{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T06:46:02Z","timestamp":1767422762638,"version":"3.37.3"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2019,2,6]],"date-time":"2019-02-06T00:00:00Z","timestamp":1549411200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61374178","61402092","61603182"],"award-info":[{"award-number":["61374178","61402092","61603182"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Online Education Research Fund of the MOE Research Center for Online Education of China","award":["2016ZD306"],"award-info":[{"award-number":["2016ZD306"]}]},{"DOI":"10.13039\/501100010018","name":"Doctoral Start-up Foundation of Liaoning Province","doi-asserted-by":"publisher","award":["201501141"],"award-info":[{"award-number":["201501141"]}],"id":[{"id":"10.13039\/501100010018","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["N171704004"],"award-info":[{"award-number":["N171704004"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s11042-019-7253-9","type":"journal-article","created":{"date-parts":[[2019,2,6]],"date-time":"2019-02-06T20:02:21Z","timestamp":1549483341000},"page":"18967-18994","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Efficient protection using chaos for Context-Adaptive Binary Arithmetic Coding in H.264\/Advanced Video Coding"],"prefix":"10.1007","volume":"78","author":[{"given":"Yanjie","family":"Song","sequence":"first","affiliation":[]},{"given":"Zhiliang","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,6]]},"reference":[{"issue":"2","key":"7253_CR1","first-page":"223","volume":"2","author":"M Abomhara","year":"2010","unstructured":"Abomhara M, Zakaria O, Khalifa OO et al (2010) Enhancing selective encryption for H. 264\/AVC using advance encryption standard. Int J Comput Theory Eng 2(2):223\u2013229","journal-title":"Int J Comput Theory Eng"},{"issue":"2","key":"7253_CR2","first-page":"50","volume":"2","author":"N Alassaf","year":"2017","unstructured":"Alassaf N, Alkazemi B, Gutub A (2017) Applicable light-weight cryptography to secure medical data in IoT systems. J Res Eng Appl Sci 2(2):50\u201358","journal-title":"J Res Eng Appl Sci"},{"issue":"2","key":"7253_CR3","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1049\/iet-spr.2016.0708","volume":"12","author":"MKM Al-Azawi","year":"2018","unstructured":"Al-Azawi MKM, Gaze AM (2018) Combined speech compression and encryption using chaotic compressive sensing with large key size. IET Sign Proc 12(2):214\u2013218","journal-title":"IET Sign Proc"},{"key":"7253_CR4","unstructured":"Aljuaid N, Gutub A, Khan E (2014) Stego-system for hiding text in images of personal computers. In: Proceedings of 2014 International Conference on Advanced Engineering Technologies, AET-2014, Dubai UAE, pp 250\u2013256"},{"issue":"1","key":"7253_CR5","first-page":"8","volume":"1","author":"NA Al-Juaid","year":"2018","unstructured":"Al-Juaid NA, Gutub AA, Khan EA (2018) Enhancing PC data security via combining RSA cryptography and video based steganography. J Inform Sec Cyber Res 1(1):8\u201318","journal-title":"J Inform Sec Cyber Res"},{"issue":"3","key":"7253_CR6","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TCSVT.2012.2204941","volume":"23","author":"MN Asghar","year":"2013","unstructured":"Asghar MN, Ghanbari M (2013) An efficient security system for CABAC bin-strings of H.264\/SVC. IEEE Trans Circ Syst Video Technol 23(3):425\u2013437","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"23","key":"7253_CR7","doi-asserted-by":"publisher","first-page":"10215","DOI":"10.1007\/s11042-014-2160-6","volume":"74","author":"MN Asghar","year":"2015","unstructured":"Asghar MN, Ghanbari M, Fleury M et al (2015) Sufficient encryption based on entropy coding syntax elements of H.264\/SVC. Multimed Tools Appl 74(23):10215\u201310241","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"7253_CR8","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1109\/TCE.2003.1196410","volume":"48","author":"F Chiaraluce","year":"2002","unstructured":"Chiaraluce F, Ciccarelli L, Gambi E, Pierleoni P, Reginelli M (2002) A new chaotic algorithm for video encryption. IEEE Trans Consum Electron 48(4):838\u2013844","journal-title":"IEEE Trans Consum Electron"},{"issue":"2","key":"7253_CR9","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1049\/iet-ifs.2015.0492","volume":"11","author":"X