{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:50:19Z","timestamp":1762005019660,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"21","license":[{"start":{"date-parts":[[2018,5,3]],"date-time":"2018-05-03T00:00:00Z","timestamp":1525305600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Key Research and Development Program of","award":["2016YFB0800601"],"award-info":[{"award-number":["2016YFB0800601"]}]},{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["61472331"],"award-info":[{"award-number":["61472331"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s11042-018-6013-6","type":"journal-article","created":{"date-parts":[[2018,5,2]],"date-time":"2018-05-02T19:59:39Z","timestamp":1525291179000},"page":"28633-28663","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["A novel scheme for simultaneous image compression and encryption based on wavelet packet transform and multi-chaotic systems"],"prefix":"10.1007","volume":"77","author":[{"given":"Xiupin","family":"Lv","sequence":"first","affiliation":[]},{"given":"Xiaofeng","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,3]]},"reference":[{"key":"6013_CR1","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","volume":"128","author":"A Belazi","year":"2016","unstructured":"Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos[J]. Signal Process 128:155\u2013170","journal-title":"Signal Process"},{"issue":"12","key":"6013_CR2","doi-asserted-by":"publisher","first-page":"5406","DOI":"10.1109\/TIT.2006.885507","volume":"52","author":"EJ Candes","year":"2006","unstructured":"Candes EJ, Tao T (2006) Near-optimal signal recovery from random projections: universal encoding strategies?[J]. IEEE Trans Inf Theory 52(12):5406\u20135425","journal-title":"IEEE Trans Inf Theory"},{"issue":"4","key":"6013_CR3","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"DL Donoho","year":"2006","unstructured":"Donoho DL (2006) Compressed sensing[J]. IEEE Trans Inf Theory 52(4):1289\u20131306","journal-title":"IEEE Trans Inf Theory"},{"key":"6013_CR4","first-page":"855","volume":"3024","author":"AI Drukarev","year":"1997","unstructured":"Drukarev AI (1997) Compression-related properties of color spaces[J]. Proc SPIE Int Soc Opt Eng 3024:855\u2013863","journal-title":"Proc SPIE Int Soc Opt Eng"},{"issue":"1","key":"6013_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12596-013-0147-8","volume":"43","author":"SN George","year":"2014","unstructured":"George SN, Pattathil DP (2014) A novel approach for secure compressive sensing of images using multiple chaotic maps[J]. J Opt 43(1):1\u201317","journal-title":"J Opt"},{"key":"6013_CR6","doi-asserted-by":"crossref","unstructured":"Goirand E, Wickerhauser MV, Farge M (1994) A parallel two-dimensional wavelet packet transform and some applications in computing and compression analysis[M]. Wavelet Applications in Chemical Engineering. Springer US, pp 275\u2013319","DOI":"10.1007\/978-1-4615-2708-4_8"},{"issue":"8","key":"6013_CR7","doi-asserted-by":"publisher","first-page":"30","DOI":"10.5815\/ijigsp.2017.08.04","volume":"9","author":"HS Goklani","year":"2017","unstructured":"Goklani HS (2017) Review on image reconstruction using compressed sensing algorithms: OMP, CoSaMP and NIHT[J]. International Journal of Image Graphics & Signal Processing 9(8):30\u201341","journal-title":"International Journal of Image Graphics & Signal Processing"},{"key":"6013_CR8","first-page":"119","volume":"35","author":"R Hamza","year":"2017","unstructured":"Hamza R (2017) A novel pseudo random sequence generator for image-cryptographic applications[J]. J Inf Secur Appl 35:119\u2013127","journal-title":"J Inf Secur Appl"},{"issue":"4-6","key":"6013_CR9","first-page":"162","volume":"25","author":"R Hamza","year":"2016","unstructured":"Hamza R, Titouna F (2016) A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map[J]. Inf Syst Secur 25(4-6):162\u2013179","journal-title":"Inf Syst Secur"},{"issue":"11","key":"6013_CR10","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1016\/j.pmcj.2017.03.011","volume":"3","author":"R Hamza","year":"2017","unstructured":"Hamza R, Muhammad K, Lv Z et al (2017) Secure video summarization framework for personalized wireless capsule endoscopy[J]. Pervasive Mob Comput 3 (11):436\u2013450","journal-title":"Pervasive Mob Comput"},{"issue":"5","key":"6013_CR11","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1109\/10.568915","volume":"44","author":"ML Hilton","year":"1997","unstructured":"Hilton ML (1997) Wavelet and wavelet packet compression of electrocardiograms [J]. IEEE Transactions on Bio-Medical Engineering 44(5):394","journal-title":"IEEE Transactions on Bio-Medical Engineering"},{"issue":"C","key":"6013_CR12","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun CM et al (2015) 2D sine logistic modulation map for image encryption[J]. Inf Sci 297(C):80\u201394","journal-title":"Inf Sci"},{"key":"6013_CR13","unstructured":"Huang X, Ye G (2014) An image encryption algorithm based on hyper-chaos and DNA sequence[M]. Kluwer Academic Publishers"},{"key":"6013_CR14","doi-asserted-by":"crossref","unstructured":"Huang R, Rhee KH, Uchida S (2012) A parallel image encryption method based on compressive sensing[M]. Kluwer Academic Publishers","DOI":"10.1007\/s11042-012-1337-0"},{"key":"6013_CR15","doi-asserted-by":"crossref","unstructured":"Korhonen J, You J (2012) Peak signal-to-noise ratio revisited: is simple beautiful?