{"id":"https://openalex.org/W7117163069","doi":"https://doi.org/10.1007/s10791-025-09876-9","title":"A hybrid encryption model for medical image security in IoT healthcare","display_name":"A hybrid encryption model for medical image security in IoT healthcare","publication_year":2025,"publication_date":"2025-12-24","ids":{"openalex":"https://openalex.org/W7117163069","doi":"https://doi.org/10.1007/s10791-025-09876-9"},"language":"en","primary_location":{"id":"doi:10.1007/s10791-025-09876-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10791-025-09876-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10791-025-09876-9.pdf","source":{"id":"https://openalex.org/S5407036663","display_name":"Discover Computing","issn_l":"2948-2992","issn":["2948-2992"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1007/s10791-025-09876-9.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113351417","display_name":"Shahnwaz Afzal","orcid":null},"institutions":[{"id":"https://openalex.org/I171210897","display_name":"Aligarh Muslim University","ror":"https://ror.org/03kw9gc02","country_code":"IN","type":"education","lineage":["https://openalex.org/I171210897"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Shahnwaz Afzal","raw_affiliation_strings":["Department of Computer Science, Aligarh Muslim University, Aligarh, 202002, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Aligarh Muslim University, Aligarh, 202002, India","institution_ids":["https://openalex.org/I171210897"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066482651","display_name":"M. U. Bokhari","orcid":null},"institutions":[{"id":"https://openalex.org/I171210897","display_name":"Aligarh Muslim University","ror":"https://ror.org/03kw9gc02","country_code":"IN","type":"education","lineage":["https://openalex.org/I171210897"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mohammad Ubaidullah Bokhari","raw_affiliation_strings":["Department of Computer Science, Aligarh Muslim University, Aligarh, 202002, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Aligarh Muslim University, Aligarh, 202002, India","institution_ids":["https://openalex.org/I171210897"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051606111","display_name":"Imran Khan","orcid":"https://orcid.org/0000-0001-6201-262X"},"institutions":[{"id":"https://openalex.org/I5847235","display_name":"University of Petroleum and Energy Studies","ror":"https://ror.org/04q2jes40","country_code":"IN","type":"education","lineage":["https://openalex.org/I5847235"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Imran Khan","raw_affiliation_strings":["School of Computer Science, UPES, Dehradun, 248007, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science, UPES, Dehradun, 248007, India","institution_ids":["https://openalex.org/I5847235"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121130647","display_name":"Md Ashraf Sidiqui","orcid":null},"institutions":[{"id":"https://openalex.org/I171210897","display_name":"Aligarh Muslim University","ror":"https://ror.org/03kw9gc02","country_code":"IN","type":"education","lineage":["https://openalex.org/I171210897"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Md Ashraf Sidiqui","raw_affiliation_strings":["Department of Computer Science, Aligarh Muslim University, Aligarh, 202002, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Aligarh Muslim University, Aligarh, 202002, India","institution_ids":["https://openalex.org/I171210897"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060626409","display_name":"Ausaf Ahmad","orcid":"https://orcid.org/0000-0003-4196-5290"},"institutions":[{"id":"https://openalex.org/I189949046","display_name":"Integral University","ror":"https://ror.org/039zd5s34","country_code":"IN","type":"education","lineage":["https://openalex.org/I189949046"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ausaf Ahmad","raw_affiliation_strings":["Department of Computer Applications, Integral University, Lucknow, 226026, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Applications, Integral University, Lucknow, 226026, India","institution_ids":["https://openalex.org/I189949046"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060296907","display_name":"Mohammad Aijaz","orcid":"https://orcid.org/0000-0003-1177-6800"},"institutions":[{"id":"https://openalex.org/I4210114149","display_name":"KR Mangalam University","ror":"https://ror.org/026b9sf88","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210114149"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mohammad Aijaz","raw_affiliation_strings":["School of Engineering Technology, KR Mangalam University, Gurugram, Haryana, 122103, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Engineering Technology, KR Mangalam University, Gurugram, Haryana, 