{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T05:26:17Z","timestamp":1736227577505,"version":"3.32.0"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T00:00:00Z","timestamp":1648857600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of King Saud University - Computer and Information Sciences"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1016\/j.jksuci.2022.04.001","type":"journal-article","created":{"date-parts":[[2022,4,18]],"date-time":"2022-04-18T11:42:37Z","timestamp":1650282157000},"page":"2993-3010","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":12,"special_numbering":"PA","title":["High-efficiency and visual-usability image encryption based on thumbnail preserving and chaotic system"],"prefix":"10.1007","volume":"34","author":[{"given":"Yongming","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Ruoyu","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Yushu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Rushi","family":"Lan","sequence":"additional","affiliation":[]},{"given":"Xiuli","family":"Chai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10.1016\/j.jksuci.2022.04.001_b0005","doi-asserted-by":"crossref","first-page":"728","DOI":"10.3390\/s21030728","article-title":"Multi-block color-binarized statistical images for single-sample face recognition","volume":"21","author":"Adjabi","year":"2021","journal-title":"Sensors"},{"key":"10.1016\/j.jksuci.2022.04.001_b0010","doi-asserted-by":"crossref","first-page":"1188","DOI":"10.3390\/electronics9081188","article-title":"Past, present, and future of face recognition: A review","volume":"9","author":"Adjabi","year":"2020","journal-title":"Electronics"},{"key":"10.1016\/j.jksuci.2022.04.001_b0015","first-page":"1350","article-title":"Influencing photo sharing decisions on social media: A case of paradoxical findings","author":"Amon","year":"2020","journal-title":"IEEE Symp. Secur. Privacy"},{"key":"10.1016\/j.jksuci.2022.04.001_b0020","series-title":"Lect. Notes Comput. Sci.","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/978-3-642-05445-7_19","article-title":"Format-preserving encryption","author":"Bellare","year":"2009"},{"key":"10.1016\/j.jksuci.2022.04.001_b0025","first-page":"309","article-title":"(leveled) fully homomorphic encryption without bootstrapping","author":"Brakerski","year":"2012","journal-title":"Commun. Comput. Info. Sci."},{"key":"10.1016\/j.jksuci.2022.04.001_b0030","first-page":"22","article-title":"Revealed: 50 million facebook profiles harvested for cambridge analytica in major data breach","volume":"17","author":"Cadwalladr","year":"2018","journal-title":"The guardian"},{"key":"10.1016\/j.jksuci.2022.04.001_b0035","unstructured":"Davies, C., 2018. Facebook messenger is scanning all the links and photos you share. URL: https:\/\/www.slashgear.com\/facebook-messenger-is-scanning-all-the-text-and-photos-you-share-04526002\/."},{"key":"10.1016\/j.jksuci.2022.04.001_b0040","first-page":"2615","article-title":"Exploring implicit memory for painless password recovery","author":"Denning","year":"2011","journal-title":"Hum. Fact. Comput. Syst. Proc."},{"key":"10.1016\/j.jksuci.2022.04.001_b0045","first-page":"1","article-title":"GARP-face: Balancing privacy protection and utility preservation in face de-identification","author":"Du","year":"2014","journal-title":"IEEE Int. Jt. Conf. Biom."},{"key":"10.1016\/j.jksuci.2022.04.001_b0050","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevE.72.016220","article-title":"Properties making a chaotic system a good pseudo random number generator","volume":"72","author":"Falcioni","year":"2005","journal-title":"Phys. Rev. E"},{"key":"10.1016\/j.jksuci.2022.04.001_b0055","doi-asserted-by":"crossref","first-page":"1430027","DOI":"10.1142\/S0218127414300274","article-title":"Standing swells surveyed showing surprisingly stable solutions for the lorenz\u201996 model","volume":"24","author":"Frank","year":"2014","journal-title":"Int. J. Bifurcation Chaos"},{"key":"10.1016\/j.jksuci.2022.04.001_b0060","first-page":"2373","article-title":"Large-scale privacy protection in google street view","author":"Frome","year":"2009","journal-title":"Proc. IEEE Int. Conf. Comput. Vision"},{"key":"10.1016\/j.jksuci.2022.04.001_b0065","doi-asserted-by":"crossref","first-page":"792","DOI":"10.1145\/6490.6503","article-title":"How to construct random functions","volume":"33","author":"Goldreich","year":"1986","journal-title":"J. ACM"},{"key":"10.1016\/j.jksuci.2022.04.001_b0070","unstructured":"Greenberg, A., 2021. Apple walks a privacy tightrope to spot child abuse in icloud. URL: https:\/\/www.wired.com\/story\/apple-csam-detection-icloud-photos-encryption-privacy\/."