{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T15:49:20Z","timestamp":1775922560830,"version":"3.50.1"},"reference-count":40,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.jisa.2026.104434","type":"journal-article","created":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T09:31:53Z","timestamp":1773135113000},"page":"104434","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Facial image encryption algorithm based on feature recognition and chaotic scrambling"],"prefix":"10.1016","volume":"99","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-1944-5647","authenticated-orcid":false,"given":"Mingyang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhida","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Xiaopeng","family":"Yan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2026.104434_bib0001","doi-asserted-by":"crossref","DOI":"10.1016\/j.imavis.2023.104688","article-title":"Synthetic data for face recognition: current state and future prospects[J]","volume":"135","author":"Boutros","year":"2023","journal-title":"Image Vis. Comput."},{"issue":"14","key":"10.1016\/j.jisa.2026.104434_bib0002","doi-asserted-by":"crossref","first-page":"21983","DOI":"10.1007\/s11042-021-10526-7","article-title":"A DNA image encryption based on a new hyperchaotic system[J]","volume":"82","author":"Hui","year":"2023","journal-title":"Multimed. Tools. Appl."},{"issue":"3","key":"10.1016\/j.jisa.2026.104434_bib0003","doi-asserted-by":"crossref","DOI":"10.1007\/s11704-022-1419-8","article-title":"Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform[J]","volume":"17","author":"Huang","year":"2023","journal-title":"Front. Comput. Sci."},{"key":"10.1016\/j.jisa.2026.104434_bib0004","doi-asserted-by":"crossref","DOI":"10.1016\/j.optcom.2021.126976","article-title":"A visually secure image encryption scheme based on 2D compressive sensing and integer wavelet transform embedding[J]","volume":"492","author":"Huo","year":"2021","journal-title":"Opt. Commun."},{"issue":"8","key":"10.1016\/j.jisa.2026.104434_bib0005","doi-asserted-by":"crossref","first-page":"1178","DOI":"10.3390\/e25081178","article-title":"An image encryption algorithm based on improved hilbert curve scrambling and dynamic DNA coding[J]","volume":"25","author":"Geng","year":"2023","journal-title":"Entropy"},{"issue":"8","key":"10.1016\/j.jisa.2026.104434_bib0006","doi-asserted-by":"crossref","first-page":"1469","DOI":"10.1109\/TMM.2016.2569497","article-title":"Reversible data hiding in encrypted images by reversible image transformation[J]","volume":"18","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Multimed."},{"key":"10.1016\/j.jisa.2026.104434_bib0007","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2019.107288","article-title":"Reversible data hiding in encrypted images using adaptive reversible integer transformation[J]","volume":"167","author":"Qiu","year":"2020","journal-title":"Signal Process."},{"key":"10.1016\/j.jisa.2026.104434_bib0008","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.matcom.2025.05.017","article-title":"Reversible adaptive chaotic multi-image privacy protection scheme for efficient batch encryption of various images","volume":"238","author":"Jiang","year":"2025","journal-title":"Math. Comput. Simul."},{"key":"10.1016\/j.jisa.2026.104434_bib0009","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2025.111017","article-title":"Multidimensional chaotic signals generation using deep learning and its application in image encryption","volume":"156","author":"Zhou","year":"2025","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"1","key":"10.1016\/j.jisa.2026.104434_bib0010","doi-asserted-by":"crossref","first-page":"1211","DOI":"10.1038\/s41598-024-84186-6","article-title":"Deep learning-based encryption scheme for medical images using DCGAN and virtual planet domain","volume":"15","author":"Kumar","year":"2025","journal-title":"Sci. Rep."},{"issue":"4","key":"10.1016\/j.jisa.2026.104434_bib0011","doi-asserted-by":"crossref","first-page":"3829","DOI":"10.1007\/s11071-024-10403-6","article-title":"Quantum image encryption algorithm based on 3D-BNM chaotic map","volume":"113","author":"Verma","year":"2025","journal-title":"Nonlinear. Dyn."},{"issue":"5","key":"10.1016\/j.jisa.2026.104434_bib0012","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s11128-025-04752-3","article-title":"An efficient ESOP minimization-based quantum image encryption scheme using chaotic quantum substitution and permutation boxes","volume":"24","author":"Kumar","year":"2025","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"10.1016\/j.jisa.2026.104434_bib0013","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s10586-024-04743-6","article-title":"Quantum image encryption protocol for secure communication in healthcare networks[J]","volume":"28","author":"Prajapat","year":"2025","journal-title":"Clust. Comput."