{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:15:56Z","timestamp":1760141756829,"version":"build-2065373602"},"reference-count":52,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T00:00:00Z","timestamp":1759190400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.mdpi.com"],"crossmark-restriction":true},"short-container-title":["BDCC"],"abstract":"<jats:p>Homomorphic encryption is well known to researchers, yet its application in image processing is scarce. The diversity of image processing algorithms makes homomorphic encryption implementation challenging. Current research often uses the CKKS algorithm, but it has core bottlenecks in image encryption, such as the mismatch between image data and the homomorphic operation mechanism, high 2D-structure-induced costs, noise-related visual quality damage, and poor nonlinear operational support. This study, based on image pixel characteristics, analyzes homomorphic encryption via pixel scrambling algorithms. Using magic square, Arnold, Henon map, and Hilbert curve transformations as starting points, it reveals their homomorphic properties in image processing. This further explores general pixel scrambling algorithm homomorphic encryption properties, offering valuable insights for homomorphic encryption applications in image processing.<\/jats:p>","DOI":"10.3390\/bdcc9100250","type":"journal-article","created":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T15:38:55Z","timestamp":1759246735000},"page":"250","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploring the Application and Characteristics of Homomorphic Encryption Based on Pixel Scrambling Algorithm in Image Processing"],"prefix":"10.3390","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-3268-918X","authenticated-orcid":false,"given":"Tieyu","family":"Zhao","sequence":"first","affiliation":[{"name":"School of Mathematics and Statistics, Northeastern University at Qinhuangdao, Qinhuangdao 066004, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,9,30]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1177\/1461444816660731","article-title":"Social media cultivating perceptions of privacy: A 5-year analysis of privacy attitudes and self-disclosure behaviors among Facebook users","volume":"20","author":"Shanahan","year":"2018","journal-title":"New Media Soc."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"11","DOI":"10.31703\/gmmr.2020(III-I).02","article-title":"Impact of Social Networking Sites on Human Basic Privacy Rights","volume":"3","author":"Nazeer","year":"2020","journal-title":"Glob. Multimed. Rev."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1146\/annurev-biodatasci-120423-120107","article-title":"Privacy-enhancing technologies in biomedical data science","volume":"7","author":"Cho","year":"2024","journal-title":"Annu. Rev. Biomed. Data Sci."},{"key":"ref_4","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"Rivest","year":"1978","journal-title":"Found. Secur. Comput."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"31","author":"ElGamal","year":"1985","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1004","DOI":"10.1139\/t98-056","article-title":"Shape of ground surface settlement profiles caused by excavation","volume":"35","author":"Hsieh","year":"1998","journal-title":"Can. Geotech. J."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1107\/S0907444998003254","article-title":"Crystallography & NMR system: A new software suite for macromolecular structure determination","volume":"54","author":"Adams","year":"1998","journal-title":"Biol. Crystallogr."},{"key":"ref_9","unstructured":"Paillier, P. (2025, January 3\u20134). Public-key cryptosystems based on composite degree residuosity classes. Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1109\/TIP.2005.859383","article-title":"Fingerprinting protocol for images based on additive homomorphic property","volume":"14","author":"Kuribayashi","year":"2005","journal-title":"IEEE Trans. Image Process."},{"key":"ref_11","unstructured":"Gentry, C. (2009). A Fully Homomorphic Encryption Scheme, Stanford University."},{"key":"ref_12","unstructured":"Van Dijk, M., Gentry, C., Halevi, S., and Vaikuntanathan, V. (June, January 30). Fully Homomorphic Encryption over the Integers. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Riviera, French."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1137\/120868669","article-title":"Efficient fully homomorphic encryption from (standard) LWE","volume":"43","author":"Brakerski","year":"2014","journal-title":"SIAM J. Comput."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2633600","article-title":"(Leveled) fully homomorphic encryption without bootstrapping","volume":"6","author":"Brakerski","year":"2014","journal-title":"ACM Trans. Comput. Theory"},{"key":"ref_15","first-page":"144","article-title":"Somewhat practical fully homomorphic encryption","volume":"2012","author":"Fan","year":"2012","journal-title":"Cryptol. Eprint Arch."