{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:42:49Z","timestamp":1765546969668,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T00:00:00Z","timestamp":1662681600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T00:00:00Z","timestamp":1662681600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s00530-022-00994-8","type":"journal-article","created":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T12:55:23Z","timestamp":1662728123000},"page":"305-321","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Image bit planes approximate reconstruction and encryption based on Gaussian function and multiple parameters chaos"],"prefix":"10.1007","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7280-3062","authenticated-orcid":false,"given":"Xikun","family":"Liang","sequence":"first","affiliation":[]},{"given":"Limin","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,9]]},"reference":[{"key":"994_CR1","volume-title":"Chaotic Digital Image Cryptosystem [M]","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y.: Chaotic Digital Image Cryptosystem [M]. Tsinghua University Press, Beijing (2016)"},{"key":"994_CR2","volume-title":"Application of Chaos Theory in Cryptography [M]","author":"FM Guo","year":"2015","unstructured":"Guo, F.M., Tu, L.: Application of Chaos Theory in Cryptography [M]. Beijing Institute of Technology Press, Beijing (2015)"},{"key":"994_CR3","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai, X., Chen, Y., Broyde, L.: A novel chaos-based image encryption algorithm using DNA sequence operations. Opt. Lasers Eng. 88, 197\u2013213 (2017)","journal-title":"Opt. Lasers Eng."},{"key":"994_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2020.106171","volume":"127","author":"Y Liu","year":"2020","unstructured":"Liu, Y., Jiang, Z., Xu, X., et al.: Optical image encryption algorithm based on hyper-chaos and public-key cryptography. Opt. Laser Technol. 127, 106171 (2020)","journal-title":"Opt. Laser Technol."},{"key":"994_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2019.105995","volume":"128","author":"SC Wang","year":"2019","unstructured":"Wang, S.C., Wang, C.H., Xu, C.: An image encryption algorithm based on a hidden attractor chaos system and the Knuth-Durstenfeld algorithm. Opt. Lasers Eng. 128, 105995 (2019)","journal-title":"Opt. Lasers Eng."},{"key":"994_CR6","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1016\/j.optlastec.2018.04.030","volume":"106","author":"H Xue","year":"2018","unstructured":"Xue, H., Du, J., Li, S., et al.: Region of interest encryption for color images based on a hyper chaotic system with three positive Lyapunov exponents. Opt. Laser Technol. 106, 506\u2013516 (2018)","journal-title":"Opt. Laser Technol."},{"key":"994_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2019.105821","volume":"124","author":"ZJ Huang","year":"2019","unstructured":"Huang, Z.J., Cheng, S., Gong, L.H., et al.: Nonlinear optical multi-image encryption scheme \nwith two-dimensional linear canonical transform. Opt. Lasers Eng. 124, 105821 (2019)","journal-title":"Opt. Lasers Eng."},{"key":"994_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106042","volume":"128","author":"Y Su","year":"2020","unstructured":"Su, Y., Xu, W., Zhao, J.: Optical image encryption based on chaotic fingerprint phase mask and pattern-illuminated Fourier ptychography. Opt. Lasers Eng. 128, 106020 (2020)","journal-title":"Opt. Lasers Eng."},{"key":"994_CR9","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.optlaseng.2016.10.012","volume":"91","author":"L Xu","year":"2017","unstructured":"Xu, L., Guo, X., Li, Z., et al.: A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt. Lasers Eng. 91, 41\u201352 (2017)","journal-title":"Opt. Lasers Eng."},{"issue":"6","key":"994_CR10","doi-asserted-by":"publisher","first-page":"19540221","DOI":"10.1142\/S0218001419540223","volume":"33","author":"X Liang","year":"2019","unstructured":"Liang, X., Tan, X., Tao, L., et al.: Image hybrid encryption based on matrix nonlinear operation and generalized Arnold transformation. Int. J. Pattern Recogn. Artif. Intell. 33(6), 19540221\u2013195402217 (2019)","journal-title":"Int. J. Pattern Recogn. Artif. Intell."},{"key":"994_CR11","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.ins.2018.03.055","volume":"450","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y.: The unified image encryption algorithm based on chaos and cubic S-Box. Inf. Sci. 450, 361\u2013377 (2018)","journal-title":"Inf. Sci."