{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T19:37:39Z","timestamp":1771961859365,"version":"3.50.1"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2018,11,29]],"date-time":"2018-11-29T00:00:00Z","timestamp":1543449600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["41571417"],"award-info":[{"award-number":["41571417"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1604145"],"award-info":[{"award-number":["U1604145"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Science Foundation of the United States","award":["CNS-1253424"],"award-info":[{"award-number":["CNS-1253424"]}]},{"name":"National Science Foundation of the United States","award":["ECCS-1202225"],"award-info":[{"award-number":["ECCS-1202225"]}]},{"name":"Science and Technology Foundation of Henan Province of China","award":["182102210027"],"award-info":[{"award-number":["182102210027"]}]},{"name":"Science and Technology Foundation of Henan Province of China","award":["182102410051"],"award-info":[{"award-number":["182102410051"]}]},{"DOI":"10.13039\/501100010246","name":"Postdoctoral Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["2018T110723"],"award-info":[{"award-number":["2018T110723"]}],"id":[{"id":"10.13039\/501100010246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010246","name":"Postdoctoral Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["2016M602235"],"award-info":[{"award-number":["2016M602235"]}],"id":[{"id":"10.13039\/501100010246","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Research Foundation of Henan University","award":["xxjc20140006"],"award-info":[{"award-number":["xxjc20140006"]}]},{"name":"Education Commission of Henan Province","award":["19A413001"],"award-info":[{"award-number":["19A413001"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s00521-018-3913-3","type":"journal-article","created":{"date-parts":[[2018,11,29]],"date-time":"2018-11-29T16:16:07Z","timestamp":1543508167000},"page":"4961-4988","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":110,"title":["An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata"],"prefix":"10.1007","volume":"32","author":[{"given":"Xiuli","family":"Chai","sequence":"first","affiliation":[]},{"given":"Xianglong","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Zhihua","family":"Gan","sequence":"additional","affiliation":[]},{"given":"Yushu","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4066-0826","authenticated-orcid":false,"given":"Yang","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Yiran","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,29]]},"reference":[{"key":"3913_CR1","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.sigpro.2018.06.008","volume":"153","author":"JH Wu","year":"2018","unstructured":"Wu JH, Liao XF, Yang B (2018) Image encryption using 2D Henon-Sine map and DNA approach. Signal Process 153:11\u201323","journal-title":"Signal Process"},{"key":"3913_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-017-2993-9","author":"XL Chai","year":"2017","unstructured":"Chai XL, Gan ZH, Yuan K, Chen YR, Liu XX (2017) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput Appl. \nhttps:\/\/doi.org\/10.1007\/s00521-017-2993-9","journal-title":"Neural Comput Appl"},{"key":"3913_CR3","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","volume":"90","author":"AY Niyat","year":"2017","unstructured":"Niyat AY, Moattar MH, Torshiz MN (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Laser Eng 90:225\u2013237","journal-title":"Opt Laser Eng"},{"key":"3913_CR4","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1016\/j.sigpro.2017.10.004","volume":"144","author":"ZY Hua","year":"2018","unstructured":"Hua ZY, Yi S, Zhou YC (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134\u2013144","journal-title":"Signal Process"},{"issue":"3","key":"3913_CR5","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1007\/s11071-013-1086-2","volume":"75","author":"XY Wang","year":"2014","unstructured":"Wang XY, Wang Q (2014) A novel image encryption algorithm based on dynamic S-boxes constructed by chaos. Nonlinear Dyn 75(3):567\u2013576","journal-title":"Nonlinear Dyn"},{"key":"3913_CR6","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.sigpro.2015.01.016","volume":"113","author":"HJ Liu","year":"2015","unstructured":"Liu HJ, Kadir A (2015) Asymmetric color image encryption scheme using 2D discrete-time map. Signal Process 113:104\u2013112","journal-title":"Signal Process"},{"issue":"7","key":"3913_CR7","doi-asserted-by":"crossref","first-page":"266","DOI":"10.3390\/sym10070266","volume":"10","author":"M Ahmad","year":"2018","unstructured":"Ahmad M, Al Solami E, Wang XY et al (2018) Cryptanalysis of an image encryption algorithm based on combined chaos for a BAN system, and improved scheme using SHA-512 and hyperchaos. Symmetry 10(7):266","journal-title":"Symmetry"},{"key":"3913_CR8","first-page":"1","volume":"6","author":"WY Wen","year":"2016","unstructured":"Wen WY, Zhang YS, Fang YM, Fang ZJ (2016) Image salient regions encryption for generating visually meaningful ciphertext image. Neural Comput Appl 6:1\u201311","journal-title":"Neural Comput Appl"},{"issue":"1","key":"3913_CR9","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/0161-118991863745","volume":"13","author":"R Matthews","year":"1989","unstructured":"Matthews R (1989) On the derivation of a chaotic encryption algorithm. Cryptologia 13(1):29\u201342","journal-title":"Cryptologia"},{"issue":"4","key":"3913_CR10","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"XY Wang","year":"2012","unstructured":"Wang XY, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101\u20131108","journal-title":"Signal Process"},{"key":"3913_CR11","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak C, Huang LL (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129\u2013137","journal-title":"Signal Process"},{"key":"3913_CR12","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.asoc.2015.08.008","volume":"37","author":"XJ Wu","year":"2015","unstructured":"Wu XJ, Kan HB, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24\u201339","journal-title":"Appl Soft Comput"},{"key":"3913_CR13","doi-asserted-by":"crossref","first-page":"1545","DOI":"10.1007\/s11071-014-1533-8","volume":"78","author":"CQ Li","year":"2014","unstructured":"Li CQ, Xie T, Liu Q, Cheng G (2014) Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn 78:1545\u20131551","journal-title":"Nonlinear Dyn"},{"issue":"8","key":"3913_CR14","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1016\/j.image.2014.04.001","volume":"29","author":"R Boriga","year":"2014","unstructured":"Boriga R, D\u0103sc\u0103lescu AC, Priescu I (2014) A new hyperchaotic map and its application in an image encryption scheme. Signal Process Image Commun 29(8):887\u2013901","journal-title":"Signal Process Image Commun"},{"issue":"18","key":"3913_CR15","doi-asserted-by":"crossref","first-page":"3596","DOI":"10.1016\/j.ijleo.2012.11.018","volume":"124","author":"Q Zhang","year":"2013","unstructured":"Zhang Q, Guo L, Wei XP (2013) A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik 124(18):3596\u20133600","journal-title":"Optik"},{"key":"3913_CR16","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"YC Zhou","year":"2014","unstructured":"Zhou YC, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172\u2013182","journal-title":"Signal Process"},{"issue":"15","key":"3913_CR17","doi-asserted-by":"crossref","first-page":"16511","DOI":"10.1007\/s11042-016-3925-x","volume":"76","author":"LF Liu","year":"2017","unstructured":"Liu LF, Miao SX (2017) An image encryption algorithm based on Baker map with varying parameter. Multimed Tools Appl 76(15):16511\u201316527","journal-title":"Multimed Tools Appl"},{"key":"3913_CR18","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.optlaseng.2017.04.009","volume":"96","author":"R Zahmoul","year":"2017","unstructured":"Zahmoul R, Ejbali R, Zaied M (2017) Image encryption based on new Beta chaotic maps. Opt Lasers Eng 96:39\u201349","journal-title":"Opt Lasers Eng"},{"issue":"4","key":"3913_CR19","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MMUL.2011.54","volume":"19","author":"ALA Dalhoum","year":"2012","unstructured":"Dalhoum ALA, Mahafzah BA, Awwad AA, Aldhamari I, Ortega A, Alfonseca M (2012) Digital image scrambling using 2D cellular automata. IEEE Multimedia 19(4):28\u201336","journal-title":"IEEE Multimedia"},{"issue":"3","key":"3913_CR20","doi-asserted-by":"crossref","first-page":"1803","DOI":"10.1007\/s11042-012-1306-7","volume":"71","author":"A