{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T02:55:32Z","timestamp":1769914532539,"version":"3.49.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T00:00:00Z","timestamp":1559865600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T00:00:00Z","timestamp":1559865600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s11036-019-01293-9","type":"journal-article","created":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T19:39:36Z","timestamp":1559936376000},"page":"1849-1861","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["Image Compression and Encryption Algorithm Based on Hyper-chaotic Map"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7774-2833","authenticated-orcid":false,"given":"Jun","family":"Mou","sequence":"first","affiliation":[]},{"given":"Feifei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Ran","family":"Chu","sequence":"additional","affiliation":[]},{"given":"Yinghong","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,7]]},"reference":[{"issue":"3","key":"1293_CR1","doi-asserted-by":"publisher","first-page":"1417","DOI":"10.1007\/s11071-015-2579-y","volume":"84","author":"X Wang","year":"2016","unstructured":"Wang X, Liu C, Xu D et al (2016) Image encryption scheme using chaos and simulated annealing algorithm[J]. Nonlinear Dynamics 84(3):1417\u20131429","journal-title":"Nonlinear Dynamics"},{"key":"1293_CR2","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.sigpro.2016.10.017","volume":"133","author":"S Yi","year":"2017","unstructured":"Yi S, Zhou Y (2017) Binary-Block Embedding for Reversible Data Hiding in Encrypted Images [J]. Signal Process 133:40\u201351","journal-title":"Signal Process"},{"issue":"8","key":"1293_CR3","doi-asserted-by":"publisher","first-page":"4753","DOI":"10.1007\/s11042-015-2501-0","volume":"75","author":"R Guesmi","year":"2016","unstructured":"Guesmi R, Farah MAB, Kachouri A et al (2016) Hash key-based image encryption using crossover operator and chaos[J]. Multimed Tools Appl 75(8):4753\u20134769","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"1293_CR4","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1080\/0161-118991863952","volume":"13","author":"R Matthews","year":"1989","unstructured":"Matthews R (1989) A rotor device for periodic and random-key encryption[J]. Cryptologia 13(3):266\u2013272","journal-title":"Cryptologia"},{"issue":"1","key":"1293_CR5","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s11071-016-3030-8","volume":"87","author":"C Li","year":"2017","unstructured":"Li C, Luo G, Qin K et al (2017) An image encryption scheme based on chaotic tent map[J]. Nonlinear Dyn 87(1):127\u2013133","journal-title":"Nonlinear Dyn"},{"key":"1293_CR6","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.chaos.2016.12.018","volume":"95","author":"\u00dc \u00c7avu\u015fo\u011flu","year":"2017","unstructured":"\u00c7avu\u015fo\u011flu \u00dc, Ka\u00e7ar S, Pehlivan I et al (2017) Secure image encryption algorithm design using a novel chaos based S-Box[J]. Chaos, Solitons Fractals 95:92\u2013101","journal-title":"Chaos, Solitons Fractals"},{"issue":"1","key":"1293_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11071-017-3436-y","volume":"89","author":"H Zhu","year":"2017","unstructured":"Zhu H, Zhang X, Yu H et al (2017) An image encryption algorithm based on compound homogeneous hyper-chaotic system[J]. Nonlinear Dyn 89(1):1\u201319","journal-title":"Nonlinear Dyn"},{"key":"1293_CR8","doi-asserted-by":"crossref","unstructured":"Luo Y, Zhou R, Liu J et al. (2018) A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map[J]. Nonlinear Dynamics, (5):1-17","DOI":"10.1007\/s11071-018-4251-9"},{"key":"1293_CR9","doi-asserted-by":"crossref","unstructured":"Zhu C, Sun K (2018) Cryptanalyzing and Improving a Novel Color Image Encryption Algorithm Using RT-Enhanced Chaotic Tent Maps [J]. IEEE Access, PP (99):1-1","DOI":"10.1109\/ACCESS.2017.2692043"},{"key":"1293_CR10","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.optlaseng.2014.12.025","volume":"68","author":"XY Wang","year":"2015","unstructured":"Wang XY, Gu SX, Zhang YQ (2015) Novel image encryption algorithm based on cycle shift and chaotic system[J]. Opt Lasers Eng 68:126\u2013134","journal-title":"Opt Lasers Eng"},{"issue":"2","key":"1293_CR11","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/j.cnsns.2014.05.022","volume":"20","author":"Y Luo","year":"2015","unstructured":"Luo Y, Du M, Liu J (2015) A symmetrical image encryption scheme in wavelet and time domain[J]. Commun Nonlinear Sci Numer Simul 20(2):447\u2013460","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"2","key":"1293_CR12","doi-asserted-by":"publisher","first-page":"1511","DOI":"10.1007\/s11071-014-1757-7","volume":"79","author":"C