},{"key":"10.1016\/j.jksuci.2022.04.001_b0075","first-page":"359","article-title":"PUPPIES: Transformation-supported personalized privacy preserving partial image sharing","author":"He","year":"2016","journal-title":"Annu. IEEE\/IFIP Int. Conf. Dependable Syst. Networks"},{"key":"10.1016\/j.jksuci.2022.04.001_b0080","doi-asserted-by":"crossref","first-page":"1305","DOI":"10.1007\/s11071-016-3311-2","article-title":"Cryptanalysis of a chaotic image cipher using latin square-based confusion and diffusion","volume":"88","author":"Hu","year":"2017","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.jksuci.2022.04.001_b0085","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1016\/j.sigpro.2017.10.004","article-title":"Medical image encryption using high-speed scrambling and pixel adaptive diffusion","volume":"144","author":"Hua","year":"2018","journal-title":"Signal Process."},{"key":"10.1016\/j.jksuci.2022.04.001_b0090","first-page":"1","article-title":"Color image encryption using orthogonal latin squares and a new 2d chaotic system","author":"Hua","year":"2021","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.jksuci.2022.04.001_b0095","series-title":"Proc. ACM Conf. Computer Commun. Secur.","first-page":"781","article-title":"Face\/Off: Preventing privacy leakage from photos in social networks","author":"Ilia","year":"2015"},{"key":"10.1016\/j.jksuci.2022.04.001_b0100","article-title":"Secure and lightweight privacy preserving internet of things integration for remote patient monitoring","author":"Imtyaz Ahmed","year":"2021","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"10.1016\/j.jksuci.2022.04.001_b0105","article-title":"Color image encryption system using combination of robust chaos and chaotic order fractional hartley transformation","author":"Kaur","year":"2021","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"10.1016\/j.jksuci.2022.04.001_b0110","unstructured":"KEMP, S., 2020. Digital 2020: October global statshot. URL: https:\/\/datareportal.com\/reports\/digital-2020-october-global-statshot."},{"key":"10.1016\/j.jksuci.2022.04.001_b0115","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.sigpro.2018.01.026","article-title":"Integrated chaotic systems for image encryption","volume":"147","author":"Lan","year":"2018","journal-title":"Signal Process."},{"key":"10.1016\/j.jksuci.2022.04.001_b0120","doi-asserted-by":"crossref","unstructured":"Le, V., Brandt, J., Lin, Z., Bourdev, L., Huang, T.S., 2012. Interactive facial feature localization, in: Computer Vision \u2013 ECCV, pp. 679\u2013692.","DOI":"10.1007\/978-3-642-33712-3_49"},{"key":"10.1016\/j.jksuci.2022.04.001_b0125","series-title":"IEEE Symp. Priv.-Aware Comput.","first-page":"10","article-title":"Photosafer: content-based and context-aware private photo protection for smartphones","author":"Li","year":"2018"},{"key":"10.1016\/j.jksuci.2022.04.001_b0130","doi-asserted-by":"crossref","unstructured":"Li, T., Lin, L., 2019. Anonymousnet: Natural face de-identification with measurable privacy, in: IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recogn. Workshops.","DOI":"10.1109\/CVPRW.2019.00013"},{"key":"10.1016\/j.jksuci.2022.04.001_b0135","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2021.108275","article-title":"Quaternion discrete fractional krawtchouk transform and its application in color image encryption and watermarking","volume":"189","author":"Liu","year":"2021","journal-title":"Signal Process."},{"key":"10.1016\/j.jksuci.2022.04.001_b0140","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1137\/0217022","article-title":"How to construct pseudorandom permutations from pseudorandom functions","volume":"17","author":"Luby","year":"1988","journal-title":"SIAM J. Comput."},{"key":"10.1016\/j.jksuci.2022.04.001_b0145","article-title":"FPGA implementation of a chaos-based image encryption algorithm","author":"Maazouz","year":"2022","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"10.1016\/j.jksuci.2022.04.001_b0150","doi-asserted-by":"crossref","unstructured":"Marohn, B., Wright, C.V., Feng, W.c., Rosulek, M., Bobba, R.B., 2017. Approximate thumbnail preserving encryption, in: Proc. Workshop Multimed. Priv. Secur., pp. 33\u201343.","DOI":"10.1145\/3137616.3137621"},{"key":"10.1016\/j.jksuci.2022.04.001_b0155","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/s10676-017-9431-7","article-title":"Scandal or sex crime? gendered privacy and the celebrity nude photo leaks","volume":"19","author":"Marwick","year":"2017","journal-title":"Ethics Inf. Technol."