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Gentry, C., Sahai, A., and Waters, B. (2013, January 18\u201322). Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based. Proceedings of the Annual Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Chillotti, I., Gama, N., Georgieva, M., and Izabachene, M. (2016, January 4\u20138). Faster fully homomorphic encryption: Bootstrapping in less than 0.1 seconds. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam.","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Chillotti, I., Gama, N., Georgieva, M., and Izabach\u00e8ne, M. (2017, January 3\u20137). Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Hong Kong, China.","DOI":"10.1007\/978-3-319-70694-8_14"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Cheon, J.H., Kim, A., Kim, M., and Song, Y. (2017, January 3\u20137). Homomorphic encryption for arithmetic of approximate numbers. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Hong Kong, China.","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1568318.1568324","article-title":"On lattices, learning with errors, random linear codes, and cryptography","volume":"56","author":"Regev","year":"2009","journal-title":"J. ACM"},{"key":"ref_21","unstructured":"Lyubashevsky, V., Peikert, C., and Regev, O. (June, January 30). On ideal lattices and learning with errors over rings. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Riviera, French."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Ducas, L., and Micciancio, D. (2015, January 26\u201330). FHEW: Bootstrapping homomorphic encryption in less than a second. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria.","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3124441","article-title":"A survey on fully homomorphic encryption: An engineering perspective","volume":"50","author":"Martins","year":"2017","journal-title":"ACM Comput. Surv."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3214303","article-title":"A survey on homomorphic encryption schemes: Theory and implementation","volume":"51","author":"Acar","year":"2018","journal-title":"ACM Comput. Surv."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/s00145-019-09319-x","article-title":"TFHE: Fast fully homomorphic encryption over the torus","volume":"33","author":"Chillotti","year":"2020","journal-title":"J. Cryptol."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Al Badawi, A., Bates, J., Bergamaschi, F., Cousins, D.B., Erabelli, S., Genise, N., Halevi, S., Hunt, H., Kim, A., and Lee, Y. (2022, January 7). Openfhe: Open-source fully homomorphic encryption library. Proceedings of the 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, Los Angeles, CA, USA.","DOI":"10.1145\/3560827.3563379"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1572","DOI":"10.1109\/JPROC.2022.3205665","article-title":"Survey on fully homomorphic encryption, theory, and applications","volume":"110","author":"Marcolla","year":"2022","journal-title":"Proc. IEEE"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"3759","DOI":"10.1007\/s40747-022-00756-z","article-title":"A systematic review of homomorphic encryption and its contributions in healthcare industry","volume":"9","author":"Munjal","year":"2023","journal-title":"Complex Intell. Syst."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"24569","DOI":"10.1109\/JIOT.2024.3382875","article-title":"Efficiency optimization techniques in privacy-preserving federated learning with homomorphic encryption: A brief survey","volume":"11","author":"Xie","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"100689","DOI":"10.1016\/j.cosrev.2024.100689","article-title":"From accuracy to approximation: A survey on approximate homomorphic encryption and its applications","volume":"55","author":"Liu","year":"2025","journal-title":"Comput. Sci. Rev."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Yang, P., Gui, X., An, J., Tian, F., and Wang, J. (May, January 26). An encrypted image editing scheme based on homomorphic encryption. Proceedings of the 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Hong Kong, China.","DOI":"10.1109\/INFCOMW.2015.7179367"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Challa, R., and VijayaKumari, G. (2015, January 5\u20137). Secure image processing using LWE based homomorphic encryption. Proceedings of the 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), Tamil Nadu, India.","DOI":"10.1109\/ICECCT.2015.7226064"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"7695751","DOI":"10.1155\/2017\/7695751","article-title":"An efficient secret key homomorphic encryption used in image processing service","volume":"2017","author":"Yang","year":"2017","journal-title":"Secur. Commun. Netw."},{"key":"ref_34","unstructured":"Wang, C., Yang, S., Sun, X., Dai, J., and Zhao, D. (2024). Enabling practical and privacy-preserving image processing. arXiv."