{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:34:59Z","timestamp":1775745299115,"version":"3.50.1"},"reference-count":40,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T00:00:00Z","timestamp":1673481600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>The largest source of information in healthcare during the present epidemic is radiological imaging, which is also one of the most difficult sources to interpret. Clinicians today are forced to rely heavily on therapeutic image analysis that has been filtered and sometimes performed by worn-out radiologists. Transmission of these medical data increases in frequency due to patient overflow, and protecting confidentiality, along with integrity and availability, emerges as one of the most crucial components of security. Medical images generally contain sensitive information about patients and are therefore vulnerable to various security threats during transmission over public networks. These images must be protected before being transmitted over this network to the public. In this paper, an efficient SCAN and chaotic-map-based image encryption model is proposed. This paper describes pixel value and pixel position manipulation based on SCAN and chaotic theory. The SCAN method involves translating an image\u2019s pixel value to a different pixel value and rearranging pixels in a predetermined order. A chaotic map is used to shift the positions of the pixels within the block. Decryption follows the reverse process of encryption. The effectiveness of the suggested strategy is evaluated by computing the histogram chi-square test, MSE, PSNR, NPCR, UACI, SSIM, and UQI. The efficiency of the suggested strategy is demonstrated by comparison analysis. The results of analysis and testing show that the proposed program can achieve the concept of partial encryption. In addition, simulation experiments demonstrate that our approach has both a faster encryption speed and higher security when compared to existing techniques.<\/jats:p>","DOI":"10.3390\/info14010047","type":"journal-article","created":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T02:29:57Z","timestamp":1673576997000},"page":"47","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Efficient SCAN and Chaotic Map Encryption System for Securing E-Healthcare Images"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5275-5067","authenticated-orcid":false,"given":"Kiran","family":"Kiran","sequence":"first","affiliation":[{"name":"Department of ECE, Vidyavardhaka College of Engineering, Mysuru 570002, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"H. L.","family":"Gururaj","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Manipal Institute of Technology Bengaluru, Manipal Academy of Higher Education, Manipal 576104, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7838-4081","authenticated-orcid":false,"given":"Meshari","family":"Almeshari","sequence":"additional","affiliation":[{"name":"Department of Diagnostic Radiology, College of Applied Medical Sciences, University of Ha\u2019il, Ha\u2019il 55476, Saudi Arabia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9478-850X","authenticated-orcid":false,"given":"Yasser","family":"Alzamil","sequence":"additional","affiliation":[{"name":"Department of Diagnostic Radiology, College of Applied Medical Sciences, University of Ha\u2019il, Ha\u2019il 55476, Saudi Arabia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6873-6469","authenticated-orcid":false,"given":"Vinayakumar","family":"Ravi","sequence":"additional","affiliation":[{"name":"Center for Artificial Intelligence, Prince Mohammad Bin Fahd University, Khobar 34754, Saudi Arabia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"K. V.","family":"Sudeesh","sequence":"additional","affiliation":[{"name":"Department of ECE, Vidyavardhaka College of Engineering, Mysuru 570002, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2023,1,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","article-title":"A new chaos-based fast image encryption algorithm","volume":"11","author":"Wang","year":"2011","journal-title":"Appl. Soft Comput."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"806","DOI":"10.1016\/j.aeue.2012.01.015","article-title":"A hybrid genetic algorithm and chaotic function model for image encryption","volume":"66","author":"Abdullah","year":"2012","journal-title":"AEU\u2014Int. J. Electron. Commun."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"5703","DOI":"10.1016\/j.ijleo.2015.09.091","article-title":"An improved color image encryption based on multiple DNA sequence operations with DNA synthetic image and chaos","volume":"126","author":"Kalpana","year":"2015","journal-title":"Optik"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Afarin, R., and Mozaffari, S. (2013, January 10\u201312). Image encryption using genetic algorithm. Proceedings of the 2013 8th Iranian Conference on Machine Vision and Image Processing (MVIP), Zanjan, Iran.","DOI":"10.1109\/IranianMVIP.2013.6780026"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"17171","DOI":"10.1007\/s11042-015-2985-7","article-title":"Efficient selective image encryption","volume":"75","author":"Ayoup","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_6","unstructured":"Manjula, G., and Mohan, H.S. (2019, January 15\u201316). Probability based selective encryption scheme for fast encryption of medical images. Proceedings of the ICAICR \u201819: Third International Conference on Advanced Informatics for Computing Research, Shimla, India. Article 17."