Ding","year":"2017","unstructured":"Ding X, Deng Y, Yang G et al (2017) Design of new scan orders for perceptual encryption of H.264\/AVC videos. IET Inf Secur 11(2):55\u201365","journal-title":"IET Inf Secur"},{"issue":"3","key":"7253_CR10","first-page":"262","volume":"28","author":"M Elhoseny","year":"2016","unstructured":"Elhoseny M, Elminir H, Riad A et al (2016) A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption. J King Saud Univ - Comput Inform Sci 28(3):262\u2013275","journal-title":"J King Saud Univ - Comput Inform Sci"},{"issue":"13","key":"7253_CR11","doi-asserted-by":"crossref","first-page":"2024","DOI":"10.1002\/sec.1459","volume":"9","author":"M Elhoseny","year":"2016","unstructured":"Elhoseny M, Yuan X, ElMinir HK, Riad AM (2016) An energy efficient encryption method for secure dynamic WSN. Sec Commun Netw 9(13):2024\u20132031","journal-title":"Sec Commun Netw"},{"key":"7253_CR12","first-page":"246","volume-title":"Proceedings of the multimedia 8th Pacific rim conference on advances in multimedia information processing","author":"Y Fan","year":"2007","unstructured":"Fan Y, Wang J, Ikenaga T et al (2007) A new video encryption scheme for H.264\/AVC. In: Proceedings of the multimedia 8th Pacific rim conference on advances in multimedia information processing. Springer-Verlag, Berlin, pp 246\u2013255"},{"key":"7253_CR13","first-page":"1","volume-title":"Method of performing cipher block chaining using elliptic polynomial cryptography","author":"L Ghouti","year":"2012","unstructured":"Ghouti L (2012) Method of performing cipher block chaining using elliptic polynomial cryptography. Patent Application Publication, United States, pp 1\u201337"},{"key":"7253_CR14","doi-asserted-by":"crossref","unstructured":"Gutub AA (2011) Subthreshold SRAM designs for cryptography security computations. Software Engineering and Computer Systems, Springer Berlin Heidelberg. 104\u2013110","DOI":"10.1007\/978-3-642-22170-5_9"},{"issue":"2","key":"7253_CR15","first-page":"1","volume":"1","author":"A Gutub","year":"2018","unstructured":"Gutub A, AI-Juaid N (2018) Multi-bits stego-system for hiding text in multimedia images based on user security priority. J Comput Hardw Eng 1(2):1\u20139","journal-title":"J Comput Hardw Eng"},{"issue":"2","key":"7253_CR16","first-page":"474","volume":"1","author":"AA Gutub","year":"2011","unstructured":"Gutub AA, Khan EA (2011) Using subthreshold SRAM to design low-power crypto hardware. Int J New Comput Architect Appl 1(2):474\u2013483","journal-title":"Int J New Comput Architect Appl"},{"key":"7253_CR17","doi-asserted-by":"publisher","unstructured":"Gutub AA, Khan AA (2013) Hybrid crypto hardware utilizing symmetric-key and public-key cryptosystems. In: International conference on advanced computer science applications and technologies. IEEE:116\u2013121. https:\/\/doi.org\/10.1109\/ACSAT.2012.44","DOI":"10.1109\/ACSAT.2012.44"},{"key":"7253_CR18","doi-asserted-by":"publisher","unstructured":"Gutub A, Al-Juaid N, Khan E (2017) Counting-based secret sharing technique for multimedia applications.\u00a0Multimed Tools Appl 1\u201329. https:\/\/doi.org\/10.1007\/s11042-017-5293-6","DOI":"10.1007\/s11042-017-5293-6"},{"key":"7253_CR19","first-page":"119","volume":"35","author":"R Hamza","year":"2017","unstructured":"Hamza R (2017) A novel pseudo random sequence generator for image-cryptographic applications. J Inform Sec Appl 35:119\u2013127","journal-title":"J Inform Sec Appl"},{"issue":"4\u20136","key":"7253_CR20","first-page":"162","volume":"25","author":"R Hamza","year":"2016","unstructured":"Hamza R, Titouna F (2016) A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Inf Syst Secur 25(4\u20136):162\u2013179","journal-title":"Inf Syst Secur"},{"issue":"1","key":"7253_CR21","doi-asserted-by":"publisher","first-page":"1177","DOI":"10.1007\/s11042-015-3030-6","volume":"76","author":"H Hermassi","year":"2017","unstructured":"Hermassi H, Hamdi M, Rhouma R, Belghith SM (2017) A joint encryption-compression codec for speech signals using the ITU-T G.711 standard and chaotic map. Multimed Tools Appl 76(1):1177\u20131200","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"7253_CR22","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1109\/TCSVT.2004.842620","volume":"15","author":"YW Huang","year":"2005","unstructured":"Huang YW, Hsieh BY, Chen TC, Chen LG (2005) Analysis, fast