{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T17:22:50Z","timestamp":1778692970435,"version":"3.51.4"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-03991-6","type":"journal-article","created":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T08:59:20Z","timestamp":1746435560000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Robust Partial Image Security Through Chaotic Map and Non-adaptive Techniques"],"prefix":"10.1007","volume":"6","author":[{"given":"K. V.","family":"Sudheesh","sequence":"first","affiliation":[]},{"given":"S. Benaka","family":"Santhosha","sequence":"additional","affiliation":[]},{"given":"Kiran","family":"Puttegowda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,5]]},"reference":[{"key":"3991_CR1","volume-title":"Mobile radio communications and 5G networks. Lecture notes in networks and systems","author":"V Kalpana","year":"2023","unstructured":"Kalpana V, Vijaya Kishore V, Satyanarayana RVS. MRI and SPECT brain image analysis using image fusion. In: Marriwala N, Tripathi C, Jain S, Kumar D, editors. Mobile radio communications and 5G networks. Lecture notes in networks and systems, vol. 588. Singapore: Springer; 2023."},{"key":"3991_CR2","volume-title":"Emerging trends in electrical, communications, and information technologies. Lecture notes in electrical engineering","author":"V Vijaya Kishore","year":"2020","unstructured":"Vijaya Kishore V, Kalpana V. ROI segmentation and detection of neoplasm based on morphology using segmentation operators. In: HitendraSarma T, Sankar V, Shaik R, editors. Emerging trends in electrical, communications, and information technologies. Lecture notes in electrical engineering, vol. 569. Singapore: Springer; 2020."},{"issue":"1","key":"3991_CR3","doi-asserted-by":"publisher","first-page":"47","DOI":"10.3390\/info14010047","volume":"14","author":"HL Gururaj","year":"2023","unstructured":"Gururaj HL, Almeshari M, Alzamil Y, Ravi V, Sudeesh KV. Efficient SCAN and chaotic map encryption system for securing E-healthcare images. Information. 2023;14(1):47.","journal-title":"Information"},{"key":"3991_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2023.104907","volume":"101","author":"K Prabhavathi","year":"2023","unstructured":"Prabhavathi K, Anandaraju MB. An efficient medical image encryption algorithm for telemedicine applications. Microprocess Microsyst. 2023;101: 104907.","journal-title":"Microprocess Microsyst"},{"key":"3991_CR5","doi-asserted-by":"publisher","unstructured":"Abdmouleh MK, Khalfallah A, Bouhlel MS (2017) A novel selective encryption DWT-based algorithm for medical images. 2017 14th international conference on computer graphics, imaging and visualization. pp 79\u201384. https:\/\/doi.org\/10.1109\/CGiV.2017.10.","DOI":"10.1109\/CGiV.2017.10"},{"issue":"2","key":"3991_CR6","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1109\/TCE.2006.1649688","volume":"52","author":"S Lian","year":"2006","unstructured":"Lian S, Liu Z, Ren Z, Wang H. Secure advanced video coding based on selective encryption algorithms. IEEE Trans Consum Electron. 2006;52(2):621\u20139.","journal-title":"IEEE Trans Consum Electron"},{"issue":"9","key":"3991_CR7","doi-asserted-by":"publisher","first-page":"e19451","DOI":"10.1016\/j.heliyon.2023.e19451","volume":"9","author":"X Xue","year":"2023","unstructured":"Xue X, Palanisamy S, Selvaraj D, Khalaf OI, Abdulsahib GM. A Novel partial sequence technique based Chaotic biogeography optimization for PAPR reduction in eneralized frequency division multiplexing waveform. Heliyon. 2023;9(9):e19451. https:\/\/doi.org\/10.1016\/j.heliyon.2023.e19451.","journal-title":"Heliyon."},{"issue":"8","key":"3991_CR8","doi-asserted-by":"publisher","first-page":"2439","DOI":"10.1109\/78.852023","volume":"48","author":"H Cheng","year":"2000","unstructured":"Cheng H, Li X. Partial encryption of compressed images and videos. EEE Trans Signal Process. 