{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:54:35Z","timestamp":1760784875164,"version":"3.37.3"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"35-36","license":[{"start":{"date-parts":[[2020,7,3]],"date-time":"2020-07-03T00:00:00Z","timestamp":1593734400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,3]],"date-time":"2020-07-03T00:00:00Z","timestamp":1593734400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61374178"],"award-info":[{"award-number":["61374178"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402092"],"award-info":[{"award-number":["61402092"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61603082"],"award-info":[{"award-number":["61603082"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Online Education Research Fund of the MOE Research Center for Online Education","award":["2016ZD306"],"award-info":[{"award-number":["2016ZD306"]}]},{"name":"Ph.D. Start-Up Foundation of Liaoning Province","award":["201501141"],"award-info":[{"award-number":["201501141"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["N171704004"],"award-info":[{"award-number":["N171704004"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s11042-020-09193-x","type":"journal-article","created":{"date-parts":[[2020,7,3]],"date-time":"2020-07-03T23:03:45Z","timestamp":1593817425000},"page":"25497-25533","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["A novel compressive sensing-based framework for image compression-encryption with S-box"],"prefix":"10.1007","volume":"79","author":[{"given":"Zhiliang","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Yanjie","family":"Song","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Yuli","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,3]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Adams CM, Tavares SE (1990) Good S-boxes are easy to find. In: Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology. Springer, Berlin, pp 612\u2013615","key":"9193_CR1","DOI":"10.1007\/0-387-34805-0_56"},{"key":"9193_CR2","doi-asserted-by":"crossref","first-page":"1438","DOI":"10.1016\/j.ijleo.2016.11.152","volume":"130","author":"A Belazi","year":"2017","unstructured":"Belazi A, El-Latif AAA (2017) A simple yet efficient S-box method based on chaotic sine map. Opt - Int J Light Electron Opt 130:1438\u20131444","journal-title":"Opt - Int J Light Electron Opt"},{"issue":"1","key":"9193_CR3","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/s11071-016-3046-0","volume":"87","author":"A Belazi","year":"2017","unstructured":"Belazi A, Khan M, El-Latif AAA, Belghith S (2017) Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption. Nonlinear Dyn 87(1):337\u2013361","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"9193_CR4","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3\u201372","journal-title":"J Cryptol"},{"issue":"12","key":"9193_CR5","doi-asserted-by":"crossref","first-page":"5406","DOI":"10.1109\/TIT.2006.885507","volume":"52","author":"EJ Candes","year":"2006","unstructured":"Candes EJ, Tao T (2006) Near-optimal signal recovery from random projections: Universal encoding strategies. IEEE Trans Inf Theory 52(12):5406\u20135425","journal-title":"IEEE Trans Inf Theory"},{"issue":"7","key":"9193_CR6","doi-asserted-by":"crossref","first-page":"9907","DOI":"10.1007\/s11042-016-3585-x","volume":"76","author":"X Chai","year":"2017","unstructured":"Chai X, Yang K, Gan Z (2017) A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimed Tools Appl 76(7):9907\u20139927","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"9193_CR7","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1016\/j.chaos.2005.10.022","volume":"31","author":"G Chen","year":"2007","unstructured":"Chen G, Chen Y, Liao X (2007) An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps. Chaos Solitons Fractals 31(3):571\u2013579","journal-title":"Chaos Solitons Fractals"},{"key":"9193_CR8","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","volume":"142","author":"J Chen","year":"2018","unstructured":"Chen J, Zhu Z, Zhang L, zhang Y, Yang B (2018) Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption. Signal Process 142:340\u2013353","journal-title":"Signal