Retraction

Enhanced Lorenz-Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data Healthcare

Paper Information

Citations (31)

31
Total Citations
14
Post-Retraction
(45.2%)
16
Pre-Retraction
1
Same Day
Post-Retraction Citation Analysis
0 Within 30 days
9 Within 1 year
0 After 2+ years
631 Days since retraction (latest)
A secure medical image encryption technique based on DNA cryptography with elliptic curves
Vigna Kumaran, T. Manikandan, Rajesh Kumar Dhanaraj et al. (6 authors)
Scientific Reports Open Access
Published: Jun 2025
631 days after retraction
Crayfish optimization-based secure encryption of medical images with 7D hyperchaotic maps
Philip David, K. Suganya Devi, P. Ganeshkumar
International Journal of Machine Learning and Cybernetics
Published: May 2025
620 days after retraction
Improving e-Health Security with Lightweight Cryptography for Enhanced Protection
A J Bhuvaneshwari, P. Kaythry, K. J. Jegadish Kumar
Unknown Journal
Published: Mar 2025
553 days after retraction
Paper citing Enhanced Lorenz-Chaotic Encryption Method for Part...
Unknown Authors
Unknown Journal
Published: Nov 2024
414 days after retraction
A robust dual-layer medical image watermarking scheme based on matrix factorization in the LWT domain for E-healthcare applications
Boubakeur Latreche, Ahmed Merrad, Ali Benziane et al. (5 authors)
Multimedia Tools and Applications
Published: Oct 2024
399 days after retraction
Implementing the Triple-Data Encryption Standard for Secure and Efficient Healthcare Data Storage in Cloud Computing Environments
Wid Akeel Awadh, Mohammed Hashim, Ali Salah Alasady
Informatica Open Access
Published: Apr 2024
6 citations
208 days after retraction
Securing Medical Images Using Chaotic Map Encryption and LSB Steganography
Abbas Zamil Hussain, Maisa’a Abid Ali Khodher
Revue d intelligence artificielle Open Access
Published: Feb 2024
3 citations
168 days after retraction
A novel medical image data protection scheme for smart healthcare system
Mujeeb Ur Rehman, Arslan Shafique, Muhammad Shahbaz Khan et al. (9 authors)
CAAI Transactions on Intelligence Technology Open Access
Published: Feb 2024
6 citations
152 days after retraction
5D Hyperchaotic Image Encryption Scheme Based on Fibonacci Q‐Matrix
Geeta Biban, Renu Chugh, Anju Panwar et al. (4 authors)
Complexity Open Access
Published: Jan 2024
2 citations
109 days after retraction
Image encryption of medical images
Mohit Pandey, Abhishek Gupta
Advances in computers
Published: Jan 2024
1 citation
109 days after retraction
Enhancing Retrieval Quality Through Big Data and AI Technologies
Abhinav Mishra, Akhilendra Pratap Singh, Amar Shankar et al. (6 authors)
Unknown Journal
Published: Dec 2023
106 days after retraction
Improving Bandwidth Utilization for Underwater Fiber Optic Networks Through Intelligent Optimization Techniques
Nitin N. Sakhare, Rakesh Kumar Yadav, A. Rajesh et al. (6 authors)
Unknown Journal
Published: Dec 2023
2 citations
105 days after retraction
A novel scheme for random sequential high-capacity data hiding based on PVD and LSB
Wanqing Wu, Huili Li
Signal Image and Video Processing Open Access
Published: Dec 2023
4 citations
100 days after retraction
Innovative Cybersecurity for Enhanced Data Protection: An Extended Bit-Plane Extraction and Chaotic Permutation-Diffusion Approach in Information Security
Mujeeb Ur Rehman, Arslan Shafique, Kashif Hesham Khan et al. (6 authors)
IEEE Access Open Access
Published: Dec 2023
2 citations
91 days after retraction
Retracted: Enhanced Lorenz-Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data Healthcare
Security and Communication Networks
Security and Communication Networks Open Access
Published: Sep 2023
1 citation
Same day as retraction
Image encryption algorithm based on ElGamal cryptography and selective random diffusion
Liming Guo, Jianqing He, Guodong Ye
Physica Scripta
Published: Aug 2023
4 citations
27 days before retraction
Medical Image Encryption: A Comprehensive Review
Saja Theab Ahmed, Dalal Abdulmohsin Hammood, Raad Farhood Chisab et al. (5 authors)
Computers Open Access
Published: Aug 2023