[C]. Fourth International Workshop on Quality of Multimedia Experience. IEEE, pp 37\u201338","DOI":"10.1109\/QoMEX.2012.6263880"},{"issue":"17","key":"6013_CR16","first-page":"2543","volume":"5","author":"L Leng","year":"2010","unstructured":"Leng L, Zhang J, Xu J et al (2010) Dynamic weighted discrimination power analysis: Anovel approach for face and palmprint recognition in DCT domain[J]. Int J Phys Sci 5(17):2543\u20132554","journal-title":"Int J Phys Sci"},{"key":"6013_CR17","doi-asserted-by":"crossref","unstructured":"Leng L, Zhang J, Xu J et al. (2010) Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition[C]. International Conference on Information and Communication Technology Convergence. IEEE. 467\u2013471","DOI":"10.1109\/ICTC.2010.5674791"},{"issue":"16","key":"6013_CR18","doi-asserted-by":"publisher","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","volume":"284","author":"H Liu","year":"2011","unstructured":"Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system[J]. Opt Commun 284(16):3895\u20133903","journal-title":"Opt Commun"},{"key":"6013_CR19","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1007\/978-3-642-35286-7_72","volume":"346","author":"D Mei","year":"2012","unstructured":"Mei D, Zhao H, Zhao C et al (2012) The application of wavelet-based contourlet transform on compressed sensing[J]. Communications in Computer & Informationence 346:570\u2013577","journal-title":"Communications in Computer & Informationence"},{"issue":"12","key":"6013_CR20","doi-asserted-by":"publisher","first-page":"6737","DOI":"10.1007\/s11042-015-2590-9","volume":"75","author":"MA Qureshi","year":"2016","unstructured":"Qureshi MA, Deriche M (2016) A new wavelet based efficient image compression algorithm using compressive sensing[J]. Multimedia Tools & Applications 75(12):6737\u20136754","journal-title":"Multimedia Tools & Applications"},{"key":"6013_CR21","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/b138494_14","volume-title":"Wavelet transformation[M]. Higher mathematics for physics and engineering","author":"H Shima","year":"2009","unstructured":"Shima H (2009) Wavelet transformation[M]. Higher mathematics for physics and engineering. Springer, Berlin, pp 449\u2013480"},{"key":"6013_CR22","first-page":"1","volume":"11","author":"AK Singh","year":"2016","unstructured":"Singh AK, Kumar B, Singh SK et al (2016) Multiple watermarking technique for securing online social network contents using back propagation neural network[J]. Futur Gener Comput Syst 11:1\u201324","journal-title":"Futur Gener Comput Syst"},{"key":"6013_CR23","doi-asserted-by":"crossref","unstructured":"Singh AK, Kumar B, Singh G et al (2017) Medical image watermarking: techniques and applications[M]","DOI":"10.1007\/978-3-319-57699-2"},{"issue":"4","key":"6013_CR24","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"X Wang","year":"2012","unstructured":"Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos[J]. Signal Process 92(4):1101\u20131108","journal-title":"Signal Process"},{"issue":"66","key":"6013_CR25","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique[J]. Opt Lasers Eng 66(66):10\u201318","journal-title":"Opt Lasers Eng"},{"key":"6013_CR26","unstructured":"Zhang Y (2016) Chaotic digital image crptosystem[M]. Tsinghua University Press"},{"issue":"8","key":"6013_CR27","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice[J]. Inf Sci 273(8):329\u2013351","journal-title":"Inf Sci"},{"key":"6013_CR28","doi-asserted-by":"crossref","unstructured":"Zhang X, Ren Y, Feng G et al (2011) Compressing encrypted image using compressive sensing[C]. International Conference on Intelligent Information Hiding & Multimedia Signal Processing. IEEE Computer Society, pp 222\u2013225","DOI":"10.1109\/IIHMSP.2011.12"},{"issue":"10","key":"6013_CR29","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.optlastec.2014.02.015","volume":"62","author":"N Zhou","year":"2014","unstructured":"Zhou N, Zhang A, Zheng F et al. (2014) Novel image compression-encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing[J]. Opt Laser Technol 62(10):152\u2013160","journal-title":"Opt Laser Technol"},{"issue":"18","key":"6013_CR30","doi-asserted-by":"publisher","first-page":"5075","DOI":"10.1016\/j.ijleo.2014.06.054","volume":"125","author":"N Zhou","year":"2014","unstructured":"Zhou N, Zhang A, Wu J et al. (2014) Novel hybrid image compression-encryption algorithm based on compressive sensing[J]. Optik-International Journal for Light and Electron Optics 125(18):5075\u20135080","journal-title":"Optik-International Journal for Light and Electron Optics"},{"key":"6013_CR31","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.optlastec.2016.02.018","volume":"82","author":"N Zhou","year":"2016","unstructured":"Zhou N, Pan S, Cheng S et al. (2016) Image compression Cencryption scheme based on hyper-chaotic system and 2D compressive sensing[J]. Optics Laser Technol 82:121\u2013133","journal-title":"Optics Laser Technol"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6013-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6013-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6013-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T19:17:05Z","timestamp":1556824625000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6013-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,3]]},"references-count":31,"journal-issue":{"issue":"21","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["6013"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6013-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2018,5,3]]},"assertion":[{"value":"5 July 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}