},{"issue":"8","key":"10.1016\/j.jisa.2026.104434_bib0014","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1007\/s11128-023-04071-5","article-title":"Optimal quantum image encryption algorithm with the QPSO-BP neural network-based pseudo random number generator[J]","volume":"22","author":"Dai","year":"2023","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"10.1016\/j.jisa.2026.104434_bib0015","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/s11831-018-9298-8","article-title":"A comprehensive review on image encryption techniques","volume":"27","author":"Kaur","year":"2020","journal-title":"Arch. Comput. Methods Eng."},{"key":"10.1016\/j.jisa.2026.104434_bib0016","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1016\/j.ins.2021.06.032","article-title":"A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT","volume":"574","author":"Wang","year":"2021","journal-title":"Inf. Sci. (Ny)"},{"issue":"3","key":"10.1016\/j.jisa.2026.104434_bib0017","doi-asserted-by":"crossref","first-page":"341","DOI":"10.3390\/e23030341","article-title":"A new algorithm for digital image encryption based on chaos theory","volume":"23","author":"Pourasad","year":"2021","journal-title":"Entropy"},{"issue":"1","key":"10.1016\/j.jisa.2026.104434_bib0018","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1007\/s11071-021-07192-7","article-title":"A fast and efficient multiple images encryption based on single-channel encryption and chaotic system","volume":"108","author":"Gao","year":"2022","journal-title":"Nonlinear. Dyn."},{"issue":"3","key":"10.1016\/j.jisa.2026.104434_bib0019","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/7384.963463","article-title":"Chaos-based cryptography: a brief overview[J]","volume":"1","author":"Kocarev","year":"2002","journal-title":"IEEE Circuits Syst. Mag."},{"key":"10.1016\/j.jisa.2026.104434_bib0020","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.124316","article-title":"A novel chaotic map application in image encryption algorithm[J]","volume":"252","author":"Li","year":"2024","journal-title":"Expert. Syst. Appl."},{"key":"10.1016\/j.jisa.2026.104434_bib0021","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2025.110624","article-title":"Extraction and encryption of facial information for government personnel: STP-CS with tri-color shuffling scheme[J]","volume":"127","author":"Tan","year":"2025","journal-title":"Comput. Electr. Eng."},{"issue":"16","key":"10.1016\/j.jisa.2026.104434_bib0022","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11227-025-07992-3","article-title":"Color image encryption scheme based on 2D chaotic mapping and circular shifting.\"[J]","volume":"81","author":"Hu","year":"2025","journal-title":"J. Supercomput."},{"key":"10.1016\/j.jisa.2026.104434_bib0023","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2024.115587","article-title":"Multiple-image encryption algorithm based on a new composite chaotic system and 3D coordinate matrix[J]","volume":"189","author":"Gao","year":"2024","journal-title":"Chaos Solit. Fractals"},{"key":"10.1016\/j.jisa.2026.104434_bib0024","series-title":"Seventh International Conference on Image Processing and Machine Vision","first-page":"132","article-title":"A novel 3-D chaotic map-based image encryption","volume":"13636","author":"Choe","year":"2025"},{"key":"10.1016\/j.jisa.2026.104434_bib0025","series-title":"2025 8th International Conference on Computer Information Science and Application Technology (CISAT)","first-page":"1263","article-title":"Medical image encryption based on four-dimensional chaotic system and DNA coding","author":"Ge","year":"2025"},{"key":"10.1016\/j.jisa.2026.104434_bib0026","doi-asserted-by":"crossref","first-page":"2743","DOI":"10.1140\/epjs\/s11734-024-01440-8","article-title":"A novel memristor-coupled discrete neural network with multi-stability and multiple state transitions[J]","volume":"234","author":"Shi","year":"2025","journal-title":"Eur. Phys. J. Spec. Top."},{"issue":"1","key":"10.1016\/j.jisa.2026.104434_bib0027","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-025-14784-5","article-title":"A high-entropy image encryption scheme using optimized chaotic maps with Josephus permutation strategy[J]","volume":"15","author":"Ghouate","year":"2025","journal-title":"Sci. Rep."