{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T09:11:50Z","timestamp":1771665110492,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031157769","type":"print"},{"value":"9783031157776","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15777-6_13","type":"book-chapter","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T15:24:33Z","timestamp":1661268273000},"page":"221-239","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Lightweight and\u00a0Practical Privacy-Preserving Image Masking in\u00a0Smart Community"],"prefix":"10.1007","author":[{"given":"Zhen","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yining","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Weizhi","family":"Meng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,24]]},"reference":[{"issue":"2","key":"13_CR1","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MCOM.2014.6736746","volume":"52","author":"F Boccardi","year":"2014","unstructured":"Boccardi, F., Heath, R.W., Lozano, A., Marzetta, T.L., Popovski, P.: Five disruptive technology directions for 5G. IEEE Commun. Mag. 52(2), 74\u201380 (2014). https:\/\/doi.org\/10.1109\/MCOM.2014.6736746","journal-title":"IEEE Commun. Mag."},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-030-62223-7_24","volume-title":"Machine Learning for Cyber Security","author":"Z Chen","year":"2020","unstructured":"Chen, Z., Zhu, T., Wang, C., Ren, W., Xiong, P.: GAN-based image privacy preservation: balancing privacy and utility. In: Chen, X., Yan, H., Yan, Q., Zhang, X. (eds.) ML4CS 2020. LNCS, vol. 12486, pp. 287\u2013296. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-62223-7_24"},{"key":"13_CR3","doi-asserted-by":"publisher","unstructured":"De Santis, F., Schauer, A., Sigl, G.: Chacha20-poly1305 authenticated encryption for high-speed embedded IoT applications. In: Design, Automation Test in Europe Conference Exhibition (DATE 2017), pp. 692\u2013697 (2017). https:\/\/doi.org\/10.23919\/DATE.2017.7927078","DOI":"10.23919\/DATE.2017.7927078"},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-030-37468-6_10","volume-title":"Internet of Things (IoT)","author":"S Dhall","year":"2020","unstructured":"Dhall, S., Pal, S.K., Sharma, K.: A chaos-based multi-level dynamic framework for image encryption. In: Alam, M., Shakil, K.A., Khan, S. (eds.) Internet of Things (IoT), pp. 189\u2013217. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-37468-6_10"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-540-72738-5_19","volume-title":"Applied Cryptography and Network Security","author":"M Green","year":"2007","unstructured":"Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288\u2013306. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-72738-5_19"},{"key":"13_CR6","doi-asserted-by":"publisher","unstructured":"Gu, G., Ling, J.: A fast image encryption method by using chaotic 3D cat maps. Optik 125(17), 4700\u20134705 (2014). https:\/\/doi.org\/10.1016\/j.ijleo.2014.05.023, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0030402614005993","DOI":"10.1016\/j.ijleo.2014.05.023"},{"key":"13_CR7","doi-asserted-by":"publisher","unstructured":"Guan, Z., Li, J., Huang, L., Xiong, X., Liu, Y., Cai, S.: A novel and fast encryption system based on improved Josephus scrambling and chaotic mapping. Entropy 24(3) (2022). https:\/\/doi.org\/10.3390\/e24030384, https:\/\/www.mdpi.com\/1099-4300\/24\/3\/384","DOI":"10.3390\/e24030384"},{"key":"13_CR8","doi-asserted-by":"publisher","unstructured":"Hor\u00e9, A., Ziou, D.: Image quality metrics: PSNR vs. SSIM. In: 2010 20th International Conference on Pattern Recognition, pp. 2366\u20132369 (2010). https:\/\/doi.org\/10.1109\/ICPR.2010.579","DOI":"10.1109\/ICPR.2010.579"},{"key":"13_CR9","doi-asserted-by":"publisher","unstructured":"Hua, Z., Zhou, Y., Huang, H.: Cosine-transform-based chaotic system for image encryption. Inf. Sci. 480, 403\u2013419 (2019). https:\/\/doi.org\/10.1016\/j.ins.2018.12.048, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020025518309927","DOI":"10.1016\/j.ins.2018.12.048"},{"issue":"13","key":"13_CR10","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1049\/el:20080522","volume":"44","author":"Q Huynh-Thu","year":"2008","unstructured":"Huynh-Thu, Q., Ghanbari, M.: Scope of validity of PSNR in image\/video quality assessment. Electron. Lett. 44(13), 800\u2013801 (2008)","journal-title":"Electron. Lett."