122103, India","institution_ids":["https://openalex.org/I4210114149"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5113351417"],"corresponding_institution_ids":["https://openalex.org/I171210897"],"apc_list":null,"apc_paid":null,"fwci":1.0875,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.84800231,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"28","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9545999765396118,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9545999765396118,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.0035000001080334187,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.002899999963119626,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.666100025177002},{"id":"https://openalex.org/keywords/logistic-map","display_name":"Logistic map","score":0.5906999707221985},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.5692999958992004},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.46619999408721924},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.44119998812675476},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.4381999969482422},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.4066999852657318},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.37869998812675476}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.666100025177002},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6564000248908997},{"id":"https://openalex.org/C205330730","wikidata":"https://www.wikidata.org/wiki/Q587182","display_name":"Logistic map","level":3,"score":0.5906999707221985},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.5692999958992004},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.46619999408721924},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.44119998812675476},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.4381999969482422},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.42419999837875366},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.4066999852657318},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3840000033378601},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3788999915122986},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.37869998812675476},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3353999853134155},{"id":"https://openalex.org/C140642157","wikidata":"https://www.wikidata.org/wiki/Q1623338","display_name":"Pseudorandom number generator","level":2,"score":0.3107999861240387},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.31040000915527344},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3084999918937683},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.2989000082015991},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28349998593330383},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.27630001306533813},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.272599995136261},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.2709999978542328},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2547999918460846},{"id":"https://openalex.org/C128040838","wikidata":"https://www.wikidata.org/wiki/Q1810628","display_name":"Pseudorandom binary sequence","level":3,"score":0.2526000142097473},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.250900000333786},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.2502000033855438}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s10791-025-09876-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10791-025-09876-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10791-025-09876-9.pdf","source":{"id":"https://openalex.org/S5407036663","display_name":"Discover Computing","issn_l":"2948-2992","issn":["2948-2992"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c06de121ec7d4c3f901797920a32a2b7","is_oa":true,"landing_page_url":"https://doaj.org/article/c06de121ec7d4c3f901797920a32a2b7","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Computing, Vol 28, Iss 1, Pp 1-28 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s10791-025-09876-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10791-025-09876-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10791-025-09876-9.pdf","source":{"id":"https://openalex.org/S5407036663","display_name":"Discover