Madain","year":"2014","unstructured":"Madain A, Dalhoum ALA, Hiary H, Ortega A, Alfonseca M (2014) Audio scrambling technique based on cellular automata. Multimed Tools Appl 71(3):1803\u20131822","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"3913_CR21","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/0196-8858(86)90028-X","volume":"7","author":"S Wolfram","year":"1986","unstructured":"Wolfram S (1986) Random sequence generation by cellular automata. Adv Appl Math 7(2):123\u2013169","journal-title":"Adv Appl Math"},{"issue":"6","key":"3913_CR22","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1016\/j.image.2010.03.002","volume":"25","author":"RJ Chen","year":"2010","unstructured":"Chen RJ, Horng SJ (2010) Novel SCAN-CA-based image security system using SCAN and 2-D von Neumann cellular automata. Signal Process Image Commun 25(6):413\u2013426","journal-title":"Signal Process Image Commun"},{"issue":"4","key":"3913_CR23","doi-asserted-by":"crossref","first-page":"2449","DOI":"10.1007\/s11071-014-1824-0","volume":"79","author":"XY Wang","year":"2015","unstructured":"Wang XY, Xu DH (2015) A novel image encryption scheme using chaos and Langton\u2019s Ant cellular automaton. Nonlinear Dyn 79(4):2449\u20132456","journal-title":"Nonlinear Dyn"},{"issue":"24","key":"3913_CR24","doi-asserted-by":"crossref","first-page":"17019","DOI":"10.1007\/s11042-015-2972-z","volume":"75","author":"ALA Dalhoum","year":"2016","unstructured":"Dalhoum ALA, Madain A, Hiary H (2016) Digital image scrambling based on elementary cellular automata. Multimed Tools Appl 75(24):17019\u201317034","journal-title":"Multimed Tools Appl"},{"key":"3913_CR25","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/j.sigpro.2018.04.018","volume":"150","author":"P Ping","year":"2018","unstructured":"Ping P, Wu JJ, Mao YC, Xu F, Fan JY (2018) Design of image cipher using life-like cellular automata and chaotic map. Signal Process 150:233\u2013247","journal-title":"Signal Process"},{"key":"3913_CR26","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.optlastec.2016.02.018","volume":"82","author":"NR Zhou","year":"2016","unstructured":"Zhou NR, Pan SM, Cheng S, Zhou ZH (2016) Image compression\u2013encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121\u2013133","journal-title":"Opt Laser Technol"},{"issue":"24","key":"3913_CR27","doi-asserted-by":"crossref","first-page":"6590","DOI":"10.1016\/j.ijleo.2013.05.092","volume":"124","author":"XY Liu","year":"2013","unstructured":"Liu XY, Cao YP, Lu P, Lu X, Li Y (2013) Optical image encryption technique based on compressed sensing and Arnold transformation. Optik 124(24):6590\u20136593","journal-title":"Optik"},{"key":"3913_CR28","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.optlastec.2014.02.015","volume":"62","author":"NR Zhou","year":"2014","unstructured":"Zhou NR, Zhang AD, Zheng F, Gong LH (2014) Novel image compression \u2013encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt Laser Technol 62:152\u2013160","journal-title":"Opt Laser Technol"},{"issue":"11","key":"3913_CR29","first-page":"1234","volume":"26","author":"YS Zhang","year":"2016","unstructured":"Zhang YS, Zhou JT, Chen F, Zhang LY, Xiao D, Chen B, Liao XF (2016) A block compressive sensing based scalable encryption framework for protecting significant image regions. Int J Bifurcat Chaos 26(11):1234\u20131247","journal-title":"Int J Bifurcat Chaos"},{"key":"3913_CR30","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.optcom.2014.12.084","volume":"343","author":"NR Zhou","year":"2015","unstructured":"Zhou NR, Li HL, Wang D, Pan SM, Zhou ZH (2015) Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun 343:10\u201321","journal-title":"Opt Commun"},{"key":"3913_CR31","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.sigpro.2016.11.016","volume":"134","author":"XL Chai","year":"2017","unstructured":"Chai XL, Gan ZH, Chen YR, Zhang YS (2017) A visually secure image encryption scheme based on compressive sensing. Signal Process 134:35\u201351","journal-title":"Signal Process"},{"key":"3913_CR32","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.sigpro.2018.02.007","volume":"148","author":"XL