A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding

Ensuring the privacy and secrecy of digital medical images has become a pressing issue as a result of the quick development of smart medical technology and the exponential growth in the quantity of medical images transmitted and stored in networks. The lightweight multiple-image encryption approach...

Full description

Saved in:
Bibliographic Details
Published inEntropy (Basel, Switzerland) Vol. 25; no. 6; p. 898
Main Authors Wu, Junfeng, Zhang, Jialu, Liu, Dong, Wang, Xiaofeng
Format Journal Article
LanguageEnglish
Published Switzerland MDPI AG 03.06.2023
MDPI
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Ensuring the privacy and secrecy of digital medical images has become a pressing issue as a result of the quick development of smart medical technology and the exponential growth in the quantity of medical images transmitted and stored in networks. The lightweight multiple-image encryption approach for medical images that is suggested in this research can encrypt/decrypt any number of medical photos of varied sizes with just one encryption operation and has a computational cost that is similar to encrypting a single image. The plaintext images with different sizes are filled at the right and bottom of the image to ensure that the size of all plaintext images is uniform; then, all the filled images are stacked to obtain a superimposed image. The initial key, which is generated using the SHA-256 technique, is then used as the starting value of the linear congruence algorithm to create the encryption key sequence. The cipher picture is then created by encrypting the superimposed image with the encryption key and DNA encoding. The algorithm can be made even more secure by implementing a decryption mechanism that decrypts the image independently in order to reduce the possibility of information leaking during the decryption process. The outcomes of the simulation experiment demonstrate the algorithm’s strong security and resistance to interference such as noise pollution and lost image content.
AbstractList Ensuring the privacy and secrecy of digital medical images has become a pressing issue as a result of the quick development of smart medical technology and the exponential growth in the quantity of medical images transmitted and stored in networks. The lightweight multiple-image encryption approach for medical images that is suggested in this research can encrypt/decrypt any number of medical photos of varied sizes with just one encryption operation and has a computational cost that is similar to encrypting a single image. The plaintext images with different sizes are filled at the right and bottom of the image to ensure that the size of all plaintext images is uniform; then, all the filled images are stacked to obtain a superimposed image. The initial key, which is generated using the SHA-256 technique, is then used as the starting value of the linear congruence algorithm to create the encryption key sequence. The cipher picture is then created by encrypting the superimposed image with the encryption key and DNA encoding. The algorithm can be made even more secure by implementing a decryption mechanism that decrypts the image independently in order to reduce the possibility of information leaking during the decryption process. The outcomes of the simulation experiment demonstrate the algorithm’s strong security and resistance to interference such as noise pollution and lost image content.
Ensuring the privacy and secrecy of digital medical images has become a pressing issue as a result of the quick development of smart medical technology and the exponential growth in the quantity of medical images transmitted and stored in networks. The lightweight multiple-image encryption approach for medical images that is suggested in this research can encrypt/decrypt any number of medical photos of varied sizes with just one encryption operation and has a computational cost that is similar to encrypting a single image. The plaintext images with different sizes are filled at the right and bottom of the image to ensure that the size of all plaintext images is uniform; then, all the filled images are stacked to obtain a superimposed image. The initial key, which is generated using the SHA-256 technique, is then used as the starting value of the linear congruence algorithm to create the encryption key sequence. The cipher picture is then created by encrypting the superimposed image with the encryption key and DNA encoding. The algorithm can be made even more secure by implementing a decryption mechanism that decrypts the image independently in order to reduce the possibility of information leaking during the decryption process. The outcomes of the simulation experiment demonstrate the algorithm's strong security and resistance to interference such as noise pollution and lost image content.Ensuring the privacy and secrecy of digital medical images has become a pressing issue as a result of the quick development of smart medical technology and the exponential growth in the quantity of medical images transmitted and stored in networks. The lightweight multiple-image encryption approach for medical images that is suggested in this research can encrypt/decrypt any number of medical photos of varied sizes with just one encryption operation and has a computational cost that is similar to encrypting a single image. The plaintext images with different sizes are filled at the right and bottom of the image to ensure that the size of all plaintext images is uniform; then, all the filled images are stacked to obtain a superimposed image. The initial key, which is generated using the SHA-256 technique, is then used as the starting value of the linear congruence algorithm to create the encryption key sequence. The cipher picture is then created by encrypting the superimposed image with the encryption key and DNA encoding. The algorithm can be made even more secure by implementing a decryption mechanism that decrypts the image independently in order to reduce the possibility of information leaking during the decryption process. The outcomes of the simulation experiment demonstrate the algorithm's strong security and resistance to interference such as noise pollution and lost image content.
