Steganography-Based Transmission of Medical Images Over Unsecure Network for Telemedicine Applications

Steganography is one of the best techniques to hide secret data. Several steganography methods are available that use an image as a cover object, which is called image steganography. In image steganography, the major features are the cover object quality and hiding data capacity. Due to poor image q...

Full description

Saved in:
Bibliographic Details
Published inComputers, materials & continua Vol. 68; no. 3; pp. 4069 - 4085
Main Authors Mansour, Romany F, Girgis, Moheb R
Format Journal Article
LanguageEnglish
Published Henderson Tech Science Press 2021
Subjects
Online AccessGet full text
ISSN1546-2226
1546-2218
1546-2226
DOI10.32604/cmc.2021.017064

Cover

Loading…
Abstract Steganography is one of the best techniques to hide secret data. Several steganography methods are available that use an image as a cover object, which is called image steganography. In image steganography, the major features are the cover object quality and hiding data capacity. Due to poor image quality, attackers could easily hack the secret data. Therefore, the hidden data quantity should be improved, while keeping stego-image quality high. The main aim of this study is combining several steganography techniques, for secure transmission of data without leakage and unauthorized access. In this paper, a technique, which combines various steganography-based techniques, is proposed for secure transmission of secret data. In the pre-processing step, resizing of cover image is performed with Pixel Repetition Method (PRM). Then DES (Data Encryption Standard) algorithm is used to encrypt secret data before embedding it into cover image. The encrypted data is then converted to hexadecimal representation. This is followed by embedding using Least Signification Bit (LSB) in order to hide secret data inside the cover image. Further, image de-noising using Convolutional Neural Network (CNN) is used to enhance the cover image with hidden encrypted data. Embedded Zerotrees of Wavelet Transform is used to compress the image in order to reduce its size. Experiments are conducted to evaluate the performance of proposed combined steganography technique and results indicate that the proposed technique outperforms all existing techniques. It achieves better PSNR, and encryption/decryption times, than existing methods for medical and other types of images.
AbstractList Steganography is one of the best techniques to hide secret data. Several steganography methods are available that use an image as a cover object, which is called image steganography. In image steganography, the major features are the cover object quality and hiding data capacity. Due to poor image quality, attackers could easily hack the secret data. Therefore, the hidden data quantity should be improved, while keeping stego-image quality high. The main aim of this study is combining several steganography techniques, for secure transmission of data without leakage and unauthorized access. In this paper, a technique, which combines various steganography-based techniques, is proposed for secure transmission of secret data. In the pre-processing step, resizing of cover image is performed with Pixel Repetition Method (PRM). Then DES (Data Encryption Standard) algorithm is used to encrypt secret data before embedding it into cover image. The encrypted data is then converted to hexadecimal representation. This is followed by embedding using Least Signification Bit (LSB) in order to hide secret data inside the cover image. Further, image de-noising using Convolutional Neural Network (CNN) is used to enhance the cover image with hidden encrypted data. Embedded Zerotrees of Wavelet Transform is used to compress the image in order to reduce its size. Experiments are conducted to evaluate the performance of proposed combined steganography technique and results indicate that the proposed technique outperforms all existing techniques. It achieves better PSNR, and encryption/decryption times, than existing methods for medical and other types of images.