Zhu","year":"2015","unstructured":"Zhu C, Xu S, Hu Y et al (2015) Breaking a novel image encryption scheme based on Brownian motion and PWLCM chaotic system[J]. Nonlinear Dyn 79(2):1511\u20131518","journal-title":"Nonlinear Dyn"},{"issue":"11","key":"1293_CR13","doi-asserted-by":"publisher","first-page":"2028","DOI":"10.1016\/j.mcm.2010.06.005","volume":"52","author":"Q Zhang","year":"2010","unstructured":"Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps [J]. Math Comput Model 52(11):2028\u20132035","journal-title":"Math Comput Model"},{"issue":"3","key":"1293_CR14","doi-asserted-by":"publisher","first-page":"1269","DOI":"10.1007\/s11071-015-2234-7","volume":"82","author":"XY Wang","year":"2015","unstructured":"Wang XY, Zhang YQ, Zhao YY (2015) A novel image encryption scheme based on 2-D logistic map and DNA sequence operations[J]. Nonlinear Dyn 82(3):1269\u20131280","journal-title":"Nonlinear Dyn"},{"issue":"C","key":"1293_CR15","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.sigpro.2016.12.008","volume":"134","author":"T Hu","year":"2017","unstructured":"Hu T, Liu Y, Gong LH et al (2017) Chaotic image cryptosystem using DNA deletion and DNA insertion[J]. Signal Process 134(C):234\u2013243","journal-title":"Signal Process"},{"key":"1293_CR16","doi-asserted-by":"crossref","unstructured":"Zhang L M, Sun K H, Liu W H, et al. (2017) A novel color image encryption scheme using fractional-order hyperchaotic system and DNA sequence operations [J], 26 (10): 98-106","DOI":"10.1088\/1674-1056\/26\/10\/100504"},{"issue":"4","key":"1293_CR17","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"DL Donoho","year":"2006","unstructured":"Donoho DL (2006) Compressed sensing[J]. IEEE Trans Inf Theory 52(4):1289\u20131306","journal-title":"IEEE Trans Inf Theory"},{"key":"1293_CR18","unstructured":"Xiaowei MA (2015) Improvement of OMP Image Reconstruction Algorithm Based on Compressed Sensing [J]. Electronic Science & Technology"},{"issue":"3","key":"1293_CR19","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.acha.2008.07.002","volume":"26","author":"D Needell","year":"2009","unstructured":"Needell D, Tropp JA (2009) CoSaMP: Iterative Signal Recovery From Incomplete and Inaccurate Samples[J]. Appl Comput Harmon Anal 26(3):301\u2013321","journal-title":"Appl Comput Harmon Anal"},{"key":"1293_CR20","unstructured":"Lin NI (2001) Lossless Compression of Multispectral Remote Sensing Images Based on Improved SP[J]. Acta Electronica Sinica"},{"key":"1293_CR21","doi-asserted-by":"crossref","unstructured":"Figueiredo MAT, Nowak RD, Wright SJ (2007) Gradient projection for sparse reconstruction: Application to compressed sensing and other inverse problems[C]\/\/ IEEE Journal of Selected Topics in Signal Processing. IEEE Journal of Selected Topics in Signal Processing, 586 \u2013 597","DOI":"10.1109\/JSTSP.2007.910281"},{"issue":"2","key":"1293_CR22","first-page":"1952","volume":"2","author":"F Krzakala","year":"2011","unstructured":"Krzakala F, M\u00e9zard M, Sausset F et al (2011) Statistical physics-based reconstruction in compressed sensing [J]. Phys Rev X 2(2):1952\u20131954","journal-title":"Phys Rev X"},{"key":"1293_CR23","doi-asserted-by":"crossref","unstructured":"Efron B, Hastie T, Johnstone I et al. (2004) Rejoinder to \"Least angle regression\" by Efron et al [J]. Annals of Statistics, 32","DOI":"10.1214\/009053604000000067"},{"issue":"5","key":"1293_CR24","doi-asserted-by":"publisher","first-page":"2920","DOI":"10.1109\/TGRS.2012.2218613","volume":"51","author":"L Poli","year":"2013","unstructured":"Poli L, Oliveri G, Rocca P et al (2013) Bayesian Compressive Sensing Approaches for the Reconstruction of Two-Dimensional Sparse Scatterers Under TE Illuminations[J]. IEEE Trans Geosci Remote Sens 51(5):2920\u20132936","journal-title":"IEEE Trans Geosci Remote Sens"},{"key":"1293_CR25","first-page":"813","volume":"2008","author":"Y Rachlin","year":"2008","unstructured":"Rachlin Y, Baron D (2008) The secrecy of compressed sensing measurements [C]\/\/ Communication, Control, and Computing. Allerton Conference on IEEE 2008:813\u2013817","journal-title":"Allerton Conference on IEEE"},{"key":"1293_CR26","unstructured":"Mayiami MR, Seyfe B, Bafghi HG (2013) Perfect secrecy via compressed sensing[C]\/\/ Communication and Information Theory. IEEE, 1-5"},{"key":"1293_CR27","doi-asserted-by":"crossref","unstructured":"Liu X, Cao Y, Lu P et al (2013) Optical image encryption technique based on compressed sensing and Arnold transformation[J]. Optik - International Journal for Light and Electron Optics 124(24):6590\u20136593","DOI":"10.1016\/j.ijleo.2013.05.092"},{"issue":"7","key":"1293_CR28","doi-asserted-by":"publisher","first-page":"1782","DOI":"10.1364\/AO.54.001782","volume":"54","author":"B