{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:58:59Z","timestamp":1764997139294},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2017,7,17]],"date-time":"2017-07-17T00:00:00Z","timestamp":1500249600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["Grant 2016 YFB0800601"],"award-info":[{"award-number":["Grant 2016 YFB0800601"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["Grant 61472331"],"award-info":[{"award-number":["Grant 61472331"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s11042-017-5029-7","type":"journal-article","created":{"date-parts":[[2017,7,17]],"date-time":"2017-07-17T08:34:04Z","timestamp":1500280444000},"page":"14285-14304","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A hybrid scheme for self-adaptive double color-image encryption"],"prefix":"10.1007","volume":"77","author":[{"given":"Fang","family":"Han","sequence":"first","affiliation":[]},{"given":"Xiaofeng","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yushu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,17]]},"reference":[{"key":"5029_CR1","doi-asserted-by":"crossref","unstructured":"Baraniuk RG (2007) Compressive sensing. IEEE Signal Proc Mag 24(4)","DOI":"10.1109\/MSP.2007.4286571"},{"issue":"8","key":"5029_CR2","doi-asserted-by":"crossref","first-page":"1207","DOI":"10.1002\/cpa.20124","volume":"59","author":"EJ Candes","year":"2006","unstructured":"Candes EJ, Romberg JK, Tao T (2006) Stable signal recovery from incomplete and inaccurate measurements. Commun Pur Appl Math 59(8):1207\u20131223","journal-title":"Commun Pur Appl Math"},{"key":"5029_CR3","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.tcs.2014.08.002","volume":"552","author":"F Chen","year":"2014","unstructured":"Chen F, Wong K-W, Liao X-F, Xiang T (2014) Period distribution of generalized discrete Arnold cat map. Theor Comput Sci 552:13\u201325","journal-title":"Theor Comput Sci"},{"issue":"19","key":"5029_CR4","doi-asserted-by":"crossref","first-page":"8552","DOI":"10.1364\/OE.14.008552","volume":"14","author":"L Chen","year":"2006","unstructured":"Chen L, Zhao D (2006) Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms. Opt Express 14(19):8552\u20138560","journal-title":"Opt Express"},{"key":"5029_CR5","doi-asserted-by":"crossref","unstructured":"Chen W, Quan C, Tay CJ (2009) Optical color image encryption based on Arnold transform and interference method. Optical Communications, pp 3680\u20133685","DOI":"10.1016\/j.optcom.2009.06.014"},{"issue":"20","key":"5029_CR6","doi-asserted-by":"crossref","first-page":"4539","DOI":"10.1364\/AO.53.004539","volume":"53","author":"B Deepan","year":"2014","unstructured":"Deepan B, Quan C, Wang Y (2014) Multiple-image encryption by space multiplexing based on compressive sensing and the double-random phase-encoding technique. Appl Opt 53(20):4539\u20134547","journal-title":"Appl Opt"},{"issue":"1","key":"5029_CR7","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s11042-012-1337-0","volume":"72","author":"R Huang","year":"2014","unstructured":"Huang R, Rhee KH, Uchida S (2014) A parallel image encryption method based on compressive sensing. Multimed Tools Appl 72(1):71\u201393","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"5029_CR8","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s11042-012-1331-6","volume":"72","author":"X Huang","year":"2014","unstructured":"Huang X, Ye G (2014) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed Tools Appl 72(1):57\u201370","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"5029_CR9","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.optcom.2007.07.012","volume":"279","author":"M Joshi","year":"2007","unstructured":"Joshi M, Singh K (2007) Color image encryption and decryption using fractional Fourier transform. Opt Commun 279(1):35\u201342","journal-title":"Opt Commun"},{"key":"5029_CR10","unstructured":"Liang Y, Liu G, Zhou N-R, Wu J (2015) Color image encryption combining a reality-preserving fractional DCT with chaotic mapping in HSI space. Multimedia Tools Application, pp 1\u201316"},{"issue":"15","key":"5029_CR11","doi-asserted-by":"crossref","first-page":"3150","DOI":"10.1080\/00207160.2011.594884","volume":"88","author":"C-J Li","year":"2011","unstructured":"Li C-J, Li C-D, Huang T-W (2011) Exponential stability of impulsive high-order Hopfield-type neural networks with delays and reaction-diffusion. Int J Comput Math 88(15):3150\u20133162","journal-title":"Int J Comput Math"},{"issue":"2","key":"5029_CR12","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/TNNLS.2015.2496658","volume":"27","author":"C-J Li","year":"2016","unstructured":"Li C-J, Yu X-H, Huang T-W, Guo C, He X (2016) A generalized Hopfield network for nonsmooth constrained convex optimization: Lie derivative approach. IEEE T Neur Net Lear 