{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T09:36:19Z","timestamp":1775208979161,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T00:00:00Z","timestamp":1769558400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T00:00:00Z","timestamp":1775174400000},"content-version":"vor","delay-in-days":65,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62562005"],"award-info":[{"award-number":["62562005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Plan Project of Anning District, China","award":["2024-JB-5"],"award-info":[{"award-number":["2024-JB-5"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s44443-026-00479-y","type":"journal-article","created":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T04:44:51Z","timestamp":1769575491000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A dual-mode thumbnail-preserving encryption scheme based on chaotic system and reversible data hiding"],"prefix":"10.1007","volume":"38","author":[{"given":"Dezhi","family":"An","sequence":"first","affiliation":[]},{"given":"Xin","family":"Pu","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Xue","family":"Xia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,28]]},"reference":[{"issue":"2","key":"479_CR1","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s40595-018-0114-z","volume":"5","author":"R Abbasi","year":"2018","unstructured":"Abbasi R, Luo B, Rehman G, Hassan H, Iqbal MS, Xu L (2018) A new multilevel reversible bit-planes data hiding technique based on histogram shifting of efficient compressed domain. Vietnam J Comput Sci 5(2):185\u2013196. https:\/\/doi.org\/10.1007\/s40595-018-0114-z","journal-title":"Vietnam J Comput Sci"},{"key":"479_CR2","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.aej.2022.10.056","volume":"64","author":"M Ali","year":"2023","unstructured":"Ali M, Jung LT, Sodhro AH, Laghari AA, Belhaouari SB, Gillani Z (2023) A confidentiality-based data classification-as-a-service (c2aas) for cloud security. Alexandria Eng J 64:749\u2013760. https:\/\/doi.org\/10.1016\/j.aej.2022.10.056","journal-title":"Alexandria Eng J"},{"issue":"10","key":"479_CR3","doi-asserted-by":"publisher","first-page":"17357","DOI":"10.1109\/JIOT.2024.3357088","volume":"11","author":"D An","year":"2024","unstructured":"An D, Hao D, Lu J, Mou J, Zhao R, Zhang Y (2024) Exploiting size-compatible-match block technique for arbitrary-size thumbnail-preserving encryption. IEEE Int Things J 11(10):17357\u201317371. https:\/\/doi.org\/10.1109\/JIOT.2024.3357088","journal-title":"IEEE Int Things J"},{"issue":"2","key":"479_CR4","doi-asserted-by":"publisher","first-page":"2824","DOI":"10.1109\/TCE.2025.3545959","volume":"71","author":"D An","year":"2025","unstructured":"An D, Pu X, Hao D, Zhao R, Zhang Y (2025) Reversible data hiding with flexible extraction for thumbnail-preserving encryption. IEEE Trans Consumer Electron 71(2):2824\u20132836. https:\/\/doi.org\/10.1109\/TCE.2025.3545959","journal-title":"IEEE Trans Consumer Electron"},{"key":"479_CR5","doi-asserted-by":"publisher","first-page":"140030","DOI":"10.1109\/ACCESS.2019.2943319","volume":"7","author":"S Athar","year":"2019","unstructured":"Athar S, Wang Z (2019) A comprehensive performance evaluation of image quality assessment algorithms. Ieee Access 7:140030\u2013140070. https:\/\/doi.org\/10.1109\/ACCESS.2019.2943319","journal-title":"Ieee Access"},{"key":"479_CR6","doi-asserted-by":"publisher","unstructured":"Bellare M, Ristenpart T, Rogaway P, Stegers T (2009) Format-preserving encryption. In: Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers 16, pp 295\u2013312. https:\/\/doi.org\/10.1007\/978-3-642-05445-7_19","DOI":"10.1007\/978-3-642-05445-7_19"},{"key":"479_CR7","unstructured":"Broz M (2025) Photo statistics: How many photos are taken every