{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T08:32:01Z","timestamp":1773390721204,"version":"3.50.1"},"reference-count":56,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2022,6,29]],"date-time":"2022-06-29T00:00:00Z","timestamp":1656460800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key Research and Development Program","award":["2018YFB1800303"],"award-info":[{"award-number":["2018YFB1800303"]}]},{"name":"National Key Research and Development Program","award":["20190201188JC"],"award-info":[{"award-number":["20190201188JC"]}]},{"name":"National Key Research and Development Program","award":["JLLG685520190725093004"],"award-info":[{"award-number":["JLLG685520190725093004"]}]},{"name":"National Key Research and Development Program","award":["XJJLG-2019-01"],"award-info":[{"award-number":["XJJLG-2019-01"]}]},{"name":"Natural Science Foundation Project of the Science and Technology Department, Jilin Province","award":["2018YFB1800303"],"award-info":[{"award-number":["2018YFB1800303"]}]},{"name":"Natural Science Foundation Project of the Science and Technology Department, Jilin Province","award":["20190201188JC"],"award-info":[{"award-number":["20190201188JC"]}]},{"name":"Natural Science Foundation Project of the Science and Technology Department, Jilin Province","award":["JLLG685520190725093004"],"award-info":[{"award-number":["JLLG685520190725093004"]}]},{"name":"Natural Science Foundation Project of the Science and Technology Department, Jilin Province","award":["XJJLG-2019-01"],"award-info":[{"award-number":["XJJLG-2019-01"]}]},{"name":"Higher Education Teaching Reform Research Project of the Education Department, Jilin Province","award":["2018YFB1800303"],"award-info":[{"award-number":["2018YFB1800303"]}]},{"name":"Higher Education Teaching Reform Research Project of the Education Department, Jilin Province","award":["20190201188JC"],"award-info":[{"award-number":["20190201188JC"]}]},{"name":"Higher Education Teaching Reform Research Project of the Education Department, Jilin Province","award":["JLLG685520190725093004"],"award-info":[{"award-number":["JLLG685520190725093004"]}]},{"name":"Higher Education Teaching Reform Research Project of the Education Department, Jilin Province","award":["XJJLG-2019-01"],"award-info":[{"award-number":["XJJLG-2019-01"]}]},{"name":"Changchun University of Science and Technology Youth Fund","award":["2018YFB1800303"],"award-info":[{"award-number":["2018YFB1800303"]}]},{"name":"Changchun University of Science and Technology Youth Fund","award":["20190201188JC"],"award-info":[{"award-number":["20190201188JC"]}]},{"name":"Changchun University of Science and Technology Youth Fund","award":["JLLG685520190725093004"],"award-info":[{"award-number":["JLLG685520190725093004"]}]},{"name":"Changchun University of Science and Technology Youth Fund","award":["XJJLG-2019-01"],"award-info":[{"award-number":["XJJLG-2019-01"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Today, with the rapid development of the Internet, improving image security becomes more and more important. To improve image encryption efficiency, a novel region of interest (ROI) encryption algorithm based on a chaotic system was proposed. First, a new 1D e\u03bb-cos-cot (1D-ECC) with better chaotic performance than the traditional chaotic system is proposed. Second, the chaotic system is used to generate a plaintext-relate keystream based on the label information of a medical image DICOM (Digital Imaging and Communications in Medicine) file, the medical image is segmented using an adaptive threshold, and the segmented region of interest is encrypted. The encryption process is divided into two stages: scrambling and diffusion. In the scrambling stage, helical scanning and index scrambling are combined to scramble. In the diffusion stage, two-dimensional bi-directional diffusion is adopted, that is, the image is bi-directionally diffused row by column to make image security better. The algorithm offers good encryption speed and security performance, according to simulation results and security analysis.<\/jats:p>","DOI":"10.3390\/e24070901","type":"journal-article","created":{"date-parts":[[2022,6,29]],"date-time":"2022-06-29T20:47:56Z","timestamp":1656535676000},"page":"901","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["An Encryption Algorithm for Region of Interest in Medical DICOM Based on One-Dimensional e\u03bb-cos-cot Map"],"prefix":"10.3390","volume":"24","author":[{"given":"Xin","family":"Meng","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Changchun University of Science and Technology, Changchun 130022, China"},{"name":"Jilin Province Key Laboratory of Network and Information Security, Changchun 130033, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5580-2794","authenticated-orcid":false,"given":"Jinqing","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Changchun University of Science and Technology, Changchun 130022, China"},{"name":"Jilin Province Key Laboratory of Network and Information Security, Changchun 130033, China"}]},{"given":"Xiaoqiang","family":"Di","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Changchun University of