{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T04:29:24Z","timestamp":1721363364050},"reference-count":49,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1016\/j.jisa.2023.103677","type":"journal-article","created":{"date-parts":[[2024,1,2]],"date-time":"2024-01-02T10:46:32Z","timestamp":1704192392000},"page":"103677","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"special_numbering":"C","title":["A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems"],"prefix":"10.1016","volume":"80","author":[{"given":"Mobashshirur","family":"Rahman","sequence":"first","affiliation":[]},{"given":"Anita","family":"Murmu","sequence":"additional","affiliation":[]},{"given":"Piyush","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Nageswara Rao","family":"Moparthi","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0191-0175","authenticated-orcid":false,"given":"Suyel","family":"Namasudra","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2023.103677_b1","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1109\/TIFS.2022.3230212","article-title":"AVET: A novel transform function to improve cancellable biometrics security","volume":"18","author":"Dang","year":"2022","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"10.1016\/j.jisa.2023.103677_b2","doi-asserted-by":"crossref","first-page":"110","DOI":"10.3390\/info11020110","article-title":"Digital image watermarking techniques: A review","volume":"11","author":"Begum","year":"2020","journal-title":"Information"},{"key":"10.1016\/j.jisa.2023.103677_b3","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2022.07.120","article-title":"Digital image steganography: A literature survey","author":"Mandal","year":"2022","journal-title":"Inform Sci"},{"issue":"1","key":"10.1016\/j.jisa.2023.103677_b4","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1049\/cit2.12077","article-title":"Multi-scale attention encoder for street-to-aerial image geo-localization","volume":"8","author":"Li","year":"2023","journal-title":"CAAI Trans Intell Technol"},{"key":"10.1016\/j.jisa.2023.103677_b5","first-page":"1","article-title":"A novel gateaux derivatives with efficient DCNN-resunet method for segmenting multi-class brain tumor","author":"Murmu","year":"2023","journal-title":"Med Biol Eng Comput"},{"key":"10.1016\/j.jisa.2023.103677_b6","doi-asserted-by":"crossref","first-page":"1380","DOI":"10.1016\/j.procs.2020.03.349","article-title":"Versatile approaches for medical image compression: A review","volume":"167","author":"Kumar","year":"2020","journal-title":"Procedia Comput Sci"},{"key":"10.1016\/j.jisa.2023.103677_b7","first-page":"1","article-title":"Enhancing security of medical images using deep learning, chaotic map, and hash table","author":"Kumar","year":"2023","journal-title":"Mob Netw Appl"},{"issue":"1","key":"10.1016\/j.jisa.2023.103677_b8","article-title":"Medical imaging in rheumatoid arthritis: A review on deep learning approach","volume":"18","author":"Parashar","year":"2023","journal-title":"Open Life Sci"},{"key":"10.1016\/j.jisa.2023.103677_b9","series-title":"2014 international conference on green computing communication and electrical engineering","first-page":"1","article-title":"Profile based access control model in cloud computing environment","author":"Namasudra","year":"2014"},{"key":"10.1016\/j.jisa.2023.103677_b10","doi-asserted-by":"crossref","DOI":"10.1016\/j.imavis.2023.104784","article-title":"Real-time gait biometrics for surveillance applications: A review","author":"Parashar","year":"2023","journal-title":"Image Vis Comput"},{"key":"10.1016\/j.jisa.2023.103677_b11","series-title":"TENCON 2021-2021 IEEE region 10 conference","first-page":"608","article-title":"Deep learning model-based segmentation of medical diseases from MRI and CT images","author":"Murmu","year":"2021"},{"issue":"11","key":"10.1016\/j.jisa.2023.103677_b12","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1145\/3422622","article-title":"Generative adversarial networks","volume":"63","author":"Goodfellow","year":"2020","journal-title":"Commun ACM"},{"issue":"14","key":"10.1016\/j.jisa.2023.103677_b13","doi-asserted-by":"crossref","first-page":"12119","DOI":"10.1007\/s00521-022-07098-4","article-title":"Efficient palmprint biometric identification systems using deep learning and feature selection methods","volume":"34","author":"Trabelsi","year":"2022","journal-title":"Neural Comput Appl"},{"issue":"3","key":"10.1016\/j.jisa.2023.103677_b14","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1049\/cit2.12094","article-title":"Medical data publishing based on average distribution and clustering","volume":"7","author":"Yi","year":"2022","journal-title":"CAAI Trans Intell Technol"},{"issue":"9","key":"10.1016\/j.jisa.2023.103677_b15","doi-asserted-by":"crossref","first-page":"4915","DOI":"10.1109\/TNNLS.2021.3062754","article-title":"DeepKeyGen: A deep learning-based stream Cipher generator for medical image encryption and