{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:28:23Z","timestamp":1743002903404,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":26,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811681738"},{"type":"electronic","value":"9789811681745"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-8174-5_12","type":"book-chapter","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:03:12Z","timestamp":1638450192000},"page":"153-169","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Fast General Image Encryption Method Based on Deep Learning Compressed Sensing and Compound Chaotic System"],"prefix":"10.1007","author":[{"given":"Yuan","family":"Guo","sequence":"first","affiliation":[]},{"given":"Jinlin","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"issue":"4","key":"12_CR1","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"DL Donoho","year":"2016","unstructured":"Donoho, D.L.: Compressed sensing. IEEE Trans. Inf. Theor. 52(4), 1289\u20131306 (2016)","journal-title":"IEEE Trans. Inf. Theor."},{"issue":"2","key":"12_CR2","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1109\/TIT.2005.862083","volume":"52","author":"EJ Candes","year":"2006","unstructured":"Candes, E.J., Romberg, J., Tao, T.: Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inf. Theory 52(2), 489\u2013509 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"12_CR3","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MSP.2007.914731","volume":"25","author":"EJ Candes","year":"2008","unstructured":"Candes, E.J., Wakin, M.B.: An introduction to compressive sampling. IEEE Sig. Process. Mag 25(2), 21\u201330 (2008)","journal-title":"IEEE Sig. Process. Mag"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Mousavi, A., Patel, A.B., Baraniuk, R.G.: A deep learning approach to structured signal recovery. In: Proceedings of 53rd Annual Allerton Conference on Communication, Control, and Computing, Monticello, pp.1336\u20131343 (2015)","DOI":"10.1109\/ALLERTON.2015.7447163"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Kulkarni, K., Lohit, S., Turaga, P., Kerviche, R., Ashok, A.: ReconNet: non-iterative reconstruction of images from compressively sensed measurements. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 449\u2013458 (2016)","DOI":"10.1109\/CVPR.2016.55"},{"issue":"2","key":"12_CR6","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1109\/TPAMI.2015.2439281","volume":"38","author":"C Dong","year":"2016","unstructured":"Dong, C., Loy, C.C., He, K., Tang, X.: Image super-resolution using deep convolutional networks. IEEE Trans. Pattern Anal. Mach. Intell. 38(2), 295\u2013307 (2016). https:\/\/doi.org\/10.1109\/TPAMI.2015.2439281","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"24","key":"12_CR7","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1016\/j.neucom.2019.05.006","volume":"359","author":"H Yao","year":"2019","unstructured":"Yao, H., Dai, F., Zhang, S.: DR2-Net: deep residual reconstruction network for image compressive sensing. Neurocomputing 359(24), 483\u2013493 (2019)","journal-title":"Neurocomputing"},{"issue":"11","key":"12_CR8","first-page":"2082","volume":"45","author":"Q Lian","year":"2019","unstructured":"Lian, Q., Fu, L., Chen, S., Shi, B.: A compressed sensing algorithm based on multi-scale residual reconstruction network. Acta Autom 45(11), 2082\u20132091 (2019)","journal-title":"Acta Autom"},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1109\/TIP.2019.2928136","volume":"29","author":"W Shi","year":"2020","unstructured":"Shi, W., Jiang, F., Liu, S., Zhao, D.: Image compressed sensing using convolutional neural network. IEEE Trans. Image Process. 29, 375\u2013388 (2020). https:\/\/doi.org\/10.1109\/TIP.2019.2928136","journal-title":"IEEE Trans. Image Process."},{"issue":"2","key":"12_CR10","first-page":"1","volume":"J10","author":"S Sun","year":"2018","unstructured":"Sun, S.: A novel Hyperchaotic image encryption scheme based on DNA encoding, pixel-level scrambling and bit-level scrambling. IEEE Photonics J10(2), 1\u201314 (2018)","journal-title":"IEEE Photonics"},{"issue":"3","key":"12_CR11","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1007\/s11554-018-0801-0","volume":"16","author":"F Li","year":"2018","unstructured":"Li, F., Wu, H., Zhou, G., Wei, W.: Robust real-time image encryption with aperiodic chaotic map and random-cycling bit shift. J. Real-Time Image Proc. 16(3), 775\u2013790 (2018). https:\/\/doi.org\/10.1007\/s11554-018-0801-0","journal-title":"J. Real-Time Image Proc."},{"key":"12_CR12","doi-asserted-by":"publisher","first-page":"9896","DOI":"10.1109\/ACCESS.2019.2963717","volume":"8","author":"Y Guo","year":"2020","unstructured":"Guo, Y., Jing, S., Zhou, Y., Xin, X., Wei, L.: An image encryption algorithm based on logistic-Fibonacci cascade chaos and 3D bit scrambling. IEEE Access 8, 9896\u20139912 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2019.2963717","journal-title":"IEEE Access"},{"issue":"2","key":"12_CR13","doi-asserted-by":"publisher","first-page":"2191","DOI":"10.1007\/s11042-017-4370-1","volume":"77","author":"D Zhang","year":"2017","unstructured":"Zhang, D., Liao, X., Yang, B., Zhang, Y.: A fast and efficient approach to color-image encryption based on compressive sensing and fractional Fourier transform. Multimedia Tools Appl. 77(2), 2191\u20132208 (2017). https:\/\/doi.org\/10.1007\/s11042-017-4370-1","journal-title":"Multimedia Tools Appl."},{"issue":"20","key":"12_CR14","doi-asserted-by":"publisher","first-page":"200501","DOI":"10.7498\/aps.68.20190553","volume":"68","author":"H Shi","year":"2019","unstructured":"Shi, H., Wang, L.