2000;48(8):2439\u201351.","journal-title":"EEE Trans Signal Process"},{"key":"3991_CR9","doi-asserted-by":"publisher","DOI":"10.1201\/9781420065282","volume-title":"Multimedia content encryption: techniques and applications","author":"S Lian","year":"2008","unstructured":"Lian S. Multimedia content encryption: techniques and applications. New York: Auerbach Publications; 2008."},{"key":"3991_CR10","doi-asserted-by":"crossref","unstructured":"Rodrigues J, Puech W, Bors A (2006) Selective encryption of human skin in jpeg images. In: In 2006 International conference on image processing. IEEE. p. 1981\u20131984","DOI":"10.1109\/ICIP.2006.312886"},{"key":"3991_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-023-08666-y","author":"R Ali","year":"2023","unstructured":"Ali R, Manikandan A, Xu J. A novel framework of adaptive fuzzy-GLCM segmentation and Fuzzy with capsules network (F-CapsNet) classifcation. Neural Comput Applic. 2023. https:\/\/doi.org\/10.1007\/s00521-023-08666-y.","journal-title":"Neural Comput Applic"},{"issue":"s2","key":"3991_CR12","doi-asserted-by":"publisher","first-page":"S435","DOI":"10.3233\/THC-161166","volume":"24","author":"Y Dai","year":"2016","unstructured":"Dai Y, Wang H, Zhou Z, Jin Z. Research on medical image encryption in telemedicine systems. Technol Health Care. 2016;24(s2):S435\u201342.","journal-title":"Technol Health Care"},{"issue":"22","key":"3991_CR13","doi-asserted-by":"publisher","first-page":"31815","DOI":"10.1007\/s11042-022-12188-5","volume":"81","author":"H Ghanbari","year":"2022","unstructured":"Ghanbari H, Enayatifar R, Motameni H. Chaos-based image encryption using hybrid model of linear-feedback shift register system and deoxyribonucleic acid. Multimed Tools Appl. 2022;81(22):31815\u201330.","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"3991_CR14","doi-asserted-by":"publisher","first-page":"16987","DOI":"10.1007\/s11042-022-12471-5","volume":"81","author":"A Sridevi","year":"2022","unstructured":"Sridevi A, Sivaraman R, Balasubramaniam V, Sreenithi Siva J, Thanikaiselvan V, Rengarajan A. On Chaos based duo confusion duo diffusion for colour images. Multimed Tools Appl. 2022;81(12):16987\u20137014.","journal-title":"Multimed Tools Appl."},{"issue":"10","key":"3991_CR15","doi-asserted-by":"publisher","first-page":"8136","DOI":"10.1016\/j.jksuci.2022.07.025","volume":"34","author":"M Alawida","year":"2022","unstructured":"Alawida M, Teh JS, Mehmood A, Shoufan A. A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations. J King Saud Univ-Comput Inf Sci. 2022;34(10):8136\u201351.","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"3991_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118845","volume":"213","author":"Q Lai","year":"2023","unstructured":"Lai Q, Hu G, Erkan U, Toktas A. A novel pixel-split image encryption scheme based on 2D Salomon map. Expert Syst Appl. 2023;213: 118845.","journal-title":"Expert Syst Appl"},{"key":"3991_CR17","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-981-16-1056-1_22","volume-title":"Cognitive informatics and soft computing: proceeding of CISC 2020","author":"Kiran","year":"2021","unstructured":"Kiran, Parameshachari BD, Panduranga HT. Secure transfer of images using pixel-level and bit-level permutation based on knight tour path scan pattern and henon map. In: Cognitive informatics and soft computing: proceeding of CISC 2020. Singapore: Springer; 2021. p. 271\u201383."},{"issue":"3","key":"3991_CR18","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1007\/s11517-021-02499-4","volume":"60","author":"V Manikandan","year":"2022","unstructured":"Manikandan V, Amirtharajan R. A simple embed over encryption scheme for DICOM images using B\u00fclban map. Med Biol Eng Compu. 2022;60(3):701\u201317.","journal-title":"Med Biol Eng Compu"},{"issue":"1","key":"3991_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJeC.304379","volume":"18","author":"P Kiran","year":"2022","unstructured":"Kiran P, Parameshachari BD, Sudheesh KV, Sunil Kumar DS. Resource optimized region based image encryption using Chaotic maps. Int J e-Collab (IJeC). 