Author R. Girgis, Moheb
F. Mansour, Romany
Author_xml – sequence: 1
  givenname: Romany
  surname: Mansour
  middlename: F
  fullname: Mansour, Romany F
– sequence: 2
  givenname: Moheb
  surname: Girgis
  middlename: R
  fullname: Girgis, Moheb R
BookMark eNp1kD1PwzAQhi1UJNrCzmiJOcUfiROPgPioVOhAO1uOey4piR3sFNR_T9oyICSmu-F93tM9IzRw3gFCl5RMOBMkvTaNmTDC6ITQnIj0BA1ploqEMSYGv_YzNIpxQwgXXJIhsq8drLXz66Dbt11yqyOs8CJoF5sqxso77C1-hlVldI2njV5DxPNPCHjpIphtAPwC3ZcP79j6gBdQQ7MPVw7wTdvWPdb1JfEcnVpdR7j4mWO0fLhf3D0ls_nj9O5mlhhOeZfIUmsrc0ZtZnMmaJpbUWoQhnLgkOpcg81ISaWUkAEpCplmZcnyQoDVjBM-RlfH3jb4jy3ETm38Nrj-pGIZzwQtZJH2KXJMmeBjDGBVG6pGh52iRB1sqt6m2ttUR5s9Iv4gpuoOv3VBV_X_4DftZHzV
CitedBy_id crossref_primary_10_48084_etasr_5501
crossref_primary_10_1016_j_aej_2023_05_051
crossref_primary_10_32604_cmc_2022_021185
crossref_primary_10_32604_csse_2023_023307
crossref_primary_10_48084_etasr_4296
Cites_doi 10.1016/j.chaos.2005.08.110
10.4236/jis.2012.32011
10.1016/j.compeleceng.2015.12.011
10.1007/s11042-016-4253-x
10.1109/78.258085
10.1007/s11042-017-4935-z
10.1007/s11042-006-0008-4
10.1016/j.jbi.2017.08.002
10.1016/j.neunet.2019.12.024
10.1007/s11128-017-1694-8
10.1177/0165551518816303
10.1007/s11042-019-08251-3
10.1109/ACCESS.2019.2894295
10.1155/2012/173931
10.1016/j.mehy.2020.109691
10.1016/j.ins.2017.12.041
10.33633/jais.v2i1.1330
10.1007/s11042-013-1832-y
10.1016/j.future.2018.02.023
10.1007/s10773-015-2640-0
10.48084/etasr.2380
10.1007/s11045-018-0575-3
10.11591/ijeecs.v2.i3.pp712-719
10.1016/j.chaos.2003.12.022
10.1007/s11042-018-6476-5
ContentType Journal Article
Copyright 2021. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2021. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
7SC
7SR
8BQ
8FD
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
JG9
JQ2
L7M
L~C
L~D
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
DOI 10.32604/cmc.2021.017064
DatabaseName CrossRef
Computer and Information Systems Abstracts
Engineered Materials Abstracts
METADEX
Technology Research Database
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials - QC
ProQuest Central
ProQuest One
ProQuest Central Korea
Materials Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
DatabaseTitle CrossRef
Publicly Available Content Database
Materials Research Database
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest One Academic Eastern Edition
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest Central China
METADEX
Computer and Information Systems Abstracts Professional
ProQuest Central
Engineered Materials Abstracts
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
Advanced Technologies Database with Aerospace
ProQuest One Academic (New)
DatabaseTitleList Publicly Available Content Database
Database_xml – sequence: 1
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1546-2226
EndPage 4085
ExternalDocumentID 10_32604_cmc_2021_017064
GroupedDBID AAFWJ
AAYXX
ACIWK
ADMLS
AFKRA
ALMA_UNASSIGNED_HOLDINGS
BENPR
CCPQU
CITATION
EBS
EJD
J9A
OK1
P2P
PHGZM
PHGZT
PIMPY
PUEGO
RTS
TUS
7SC
7SR
8BQ
8FD
ABUWG
AZQEC
DWQXO
JG9
JQ2
L7M
L~C
L~D
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c313t-9baaf9721f5f726147f6bae6c13e3e4a7aef50b1999e5e088945bb2786efa2303
IEDL.DBID BENPR
ISSN 1546-2226
1546-2218
IngestDate Mon Jun 30 04:21:08 EDT 2025
Thu Apr 24 22:59:12 EDT 2025
Mon Sep 01 05:05:00 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Issue 3
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c313t-9baaf9721f5f726147f6bae6c13e3e4a7aef50b1999e5e088945bb2786efa2303
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
OpenAccessLink https://www.proquest.com/docview/2535618984?pq-origsite=%requestingapplication%
PQID 2535618984
PQPubID 2048737
PageCount 17
ParticipantIDs proquest_journals_2535618984
crossref_primary_10_32604_cmc_2021_017064
crossref_citationtrail_10_32604_cmc_2021_017064
PublicationCentury 2000
PublicationDate 2021-00-00
20210101
PublicationDateYYYYMMDD 2021-01-01
PublicationDate_xml – year: 2021
  text: 2021-00-00
PublicationDecade 2020
PublicationPlace Henderson
PublicationPlace_xml – name: Henderson
PublicationTitle Computers, materials & continua
PublicationYear 2021
Publisher Tech Science Press
Publisher_xml – name: Tech Science Press
References Laimeche (ref11) 2019; 51
Sreehari (ref17) 2018
Wang (ref43) 2008
Ardiansyah (ref20) 2017
Manjula (ref22) 2016; 3
Li (ref27) 2019
Qu (ref33) 2019; 78
Rachmawanto (ref24) 2017
Kim (ref14) 2020; 79
Loukhaoukha (ref42) 2012; 2012
Parah (ref18) 2020; 108
Gao (ref40) 2006; 29
Jung (ref21) 2015; 74
Umair (ref8) 2017
Miri (ref15) 2018; 77
Mansour (ref6) 2012; 3
Tian (ref26) 2020; 124
Rahim (ref13) 2018; 11132
Rachmawanto (ref23) 2017; 2