Audience Academic
Author Zhang, Jialu
Wu, Junfeng
Wang, Xiaofeng
Liu, Dong
AuthorAffiliation Department of Applied Mathematics, Xi’an University of Technology, Xi’an 710049, China; faziboat@126.com (J.Z.); liudong9813@163.com (D.L.); xfwang@xaut.edu.cn (X.W.)
AuthorAffiliation_xml – name: Department of Applied Mathematics, Xi’an University of Technology, Xi’an 710049, China; faziboat@126.com (J.Z.); liudong9813@163.com (D.L.); xfwang@xaut.edu.cn (X.W.)
Author_xml – sequence: 1
  givenname: Junfeng
  orcidid: 0000-0003-4097-6799
  surname: Wu
  fullname: Wu, Junfeng
– sequence: 2
  givenname: Jialu
  surname: Zhang
  fullname: Zhang, Jialu
– sequence: 3
  givenname: Dong
  surname: Liu
  fullname: Liu, Dong
– sequence: 4
  givenname: Xiaofeng
  surname: Wang
  fullname: Wang, Xiaofeng
BackLink https://www.ncbi.nlm.nih.gov/pubmed/37372242$$D View this record in MEDLINE/PubMed
BookMark eNptkstu1DAUhi1URC-w4AVQJDZ0kda3-LJCoRQ60gwsgLXl-JJ6lLEHJ0Hq2-PplFFbIS9sH3_n93_scwqOYooOgLcIXhAi4aXDDWRQSPECnCAoZU0JhEeP1sfgdBzXEGKCEXsFjgknHGOKT8CyrVbzMIXt4OqVs8HooV5sdO-q62jy3XYKKVYrN90mW33So7NV2f-4aWvcsEpHW33-1u7QZEPsX4OXXg-je_Mwn4FfX65_Xt3Uy-9fF1ftsjYNlFMtPeq6piOOQieLkeIdSQe15Q5RyDSxwiOEuMUSEUqo8IxYjb1vCKNCMHIGFntdm_RabXPY6Hynkg7qPpByr3SeghmcYp3wxnrRdB2mVnNhMOcNko2k0ELpi9bHvdZ27jbOGhenrIcnok9PYrhVffqjEMSSCUyKwocHhZx-z26c1CaMxg2Dji7No8KCQMY4JLig75-h6zTnWN6qUFhyySinhbrYU70uFYToU7nYlGHdJpjy9T6UeMsbsUtCsCS8e1zDwfy_by7A-R4wOY1jdv6AIKh2LaQOLVTYy2esCZPe9UFxEYb_ZPwFsgvCaw
CitedBy_id crossref_primary_10_1038_s41598_025_86569_9
crossref_primary_10_1109_TCE_2024_3481260
crossref_primary_10_1109_ACCESS_2024_3518533
crossref_primary_10_1007_s40747_023_01258_2
crossref_primary_10_1016_j_eswa_2023_121090
crossref_primary_10_1038_s41598_025_86771_9
crossref_primary_10_47264_idea_nasij_4_2_4
crossref_primary_10_3390_e26020154
crossref_primary_10_1016_j_jksuci_2024_102265
crossref_primary_10_3390_math11153373
Cites_doi 10.1007/s11042-020-09533-x
10.1016/j.optlastec.2021.107073
10.1016/j.measurement.2022.111175
10.1109/ACCESS.2022.3185206
10.1016/j.image.2022.116793
10.1016/j.vlsi.2023.01.008
10.1016/j.patrec.2021.10.033
10.1109/ACCESS.2020.2991420
10.1109/TNNLS.2021.3062754
10.1016/j.compeleceng.2023.108609
10.1016/j.ijleo.2017.08.028
10.1109/TII.2022.3194590
10.1016/j.sigpro.2016.10.003
10.1007/s11042-019-08168-x
10.1007/s11042-017-5534-8
10.1016/j.micpro.2022.104546
10.1016/j.compbiomed.2022.105542
10.1016/j.procs.2023.01.072
10.1016/j.ijleo.2022.169624
10.1109/ACCESS.2021.3138718
10.1016/j.optlaseng.2022.107303
10.1016/j.ijleo.2018.06.029
10.1016/j.optlaseng.2018.05.009
10.1016/j.ijleo.2022.168649
10.1007/s00521-018-3801-x
10.1007/s00500-014-1539-7
10.1016/j.matcom.2021.06.012
10.1016/j.sigpro.2017.10.004
10.1109/ACCESS.2018.2817615
10.1016/j.measen.2023.100676
10.1007/s11042-018-6496-1
10.3390/e25050746
ContentType Journal Article
Copyright COPYRIGHT 2023 MDPI AG
2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
