{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T04:48:16Z","timestamp":1773550096215,"version":"3.50.1"},"reference-count":59,"publisher":"Association for Computing Machinery (ACM)","issue":"3","funder":[{"name":"Basic Scientific Research Projects in the Department of Education of Liaoning Province","award":["LJ212410152011"],"award-info":[{"award-number":["LJ212410152011"]}]},{"name":"Doctoral Research Startup Fund Program Project of Liaoning Province","award":["2025-BS-0471"],"award-info":[{"award-number":["2025-BS-0471"]}]},{"name":"Research Startup Fund Project for Introducing Talents of Dalian Polytechnic University","award":["LJBKY2025070"],"award-info":[{"award-number":["LJBKY2025070"]}]},{"name":"Basic Scientific Research Projects in the Department of Education of Liaoning Province","award":["LJ212410152049"],"award-info":[{"award-number":["LJ212410152049"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62571079"],"award-info":[{"award-number":["62571079"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2026,3,31]]},"abstract":"<jats:p>In the digital age, surveillance videos face severe security threats during transmission. Chaotic systems are often used for encrypted transmission due to their sensitivity to initial conditions and unpredictability. However, existing chaotic encryption schemes are at risk of core information leakage, lack adaptive detection of targets, and are inefficient. To address these issues, this article proposes a lightweight video secondary-encryption scheme integrating YOLOv11 and a Discrete Bi-Neuron Hopfield Neural Network (DBHNN). The YOLOv11 model is used to detect sensitive objects in the video, enabling the scheme to further protect sensitive information. The hyperchaotic sequences generated by DBHNN are used for lightweight secondary-encryption: the point-to-point confusion for target detection objects. Subsequently, enhanced alternating confusion and diffusion are applied to encrypt all frames. The proposed scheme can process batch frames and perform secondary encryption on sensitive objects to enhance security. The simulations and tests show that the proposed lightweight encryption scheme has an encryption speed that is more than 5% better than other schemes, and YOLOv11 is also superior to other models in terms of accuracy and efficiency.<\/jats:p>","DOI":"10.1145\/3785483","type":"journal-article","created":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T16:01:57Z","timestamp":1766073717000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight Video Secondary-Encryption Scheme Based on YOLOv11 and a Discrete Model of Bi-Neuron HNN"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-7468-0637","authenticated-orcid":false,"given":"Jiaqi","family":"Liu","sequence":"first","affiliation":[{"name":"School of Information Science and Engineering, Dalian Polytechnic University, Dalian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5136-0469","authenticated-orcid":false,"given":"Xian-Ying","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Dalian Polytechnic University, Dalian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5790-7429","authenticated-orcid":false,"given":"Suo","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Dalian Polytechnic University, Dalian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4745-8361","authenticated-orcid":false,"given":"Junxin","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Software, Dalian University of Technology, Dalian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7774-2833","authenticated-orcid":false,"given":"Jun","family":"Mou","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Dalian Polytechnic University, Dalian, China"}]}],"member":"320","published-online":{"date-parts":[[2026,2,27]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2022.3228679"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.3390\/e27030276"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-025-04014-4"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-16629-7"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.115521"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2024.3395631"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2025.100816"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.115496"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ad5f5e"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cjph.2025.10.010"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127417500213"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2022.3151802"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3482289"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1186\/s44147-024-00376-z"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-41082-9"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.120420"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11517-023-02925-9"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3246520"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1364\/OL.566608"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.3390\/fractalfract9070426"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2025.117674"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3583752"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-025-11287-2"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3223930"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1088\/2040-8986\/adbcc2"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41928-020-0436-6"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2024.3382259"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cjph.2024.07.035"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2025.3603570"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-024-10368-6"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3596320"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-024-09790-7"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3429349"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2023.3261747"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2025.107511"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116014"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.04.028"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-60596-4"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-023-08450-y"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2022.107442"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-025-07520-3"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-025-01708-9"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3584313"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1007\/s44443-025-00116-0"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-11201-9"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2020.102907"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-024-09292-6"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ad3698"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ad9d8b"},{"issue":"2","key":"e_1_3_1_51_2","first-page":"31","article-title":"NPCR and UACI randomness tests for image encryption","volume":"1","author":"Wu Yue","year":"2011","unstructured":"Yue Wu, Joseph P. Noonan, and Sos Agaian. 2011. NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary, Journals in Science and Technology, Journal of Selected Areas in Telecommunications 1, 2 (2011), 31\u201338.","journal-title":"Cyber Journals: Multidisciplinary, Journals in Science and Technology, Journal of Selected Areas in Telecommunications"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.34028\/iajit\/21\/5\/12"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.3390\/e25081147"},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124891"},{"key":"e_1_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123190"},{"key":"e_1_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ad0710"},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2025.3536219"},{"key":"e_1_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2025.113804"},{"key":"e_1_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2025.105469"},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0327546"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3785483","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T03:48:33Z","timestamp":1773546513000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3785483"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,27]]},"references-count":59,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,3,31]]}},"alternative-id":["10.1145\/3785483"],"URL":"https:\/\/doi.org\/10.1145\/3785483","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,27]]},"assertion":[{"value":"2025-08-07","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-12-07","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-02-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}