Process"},{"issue":"2","key":"9193_CR9","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1007\/s11071-016-3099-0","volume":"87","author":"\u00dc \u010aavus\u0307o\u0121lu","year":"2017","unstructured":"\u010aavus\u0307o\u0121lu \u00dc, Zengin A, Pehlivan I, Ka\u010bar S (2017) A novel approach for strong S-box generation algorithm design based on chaotic scaled Zhongtang system. Nonlinear Dyn 87(2):1081\u20131094","journal-title":"Nonlinear Dyn"},{"issue":"4","key":"9193_CR10","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"DL Donoho","year":"2006","unstructured":"Donoho DL (2006) Compressed sensing. IEEE Trans Inf Theory 52 (4):1289\u20131306","journal-title":"IEEE Trans Inf Theory"},{"doi-asserted-by":"crossref","unstructured":"Endra RS (2013) Compressive sensing-based image encryption with optimized sensing matrix. In: 2013 IEEE International conference on computational intelligence and cybernetics (CYBERNETICSCOM), pp 122\u2013125","key":"9193_CR11","DOI":"10.1109\/CyberneticsCom.2013.6865794"},{"issue":"1","key":"9193_CR12","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/TSP.2013.2284762","volume":"62","author":"H Fang","year":"2014","unstructured":"Fang H, Vorobyov SA, Jiang H, Taheri O (2014) Permutation meets parallel compressed sensing: How to relax Restricted Isometry Property for 2D sparse signals. IEEE Trans Signal Process 62(1):196\u2013210","journal-title":"IEEE Trans Signal Process"},{"doi-asserted-by":"crossref","unstructured":"Fang H, Vorobyov SA, Jiang H (2015) Permutation enhanced parallel reconstruction for compressive sampling. In: 2015 IEEE 6Th international workshop on computational advances in multi-sensor adaptive processing (CAMSAP), pp 393\u2013396","key":"9193_CR13","DOI":"10.1109\/CAMSAP.2015.7383819"},{"unstructured":"Frunzete M, Yu L, Barbot J, Vlad A (2011) Compressive sensing matrix designed by tent map, for secure data transmission. In: Signal processing algorithms, architectures, arrangements, and applications SPA 2011, pp 1\u20136","key":"9193_CR14"},{"key":"9193_CR15","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.ins.2020.01.019","volume":"519","author":"H Hu","year":"2020","unstructured":"Hu H, Hsu L, Chou H (2020) An improved SVD-based blind color image watermarking algorithm with mixed modulation. Inf Sci 519:161\u2013182","journal-title":"Inf Sci"},{"key":"9193_CR16","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun CM, Chen CLP (2015) 2D Sine Logistic modulation map for image encryption. Inf Sci 297:80\u201394","journal-title":"Inf Sci"},{"key":"9193_CR17","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"Z Hua","year":"2016","unstructured":"Hua Z, Zhou Y (2016) Image encryption using 2D Logistic-adjusted-Sine map. Inf Sci 339:237\u2013253","journal-title":"Inf Sci"},{"key":"9193_CR18","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"Z Hua","year":"2018","unstructured":"Hua Z, Jin F, Xu B, Huang H (2018) 2D Logistic-Sine-coupling map for image encryption. Signal Process 149:148\u2013161","journal-title":"Signal Process"},{"issue":"1","key":"9193_CR19","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s11042-012-1331-6","volume":"72","author":"X Huang","year":"2014","unstructured":"Huang X, Ye G (2014) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed Tools Appl 72(1):57\u201370","journal-title":"Multimed Tools Appl"},{"key":"9193_CR20","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.sigpro.2018.04.014","volume":"150","author":"H Huang","year":"2018","unstructured":"Huang H, He X, Xiang Y, Wen W, Zhang Y (2018) A compression-diffusion-permutation strategy for securing image. Signal Process 150:183\u2013190","journal-title":"Signal Process"},{"issue":"2","key":"9193_CR21","doi-asserted-by":"crossref","first-page":"2611","DOI":"10.1007\/s11042-017-4455-x","volume":"77","author":"X Huang","year":"2018","unstructured":"Huang X, Ye G (2018) An image encryption algorithm based on irregular wave representation. Multimed Tools Appl 77(2):2611\u20132628","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"9193_CR22","doi-asserted-by":"crossref","first-page":"2450","DOI":"10.1016\/j.camwa.2012.05.017","volume":"64","author":"I Hussain","year":"2012","unstructured":"Hussain I, Shah T, Mahmood H, Gondal MA (2012) Construction