Computing","issn_l":"2948-2992","issn":["2948-2992"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7117163069.pdf","grobid_xml":"https://content.openalex.org/works/W7117163069.grobid-xml"},"referenced_works_count":51,"referenced_works":["https://openalex.org/W1663607773","https://openalex.org/W1672978577","https://openalex.org/W1968529674","https://openalex.org/W1991542226","https://openalex.org/W1998796124","https://openalex.org/W2026829213","https://openalex.org/W2030573814","https://openalex.org/W2036600156","https://openalex.org/W2043811010","https://openalex.org/W2057835419","https://openalex.org/W2083903192","https://openalex.org/W2085220963","https://openalex.org/W2090023141","https://openalex.org/W2239443241","https://openalex.org/W2285315122","https://openalex.org/W2307832139","https://openalex.org/W2325549442","https://openalex.org/W2500458381","https://openalex.org/W2571676206","https://openalex.org/W2798680093","https://openalex.org/W2800685942","https://openalex.org/W2918576491","https://openalex.org/W3003680203","https://openalex.org/W3005779010","https://openalex.org/W3006939600","https://openalex.org/W3011537221","https://openalex.org/W3081291413","https://openalex.org/W3122910428","https://openalex.org/W3144240226","https://openalex.org/W4205557962","https://openalex.org/W4211264115","https://openalex.org/W4226495087","https://openalex.org/W4281254590","https://openalex.org/W4282007345","https://openalex.org/W4283365097","https://openalex.org/W4362584551","https://openalex.org/W4379518973","https://openalex.org/W4381832968","https://openalex.org/W4385583282","https://openalex.org/W4386736866","https://openalex.org/W4392543740","https://openalex.org/W4399302970","https://openalex.org/W4400298202","https://openalex.org/W4401487129","https://openalex.org/W4405269676","https://openalex.org/W4406126273","https://openalex.org/W4406645643","https://openalex.org/W4407315261","https://openalex.org/W4410218100","https://openalex.org/W4411024989","https://openalex.org/W4412932420"],"related_works":[],"abstract_inverted_index":{"Modern":[0],"healthcare":[1,52],"systems":[2,53,176],"depend":[3],"upon":[4],"the":[5,16,62,114,153,171,185,192,244,250],"safe":[6],"transmission":[7],"of":[8,18,156,173,262],"medical":[9,199],"images,":[10],"where":[11],"maintaining":[12],"patient":[13],"confidentiality":[14],"and":[15,27,39,43,58,82,96,105,134,158,177,207,227,235,265],"integrity":[17],"their":[19],"data":[20],"remain":[21],"key":[22,34,108],"factors.":[23],"However,":[24],"contemporary":[25],"chaotic":[26,76,175],"DNA-based":[28],"encryption":[29,69],"schemes":[30],"generally":[31],"have":[32,210],"low":[33],"sensitivity,":[35],"fixed":[36,178],"encoding":[37,193,257],"rules,":[38],"high":[40,94],"computational":[41],"time":[42],"efficiency":[44,97],"overheads,":[45],"making":[46],"them":[47],"impractical":[48],"options":[49],"for":[50,98,271],"IoT":[51],"that":[54,145,252],"demand":[55],"security,":[56],"efficiency,":[57],"real-time":[59],"performance.":[60],"Herein,":[61],"model":[63,70,167],"presents":[64],"a":[65,131,140,260],"lightweight":[66],"hybrid":[67,256],"image":[68,268],"with":[71,231],"dynamic":[72,162],"DNA":[73,132,180],"encoding,":[74,163],"logistic":[75,91],"permutation,":[77],"SHA-256-based":[78],"pseudorandom":[79],"stream":[80],"generation,":[81],"an":[83,119],"innovative":[84],"Fibonacci-based":[85],"circular":[86],"shift":[87],"diffusion":[88,159],"transformation.":[89],"The":[90],"map":[92],"offers":[93],"sensitivity":[95,109],"pixel":[99],"permutation":[100],"while":[101,110],"being":[102],"computationally":[103],"inexpensive,":[104],"SHA-256":[106],"enhances":[107],"introducing":[111],"randomization":[112],"at":[113,188],"byte":[115,125],"level.":[116],"By":[117],"using":[118,139,201],"adaptive":[120],"rule":[121],"set,":[122],"each":[123,189],"XORed":[124],"can":[126,146],"be":[127,148],"mapped":[128],"dynamically":[129],"to":[130,136,168],"sequence":[133],"diffused":[135],"its":[137],"target":[138],"reversible,":[141],"key-dependent":[142],"Fibonacci":[143],"rotation":[144],"also":[147],"adaptive.":[149],"These":[150],"processes":[151],"provide":[152],"highest":[154],"levels":[155],"confusion":[157],"via":[160],"secure":[161,264],"which":[164],"allows":[165],"our":[166,216,247,253],"adequately":[169],"address":[170],"shortcomings":[172],"low-dimensional":[174],"operational":[179],"mappings":[181],"by":[182,215],"yielding":[183,220],"roughly":[184],"same":[186],"entropy":[187,221],"snapshot":[190],"during":[191],"process.":[194],"Rigorous":[195],"experimental":[196],"evaluations":[197],"on":[198],"images":[200],"entropy,":[202],"NPCR,":[203],"UACI,":[204],"histogram":[205,233],"uniformity,":[206],"correlation":[208,241],"metrics":[209],"demonstrated":[211],"stronger":[212],"performance":[213],"overall":[214],"proposed":[217,255],"model,":[218],"ultimately":[219],"\u2248":[222,225,229],"7.9976,":[223],"NPCR":[224],"99.7268,":[226],"UACI":[228,239],"33.72077,":[230],"some":[232],"uniformity":[234],"less":[236],"than":[237],"average":[238],"or":[240],"rates":[242],"across":[243],"pairs.":[245],"Overall,":[246],"findings":[248],"support":[249],"claim":[251],"newly":[254],"framework":[258],"provides":[259],"means":[261],"delivering":[263],"efficient":[266],"encoded":[267],"broadcasts,":[269],"ideal":[270],"modern":[272],"healthcare.":[273]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-12-24T00:00:00"}