2023 by the authors. 2023
Copyright_xml – notice: COPYRIGHT 2023 MDPI AG
– notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: 2023 by the authors. 2023
DBID AAYXX
CITATION
NPM
7TB
8FD
8FE
8FG
ABJCF
ABUWG
AFKRA
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
FR3
HCIFZ
KR7
L6V
M7S
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
7X8
5PM
DOA
DOI 10.3390/e25060898
DatabaseName CrossRef
PubMed
Mechanical & Transportation Engineering Abstracts
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central
Engineering Research Database
SciTech Premium Collection
Civil Engineering Abstracts
ProQuest Engineering Collection
Engineering Database
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
MEDLINE - Academic
PubMed Central (Full Participant titles)
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
PubMed
Publicly Available Content Database
Technology Collection
Technology Research Database
ProQuest One Academic Middle East (New)
Mechanical & Transportation Engineering Abstracts
ProQuest Central Essentials
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
Engineering Collection
Civil Engineering Abstracts
Engineering Database
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
Engineering Research Database
ProQuest One Academic
ProQuest One Academic (New)
MEDLINE - Academic
DatabaseTitleList
Publicly Available Content Database
PubMed
MEDLINE - Academic

CrossRef

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals - NZ
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
EISSN 1099-4300
ExternalDocumentID oai_doaj_org_article_6b8fcdf85bb24da78c2775195940d09f
PMC10296823
A758282910
37372242
10_3390_e25060898
Genre Journal Article
GrantInformation_xml – fundername: Natural Science Basic Research Program of Shaanxi Province
  grantid: 2022JM-017
– fundername: National Natural Science Foundation of China
  grantid: 61976176
– fundername: Natural Science Foundation of China
  grantid: 61976176
GroupedDBID 29G
2WC
5GY
5VS
8FE
8FG
AADQD
AAFWJ
AAYXX
ABDBF
ABJCF
ACIWK
ACUHS
ADBBV
AEGXH
AENEX
AFKRA
AFPKN
AFZYC
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BENPR
BGLVJ
CCPQU
CITATION
CS3
DU5
E3Z
ESX
F5P
GROUPED_DOAJ
GX1
HCIFZ
HH5
IAO
ITC
J9A
KQ8
L6V
M7S
MODMG
M~E
OK1
OVT
PGMZT
PHGZM
PHGZT
PIMPY
PROAC
PTHSS
RNS
RPM
TR2
TUS
XSB
~8M
NPM
PMFND
7TB
8FD
ABUWG
AZQEC
DWQXO
FR3
KR7
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
7X8
5PM
PUEGO
ID FETCH-LOGICAL-c509t-9f1bb5b3e40e937206019e0ad7e1406a3d8f1117d29134348f63da2ff53648863
IEDL.DBID DOA
ISSN 1099-4300
IngestDate Wed Aug 27 01:17:34 EDT 2025
Thu Aug 21 18:37:23 EDT 2025
Fri Jul 11 09:20:31 EDT 2025
Sun Jul 13 04:59:38 EDT 2025
Tue Jun 10 21:26:33 EDT 2025
Thu Apr 03 07:04:27 EDT 2025
Thu Apr 24 23:13:05 EDT 2025
Tue Jul 01 01:58:25 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 6
Keywords linear congruence
medical image encryption
multiple-image encryption
hash function
