{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T09:54:50Z","timestamp":1771235690372,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,1,30]],"date-time":"2017-01-30T00:00:00Z","timestamp":1485734400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Natural Science Foundation of China (CN)","award":["61471331"],"award-info":[{"award-number":["61471331"]}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2016 YFB0800600"],"award-info":[{"award-number":["2016 YFB0800600"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1007\/s11042-017-4370-1","type":"journal-article","created":{"date-parts":[[2017,1,30]],"date-time":"2017-01-30T07:01:10Z","timestamp":1485759670000},"page":"2191-2208","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":72,"title":["A fast and efficient approach to color-image encryption based on compressive sensing and fractional Fourier transform"],"prefix":"10.1007","volume":"77","author":[{"given":"Di","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xiaofeng","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yushu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,30]]},"reference":[{"key":"4370_CR1","doi-asserted-by":"crossref","unstructured":"Baraniuk RG (2007) Compressive sensing. IEEE Signal Process Mag 24(4)","DOI":"10.1109\/MSP.2007.4286571"},{"key":"4370_CR2","doi-asserted-by":"crossref","unstructured":"Bianchi T, Bioglio V, Magli E (2014) On the security of random linear measurements. Acoustics. In: IEEE International Conference on Speech and Signal Processing (ICASSP), 2014 IEEE, pp 3992\u20133996","DOI":"10.1109\/ICASSP.2014.6854351"},{"issue":"9","key":"4370_CR3","first-page":"589","volume":"346","author":"EJ Cand\u00e8s","year":"2008","unstructured":"Cand\u00e8s EJ (2008) The restricted isometry property and its implications for compressed sensing. CR Math 346(9):589\u2013592","journal-title":"CR Math"},{"key":"4370_CR4","unstructured":"Chen S, Donoho D (1994) Basis pursuit. In: Conference Record of the Twenty-Eighth Asilomar Conference on Signals, Systems and Computers 1994 , vol 1. IEEE, pp 41\u201344"},{"key":"4370_CR5","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.tcs.2014.08.002","volume":"552","author":"F Chen","year":"2014","unstructured":"Chen F, Wong KW, Liao X, Xiang T (2014) Period distribution of generalized discrete Arnold cat map. Theor Comput Sci 552:13\u201325","journal-title":"Theor Comput Sci"},{"key":"4370_CR6","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.optlaseng.2014.11.017","volume":"67","author":"JX Chen","year":"2015","unstructured":"Chen JX, Zhu ZL, Fu C, Yu H, Zhang LB (2015) An efficient image encryption scheme using gray code based permutation approach. Opt Lasers Eng 67:191\u2013204","journal-title":"Opt Lasers Eng"},{"key":"4370_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.optlaseng.2014.08.010","volume":"66","author":"JX Chen","year":"2015","unstructured":"Chen JX, Zhu ZL, Fu C, Zhang LB, Yu H (2015) Analysis and improvement of a double-image encryption scheme using pixel scrambling technique in gyrator domains. Opt Lasers Eng 66:1\u20139","journal-title":"Opt Lasers Eng"},{"issue":"4","key":"4370_CR8","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"DL Donoho","year":"2006","unstructured":"Donoho DL (2006) Compressed sensing. IEEE Trans Inf Theory 52(4):1289\u20131306","journal-title":"IEEE Trans Inf Theory"},{"issue":"1","key":"4370_CR9","first-page":"139","volume":"60","author":"TT Do","year":"2011","unstructured":"Do TT, Gan L, Nguyen NH, Tran TD (2011) Fast and Efficient Compressive Sensing Using Structurally Random Matrices. IEEE Trans Signal Process 60(1):139\u2013154","journal-title":"IEEE Trans Signal Process"},{"key":"4370_CR10","unstructured":"Gan L, Do TT, Tran TD (2008) Fast compressive imaging using scrambled block Hadamard ensemble. Signal Processing Conference. 