2022;18(1):1\u201320. https:\/\/doi.org\/10.4018\/IJeC.304379.","journal-title":"Int J e-Collab (IJeC)"},{"issue":"5","key":"3991_CR20","doi-asserted-by":"publisher","first-page":"7323","DOI":"10.1007\/s11042-021-11799-8","volume":"81","author":"P Ping","year":"2022","unstructured":"Ping P, Zhang X, Yang X, Hashems YAA. A novel medical image encryption based on cellular automata with ROI position embedded. Multimed Tools Appl. 2022;81(5):7323\u201343.","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"3991_CR21","doi-asserted-by":"publisher","first-page":"15735","DOI":"10.1007\/s11042-022-13744-9","volume":"82","author":"B Zhang","year":"2023","unstructured":"Zhang B, Rahmatullah B, Wang SL, Liu Z. A plain-image correlative semi-selective medical image encryption algorithm using enhanced 2D-logistic map. Multimed Tools Appl. 2023;82(10):15735\u201362.","journal-title":"Multimed Tools Appl"},{"key":"3991_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2022.127738","volume":"442","author":"Q Lai","year":"2023","unstructured":"Lai Q, Hu G, Erkan U, Toktas A. High-efficiency medical image encryption method based on 2D Logistic-Gaussian hyperchaotic map. Appl Math Comput. 2023;442: 127738.","journal-title":"Appl Math Comput"},{"key":"3991_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2022.105542","volume":"146","author":"Y Zhang","year":"2022","unstructured":"Zhang Y, Xie H, Sun J, Zhang H. An efficient multi-level encryption scheme for stereoscopic medical images based on coupled chaotic system and Otsu threshold segmentation. Comput Biol Med. 2022;146: 105542.","journal-title":"Comput Biol Med"},{"key":"3991_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118924","volume":"213","author":"X Wang","year":"2023","unstructured":"Wang X, Wang Y. Multiple medical image encryption algorithm based on scrambling of region of interest and diffusion of odd-even interleaved points. Expert Syst Appl. 2023;213: 118924.","journal-title":"Expert Syst Appl"},{"key":"3991_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104546","volume":"91","author":"P Kiran","year":"2022","unstructured":"Kiran P, Parameshachari BD. Resource optimized selective image encryption of medical images using multiple chaotic systems. Microprocess Microsyst. 2022;91: 104546.","journal-title":"Microprocess Microsyst"},{"issue":"1","key":"3991_CR26","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/s11042-021-11384-z","volume":"81","author":"KM Hosny","year":"2022","unstructured":"Hosny KM, et al. A color image encryption technique using block scrambling and chaos. Multimed Tools Appl. 2022;81(1):505\u201325.","journal-title":"Multimed Tools Appl"},{"key":"3991_CR27","doi-asserted-by":"crossref","unstructured":"Packirisamy M, Joan S. Muthu, Pradeep MK. An adaptive-selective image encryption with JSMP map and square-wave shuffling. In: machine learning and cryptographic solutions for data protection and network security. IGI Global. 2024. p. 390\u2013424","DOI":"10.4018\/979-8-3693-4159-9.ch024"},{"issue":"1","key":"3991_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s44196-024-00506-8","volume":"17","author":"Z Chen","year":"2024","unstructured":"Chen Z, Liu Y, Ke G, Wang J, Zhao W, Lo S-L. A region-selective anti-compression image encryption algorithm based on deep networks. Int J Comput Intell Syst. 2024;17(1):1\u201321.","journal-title":"Int J Comput Intell Syst"},{"key":"3991_CR29","doi-asserted-by":"crossref","unstructured":"Kawakami J, Dominik Z, Miriam L. Selective encryption of compressed image regions on the edge with reconfigurable hardware. In: 2023 IEEE High Performance Extreme Computing Conference (HPEC). IEEE. 2023. p. 1\u20136","DOI":"10.1109\/HPEC58863.2023.10363592"},{"issue":"10","key":"3991_CR30","doi-asserted-by":"publisher","first-page":"8245","DOI":"10.1016\/j.jksuci.2022.08.007","volume":"34","author":"J Wang","year":"2022","unstructured":"Wang J, Liu L, et al. A novel content-selected image encryption algorithm based on the LS chaotic model. J King Saud Univ Comput Inf Sci. 2022;34(10):8245\u201359.","journal-title":"J King Saud Univ Comput Inf Sci."