{"id":"https://openalex.org/W4415002957","doi":"https://doi.org/10.1109/jiot.2025.3619877","title":"Optimizing Security of Medical Images Against Statistical Cryptanalysis Using Isomorphic Elliptic Curves","display_name":"Optimizing Security of Medical Images Against Statistical Cryptanalysis Using Isomorphic Elliptic Curves","publication_year":2025,"publication_date":"2025-10-09","ids":{"openalex":"https://openalex.org/W4415002957","doi":"https://doi.org/10.1109/jiot.2025.3619877"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3619877","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3619877","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077024549","display_name":"Takreem Haider","orcid":"https://orcid.org/0000-0002-9224-4576"},"institutions":[{"id":"https://openalex.org/I4210143942","display_name":"National University of Technology","ror":"https://ror.org/05e21fw44","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210143942"]},{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Takreem Haider","raw_affiliation_strings":["Department of Basic Sciences and Humanities, College of Electrical and Mechanical Engineering, National University of Sciences and Technology, Islamabad, Pakistan","Department of Basic Sciences &#x0026; Humanities, College of Electrical and Mechanical Engineering, National University of Sciences and Technology, Islamabad, Pakistan"],"raw_orcid":"https://orcid.org/0000-0002-9224-4576","affiliations":[{"raw_affiliation_string":"Department of Basic Sciences and Humanities, College of Electrical and Mechanical Engineering, National University of Sciences and Technology, Islamabad, Pakistan","institution_ids":["https://openalex.org/I929597975"]},{"raw_affiliation_string":"Department of Basic Sciences &#x0026; Humanities, College of Electrical and Mechanical Engineering, National University of Sciences and Technology, Islamabad, Pakistan","institution_ids":["https://openalex.org/I4210143942"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069120004","display_name":"Naveed Ahmed Azam","orcid":"https://orcid.org/0000-0002-7941-3419"},"institutions":[{"id":"https://openalex.org/I12469534","display_name":"Quaid-i-Azam University","ror":"https://ror.org/04s9hft57","country_code":"PK","type":"education","lineage":["https://openalex.org/I12469534"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Naveed Ahmed Azam","raw_affiliation_strings":["Discrete Mathematics and Computational Intelligence Laboratory, Quaid-i-Azam University, Islamabad, Pakistan","Quaid-i-Azam University, Islamabad, Pakistan"],"raw_orcid":"https://orcid.org/0000-0002-7941-3419","affiliations":[{"raw_affiliation_string":"Discrete Mathematics and Computational Intelligence Laboratory, Quaid-i-Azam University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I12469534"]},{"raw_affiliation_string":"Quaid-i-Azam University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I12469534"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007686245","display_name":"Afshan Batool","orcid":"https://orcid.org/0000-0002-4729-4785"},"institutions":[{"id":"https://openalex.org/I6292670","display_name":"Fatima Jinnah Women University","ror":"https://ror.org/009026n40","country_code":"PK","type":"education","lineage":["https://openalex.org/I6292670"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Afshan Batool","raw_affiliation_strings":["Department of Mathematical Sciences, Fatima Jinnah Women University, Rawalpindi, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematical Sciences, Fatima Jinnah Women University, Rawalpindi, Pakistan","institution_ids":["https://openalex.org/I6292670"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5077024549"],"corresponding_institution_ids":["https://openalex.org/I4210143942","https://openalex.org/I929597975"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.398667,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":"24","first_page":"54274","last_page":"54283"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9829000234603882,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9789000153541565,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7425000071525574},{"id":"https://openalex.org/keywords/shuffling","display_name":"Shuffling","score":0.5389999747276306},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.5307000279426575},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5091999769210815},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.4961000084877014},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46860000491142273},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.45489999651908875},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.415800005197525},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.3790000081062317}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7425000071525574},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7077000141143799},{"id":"https://openalex.org/C167927819","wikidata":"https://www.wikidata.org/wiki/Q1930567","display_name":"Shuffling","level":2,"score":0.5389999747276306},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.5307000279426575},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5091999769210815},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.4961000084877014},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46860000491142273},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.45489999651908875},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45329999923706055},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.42329999804496765},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.415800005197525},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3790000081062317},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.37689998745918274},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.3734000027179718},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.3183000087738037},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.29280000925064087},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.28790000081062317},{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.287200003862381},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27570000290870667},{"id":"https://openalex.org/C140642157","wikidata":"https://www.wikidata.org/wiki/Q1623338","display_name":"Pseudorandom