{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:49:09Z","timestamp":1777704549752,"version":"3.51.4"},"reference-count":38,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2020,8,6]],"date-time":"2020-08-06T00:00:00Z","timestamp":1596672000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2020,11,19]]},"abstract":"<jats:p>\n                    Bit-string generator (BSG) is based on the hardness of known number theoretical problems, such as the discrete logarithm problem with the elliptic curve (ECDLP). Such type of generators will have good randomness and unpredictability properties as it is challenged to find a solution regarding this mathematical dilemma. Hash functions in turn play a remarkable role in many cryptographic tasks to accomplish different security levels. Hash-enhanced elliptic curve bit-string generator (HEECBSG) mechanism is proposed in this study based on the ECDLP and secure hash function. The cryptographic hash function is used to achieve integrity and security of the obtained bit-strings for highly sensitive plain data. The main contribution of the proposed HEECBSG is transforming the\n                    <jats:italic>x<\/jats:italic>\n                    -coordinate of the elliptic curve points using a hash function\n                    <jats:italic>H<\/jats:italic>\n                    to generate bit-strings of any desirable length. The obtained pseudo-random bits are tested by the NIST test suite to analyze and verify its statistical and randomness properties. The resulted bit-string is utilized here for encrypting various medical images of the vital organs, i.e. the brain, bone, fetuses, and lungs. Then, extensive evaluation metrics have been applied to analyze the successful performance of the cipherimage, including key-space analysis, histogram analysis, correlation analysis, entropy analysis and sensitivity analysis. The results demonstrated that our proposed HEECBSG mechanism is feasible for achieving security and privacy purposes of the medical image transmission over unsecure communication networks.\n                  <\/jats:p>","DOI":"10.3233\/jifs-201146","type":"journal-article","created":{"date-parts":[[2020,8,11]],"date-time":"2020-08-11T16:14:06Z","timestamp":1597162446000},"page":"7795-7806","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":8,"title":["Hash-enhanced elliptic curve bit-string generator for medical image encryption"],"prefix":"10.1177","volume":"39","author":[{"given":"Omar","family":"Reyad","sequence":"first","affiliation":[{"name":"College of Computing and Information Technology, Shaqra University, Saudi Arabia"},{"name":"Faculty of Science, Sohag University, Egypt"}]},{"given":"Kadry","family":"Hamed","sequence":"additional","affiliation":[{"name":"College of Sciences and Humanities, Shaqra University, Afif, Saudi Arabia"},{"name":"Faculty of Computers and Information, Minia University, Egypt"}]},{"given":"Mohamed Esmail","family":"Karar","sequence":"additional","affiliation":[{"name":"College of Computing and Information Technology, Shaqra University, Saudi Arabia"},{"name":"Faculty of Electronic Engineering, Menoufia University, Egypt"}]}],"member":"179","published-online":{"date-parts":[[2020,8,6]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"crossref","unstructured":"BarkerE.B. KelseyJ.M. Recommendations for Random Number Generation Using Deterministic Random Bit Generators (Revised) NIST SP 800\u201390 2012.","DOI":"10.6028\/NIST.SP.800-90a"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"e_1_3_1_4_2","first-page":"417","article-title":"Uses of elliptic curves in cryptography","volume":"218","author":"Miller V.","year":"1986","unstructured":"MillerV., Uses of elliptic curves in cryptography, Advances in Cryptology-CRYPTO\u201985 Springer Heidelberg 218 (1986), 417\u2013426.","journal-title":"Advances in Cryptology-CRYPTO\u201985 Springer Heidelberg"},{"key":"e_1_3_1_5_2","doi-asserted-by":"crossref","unstructured":"MenezesA. Elliptic Curve Public Key Cryptosystems Kluwer Academic Dordrecht 1993.","DOI":"10.1007\/978-1-4615-3198-2"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196911"},{"key":"e_1_3_1_7_2","first-page":"1","article-title":"A