},{"key":"13_CR11","doi-asserted-by":"publisher","unstructured":"Jan, M.A., Zhang, W., Usman, M., Tan, Z., Khan, F., Luo, E.: SmartEdge: an end-to-end encryption framework for an edge-enabled smart city application. J. Netw. Comput. Appl. 137, 1\u201310 (2019). https:\/\/doi.org\/10.1016\/j.jnca.2019.02.023, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1084804519300827","DOI":"10.1016\/j.jnca.2019.02.023"},{"key":"13_CR12","doi-asserted-by":"publisher","unstructured":"Li, T., Zhang, D.: Hyperchaotic image encryption based on multiple bit permutation and diffusion. Entropy 23(5), 510 (2021). https:\/\/doi.org\/10.3390\/e23050510, https:\/\/www.mdpi.com\/1099-4300\/23\/5\/510","DOI":"10.3390\/e23050510"},{"issue":"11","key":"13_CR13","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MCOM.2011.6069711","volume":"49","author":"X Li","year":"2011","unstructured":"Li, X., Lu, R., Liang, X., Shen, X., Chen, J., Lin, X.: Smart community: an internet of things application. IEEE Commun. Mag. 49(11), 68\u201375 (2011). https:\/\/doi.org\/10.1109\/MCOM.2011.6069711","journal-title":"IEEE Commun. Mag."},{"key":"13_CR14","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.optlaseng.2016.03.019","volume":"84","author":"W Liu","year":"2016","unstructured":"Liu, W., Sun, K., Zhu, C.: A fast image encryption algorithm based on chaotic map. Opt. Lasers Eng. 84, 26\u201336 (2016). https:\/\/doi.org\/10.1016\/j.optlaseng.2016.03.019","journal-title":"Opt. Lasers Eng."},{"issue":"2","key":"13_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5120\/14085-0768","volume":"82","author":"C Maisheri","year":"2013","unstructured":"Maisheri, C., Sharma, D.: Enabling indirect mutual trust for cloud storage systems. Int. J. Comput. Appl. 82(2), 1\u201311 (2013). https:\/\/doi.org\/10.5120\/14085-0768","journal-title":"Int. J. Comput. Appl."},{"issue":"1","key":"13_CR16","first-page":"155","volume":"22","author":"L Meng","year":"2020","unstructured":"Meng, L., Yin, S., Zhao, C., Li, H., Sun, Y.: An improved image encryption algorithm based on chaotic mapping and discrete wavelet transform domain. Int. J. Netw. Secur. 22(1), 155\u2013160 (2020)","journal-title":"Int. J. Netw. Secur."},{"key":"13_CR17","unstructured":"Mondal, B., Singh, J.P.: A lightweight image encryption scheme based on chaos and diffusion circuit. Multimedia Tools Appl. 1\u201325 (2021)"},{"issue":"8","key":"13_CR18","doi-asserted-by":"publisher","first-page":"3679","DOI":"10.1109\/TII.2018.2791944","volume":"14","author":"K Muhammad","year":"2018","unstructured":"Muhammad, K., Hamza, R., Ahmad, J., Lloret, J., Wang, H., Baik, S.W.: Secure surveillance framework for IoT systems using probabilistic image encryption. IEEE Trans. Industr. Inf. 14(8), 3679\u20133689 (2018). https:\/\/doi.org\/10.1109\/TII.2018.2791944","journal-title":"IEEE Trans. Industr. Inf."},{"key":"13_CR19","doi-asserted-by":"publisher","unstructured":"Naseer, Y., Shah, T., Shah, D.: A novel hybrid permutation substitution base colored image encryption scheme for multimedia data. J. Inf. Secur. Appl. 59, 102829 (2021). https:\/\/doi.org\/10.1016\/j.jisa.2021.102829, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S221421262100065X","DOI":"10.1016\/j.jisa.2021.102829"},{"issue":"9","key":"13_CR20","doi-asserted-by":"publisher","first-page":"2137","DOI":"10.1109\/TIFS.2018.2812080","volume":"13","author":"M Preishuber","year":"2018","unstructured":"Preishuber, M., H\u00fctter, T., Katzenbeisser, S., Uhl, A.: Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans. Inf. Forensics Secur. 