27(2):308\u2013321","journal-title":"IEEE T Neur Net Lear"},{"issue":"5","key":"5029_CR13","doi-asserted-by":"crossref","first-page":"1775","DOI":"10.1109\/TII.2015.2479558","volume":"12","author":"C-J Li","year":"2016","unstructured":"Li C-J, Yu X-H, Yu W-W, Huang T-W, Liu Z-W (2016) Distributed event-triggered scheme for economic dispatch in smart grids. IEEE T Ind Informat 12 (5):1775\u20131785","journal-title":"IEEE T Ind Informat"},{"issue":"1","key":"5029_CR14","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/s11071-014-1433-y","volume":"78","author":"C-J Li","year":"2014","unstructured":"Li C-J, Zhou X-J, Gao DY (2014) Stable trajectory of logistic map. Nonlinear Dynam 78(1):209\u2013217","journal-title":"Nonlinear Dynam"},{"issue":"7","key":"5029_CR15","doi-asserted-by":"crossref","first-page":"753","DOI":"10.1016\/j.optlaseng.2011.03.017","volume":"49","author":"H Li","year":"2011","unstructured":"Li H, Wang Y (2011) Double-image encryption based on discrete fractional random transform and chaotic maps. Opt Laser Eng 49(7):753\u2013757","journal-title":"Opt Laser Eng"},{"issue":"5","key":"5029_CR16","doi-asserted-by":"crossref","first-page":"1384","DOI":"10.1016\/j.jss.2013.01.012","volume":"86","author":"Q Lin","year":"2013","unstructured":"Lin Q, Wong K -W, Chen J (2013) An enhanced variable-length arithmetic coding and encryption scheme using chaotic maps. J Syst Softw 86(5):1384\u20131389","journal-title":"J Syst Softw"},{"issue":"20","key":"5029_CR17","doi-asserted-by":"crossref","first-page":"2663","DOI":"10.1016\/j.ijleo.2015.06.079","volume":"126","author":"H Liu","year":"2015","unstructured":"Liu H, Xiao D, Zhang YS (2015) Securely compressive sensing using double random phase encoding. Optik 126(20):2663\u20132670","journal-title":"Optik"},{"issue":"3","key":"5029_CR18","doi-asserted-by":"crossref","first-page":"698","DOI":"10.1109\/TNNLS.2015.2481006","volume":"27","author":"Q Liu","year":"2016","unstructured":"Liu Q, Wang J (2016) L\n                    1-Minimization algorithms for sparse signal reconstruction based on a projection neural network. IEEE T Neur Learn 27(3):698\u2013707","journal-title":"IEEE T Neur Learn"},{"issue":"19","key":"5029_CR19","doi-asserted-by":"crossref","first-page":"1570","DOI":"10.1080\/09500340.2014.946565","volume":"61","author":"X Liu","year":"2014","unstructured":"Liu X, Mei W, Du H (2014) Optical image encryption based on compressive sensing and chaos in the fractional Fourier domain. J Mod Opt 61(19):1570\u20131577","journal-title":"J Mod Opt"},{"issue":"1","key":"5029_CR20","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/j.optlaseng.2012.08.004","volume":"51","author":"Z Liu","year":"2013","unstructured":"Liu Z, Li Z, Liu W, Wang Y, Liu S (2013) Image encryption algorithm by using fractional Fourier transform and pixel scrambling operation based on double random phase encoding. Opt Laser Eng 51(1):8\u201314","journal-title":"Opt Laser Eng"},{"issue":"2","key":"5029_CR21","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1016\/j.optcom.2007.03.039","volume":"275","author":"Z Liu","year":"2007","unstructured":"Liu Z, Liu S (2007) Double image encryption based on iterative fractional Fourier transform. Opt Commun 275(2):324\u2013329","journal-title":"Opt Commun"},{"issue":"1","key":"5029_CR22","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.asoc.2011.09.003","volume":"12","author":"OY Lui","year":"2012","unstructured":"Lui OY, Wong K-W, Chen J, Zhou J (2012) Chaos-based joint compression and encryption algorithm for generating variable length ciphertext. Appl Soft Comput 12(1):125\u2013132","journal-title":"Appl Soft Comput"},{"issue":"4","key":"5029_CR23","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1016\/j.optcom.2004.02.052","volume":"235","author":"NK Nishchal","year":"2004","unstructured":"Nishchal NK, Joseph J, Singh K (2004) Securing information using fractional Fourier transform in digital holography. Opt Commun 235(4):253\u2013259","journal-title":"Opt Commun"},{"issue":"3","key":"5029_CR24","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1007\/s11042-013-1699-y","volume":"74","author":"B Norouzi","year":"2015","unstructured":"Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2015) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed Tools Appl 74(3):781\u2013811","journal-title":"Multimed Tools Appl"},{"issue":"18","key":"5029_CR25","doi-asserted-by":"crossref","first-page":"5414","DOI":"10.1016\/j.ijleo.2014.06.022","volume":"125","author":"N Rawat","year":"2014","unstructured":"Rawat N, Kumar R, Lee BG (2014) Implementing compressive fractional Fourier transformation with iterative kernel steering regression in double random phase encoding. Optik-Int J Light Electron Opt 125(18):5414\u20135417","journal-title":"Optik-Int J Light