},{"key":"994_CR12","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"Z Hua","year":"2019","unstructured":"Hua, Z., Zhou, Y., Huang, H.: Cosine-transform-based chaotic system for image encryption. Inf. Sci. 480, 403\u2013419 (2019)","journal-title":"Inf. Sci."},{"key":"994_CR13","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.ins.2020.02.008","volume":"520","author":"A Mansouri","year":"2020","unstructured":"Mansouri, A., Wang, X.: A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf. Sci. 520, 46\u201362 (2020)","journal-title":"Inf. Sci."},{"issue":"12","key":"994_CR14","doi-asserted-by":"publisher","first-page":"15851","DOI":"10.1007\/s11042-017-5159-y","volume":"77","author":"X Jin","year":"2018","unstructured":"Jin, X., Yin, S., Liu, N., Li, X., Zhao, G., Ge, S.: Color image encryption in non-RGB color spaces. Multimed. Tools Appl. 77(12), 15851\u201315873 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"994_CR15","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.ins.2020.03.054","volume":"526","author":"Y Zhang","year":"2020","unstructured":"Zhang, Y., Chen, A., Tang, Y., et al.: Plaintext-related image encryption algorithm based on perceptron-like network. Inf. Sci. 526, 180\u2013202 (2020)","journal-title":"Inf. Sci."},{"issue":"9","key":"994_CR16","doi-asserted-by":"publisher","first-page":"2137","DOI":"10.1109\/TIFS.2018.2812080","volume":"13","author":"M Preishuber","year":"2018","unstructured":"Preishuber, M., H\u00fctter, T., Katzenbeisser, S.: Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans. Inf. Forensics Secur. 13(9), 2137\u20132150 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"994_CR17","volume-title":"Fuzzy Mathematics Theory & Application [M]","author":"ZJ Jiang","year":"2015","unstructured":"Jiang, Z.J.: Fuzzy Mathematics Theory & Application [M]. Electronic Industry Press, Beijing (2015)"},{"unstructured":"Contour Detection and Image Segmentation Resources [DB\/OL]. https:\/\/www2.eecs.berkeley.edu\/Research\/Projects\/CS\/vision\/grouping\/resources.html, 2020","key":"994_CR18"},{"unstructured":"101_ObjectCategories, The Caltech 101 dataset [DB\/OL]. http:\/\/www.vision.caltech.edu\/Image_Datasets\/Caltech101\/Caltech101.html#Download, 2020","key":"994_CR19"},{"key":"994_CR20","volume-title":"Proficiency in MATLAB-Science Computation and the Application of Data Statistics [M]","author":"B Zhao","year":"2018","unstructured":"Zhao, B., Chen, M., Zou, F.S., et al.: Proficiency in MATLAB-Science Computation and the Application of Data Statistics [M]. Posts and Telecommunications Press, Beijing (2018)"},{"key":"994_CR21","volume-title":"MATLAB Image Processing [M]","author":"ChL Liu","year":"2017","unstructured":"Liu, Ch.L.: MATLAB Image Processing [M]. Tsinghua University Press, Beijing (2017)"},{"issue":"11","key":"994_CR22","doi-asserted-by":"publisher","first-page":"6303","DOI":"10.1007\/s11042-015-2573-x","volume":"75","author":"P Zhen","year":"2016","unstructured":"Zhen, P., Zhao, G., Min, L., Jin, X.: Chaos-based image encryption scheme combining DNA coding and entropy. Multimed. Tools Appl. 75(11), 6303\u20136319 (2016)","journal-title":"Multimed. Tools Appl."},{"issue":"8","key":"994_CR23","first-page":"753","volume":"7","author":"YC Chen","year":"2017","unstructured":"Chen, Y.C., Ye, R.S.: A novel image Encryption algorithm based on improved standard mapping. Comput. Sci. Appl. 7(8), 753\u2013773 (2017)","journal-title":"Comput. Sci. Appl."},{"unstructured":"Rukhin, A., Nechvatal, J., Smid M., et al.: A statistical test suite for random and pseudorandom number generator for cryptographic applications. Special Publication 800\u201322 Revision 1a. National Intitute of Standards and Technology (NIST). https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-22r1a.pdf, 2020","key":"994_CR24"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-022-00994-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-022-00994-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-022-00994-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T04:39:51Z","timestamp":1673584791000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-022-00994-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,9]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["994"],"URL":"https:\/\/doi.org\/10.1007\/s00530-022-00994-8","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"type":"print","value":"0942-4962"},{"type":"electronic","value":"1432-1882"}],"subject":[],"published":{"date-parts":[[2022,9,9]]},"assertion":[{"value":"13 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}