},{"key":"10.1016\/j.jksuci.2022.04.001_b0160","doi-asserted-by":"crossref","first-page":"4147","DOI":"10.1109\/TIFS.2021.3096024","article-title":"Privacy\u2013enhancing face biometrics: A comprehensive survey","volume":"16","author":"Meden","year":"2021","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"10.1016\/j.jksuci.2022.04.001_b0165","doi-asserted-by":"crossref","unstructured":"Minaee, S., Boykov, Y.Y., Porikli, F., Plaza, A.J., Kehtarnavaz, N., Terzopoulos, D., 2021. Image segmentation using deep learning: A survey. IEEE Trans. Pattern Anal. Mach. Intell. (in press). doi: 10.1109\/TPAMI.2021.3059968.","DOI":"10.1109\/TPAMI.2021.3059968"},{"key":"10.1016\/j.jksuci.2022.04.001_b0170","doi-asserted-by":"crossref","first-page":"2158","DOI":"10.1109\/TPAMI.2020.3015420","article-title":"Sensitivenets: Learning agnostic representations with application to face images","volume":"43","author":"Morales","year":"2021","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.jksuci.2022.04.001_b0175","article-title":"Privacy in Context: Technology, Policy, and the Integrity of Social Life","author":"Nissenbaum","year":"2009","journal-title":"Stanford University Press"},{"key":"10.1016\/j.jksuci.2022.04.001_b0180","first-page":"2889","article-title":"Digital privacy: Replacing pedestrians from google street view images","author":"Nodari","year":"2012","journal-title":"Int. Conf. Pattern Recognit."},{"key":"10.1016\/j.jksuci.2022.04.001_b0185","doi-asserted-by":"crossref","unstructured":"Orekondy, T., Schiele, B., Fritz, M., 2017. Towards a visual privacy advisor: Understanding and predicting privacy risks in images, in: Proc. IEEE Int. Conf. Comput. Vision.","DOI":"10.1109\/ICCV.2017.398"},{"key":"10.1016\/j.jksuci.2022.04.001_b0190","doi-asserted-by":"crossref","unstructured":"Ouahabi, A., 2013. A review of wavelet denoising in medical imaging, in: Int. Workshop Syst., Signal Process. Their Appl., pp. 19\u201326. doi: 10.1109\/WoSSPA.2013.6602330.","DOI":"10.1109\/WoSSPA.2013.6602330"},{"key":"10.1016\/j.jksuci.2022.04.001_b0195","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.patrec.2021.01.010","article-title":"Deep learning for real-time semantic segmentation: Application in ultrasound imaging","volume":"144","author":"Ouahabi","year":"2021","journal-title":"Pattern Recogn. Lett."},{"key":"10.1016\/j.jksuci.2022.04.001_b0200","series-title":"Notes Comput. Sci.","first-page":"223","article-title":"Public-key cryptosystems based on composite degree residuosity classes","author":"Paillier","year":"1999"},{"key":"10.1016\/j.jksuci.2022.04.001_b0205","unstructured":"Pantic, N., 2021. How many photos will be taken in 2021? URL: https:\/\/blog.mylio.com\/."},{"key":"10.1016\/j.jksuci.2022.04.001_b0210","first-page":"844","article-title":"Level by level image compression-encryption algorithm based on quantum chaos map","volume":"33","author":"Singh","year":"2021","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"10.1016\/j.jksuci.2022.04.001_b0215","doi-asserted-by":"crossref","unstructured":"Sun, Q., Schiele, B., Fritz, M., 2017. A domain based approach to social relation recognition, in: IEEE Comput. Soc. Conf. Comput. Vision Pattern Recognit.","DOI":"10.1109\/CVPR.2017.54"},{"key":"10.1016\/j.jksuci.2022.04.001_b0220","doi-asserted-by":"crossref","unstructured":"Tajik, K., Gunasekaran, A., Dutta, R., Ellis, B., Bobba, R.B., Rosulek, M., Wright, C.V., Feng, W., 2019. Balancing image privacy and usability with thumbnail-preserving encryption, in: Proc. Symp. Netw. Distrib. Syst. Secur.","DOI":"10.14722\/ndss.2019.23432"},{"key":"10.1016\/j.jksuci.2022.04.001_b0225","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3335054","article-title":"Privacy-aware tag recommendation for accurate image privacy prediction","volume":"10","author":"Tonge","year":"2019","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"10.1016\/j.jksuci.2022.04.001_b0230","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3386082","article-title":"Image privacy prediction using deep neural networks","volume":"14","author":"Tonge","year":"2020","journal-title":"ACM Trans. Web"},{"key":"10.1016\/j.jksuci.2022.04.001_b0235","doi-asserted-by":"crossref","unstructured":"Vishwamitra, N., Hu, H., Luo, F., Cheng, L., 2021. Towards understanding and detecting cyberbullying in real-world images, in: IEEE Int. Conf. Mach. Learn. Appl.","DOI":"10.14722\/ndss.2021.24260"},{"key":"10.1016\/j.jksuci.2022.04.001_b0240","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2020.107580","article-title":"A visually secure image encryption scheme based on semi-tensor product compressed sensing","volume":"173","author":"Wen","year":"2020","journal-title":"Signal Process."