2008 16th European. IEEE:1\u20135"},{"issue":"1","key":"4370_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11220-014-0085-9","volume":"15","author":"SN George","year":"2014","unstructured":"George SN, Pattathil DP (2014) A secure LFSR based random measurement matrix for compressive sensing. Sensing and Imaging 15(1):1\u201329","journal-title":"Sensing and Imaging"},{"issue":"13","key":"4370_CR12","doi-asserted-by":"crossref","first-page":"3243","DOI":"10.1016\/j.optcom.2011.03.030","volume":"284","author":"HE Hwang","year":"2011","unstructured":"Hwang HE (2011) An optical image cryptosystem based on Hartley transform in the Fresnel transform domain. Opt Commun 284(13):3243\u20133247","journal-title":"Opt Commun"},{"key":"4370_CR13","unstructured":"Hua W, Liao X (2016) A secret image sharing scheme based on piecewise linear chaotic map and Chinese remainder theorem. Multimedia Tools & Applications:1\u201317"},{"issue":"1","key":"4370_CR14","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s11042-012-1337-0","volume":"72","author":"R Huang","year":"2014","unstructured":"Huang R, Rhee KH, Uchida S (2014) A parallel image encryption method based on compressive sensing. Multimedia tools and applications 72(1):71\u201393","journal-title":"Multimedia tools and applications"},{"issue":"24","key":"4370_CR15","doi-asserted-by":"crossref","first-page":"6590","DOI":"10.1016\/j.ijleo.2013.05.092","volume":"124","author":"X Liu","year":"2013","unstructured":"Liu X, Cao Y, Lu P, Lu X, Li Y (2013) Optical image encryption technique based on compressed sensing and Arnold transformation. Optik-International Journal for Light and Electron Optics 124(24):6590\u20136593","journal-title":"Optik-International Journal for Light and Electron Optics"},{"issue":"19","key":"4370_CR16","doi-asserted-by":"crossref","first-page":"1570","DOI":"10.1080\/09500340.2014.946565","volume":"61","author":"X Liu","year":"2014","unstructured":"Liu X, Mei W, Du H (2014) Optical image encryption based on compressive sensing and chaos in the fractional Fourier domain. J Mod Opt 61(19):1570\u20131577","journal-title":"J Mod Opt"},{"issue":"10","key":"4370_CR17","doi-asserted-by":"crossref","first-page":"1250256","DOI":"10.1142\/S0218127412502562","volume":"22","author":"Q Lin","year":"2012","unstructured":"Lin Q, Wong KW, Chen J (2012) Generalized arithmetic coding using discrete chaotic maps. Int J Bifurcation Chaos 22(10):1250256","journal-title":"Int J Bifurcation Chaos"},{"issue":"1","key":"4370_CR18","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.asoc.2011.09.003","volume":"12","author":"OY Lui","year":"2012","unstructured":"Lui OY, Wong KW, Chen J, Zhou J (2012) Chaos-based joint compression and encryption algorithm for generating variable length ciphertext. Appl Soft Comput 12(1):125\u2013132","journal-title":"Appl Soft Comput"},{"issue":"20","key":"4370_CR19","doi-asserted-by":"crossref","first-page":"2663","DOI":"10.1016\/j.ijleo.2015.06.079","volume":"126","author":"H Liu","year":"2015","unstructured":"Liu H, Xiao D, Liu Y, Zhang Y (2015) Securely compressive sensing using double random phase encoding. Optik-International Journal for Light and Electron Optics 126(20):2663\u20132670","journal-title":"Optik-International Journal for Light and Electron Optics"},{"issue":"7","key":"4370_CR20","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20(7):767\u2013769","journal-title":"Opt Lett"},{"issue":"22","key":"4370_CR21","doi-asserted-by":"crossref","first-page":"5411","DOI":"10.1016\/j.ijleo.2013.03.113","volume":"124","author":"G Tu","year":"2013","unstructured":"Tu G, Liao X, Xiang T (2013) Cryptanalysis of a color image encryption algorithm based on chaos. Optik - International Journal for Light and Electron Optics 124(22):5411\u20135415","journal-title":"Optik - International Journal for Light and Electron Optics"},{"issue":"12","key":"4370_CR22","doi-asserted-by":"crossref","first-page":"4655","DOI":"10.1109\/TIT.2007.909108","volume":"53","author":"JA Tropp","year":"2007","unstructured":"Tropp JA, Gilbert AC (2007) Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans Inf Theory 53(12):4655\u20134666","journal-title":"IEEE Trans Inf