day? https:\/\/photutorial.com\/photos-statistics\/"},{"issue":"3","key":"479_CR8","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos, Solitons Fractals 21(3):749\u2013761. https:\/\/doi.org\/10.1016\/j.chaos.2003.12.022","journal-title":"Chaos, Solitons Fractals"},{"key":"479_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3544082","author":"Y Chen","year":"2025","unstructured":"Chen Y, Li Y, Lu Y, Pan Z, Ji YCS, Chen Y, Li Y, Shen Y (2025) Understanding the security risks of websites using cloud storage for direct user file uploads. IEEE Trans Inf Forensics Sec. https:\/\/doi.org\/10.1109\/TIFS.2025.3544082","journal-title":"IEEE Trans Inf Forensics Sec"},{"issue":"1","key":"479_CR10","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/TCE.2024.3412100","volume":"71","author":"K Chowdhury","year":"2024","unstructured":"Chowdhury K, Deb S, Kar N, Sarkar JL, Alkhayyat AH, Nkenyereye L (2024) Pwlm$$\\mu $$-tpe: A visual-usability and privacy-enhanced thumbnail preserving encryption scheme of cloud computing for consumers. IEEE Trans Consumer Electron 71(1):9\u201317. https:\/\/doi.org\/10.1109\/TCE.2024.3412100","journal-title":"IEEE Trans Consumer Electron"},{"key":"479_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2025.104140","volume":"93","author":"A Chowdhury","year":"2025","unstructured":"Chowdhury A, Uddin M, Hassan MR, Billah MM (2025) Image encryption algorithm based on dna sequence-driven key scrambling and secure hashing. J Inf Sec Appl 93:104140. https:\/\/doi.org\/10.1016\/j.jisa.2025.104140","journal-title":"J Inf Sec Appl"},{"key":"479_CR12","doi-asserted-by":"publisher","unstructured":"Deshpande AG, Srinivasan C, Raman R, Rajarajan S, Adhvaryu R (2023) Enhancing cloud security: A deep cryptographic analysis. In: 2023 International conference on advances in computation, communication and information technology (ICAICCIT), pp 1118\u20131123. https:\/\/doi.org\/10.1109\/ICAICCIT60255.2023.10465863","DOI":"10.1109\/ICAICCIT60255.2023.10465863"},{"key":"479_CR13","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.image.2015.10.004","volume":"41","author":"S El Assad","year":"2016","unstructured":"El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Processing Image Commun 41:144\u2013157. https:\/\/doi.org\/10.1016\/j.image.2015.10.004","journal-title":"Signal Processing Image Commun"},{"key":"479_CR14","doi-asserted-by":"publisher","unstructured":"Gandhi S, Kumar R (2025) Survey of reversible data hiding: Statistics, current trends, and future outlook. Comput Standards Interfaces pp 104003. https:\/\/doi.org\/10.1016\/j.csi.2025.104003","DOI":"10.1016\/j.csi.2025.104003"},{"key":"479_CR15","doi-asserted-by":"publisher","unstructured":"Gorantla VAK, Gude V, Sriramulugari SK, Yuvaraj N, Yadav P (2024) Utilizing hybrid cloud strategies to enhance data storage and security in e-commerce applications. In: 2024 2nd international conference on disruptive technologies (ICDT), IEEE, pp 494\u2013499. https:\/\/doi.org\/10.1109\/ICDT61202.2024.10489749","DOI":"10.1109\/ICDT61202.2024.10489749"},{"issue":"1","key":"479_CR16","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1109\/TGCN.2021.3095707","volume":"6","author":"Z Gu","year":"2021","unstructured":"Gu Z, Li H, Khan S, Deng L, Du X, Guizani M, Tian Z (2021) Iepsbp: A cost-efficient image encryption algorithm based on parallel chaotic system for green iot. IEEE Trans Green Commun Netw 6(1):89\u2013106. https:\/\/doi.org\/10.1109\/TGCN.2021.3095707","journal-title":"IEEE Trans Green Commun Netw"},{"key":"479_CR17","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.sigpro.2018.02.002","volume":"148","author":"D Hou","year":"2018","unstructured":"Hou D, Wang H, Zhang W, Yu N (2018) Reversible data hiding in jpeg image based on dct frequency and block selection. Signal Process 148:41\u201347. https:\/\/doi.org\/10.1016\/j.sigpro.2018.02.002","journal-title":"Signal