{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T06:36:32Z","timestamp":1773988592904,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T00:00:00Z","timestamp":1698710400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T00:00:00Z","timestamp":1698710400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100010009","name":"Heilongjiang Provincial Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["LH2022F032"],"award-info":[{"award-number":["LH2022F032"]}],"id":[{"id":"10.13039\/501100010009","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2022LLZ003"],"award-info":[{"award-number":["ZR2022LLZ003"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2024,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The security and confidentiality of medical images are of utmost importance due to frequent issues such as leakage, theft, and tampering during transmission and storage, which seriously impact patient privacy. Traditional encryption techniques applied to entire images have proven to be ineffective in guaranteeing timely encryption and preserving the privacy of organ regions separated from the background. In response, this study proposes a specialized and efficient local image encryption algorithm for the medical field. The proposed encryption algorithm focuses on the regions of interest (ROI) within massive medical images. Initially, the Laplacian of Gaussian operator and the outer boundary tracking algorithm are employed to extract the binary image and achieve ROI edge extraction. Subsequently, the image is divided into ROI and ROB (regions outside ROI). The ROI is transformed into a row vector and rearranged using the Lorenz hyperchaotic system. The rearranged sequence is XOR with the random sequence generated by the Henon chaotic map. Next, the encrypted sequence is arranged according to the location of the ROI region and recombined with the unencrypted ROB to obtain the complete encrypted image. Finally, the least significant bit algorithm controlled by the key is used to embed binary image into the encrypted image to ensure lossless decryption of the medical images. Experimental verification demonstrates that the proposed selective encryption algorithm for massive medical images offers relatively ideal security and higher encryption efficiency. This algorithm addresses the privacy concerns and challenges faced in the medical field and contributes to the secure transmission and storage of massive medical images.<\/jats:p>","DOI":"10.1007\/s40747-023-01258-2","type":"journal-article","created":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T10:02:24Z","timestamp":1698746544000},"page":"2187-2213","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Reversibly selective encryption for medical images based on coupled chaotic maps and steganography"],"prefix":"10.1007","volume":"10","author":[{"given":"Lina","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0111-8559","authenticated-orcid":false,"given":"Xianhua","family":"Song","sequence":"additional","affiliation":[]},{"given":"Ahmed A. Abd","family":"El-Latif","sequence":"additional","affiliation":[]},{"given":"Yanfeng","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Bassem","family":"Abd-El-Atty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,31]]},"reference":[{"key":"1258_CR1","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.sigpro.2017.04.006","volume":"141","author":"J Wu","year":"2017","unstructured":"Wu J, Liao X, Yang B (2017) Color image encryption based on chaotic systems and elliptic curve ElGamal scheme. Signal Process 141:109\u2013124","journal-title":"Signal Process"},{"issue":"6","key":"1258_CR2","doi-asserted-by":"publisher","first-page":"898","DOI":"10.3390\/e25060898","volume":"25","author":"J Wu","year":"2023","unstructured":"Wu J, Zhang J, Liu D et al (2023) A multiple-medical-image encryption method based on SHA-256 and DNA encoding. Entropy 25(6):898","journal-title":"Entropy"},{"key":"1258_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/s12596-023-01186-x","author":"R Girija","year":"2023","unstructured":"Girija R, Singh H, Abirami G (2023) Optical medical image encryption based on digital hologram in various domains. J Opt. https:\/\/doi.org\/10.1007\/s12596-023-01186-x","journal-title":"J Opt"},{"key":"1258_CR4","doi-asserted-by":"publisher","first-page":"122210","DOI":"10.1109\/ACCESS.2020.3007550","volume":"8","author":"J Zhou","year":"2020","unstructured":"Zhou J, Li J, Di X (2020) A novel lossless medical image encryption scheme based on game theory with optimized ROI parameters and hidden ROI position. IEEE Access 8:122210\u2013122228","journal-title":"IEEE