Chai","year":"2018","unstructured":"Chai XL, Zheng XY, Gan ZH, Han DJ, Chen YR (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124\u2013144","journal-title":"Signal Process"},{"key":"3913_CR33","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.jvcir.2017.01.022","volume":"44","author":"GQ Hu","year":"2017","unstructured":"Hu GQ, Xiao D, Wang Y, Xiang T (2017) An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications. J Vis Commun Image R 44:116\u2013127","journal-title":"J Vis Commun Image R"},{"issue":"3","key":"3913_CR34","first-page":"605","volume":"26","author":"YR Liang","year":"2015","unstructured":"Liang YR, Wu JH (2015) Image encryption based on compressive sensing and variable-parameter chaotic mapping. J Optoelectron Laser 26(3):605\u2013610","journal-title":"J Optoelectron Laser"},{"issue":"6","key":"3913_CR35","doi-asserted-by":"crossref","first-page":"1585","DOI":"10.1142\/S0218127495001198","volume":"5","author":"A Baranovsky","year":"1995","unstructured":"Baranovsky A, Daems D (1995) Design of one-dimensional chaotic maps with prescribed statistical properties. Int J Bifurcat Chaos 5(6):1585\u20131598","journal-title":"Int J Bifurcat Chaos"},{"key":"3913_CR36","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.optlaseng.2015.03.007","volume":"71","author":"R Enayatifar","year":"2015","unstructured":"Enayatifar R, Sadaei HJ, Abdullah AH, Lee M, Isnin IF (2015) A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Opt Lasers Eng 71:33\u201341","journal-title":"Opt Lasers Eng"},{"key":"3913_CR37","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.optlaseng.2017.08.018","volume":"100","author":"XW Li","year":"2018","unstructured":"Li XW, Xiao D, Wang QH (2018) Error-free holographic frames encryption with CA pixel-permutation encoding algorithm. Opt Lasers Eng 100:200\u2013207","journal-title":"Opt Lasers Eng"},{"key":"3913_CR38","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","volume":"90","author":"AY Niyat","year":"2017","unstructured":"Niyat AY, Moattar MH, Torshiz MN (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng 90:225\u2013237","journal-title":"Opt Lasers Eng"},{"key":"3913_CR39","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.optlastec.2016.05.012","volume":"84","author":"TH Chen","year":"2016","unstructured":"Chen TH, Zhang M, Wu JH, Yuen C, Tong Y (2016) Image encryption and compression based on kronecker compressed sensing and elementary cellular automata scrambling. Opt Laser Technol 84:118\u2013133","journal-title":"Opt Laser Technol"},{"key":"3913_CR40","doi-asserted-by":"crossref","first-page":"1466","DOI":"10.1109\/12.35843","volume":"38","author":"PD Hortensius","year":"1989","unstructured":"Hortensius PD, McLeod RD, Card HC (1989) Parallel random number generation for VLSI systems using cellular automata. IEEE Trans Comput 38:1466\u20131473","journal-title":"IEEE Trans Comput"},{"key":"3913_CR41","doi-asserted-by":"crossref","first-page":"1346","DOI":"10.1109\/12.338094","volume":"43","author":"S Nandi","year":"1994","unstructured":"Nandi S, Kar BK, Chaudhuri PP (1994) Theory and applications of cellular automata in cryptography. IEEE Trans Comput 43:1346\u20131357","journal-title":"IEEE Trans Comput"},{"key":"3913_CR42","unstructured":"Tomassini M, Perrenoud M (2000) Stream ciphers with one- and two-dimensional cellular automata. In: Parallel problem solving from nature-PPSN VI, LNCS, vol 1917, pp 722\u2013731"},{"issue":"6","key":"3913_CR43","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1088\/1674-1056\/24\/6\/060505","volume":"24","author":"D Xiao","year":"2015","unstructured":"Xiao D, Cai HK, Zheng HY (2015) A joint image encryption and watermarking algorithm based on compressive sensing and chaotic map. Chin Phys B 24(6):198\u2013206","journal-title":"Chin Phys B"},{"key":"3913_CR44","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.ijleo.2017.07.063","volume":"147","author":"D Ponnaian","year":"2017","unstructured":"Ponnaian D, Chandranbabu K (2017) Cryptanalysis of an image compression\u2013encryption algorithm and a modified scheme using compressive sensing. Optik 147:263\u2013276","journal-title":"Optik"},{"issue":"4","key":"3913_CR45","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"DL