of S8 Liu J S-boxes and their applications. Comput Math Appl 64(8):2450\u20132458","journal-title":"Comput Math Appl"},{"issue":"3","key":"9193_CR23","doi-asserted-by":"crossref","first-page":"1795","DOI":"10.1007\/s11071-013-0904-x","volume":"73","author":"M Khan","year":"2013","unstructured":"Khan M, Shah T, Gondal MA (2013) An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dyn 73(3):1795\u20131801","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"9193_CR24","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1007\/s11071-015-2173-3","volume":"82","author":"M Khan","year":"2015","unstructured":"Khan M (2015) A novel image encryption scheme based on multiple chaotic S-boxes. Nonlinear Dyn 82(1):527\u2013533","journal-title":"Nonlinear Dyn"},{"issue":"6","key":"9193_CR25","doi-asserted-by":"crossref","first-page":"1335","DOI":"10.1007\/s11760-013-0577-4","volume":"9","author":"M Khan","year":"2015","unstructured":"Khan M, Shah T (2015) An efficient construction of substitution box with fractional chaotic system. Signal Image Video Process 9(6):1335\u20131338","journal-title":"Signal Image Video Process"},{"issue":"4s","key":"9193_CR26","first-page":"62, 1","volume":"12","author":"Y Li","year":"2016","unstructured":"Li Y, Song B, Cao R, Zhang Y, Qin H (2016) Image encryption based on compressive sensing and scrambled index for secure multimedia transmission. ACM Trans Multimed Comput Commun Appl 12(4s):62, 1\u201362,22","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"issue":"9","key":"9193_CR27","doi-asserted-by":"crossref","first-page":"2714","DOI":"10.1016\/j.sigpro.2010.03.022","volume":"90","author":"X Liao","year":"2010","unstructured":"Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90(9):2714\u20132722","journal-title":"Signal Process"},{"key":"9193_CR28","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.image.2017.07.006","volume":"58","author":"X Liao","year":"2017","unstructured":"Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146\u2013156","journal-title":"Signal Process Image Commun"},{"issue":"3","key":"9193_CR29","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2020","unstructured":"Liao X, Yu Y, Li B, Li Z, Qin Z (2020) A new payload partition strategy in color image steganography. IEEE Trans Circ Syst Video Technol 30 (3):685\u2013696","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"1","key":"9193_CR30","doi-asserted-by":"crossref","first-page":"1391","DOI":"10.1007\/s11042-016-4288-z","volume":"77","author":"H Liu","year":"2018","unstructured":"Liu H, Kadir A, Sun X, Li Y (2018) function, Chaos based adaptive double-image encryption scheme using hashChaos based adaptive double-image encryption scheme using hash function and S-boxes, Multimed. Multimed Tools Appl 77(1):1391\u20131407","journal-title":"Multimed Tools Appl"},{"doi-asserted-by":"crossref","unstructured":"Matsui M (1994) Linear cryptanalysis method for DES cipher. In: Workshop on the theory and application of cryptographic techniques on advances in cryptology. Springer, Berlin, pp 386\u2013397","key":"9193_CR31","DOI":"10.1007\/3-540-48285-7_33"},{"issue":"1","key":"9193_CR32","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1109\/TSP.2008.2007606","volume":"57","author":"H Mohimani","year":"2009","unstructured":"Mohimani H, Babaie-Zadeh M, Jutten C (2009) A fast approach for overcomplete sparse decomposition based on smoothed l0 norm. IEEE Trans Signal Process 57(1):289\u2013301","journal-title":"IEEE Trans Signal Process"},{"issue":"3","key":"9193_CR33","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1007\/s11042-013-1699-y","volume":"74","author":"B Norouzi","year":"2015","unstructured":"Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2015) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed Tools Appl 74(3):781\u2013811","journal-title":"Multimed Tools Appl"},{"issue":"36","key":"9193_CR34","doi-asserted-by":"crossref","first-page":"3733","DOI":"10.1016\/j.physleta.2010.07.019","volume":"374","author":"F \u00d6zkaynak","year":"2010","unstructured":"\u00d6zkaynak F, \u00d6zer AB (2010) A method for designing strong S-boxes based on chaotic Lorenz system. Phys Lett A 374(36):3733\u20133738","journal-title":"Phys Lett