Access"},{"key":"1258_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2018.e1042","author":"D Pandey","year":"2018","unstructured":"Pandey D, Yin X, Wang H et al (2018) Automatic and fast segmentation of breast region-of-interest (ROI) and density in MRIs. Heliyon. https:\/\/doi.org\/10.1016\/j.heliyon.2018.e1042","journal-title":"Heliyon"},{"key":"1258_CR6","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1016\/j.proeng.2017.09.612","volume":"201","author":"A Gaidel","year":"2017","unstructured":"Gaidel A (2017) A method of automatic ROI selection on lung CT images. Procedia Eng 201:258\u2013264","journal-title":"Procedia Eng"},{"key":"1258_CR7","doi-asserted-by":"crossref","unstructured":"Sankaradass V, Murali P, Tholkapiyan M (2019) Region of Interest (ROI) based image encryption with sine map and lorenz system. Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB). Springer International Publishing, pp 493\u2013502","DOI":"10.1007\/978-3-030-00665-5_49"},{"issue":"2","key":"1258_CR8","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1080\/19393555.2020.1718248","volume":"29","author":"PT Akkasaligar","year":"2020","unstructured":"Akkasaligar PT, Biradar S (2020) Selective medical image encryption using DNA cryptography. Inf Secur J Glob Perspect 29(2):91\u2013101","journal-title":"Inf Secur J Glob Perspect"},{"key":"1258_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.micpro.2022.104546","volume":"91","author":"P Kiran","year":"2022","unstructured":"Kiran P, Parameshachari BD (2022) Resource optimized selective image encryption of medical images using multiple chaotic systems. Microprocess Microsyst 91:1\u201321","journal-title":"Microprocess Microsyst"},{"key":"1258_CR10","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.physleta.2005.08.006","volume":"346","author":"ZH Guan","year":"2005","unstructured":"Guan ZH, Huang F, Guan W (2005) Chaos-based image encryption algorithm. Phys Lett A 346:153\u2013157","journal-title":"Phys Lett A"},{"issue":"9","key":"1258_CR11","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"N Pareek","year":"2006","unstructured":"Pareek N, Patidar V, Sud K (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926\u2013934","journal-title":"Image Vis Comput"},{"issue":"6","key":"1258_CR12","doi-asserted-by":"publisher","first-page":"1104","DOI":"10.1016\/j.optcom.2008.12.001","volume":"282","author":"N Singh","year":"2009","unstructured":"Singh N, Sinha A (2009) Optical image encryption using Hartley transform and logistic map. Opt Commun 282(6):1104\u20131109","journal-title":"Opt Commun"},{"key":"1258_CR13","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Bao L, Chen PC (2014) A new 1D chaotic system for image encryption. Signal Process 97:172\u2013182","journal-title":"Signal Process"},{"issue":"1","key":"1258_CR14","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s11071-016-3030-8","volume":"87","author":"C Li","year":"2017","unstructured":"Li C, Luo G, Qin K et al (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87(1):127\u2013133","journal-title":"Nonlinear Dyn"},{"issue":"5","key":"1258_CR15","doi-asserted-by":"publisher","first-page":"1424","DOI":"10.1109\/78.757236","volume":"47","author":"L Cong","year":"1999","unstructured":"Cong L, Wu X, Sun S (1999) A general efficient method for chaotic signal estimation. IEEE Trans Signal Process 47(5):1424\u20131428","journal-title":"IEEE Trans Signal Process"},{"issue":"3","key":"1258_CR16","first-page":"033118-113","volume":"18","author":"A David","year":"2008","unstructured":"David A, Rhouma R, Gonzalo A et al (2008) On the security of a new image encryption scheme based on chaotic map lattices. Chaos Interdiscip J Nonlinear Sci 18(3):033118\u2013113","journal-title":"Chaos Interdiscip J Nonlinear Sci"},{"key":"1258_CR17","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","volume":"56","author":"R Enayatifar","year":"2014","unstructured":"Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83\u201393","journal-title":"Opt Lasers Eng"},{"key":"1258_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2023.109107","volume":"211","author":"NR Zhou","year":"2023","unstructured":"Zhou NR, Tong LJ, Zou WP (2023) Multi-image encryption scheme with quaternion discrete fractional Chebyshev moment transform and cross-coupling operation. Signal Process 211:109107","journal-title":"Signal Process"},{"key":"1258_CR19","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"Z Hua","year":"2018","unstructured":"Hua Z, Jin F, Xu B et al (2018) 2D Logistic-sine-coupling map for image encryption. Signal Process 149:148\u2013161","journal-title":"Signal