decryption","volume":"33","author":"Ding","year":"2021","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"10.1016\/j.jisa.2023.103677_b16","doi-asserted-by":"crossref","DOI":"10.1145\/3539223","article-title":"Experience replay-based deep reinforcement learning for dialogue management optimisation","author":"Malviya","year":"2022","journal-title":"Trans Asian Low-Res Lang Inform Process"},{"key":"10.1016\/j.jisa.2023.103677_b17","doi-asserted-by":"crossref","first-page":"14379","DOI":"10.1007\/s11042-018-6795-6","article-title":"A medical image crypto-compression algorithm based on neural network and PWLCM","volume":"78","author":"Hajjaji","year":"2019","journal-title":"Multimedia Tools Appl"},{"key":"10.1016\/j.jisa.2023.103677_b18","article-title":"Securing multimodal biometric template using local random projection and homomorphic encryption","volume":"70","author":"Vallabhadas","year":"2022","journal-title":"J Inform Secur Appl"},{"key":"10.1016\/j.jisa.2023.103677_b19","doi-asserted-by":"crossref","first-page":"19963","DOI":"10.1007\/s11042-020-08821-w","article-title":"Lossless image compression-encryption algorithm based on BP neural network and chaotic system","volume":"79","author":"Yang","year":"2020","journal-title":"Multimedia Tools Appl"},{"key":"10.1016\/j.jisa.2023.103677_b20","doi-asserted-by":"crossref","first-page":"36667","DOI":"10.1109\/ACCESS.2019.2906292","article-title":"Novel medical image encryption scheme based on chaos and DNA encoding","volume":"7","author":"Belazi","year":"2019","journal-title":"IEEE access"},{"key":"10.1016\/j.jisa.2023.103677_b21","doi-asserted-by":"crossref","first-page":"4239","DOI":"10.1007\/s13369-017-2837-z","article-title":"Feed-forward neural network-based predictive image coding for medical image compression","volume":"43","author":"Ayoobkhan","year":"2018","journal-title":"Arab J Sci Eng"},{"key":"10.1016\/j.jisa.2023.103677_b22","first-page":"67","article-title":"Integration of machine learning with cybersecurity: Applications and challenges","author":"Das","year":"2023","journal-title":"Artif Intell Cyber Secur: Theories Appl"},{"key":"10.1016\/j.jisa.2023.103677_b23","first-page":"1","article-title":"Medical image encryption and compression by adaptive sigma filterized synorr certificateless signcryptive levenshtein entropy-coding-based deep neural learning","author":"Selvi","year":"2021","journal-title":"Multimedia Syst"},{"key":"10.1016\/j.jisa.2023.103677_b24","article-title":"Deep learning-based biometric image feature extraction for securing medical images through data hiding and joint encryption\u2013compression","volume":"79","author":"Singh","year":"2023","journal-title":"J Inform Secur Appl"},{"key":"10.1016\/j.jisa.2023.103677_b25","doi-asserted-by":"crossref","unstructured":"Liu Z, Xu X, Liu T, Liu Q, Wang Y, Shi Y, et al. Machine vision guided 3d medical image compression for efficient transmission and accurate segmentation in the clouds. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. 2019, p. 12687\u201396.","DOI":"10.1109\/CVPR.2019.01297"},{"key":"10.1016\/j.jisa.2023.103677_b26","doi-asserted-by":"crossref","first-page":"6663","DOI":"10.1007\/s11227-019-02878-7","article-title":"An image encryption method based on chaos system and AES algorithm","volume":"75","author":"Arab","year":"2019","journal-title":"J Supercomput"},{"key":"10.1016\/j.jisa.2023.103677_b27","first-page":"77","article-title":"An improved fast and secure CAMEL based authenticated key in smart health care system","author":"Khasim","year":"2022","journal-title":"Cloud Comput Data Sci"},{"key":"10.1016\/j.jisa.2023.103677_b28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2022\/8288855","article-title":"A new V-net convolutional neural network based on four-dimensional hyperchaotic system for medical image encryption","volume":"2022","author":"Wang","year":"2022","journal-title":"Secur Commun Netw"},{"issue":"2","key":"10.1016\/j.jisa.2023.103677_b29","first-page":"91","article-title":"Selective medical image encryption using DNA cryptography","volume":"29","author":"Akkasaligar","year":"2020","journal-title":"Inform Secur J: A Glob Perspect"},{"key":"10.1016\/j.jisa.2023.103677_b30","first-page":"92","article-title":"A study of using machine learning in predicting COVID-19 cases","author":"Maliyaem","year":"2022","journal-title":"Cloud Comput Data Sci"},{"issue":"3","key":"10.1016\/j.jisa.2023.103677_b31","doi-asserted-by":"crossref","first-page":"1504","DOI":"10.1109\/JIOT.2020.3012452","article-title":"DeepEDN: A deep-learning-based image encryption and decryption network for internet of medical things","volume":"8","author":"Ding","year":"2020","journal-title":"IEEE Internet Things J"},{"issue":"7","key":"10.1016\/j.jisa.2023.103677_b32","doi-asserted-by":"crossref","first-page":"38","DOI":"10.9781\/ijimai.2022.10.006","article-title":"Brain tumor segmentation and identification using particle imperialist deep convolutional neural network in MRI images","volume":"7","author":"Khemchandani","year":"2022","journal-title":"IJIMAI"},{"key":"10.1016\/j.jisa.2023.103677_b33","article-title":"A