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"40607","DOI":"10.1007\/s11042-023-17242-4","article-title":"Reversible data hiding scheme in encrypted images based on homomorphic encryption and pixel value ordering","volume":"83","author":"Ren","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Mertens, A., Nicolas, G., and Rovira, S. (2025, January 21\u201323). Convolution-Friendly Image Compression with FHE. Proceedings of the International Conference on Cryptology in Africa, Rabat, Morocco.","DOI":"10.1007\/978-3-031-97260-7_1"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Satriawan, A., Mareta, R., and Lee, H. (2025, January 25\u201328). Exploring Possibilities of BFV-based Homomorphic Encryption for Privacy-Preserving Image Processing. Proceedings of the 2025 IEEE International Symposium on Circuits and Systems (ISCAS), London, UK.","DOI":"10.1109\/ISCAS56072.2025.11044185"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"2450025","DOI":"10.1142\/S0129065724500254","article-title":"Encrypted image classification with low memory footprint using fully homomorphic encryption","volume":"34","author":"Rovida","year":"2024","journal-title":"Int. J. Neural Syst."},{"key":"ref_39","unstructured":"Dutta, S., Karanth, P.P., Xavier, P.M., de Freitas, I.L., Innan, N., Yahia, S.B., Shafique, M., and Neira, D.E.B. (2024). Federated learning with quantum computing and fully homomorphic encryption: A novel computing paradigm shift in privacy-preserving ml. arXiv."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3676955","article-title":"Sok: Fully homomorphic encryption accelerators","volume":"56","author":"Zhang","year":"2024","journal-title":"ACM Comput. Surv."},{"key":"ref_41","unstructured":"Ebel, A., Garimella, K., and Reagen, B. (April, January 30). Orion: A Fully Homomorphic Encryption Framework for Deep Learning. Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2, New York, NY, USA."},{"key":"ref_42","first-page":"2024012","article-title":"Recent advances of privacy-preserving machine learning based on (Fully) Homomorphic Encryption","volume":"4","author":"Cheng","year":"2025","journal-title":"Secur. Saf."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communication theory of secrecy systems","volume":"28","author":"Shannon","year":"1949","journal-title":"Bell Syst. Tech. J."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1142\/S0129183198000443","article-title":"Number of magic squares from parallel tempering Monte Carlo","volume":"9","author":"Pinn","year":"1998","journal-title":"Int. J. Mod. Phys. C"},{"key":"ref_45","first-page":"1202","article-title":"A new algorithm based on magic square and a novel chaotic system for image encryption","volume":"29","author":"Mehdi","year":"2019","journal-title":"J. Intell. Syst."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"2869","DOI":"10.1007\/s11071-022-07958-7","article-title":"Image encryption model based on novel magic square with differential encoding and chaotic map","volume":"111","author":"Rani","year":"2023","journal-title":"Nonlinear Dyn."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"2079","DOI":"10.1007\/s11071-012-0409-z","article-title":"An efficient chaotic image encryption algorithm based on a generalized Arnold map","volume":"69","author":"Ye","year":"2012","journal-title":"Nonlinear Dyn."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"2647","DOI":"10.1007\/s11042-020-09828-z","article-title":"A compact image encryption system based on Arnold transformation","volume":"80","author":"Wu","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_49","unstructured":"Wei-Bin, C., and Xin, Z. (2009, January 11\u201312). Image encryption algorithm based on Henon chaotic system. Proceedings of the 2009 International Conference on Image Analysis and Signal Processing, Linhai, China."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Chen, Y., Xie, S., and Zhang, J. (2022). A hybrid domain image encryption algorithm based on improved henon map. Entropy, 24.","DOI":"10.3390\/e24020287"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"2463","DOI":"10.1007\/s10773-014-2046-4","article-title":"Quantum Hilbert image scrambling","volume":"53","author":"Jiang","year":"2014","journal-title":"Int. J. Theor. Phys."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Geng, S., Li, J., Zhang, X., and Wang, Y. (2023). An image encryption algorithm based on improved Hilbert curve scrambling and dynamic DNA coding. Entropy, 25.","DOI":"10.3390\/e25081178"}],"container-title":["Big Data and Cognitive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-2289\/9\/10\/250\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T04:22:21Z","timestamp":1760070141000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-2289\/9\/10\/250"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,30]]},"references-count":52,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["bdcc9100250"],"URL":"https:\/\/doi.org\/10.3390\/bdcc9100250","relation":{},"ISSN":["2504-2289"],"issn-type":[{"type":"electronic","value":"2504-2289"}],"subject":[],"published":{"date-parts":[[2025,9,30]]}}}