Electron Opt"},{"issue":"117","key":"5029_CR26","first-page":"39","volume":"115","author":"D Sato","year":"2015","unstructured":"Sato D (2015) Security evaluation for leakage of a fingerprint image from USB-based fingerprint authentication systems. Proc IEICE 115(117):39\u201344","journal-title":"Proc IEICE"},{"key":"5029_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.optlaseng.2013.12.001","volume":"56","author":"L Sui","year":"2014","unstructured":"Sui L, Lu H, Wang Z, Sun Q (2014) Double-image encryption using discrete fractional random transform and logistic maps. Opt Laser Eng 56:1\u201312","journal-title":"Opt Laser Eng"},{"issue":"6","key":"5029_CR28","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1364\/OL.33.000581","volume":"33","author":"R Tao","year":"2008","unstructured":"Tao R, Lang J, Wang Y (2008) Optical image encryption based on the multiple-parameter fractional Fourier transform. Opt Lett 33(6):581\u2013583","journal-title":"Opt Lett"},{"issue":"1","key":"5029_CR29","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.acha.2014.06.003","volume":"38","author":"J Wen","year":"2015","unstructured":"Wen J, Li D, Zhu F (2015) Stable recovery of sparse signals via L\n                    \n                        p\n                    -minimization. Appl Comput Harmon A 38(1):161\u2013176","journal-title":"Appl Comput Harmon A"},{"key":"5029_CR30","doi-asserted-by":"crossref","unstructured":"Wen J, Zhou Z, Wang J, Tang X-H, Qun M (2016) A sharp condition for exact support recovery of sparse signals with orthogonal matching pursuit. IEEE T Appl Supercon","DOI":"10.1109\/ISIT.2016.7541722"},{"issue":"23","key":"5029_CR31","doi-asserted-by":"crossref","first-page":"1487","DOI":"10.1049\/el.2013.2222","volume":"49","author":"J Wen","year":"2013","unstructured":"Wen J, Zhu X, Li D (2013) Improved bounds on restricted isometry constant for orthogonal matching pursuit. Electron Lett 49(23):1487\u20131489","journal-title":"Electron Lett"},{"issue":"3","key":"5029_CR32","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1016\/j.chaos.2004.09.035","volume":"24","author":"L Zhang","year":"2005","unstructured":"Zhang L, Liao X-F, Wang X (2005) An image encryption approach based on chaotic maps. Chaos Solition Fract 24(3):759\u2013765","journal-title":"Chaos Solition Fract"},{"key":"5029_CR33","first-page":"1","volume":"2015","author":"S Zhang","year":"2015","unstructured":"Zhang S, Gao T (2015) An image encryption scheme based on DNA coding and permutation of hyper-image. Multimed Tools Appl 2015:1\u201314","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"5029_CR34","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.optlaseng.2012.11.001","volume":"51","author":"Y-S Zhang","year":"2013","unstructured":"Zhang Y -S, Xiao D (2013) Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform. Opt Laser Eng 51(4):472\u2013480","journal-title":"Opt Laser Eng"},{"key":"5029_CR35","doi-asserted-by":"crossref","first-page":"2507","DOI":"10.1109\/ACCESS.2016.2569421","volume":"4","author":"Y-S Zhang","year":"2016","unstructured":"Zhang Y-S, Zhang L-Y, Zhou J, Liu L, Chen F, He X (2016) A review of compressive sensing in information security field. IEEE Access 4:2507\u20132519","journal-title":"IEEE Access"},{"key":"5029_CR36","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.neucom.2016.04.053","volume":"205","author":"Y-S Zhang","year":"2016","unstructured":"Zhang Y-S, Zhou J, Chen F, Zhang L-Y, Wong K-W, He X (2016) Embedding cryptographic features in compressive sensing. Neurocomputing 205:472\u2013480","journal-title":"Neurocomputing"},{"issue":"20","key":"5029_CR37","doi-asserted-by":"crossref","first-page":"1572","DOI":"10.1049\/el.2015.0927","volume":"51","author":"Y Zhang","year":"2015","unstructured":"Zhang Y, Zhang L-Y (2015) Exploiting random convolution and random subsampling for image encryption and compression. Electron Lett 51(20):1572\u20131574","journal-title":"Electron Lett"},{"key":"5029_CR38","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y-C Zhou","year":"2014","unstructured":"Zhou Y-C, Bao L, Chen C-L (2014) A new 1D chaotic system for image encryption. Signal Process 97:172\u2013182","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-5029-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5029-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5029-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,18]],"date-time":"2020-05-18T02:36:13Z","timestamp":1589769373000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-5029-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,17]]},"references-count":38,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["5029"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-5029-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,17]]}}}