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1177\/1550147720914779","article-title":"Partial image encryption using format-preserving encryption in image processing systems for Internet of things environment","volume":"16","author":"Jang","year":"2020","journal-title":"Int. J. Distrib. Sensor Netw."},{"key":"ref_8","unstructured":"Pandian, D., Fernando, X., Baig, Z., and Shi, F. (2018, January 16\u201317). Region of Interest (ROI) based image encryption with sine map and lorenz system. Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering (ISMAC-CVB), Lecture Notes in Computational Vision and Biomechanics, Palladam, India."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"3693","DOI":"10.1016\/j.ijleo.2012.11.028","article-title":"Encryption of multimedia content in par- tial encryption scheme of DCT transform coefficients using a lightweight stream algorithm","volume":"124","author":"Bahrami","year":"2013","journal-title":"Optik"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2422","DOI":"10.1016\/j.sigpro.2013.03.017","article-title":"Chaos-based partial encryption of SPIHT coded color images","volume":"93","author":"Zhang","year":"2013","journal-title":"Signal Process."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2613","DOI":"10.1016\/j.mcm.2011.06.007","article-title":"On the design of partial encryption scheme for multimedia content","volume":"57","author":"Lian","year":"2013","journal-title":"Math. Comput. Model."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1016\/j.dsp.2012.02.005","article-title":"Selective image encryption based on pixels of interest and singular value decomposition","volume":"22","author":"Bhatnagar","year":"2012","journal-title":"Dig. Signal Process."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Brahimi, Z., Bessalah, H., Tarabet, A., and Kholladi, M.K. (2008, January 20\u201322). Selective Encryption Techniques of JPEG2000 Codestream for Medical Images Transmission. Proceedings of the 2008 5th International Multi-Conference on Systems, Signals and Devices, Amman, Jordan.","DOI":"10.1109\/SSD.2008.4632785"},{"key":"ref_14","unstructured":"Kulkarni, N.S., Raman, B., and Gupta, I. (2008, January 17\u201319). Selective encryption of multimedia images. Proceedings of the 32nd National Systems Conference, Virtual."},{"key":"ref_15","first-page":"29","article-title":"A Fast and Secure Selective Encryption Scheme using Grid Division Method","volume":"51","author":"Agrawal","year":"2012","journal-title":"Int. J. Comput. Appl."},{"key":"ref_16","first-page":"023115","article-title":"Selective image encryption using a spatiotemporal chaotic system","volume":"17","author":"Xiang","year":"2007","journal-title":"Am. Inst. Phys."},{"key":"ref_17","unstructured":"Droogenbroeck, M.V., and Benedett, R. (2002, January 9\u201311). Techniques for a selective encryption of uncompressed and compressed images. Proceedings of the ACIVS 2002 (Advanced Concepts for Intelligent Vision Systems), Ghent, Belgium."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Pfarrhofer, R., and Uhl, A. (2005, January 19\u201321). Selective Image Encryption Using JBIG. Proceedings of the IFIP International Federation for Information Processing, Salzburg, Austria.","DOI":"10.1007\/11552055_10"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1016\/j.patcog.2003.08.011","article-title":"Image and video encryption using SCAN patterns","volume":"37","author":"Maniccam","year":"2004","journal-title":"Pattern Recognit."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"990","DOI":"10.1016\/j.jfma.2020.04.006","article-title":"Case Report\u2014CT imaging of the COVID-19","volume":"119","author":"Zhang","year":"2020","journal-title":"J. Formos. Med. Assoc."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"107385","DOI":"10.1016\/j.compeleceng.2021.107385","article-title":"Selective encryption and optimization based watermarking for robust transmission of landslide images","volume":"95","author":"Mohan","year":"2021","journal-title":"Comput. Electr. Eng."