Science and Technology, Changchun 130022, China"},{"name":"Jilin Province Key Laboratory of Network and Information Security, Changchun 130033, China"},{"name":"Information Center, Changchun University of Science and Technology, Changchun 130022, China"}]},{"given":"Yaohui","family":"Sheng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Changchun University of Science and Technology, Changchun 130022, China"},{"name":"Jilin Province Key Laboratory of Network and Information Security, Changchun 130033, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3545-6409","authenticated-orcid":false,"given":"Donghua","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou 511400, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,6,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","article-title":"A symmetric image encryption scheme based on 3D chaotic cat maps","volume":"21","author":"Chen","year":"2004","journal-title":"Chaos Solitons Fractals"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1016\/j.ins.2020.07.058","article-title":"A new unified image encryption algorithm based on a lifting transformation and chaos","volume":"547","author":"Zhang","year":"2021","journal-title":"Inf. Sci."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.ins.2021.07.096","article-title":"An image encryption algorithm based on new chaos and diffusion values of a truth table","volume":"579","author":"Wang","year":"2021","journal-title":"Inf. Sci."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1016\/j.optlastec.2018.04.030","article-title":"Region of interest encryption for color images based on a hyperchaotic system with three positive Lyapunov exponets","volume":"106","author":"Xue","year":"2018","journal-title":"Opt. Laser Technol."},{"key":"ref_5","first-page":"102854","article-title":"2d logistic-adjusted-chebyshev map for visual color image encryption","volume":"60","author":"Liu","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"107563","DOI":"10.1016\/j.sigpro.2020.107563","article-title":"Image encryption and hiding algorithm based on compressive sensing and random numbers insertion","volume":"172","author":"Ye","year":"2020","journal-title":"Signal Process."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"7167","DOI":"10.1007\/s11042-020-09981-5","article-title":"A fuzzy based ROI selection for encryption and watermarking in medical image using DWT and SVD","volume":"80","author":"Balasamy","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"4440","DOI":"10.1109\/TCSVT.2019.2960507","article-title":"Image description with polar harmonic Fourier moments","volume":"30","author":"Wang","year":"2019","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"24701","DOI":"10.1007\/s11042-018-5669-2","article-title":"A new image encryption algorithm based on heterogeneous chaotic neural network generator and dna encoding","volume":"77","author":"Maddodi","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/s11071-013-1074-6","article-title":"A block image encryption algorithm based on wave transmission and chaotic systems","volume":"75","author":"Ye","year":"2014","journal-title":"Nonlinear Dyn."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"106178","DOI":"10.1016\/j.optlaseng.2020.106178","article-title":"An effective image encryption algorithm based on compressive sensing and 2D-SLIM","volume":"134","author":"Xu","year":"2020","journal-title":"Opt. Lasers Eng."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2050014","DOI":"10.1142\/S0217979220500149","article-title":"A color image encryption method based on memristive hyperchaotic system and DNA encryption","volume":"34","author":"Ouyang","year":"2020","journal-title":"Int. J. Mod. Phys. B"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2267","DOI":"10.1016\/j.physleta.2019.04.041","article-title":"Detecting chaos in fractional-order nonlinear systems using the smaller alignment index","volume":"383","author":"He","year":"2019","journal-title":"Phys. Lett. A"},{"key":"ref_14","first-page":"1129","article-title":"An extremely simple chaotic system with infinitely many coexisting attractors","volume":"67","author":"Lai","year":"2019","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.cnsns.2019.02.007","article-title":"Dynamics and synchronization of conformable fractional-order hyperchaotic systems using the Homotopy analysis method","volume":"73","author":"He","year":"2019","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1016\/j.dsp.2013.11.004","article-title":"Efficient neural chaotic generator for image encryption","volume":"25","author":"Kassem","year":"2014","journal-title":"Digit. Signal Process."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","article-title":"A new color image encryption using combination of the 1D chaotic map","volume":"138","author":"Pak","year":"2017","journal-title":"Signal Process."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.sigpro.2019.02.016","article-title":"A new hybrid digital chaotic system with applications in image encryption","volume":"160","author":"Alawida","year":"2019","journal-title":"Signal Process."