Donoho","year":"2006","unstructured":"Donoho DL (2006) Compressed sensing. IEEE T Inform Theory 52(4):1289\u20131306","journal-title":"IEEE T Inform Theory"},{"key":"3913_CR46","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.optlastec.2017.09.008","volume":"99","author":"JX Chen","year":"2018","unstructured":"Chen JX, Zhang Y, Qi L, Fu C, Xu LS (2018) Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression. Opt Laser Technol 99:238\u2013248","journal-title":"Opt Laser Technol"},{"key":"3913_CR47","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.comcom.2018.01.001","volume":"117","author":"XG Wu","year":"2018","unstructured":"Wu XG, Tang SJ, Yang PL, Xiang CC, Zheng X (2018) Cloud is safe when compressive: efficient image privacy protection via shuffling enabled compressive sensing. Comput Commun 117:36\u201345","journal-title":"Comput Commun"},{"key":"3913_CR48","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.optcom.2017.08.047","volume":"407","author":"LH Ma","year":"2018","unstructured":"Ma LH, Jin WM (2018) Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer generated holography. Opt Commun 407:51\u201356","journal-title":"Opt Commun"},{"issue":"4","key":"3913_CR49","doi-asserted-by":"crossref","first-page":"2040","DOI":"10.1109\/TIT.2011.2177632","volume":"58","author":"E Liu","year":"2012","unstructured":"Liu E, Temlyakov VN (2012) The orthogonal super greedy algorithm and application in compressed sensing. IEEE T Inform Theory 58(4):2040\u20132047","journal-title":"IEEE T Inform Theory"},{"issue":"1","key":"3913_CR50","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1109\/TSP.2008.2007606","volume":"57","author":"H Mohimani","year":"2009","unstructured":"Mohimani H, Babaie-Zadeh M, Jutten C (2009) A fast approach for overcomplete sparse decomposition based on smoothed L0 norm. IEEE T Signal Process 57(1):289\u2013301","journal-title":"IEEE T Signal Process"},{"key":"3913_CR51","first-page":"115","volume":"65","author":"Amit Satish Unde","year":"2018","unstructured":"Unde Amit Satish, Deepthi PP (2018) Rate-distortion analysis of structured sensing matrices for block compressive sensing of images. Signal Process. Image\u00a065:115\u2013127","journal-title":"Image"},{"key":"3913_CR52","doi-asserted-by":"crossref","first-page":"5406","DOI":"10.1109\/TIT.2006.885507","volume":"52","author":"EJ Candes","year":"2006","unstructured":"Candes EJ, Tao T (2006) Near-optimal signal recovery from random projections: universal encoding strategies? IEEE Trans Inf Theory 52:5406\u20135425","journal-title":"IEEE Trans Inf Theory"},{"key":"3913_CR53","unstructured":"Gan L (2007) Block compressed sensing of natural images. In: 15th IEEE international conference on digital signal processing, pp 403\u2013406"},{"key":"3913_CR54","first-page":"36","volume":"11","author":"Safavi Seyed Hamid","year":"2017","unstructured":"Hamid Safavi Seyed, Farah Torkamani-Azar (2017) Sparsity-aware adaptive block-based compressive sensing. IET. Signal Process 11:36\u201342","journal-title":"Signal Process"},{"key":"3913_CR55","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.image.2017.03.004","volume":"55","author":"KQ Dinh","year":"2017","unstructured":"Dinh KQ, Shim HJ, Jeon B (2017) Small-block sensing and larger-block recovery in block-based compressive sensing of images. Signal Process Image\u00a055:10\u201322","journal-title":"Signal Process Image"},{"issue":"4","key":"3913_CR56","doi-asserted-by":"crossref","first-page":"2333","DOI":"10.1007\/s11071-016-2648-x","volume":"84","author":"XJ Tong","year":"2016","unstructured":"Tong XJ, Zhang M, Wang Z, Ma J (2016) A joint color image encryption and compression scheme based on hyper-chaotic system. Nonlinear Dyn 84(4):2333\u20132356","journal-title":"Nonlinear Dyn"},{"key":"3913_CR57","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.ins.2017.02.036","volume":"396","author":"ZY Hua","year":"2017","unstructured":"Hua ZY, Zhou YC (2017) Design of image cipher using block-based scrambling and image filtering. Inf Sci 396:97\u2013113","journal-title":"Inf Sci"},{"issue":"8","key":"3913_CR58","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li SJ (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 