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"159732","DOI":"10.1109\/ACCESS.2020.3020917","article-title":"DNA and plaintext dependent chaotic visual selective image encryption","volume":"8","author":"Khan","year":"2020","journal-title":"IEEE Access"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Chen, C.S., and Chen, R.J. (2006, January 4\u20137). Image encryption and decryption using SCAN methodology. Proceedings of the 2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT\u201906), Taipei, Taiwan.","DOI":"10.1109\/PDCAT.2006.71"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"103134","DOI":"10.1016\/j.micpro.2020.103134","article-title":"An efficient image encryption using deep neural network and chaotic map","volume":"77","author":"Thanikaiselvan","year":"2020","journal-title":"Microprocess. Microsyst."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.micpro.2018.04.009","article-title":"SFN: A new lightweight block cipher","volume":"60","author":"Lang","year":"2018","journal-title":"Microprocess. Microsyst."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.micpro.2018.12.003","article-title":"A novel approach to improve multimedia security utilizing 3D mixed chaotic map","volume":"65","author":"Naseer","year":"2019","journal-title":"Microprocess. Microsyst."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"103671","DOI":"10.1016\/j.micpro.2020.103671","article-title":"Animal tumor medical image analysis based on image processing techniques and embedded system","volume":"81","author":"Wu","year":"2021","journal-title":"Microprocess. Microsyst."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"104134","DOI":"10.1016\/j.micpro.2021.104134","article-title":"Robust SVD-based schemes for medical image watermarking","volume":"84","author":"Zermi","year":"2021","journal-title":"Microprocess. Microsyst."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"104490","DOI":"10.1016\/j.micpro.2022.104490","article-title":"A wavelet based medical image watermarking scheme for secure transmission in telemedicine applications","volume":"90","author":"Moad","year":"2022","journal-title":"Microprocess. Microsyst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"104546","DOI":"10.1016\/j.micpro.2022.104546","article-title":"Resource Optimized Selective Image Encryption of Medical Images Using Multiple Chaotic Systems","volume":"91","author":"Kiran","year":"2022","journal-title":"Microprocess. Microsyst."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"27445","DOI":"10.1007\/s11042-021-10979-w","article-title":"A novel image encryption algorithm based on least squares generative adversarial network random number generator","volume":"80","author":"Man","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"31397","DOI":"10.1007\/s11042-018-6051-0","article-title":"A dynamic approach for a lightweight and secure cipher for medical images","volume":"77","author":"Noura","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"168416","DOI":"10.1016\/j.ijleo.2021.168416","article-title":"A novel DICOM image encryption with JSMP map","volume":"251","author":"Muthu","year":"2022","journal-title":"Optik"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"59108","DOI":"10.1109\/ACCESS.2021.3071535","article-title":"Noise-resistant image encryption scheme for medical images in the chaos and wavelet domain","volume":"9","author":"Shafique","year":"2021","journal-title":"IEEE Access"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"23511","DOI":"10.1007\/s11042-021-10943-8","article-title":"On dual encryption with RC6 and combined logistic tent map for grayscale and DICOM","volume":"80","author":"Manikandan","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Sahu, A.K., Hassaballah, M., Rao, R.S., and Suresh, G. (2022). Logistic-map based fragile image watermarking scheme for tamper detection and localization. Multimed. Tools Appl.","DOI":"10.1007\/s11042-022-13630-4"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"103794","DOI":"10.1016\/j.cities.2022.103794","article-title":"Future smart cities: Requirements, emerging technologies, applications, challenges, and future aspects","volume":"129","author":"Javed","year":"2022","journal-title":"Cities"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.comcom.2022.12.004","article-title":"COVID-19 health data analysis and personal data preserving: A homomorphic privacy enforcement approach","volume":"199","author":"Dhasarathan","year":"2022","journal-title":"Comput. Commun."},{"key":"ref_39","unstructured":"Wu, Y., Noonan, J.P., and Agaian, S. (2011). NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun., 31\u201338."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","article-title":"Image quality assessment: From error visibility to structural similarity","volume":"13","author":"Wang","year":"2004","journal-title":"IEEE Trans. Image Process."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/14\/1\/47\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:04:45Z","timestamp":1760119485000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/14\/1\/47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,12]]},"references-count":40,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,1]]}},"alternative-id":["info14010047"],"URL":"https:\/\/doi.org\/10.3390\/info14010047","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,12]]}}}