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.optlaseng.2019.04.011","article-title":"A fast image encryption algorithm based on compressive sensing and hyperchaotic map","volume":"121","author":"Xu","year":"2019","journal-title":"Opt. Lasers Eng."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.cnsns.2009.03.035","article-title":"A multi-ary number communication system based on hyperchaotic system of 6th-order cellular neural network","volume":"15","author":"Xingyuan","year":"2010","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Di, X., Li, J., Qi, H., Cong, L., and Yang, H. (2017). A semi-symmetric image encryption scheme based on the function projective synchronization of two hyperchaotic systems. PLoS ONE, 12.","DOI":"10.1371\/journal.pone.0184586"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1007\/s11801-021-1003-8","article-title":"Range-gated laser image compression and encryption scheme based on bidirectional diffusion","volume":"17","author":"Li","year":"2021","journal-title":"Optoelectron. Lett."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"108220","DOI":"10.1016\/j.sigpro.2021.108220","article-title":"Adaptive embedding: A novel meaningful image encryption scheme based on parallel compressive sensing and slant transform","volume":"188","author":"Jiang","year":"2021","journal-title":"Signal Process."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"31957","DOI":"10.1007\/s11042-020-09699-4","article-title":"A secure image encryption scheme with compression-confusion-diffusion structure","volume":"79","author":"Zhu","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_25","unstructured":"Ou, Y., Sur, C., and Rhee, K.H. Region-based selective encryption for medical imaging. Proceedings of the International Workshop on Frontiers in Algorithmics."},{"key":"ref_26","first-page":"115","article-title":"Selective image encryption for medical and satellite images","volume":"5","author":"Panduranga","year":"2013","journal-title":"Int. J. Eng. Technol."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Panduranga, H.T., and Naveenkumar, S.K. (2013, January 2\u20133). Partial image encryption using block wise shuffling and chaotic map. Proceedings of the International Conference on Optical Imaging Sensor and Security ICOSS), Coimbatore, India.","DOI":"10.1109\/ICOISS.2013.6678417"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.jvcir.2016.05.008","article-title":"A ROI-based reversible data hiding scheme in encrypted medical images","volume":"39","author":"Liu","year":"2016","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"662","DOI":"10.1016\/j.cmpb.2013.05.027","article-title":"Effective management of medical information through ROI-lossless fragile image watermarking technique","volume":"111","author":"Das","year":"2013","journal-title":"Comput. Methods Programs Biomed."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1031","DOI":"10.1049\/iet-spr.2016.0756","article-title":"Image privacy protection with secure JPEG transmorphing","volume":"11","author":"Yuan","year":"2017","journal-title":"IET Signal Process."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"943","DOI":"10.1007\/s10278-010-9340-3","article-title":"Authentication and self-correction in sequential MRI slices","volume":"24","author":"Fotopoulos","year":"2011","journal-title":"J. Digit. Imaging"},{"key":"ref_32","first-page":"240749","article-title":"A novel encryption frame for medical image with watermark based on hyperchaotic system","volume":"2014","author":"Zhang","year":"2014","journal-title":"Math. Prob. Eng."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Prabhavathi, K., Sathisha, C.P., and Ravikumar, K.M. (2017, January 15\u201316). Region of interest based selective medical image encryption using multi Chaotic system. Proceedings of the International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), Mysuru, India.","DOI":"10.1109\/ICEECCOT.2017.8284614"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.optcom.2014.12.026","article-title":"Infrared target-based selective encryption by chaotic maps","volume":"134","author":"Wen","year":"2015","journal-title":"Opt. Commun."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.cnsns.2014.12.005","article-title":"An efficient and robust image encryption scheme for medical applications","volume":"24","author":"Kanso","year":"2015","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"122210","DOI":"10.1109\/ACCESS.2020.3007550","article-title":"A novel lossless medical image encryption scheme based on game theory with optimized ROI parameters and hidden ROI position","volume":"8","author":"Zhou","year":"2020","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"106782","DOI":"10.1016\/j.optlaseng.2021.106782","article-title":"A new combination chaotic system and its application in a new Bit-level image encryption scheme","volume":"149","author":"Zhou","year":"2022","journal-title":"Opt. Lasers Eng."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/0167-2789(85)90011-9","article-title":"Determining Lyapunov exponents from a time series","volume":"16","author":"Wolf","year":"1985","journal-title":"Phys. D Nonlinear Phenom."