-D.: Multi-process image encryption scheme based on compressed sensing and multi-dimensional chaotic system. Acta Physica Sinica 68(20), 200501 (2019). https:\/\/doi.org\/10.7498\/aps.68.20190553","journal-title":"Acta Physica Sinica"},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.optlaseng.2019.03.006","volume":"121","author":"L Gong","year":"2019","unstructured":"Gong, L., Qiu, K., Deng, C., Zhou, N.: An optical image compression and encryption scheme based on compressive sensing and RSA algorithm. Opt. Lasers Eng 121, 169\u2013180 (2019)","journal-title":"Opt. Lasers Eng"},{"issue":"3","key":"12_CR16","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/s10589-013-9576-1","volume":"56","author":"C Li","year":"2013","unstructured":"Li, C., Yin, W., Jiang, H., Zhang, Y.: An efficient augmented Lagrangian method with applications to total variation minimization. Comput. Opt. Appl. 56(3), 507\u2013530 (2013). https:\/\/doi.org\/10.1007\/s10589-013-9576-1","journal-title":"Comput. Opt. Appl."},{"issue":"8","key":"12_CR17","doi-asserted-by":"publisher","first-page":"3618","DOI":"10.1109\/TIP.2014.2329449","volume":"23","author":"W Dong","year":"2014","unstructured":"Dong, W., Shi, G., Li, X., Ma, Y., Huang, F.: Compressive sensing via nonlocal low-rank regularization. IEEE Trans. Image Process 23(8), 3618\u20133632 (2014)","journal-title":"IEEE Trans. Image Process"},{"issue":"9","key":"12_CR18","doi-asserted-by":"publisher","first-page":"5117","DOI":"10.1109\/TIT.2016.2556683","volume":"62","author":"CA Metzler","year":"2016","unstructured":"Metzler, C.A., Maleki, A., Baraniuk, R.G.: From denoising to compressed sensing. IEEE Trans. Inf. Theory 62(9), 5117\u20135144 (2016)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"7","key":"12_CR19","doi-asserted-by":"publisher","first-page":"710002","DOI":"10.3788\/gzxb20204907.0710002","volume":"49","author":"Y Guo","year":"2020","unstructured":"Guo, Y., Jing, S.: Lossless compression optical image encryption based on L-L cascade chaos and vector decomposition. Acta Photon. Sin 49(7), 710002\u20130710002 (2020)","journal-title":"Acta Photon. Sin"},{"key":"12_CR20","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","volume":"222","author":"Y Wu","year":"2013","unstructured":"Wu, Y., Zhou, Y., Saveriades, G., Agaian, S., Noonan, J.P., Natarajan, P.: Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci 222, 323\u2013342 (2013)","journal-title":"Inf. Sci"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Belazi, A., EI-Latif, A.A.A., Belghith, S.: A novel image encryption scheme based on substitution-permutation network and chaos. Sign. Process, 128, 155\u2013170 (2016)","DOI":"10.1016\/j.sigpro.2016.03.021"},{"key":"12_CR22","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua, Z., Zhou, Y., Pun, C., Chen, C.L.P.: 2D sine logistic modulation map for image encryption. Inf. Sci 297, 80\u201394 (2015)","journal-title":"Inf. Sci"},{"issue":"24","key":"12_CR23","doi-asserted-by":"publisher","first-page":"6590","DOI":"10.1016\/j.ijleo.2013.05.092","volume":"124","author":"X Liu","year":"2013","unstructured":"Liu, X., Cao, Y., Lu, P., Lu, X., Li, Y.: Optical image encryption technique based on compressed sensing and Arnold transformation. Optik-Int. J. Light Electron Opt. 124(24), 6590\u20136593 (2013)","journal-title":"Optik-Int. J. Light Electron Opt."},{"issue":"11","key":"12_CR24","doi-asserted-by":"publisher","first-page":"7111","DOI":"10.1007\/s00521-018-3541","volume":"31","author":"Z-H Gan","year":"2018","unstructured":"Gan, Z.-H., Chai, X., Han, D.-J., Chen, Y.-R.: A chaotic image encryption algorithm based on 3-D bitlane permutation. Neural Comput. Appl. 31(11), 7111\u20137130 (2018). https:\/\/doi.org\/10.1007\/s00521-018-3541","journal-title":"Neural Comput. Appl."},{"key":"12_CR25","doi-asserted-by":"publisher","first-page":"9896","DOI":"10.1109\/ACCESS.2019.2963717","volume":"8","author":"Y Guo","year":"2020","unstructured":"Guo, Y., Jing, S., Zhou, Y., Xu, X., Wei, L.: An image encryption algorithm based on logistic-Fibonacci cascade chaos and 3D bit scrambling. IEEE Access 8, 9896\u20139912 (2020)","journal-title":"IEEE Access"},{"issue":"24","key":"12_CR26","first-page":"99","volume":"69","author":"W Chen","year":"2020","unstructured":"Chen, W., Guo, Y., Jing, S.W.: A generalized image encryption algorithm based on deep learning compressed perception and composite chaotic system. J. Phys. 69(24), 99\u2013111 (2020)","journal-title":"J. Phys."}],"container-title":["Communications in Computer and Information Science","Wireless Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-8174-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:21:47Z","timestamp":1638451307000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-8174-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811681738","9789811681745"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-8174-5_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CWSN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China Conference on Wireless Sensor Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guilin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cwsn2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.ccf.org.cn\/web\/html5\/index.html?globalId=m8310963194006118401618190403568&type=1","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conference website","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}