Process"},{"issue":"4","key":"479_CR18","doi-asserted-by":"publisher","first-page":"4505","DOI":"10.1007\/s11071-021-06472-6","volume":"104","author":"Z Hua","year":"2021","unstructured":"Hua Z, Zhu Z, Chen Y, Li Y (2021) Color image encryption using orthogonal latin squares and a new 2d chaotic system. Nonlinear Dyn 104(4):4505\u20134522. https:\/\/doi.org\/10.1007\/s11071-021-06472-6","journal-title":"Nonlinear Dyn"},{"issue":"8","key":"479_CR19","doi-asserted-by":"publisher","first-page":"3328","DOI":"10.1109\/TCSI.2022.3172313","volume":"69","author":"M Ji\u2019e","year":"2022","unstructured":"Ji\u2019e M, Yan D, Sun S, Zhang F, Duan S, Wang L (2022) A simple method for constructing a family of hamiltonian conservative chaotic systems. IEEE Trans Circuits Syst I Regular Papers 69(8):3328\u20133338. https:\/\/doi.org\/10.1109\/TCSI.2022.3172313","journal-title":"IEEE Trans Circuits Syst I Regular Papers"},{"issue":"2","key":"479_CR20","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1109\/TIFS.2015.2489178","volume":"11","author":"A Jolfaei","year":"2015","unstructured":"Jolfaei A, Wu X-W, Muthukkumarasamy V (2015) On the security of permutation-only image encryption schemes. IEEE Trans Inf Forensics Sec 11(2):235\u2013246. https:\/\/doi.org\/10.1109\/TIFS.2015.2489178","journal-title":"IEEE Trans Inf Forensics Sec"},{"key":"479_CR21","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"Y Li","year":"2017","unstructured":"Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Optics Lasers Eng 90:238\u2013246. https:\/\/doi.org\/10.1016\/j.optlaseng.2016.10.020","journal-title":"Optics Lasers Eng"},{"key":"479_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2021.111723","volume":"155","author":"C Li","year":"2022","unstructured":"Li C, Sprott JC, Zhang X, Chai L, Liu Z (2022) Constructing conditional symmetry in symmetric chaotic systems. Chaos, Solitons Fractals 155:111723. https:\/\/doi.org\/10.1016\/j.chaos.2021.111723","journal-title":"Chaos, Solitons Fractals"},{"issue":"6","key":"479_CR23","doi-asserted-by":"publisher","first-page":"5359","DOI":"10.1109\/TDSC.2024.3375369","volume":"21","author":"W Li","year":"2024","unstructured":"Li W, Susilo W, Xia C, Huang L, Guo F, Wang T (2024) Secure data integrity check based on verified public key encryption with equality test for multi-cloud storage. IEEE Trans Dependable Secure Comput 21(6):5359\u20135373. https:\/\/doi.org\/10.1109\/TDSC.2024.3375369","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"6","key":"479_CR24","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.3390\/math11061369","volume":"11","author":"H Lin","year":"2023","unstructured":"Lin H, Wang C, Yu F, Sun J, Du S, Deng Z, Deng Q (2023) A review of chaotic systems based on memristive hopfield neural networks. Mathematics 11(6):1369. https:\/\/doi.org\/10.3390\/math11061369","journal-title":"Mathematics"},{"key":"479_CR25","doi-asserted-by":"publisher","unstructured":"Marohn B, Wright CV, Feng W-c, Rosulek M, Bobba RB (2017) Approximate thumbnail preserving encryption. In: Proceedings of the 2017 on Multimedia Privacy and Security. pp 33\u201343. https:\/\/doi.org\/10.1145\/3137616.3137621","DOI":"10.1145\/3137616.3137621"},{"key":"479_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIM.2025.3529045","volume":"74","author":"MG Martini","year":"2025","unstructured":"Martini MG (2025) Measuring objective image and video quality: On the relationship between ssim and psnr for dct-based compressed images. IEEE Trans Instrumentation Measurement 74:1\u201313. https:\/\/doi.org\/10.1109\/TIM.2025.3529045","journal-title":"IEEE Trans Instrumentation Measurement"},{"key":"479_CR27","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1186\/s13634-025-01255-2","volume":"1","author":"R Murugan","year":"2025","unstructured":"Murugan R, Yazhini K et al (2025) (2025) 5d chaotic map-based image encryption