Bailey (ref36) 2006; 30
Sahu (ref9) 2016; 2
Qu (ref31) 2016
Kaur (ref16) 2016; 2
Rahmani (ref3) 2018; 435
Parah (ref25) 2018; 77
Chen (ref41) 2004; 21
Karakus (ref1) 2020; 139
Ahmadi (ref5) 2017
Sakthidasan (ref12) 2016; 54
Loan (ref10) 2017; 73
Shapiro (ref28) 1993; 41
Jiang (ref30) 2016; 55
Mansour (ref7) 2019; 30
Hussain (ref4) 2018; 65
Heidari (ref32) 2017; 16
Rehman (ref37) 2019; 45
Sivakumar (ref39) 2013; 12
Güler (ref19) 2017
Jassim (ref34) 2013; 72
Rasras (ref38) 2019; 9
Roy (ref2) 2017
Qu (ref29) 2019; 7
Muhammad (ref35) 2015; 9
References_xml – volume: 9
  start-page: 1938
  year: 2015
  ident: ref35
  article-title: A secure method for color image steganography using gray-level modification and multi-level encryption
  publication-title: TIIS
– volume: 29
  start-page: 393
  year: 2006
  ident: ref40
  article-title: A new chaotic algorithm for image encryption
  publication-title: Chaos, Solitons & Fractals
  doi: 10.1016/j.chaos.2005.08.110
– volume: 3
  start-page: 91
  year: 2012
  ident: ref6
  article-title: A robust method to detect hidden data from digital images
  publication-title: Journal of Information Security
  doi: 10.4236/jis.2012.32011
– start-page: 45
  year: 2017
  ident: ref5
  article-title: Image steganography with artificial immune system
– volume: 65
  start-page: 46
  year: 2018
  ident: ref4
  article-title: Image steganography in spatial domain: A survey
  publication-title: Signal Processing: Image Communication
– volume: 54
  start-page: 382
  year: 2016
  ident: ref12
  article-title: Noise free image restoration using hybrid filter with adaptive genetic algorithm
  publication-title: Computers & Electrical Engineering
  doi: 10.1016/j.compeleceng.2015.12.011
– volume: 77
  start-page: 185
  year: 2018
  ident: ref25
  article-title: Information hiding in edges: A high capacity information hiding technique using hybrid edge detection
  publication-title: Multimedia Tools Applications
  doi: 10.1007/s11042-016-4253-x
– year: 2008
  ident: ref43
  article-title: An image scrambling encryption using chaos controlled Poker shuffle operation
– start-page: 16
  year: 2017
  ident: ref24
  article-title: A performance analysis StegoCrypt algorithm based on LSB-AES 128 bit in various image size
– volume: 41
  start-page: 3445
  year: 1993
  ident: ref28
  article-title: Embedded image coding using zerotrees of wavelet coefficients
  publication-title: IEEE Transactions on Signal Processing
  doi: 10.1109/78.258085
– year: 2017
  ident: ref8
  publication-title: Comparison of Symmetric Block Encryption Algorithms
– volume: 77
  start-page: 13133
  year: 2018
  ident: ref15
  article-title: An image steganography method based on integer wavelet transform
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-017-4935-z
– volume: 30
  start-page: 55
  year: 2006
  ident: ref36
  article-title: An evaluation of image based steganography methods
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-006-0008-4
– volume: 73
  start-page: 125
  year: 2017
  ident: ref10
  article-title: Hiding electronic patient record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications
  publication-title: Journal of Biomedical Informatics
  doi: 10.1016/j.jbi.2017.08.002
– volume: 124
  start-page: 117
  year: 2020
  ident: ref26
  article-title: Attention-guided CNN for image denoising
  publication-title: Neural Networks
  doi: 10.1016/j.neunet.2019.12.024
– volume: 16
  start-page: 242
  year: 2017
  ident: ref32
  article-title: A novel quantum LSB-based steganography method using the gray code for colored quantum images
  publication-title: Quantum Information Processing
  doi: 10.1007/s11128-017-1694-8
– volume: 45
  start-page: 767
  year: 2019
  ident: ref37
  article-title: Data hiding technique in steganography for information security using number theory
  publication-title: Journal of Information Science
  doi: 10.1177/0165551518816303
– start-page: 7026
  year: 2019
  ident: ref27
  article-title: Attention guided unified network for panoptic segmentation
– volume: 51
  start-page: 1
  year: 2019
  ident: ref11
  article-title: Enhancing LSB embedding schemes using chaotic maps systems
  publication-title: Neural Computing and Applications
– volume: 79
  start-page: 1355
  year: 2020
  ident: ref14
  article-title: CNN-based image steganalysis using additional data embedding
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-019-08251-3
– volume: 7
  start-page: 35684
  year: 2019
  ident: ref29
  article-title: Matrix coding-based quantum image steganography algorithm
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2894295