Process"},{"key":"1258_CR20","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1016\/B978-0-12-374457-9.00019-6","volume-title":"The essential guide to image processing","author":"PA Mlsna","year":"2009","unstructured":"Mlsna PA, Rodr\u00edguez JJ (2009) Chapter 19-gradient and laplacian edge detection. The essential guide to image processing, 2nd edn. Elsevier, Boston, pp 495\u2013524","edition":"2"},{"key":"1258_CR21","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.compeleceng.2019.06.020","volume":"78","author":"Z Du","year":"2019","unstructured":"Du Z, Li X (2019) Laplacian filtering effect on digital image tuning via the decomposed eigen-filter. Comput Electr Eng 78:69\u201378","journal-title":"Comput Electr Eng"},{"issue":"1","key":"1258_CR22","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1613\/1\/012067","volume":"1613","author":"T Indriyani","year":"2020","unstructured":"Indriyani T, Utoyo I, Rulaningtyas R (2020) Comparison of image edge detection methods on potholes road images. J Phys Conf Ser 1613(1):012067. https:\/\/doi.org\/10.1088\/1742-6596\/1613\/1\/012067","journal-title":"J Phys Conf Ser"},{"issue":"3","key":"1258_CR23","doi-asserted-by":"publisher","first-page":"353","DOI":"10.3390\/s16030353","volume":"16","author":"J Seo","year":"2016","unstructured":"Seo J, Chae S, Shim J et al (2016) Fast contour-tracing algorithm based on a pixel-following method for image sensors. Sensors 16(3):353","journal-title":"Sensors"},{"issue":"14","key":"1258_CR24","doi-asserted-by":"publisher","first-page":"3751","DOI":"10.1016\/j.physa.2008.02.020","volume":"387","author":"X Wang","year":"2008","unstructured":"Wang X, Wang M (2008) A hyperchaos generated from Lorenz system. Phys A 387(14):3751\u20133758","journal-title":"Phys A"},{"key":"1258_CR25","unstructured":"Tao Y, Cui W, Zhang Z et al (2022) An image encryption algorithm based on Hopfield neural network and Lorenz hyperchaotic system. IAENG Int J Comput Sci 49(4):1201\u20131211"},{"issue":"1","key":"1258_CR26","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/BF01608556","volume":"50","author":"M Henon","year":"1976","unstructured":"Henon M (1976) A two-dimensional mapping with strange attractor. Commun Math Phys 50(1):376\u2013392","journal-title":"Commun Math Phys"},{"key":"1258_CR27","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.aej.2023.04.060","volume":"73","author":"Y Hu","year":"2023","unstructured":"Hu Y, Wu H, Zhou L (2023) Color image encryption base on a 2D hyperchaotic enhanced Henon map and cross diffusion. Alex Eng J 73:385\u2013402","journal-title":"Alex Eng J"},{"key":"1258_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2023.109665","volume":"167","author":"LH Gong","year":"2023","unstructured":"Gong LH, Luo HX (2023) Dual color images watermarking scheme with geometric correction based on quaternion FrOOFMMs and LS-SVR. Opt Laser Technol 167:109665","journal-title":"Opt Laser Technol"},{"issue":"3","key":"1258_CR29","doi-asserted-by":"publisher","first-page":"315","DOI":"10.5755\/j01.itc.44.3.8949","volume":"44","author":"AK Darabkh","year":"2015","unstructured":"Darabkh AK, Jafar FI, Al-Zubi TR et al (2015) A new image steganographic approach for secure communication based on LSB replacement method. Inf Technol Control 44(3):315\u2013328","journal-title":"Inf Technol Control"},{"key":"1258_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.123687","volume":"541","author":"AA Abd El-Latif","year":"2020","unstructured":"Abd El-Latif AA, Abd-El-Atty B, Elseuofi S et al (2020) Secret images transfer in cloud system based on investigating quantum walks in steganography approaches. Phys A 541:123687","journal-title":"Phys A"},{"key":"1258_CR31","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.optlastec.2019.03.005","volume":"116","author":"AA Abd-EL-Latif","year":"2019","unstructured":"Abd-EL-Latif AA, Abd-El-Atty B, Venegas-Andraca SE (2019) A novel image steganography technique based on quantum substitution boxes. Opt Laser Technol 116:92\u2013102","journal-title":"Opt Laser Technol"},{"key":"1258_CR32","unstructured":"Andrew Ng (2003) Stanford Machine Learning Group. https:\/\/stanfordmlgroup.github.io\/. Accessed 26 June 2022"},{"issue":"1","key":"1258_CR33","first-page":"565","volume":"75","author":"W Zhang","year":"2023","unstructured":"Zhang W, Li J, Bhatti UA et al (2023) Robust multi-watermarking algorithm for medical images based on GoogLeNet and Henon map. CMC Comput Mater Continua 75(1):565\u2013586","journal-title":"CMC Comput Mater Continua"},{"issue":"2","key":"1258_CR34","first-page":"139","volume":"13","author":"X Liu","year":"2023","unstructured":"Liu