13(9), 2137\u20132150 (2018). https:\/\/doi.org\/10.1109\/TIFS.2018.2812080","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"13_CR21","doi-asserted-by":"publisher","unstructured":"Rajendran, S., Doraipandian, M.: Chaos based secure medical image transmission model for IoT- powered healthcare systems. In: IOP Conference Series: Materials Science and Engineering, vol. 1022, no. 1, p. 012106 (2021). https:\/\/doi.org\/10.1088\/1757-899x\/1022\/1\/012106","DOI":"10.1088\/1757-899x\/1022\/1\/012106"},{"key":"13_CR22","doi-asserted-by":"publisher","unstructured":"Harichandana, B.S.S., Agarwal, V., Ghosh, S., Ramena, G., Kumar, S., Raja, B.R.K.: PrivPAS: a real time privacy-preserving ai system and applied ethics. In: 2022 IEEE 16th International Conference on Semantic Computing (ICSC), pp. 9\u201316 (2022). https:\/\/doi.org\/10.1109\/ICSC52841.2022.00010","DOI":"10.1109\/ICSC52841.2022.00010"},{"key":"13_CR23","doi-asserted-by":"publisher","unstructured":"Sirichotedumrong, W., Kiya, H.: A GAN-based image transformation scheme for privacy-preserving deep neural networks. In: 2020 28th European Signal Processing Conference (EUSIPCO), pp. 745\u2013749 (2021). https:\/\/doi.org\/10.23919\/Eusipco47968.2020.9287532","DOI":"10.23919\/Eusipco47968.2020.9287532"},{"issue":"2","key":"13_CR24","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu, Y., Noonan, J.P., Agaian, S., et al.: NPCR and UACI randomness tests for image encryption. Cyber J. Multi. J. Sci. Tech. J. Sel. Areas Telecommun. (JSAT) 1(2), 31\u201338 (2011)","journal-title":"Cyber J. Multi. J. Sci. Tech. J. Sel. Areas Telecommun. (JSAT)"},{"key":"13_CR25","doi-asserted-by":"publisher","unstructured":"Yang, G., Cao, J., Chen, Z., Guo, J., Li, J.: Graph-based neural networks for explainable image privacy inference. Pattern Recogn. 105, 107360 (2020). https:\/\/doi.org\/10.1016\/j.patcog.2020.107360, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0031320320301631","DOI":"10.1016\/j.patcog.2020.107360"},{"issue":"5","key":"13_CR26","doi-asserted-by":"publisher","first-page":"2299","DOI":"10.1007\/s40747-021-00399-6","volume":"7","author":"J Yang","year":"2021","unstructured":"Yang, J., Liu, J., Han, R., Wu, J.: Transferable face image privacy protection based on federated learning and ensemble models. Complex Intell. Syst. 7(5), 2299\u20132315 (2021). https:\/\/doi.org\/10.1007\/s40747-021-00399-6","journal-title":"Complex Intell. Syst."},{"key":"13_CR27","doi-asserted-by":"publisher","unstructured":"Yoosefian Dezfuli Nezhad, S., Safdarian, N., Hoseini Zadeh, S.A.: New method for fingerprint images encryption using DNA sequence and chaotic tent map. Optik 224, 165661 (2020). https:\/\/doi.org\/10.1016\/j.ijleo.2020.165661, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0030402620314923","DOI":"10.1016\/j.ijleo.2020.165661"},{"key":"13_CR28","doi-asserted-by":"publisher","unstructured":"Zhang, Y.: The fast image encryption algorithm based on lifting scheme and chaos. Inf. Sci. 520, 177\u2013194 (2020). https:\/\/doi.org\/10.1016\/j.ins.2020.02.012, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020025520300748","DOI":"10.1016\/j.ins.2020.02.012"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15777-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:07:20Z","timestamp":1709831240000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15777-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031157769","9783031157776"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15777-6_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}