DNA encoding
Language English
License https://creativecommons.org/licenses/by/4.0
Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c509t-9f1bb5b3e40e937206019e0ad7e1406a3d8f1117d29134348f63da2ff53648863
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0003-4097-6799
OpenAccessLink https://doaj.org/article/6b8fcdf85bb24da78c2775195940d09f
PMID 37372242
PQID 2829796474
PQPubID 2032401
ParticipantIDs doaj_primary_oai_doaj_org_article_6b8fcdf85bb24da78c2775195940d09f
pubmedcentral_primary_oai_pubmedcentral_nih_gov_10296823
proquest_miscellaneous_2830667032
proquest_journals_2829796474
gale_infotracacademiconefile_A758282910
pubmed_primary_37372242
crossref_primary_10_3390_e25060898
crossref_citationtrail_10_3390_e25060898
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20230603
PublicationDateYYYYMMDD 2023-06-03
PublicationDate_xml – month: 6
  year: 2023
  text: 20230603
  day: 3
PublicationDecade 2020
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Basel
PublicationTitle Entropy (Basel, Switzerland)
PublicationTitleAlternate Entropy (Basel)
PublicationYear 2023
Publisher MDPI AG
MDPI
Publisher_xml – name: MDPI AG
– name: MDPI
References Hua (ref_6) 2018; 144
Sabir (ref_29) 2023; 106
Laiphrakpam (ref_5) 2017; 147
Liu (ref_32) 2020; 8
ref_35
Yasser (ref_11) 2022; 10
Wang (ref_31) 2021; 80
John (ref_17) 2023; 218
John (ref_18) 2023; 25
Jain (ref_10) 2021; 152
(ref_20) 2023; 90
Zhang (ref_33) 2021; 190
Chai (ref_9) 2019; 78
Wu (ref_19) 2023; 19
Gao (ref_26) 2022; 34
Kiran (ref_16) 2022; 91
Priyanka (ref_14) 2022; 196
Wang (ref_27) 2022; 107
Li (ref_21) 2018; 171
(ref_24) 2022; 266
Zhang (ref_12) 2022; 146
Zhang (ref_22) 2019; 78
Li (ref_30) 2023; 160
Wang (ref_34) 2022; 70
Zhang (ref_23) 2021; 141
Liu (ref_7) 2018; 77
Nematzadeh (ref_8) 2018; 110
Elhoseny (ref_2) 2020; 32
Su (ref_25) 2022; 254
Ding (ref_13) 2022; 33
Pareek (ref_3) 2016; 20
Elhoseny (ref_1) 2018; 6
Huang (ref_15) 2022; 10
Sangavi (ref_28) 2023; 72
Cao (ref_4) 2017; 132
References_xml – volume: 80
  start-page: 943
  year: 2021
  ident: ref_31
  article-title: An efficient batch images encryption method based on DNA encoding and pwlcm
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-020-09533-x
– volume: 141
  start-page: 107073
  year: 2021
  ident: ref_23
  article-title: Multiple-image encryption algorithm based on the 3d scrambling model and dynamic DNA coding
  publication-title: Opt. Laser Technol.
  doi: 10.1016/j.optlastec.2021.107073
– volume: 196
  start-page: 111175
  year: 2022
  ident: ref_14
  article-title: Fastmie: Faster medical image encryption without compromising security
  publication-title: Measurement
  doi: 10.1016/j.measurement.2022.111175
– volume: 34
  start-page: 1535
  year: 2022
  ident: ref_26
  article-title: An effective multiple-image encryption algorithm based on 3d cube and hyperchaotic map
  publication-title: J. King Saud Univ. Comput. Inf. Sci.