16(8):2129\u20132151","journal-title":"Int J Bifurcat Chaos"},{"key":"3913_CR59","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1016\/j.eswa.2016.02.001","volume":"54","author":"AMD Rey","year":"2016","unstructured":"Rey AMD, Pastora JLH, S\u00e1nchez GR (2016) 3D medical data security protection. Expert Syst Appl 54:379\u2013386","journal-title":"Expert Syst Appl"},{"key":"3913_CR60","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","volume":"83","author":"R Guesmi","year":"2016","unstructured":"Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2. Nonlinear Dyn 83:1123\u20131136","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"3913_CR61","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","volume":"285","author":"CX Zhu","year":"2012","unstructured":"Zhu CX (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29\u201337","journal-title":"Opt Commun"},{"key":"3913_CR62","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.1007\/s11071-018-4251-9","volume":"93","author":"YL Luo","year":"2018","unstructured":"Luo YL, Zhou RL, Liu JX, Cao Y, Ding XM (2018) A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map. Nonlinear Dyn 93:1165\u20131181","journal-title":"Nonlinear Dyn"},{"key":"3913_CR63","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/j.image.2016.12.007","volume":"52","author":"XL Chai","year":"2017","unstructured":"Chai XL, Gan ZH, Yang K, Chen YR, Liu XX (2017) An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process Image\u00a052:6\u201319","journal-title":"Signal Process Image"},{"key":"3913_CR64","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.sigpro.2016.10.002","volume":"132","author":"Y Xie Eric","year":"2017","unstructured":"Xie Eric Y, Li CQ, Yu SM, Lu JH (2017) On the cryptanalysis of Fridrich\u2019s chaotic image encryption scheme. Signal Process 132:150\u2013154","journal-title":"Signal Process"},{"key":"3913_CR65","doi-asserted-by":"publisher","DOI":"10.1109\/mmul.2018.2873472","author":"CQ Li","year":"2018","unstructured":"Li CQ, Lin DD, L\u00fc JH, Hao F (2018) Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE Multimedia. \nhttps:\/\/doi.org\/10.1109\/mmul.2018.2873472","journal-title":"IEEE Multimedia"},{"key":"3913_CR66","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/s11071-011-0006-6","volume":"67","author":"O Mirzaei","year":"2012","unstructured":"Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67:557\u2013566","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"3913_CR67","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s11042-012-1331-6","volume":"72","author":"XL Huang","year":"2014","unstructured":"Huang XL, Ye GD (2014) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed Tools Appl 72(1):57\u201370","journal-title":"Multimed Tools Appl"},{"issue":"11\u201312","key":"3913_CR68","doi-asserted-by":"crossref","first-page":"2028","DOI":"10.1016\/j.mcm.2010.06.005","volume":"52","author":"Q Zhang","year":"2010","unstructured":"Zhang Q, Guo L, Wei XP (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52(11\u201312):2028\u20132035","journal-title":"Math Comput Model"},{"issue":"2","key":"3913_CR69","first-page":"99","volume":"26","author":"XL Chai","year":"2017","unstructured":"Chai XL, Gan ZH, Yuan K, Lu Y, Chen YR (2017) An image encryption scheme based on three-dimensional Brownian motion and chaotic system. Chin Phys B 26(2):99\u2013113","journal-title":"Chin Phys B"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-018-3913-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-018-3913-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-018-3913-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,19]],"date-time":"2020-04-19T18:14:31Z","timestamp":1587320071000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-018-3913-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,29]]},"references-count":69,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["3913"],"URL":"https:\/\/doi.org\/10.1007\/s00521-018-3913-3","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,29]]},"assertion":[{"value":"4 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 November 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 November 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}