{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T15:40:07Z","timestamp":1738338007990,"version":"3.35.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T00:00:00Z","timestamp":1735862400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T00:00:00Z","timestamp":1735862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s11760-024-03583-6","type":"journal-article","created":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T05:34:38Z","timestamp":1735882478000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Visual security index combining superpixel segmentation and block variance calculation for selective encrypted images"],"prefix":"10.1007","volume":"19","author":[{"given":"Zhihua","family":"Gan","sequence":"first","affiliation":[]},{"given":"Shihao","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Zilong","family":"Pang","sequence":"additional","affiliation":[]},{"given":"Xiuli","family":"Chai","sequence":"additional","affiliation":[]},{"given":"Yalin","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,3]]},"reference":[{"issue":"8","key":"3583_CR1","doi-asserted-by":"publisher","first-page":"7380","DOI":"10.1109\/JIOT.2022.3228781","volume":"10","author":"X Chai","year":"2023","unstructured":"Chai, X., et al.: Exploiting semi-tensor product compressed sensing and hybrid cloud for secure medical image transmission. IEEE Internet Things J. 10(8), 7380\u20137392 (2023). https:\/\/doi.org\/10.1109\/JIOT.2022.3228781","journal-title":"IEEE Internet Things J."},{"key":"3583_CR2","doi-asserted-by":"publisher","first-page":"972","DOI":"10.1109\/LSP.2022.3163685","volume":"29","author":"X Chai","year":"2022","unstructured":"Chai, X., et al.: TPE-GAN: thumbnail preserving encryption based on GAN with key. IEEE Signal Process. Lett. 29, 972-a976 (2022). https:\/\/doi.org\/10.1109\/LSP.2022.3163685","journal-title":"IEEE Signal Process. Lett."},{"issue":"19","key":"3583_CR3","doi-asserted-by":"publisher","first-page":"2206319","DOI":"10.1002\/smll.202206319","volume":"19","author":"Y Cao","year":"2023","unstructured":"Cao, Y., et al.: Multiplexing optical images for steganography by single metasurfaces. Small 19(19), 2206319 (2023)","journal-title":"Small"},{"key":"3583_CR4","doi-asserted-by":"publisher","unstructured":"Go, K., et al.: Secure video transmission framework for battery-powered video devices. (2020). https:\/\/doi.org\/10.1109\/TDSC.2020.2980256","DOI":"10.1109\/TDSC.2020.2980256"},{"key":"3583_CR5","doi-asserted-by":"publisher","unstructured":"Mohan, A., et al.: Selective encryption and optimization based watermarking for robust transmission of landslide images. Comput. Electr. Eng. 95, 107385 (2021) https:\/\/doi.org\/10.1016\/J.COMPELECENG.2021.107385","DOI":"10.1016\/J.COMPELECENG.2021.107385"},{"key":"3583_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2020.106911","volume":"138","author":"Y Shen","year":"2021","unstructured":"Shen, Y., et al.: Optical selective encryption based on the FRFCM algorithm and face biometric for the medical image. Opt. Laser Technol. 138, 106911 (2021)","journal-title":"Opt. Laser Technol."},{"key":"3583_CR7","doi-asserted-by":"publisher","unstructured":"Kiran, P., Divakarachari, P.B.: Resource optimized selective image encryption of medical images using multiple chaotic systems. Microprocess. Microsyst. 91, 104546 (2022) https:\/\/doi.org\/10.1016\/J.MICPRO.2022.104546","DOI":"10.1016\/J.MICPRO.2022.104546"},{"key":"3583_CR8","doi-asserted-by":"publisher","unstructured":"Gan, Z., et al.: Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication. J. King Saud Univ. Comput. Inf. Sci. 34(10), 9252\u20139272 (2022) https:\/\/doi.org\/10.1016\/J.JKSUCI.2022.09.006","DOI":"10.1016\/J.JKSUCI.2022.09.006"},{"issue":"4","key":"3583_CR9","doi-asserted-by":"publisher","first-page":"559","DOI":"10.3390\/electronics11040559","volume":"11","author":"D Varga","year":"2022","unstructured":"Varga, D.: Full-reference image quality assessment based on Grunwald-Letnikov derivative, image gradients, and visual saliency. Electronics 11(4), 559 (2022)","journal-title":"Electronics"},{"issue":"4","key":"3583_CR10","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., et al.