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.ins.2020.10.048","article-title":"A new fractional one dimensional chaotic map and its application in high-speed image encryption","volume":"550","author":"Talhaoui","year":"2021","journal-title":"Information Sciences"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"H2039","DOI":"10.1152\/ajpheart.2000.278.6.H2039","article-title":"Physiological time-series analysis using approximate entropy and sample entropy","volume":"278","author":"Richman","year":"2000","journal-title":"Am. J. Physiol.-Heart Circ. Physiol."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Agarwal, R.P., Bazighifan, O., and Ragusa, M.A. (2021). Nonlinear neutral delay differential equations of fourth-order: Oscillation of solutions. Entropy, 23.","DOI":"10.3390\/e23020129"},{"key":"ref_42","first-page":"4975104","article-title":"Qualitative analysis of a hyperchaotic Lorenz-Stenflo mathematical model via the Caputo fractional operator","volume":"2022","author":"Deressa","year":"2022","journal-title":"J. Funct. Spaces"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"920","DOI":"10.1007\/s003300101100","article-title":"Introduction to the DICOM standard","volume":"12","author":"Mildenberger","year":"2002","journal-title":"Eur. Radiol."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","article-title":"A threshold selection method from gray-level histograms","volume":"9","author":"Otsu","year":"1979","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","article-title":"Some basic cryptographic requirements for chaos-based cryptosystems","volume":"16","author":"Alvarez","year":"2006","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"2043","DOI":"10.1007\/s11071-021-06206-8","article-title":"Image encryption algorithm with circle index table scrambling and partition diffusion","volume":"103","author":"Zhou","year":"2021","journal-title":"Nonlinear Dyn."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"111693","DOI":"10.1016\/j.chaos.2021.111693","article-title":"A new n-dimensional conservative chaos based on Generalized Hamiltonian System and its\u2019 applications in image encryption","volume":"154","author":"Liu","year":"2022","journal-title":"Chaos Solitons Fractals"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"106485","DOI":"10.1016\/j.optlaseng.2020.106485","article-title":"A sensitive dynamic mutual encryption system based on a new 1D chaotic map","volume":"139","author":"Midoun","year":"2021","journal-title":"Opt. Lasers Eng."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.jss.2014.07.026","article-title":"Efficient implementation of chaotic image encryption in transform domains","volume":"97","author":"Naeem","year":"2014","journal-title":"J. Syst. Softw."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Ahmad, J., Larijani, H., Emmanuel, R., and Mannion, M. (2018, January 19\u201321). Secure occupancy monitoring system for iot using lightweight intertwining logistic map. Proceedings of the 2018 10th Computer Science and Electronic Engineering (CEEC), Essex, UK.","DOI":"10.1109\/CEEC.2018.8674208"},{"key":"ref_51","first-page":"1","article-title":"A lightweight chaos-based medical image encryption scheme using random shuffling and XOR operations","volume":"97","author":"Masood","year":"2021","journal-title":"Wireless Personal Communications"},{"key":"ref_52","first-page":"31","article-title":"NPCR and UACI randomness tests for image encryption, Cyber journals: Multidisciplinary journals in science and technology","volume":"1","author":"Wu","year":"2011","journal-title":"J. Sel. Areas Telecommun. (JSAT)"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"111318","DOI":"10.1016\/j.chaos.2021.111318","article-title":"Double image encryption algorithm based on neural network and chaos","volume":"152","author":"Man","year":"2021","journal-title":"Chaos Solitons Fractals"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2022.01.042","article-title":"An image encryption algorithm based on new generalized fusion fractal structure","volume":"592","author":"Ahmad","year":"2022","journal-title":"Inf. Sci."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"21445","DOI":"10.1007\/s11042-017-5594-9","article-title":"A new simple one-dimensional chaotic map and its application for image encryption","volume":"77","author":"Liu","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"15561","DOI":"10.1007\/s11042-016-3858-4","article-title":"A fast chaos-based image encryption scheme with a novel plain image-related swapping block permutation and block diffusion","volume":"76","author":"Chai","year":"2017","journal-title":"Multimed. Tools Appl."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/7\/901\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:40:36Z","timestamp":1760139636000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/7\/901"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,29]]},"references-count":56,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2022,7]]}},"alternative-id":["e24070901"],"URL":"https:\/\/doi.org\/10.3390\/e24070901","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,29]]}}}