{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:16:11Z","timestamp":1761005771210,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":42,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819513451","type":"print"},{"value":"9789819513468","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:00:00Z","timestamp":1761004800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:00:00Z","timestamp":1761004800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-1346-8_4","type":"book-chapter","created":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T06:21:46Z","timestamp":1760941306000},"page":"43-65","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Losslessly Selective Chaotic Encryption for Medical Images Based on U2-Net and Stegonography"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0111-8559","authenticated-orcid":false,"given":"Xianhua","family":"Song","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2441-4258","authenticated-orcid":false,"given":"Ying","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5681-064X","authenticated-orcid":false,"given":"Di","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,21]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.sigpro.2017.04.006","volume":"141","author":"J Wu","year":"2017","unstructured":"Wu, J., Liao, X., Yang, B.: Color image encryption based on chaotic systems and elliptic curve elgamal scheme. Signal Process. 141, 109\u2013124 (2017)","journal-title":"Signal Process."},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"122210","DOI":"10.1109\/ACCESS.2020.3007550","volume":"8","author":"J Zhou","year":"2020","unstructured":"Zhou, J., Li, J., Di, X.: A novel lossless medical image encryption scheme based on game theory with optimized ROI parameters and hidden ROI position. IEEE Access 8, 122210\u2013122228 (2020)","journal-title":"IEEE Access"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Abd EL-Latif, A.A., Abd-El-Atty, B., Abou-Nassar, E.M., et al.: Controlled alternate quantum walks based privacy preserving healthcare images in internet of things. Opt. Laser Technol. 124, 105942 (2020)","DOI":"10.1016\/j.optlastec.2019.105942"},{"issue":"11","key":"4_CR4","first-page":"1254","volume":"20","author":"L Itti","year":"1998","unstructured":"Itti, L., Koch, C., Niebur, E.: A model of saliency-based visual attention for rapid scene analysis. IEEE Trans. 20(11), 1254\u20131259 (1998)","journal-title":"IEEE Trans."},{"issue":"3","key":"4_CR5","first-page":"569","volume":"37","author":"MM Cheng","year":"2015","unstructured":"Cheng, M.M., Mitra, N.J., Huang, X., et al.: Global contrast based salient region detection. Comput. Vis. Pattern Recogn. 37(3), 569\u2013582 (2015)","journal-title":"Comput. Vis. Pattern Recogn."},{"issue":"12","key":"4_CR6","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.heliyon.2018.e01042","volume":"4","author":"D Pandey","year":"2018","unstructured":"Pandey, D., Yin, X., Wang, H., et al.: Automatic and fast segmentation of breast region-of-interest (ROI) and density in MRIs. Heliyon 4(12), 111\u2013130 (2018)","journal-title":"Heliyon"},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1016\/j.proeng.2017.09.612","volume":"201","author":"A Gaidel","year":"2017","unstructured":"Gaidel, A.: Method of automatic ROI selection on lung CT images. Procedia Eng. 201, 258\u2013264 (2017)","journal-title":"Procedia Eng."},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Vig, E., Dorr, M., Cox, D.: Large-scale optimization of hierarchical features for saliency prediction in natural images. In: IEEE Conference on Computer Vision and Pattern Recognition, Columbus, pp. 2798\u20132805 (2014)","DOI":"10.1109\/CVPR.2014.358"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Liu, N., Han, J., Zhang, D., et al.: Predicting eye fixations using convolutional neural networks. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Boston, pp. 362\u2013370 (2015)","DOI":"10.1109\/CVPR.2015.7298633"},{"issue":"9","key":"4_CR10","doi-asserted-by":"publisher","first-page":"4446","DOI":"10.1109\/TIP.2017.2710620","volume":"26","author":"SSS Kruthiventi","year":"2017","unstructured":"Kruthiventi, S.S.S., Ayush, K., Babu, R.V.: DeepFix: a fully convolutional neural network for predicting human eye fixations. IEEE Trans. Image Process. 26(9), 4446\u20134456 (2017)","journal-title":"IEEE Trans. Image Process."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Pan, J., Sayrol, E., Giro-i-Nieto, X., et al.: Shallow and deep convolutional networks for saliency prediction. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 598\u2013606 (2016)","DOI":"10.1109\/CVPR.2016.71"},{"issue":"4","key":"4_CR12","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1016\/j.dsp.2012.02.005","volume":"22","author":"G Bhatnagar","year":"2012","unstructured":"Bhatnagar, G., Wu, Q.M.J.: Selective image encryption based on pixels of interest and singular value decomposition. Digit. Signal Process. 22(4), 648\u2013663 (2012)","journal-title":"Digit. Signal Process."