Survey on the Techniques of Medical Image Encryption","author":"Pavithra V.","year":"2018","unstructured":"PavithraV., JeyamalaC., A Survey on the Techniques of Medical Image Encryption, IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) IEEE (2018), 1\u20138.","journal-title":"IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-2893-4"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11548-020-02186-z"},{"key":"e_1_3_1_10_2","first-page":"222","article-title":"Medical Images Encryption Based on Elliptic Curve Cryptography and Chaos Theory","author":"Benssalah M.","year":"2018","unstructured":"BenssalahM., RhaskaliY., AzzazM.S., Medical Images Encryption Based on Elliptic Curve Cryptography and Chaos Theory, International Conference on Smart Communications in Network Technologies (SaCoNeT), IEEE (2018), 222\u2013226.","journal-title":"International Conference on Smart Communications in Network Technologies (SaCoNeT)"},{"issue":"3","key":"e_1_3_1_11_2","first-page":"419","article-title":"Improved Elliptic Curve Cryptography with Homomorphic Encryption for Medical Image Encryption","volume":"22","author":"Yin S.","year":"2020","unstructured":"YinS., LiuJ., TengL., Improved Elliptic Curve Cryptography with Homomorphic Encryption for Medical Image Encryption, International Journal of Network Security 22(3) (2020), 419\u2013424.","journal-title":"International Journal of Network Security"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2017.08.028"},{"key":"e_1_3_1_13_2","doi-asserted-by":"crossref","unstructured":"SilvermanJ.H. The arithmetic of elliptic curves Springer-Verlag New York 2009.","DOI":"10.1007\/978-0-387-09494-6_3"},{"key":"e_1_3_1_14_2","author":"Buchmann J.A.","year":"2004","unstructured":"BuchmannJ.A., Cryptographic Hash Functions, in: Introduction to Crytography, Undergraduate Texts in Mathematics, Springer, New York.2004.","journal-title":"Introduction to Crytography, Undergraduate Texts in Mathematics"},{"key":"e_1_3_1_15_2","first-page":"1","article-title":"EMOTE-Multilayered encryption system for protecting medical images based on binary curve","author":"Sasikaladevi N.","year":"2019","unstructured":"SasikaladeviN., GeethaK., RevathiA., EMOTE-Multilayered encryption system for protecting medical images based on binary curve, Comput Inf Sci (2019), 1\u201311.","journal-title":"Comput Inf Sci"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.22214\/ijraset.2018.4429"},{"issue":"1","key":"e_1_3_1_17_2","first-page":"1","article-title":"Access Control of Medical Images using Elliptic Curve Cryptography through Effective Multi-Key Management in a Mobile Multicasting Environment,","volume":"7","author":"Jinasena T.","year":"2017","unstructured":"JinasenaT., MeegamaR., MarasingheR., Access Control of Medical Images using Elliptic Curve Cryptography through Effective Multi-Key Management in a Mobile Multicasting Environment,, Computer Science and Engineering 7(1) (2017), 1\u201311.","journal-title":"Computer Science and Engineering"},{"issue":"1","key":"e_1_3_1_18_2","first-page":"47","article-title":"A secure ECC-based electronic medical record system","volume":"4","author":"Tsai K.L.","year":"2014","unstructured":"TsaiK.L., LeuF.Y., WuT.H., ChiouS.S., LiuY.W., LiuH.Y., A secure ECC-based electronic medical record system, J Internet Services Inf Secur 4(1) (2014), 47\u201357.","journal-title":"J Internet Services Inf Secur"},{"issue":"2","key":"e_1_3_1_19_2","first-page":"288","article-title":"A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems","volume":"6","author":"Wu H.L.","year":"2015","unstructured":"WuH.L., ChangC.C., A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems, J of Information Hiding and Multimedia Signal Processing 6(2) (2015), 288\u2013296.","journal-title":"J of Information Hiding and Multimedia Signal Processing"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.11.043"},{"key":"e_1_3_1_21_2","first-page":"1","article-title":"RSA based encryption decryption of medical images","author":"Anane