number generator","level":2,"score":0.27230000495910645},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.26829999685287476},{"id":"https://openalex.org/C87007009","wikidata":"https://www.wikidata.org/wiki/Q210832","display_name":"Statistical hypothesis testing","level":2,"score":0.2680000066757202},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.2667999863624573},{"id":"https://openalex.org/C120226833","wikidata":"https://www.wikidata.org/wiki/Q5172844","display_name":"Correlation attack","level":4,"score":0.26660001277923584},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2662000060081482},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.26420000195503235},{"id":"https://openalex.org/C187455244","wikidata":"https://www.wikidata.org/wiki/Q942353","display_name":"Boolean function","level":2,"score":0.2606000006198883},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2513999938964844},{"id":"https://openalex.org/C200985842","wikidata":"https://www.wikidata.org/wiki/Q3375503","display_name":"Random permutation","level":3,"score":0.2500999867916107}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3619877","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3619877","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W3089532416","https://openalex.org/W3092259722","https://openalex.org/W3119373096","https://openalex.org/W3133565686","https://openalex.org/W3217476113","https://openalex.org/W4200328444","https://openalex.org/W4213326178","https://openalex.org/W4214829631","https://openalex.org/W4288391520","https://openalex.org/W4292027090","https://openalex.org/W4295135090","https://openalex.org/W4307816509","https://openalex.org/W4308312253","https://openalex.org/W4311461110","https://openalex.org/W4312419528","https://openalex.org/W4312903735","https://openalex.org/W4313419372","https://openalex.org/W4313529819","https://openalex.org/W4313652559","https://openalex.org/W4377030658","https://openalex.org/W4377030789","https://openalex.org/W4381733142","https://openalex.org/W4385250130","https://openalex.org/W4386600428","https://openalex.org/W4386906199","https://openalex.org/W4392683354","https://openalex.org/W4396214332","https://openalex.org/W4396671407","https://openalex.org/W4396982354","https://openalex.org/W4398977367","https://openalex.org/W4399146450","https://openalex.org/W4399327623","https://openalex.org/W4407518213","https://openalex.org/W4407949269"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,8,74,113,181],"growing":[2],"exchange":[3],"of":[4,10,105,183],"digital":[5],"images":[6,23],"in":[7,160,190],"Internet":[9],"Things":[11],"(IoT),":[12],"securing":[13,191],"sensitive":[14,192],"data,":[15],"particularly":[16,189],"medical":[17,141,193],"images,":[18],"has":[19],"become":[20],"critical.":[21],"These":[22,178],"are":[24,82],"essential":[25],"for":[26,70,122,186],"diagnosis":[27],"but":[28],"vulnerable":[29,46],"to":[30,33,47,156,171],"cyberattacks":[31],"due":[32],"predictable":[34],"anatomical":[35],"patterns.":[36],"Traditional":[37],"encryption":[38,55,168],"methods":[39,153],"typically":[40],"ignore":[41],"these":[42],"patterns,":[43],"making":[44],"them":[45],"statistical":[48,134],"attacks.":[49],"We":[50],"propose":[51],"a":[52,94,116,123,139],"novel":[53],"image":[54,63,142],"scheme":[56,129,185],"that":[57],"incorporates":[58],"both":[59],"local":[60,75],"and":[61,79,84,145,163,198],"global":[62,114],"information":[64],"using":[65,87,138],"isomorphic":[66,90],"elliptic":[67],"curves":[68],"(ECs)":[69],"optimal":[71],"security.":[72],"At":[73,112],"level,":[76,115],"central":[77],"pixels":[78],"their":[80],"neighboring":[81],"identified":[83],"independently":[85],"encrypted":[86],"points":[88],"on":[89],"ECs,":[91],"selected":[92],"through":[93],"carefully":[95],"designed":[96,121],"random":[97],"walk":[98],"algorithm.":[99],"This":[100],"process":[101],"ensures":[102],"robust":[103],"disruption":[104],"spatial":[106],"dependencies":[107],"while":[108,195],"maintaining":[109],"computational":[110,165],"efficiency.":[111],"plain-image-sensitive":[117],"shuffling":[118],"generator":[119],"is":[120],"second":[124],"confusion":[125],"layer.":[126],"The":[127],"proposed":[128],"demonstrates":[130],"high":[131],"security":[132,197],"against":[133],"cryptanalysis":[135],"when":[136],"evaluated":[137],"benchmark":[140],"database":[143],"MedPix":[144],"standard":[146],"evaluation":[147],"criteria.":[148],"Additionally,":[149],"comparisons":[150],"with":[151,167],"state-of-the-art":[152],"reveal":[154],"up":[155,170],"an":[157],"8-fold":[158],"reduction":[159],"pixel":[161],"correlation":[162],"significant":[164],"efficiency,":[166],"speeds":[169],"60":[172],"times":[173],"faster":[174],"than":[175],"existing":[176],"approaches.":[177],"findings":[179],"highlight":[180],"potential":[182],"our":[184],"real-world":[187],"applications,":[188],"data":[194],"balancing":[196],"performance.":[199]},"counts_by_year":[],"updated_date":"2025-12-11T23:09:37.256380","created_date":"2025-10-10T00:00:00"}