algorithm, and VLSI architecture design for H.264\/AVC intra frame coder. IEEE Trans Circ Syst Video Technol 15(3):378\u2013401","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"1","key":"7253_CR23","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s11235-010-9351-x","volume":"49","author":"Q Huynh-Thu","year":"2012","unstructured":"Huynh-Thu Q, Ghanbari M (2012) The accuracy of PSNR in predicting video quality for different video scenes and frame rates. Telecommun Syst 49(1):35\u201348","journal-title":"Telecommun Syst"},{"issue":"4","key":"7253_CR24","doi-asserted-by":"publisher","first-page":"1461","DOI":"10.1520\/JTE20140332","volume":"44","author":"JM Joshi","year":"2016","unstructured":"Joshi JM, Dalal UD (2016) Highly secure and fast video encryption using minimum overhead in H.264\/AVC bitstream. J Test Eval 44(4):1461\u20131472","journal-title":"J Test Eval"},{"key":"7253_CR25","doi-asserted-by":"publisher","unstructured":"Khlif N, Damak T, Kammoun F et al (2014) A very efficient encryption scheme for the H.264\/AVC CODEC adopted in Intra prediction mode. In: Image processing applications and systems conference. IEEE:1\u20137. https:\/\/doi.org\/10.1109\/IPAS.2014.7043256","DOI":"10.1109\/IPAS.2014.7043256"},{"issue":"1","key":"7253_CR26","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1520\/JTE20140182","volume":"44","author":"N Khlif","year":"2016","unstructured":"Khlif N, Damak T, Kammoun F, Masmoudi N (2016) Joint selective encryption of CAVLC and signs of motion vectors for H.264\/AVC. J Test Eval 44(1):160\u2013174","journal-title":"J Test Eval"},{"issue":"1","key":"7253_CR27","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1049\/iet-ipr.2017.0022","volume":"12","author":"N Khlif","year":"2018","unstructured":"Khlif N, Masmoudi A, Kammoun F, Masmoudi N (2018) Secure chaotic dual encryption scheme for H.264\/AVC video conferencing protection. IET Image Process 12(1):42\u201352","journal-title":"IET Image Process"},{"issue":"10","key":"7253_CR28","doi-asserted-by":"publisher","first-page":"3119","DOI":"10.1142\/S0218127405014052","volume":"15","author":"S Li","year":"2005","unstructured":"Li S, Chen G, Mou X (2005) On the dynamical degradation of digital piecewise linear chaotic maps. Int J Bifurcation Chaos 15(10):3119\u20133151","journal-title":"Int J Bifurcation Chaos"},{"issue":"2","key":"7253_CR29","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1109\/TCE.2006.1649688","volume":"52","author":"S Lian","year":"2006","unstructured":"Lian S, Liu Z, Ren Z, Wang H (2006) Secure advanced video coding based on selective encryption algorithms. IEEE Trans Consum Electron 52(2):621\u2013629","journal-title":"IEEE Trans Consum Electron"},{"issue":"4","key":"7253_CR30","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1016\/j.patcog.2003.08.011","volume":"37","author":"SS Maniccam","year":"2004","unstructured":"Maniccam SS, Bourbakis NG (2004) Image and video encryption using SCAN patterns. Pattern Recognition 37(4):725\u2013737","journal-title":"Pattern Recognition"},{"issue":"7","key":"7253_CR31","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1109\/TCSVT.2003.815173","volume":"13","author":"D Marpe","year":"2003","unstructured":"Marpe D, Schwarz H, Wiegand T (2003) Context-based adaptive binary arithmetic coding in the H.264\/AVC video compression standard. IEEE Trans Circ Syst Video Technol 13(7):620\u2013636","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"8","key":"7253_CR32","doi-asserted-by":"publisher","first-page":"3679","DOI":"10.1109\/TII.2018.2791944","volume":"14","author":"K Muhammad","year":"2018","unstructured":"Muhammad K, Hamza R, Ahmad J et al (2018) Secure surveillance framework for IoT systems using probabilistic image encryption. IEEE Trans Indust Inform 14(8):3679\u20133689","journal-title":"IEEE Trans Indust Inform"},{"key":"7253_CR33","first-page":"127","volume":"38","author":"MT Parvez","year":"2011","unstructured":"Parvez MT, Adnan A, Gutub AA (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait J Ofence Eng 38:127\u2013142","journal-title":"Kuwait J Ofence Eng"},{"issue":"10","key":"7253_CR34","doi-asserted-by":"publisher","first-page":"1688","DOI":"10.1109\/TIFS.2013.2259819","volume":"8","author":"F Peng","year":"2013","unstructured":"Peng F, Zhu XW, Long M (2013) An ROI privacy protection scheme for H.264 