},{"issue":"1","key":"10.1016\/j.jisa.2026.104434_bib0028","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s10489-024-05918-9","article-title":"Novel discrete initial-boosted Tabu learning neuron: dynamical analysis, DSP implementation, and batch medical image encryption[J]","volume":"55","author":"Zhang","year":"2025","journal-title":"Appl. Intell."},{"issue":"1","key":"10.1016\/j.jisa.2026.104434_bib0029","article-title":"A visual security multi-key selection image encryption algorithm based on a new four-dimensional chaos and compressed sensing[J]","volume":"14","author":"Zhu","year":"2024","journal-title":"Sci. Rep."},{"issue":"11","key":"10.1016\/j.jisa.2026.104434_bib0030","doi-asserted-by":"crossref","first-page":"31603","DOI":"10.1007\/s11042-023-16787-8","article-title":"Image encryption algorithm based on face recognition, facial features recognition and bitonic sequence[J]","volume":"83","author":"Wang","year":"2024","journal-title":"Multimed. Tools. Appl."},{"key":"10.1016\/j.jisa.2026.104434_bib0031","doi-asserted-by":"crossref","first-page":"2573","DOI":"10.1109\/ACCESS.2023.3347448","article-title":"Dynamic analysis of a four-wing chaotic system and application in image encryption based on compressive sensing[J]","volume":"12","author":"Zhang","year":"2023","journal-title":"IEEe Access."},{"issue":"7","key":"10.1016\/j.jisa.2026.104434_bib0032","doi-asserted-by":"crossref","first-page":"6522","DOI":"10.1109\/TCSVT.2025.3543824","article-title":"Deepface-based chaotic image encryption using key optimization and semi-tensor product theory","volume":"35","author":"Ding","year":"2025","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"1","key":"10.1016\/j.jisa.2026.104434_bib0033","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1007\/s11071-022-07630-0","article-title":"Hyperchaotic memristive ring neural network and application in medical image encryption[J]","volume":"110","author":"Lin","year":"2022","journal-title":"Nonlinear. Dyn."},{"key":"10.1016\/j.jisa.2026.104434_bib0034","first-page":"6522","article-title":"4D Memristive hyperchaotic system for secure image encryption using non-associative algebraic-chaotic sequences[J]","volume":"7","author":"Anwar","year":"2025","journal-title":"IEEe Access."},{"issue":"4","key":"10.1016\/j.jisa.2026.104434_bib0035","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/s10462-024-10719-0","article-title":"A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm","volume":"57","author":"Kumar","year":"2024","journal-title":"Artif. Intell. Rev."},{"issue":"8","key":"10.1016\/j.jisa.2026.104434_bib0036","doi-asserted-by":"crossref","first-page":"7628","DOI":"10.1109\/TCSVT.2024.3375868","article-title":"Exploiting four-dimensional chaotic systems with dissipation and optimized logical operations for secure image compression and encryption","volume":"34","author":"Gong","year":"2024","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.jisa.2026.104434_bib0037","series-title":"2024 3rd International Conference on Image Processing and Media Computing (ICIPMC)","first-page":"199","article-title":"A novel color image encryption scheme based on fractional-order chaotic system","author":"Liu","year":"2024"},{"key":"10.1016\/j.jisa.2026.104434_bib0038","doi-asserted-by":"crossref","first-page":"795","DOI":"10.3390\/fractalfract7110795","article-title":"A color image-encryption algorithm using extended DNA coding and zig-zag transform based on a fractional-order laser system","volume":"7","author":"Meng","year":"2023","journal-title":"Fractal Fract."},{"key":"10.1016\/j.jisa.2026.104434_bib0039","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.121514","article-title":"Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding","volume":"237","author":"Wen","year":"2024","journal-title":"Expert. Syst. Appl."},{"issue":"4","key":"10.1016\/j.jisa.2026.104434_bib0040","doi-asserted-by":"crossref","first-page":"1535","DOI":"10.1016\/j.jksuci.2022.01.017","article-title":"An effective multiple-image encryption algorithm based on 3D cube and hyperchaotic map[J]","volume":"34","author":"Gao","year":"2022","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000645?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000645?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T15:26:57Z","timestamp":1775921217000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212626000645"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":40,"alternative-id":["S2214212626000645"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104434","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Facial image encryption algorithm based on feature recognition and chaotic scrambling","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104434","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104434"}}