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004). https:\/\/doi.org\/10.1109\/TIP.2003.819861","journal-title":"IEEE Trans. Image Process."},{"issue":"2","key":"3583_CR11","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1109\/TIP.2005.859378","volume":"15","author":"HR Sheikh","year":"2006","unstructured":"Sheikh, H.R., Bovik, A.C.: Image information and visual quality. IEEE Trans. Image Process. 15(2), 430\u2013444 (2006). https:\/\/doi.org\/10.1109\/TIP.2005.859378","journal-title":"IEEE Trans. Image Process."},{"key":"3583_CR12","doi-asserted-by":"publisher","unstructured":"Mao, Y., Wu, M.: Security evaluation for communication-friendly encryption of multimedia. In: 2004 International Conference on Image Processing, pp. 569\u2013572 (2004). https:\/\/doi.org\/10.1109\/ICIP.2004.1418818","DOI":"10.1109\/ICIP.2004.1418818"},{"issue":"1","key":"3583_CR13","first-page":"69","volume":"33","author":"Y Yao","year":"2009","unstructured":"Yao, Y., Xu, Z., Sun, J.: Visual security assessment for cipher-images based on neighborhood similarity. Informatica 33(1), 69\u201376 (2009)","journal-title":"Informatica"},{"key":"3583_CR14","doi-asserted-by":"publisher","unstructured":"Tong, L., et al.: Visual security evaluation for video encryption. In: Proceedings of the 18th ACM international conference on Multimedia, pp. 835\u2013838 (2010). https:\/\/doi.org\/10.1145\/1873951.1874091","DOI":"10.1145\/1873951.1874091"},{"issue":"9","key":"3583_CR15","doi-asserted-by":"publisher","first-page":"4232","DOI":"10.1109\/TIP.2018.2837341","volume":"27","author":"W Sun","year":"2018","unstructured":"Sun, W., et al.: SPSIM: A superpixel-based similarity index for full-reference image quality assessment. IEEE Trans. Image Process. 27(9), 4232\u20134244 (2018). https:\/\/doi.org\/10.1109\/TIP.2018.2837341","journal-title":"IEEE Trans. Image Process."},{"key":"3583_CR16","doi-asserted-by":"publisher","unstructured":"Wang, Y., et al.: Blind quality evaluator for enhanced colonoscopy images by integrating local and global statistical features. IEEE Trans. Instrum. Meas., 1\u20131 (2024) https:\/\/doi.org\/10.1109\/TIM.2024.3481532","DOI":"10.1109\/TIM.2024.3481532"},{"issue":"5","key":"3583_CR17","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1109\/TIFS.2016.2515503","volume":"11","author":"T Xiang","year":"2016","unstructured":"Xiang, T., Guo, S., Li, X.: Perceptual visual security index based on edge and texture similarities. IEEE Trans. Inf. Forensics Secur. 11(5), 951\u2013963 (2016). https:\/\/doi.org\/10.1109\/TIFS.2016.2515503","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3583_CR18","doi-asserted-by":"publisher","unstructured":"Cui, Y., et al.: Stitched wide field of view light field image quality assessment: Benchmark database and objective metric. IEEE Trans. Multi. 26, 5092\u20135107 (2024) https:\/\/doi.org\/10.1109\/TMM.2023.3330096","DOI":"10.1109\/TMM.2023.3330096"},{"issue":"4","key":"3583_CR19","doi-asserted-by":"publisher","first-page":"043018","DOI":"10.1117\/1.JEI.32.4.043018","volume":"32","author":"Z Gan","year":"2023","unstructured":"Gan, Z., et al.: Visual security index of selective encrypted images based on multi-directional structure and content-aware features. J. Electron. Imag. 32(4), 043018\u2013043018 (2023). https:\/\/doi.org\/10.1117\/1.JEI.32.4.043018","journal-title":"J. Electron. Imag."},{"issue":"4","key":"3583_CR20","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1109\/TCSVT.2019.2891159","volume":"29","author":"L Po","year":"2019","unstructured":"Po, L., et al.: A novel patch variance biased convolutional neural network for no-reference image quality assessment. IEEE Trans. Circuits Syst. Video Technol. 29(4), 1223\u20131229 (2019). https:\/\/doi.org\/10.1109\/TCSVT.2019.2891159","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"3583_CR21","doi-asserted-by":"publisher","unstructured":"Shi, C., Lin, Y.: Full reference image quality assessment based on visual salience with color appearance and gradient similarity. IEEE Access 8, 97310\u201397320 (2020) https:\/\/doi.org\/10.1109\/ACCESS.2020.2995420","DOI":"10.1109\/ACCESS.2020.2995420"},{"key":"3583_CR22","doi-asserted-by":"publisher","unstructured":"Guo, S., et al.: PEID: A perceptually encrypted image database for visual security evaluation. IEEE Trans. Inf. Forensics Secur. 