– volume: 2012
  start-page: 1
  year: 2012
  ident: ref42
  article-title: A secure image encryption algorithm based on Rubik’s cube principle
  publication-title: Journal of Electrical and Computer Engineering
  doi: 10.1155/2012/173931
– volume: 139
  start-page: 109691
  year: 2020
  ident: ref1
  article-title: A new image steganography method with optimum pixel similarity for data hiding in medical images
  publication-title: Medical Hypotheses
  doi: 10.1016/j.mehy.2020.109691
– volume: 435
  start-page: 224
  year: 2018
  ident: ref3
  article-title: An efficient histogram-based index mapping mechanism for reversible data hiding in VQ-compressed images
  publication-title: Information Sciences
  doi: 10.1016/j.ins.2017.12.041
– start-page: 394
  year: 2016
  ident: ref31
  article-title: A novel self-adaptive quantum steganography based on quantum image and quantum watermark
– start-page: 249
  year: 2017
  ident: ref20
  article-title: Hybrid method using 3-DES, DWT and LSB for secure image steganography algorithm
– volume: 2
  start-page: 1
  year: 2017
  ident: ref23
  article-title: Secure image steganography algorithm based on DCT with otp encryption
  publication-title: Journal of Applied Intelligent System
  doi: 10.33633/jais.v2i1.1330
– volume: 72
  start-page: 39
  year: 2013
  ident: ref34
  article-title: A novel steganography algorithm for hiding text in image using five modulus method
  publication-title: International Journal of Computer Applications
– volume: 74
  start-page: 2143
  year: 2015
  ident: ref21
  article-title: Steganographic method based on interpolation and LSB substitution of digital images
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-013-1832-y
– volume: 12
  start-page: 407
  year: 2013
  ident: ref39
  article-title: A novel image encryption approach using matrix reordering
  publication-title: WSEAS Transactions on Computers
– start-page: 52
  year: 2018
  ident: ref17
  article-title: Implementation of hybrid cryptosystem using DES and MD5
– volume: 108
  start-page: 935
  year: 2020
  ident: ref18
  article-title: Electronic health record hiding in images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2018.02.023
– volume: 55
  start-page: 107
  year: 2016
  ident: ref30
  article-title: LSB based quantum image steganography algorithm
  publication-title: International Journal of Theoretical Physics
  doi: 10.1007/s10773-015-2640-0
– volume: 9
  start-page: 3681
  year: 2019
  ident: ref38
  article-title: A methodology based on steganography and cryptography to protect highly secure messages
  publication-title: Engineering Technology & Applied Science Research
  doi: 10.48084/etasr.2380
– start-page: 49
  year: 2017
  ident: ref19
  article-title: CUDA implementation of DES algorithm for lightweight platforms
– volume: 3
  start-page: 1715
  year: 2016
  ident: ref22
  article-title: Color image encryption and decryption using DES algorithm
  publication-title: International Research Journal of Engineering and Technology
– volume: 30
  start-page: 791
  year: 2019
  ident: ref7
  article-title: An evolutionary computing enriched RS attack resilient medical image steganography model for telemedicine applications
  publication-title: Multidim Syst. Sign Process
  doi: 10.1007/s11045-018-0575-3
– year: 2017
  ident: ref2
  publication-title: Visual Cryptographic Steganography with Data Integrity
– volume: 2
  start-page: 712
  year: 2016
  ident: ref9
  article-title: A review on LSB substitution and PVD based image steganography techniques
  publication-title: Indonesian Journal of Electrical Engineering and Computer Science
  doi: 10.11591/ijeecs.v2.i3.pp712-719
– volume: 21
  start-page: 749
  year: 2004
  ident: ref41
  article-title: A symmetric image encryption scheme based on 3D chaotic cat maps
  publication-title: Chaos, Solitons and Fractals
  doi: 10.1016/j.chaos.2003.12.022
– volume: 2
  start-page: 1
  year: 2016
  ident: ref16
  article-title: A new LSB embedding for 24-bit pixel using multi-layered bitwise XOR
– volume: 78
  start-page: 7981
  year: 2019
  ident: ref33
  article-title: A novel quantum image steganography algorithm based on exploiting modification direction
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-018-6476-5
– volume: 11132
  start-page: 723
  year: 2018
  ident: ref13
  article-title: End-to-end trained CNN encoder-decoder networks for image steganography
SSID ssj0036390
Score 2.244351
Snippet Steganography is one of the best techniques to hide secret data. Several steganography methods are available that use an image as a cover object, which is...