N.","year":"2010","unstructured":"AnaneN., AnaneM., BessalahH., IssadM., MessaoudiK., RSA based encryption decryption of medical images, 7th International Multi-Conference on Systems, Signals and Devices, Amman, (2010), 1\u20134.","journal-title":"7th International Multi-Conference on Systems, Signals and Devices, Amman"},{"key":"e_1_3_1_22_2","volume":"330","author":"Kannammal A.","year":"2012","unstructured":"KannammalA., SubhaS., Rani, DICOM Image Authentication and Encryption Based on RSA and AES Algorithms, In: PonnambalamS.G., ParkkinenJ., RamanathanK.C. (eds) Trends in Intelligent Robotics, Automation, and Manufacturing. IRAM 2012. Communications in Computer and Information Science Springer Heidelberg, 330 (2012).","journal-title":"Trends in Intelligent Robotics, Automation, and Manufacturing. IRAM 2012"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.08.089"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/18.259647"},{"key":"e_1_3_1_25_2","doi-asserted-by":"crossref","unstructured":"RukhinA. SotoJ. NechvatalJ. et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications NIST Special Publication 800\u201322 May 2001.","DOI":"10.6028\/NIST.SP.800-22"},{"key":"e_1_3_1_26_2","first-page":"991","article-title":"Pseudo-Random Sequence Generation from Elliptic Curves over a Finite Field of Characteristic 2","volume":"8","author":"Reyad O.","year":"2016","unstructured":"ReyadO., KotulskiZ., Pseudo-Random Sequence Generation from Elliptic Curves over a Finite Field of Characteristic 2, Federated Conference on Computer Science and Inf. Sys., FedCSIS, ACSIS IEEE 8 (2016), 991\u2013998.","journal-title":"Federated Conference on Computer Science and Inf. Sys."},{"key":"e_1_3_1_27_2","doi-asserted-by":"crossref","unstructured":"Abd-ElhafiezW.M. ReyadO. MofaddelM.A. FathyM. Image Encryption Algorithm Methodology Based on Multi-mapping Image Pixel in: HassanienA. et al. (eds.): AMLTA 2019. AISC 921 Sringer Cham. (2020) 645\u2013655","DOI":"10.1007\/978-3-030-14118-9_64"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.10.023"},{"key":"e_1_3_1_29_2","unstructured":"GonzalezR.C. WoodsR.E. Digital Image Processing (3rd Edition) Prentice-Hall Inc. Upper Saddle River NJ 2006."},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.18576\/amis\/13S119"},{"key":"e_1_3_1_31_2","first-page":"0","article-title":"Image quality assessment: from error visibility to structural similarity","volume":"13","author":"Wang Z.","year":"2004","unstructured":"WangZ., BovikA.C., SheikhH.R., SimoncelliE.P., Image quality assessment: from error visibility to structural similarity, IEEE Trans Image Process 13 (2004), 0\u201312.","journal-title":"IEEE Trans Image Process"},{"key":"e_1_3_1_32_2","first-page":"31","article-title":"NPCR and UACI Randomness Tests for Image Encryption, (JSAT)","author":"Wu Y.","year":"2011","unstructured":"WuY., NoonanJ.P., AgaianS., NPCR and UACI Randomness Tests for Image Encryption, (JSAT), IEEE Transl J of Selected Areas in Telecommunications (2011), 31\u201338.","journal-title":"IEEE Transl J of Selected Areas in Telecommunications"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.02.039"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-179568"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.06.054"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2017.06.004"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.3390\/e20090716"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2906052"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2958336"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-201146","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-201146","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-201146","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:41:27Z","timestamp":1777455687000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-201146"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,6]]},"references-count":38,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,11,19]]}},"alternative-id":["10.3233\/JIFS-201146"],"URL":"https:\/\/doi.org\/10.3233\/jifs-201146","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,6]]}}}