{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T17:43:01Z","timestamp":1762623781553},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2016,7,30]],"date-time":"2016-07-30T00:00:00Z","timestamp":1469836800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"This work was supported by the National Natural Science Foundation of China","award":["60973162"],"award-info":[{"award-number":["60973162"]}]},{"name":"the Natural Science Foundation of Shandong Province of China","award":["ZR2014FM026"],"award-info":[{"award-number":["ZR2014FM026"]}]},{"name":"the Science and Technology of Shandong Province, China","award":["2013GGX10129"],"award-info":[{"award-number":["2013GGX10129"]}]},{"DOI":"10.13039\/501100012558","name":"Foundation of Science and Technology on Information Assurance Laboratory","doi-asserted-by":"crossref","award":["KJ-14-005"],"award-info":[{"award-number":["KJ-14-005"]}],"id":[{"id":"10.13039\/501100012558","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s11042-016-3775-6","type":"journal-article","created":{"date-parts":[[2016,7,30]],"date-time":"2016-07-30T08:45:46Z","timestamp":1469868346000},"page":"13995-14020","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["A joint image lossless compression and encryption method based on chaotic map"],"prefix":"10.1007","volume":"76","author":[{"given":"Xiao-Jun","family":"Tong","sequence":"first","affiliation":[]},{"given":"Penghui","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Miao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,30]]},"reference":[{"key":"3775_CR1","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1006\/acha.1997.0238","volume":"5","author":"AR Calderbank","year":"1998","unstructured":"Calderbank AR, Daubechies I, Sweldens W, et al. (1998) Wavelet transforms that map integers to integers. Appl Comput Harmon Anal 5:332\u2013369","journal-title":"Appl Comput Harmon Anal"},{"issue":"12","key":"3775_CR2","doi-asserted-by":"crossref","first-page":"996","DOI":"10.1109\/TCSII.2010.2083170","volume":"57","author":"SL Chen","year":"2010","unstructured":"Chen SL, Hwang T (2010) Lin W.W. Randomness enhancement using digitalized modified logistic map. IEEE Trans Circuits Syst Express Briefs 57(12):996\u20131000","journal-title":"IEEE Trans Circuits Syst Express Briefs"},{"issue":"5","key":"3775_CR3","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1002\/cpa.3160450502","volume":"45","author":"A Cohen","year":"1992","unstructured":"Cohen A, Daubechies I, Feauvean J (1992) Bi-orthogonal bases of compactly supported wavelets. Commun Pure Appl Math 45(5):485\u2013560","journal-title":"Commun Pure Appl Math"},{"issue":"1","key":"3775_CR4","doi-asserted-by":"crossref","first-page":"121","DOI":"10.3788\/gzxb20134201.0121","volume":"42","author":"J Deng","year":"2013","unstructured":"Deng J, Ren Y (2013) Image compression encryption algorithm based on improved zero tree encoding. Acta Photonica Sinica 42(1):121\u2013126","journal-title":"Acta Photonica Sinica"},{"key":"3775_CR5","doi-asserted-by":"crossref","unstructured":"Hadjem T, Azzaz, MS, Tanougast C, Sadoudi S (2014) A new image crypto-compression system SPIHT-PSCS. Control, Decision and Information Technologies (CoDIT), 2014 International Conference on, Metz, pp 706\u2013711","DOI":"10.1109\/CoDIT.2014.6996983"},{"key":"3775_CR6","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/BF01608556","volume":"50","author":"M Henon","year":"1976","unstructured":"Henon M (1976) A two-dimensional mapping with a strange attractor. Commun Math Phys 50:69\u201377","journal-title":"Commun Math Phys"},{"issue":"4","key":"3775_CR7","first-page":"376","volume":"18","author":"Y Li","year":"2013","unstructured":"Li Y, Zhang S (2013) Image compression based on wavelet transform and SHA-1. J Image Graph 18(4):376\u2013381","journal-title":"J Image Graph"},{"key":"3775_CR8","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1016\/S0167-8655(97)00099-8","volume":"18","author":"X Li","year":"1997","unstructured":"Li X, Knipe J, Cheng H (1997) Image compression and encryption using tree structures. Pattern Recogn Lett 18:1253\u20131259","journal-title":"Pattern Recogn Lett"},{"key":"3775_CR9","unstructured":"Lian S, Sun J, Wang Z, (2004) Perceptual cryptography on SPIHT compressed images or videos. ICME 2195\u20132198"},{"key":"3775_CR10","first-page":"43","volume-title":"Chaotic cryptofigurey and its application","author":"X Liao","year":"2009","unstructured":"Liao X, Xiao D, et al. (2009) Chaotic cryptofigurey and its application. Science Press, Peking, p. 43"},{"key":"3775_CR11","unstructured":"Lin R, Mao, Y Wang Z (2008) Chaotic secure image coding based on SPIHT. Communications and Networking in China, 2008. China Com 2008. Third International Conference on, Hangzhou, China, pp 1294\u20131294"},{"issue":"10","key":"3775_CR12","doi-asserted-by":"crossref","first-page":"5629","DOI":"10.7498\/aps.56.5629","volume":"56","author":"F Liu","year":"2007","unstructured":"Liu F, Liu S, Liu G, et al. (2007) IInteraction of two scales in Lorenz map. Acta Phys Sin 56(10):5629\u20135634","journal-title":"Acta Phys Sin"},{"key":"3775_CR13","unstructured":"Luo R (2001) Design and analysis of remote sensing image information system. Dissertation Zheng Zhou: The PLA Information Engineering University, China. Doctoral, 93"},{"key":"3775_CR14","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.chaos.2011.12.006","volume":"45","author":"KJ Persohn","year":"2012","unstructured":"Persohn KJ, Povinelli RJ (2012) Analyzing logistic map pseudorandom number generators forperiodicity induced by finite precision floating-point representation. Chaos, Solitons Fractals 45:238\u2013245","journal-title":"Chaos, Solitons Fractals"},{"key":"3775_CR15","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.jvcir.2015.06.009","volume":"31","author":"C Qin","year":"2015","unstructured":"Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154\u2013164","journal-title":"J Vis Commun Image Represent"},{"issue":"9","key":"3775_CR16","doi-asserted-by":"crossref","first-page":"2687","DOI":"10.1016\/j.sigpro.2013.03.036","volume":"93","author":"C Qin","year":"2013","unstructured":"Qin C, Chang C-C, Chen Y-C (2013) Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism. Signal Process 93(9):2687\u20132695","journal-title":"Signal Process"},{"key":"3775_CR17","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1109\/76.499834","volume":"6","author":"A Said","year":"1996","unstructured":"Said A, Pearlman WA (1996) A new fast and efficient image codec based on set partitioning in hierarchical trees. IEEE Trans Circuits Syst Video Technol 6:243\u2013250","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"2","key":"3775_CR18","first-page":"129","volume":"37","author":"C Shen","year":"2007","unstructured":"Shen C, Zhang H, Feng D, et al. (2007) Information security overview. Science China E: Information Science 37(2):129\u2013150","journal-title":"Science China E: Information Science"},{"issue":"3","key":"3775_CR19","doi-asserted-by":"crossref","first-page":"969","DOI":"10.1109\/TIP.2013.2260760","volume":"23","author":"B Srikanth","year":"2014","unstructured":"Srikanth B, Kumar GSN, Reddy VSK, et al. (2014) A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23(3):969\u2013978","journal-title":"IEEE Trans Image Process"},{"key":"3775_CR20","first-page":"1","volume-title":"Wavelet transform and image processing techniques","author":"Y Sun","year":"2012","unstructured":"Sun Y (2012) Wavelet transform and image processing techniques. Tsinghua University press, Peking, pp. 1\u20132"},{"issue":"9","key":"3775_CR21","first-page":"2529","volume":"22","author":"D Wang","year":"2014","unstructured":"Wang D, Deng J, et al. (2014a) Image compression encryption algorithm based on hyper chaotic system. Opt Precis Eng 22(9):2529\u20132535","journal-title":"Opt Precis Eng"},{"key":"3775_CR22","doi-asserted-by":"crossref","first-page":"6117","DOI":"10.1016\/j.ijleo.2014.06.107","volume":"125","author":"B Wang","year":"2014","unstructured":"Wang B, Zheng X, Zhou S, et al. (2014b) Encrypting the compressed image by chaotic map andarithmetic coding. Optik 125:6117\u20136122","journal-title":"Optik"},{"issue":"3","key":"3775_CR23","first-page":"73","volume":"7","author":"D Weina","year":"2002","unstructured":"Weina D, Sun J (2002) A new generation of still image encoding system-JPEG2000. J Circuit Syst 7(3):73\u201376","journal-title":"J Circuit Syst"},{"key":"3775_CR24","unstructured":"Wu Y (2013) Research on joint image compression encryption technology. Nan Chang:Nanchang University, Master degree thesis, 1"},{"issue":"24","key":"3775_CR25","doi-asserted-by":"crossref","first-page":"240508","DOI":"10.7498\/aps.62.240508","volume":"62","author":"Y Xie","year":"2013","unstructured":"Xie Y, Xiao D (2013) A color image encryption algorithm based on JPEG compression of encoding. Acta Phys Sin 62(24):240508\u2013240111","journal-title":"Acta Phys Sin"},{"issue":"2","key":"3775_CR26","first-page":"236","volume":"15","author":"Y Xie","year":"2010","unstructured":"Xie Y, Tang X\u2019a, Sun M, Zhang Y (2010) Image lossless compression algorithm based on classification of LZW. J Image Graph 15(2):236\u2013241","journal-title":"J Image Graph"},{"issue":"4","key":"3775_CR27","doi-asserted-by":"crossref","first-page":"040505","DOI":"10.7498\/aps.61.040505","volume":"61","author":"H Yang","year":"2012","unstructured":"Yang H, Liao X, Wong K-W, et al. (2012) Image compression algorithm based on SPIHT. Acta Phys Sin 61(4):040505\u20130401:8","journal-title":"Acta Phys Sin"},{"issue":"8","key":"3775_CR28","first-page":"1432","volume":"14","author":"L Zhang","year":"2003","unstructured":"Zhang L, Wang K (2003) Image encoding algorithm based on integer wavelet transform. J Softw 14(8):1432\u20131438","journal-title":"J Softw"},{"key":"3775_CR29","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1007\/s11042-013-1392-1","volume":"72","author":"X Zhang","year":"2014","unstructured":"Zhang X, Sun G, Shen L, et al. (2014) Compression of encrypted images with multi-layer decomposition. Multimed Tools Appl 72:489\u2013502","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3775-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3775-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3775-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3775-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T12:03:13Z","timestamp":1656936193000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3775-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,30]]},"references-count":29,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["3775"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3775-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,30]]}}}