trade-off analysis on various stages of encryption. EURASIP J Adv Signal Process 1:60. https:\/\/doi.org\/10.1186\/s13634-025-01255-2","journal-title":"EURASIP J Adv Signal Process"},{"issue":"3","key":"479_CR28","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni Z, Shi Y-Q, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354\u2013362. https:\/\/doi.org\/10.1109\/TCSVT.2006.869964","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"479_CR29","doi-asserted-by":"publisher","unstructured":"Parlitz U (2016) Estimating lyapunov exponents from time series. Chaos detection and predictability, pp 1\u201334. https:\/\/doi.org\/10.1007\/978-3-662-48410-4_1","DOI":"10.1007\/978-3-662-48410-4_1"},{"issue":"4","key":"479_CR30","doi-asserted-by":"publisher","first-page":"84","DOI":"10.3390\/technologies7040084","volume":"7","author":"EK Petavratzis","year":"2019","unstructured":"Petavratzis EK, Volos CK, Moysis L, Stouboulos IN, Nistazakis HE, Tombras GS, Valavanis KP (2019) An inverse pheromone approach in a chaotic mobile robot\u2019s path planning based on a modified logistic map. Technologies 7(4):84. https:\/\/doi.org\/10.3390\/technologies7040084","journal-title":"Technologies"},{"issue":"7","key":"479_CR31","doi-asserted-by":"publisher","first-page":"3996","DOI":"10.1016\/j.jksuci.2020.10.021","volume":"34","author":"P Prajapati","year":"2022","unstructured":"Prajapati P, Shah P (2022) A review on secure data deduplication: Cloud storage security issue. Journal of King Saud University-Computer and Information Sciences 34(7):3996\u20134007. https:\/\/doi.org\/10.1016\/j.jksuci.2020.10.021","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"479_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124428","volume":"255","author":"BC Preethi","year":"2024","unstructured":"Preethi BC, Vasanthi R, Sugitha G, Lakshmi SA (2024) Intrusion detection and secure data storage in the cloud were recommend by a multiscale deep bidirectional gated recurrent neural network. Expert Syst Appl 255:124428. https:\/\/doi.org\/10.1016\/j.eswa.2024.124428","journal-title":"Expert Syst Appl"},{"issue":"9","key":"479_CR33","doi-asserted-by":"publisher","first-page":"2137","DOI":"10.1109\/TIFS.2018.2812080","volume":"13","author":"M Preishuber","year":"2018","unstructured":"Preishuber M, H\u00fctter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans Inf Forensics Sec 13(9):2137\u20132150. https:\/\/doi.org\/10.1109\/TIFS.2018.2812080","journal-title":"IEEE Trans Inf Forensics Sec"},{"key":"479_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.111926","volume":"157","author":"S Sahoo","year":"2022","unstructured":"Sahoo S, Roy BK (2022) Design of multi-wing chaotic systems with higher largest lyapunov exponent. Chaos, Solitons Fractals 157:111926. https:\/\/doi.org\/10.1016\/j.chaos.2022.111926","journal-title":"Chaos, Solitons Fractals"},{"issue":"3","key":"479_CR35","doi-asserted-by":"publisher","first-page":"8","DOI":"10.4236\/jcc.2019.73002","volume":"7","author":"U Sara","year":"2019","unstructured":"Sara U, Akter M, Uddin MS (2019) Image quality assessment through fsim, ssim, mse and psnr\u2013a comparative study. J Comput Commun 7(3):8\u201318. https:\/\/doi.org\/10.4236\/jcc.2019.73002","journal-title":"J Comput Commun"},{"key":"479_CR36","doi-asserted-by":"publisher","first-page":"166513","DOI":"10.1109\/ACCESS.2020.3023197","volume":"8","author":"S Solak","year":"2020","unstructured":"Solak S (2020) High embedding capacity data hiding technique based on emsd and lsb substitution algorithms. IEEE Access 8:166513\u2013166524. https:\/\/doi.org\/10.1109\/ACCESS.2020.3023197","journal-title":"IEEE Access"},{"issue":"21","key":"479_CR37","doi-asserted-by":"publisher","first-page":"10933","DOI":"10.3390\/app122110933","volume":"12","author":"S Solak","year":"2022","unstructured":"Solak S, Tezcan G (2022) A new dual image based reversible data hiding method using most significant bits and center shifting technique. Appl Sci 12(21):10933. https:\/\/doi.org\/10.3390\/app122110933","journal-title":"Appl Sci"},{"key":"479_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2024.101756","volume":"56","author":"S Solak","year":"2024","unstructured":"Solak S, Abdirashid AM, Adjevi A, Sahu AK (2024) Robust data hiding method based on frequency coefficient variance in repetitive compression. Eng Sci Technol Int J 56:101756. https:\/\/doi.org\/10.1016\/j.jestch.2024.101756","journal-title":"Eng Sci Technol Int J"},{"key":"479_CR39","doi-asserted-by":"publisher","unstructured":"Somaraj S, Hussain MA (2015) Performance and security analysis for image encryption using key image. Indian J Sci Technol 8(35):1. https:\/\/doi.org\/10.17485\/ijst\/2015\/v8i35\/73141","DOI":"10.17485\/ijst\/2015\/v8i35\/73141"},{"key":"479_CR40","doi-asserted-by":"publisher","unstructured":"Tajik K, Gunasekaran A, Dutta R, Ellis B, Bobba RB, Rosulek M, Wright CV, Feng W-c (2019) Balancing image privacy and usability with thumbnail-preserving encryption. Proc Symp Netw Distrib Syst Secur. https:\/\/doi.org\/10.14722\/ndss.2019.23432","DOI":"10.14722\/ndss.2019.23432"},{"key":"479_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.125050","volume":"257","author":"T Umar","year":"2024","unstructured":"Umar T, Nadeem M, Anwer F (2024) Chaos based image encryption scheme to secure sensitive multimedia content in cloud storage. Expert Syst Appl 257:125050. https:\/\/doi.org\/10.1016\/j.eswa.2024.125050","journal-title":"Expert Syst Appl"},{"key":"479_CR42","doi-asserted-by":"publisher","unstructured":"Wang Z, Ahmadi A, Tian H, Jafari S, Chen G (2023) Lower-dimensional simple chaotic systems with spectacular features. Chaos, Solitons Fractals 169:113299. https:\/\/doi.org\/10.1016\/j.chaos.2023.113299","DOI":"10.1016\/j.chaos.2023.113299"},{"key":"479_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121514","volume":"237","author":"H Wen","year":"2024","unstructured":"Wen H, Lin Y (2024) Cryptanalysis of an image encryption algorithm using quantum chaotic map and dna coding. Expert Syst Appl 237:121514. https:\/\/doi.org\/10.1016\/j.eswa.2023.121514","journal-title":"Expert Syst Appl"},{"issue":"22","key":"479_CR44","doi-asserted-by":"publisher","first-page":"1994","DOI":"10.1080\/02640414.2024.2308441","volume":"41","author":"L Winter","year":"2023","unstructured":"Winter L, Taylor P, Bellenger C, Grimshaw P, Crowther RG (2023) The application of the lyapunov exponent to analyse human performance: A systematic review. J Sports Sci 41(22):1994\u20132013. https:\/\/doi.org\/10.1080\/02640414.2024.2308441","journal-title":"J Sports Sci"},{"key":"479_CR45","doi-asserted-by":"publisher","unstructured":"Wright CV, Feng W-c, Liu F (2015) Thumbnail-preserving encryption for JPEG. In: Proceedings of the 3rd ACM workshop on information hiding and multimedia security. pp 141\u2013146. https:\/\/doi.org\/10.1145\/2756601.2756618","DOI":"10.1145\/2756601.2756618"},{"issue":"36","key":"479_CR46","doi-asserted-by":"publisher","first-page":"84161","DOI":"10.1007\/s11042-024-19137-4","volume":"83","author":"S Xu","year":"2024","unstructured":"Xu S, Chang C-C, Horng J-H (2024) Data hiding with thumbnail-preserving encryption for cloud medical images. Multimed Tools Appl 83(36):84161\u201384177. https:\/\/doi.org\/10.1007\/s11042-024-19137-4","journal-title":"Multimed Tools Appl"},{"key":"479_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2022.103589","volume":"87","author":"X Ye","year":"2022","unstructured":"Ye X, Zhang Y, Zhao R, Lan R, Xiang Y (2022) Pra-tpe: Perfectly recoverable approximate thumbnail-preserving image encryption. J Visual Commun Image Representation 87:103589. https:\/\/doi.org\/10.1016\/j.jvcir.2022.103589","journal-title":"J Visual Commun Image