15, 1151\u20131163 (2020) https:\/\/doi.org\/10.1109\/TIFS.2019.2935415","DOI":"10.1109\/TIFS.2019.2935415"},{"key":"3583_CR23","doi-asserted-by":"publisher","unstructured":"Achanta, R., et al.: SLIC superpixels compared to state-of-the-art superpixel methods. IEEE Trans. Pattern Anal. Mach. Intell. 34(11), 2274\u20132282 (2012). https:\/\/doi.org\/10.1109\/TPAMI.2012.120","DOI":"10.1109\/TPAMI.2012.120"},{"key":"3583_CR24","doi-asserted-by":"publisher","unstructured":"Ding, K., et al.: Image quality assessment: unifying structure and texture similarity. IEEE Trans. Pattern Anal. Mach. Intell. 44(5), 2567\u20132581 (2022). https:\/\/doi.org\/10.1109\/TPAMI.2020.3045810","DOI":"10.1109\/TPAMI.2020.3045810"},{"key":"3583_CR25","doi-asserted-by":"publisher","unstructured":"Meng, C., et al.: Objective quality assessment of lenslet light field image based on focus stack. IEEE Trans. Multim. 24, 3193\u20133207 (2022). https:\/\/doi.org\/10.1109\/TMM.2021.3096071","DOI":"10.1109\/TMM.2021.3096071"},{"key":"3583_CR26","doi-asserted-by":"publisher","unstructured":"Liu, Y., et al.: Blind omnidirectional image quality assessment based on structure and natural features. IEEE Trans. Instrum. Meas. 70, 1\u201311 (2021). https:\/\/doi.org\/10.1109\/TIM.2021.3102691","DOI":"10.1109\/TIM.2021.3102691"},{"key":"3583_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-5930-5","author":"K Scott","year":"2014","unstructured":"Scott, K.: Computer vision metrics survey, taxonomy, and analysis. Apress (2014). https:\/\/doi.org\/10.1007\/978-1-4302-5930-5","journal-title":"Apress"},{"key":"3583_CR28","doi-asserted-by":"publisher","unstructured":"Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. Comput. Vis. Pattern Recognit. 886\u2013893 (2005). https:\/\/doi.org\/10.1109\/CVPR.2005.177","DOI":"10.1109\/CVPR.2005.177"},{"issue":"9","key":"3583_CR29","doi-asserted-by":"publisher","first-page":"2184","DOI":"10.1109\/TMM.2019.2913315","volume":"21","author":"G Yue","year":"2019","unstructured":"Yue, G., et al.: No-reference quality evaluator of transparently encrypted images. IEEE Trans. Multi. 21(9), 2184\u20132194 (2019). https:\/\/doi.org\/10.1109\/TMM.2019.2913315","journal-title":"IEEE Trans. Multi."},{"key":"3583_CR30","doi-asserted-by":"publisher","unstructured":"Liu, Y., et al.: Hvs-based perception-driven no-reference omnidirectional image quality assessment. IEEE Trans. Instrum. Meas. 72, 1\u201311 (2023). https:\/\/doi.org\/10.1109\/TIM.2022.3232792","DOI":"10.1109\/TIM.2022.3232792"},{"key":"3583_CR31","unstructured":"Florent, A., Thomas, S., Vinod, P.: Subjective quality assessment of selective encryption techniques. (2010)"},{"issue":"4","key":"3583_CR32","doi-asserted-by":"publisher","first-page":"1500","DOI":"10.1109\/TIP.2011.2175935","volume":"21","author":"A Liu","year":"2012","unstructured":"Liu, A., Lin, W., Narwaria, M.: Image quality assessment based on gradient similarity. IEEE Trans. Image Process. 21(4), 1500\u20131512 (2012). https:\/\/doi.org\/10.1109\/TIP.2011.2175935","journal-title":"IEEE Trans. Image Process."},{"key":"3583_CR33","doi-asserted-by":"publisher","unstructured":"Zhang, L., et al.: FSIM: a feature similarity index for image quality assessment. IEEE Trans. Image Process. 20(8), 2378\u20132386 (2011). https:\/\/doi.org\/10.1109\/TIP.2011.2109730","DOI":"10.1109\/TIP.2011.2109730"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03583-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-024-03583-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03583-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T14:58:48Z","timestamp":1738335528000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-024-03583-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,3]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["3583"],"URL":"https:\/\/doi.org\/10.1007\/s11760-024-03583-6","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"type":"print","value":"1863-1703"},{"type":"electronic","value":"1863-1711"}],"subject":[],"published":{"date-parts":[[2025,1,3]]},"assertion":[{"value":"28 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"179"}}