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Wu, Y., Noonan, J.P., Agaian, S.: A Wheel-switch chaotic system for image encryption. In: Proceedings 2011 International Conference on System Science and Engineering, Macau, pp. 23\u201327 (2011)","DOI":"10.1109\/ICSSE.2011.5961867"},{"issue":"4","key":"4_CR14","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1007\/s11071-014-1370-9","volume":"77","author":"J Chen","year":"2014","unstructured":"Chen, J., Zhu, Z., Fu, C., et al.: A fast image encryption scheme with a novel pixel swapping-based confusion approach. Nonlinear Dyn. 77(4), 1191\u20131207 (2014)","journal-title":"Nonlinear Dyn."},{"key":"4_CR15","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang, X., Liu, L., Zhang, Y.: A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt. Lasers Eng. 66, 10\u201318 (2015)","journal-title":"Opt. Lasers Eng."},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.optlaseng.2016.10.012","volume":"91","author":"L Xu","year":"2017","unstructured":"Xu, L., Gou, X., Li, Z., et al.: A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt. Lasers Eng. 91, 41\u201352 (2017)","journal-title":"Opt. Lasers Eng."},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"25799","DOI":"10.1007\/s11042-018-5817-8","volume":"77","author":"S Mozaffari","year":"2018","unstructured":"Mozaffari, S.: Parallel image encryption with bitplane decomposition and genetic algorithm. Multimed. Tools Appl. 77, 25799\u201325819 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"10373","DOI":"10.1007\/s11042-018-6539-7","volume":"78","author":"S Som","year":"2019","unstructured":"Som, S., Mitra, A., Palit, S., et al.: A selective bitplane image encryption scheme using chaotic maps. Multimed. Tools Appl. 78, 10373\u201310400 (2019)","journal-title":"Multimed. Tools Appl."},{"issue":"2","key":"4_CR19","first-page":"992","volume":"19","author":"Z Yin","year":"2020","unstructured":"Yin, Z., Peng, Y., Xiang, Y.: Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression. IEEE Trans. Dependable Secure Comput. 19(2), 992\u20131002 (2020)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Ronneberger, O., Fischer, P., Brox, T.: U-Net: convolutional networks for biomedical image segmentation. In: Medical Image Computing and Computer-Assisted Intervention\u2013MICCAI 2015: 18th International Conference, Germany, pp. 234\u2013241 (2015)","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"107404","DOI":"10.1016\/j.patcog.2020.107404","volume":"106","author":"X Qin","year":"2020","unstructured":"Qin, X., Zhang, Z., Huang, C., et al.: U2-net: going deeper with nested u-structure for salient object detection. Pattern Recogn. 106, 107404 (2020)","journal-title":"Pattern Recogn."},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Xie, S., Tu, Z.: Holistically-nested edge detection. In: 2015 IEEE International Conference on Computer Vision (ICCV), Santiago, pp. 1395\u20131403 (2015)","DOI":"10.1109\/ICCV.2015.164"},{"issue":"2","key":"4_CR23","doi-asserted-by":"publisher","first-page":"186","DOI":"10.3390\/e24020186","volume":"24","author":"J Xu","year":"2022","unstructured":"Xu, J., Zhao, B., Wu, Z.: Research on color image encryption algorithm based on bit-plane and chen chaotic system. Entropy 24(2), 186 (2022)","journal-title":"Entropy"},{"key":"4_CR24","first-page":"9","volume":"110","author":"R Danial","year":"2015","unstructured":"Danial, R., Mahdi, Y.: Color image encryption using hyper chaos chen. Int. J. Comput. Appl. 110, 9\u201312 (2015)","journal-title":"Int. J. Comput. Appl."},{"issue":"1","key":"4_CR25","first-page":"95","volume":"18","author":"O Al-Hazaimeh","year":"2021","unstructured":"Al-Hazaimeh, O., Al-Jamal, M., Bawaneh, M., et al.: A new image encryption scheme using dual chaotic map synchronization. Int. Arab J. Inf. Technol. 18(1), 95\u2013102 (2021)","journal-title":"Int. Arab J. Inf. Technol."},{"issue":"1","key":"4_CR26","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/BF01608556","volume":"50","author":"M Henon","year":"1976","unstructured":"Henon, M.: A two-dimensional mapping with strange attractor. Commun. Math. Phys. 50(1), 376\u2013392 (1976)","journal-title":"Commun. Math. Phys."},{"key":"4_CR27","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.aej.2023.04.060","volume":"73","author":"Y Hu","year":"2023","unstructured":"Hu, Y., Wu, H., Zhou, L.: Color image encryption base on a 2D hyperchaotic enhanced henon map and cross diffusion. Alex. Eng. J. 73, 385\u2013402 (2023)","journal-title":"Alex. Eng. J."},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Hou, A.L., Yuan, F., Ying, G.: QR code image detection using run-length coding. In: Proceedings of 2011 International Conference on Computer Science and Network Technology, Harbin, pp. 2130\u20132134 (2011)","DOI":"10.1109\/ICCSNT.2011.6182398"},{"key":"4_CR29","unstructured":"Andrew, N.: Stanford Machine Learning Group. Stanford: Stanford ML Group, 2021, 26 October 2022. https:\/\/stanfordmlgroup.github.io\/"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, L., Song, X., El-Latif, A.A.A., et al.: Reversibly selective encryption for medical images based on coupled chaotic maps and steganography. Complex Intell. Syst. 1\u201327 (2023)","DOI":"10.1007\/s40747-023-01258-2"},{"key":"4_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.micpro.2022.104546","volume":"91","author":"P Kiran","year":"2022","unstructured":"Kiran, P., Parameshachari, B.D.: Resource optimized selective image encryption of medical images using multiple chaotic systems. Microprocess. Microsyst. 