Representation"},{"key":"479_CR48","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1109\/LSP.2023.3290836","volume":"30","author":"X Ye","year":"2023","unstructured":"Ye X, Zhang Y, Xiao X, Yi S, Lan R (2023) Usability enhanced thumbnail-preserving encryption based on data hiding for jpeg images. IEEE Signal Process Lett 30:793\u2013797. https:\/\/doi.org\/10.1109\/LSP.2023.3290836","journal-title":"IEEE Signal Process Lett"},{"issue":"5","key":"479_CR49","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1109\/TIFS.2016.2636090","volume":"12","author":"J Yu","year":"2016","unstructured":"Yu J, Zhang B, Kuang Z, Lin D, Fan J (2016) iprivacy: image privacy protection by identifying sensitive objects via deep multi-task learning. IEEE Trans Inf Forensi Sec 12(5):1005\u20131016. https:\/\/doi.org\/10.1109\/TIFS.2016.2636090","journal-title":"IEEE Trans Inf Forensi Sec"},{"issue":"3","key":"479_CR50","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1109\/TCSVT.2021.3070348","volume":"32","author":"Y Zhang","year":"2021","unstructured":"Zhang Y, Zhao R, Xiao X, Lan R, Liu Z, Zhang X (2021) Hf-tpe: High-fidelity thumbnail-preserving encryption. IEEE Trans Circuits Syst Video Technol 32(3):947\u2013961. https:\/\/doi.org\/10.1109\/TCSVT.2021.3070348","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"6","key":"479_CR51","doi-asserted-by":"publisher","first-page":"2993","DOI":"10.1016\/j.jksuci.2022.04.001","volume":"34","author":"Y Zhang","year":"2022","unstructured":"Zhang Y, Zhao R, Zhang Y, Lan R, Chai X (2022) High-efficiency and visual-usability image encryption based on thumbnail preserving and chaotic system. J King Saud University-Comput Inf Sci 34(6):2993\u20133010. https:\/\/doi.org\/10.1016\/j.jksuci.2022.04.001","journal-title":"J King Saud University-Comput Inf Sci"},{"issue":"9","key":"479_CR52","doi-asserted-by":"publisher","first-page":"9346","DOI":"10.1109\/TIE.2022.3206747","volume":"70","author":"Y Zhang","year":"2023","unstructured":"Zhang Y, Bao H, Hua Z, Huang H (2023) Two-dimensional exponential chaotic system with hardware implementation. IEEE Trans Industrial Electron 70(9):9346\u20139356. https:\/\/doi.org\/10.1109\/TIE.2022.3206747","journal-title":"IEEE Trans Industrial Electron"},{"key":"479_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2021.108019","volume":"183","author":"R Zhao","year":"2021","unstructured":"Zhao R, Zhang Y, Xiao X, Ye X, Lan R (2021) Tpe2: Three-pixel exact thumbnail-preserving image encryption. Signal Process 183:108019. https:\/\/doi.org\/10.1016\/j.sigpro.2021.108019","journal-title":"Signal Process"},{"issue":"1","key":"479_CR54","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/TBDATA.2024.3375155","volume":"11","author":"R Zhao","year":"2025","unstructured":"Zhao R, Zhang Y, Wen W, Zhang X, Cao X, Xiang Y (2025) Pr3: Reversible and usability-enhanced visual privacy protection via thumbnail preservation and data hiding. IEEE Trans Big Data 11(1):59\u201373. https:\/\/doi.org\/10.1109\/TBDATA.2024.3375155","journal-title":"IEEE Trans Big Data"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-026-00479-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-026-00479-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-026-00479-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T08:41:12Z","timestamp":1775205672000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-026-00479-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,28]]},"references-count":54,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["479"],"URL":"https:\/\/doi.org\/10.1007\/s44443-026-00479-y","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"value":"1319-1578","type":"print"},{"value":"2213-1248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,28]]},"assertion":[{"value":"1 December 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"96"}}