X, Chen H, Xia W (2023) Selective medical image encryption based on LSB and lifting wavelet transform. Intell Comput Appl 13(2):139\u2013144","journal-title":"Intell Comput Appl"},{"key":"1258_CR35","doi-asserted-by":"publisher","first-page":"115143","DOI":"10.1109\/ACCESS.2022.3218886","volume":"10","author":"PN Andono","year":"2022","unstructured":"Andono PN (2022) Improved pixel and bit confusion-diffusion based on mixed chaos and hash operation for image encryption. IEEE Access 10:115143\u2013115156","journal-title":"IEEE Access"},{"key":"1258_CR36","doi-asserted-by":"publisher","first-page":"159732","DOI":"10.1109\/ACCESS.2020.3020917","volume":"8","author":"JS Khan","year":"2020","unstructured":"Khan JS, Boulila W, Ahmad J et al (2020) DNA and plaintext dependent chaotic visual selective image encryption. IEEE Access 8:159732\u2013159744","journal-title":"IEEE Access"},{"key":"1258_CR37","doi-asserted-by":"publisher","first-page":"25664","DOI":"10.1109\/ACCESS.2020.2970806","volume":"8","author":"Q Lu","year":"2020","unstructured":"Lu Q, Zhu C, Deng X (2020) An efficient image encryption scheme based on the LSS chaotic map and single S-box. IEEE Access 8:25664\u201325678","journal-title":"IEEE Access"},{"issue":"4","key":"1258_CR38","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656\u2013715","journal-title":"Bell Syst Tech J"},{"key":"1258_CR39","doi-asserted-by":"publisher","first-page":"5413","DOI":"10.1007\/s12652-020-02028-5","volume":"12","author":"KN Madhusudhan","year":"2021","unstructured":"Madhusudhan KN, Sakthivel P (2021) A secure medical image transmission algorithm based on binary bits and Arnold map. J Ambient Intell Humaniz Comput 12:5413\u20135420","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1258_CR40","doi-asserted-by":"publisher","first-page":"6883","DOI":"10.1007\/s11042-017-4605-1","volume":"77","author":"L Teng","year":"2018","unstructured":"Teng L, Wang X, Meng J (2018) A chaotic color image encryption using integrated bit-level permutation. Multimed Tools Appl 77:6883\u20136896","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"1258_CR41","doi-asserted-by":"publisher","first-page":"656","DOI":"10.3390\/e21070656","volume":"21","author":"P Ramasamy","year":"2019","unstructured":"Ramasamy P, Ranganathan V, Kadry S et al (2019) An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced Logistic-Tent map. Entropy 21(7):656. https:\/\/doi.org\/10.3390\/e21070656","journal-title":"Entropy"},{"key":"1258_CR42","doi-asserted-by":"crossref","unstructured":"Ahmad J, Larijani H, Emmanuel R et al (2018) Secure occupancy monitoring system for IoT using lightweight intertwining logistic map. 2018 10th computer science and electronic engineering (CEEC). IEEE, pp 208\u2013213","DOI":"10.1109\/CEEC.2018.8674208"},{"key":"1258_CR43","doi-asserted-by":"publisher","first-page":"35419","DOI":"10.1007\/s11042-019-08168-x","volume":"78","author":"X Chai","year":"2019","unstructured":"Chai X, Zhang J, Gan Z et al (2019) Medical image encryption algorithm based on Latin square and memristive chaotic system. Multimed Tools Appl 78:35419\u201335453","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"1258_CR44","doi-asserted-by":"publisher","first-page":"3108","DOI":"10.3390\/s20113108","volume":"20","author":"B Abd-El-Atty","year":"2020","unstructured":"Abd-El-Atty B, Iliyasu AM, Alaskar H, Abd AA, El-Latif AA (2020) A robust quasi-quantum walks-based steganography protocol for secure transmission of images on cloud-based E-healthcare platforms. Sensors 20(11):3108","journal-title":"Sensors"},{"key":"1258_CR45","doi-asserted-by":"publisher","first-page":"147106","DOI":"10.1109\/ACCESS.2019.2946208","volume":"7","author":"S Zhu","year":"2019","unstructured":"Zhu S, Zhu C (2019) Plaintext-related image encryption algorithm based on block structure and five-dimensional chaotic map. IEEE Access 7:147106\u2013147118","journal-title":"IEEE Access"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01258-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-023-01258-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01258-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,30]],"date-time":"2024-03-30T15:25:28Z","timestamp":1711812328000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-023-01258-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,31]]},"references-count":45,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["1258"],"URL":"https:\/\/doi.org\/10.1007\/s40747-023-01258-2","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,31]]},"assertion":[{"value":"1 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}