– volume: 10
  start-page: 66345
  year: 2022
  ident: ref_15
  article-title: Privacy-preserving deep learning with learnable image encryption on medical images
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3185206
– volume: 107
  start-page: 116793
  year: 2022
  ident: ref_27
  article-title: Multiple color image encryption based on cascaded quaternion gyrator transforms
  publication-title: Signal Process. Image Commun.
  doi: 10.1016/j.image.2022.116793
– volume: 90
  start-page: 131
  year: 2023
  ident: ref_20
  article-title: Real-time medical image encryption for h-iot applications using improved sequences from chaotic maps
  publication-title: Integration
  doi: 10.1016/j.vlsi.2023.01.008
– volume: 152
  start-page: 356
  year: 2021
  ident: ref_10
  article-title: Medical image encryption scheme using multiple chaotic maps
  publication-title: Pattern Recognit. Lett.
  doi: 10.1016/j.patrec.2021.10.033
– volume: 8
  start-page: 83596
  year: 2020
  ident: ref_32
  article-title: Color image encryption algorithm based on DNA coding and double chaos system
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2991420
– volume: 33
  start-page: 4915
  year: 2022
  ident: ref_13
  article-title: Deepkeygen: A deep learning-based stream cipher generator for medical image encryption and decryption
  publication-title: IEEE Trans. Neural Netw. Learn. Syst.
  doi: 10.1109/TNNLS.2021.3062754
– volume: 106
  start-page: 108609
  year: 2023
  ident: ref_29
  article-title: Multi-layer security based multiple image encryption technique
  publication-title: Comput. Electr. Eng.
  doi: 10.1016/j.compeleceng.2023.108609
– volume: 147
  start-page: 88
  year: 2017
  ident: ref_5
  article-title: Medical image encryption based on improved elgamal encryption technique
  publication-title: Optik
  doi: 10.1016/j.ijleo.2017.08.028
– volume: 72
  start-page: 103408
  year: 2023
  ident: ref_28
  article-title: An exquisite multiple image encryption harnessing multi-scroll lu–chen and chua chaotic systems employing domino strategy
  publication-title: J. Inf. Secur. Appl.
– volume: 19
  start-page: 2089
  year: 2023
  ident: ref_19
  article-title: Medical image encryption by content-aware DNA computing for secure healthcare
  publication-title: IEEE Trans. Ind. Inform.
  doi: 10.1109/TII.2022.3194590
– volume: 132
  start-page: 96
  year: 2017
  ident: ref_4
  article-title: Medical image encryption using edge maps
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2016.10.003
– volume: 78
  start-page: 35419
  year: 2019
  ident: ref_9
  article-title: Medical image encryption algorithm based on latin square and memristive chaotic system
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-019-08168-x
– volume: 77
  start-page: 22787
  year: 2018
  ident: ref_7
  article-title: A new simple chaotic system and its application in medical image encryption
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-017-5534-8
– volume: 91
  start-page: 104546
  year: 2022
  ident: ref_16
  article-title: Resource optimized selective image encryption of medical images using multiple chaotic systems
  publication-title: Microprocess. Microsyst.
  doi: 10.1016/j.micpro.2022.104546
– volume: 146
  start-page: 105542
  year: 2022
  ident: ref_12
  article-title: An efficient multi-level encryption scheme for stereoscopic medical images based on coupled chaotic system and otsu threshold segmentation
  publication-title: Comput. Biol. Med.