22 citations
34 days before retraction
H.264/AVC video encryption algorithm based on integer dynamic cross-coupling tent mapping model
Jin Wang, Jiandong Liu, Xu Haoqiang
Multimedia Tools and Applications
Published: Jul 2023
6 citations
70 days before retraction
A Dynamic Hybrid Cryptosystem Using Chaos and Diffie–Hellman Protocol: An Image Encryption Application
Rolando Flores-Carapia, Víctor Manuel Silva-García, Manuel Alejandro Cardona-López
Applied Sciences Open Access
Published: Jun 2023
6 citations
91 days before retraction
Machine learning in cloud-based trust modeling in M-health application using classification with image encryption
Shamimul Qamar
Soft Computing
Published: Apr 2023
4 citations
141 days before retraction
Medical Image Encryption Method Using Cubic-Sin-Logistic-Tent Chaotic Pseudo-Random Number Sequence-Based Substitution
Subhajit Adhikari, Sunil Karforma
SN Computer Science
Published: Apr 2023
2 citations
148 days before retraction
Generation of Boxes and Permutations Using a Bijective Function and the Lorenz Equations: An Application to Color Image Encryption
Víctor Manuel Silva-García, Rolando Flores-Carapia, Manuel Alejandro Cardona-López et al. (4 authors)
Mathematics Open Access
Published: Jan 2023
4 citations
233 days before retraction
2D Lorentz Chaotic Model Coupled with Logistic Chaotic Model for Medical Image Encryption: Towards Ensuring Security for Teleradiology
Siju John, Sushil Kumar
Procedia Computer Science Open Access
Published: Jan 2023
18 citations
256 days before retraction
Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring
Yazeed Yasin Ghadi, Suliman A. Alsuhibany, Jawad Ahmad et al. (8 authors)
Journal of Healthcare Engineering Open Access
Published: Nov 2022
9 citations
310 days before retraction
Quaternion with quantum walks for designing a novel color image cryptosystem
Bassem Abd-El-Atty
Journal of Information Security and Applications
Published: Nov 2022
7 citations
313 days before retraction
A High-Capacity Reversible Data-Hiding Scheme for Medical Image Transmission Using Modified Elias Gamma Encoding
V. M. Manikandan, Kandala Sree Rama Murthy, Bhavana Siddineni et al. (6 authors)
Electronics Open Access
Published: Sep 2022
3 citations
351 days before retraction
An Efficient and Secure Big Data Storage in Cloud Environment by Using Triple Data Encryption Standard
Mohan Naik Ramachandra, Madala Srinivasa Rao, Wen‐Cheng Lai et al. (6 authors)
Big Data and Cognitive Computing Open Access
Published: Sep 2022
66 citations
353 days before retraction
Artificial Intelligence-Based Secure Communication and Classification for Drone-Enabled Emergency Monitoring Systems
Fatma S. Alrayes, Saud S. Alotaibi, Khalid Alissa et al. (8 authors)
Drones Open Access
Published: Aug 2022
30 citations
384 days before retraction
Pigeon Inspired Optimization with Encryption Based Secure Medical Image Management System
B. T. Geetha, M. Prakash, A. V. R. Mayuri et al. (6 authors)
Computational Intelligence and Neuroscience Open Access
Published: Aug 2022
57 citations
402 days before retraction
Resource Optimized Selective Image Encryption of Medical Images Using Multiple Chaotic Systems
Kiran Kiran, B. D. Parameshachari
Microprocessors and Microsystems
Published: May 2022
90 citations
499 days before retraction
Secure Selective Image Encryption Technique for Real Time Applications
Patcha Mohan Sai Kiran, B. D. Parameshachari
International Journal of Computer Applications Open Access
Published: Mar 2022
537 days before retraction
Quick Stats
Total Citations: 31
Years Since Retraction: 2.2 years
Open Access: Yes
Last Checked: Jul 24, 2025
Related Papers
A Review of Motion Vector-Based Video Steganography
Security and Communication Networks • 13 citations
Mining Cryptocurrency-Based Security Using Renewable Energy…
Security and Communication Networks • 63 citations
Intelligent Intrusion Detection Method of Industrial Intern…
Security and Communication Networks • 24 citations
An Efficient Certificate-Based Aggregate Signature Scheme f…
Security and Communication Networks • 22 citations