Kim","year":"2015","unstructured":"Kim B, Lee BG, Situ G et al (2015) Compressive sensing based robust multispectral double-image encryption[J]. Appl Opt 54(7):1782\u20131793","journal-title":"Appl Opt"},{"key":"1293_CR29","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.optlastec.2016.02.018","volume":"82","author":"N Zhou","year":"2016","unstructured":"Zhou N, Pan S, Cheng S et al (2016) Image compression\u2013encryption scheme based on hyper-chaotic system and 2D compressive sensing[J]. Opt Laser Technol 82:121\u2013133","journal-title":"Opt Laser Technol"},{"key":"1293_CR30","doi-asserted-by":"crossref","unstructured":"Chai X, Zheng X, Gan Z et al. (2018) An image encryption algorithm based on chaotic system and compressive sensing[J]. Signal Processing, 148","DOI":"10.1016\/j.sigpro.2018.02.007"},{"issue":"1","key":"1293_CR31","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s11042-012-1337-0","volume":"72","author":"R Huang","year":"2014","unstructured":"Huang R, Rhee KH, Uchida S (2014) A parallel image encryption method based on compressive sensing[J]. Multimed Tools Appl 72(1):71\u201393","journal-title":"Multimed Tools Appl"},{"issue":"23","key":"1293_CR32","doi-asserted-by":"publisher","first-page":"10393","DOI":"10.1007\/s11042-014-2172-2","volume":"74","author":"SN George","year":"2015","unstructured":"George SN, Augustine N, Pattathil DP (2015) Audio security through compressive sampling and cellular automata[J]. Multimed Tools Appl 74(23):10393\u201310417","journal-title":"Multimed Tools Appl"},{"key":"1293_CR33","doi-asserted-by":"crossref","unstructured":"George SN, Pattathil DP (2014) A secure LFSR based random measurement matrix for compressive sensing[J]. Sensing and Imaging 15(1):85\u2013240","DOI":"10.1007\/s11220-014-0085-9"},{"issue":"2","key":"1293_CR34","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1109\/TBME.2012.2226175","volume":"60","author":"Z Zhang","year":"2013","unstructured":"Zhang Z, Jung TP, Makeig S et al (2013) Compressed sensing for energy-efficient wireless telemonitoring of noninvasive fetal ECG via block sparse Bayesian learning[J]. IEEE Trans Biomed Eng 60(2):300\u2013309","journal-title":"IEEE Trans Biomed Eng"},{"key":"1293_CR35","doi-asserted-by":"crossref","unstructured":"Chen L, Sun X, Jiang H et al. (2014) A High-Performance Control Method of Constant V\/f-Controlled Induction Motor Drives for Electric Vehicles[J]. Mathematical Problems in Engineering, 2014, (2014-1-21), 2014(2):317-348","DOI":"10.1155\/2014\/386174"},{"issue":"11","key":"1293_CR36","doi-asserted-by":"publisher","first-page":"1750171","DOI":"10.1142\/S0218127417501711","volume":"27","author":"W Liu","year":"2017","unstructured":"Liu W, Sun K, He Y et al (2017) Color Image Encryption Using Three-Dimensional Sine ICMIC Modulation Map and DNA Sequence Operations[J]. Int J Bifurcation Chaos 27(11):1750171","journal-title":"Int J Bifurcation Chaos"},{"issue":"10","key":"1293_CR37","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.optlastec.2014.02.015","volume":"62","author":"N Zhou","year":"2014","unstructured":"Zhou N, Zhang A, Zheng F et al (2014) Novel image compression\u2013encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing[J]. Opt Laser Technol 62(10):152\u2013160","journal-title":"Opt Laser Technol"},{"key":"1293_CR38","unstructured":"Singh RK, Kumar B, Shaw DK et al. (2018) Level by level image compression-encryption algorithm based on Quantum chaos map[J]. Journal of King Saud University-Computer and Information Sciences"},{"key":"1293_CR39","doi-asserted-by":"crossref","unstructured":"Guo L, Chen J, Li J (2017) Chaos-Based color image encryption and compression scheme using DNA complementary rule and Chinese remainder theorem[C]\/\/ International Computer Conference on Wavelet Active Media Technology and Information Processing. IEEE","DOI":"10.1109\/ICCWAMTIP.2016.8079839"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01293-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-019-01293-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01293-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,11]],"date-time":"2021-12-11T04:28:46Z","timestamp":1639196926000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-019-01293-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,7]]},"references-count":39,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["1293"],"URL":"https:\/\/doi.org\/10.1007\/s11036-019-01293-9","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,7]]},"assertion":[{"value":"7 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that we have no conflicts of interests about the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}