  doi: 10.1016/j.compbiomed.2022.105542
– volume: 218
  start-page: 918
  year: 2023
  ident: ref_17
  article-title: 2d lorentz chaotic model coupled with logistic chaotic model for medical image encryption: Towards ensuring security for teleradiology
  publication-title: Procedia Comput. Sci.
  doi: 10.1016/j.procs.2023.01.072
– volume: 266
  start-page: 169624
  year: 2022
  ident: ref_24
  article-title: A novel multiple grayscale image encryption method based on 3d bit-scrambling and diffusion
  publication-title: Optik
  doi: 10.1016/j.ijleo.2022.169624
– volume: 10
  start-page: 244
  year: 2022
  ident: ref_11
  article-title: A robust chaos-based technique for medical image encryption
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3138718
– volume: 160
  start-page: 107303
  year: 2023
  ident: ref_30
  article-title: Multiple-image encryption using phase jump gradient factors -based oam multiplexing holography
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2022.107303
– volume: 171
  start-page: 277
  year: 2018
  ident: ref_21
  article-title: Multiple-image encryption by using robust chaotic map in wavelet transform domain
  publication-title: Optik
  doi: 10.1016/j.ijleo.2018.06.029
– volume: 110
  start-page: 24
  year: 2018
  ident: ref_8
  article-title: Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2018.05.009
– volume: 70
  start-page: 103340
  year: 2022
  ident: ref_34
  article-title: Image encryption algorithm based on improved zigzag transformation and quaternary DNA coding
  publication-title: J. Inf. Secur. Appl.
– volume: 254
  start-page: 168649
  year: 2022
  ident: ref_25
  article-title: Security-enhanced multiple-image encryption based on modified iterative phase retrieval algorithm with structured phase mask in fresnel domain
  publication-title: Optik
  doi: 10.1016/j.ijleo.2022.168649
– volume: 32
  start-page: 10979
  year: 2020
  ident: ref_2
  article-title: Hybrid optimization with cryptography encryption for medical image security in internet of things
  publication-title: Neural Comput. Appl.
  doi: 10.1007/s00521-018-3801-x
– volume: 20
  start-page: 763
  year: 2016
  ident: ref_3
  article-title: Medical image protection using genetic algorithm operations
  publication-title: Soft Comput.
  doi: 10.1007/s00500-014-1539-7
– volume: 190
  start-page: 723
  year: 2021
  ident: ref_33
  article-title: A novel image encryption algorithm based on spwlcm and DNA coding
  publication-title: Math. Comput. Simul.
  doi: 10.1016/j.matcom.2021.06.012
– volume: 144
  start-page: 134
  year: 2018
  ident: ref_6
  article-title: Medical image encryption using high-speed scrambling and pixel adaptive diffusion
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2017.10.004
– volume: 6
  start-page: 20596
  year: 2018
  ident: ref_1
  article-title: Secure medical data transmission model for iot-based healthcare systems
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2817615
– volume: 25
  start-page: 100676
  year: 2023
  ident: ref_18
  article-title: Iot based medical image encryption using linear feedback shift register—towards ensuring security for teleradiology applications
  publication-title: Meas. Sens.
  doi: 10.1016/j.measen.2023.100676
– volume: 78
  start-page: 7841
  year: 2019
  ident: ref_22
  article-title: Multiple-image encryption algorithm based on DNA encoding and chaotic system
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-018-6496-1
– ident: ref_35
  doi: 10.3390/e25050746
SSID ssj0023216
Score 2.380108
Snippet Ensuring the privacy and secrecy of digital medical images has become a pressing issue as a result of the quick development of smart medical technology and the...