},{"key":"10.1016\/j.jksuci.2022.04.001_b0245","doi-asserted-by":"crossref","unstructured":"Wright, C.V., Feng, W.c., Liu, F., 2015. Thumbnail-preserving encryption for jpeg, in: Proc. ACM Workshop Inf. Hiding Multimedia Secur., p. 141\u2013146.","DOI":"10.1145\/2756601.2756618"},{"key":"10.1016\/j.jksuci.2022.04.001_b0250","first-page":"31","article-title":"Npcr and uaci randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology","volume":"1","author":"Wu","year":"2011","journal-title":"J. Sel. Areas Telecommun."},{"key":"10.1016\/j.jksuci.2022.04.001_b0255","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2020.107911","article-title":"Content-adaptive image encryption with partial unwinding decomposition","volume":"181","author":"Wu","year":"2021","journal-title":"Signal Process."},{"key":"10.1016\/j.jksuci.2022.04.001_b0260","doi-asserted-by":"crossref","first-page":"1154","DOI":"10.1016\/j.ins.2020.09.055","article-title":"Fractal sorting matrix and its application on chaotic image encryption","volume":"547","author":"Xian","year":"2021","journal-title":"Inf. Sci."},{"key":"10.1016\/j.jksuci.2022.04.001_b0265","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/j.cose.2017.05.006","article-title":"EvoPass: Evolvable graphical password against shoulder-surfing attacks","volume":"70","author":"Yu","year":"2017","journal-title":"Comput. Secur."},{"key":"10.1016\/j.jksuci.2022.04.001_b0270","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.optlastec.2013.04.029","article-title":"Edge-based lightweight image encryption using chaos-based reversible hidden transform and multiple-order discrete fractional cosine transform","volume":"54","author":"Zhang","year":"2013","journal-title":"Opt. Laser Technol."},{"key":"10.1016\/j.jksuci.2022.04.001_b0275","doi-asserted-by":"crossref","first-page":"947","DOI":"10.1109\/TCSVT.2021.3070348","article-title":"HF-TPE: High-fidelity thumbnail- preserving encryption","volume":"32","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.jksuci.2022.04.001_b0280","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2021.108019","article-title":"TPE2: Three-pixel exact thumbnail-preserving image encryption","volume":"183","author":"Zhao","year":"2021","journal-title":"Signal Process."},{"key":"10.1016\/j.jksuci.2022.04.001_b0285","doi-asserted-by":"crossref","first-page":"1088","DOI":"10.1109\/TIFS.2020.3029913","article-title":"Personal privacy protection via irrelevant faces tracking and pixelation in video live streaming","volume":"16","author":"Zhou","year":"2021","journal-title":"IEEE Trans. Inf. Forensic Secur."}],"container-title":["Journal of King Saud University - Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1319157822001185?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1319157822001185?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T17:24:41Z","timestamp":1736184281000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1319157822001185"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":57,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["S1319157822001185"],"URL":"https:\/\/doi.org\/10.1016\/j.jksuci.2022.04.001","relation":{},"ISSN":["1319-1578"],"issn-type":[{"type":"print","value":"1319-1578"}],"subject":[],"published":{"date-parts":[[2022,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"High-efficiency and visual-usability image encryption based on thumbnail preserving and chaotic system","name":"articletitle","label":"Article Title"},{"value":"Journal of King Saud University - Computer and Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jksuci.2022.04.001","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 The Author(s). Published by Elsevier B.V. on behalf of King Saud University.","name":"copyright","label":"Copyright"}]}}