stage partial network, in: Proceedings of the IEEE\/Cvf Conference on Computer Vision and Pattern Recognition, 2021, pp. 13029\u201313038.","DOI":"10.1109\/CVPR46437.2021.01283"},{"key":"10.1016\/j.future.2023.08.018_b19","doi-asserted-by":"crossref","unstructured":"X. Ding, X. Zhang, N. Ma, J. Han, G. Ding, J. Sun, Repvgg: Making vgg-style convnets great again, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 13733\u201313742.","DOI":"10.1109\/CVPR46437.2021.01352"},{"key":"10.1016\/j.future.2023.08.018_b20","unstructured":"LiTS dataset, URL https:\/\/www.kaggle.com\/datasets\/harshwardhanbhangale\/lits-dataset."},{"key":"10.1016\/j.future.2023.08.018_b21","doi-asserted-by":"crossref","DOI":"10.1109\/TMM.2023.3238549","article-title":"Reversible data hiding in encrypted images based on time-varying huffman coding table","author":"Yang","year":"2023","journal-title":"IEEE Trans. Multimed."},{"key":"10.1016\/j.future.2023.08.018_b22","doi-asserted-by":"crossref","unstructured":"K. Zhang, L.V. Gool, R. Timofte, Deep unfolding network for image super-resolution, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 3217\u20133226.","DOI":"10.1109\/CVPR42600.2020.00328"},{"key":"10.1016\/j.future.2023.08.018_b23","series-title":"Medical Image Computing and Computer-Assisted Intervention\u2013MICCAI 2015: 18th International Conference, Munich, Germany, October 5-9, 2015, Proceedings, Part III 18","first-page":"234","article-title":"U-net: Convolutional networks for biomedical image segmentation","author":"Ronneberger","year":"2015"},{"key":"10.1016\/j.future.2023.08.018_b24","article-title":"SIELNet: 3D chaotic-map-based secure image encryption using customized residual dense spatial network","author":"Singh","year":"2022","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"14","key":"10.1016\/j.future.2023.08.018_b25","doi-asserted-by":"crossref","first-page":"19229","DOI":"10.1007\/s11042-019-7256-6","article-title":"A modified image selective encryption-compression technique based on 3D chaotic maps and arithmetic coding","volume":"78","author":"Darwish","year":"2019","journal-title":"Multimedia Tools Appl."},{"key":"10.1016\/j.future.2023.08.018_b26","first-page":"1","article-title":"Image parallel block compressive sensing scheme using DFT measurement matrix","author":"Wang","year":"2022","journal-title":"Multimedia Tools Appl."},{"issue":"4","key":"10.1016\/j.future.2023.08.018_b27","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1016\/j.dcan.2020.02.001","article-title":"Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution","volume":"6","author":"Setyaningsih","year":"2020","journal-title":"Digit. Commun. Netw."},{"issue":"1","key":"10.1016\/j.future.2023.08.018_b28","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1038\/s41598-020-79747-4","article-title":"Image compression-encryption method based on two-dimensional sparse recovery and chaotic system","volume":"11","author":"Ghaffari","year":"2021","journal-title":"Sci. Rep."},{"key":"10.1016\/j.future.2023.08.018_b29","doi-asserted-by":"crossref","first-page":"12845","DOI":"10.1007\/s00521-021-05937-4","article-title":"Exploiting 2D compressed sensing and information entropy for secure color image compression and encryption","volume":"33","author":"Gan","year":"2021","journal-title":"Neural Comput. Appl."}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X23003205?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X23003205?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T10:05:33Z","timestamp":1729937133000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X23003205"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":29,"alternative-id":["S0167739X23003205"],"URL":"https:\/\/doi.org\/10.1016\/j.future.2023.08.018","relation":{},"ISSN":["0167-739X"],"issn-type":[{"type":"print","value":"0167-739X"}],"subject":[],"published":{"date-parts":[[2024,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"YOLO-based ROI selection for joint encryption and compression of medical images with reconstruction through super-resolution network","name":"articletitle","label":"Article Title"},{"value":"Future Generation Computer Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.future.2023.08.018","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}