SourceID doaj
pubmedcentral
proquest
gale
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Enrichment Source
StartPage 898
SubjectTerms Algorithms
Batch processing
Congruences
Data encryption
Digital imaging
DNA
DNA encoding
Encryption
Genetic research
hash function
Image transmission
Information storage
Internet of Things
Investment analysis
linear congruence
medical image encryption
Medical imaging
Methods
multiple-image encryption
Noise pollution
Wavelet transforms
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Lb9QwELZge-GCiniFFhQQElysJrbj2CeUha0WxK4QUKm3yI5tQIKkbLcH_j0zXm9oBOKYZBTZY8_LM_6GkOdKCm281TSUpaQiBEktCxUtfHAl5tuLCPa8WsvlmXh3Xp2nA7fLVFa514lRUbuhwzPyE8z4xWuT4tXFT4pdozC7mlpo3CQHoIKVmpGD-WL94eMYcnFWyh2eEIfg_sQzxNNTWk2sUATr_1slX7NJ03rJawbo9JDcTp5j3uyW-g654fu75H2Tr1JJIE05F_r2B-iIfNF3m19RH-Sr2CU6n4PBcjk8f1o2FHyQ3PQuf7NukHRAE3aPnJ0uPr9e0tQggXZg57dUh9LaynIvCq-x3QxEV9oXxtUe4iZpuFOwBGXtGObXuVBBcmdYCBWXILiS3yezfuj9Q5JXWlrPPPwtWKEZ8FoggDELJnTGFnVGXu4Z1nYJPRybWHxvIYpA3rYjbzPybCS92EFm_ItojlwfCRDlOr4YNl_aJDSttCp0LqjKWiacqVXH6jrC4YjCFTpk5AWuWYuyCIPpTLpSAFNCVKu2qTEpCJMvMnK8X9Y2Cell-2dLZeTp-BnEC3MmpvfDFdJwLAMuOMvIg90uGMfMscUPuDgZUZP9MZnU9Ev_7WuE8Aa3TkvF-KP_j-uI3ML29rE0jR-T2XZz5R-DE7S1T9JO_w1YKQSB
  priority: 102
  providerName: ProQuest
Title A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding
URI https://www.ncbi.nlm.nih.gov/pubmed/37372242
https://www.proquest.com/docview/2829796474
https://www.proquest.com/docview/2830667032
https://pubmed.ncbi.nlm.nih.gov/PMC10296823
https://doaj.org/article/6b8fcdf85bb24da78c2775195940d09f
Volume 25
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3Nq9QwEB_0efEiil_V51JF0Et4bdKmybGru28VdxH1wd5K0iQ8Qbvy3Hfwv3cm7ZYtCl68FNoMJZnJZGaYyW8AXipZaOOtZiHPJStCkMzyULLMB5dTvj2LYM_rjVxdFO-35fao1RfVhPXwwD3jzqRVoXVBldbywplKtbyqIiRKkblMBzp90eYdgqkh1BI8lz2OkMCg_sxzwtFTWk2sTwTp__MoPrJF0zrJI8OzvAt3Bo8xrfuZ3oMbvrsPH-p0PZQCsiHXwt59x7MhXXTt1a94DqTr2B06naOhcim-f17VDH2P1HQufbupiXRHpusBXCwXX96s2NAYgbVo3_dMh9za0gpfZF5TmxmMqrTPjKs8xkvSCKeQ9XnlOOXVRaGCFM7wEEohUWGleAgn3a7zjyEttbSee_xbsIXmHMMLAi7mwYTW2KxK4PWBYU07oIZT84pvDUYPxNtm5G0CL0bSHz1Uxt-I5sT1kYDQreMHlHkzyLz5l8wTeEUya0gHcTKtGa4S4JIIzaqpK0oG4uKzBE4PYm0G5fzZ0FC8gVsk8HwcRrWiXInp_O6aaASV_2aCJ_Co3wXjnAW19kHXJgE12R-TRU1Huq-XEbob3TktFRdP_gcbnsJtjls9Fq6JUzjZX137Z-gi7e0Mbqrl-QxuzRebj59mUTfweb7NfwOFFQ8q