clustering algorithm based on an ensemble of dissimilarities: An application in the bioinformatics domain","author":"Mart\u00edn Merino","year":"2022","journal-title":"Int J Interact Multim Artif Intell"},{"key":"10.1016\/j.jisa.2023.103677_b34","first-page":"39","article-title":"Reverse-engineering the design rules for cloud-based big data platforms","author":"Sharma","year":"2022","journal-title":"Cloud Comput Data Sci"},{"key":"10.1016\/j.jisa.2023.103677_b35","article-title":"An intuitionistic fuzzy decision support system for COVID-19 lockdown relaxation protocols in India","volume":"102","author":"Devi","year":"2022","journal-title":"Comput Electr Eng"},{"issue":"3","key":"10.1016\/j.jisa.2023.103677_b36","first-page":"93","article-title":"A hybrid CNN for image denoising","volume":"2","author":"Zheng","year":"2022","journal-title":"J Artif Intell Technol"},{"issue":"3","key":"10.1016\/j.jisa.2023.103677_b37","first-page":"100","article-title":"Single-image dehazing based on two-stream convolutional neural network","volume":"2","author":"Meng","year":"2022","journal-title":"J Artif Intell Technol"},{"key":"10.1016\/j.jisa.2023.103677_b38","first-page":"1","article-title":"A color image encryption technique using block scrambling and chaos","author":"Hosny","year":"2022","journal-title":"Multimedia Tools Appl"},{"issue":"3","key":"10.1016\/j.jisa.2023.103677_b39","doi-asserted-by":"crossref","first-page":"2556","DOI":"10.1007\/s10489-021-02508-x","article-title":"An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function","volume":"52","author":"Kumar","year":"2022","journal-title":"Appl Intell"},{"key":"10.1016\/j.jisa.2023.103677_b40","doi-asserted-by":"crossref","first-page":"3373","DOI":"10.1007\/s12652-020-02399-9","article-title":"Novel medical image encryption using DWT block-based scrambling and edge maps","volume":"12","author":"Jeevitha","year":"2021","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"10.1016\/j.jisa.2023.103677_b41","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2023.107156","article-title":"Novel framework based on ensemble classification and secure feature extraction for COVID-19 critical health prediction","volume":"126","author":"Priyadarshini","year":"2023","journal-title":"Eng Appl Artif Intell"},{"issue":"2","key":"10.1016\/j.jisa.2023.103677_b42","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1049\/cit2.12110","article-title":"A robust deformed convolutional neural network (CNN) for image denoising","volume":"8","author":"Zhang","year":"2023","journal-title":"CAAI Trans Intell Technol"},{"issue":"4","key":"10.1016\/j.jisa.2023.103677_b43","first-page":"152","article-title":"Standard ner tagging scheme for big data healthcare analytics built on unified medical corpora","volume":"2","author":"Shafqat","year":"2022","journal-title":"J Artif Intell Technol"},{"key":"10.1016\/j.jisa.2023.103677_b44","series-title":"Chest x-ray images (Covid-19)","author":"Mooney","year":"2020"},{"key":"10.1016\/j.jisa.2023.103677_b45","series-title":"Sokoto coventry fingerprint dataset (socofing)","author":"Ruizgara","year":"2018"},{"key":"10.1016\/j.jisa.2023.103677_b46","doi-asserted-by":"crossref","first-page":"3957","DOI":"10.1007\/s11042-019-7642-0","article-title":"A novel encrypted compressive sensing of images based on fractional order hyper chaotic Chen system and DNA operations","volume":"79","author":"Kayalvizhi","year":"2020","journal-title":"Multimedia Tools Appl"},{"key":"10.1016\/j.jisa.2023.103677_b47","doi-asserted-by":"crossref","first-page":"9007","DOI":"10.1007\/s12652-020-02597-5","article-title":"Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications","volume":"12","author":"El-Shafai","year":"2021","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"10.1016\/j.jisa.2023.103677_b48","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.ins.2017.02.036","article-title":"Design of image cipher using block-based scrambling and image filtering","volume":"396","author":"Hua","year":"2017","journal-title":"Inform Sci"},{"key":"10.1016\/j.jisa.2023.103677_b49","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1007\/s11277-019-06420-z","article-title":"Medical image encryption based on hybrid chaotic DNA diffusion","volume":"108","author":"Dagadu","year":"2019","journal-title":"Wirel Pers Commun"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623002612?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623002612?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,2,27]],"date-time":"2024-02-27T22:57:35Z","timestamp":1709074655000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212623002612"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":49,"alternative-id":["S2214212623002612"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103677","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2024,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103677","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103677"}}