video based on FMO and chaos. IEEE Trans Inform Foren Sec 8(10):1688\u20131699","journal-title":"IEEE Trans Inform Foren Sec"},{"issue":"3","key":"7253_CR35","doi-asserted-by":"publisher","first-page":"3235","DOI":"10.1007\/s11042-016-3710-x","volume":"76","author":"F Peng","year":"2017","unstructured":"Peng F, Gong X, Long M, Sun X (2017) A selective encryption scheme for protecting H.264\/AVC video in multimedia social network. Multimed Tools Appl 76(3):3235\u20133253","journal-title":"Multimed Tools Appl"},{"key":"7253_CR36","first-page":"4","volume-title":"Proceedings of the 5th IEEE Nordic signal processing symposium (NORSIG 2002)","author":"M Podesser","year":"2002","unstructured":"Podesser M, Schmidt H, Uhl A (2002) Selective bitplane encryption for secure transmission of image data in mobile environments. In: Proceedings of the 5th IEEE Nordic signal processing symposium (NORSIG 2002). Tromso-Trondheim, Norway, pp 4\u20136"},{"issue":"9","key":"7253_CR37","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1016\/j.image.2004.06.003","volume":"19","author":"A Puri","year":"2004","unstructured":"Puri A, Chen X, Luthra A (2004) Video coding using the H.264\/MPEG-4 AVC compression standard. Signal Process Image Commun 19(9):793\u2013849","journal-title":"Signal Process Image Commun"},{"issue":"21","key":"7253_CR38","doi-asserted-by":"publisher","first-page":"28395","DOI":"10.1007\/s11042-018-5994-5","volume":"77","author":"AI Sallam","year":"2018","unstructured":"Sallam AI, El-Rabaie ESM, Faragallah OS (2018) CABAC-based selective encryption for HEVC using RC6 in different operation modes. Multimed Tools Appl 77(21):28395\u201328416","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"7253_CR39","doi-asserted-by":"publisher","first-page":"1636","DOI":"10.1109\/TMM.2017.2777470","volume":"20","author":"AI Sallam","year":"2018","unstructured":"Sallam AI, Faragallah OS, El-Rabaie ESM (2018) HEVC selective encryption using RC6 block cipher technique. IEEE Trans Multimed 20(7):1636\u20131644","journal-title":"IEEE Trans Multimed"},{"issue":"1","key":"7253_CR40","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/TMM.2013.2281029","volume":"16","author":"Z Shahid","year":"2013","unstructured":"Shahid Z, Puech W (2013) Visual protection of HEVC video by selective encryption of CABAC binstrings. IEEE Trans Multimed 16(1):24\u201336","journal-title":"IEEE Trans Multimed"},{"issue":"5","key":"7253_CR41","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1109\/TCSVT.2011.2129090","volume":"21","author":"Z Shahid","year":"2011","unstructured":"Shahid Z, Chaumont M, Puech W (2011) Fast protection of H.264\/AVC by selective encryption of CAVLC and CABAC for I and P frames. IEEE Trans Circ Syst Video Technol 21(5):565\u2013576","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"7253_CR42","doi-asserted-by":"publisher","first-page":"10269","DOI":"10.1109\/ACCESS.2018.2799240","volume":"6","author":"A Shehab","year":"2018","unstructured":"Shehab A, Elhoseny M, Muhammad K et al (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Acc 6:10269\u201310278","journal-title":"IEEE Acc"},{"issue":"3","key":"7253_CR43","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1049\/iet-ifs.2012.0349","volume":"8","author":"H Shen","year":"2014","unstructured":"Shen H, Zhuo L, Zhao Y (2014) An efficient motion reference structure based selective encryption algorithm for H.264 videos. IET Inf Secur 8(3):199\u2013206","journal-title":"IET Inf Secur"},{"key":"7253_CR44","first-page":"1","volume":"2","author":"S Thakur","year":"2018","unstructured":"Thakur S, Singh AK, Ghrera SP et al (2018) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl 2:1\u201314","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"7253_CR45","doi-asserted-by":"publisher","first-page":"2333","DOI":"10.1007\/s11071-016-2648-x","volume":"84","author":"X Tong","year":"2016","unstructured":"Tong X, Zhang M, Wang Z, Ma J (2016) A joint color image encryption and compression scheme based on hyper-chaotic system. Nonlinear Dynam 84(4):2333\u20132356","journal-title":"Nonlinear Dynam"},{"issue":"12","key":"7253_CR46","doi-asserted-by":"publisher","first-page":"13995","DOI":"10.1007\/s11042-016-3775-6","volume":"76","author":"X Tong","year":"2017","unstructured":"Tong X, Chen P, Zhang M (2017) A joint image lossless compression and encryption