{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:09:23Z","timestamp":1725905363394},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319633114"},{"type":"electronic","value":"9783319633121"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-63312-1_59","type":"book-chapter","created":{"date-parts":[[2017,7,19]],"date-time":"2017-07-19T15:43:13Z","timestamp":1500478993000},"page":"666-677","source":"Crossref","is-referenced-by-count":1,"title":["A High and Efficient Sparse and Compressed Sensing-Based Security Approach for Biometric Protection"],"prefix":"10.1007","author":[{"given":"Changzhi","family":"Yu","sequence":"first","affiliation":[]},{"given":"Hengjian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ziru","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jiwen","family":"Dong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,20]]},"reference":[{"key":"59_CR1","doi-asserted-by":"crossref","first-page":"2282","DOI":"10.1016\/j.ijleo.2015.11.064","volume":"127","author":"R Nitin","year":"2016","unstructured":"Nitin, R., Byoungho, K., Rajesh, K.: Fast digital image encryption based on compressive sensing using structurally random matrices and Arnold transform technique. Optik 127, 2282\u20132286 (2016)","journal-title":"Optik"},{"issue":"3","key":"59_CR2","first-page":"8","volume":"16","author":"L Nan","year":"2004","unstructured":"Nan, L., Yanhong, S., Jiancheng, Z.: An audio scrambling method based on Fibonacci transformation. J. North China Univ. Technol. 16(3), 8\u201311 (2004)","journal-title":"J. North China Univ. Technol."},{"key":"59_CR3","doi-asserted-by":"crossref","unstructured":"Rachlin, Y., Baron, D.: The secrecy of compressed sensing measurements. In: 46th Annual Conference on Communication Control and Computing, Allerton, pp. 813\u2013817. IEEE (2008)","DOI":"10.1109\/ALLERTON.2008.4797641"},{"issue":"2","key":"59_CR4","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1109\/TIT.2005.862083","volume":"52","author":"EJ Candes","year":"2006","unstructured":"Candes, E.J., Romberg, J., Tao, T.: Robust uncertainty principles: exact signal reconstruction from highly incompletely frequency information. IEEE Trans. Inf. Theory 52(2), 489\u2013509 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"59_CR5","doi-asserted-by":"crossref","unstructured":"Ramezani Mayiami, M., Seyfe, B., Bafghi, H.G.: Perfect secrecy via compressed sensing. In: Communication & Information Theory, pp. 1\u20135 (2013)","DOI":"10.1109\/IWCIT.2013.6555751"},{"key":"59_CR6","doi-asserted-by":"crossref","unstructured":"Deng, C.W., Lin, W.S., Lee, B.-S.: Robust image compression based on compressive sensing. In: Proceedings of IEEE International Conference on Multimedia and Expo (ICME), Singapore, pp. 462\u2013467. IEEE (2010)","DOI":"10.1109\/ICME.2010.5583387"},{"issue":"6","key":"59_CR7","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 8(6), 1259\u20131284 (1998)","journal-title":"Int. J. Bifurc. Chaos"},{"key":"59_CR8","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.optlastec.2014.02.015","volume":"62","author":"N Zhou","year":"2014","unstructured":"Zhou, N., Zhang, A.: Novel image compression\u2013encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Optic Laser Technol. 62, 152\u2013160 (2014)","journal-title":"Optic Laser Technol."},{"key":"59_CR9","doi-asserted-by":"crossref","first-page":"1752","DOI":"10.1117\/12.170736","volume":"33","author":"B Javidi","year":"1994","unstructured":"Javidi, B., Horner, J.L.: Optical pattern recognition for validation and security verification. Opt. Eng. 33, 1752\u20131756 (1994)","journal-title":"Opt. Eng."},{"key":"59_CR10","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier, P., Javidi, B.: Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 20, 767\u2013769 (1995)","journal-title":"Opt. Lett."},{"issue":"12","key":"59_CR11","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1364\/OL.25.000887","volume":"25","author":"G Unnikrishnan","year":"2000","unstructured":"Unnikrishnan, G., Joseph, J., Singh, K.: Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt. Lett. 25(12), 887\u2013889 (2000)","journal-title":"Opt. Lett."},{"issue":"24","key":"59_CR12","doi-asserted-by":"crossref","first-page":"16067","DOI":"10.1364\/OE.15.016067","volume":"15","author":"R Tao","year":"2007","unstructured":"Tao, R., Xin, Y., Wang, Y.: Double image encryption based on random phase encoding in the fractional Fourier domain. Opt. Express 15(24), 16067\u201316079 (2007)","journal-title":"Opt. Express"},{"key":"59_CR13","doi-asserted-by":"crossref","first-page":"2663","DOI":"10.1016\/j.ijleo.2015.06.079","volume":"126","author":"H Liu","year":"2015","unstructured":"Liu, H., Xiao, D., Liu, Y., Zhang, Y.: Securely compressive sensing using double random phase encoding. Optik 126, 2663\u20132670 (2015)","journal-title":"Optik"},{"key":"59_CR14","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1016\/j.physleta.2007.07.040","volume":"372","author":"T Gao","year":"2008","unstructured":"Gao, T., Chen, Z.: A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372, 394\u2013400 (2008)","journal-title":"Phys. Lett. A"},{"key":"59_CR15","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/j.chaos.2005.08.110","volume":"29","author":"H Gao","year":"2006","unstructured":"Gao, H., Zhang, Y., Liang, S., Li, D.: A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29, 393\u2013399 (2006)","journal-title":"Chaos Solitons Fractals"},{"issue":"3","key":"59_CR16","first-page":"1","volume":"34","author":"X Liu","year":"2014","unstructured":"Liu, X., Cao, Y., Lu, P.: Study on optical image encryption based on compression sensing. Acta Microbiol. Sinica 34(3), 1\u20138 (2014)","journal-title":"Acta Microbiol. Sinica"},{"key":"59_CR17","doi-asserted-by":"crossref","first-page":"2514","DOI":"10.1016\/j.ijleo.2012.08.017","volume":"124","author":"P Lu","year":"2013","unstructured":"Lu, P., Xu, Z., Lu, X., Liu, X.: Digital image information encryption based on compressive sensing and double random-phase encoding technique. Optik 124, 2514\u20132518 (2013)","journal-title":"Optik"},{"issue":"5","key":"59_CR18","first-page":"6590","volume":"18","author":"X Liu","year":"2013","unstructured":"Liu, X., Cao, Y., Lu, P., Lud, X., Li, Y.: Optical image encryption technique based on compressed sensing and Arnold transformation. Opt. Lett. 18(5), 6590\u20136593 (2013)","journal-title":"Opt. Lett."},{"issue":"9","key":"59_CR19","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.neucom.2016.04.053","volume":"12","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Zhou, J., Chen, F., Zhang, L.Y., Wong, K.-W., He, X., Xiao, D.: Embedding cryptographic features in compressive sensing. Neurocomputing 12(9), 472\u2013480 (2016)","journal-title":"Neurocomputing"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Theories and Application"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-63312-1_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:03:13Z","timestamp":1569888193000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-63312-1_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319633114","9783319633121"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-63312-1_59","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}