},{"issue":"4","key":"3991_CR31","doi-asserted-by":"publisher","first-page":"043018","DOI":"10.1117\/1.JEI.32.4.043018","volume":"32","author":"Z Gan","year":"2023","unstructured":"Gan Z, Zhang Y, Huang Z, Chai X, Song Y, He X. Visual security index of selective encrypted images based on multi-directional structure and content-aware features. J Electron Imaging. 2023;32(4):043018\u2013043018.","journal-title":"J Electron Imaging"},{"issue":"5","key":"3991_CR32","doi-asserted-by":"publisher","first-page":"7323","DOI":"10.1007\/s11042-021-11799-8","volume":"81","author":"P Ping","year":"2022","unstructured":"Ping P, Zhang X, et al. A novel medical image encryption based on cellular automata with ROI position embedded. Multimed Tools Appl. 2022;81(5):7323\u201343.","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"3991_CR33","doi-asserted-by":"publisher","first-page":"1031","DOI":"10.3390\/e25071031","volume":"25","author":"C Ye","year":"2023","unstructured":"Ye C, Tan S, Wang Z, Shi B, Shi Li. Hybridized hierarchical watermarking and selective encryption for social image security. Entropy. 2023;25(7):1031.","journal-title":"Entropy"},{"key":"3991_CR34","doi-asserted-by":"publisher","first-page":"37295","DOI":"10.1007\/s11042-023-16889-3","volume":"83","author":"I Obeidat","year":"2024","unstructured":"Obeidat I, Mughaid A, AlZu\u2019bi S, et al. A novel secure cryptography model for data transmission based on Rotor64 technique. Multimed Tools Appl. 2024;83:37295\u2013314. https:\/\/doi.org\/10.1007\/s11042-023-16889-3.","journal-title":"Multimed Tools Appl."},{"key":"3991_CR35","doi-asserted-by":"publisher","first-page":"101547","DOI":"10.1016\/j.imu.2024.101547","volume":"49","author":"SA Nabi","year":"2024","unstructured":"Nabi SA, Ponugoti K, Subhash Chandra N, Smitha L, Naresh K, Absalom Ezugwu E, Abualigah L. Distributed private preserving learning based chaotic encryption framework for cognitive healthcare IoT systems. Inf Med Unlocked. 2024;49:101547.","journal-title":"Inf Med Unlocked."},{"key":"3991_CR36","doi-asserted-by":"publisher","first-page":"41051","DOI":"10.1007\/s11042-023-17221-9","volume":"83","author":"M Otair","year":"2024","unstructured":"Otair M, Abualigah L, Tawfiq S, et al. Adapted arithmetic optimization algorithm for multi-level thresholding image segmentation: a case study of chest x-ray images. Multimed Tools Appl. 2024;83:41051\u201381. https:\/\/doi.org\/10.1007\/s11042-023-17221-9.","journal-title":"Multimed Tools Appl"},{"key":"3991_CR37","doi-asserted-by":"publisher","first-page":"1399","DOI":"10.1007\/s12530-023-09566-1","volume":"15","author":"L Abualigah","year":"2024","unstructured":"Abualigah L, Al-Okbi NK, Awwad EM, et al. Boosted Aquila arithmetic optimization algorithm for multi-level thresholding image segmentation. Evol Syst. 2024;15:1399\u2013426. https:\/\/doi.org\/10.1007\/s12530-023-09566-1.","journal-title":"Evol Syst"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03991-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-03991-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03991-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T08:59:22Z","timestamp":1746435562000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-03991-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,5]]},"references-count":37,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["3991"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-03991-6","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,5]]},"assertion":[{"value":"18 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors. This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research Involving Human and\/or Animals"}},{"value":"Not Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}],"article-number":"444"}}