SourceID proquest
crossref
SourceType Aggregation Database
Enrichment Source
Index Database
StartPage 4069
SubjectTerms Algorithms
Artificial neural networks
Data encryption
Embedding
Encryption
Image enhancement
Image quality
Image transmission
Layouts
Medical imaging
Steganography
Telemedicine
Wavelet transforms
Title Steganography-Based Transmission of Medical Images Over Unsecure Network for Telemedicine Applications
URI https://www.proquest.com/docview/2535618984
Volume 68
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV07U8JAEL5RaGx8O6LoXGFjcQK5uzwqBxwYtEBHYYYucxf2bCSg4P93N7moNNS5pNjd229f-ZaxG1AOo2CdCANWC5UpJ6wMpIiStpUxGOLUommLUTicqKepnvqC28qPVVY-sXDUs0VGNfJWoCVCfZzE6n75KWhrFHVX_QqNXVZHFxyjndd7_dHLa-WLJeJv8UukVqEIEM3KRiWGLG3VyuZEYRh07goKGbUJTJt-uQCbwSHb91Ei75ZqPWI7kB-zg2oDA_cX8oS5tzW8m9zTToseQtKMF_CD6qM6GF847nsx_HGOvmPFn9F4-SRfUaEd-KgcA-cYu_Ix0Cx52Wvn3X-d7VM2GfTHD0PhNyeITHbkWiTWGEe8PE67CHMkFbnQGggzqnmCMpEBp9uWKAhAA006KW1tEMUhOINJiTxjtXyRwznj7Rg6WYinrExUYgJUQMHZF6FerTW6wVqV2NLM04rTdouPFNOLQtApCjolQaeloBvs9veNZUmpseVss9JE6i_XKv0zhYvtjy_ZHn2rrJg0WW399Q1XGEOs7bU3lB9ejMV7
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV07UxsxEN4hpiBNeCSZAA6ogIJC2D5J9yiYDM-xeRgG7Bm6i3RepYGzwc5k-FP5jdm9R4CGjvp0Klar_Vb7-BZgC7UnL9gk0qIzUmfaS6cCJaOk7VSMljm1uNqiH3aH-vTW3M7B37oXhssqa5tYGOrROOMYeSswiqA-TmL9Y_IgeWoUZ1frERqlWpzh0x96sk33ekd0vttBcHI8OOzKaqqAzFRHzWTirPXMWeONj-j9oCMfOothxvFA1Day6E3bcXs-GuQqIG2cC6I4RG_JYVe07weY19zR2oD5g-P-1XVt-xXhfdGCaXQoA0LPMjFKLlJbt7J7pkwMOrsFZY1-DYSvcaAAt5Ml-FR5pWK_VKNlmMN8BRbriQ-iMgCfwd_M8JfNK5preUAQOBIF3JG6cNxNjL2ocj-id0-2aiou6bKIYT7lwD6Kfll2LshXFgPk2vUyty_2X2TSv8DwXWT6FRr5OMdvINoxdrKQVjmV6MQGdOAFR2BEeuScNavQqsWWZhWNOU_TuEvpOVMIOiVBpyzotBT0Kuz8_2NSUni8sbZZn0RaXeZp-qx6a29_3oSF7uDiPD3v9c_W4SPvW0ZrmtCYPf7G7-S_zNxGpTQCfr63nv4DzPsCuQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Steganography-Based+Transmission+of+Medical+Images+Over+Unsecure+Network+for+Telemedicine+Applications&rft.jtitle=Computers%2C+materials+%26+continua&rft.au=F.+Mansour%2C+Romany&rft.au=R.+Girgis%2C+Moheb&rft.date=2021&rft.issn=1546-2226&rft.volume=68&rft.issue=3&rft.spage=4069&rft.epage=4085&rft_id=info:doi/10.32604%2Fcmc.2021.017064&rft.externalDBID=n%2Fa&rft.externalDocID=10_32604_cmc_2021_017064
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1546-2226&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1546-2226&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1546-2226&client=summon