Theory"},{"issue":"4","key":"4370_CR23","doi-asserted-by":"crossref","first-page":"2319","DOI":"10.1109\/TIT.2014.2308171","volume":"60","author":"EV Tsiligianni","year":"2014","unstructured":"Tsiligianni EV, Kondi LP, Katsaggelos AK (2014) Construction of Incoherent Unit Norm Tight Frames with Application to Compressed Sensing. IEEE Trans Inf Theory 60(4):2319\u20132330","journal-title":"IEEE Trans Inf Theory"},{"issue":"1","key":"4370_CR24","first-page":"85","volume":"123","author":"CF Van","year":"2000","unstructured":"Van CF (2000) Loan. The ubiquitous Kronecker product. J Comput Appl Math 123(1):85\u2013100","journal-title":"J Comput Appl Math"},{"key":"4370_CR25","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.optcom.2014.12.084","volume":"343","author":"N Zhou","year":"2015","unstructured":"Zhou N, Li H, Wang D, Pan S, Zhou Z (2015) Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun 343:10\u201321","journal-title":"Opt Commun"},{"key":"4370_CR26","unstructured":"Zhang Y, Wong KW, Xiao D, Zhang LY, Li M (2014). arXiv:\n                        1403.6213"},{"key":"4370_CR27","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1016\/j.image.2015.09.001","volume":"39","author":"Y Zhang","year":"2015","unstructured":"Zhang Y, Wong KW, Zhang LY, Wen W, Zhou J, He X (2015) Robust coding of encrypted images via structural matrix. Signal Process Image Commun 39:202\u2013211","journal-title":"Signal Process Image Commun"},{"key":"4370_CR28","doi-asserted-by":"crossref","unstructured":"Zhang LY, Wong KW, Zhang Y, Lin Q (2015) Joint quantization and diffusion for compressed sensing measurements of natural images. In: 2015 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE","DOI":"10.1109\/ISCAS.2015.7169254"},{"issue":"4","key":"4370_CR29","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.optlaseng.2012.11.001","volume":"51","author":"Y Zhang","year":"2013","unstructured":"Zhang Y, Xiao D (2013) Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform. Opt Lasers Eng 51(4):472\u2013480","journal-title":"Opt Lasers Eng"},{"issue":"21","key":"4370_CR30","doi-asserted-by":"crossref","first-page":"4506","DOI":"10.1364\/OL.38.004506","volume":"38","author":"Y Zhang","year":"2013","unstructured":"Zhang Y, Xiao D, Wen W, Liu H (2013) Vulnerability to chosen-plaintext attack of a general optical encryption model with the architecture of scrambling-then-double random phase encoding. Opt Lett 38(21):4506\u20134509","journal-title":"Opt Lett"},{"key":"4370_CR31","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.optcom.2015.05.043","volume":"354","author":"N Zhou","year":"2015","unstructured":"Zhou N, Yang J, Tan C, Pan S, Zhou Z (2015) Double-image encryption scheme combining DWT-based compressive sensing with discrete fractional random transform. Opt Commun 354:112\u2013121","journal-title":"Opt Commun"},{"key":"4370_CR32","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.optlastec.2014.02.015","volume":"62","author":"N Zhou","year":"2014","unstructured":"Zhou N, Zhang A, Zheng F, Gong L (2014) Novel image compression hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt Laser Technol 62:152\u2013160","journal-title":"Opt Laser Technol"},{"issue":"20","key":"4370_CR33","doi-asserted-by":"crossref","first-page":"1572","DOI":"10.1049\/el.2015.0927","volume":"51","author":"Y Zhang","year":"2015","unstructured":"Zhang Y, Zhang LY (2015) Exploiting random convolution and random subsampling for image encryption and compression. Electron Lett 51(20):1572\u20131574","journal-title":"Electron Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-4370-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4370-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4370-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T14:35:59Z","timestamp":1589726159000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-4370-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,30]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["4370"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-4370-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,30]]}}}