method based on chaotic map. Multimed Tools Appl 76(12):13995\u201314020","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"7253_CR47","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s11235-013-9849-0","volume":"56","author":"LM Varalakshmi","year":"2014","unstructured":"Varalakshmi LM, Sudha GF, Jaikishan G (2014) A selective encryption and energy efficient clustering scheme for video streaming in wireless sensor networks. Telecommun Syst 56(3):357\u2013365","journal-title":"Telecommun Syst"},{"issue":"3","key":"7253_CR48","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1109\/TCE.2013.6626250","volume":"59","author":"GV Wallendael","year":"2013","unstructured":"Wallendael GV, Boho A, Cock JD et al (2013) Encryption for high efficiency video coding with video adaptation capabilities. IEEE Trans Consum Electron 59(3):634\u2013642","journal-title":"IEEE Trans Consum Electron"},{"issue":"4","key":"7253_CR49","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"issue":"9","key":"7253_CR50","doi-asserted-by":"publisher","first-page":"1476","DOI":"10.1109\/TCSVT.2013.2248588","volume":"23","author":"Y Wang","year":"2013","unstructured":"Wang Y, O\u2019Neill M, Kurugollu F (2013) A tunable encryption scheme and analysis of fast selective encryption for CAVLC and CABAC in H.264\/AVC. IEEE Trans Circ Syst Video Technol 23(9):1476\u20131490","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"7","key":"7253_CR51","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/TCSVT.2003.815165","volume":"13","author":"T Wiegand","year":"2003","unstructured":"Wiegand T, Sullivan GJ, Bjontegaard G, Luthra A (2003) Overview of the H.264\/AVC video coding standard. IEEE Trans Circ Syst Video Technol 13(7):560\u2013576","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"6","key":"7253_CR52","doi-asserted-by":"publisher","first-page":"1166","DOI":"10.1364\/JOSAA.33.001166","volume":"33","author":"H Xu","year":"2016","unstructured":"Xu H, Tong XJ, Zhang M, Wang Z, Li L (2016) Dynamic video encryption algorithm for H.264\/AVC based on a spatiotemporal chaos system. J Opt Soc Am A 33(6):1166\u20131174","journal-title":"J Opt Soc Am A"},{"issue":"11","key":"7253_CR53","first-page":"1234","volume":"26","author":"Y Zhang","year":"2016","unstructured":"Zhang Y, Zhou J, Chen F et al (2016) A block compressive sensing based scalable encryption framework for protecting significant image regions. Int J Bifurcation Chaos 26(11):1234\u20131247","journal-title":"Int J Bifurcation Chaos"},{"key":"7253_CR54","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.neucom.2016.04.053","volume":"205","author":"Y Zhang","year":"2016","unstructured":"Zhang Y, Zhou J, Chen F et al (2016) Embedding cryptographic features in compressive sensing. Neurocomputing 205:472\u2013480","journal-title":"Neurocomputing"},{"key":"7253_CR55","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.optcom.2015.05.043","volume":"354","author":"N Zhou","year":"2015","unstructured":"Zhou N, Yang J, Tan C et al (2015) Double-image encryption scheme combining DWT-based compressive sensing with discrete fractional random transform. Opt Commun 354:112\u2013121","journal-title":"Opt Commun"},{"key":"7253_CR56","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optcom.2014.12.084","volume":"343","author":"N Zhou","year":"2015","unstructured":"Zhou N, Li H, Wang D et al (2015) Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun 343:10\u201321","journal-title":"Opt Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7253-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-7253-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7253-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T12:39:45Z","timestamp":1694608785000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-7253-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,6]]},"references-count":56,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["7253"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-7253-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2019,2,6]]},"assertion":[{"value":"14 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 February 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.All the authors have been informed about this submission.This research does not involve any animals.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}