91, 1\u201321 (2022)","journal-title":"Microprocess. Microsyst."},{"issue":"2","key":"4_CR32","first-page":"139","volume":"13","author":"X Liu","year":"2023","unstructured":"Liu, X., Chen, H.Q., Xia, W.G.: Selective medical image encryption based on LSB and lifting wavelet transform. Intell. Comput. Appl. 13(2), 139\u2013144 (2023)","journal-title":"Intell. Comput. Appl."},{"key":"4_CR33","doi-asserted-by":"publisher","first-page":"147106","DOI":"10.1109\/ACCESS.2019.2946208","volume":"7","author":"S Zhu","year":"2019","unstructured":"Zhu, S., Zhu, C.: Plaintext-related image encryption algorithm based on block structure and five-dimensional chaotic map. IEEE Access 7, 147106\u2013147118 (2019)","journal-title":"IEEE Access"},{"key":"4_CR34","doi-asserted-by":"publisher","first-page":"159732","DOI":"10.1109\/ACCESS.2020.3020917","volume":"8","author":"JS Khan","year":"2020","unstructured":"Khan, J.S., Boulila, W., Ahmad, J., et al.: DNA and plaintext dependent chaotic visual selective image encryption. IEEE Access 8, 159732\u2013159744 (2020)","journal-title":"IEEE Access"},{"key":"4_CR35","doi-asserted-by":"publisher","first-page":"25664","DOI":"10.1109\/ACCESS.2020.2970806","volume":"8","author":"Q Lu","year":"2020","unstructured":"Lu, Q., Zhu, C., Deng, X.: An efficient image encryption scheme based on the LSS chaotic map and single S-box. IEEE Access 8, 25664\u201325678 (2020)","journal-title":"IEEE Access"},{"issue":"4","key":"4_CR36","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"key":"4_CR37","doi-asserted-by":"publisher","first-page":"5413","DOI":"10.1007\/s12652-020-02028-5","volume":"12","author":"KN Madhusudhan","year":"2021","unstructured":"Madhusudhan, K.N., Sakthivel, P.: A secure medical image transmission algorithm based on binary bits and Arnold map. J. Ambient. Intell. Humaniz. Comput. 12, 5413\u20135420 (2021)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"4_CR38","doi-asserted-by":"crossref","unstructured":"Sankaradass, V., Murali, P., Tholkapiyan, M.: Region of interest (ROI) based image encryption with sine map and Lorenz system. In: Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB), pp. 493\u2013502. Springer, Cham (2019)","DOI":"10.1007\/978-3-030-00665-5_49"},{"key":"4_CR39","doi-asserted-by":"publisher","first-page":"6883","DOI":"10.1007\/s11042-017-4605-1","volume":"77","author":"L Teng","year":"2018","unstructured":"Teng, L., Wang, X., Meng, J.: A chaotic color image encryption using integrated bit-level permutation. Multimed. Tools Appl. 77, 6883\u20136896 (2018)","journal-title":"Multimed. Tools Appl."},{"issue":"7","key":"4_CR40","doi-asserted-by":"publisher","first-page":"656","DOI":"10.3390\/e21070656","volume":"21","author":"P Ramasamy","year":"2019","unstructured":"Ramasamy, P., Ranganathan, V., Kadry, S., et al.: An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced logistic-tent map. Entropy 21(7), 656 (2019)","journal-title":"Entropy"},{"key":"4_CR41","doi-asserted-by":"crossref","unstructured":"Ahmad, J., Larijani, H., Emmanuel, R., et al.: Secure occupancy monitoring system for IoT using lightweight intertwining logistic map. In: 2018 10th Computer Science and Electronic Engineering (CEEC), Colchester, pp. 208\u2013213 (2018)","DOI":"10.1109\/CEEC.2018.8674208"},{"issue":"11","key":"4_CR42","doi-asserted-by":"publisher","first-page":"3108","DOI":"10.3390\/s20113108","volume":"20","author":"B Abd-El-Atty","year":"2020","unstructured":"Abd-El-Atty, B., Iliyasu, A.M., Alaskar, H., et al.: A Robust quasi-quantum walks-based steganography protocol for secure transmission of images on cloud-based e-healthcare platforms. Sensors 20(11), 3108 (2020)","journal-title":"Sensors"}],"container-title":["Lecture Notes in Computer Science","Green, Pervasive, and Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-1346-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T06:21:53Z","timestamp":1760941313000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-1346-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,21]]},"ISBN":["9789819513451","9789819513468"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-1346-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,21]]},"assertion":[{"value":"21 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"GPC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Green, Pervasive, and Cloud Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gpc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2024.gpc-conf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}