linkProvider Directory of Open Access Journals
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VcoALAvEKFAgIBBerie04yQGhlHbZpbt7oZV6C3FsF6Q2KdutUP8Uv5EZJxu6AnHrMfEossfjeWTG3wC8zpTMK6tz5uJYMemcYpq7hEXWmZjy7ZEHe57N1fhQfj5Kjjbg1-ouDJVVrnSiV9Smrekf-TZl_Py1Sfnh7AejrlGUXV210OjEYt9e_sSQ7fz9ZBf39w3no72Dj2PWdxVgNRrHJctdrHWihZWRzalHC4YkuY0qk1oMNlQlTIbzjlPDKSktZOaUMBV3LhEKpV0J_O4NuCkFWnK6mT76NAR4gseqQy_CwWjbckLvy_Jszeb51gB_G4ArFnC9OvOKuRvdhTu9nxoWnWDdgw3b3IdpEc76AkTWZ3jY5BQ1UrjX1ItLr33Cme9JHe6geTQhPn8ZFww9nrBqTLg7L4i0JYP5AA6vhXEPYbNpG_sYwiRX2nKLX3Na5hx3VhJcMneVqysdpQG8WzGsrHuscmqZcVJizEK8LQfeBvBqID3rADr-RbRDXB8ICFPbv2gXx2V_REulM1cblyVac2mqNKt5mnrwHRmZKHcBvKU9K-nk42Tqqr_AgEsiDK2ySCkFiYuPAthabWvZq4Tz8o8AB_ByGMbDTBmaqrHtBdEIKjqOBA_gUScFw5wFNRRChyqAbE0-1ha1PtJ8_-YBw9GJzFXGxZP_z-sF3BofzKbldDLffwq3OQq0L4oTW7C5XFzYZ-h-LfVzL_MhfL3uQ_Ybe0I95Q
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3db9MwED-NTkK8IBBfgQEBgeDFamInTvyAUEpbtWytJmDS3rI4tgEJktF1QvvX-Ou4S9KwCsTbHpOcLPt8vo_c-XcAL1IZqcJqxVwYShY5J5nmLmaBdSakfHvQgD0vlnJ2FL0_jo934NfmLgyVVW50YqOoTV3SP_IhZfyaa5PR0HVlEYfj6dvTH4w6SFGmddNOoxWRfXvxE8O3szfzMe71S86nk0_vZqzrMMBKNJRrplyodayFjQKrqF8LhifKBoVJLAYeshAmxTWEieGUoBZR6qQwBXcuFhIlXwoc9xrsJhQVDWB3NFkefujDPcFD2WIZCaGCoeWE5ZeqdMsCNo0C_jYHl-zhdq3mJeM3vQU3O6_Vz1oxuw07troDB5m_6MoRWZfvYfPvqJ_8SVWuLhpd5C-aDtX-CI2l8fH54yxj6P_4RWX88TIj0prM5104uhLW3YNBVVf2Afixktpyi6M5HSmO-xwReDJ3hSsLHSQevN4wLC875HJqoPEtxwiGeJv3vPXgeU962sJ1_ItoRFzvCQhhu3lRrz7n3YHNpU5daVwaa80jUyRpyZOkgeKJAhMo58Er2rOc9ABOpiy66wy4JELUyrOEEpK4-MCDvc225p2COMv_iLMHz_rPeLQpX1NUtj4nGkElyIHgHtxvpaCfs6D2QuheeZBuycfWora_VF-_NPDh6FIqmXLx8P_zegrX8YDlB_Pl_iO4wVGemwo5sQeD9ercPkZfbK2fdELvw8lVn7PfyppDdw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Multiple-Medical-Image+Encryption+Method+Based+on+SHA-256+and+DNA+Encoding&rft.jtitle=Entropy+%28Basel%2C+Switzerland%29&rft.au=Wu%2C+Junfeng&rft.au=Zhang%2C+Jialu&rft.au=Liu%2C+Dong&rft.au=Wang%2C+Xiaofeng&rft.date=2023-06-03&rft.issn=1099-4300&rft.eissn=1099-4300&rft.volume=25&rft.issue=6&rft_id=info:doi/10.3390%2Fe25060898&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1099-4300&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1099-4300&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1099-4300&client=summon