A"},{"issue":"6","key":"9193_CR35","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1049\/ip-e.1988.0044","volume":"135","author":"J Pieprzyk","year":"1988","unstructured":"Pieprzyk J, Finkelstein G (1988) Towards effective nonlinear cryptosystem design. IEE Proc E - Comput Digit Tech 135(6):325\u2013335","journal-title":"IEE Proc E - Comput Digit Tech"},{"doi-asserted-by":"crossref","unstructured":"Ponuma R, Amutha R (2018) Encryption of image data using compressive sensing and chaotic system. In: Multimed Tools Appl:1\u201325","key":"9193_CR36","DOI":"10.1007\/s11042-018-6745-3"},{"doi-asserted-by":"crossref","unstructured":"Rachlin Y, Baron D (2008) The secrecy of compressed sensing measurements. In: 2008 46Th annual allerton conference on communication, control, and computing, pp 813\u2013817","key":"9193_CR37","DOI":"10.1109\/ALLERTON.2008.4797641"},{"issue":"5-6","key":"9193_CR38","doi-asserted-by":"crossref","first-page":"3975","DOI":"10.1007\/s11042-019-7584-6","volume":"79","author":"R Shanthakumari","year":"2020","unstructured":"Shanthakumari R, Malliga S (2020) Dual layer security of data using LSB inbersion image steganography with elliptic curve cryptography encryption algorithm. Multimed Tools Appl 79(5-6):3975\u20133991","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"9193_CR39","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/s11071-017-3874-6","volume":"91","author":"A Ullah","year":"2018","unstructured":"Ullah A, Jamal SS, Shah T (2018) A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn 91(1):359\u2013370","journal-title":"Nonlinear Dyn"},{"issue":"4","key":"9193_CR40","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"issue":"9-10","key":"9193_CR41","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s11042-019-08570-5","volume":"79","author":"UA Waqas","year":"2020","unstructured":"Waqas UA, Khan M, Batool SI (2020) A new watermarking scheme based Daubechies wavelet and chaotic map for quick response code images. Multimed Tools Appl 79(9-10):161\u2013182","journal-title":"Multimed Tools Appl"},{"doi-asserted-by":"crossref","unstructured":"Webster AF, Tavares SE (1986) On the design of S-boxes. In: Lecture notes in computer sciences; 218 on advances in cryptology\u2014CRYPTO 85, pp 523\u2013534. Springer, Berlin","key":"9193_CR42","DOI":"10.1007\/3-540-39799-X_41"},{"key":"9193_CR43","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.ins.2015.08.013","volume":"327","author":"Y Wu","year":"2016","unstructured":"Wu Y, Zhou Y, Agaian S, Noonan JP (2016) 2D Sudoku associated bijections for image scrambling. Inf Sci 327:91\u2013109","journal-title":"Inf Sci"},{"issue":"3","key":"9193_CR44","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/s11071-013-1074-6","volume":"75","author":"G Ye","year":"2014","unstructured":"Ye G (2014) A block image encryption algorithm based on wave transmission and chaotic systems. Nonlinear Dyn 75(3):417\u2013427","journal-title":"Nonlinear Dyn"},{"issue":"4","key":"9193_CR45","doi-asserted-by":"crossref","first-page":"2067","DOI":"10.1007\/s11071-015-2465-7","volume":"83","author":"G Ye","year":"2016","unstructured":"Ye G, Zhao H, Chai H (2016) Chaotic image encryption algorithm using wave-line permutation and block diffusion. Nonlinear Dyn 83(4):2067\u20132077","journal-title":"Nonlinear Dyn"},{"key":"9193_CR46","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.neucom.2017.04.016","volume":"251","author":"G Ye","year":"2017","unstructured":"Ye G, Huang X (2017) An efficient symmetric image encryption algorithm based on an intertwining logistic map. Neurocomputing 251:45\u201353","journal-title":"Neurocomputing"},{"issue":"8","key":"9193_CR47","doi-asserted-by":"crossref","first-page":"731","DOI":"10.1109\/LSP.2010.2052243","volume":"17","author":"L Yu","year":"2010","unstructured":"Yu L, Barbot J, Zheng G, Sun H (2010) Compressive sensing with chaotic sequence. IEEE Signal Process Lett 17(8):731\u2013734","journal-title":"IEEE Signal Process Lett"},{"key":"9193_CR48","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.ins.2014.08.005","volume":"289","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Xiao D, Wen W, Wong KW (2014) On the security of symmetric ciphers based on DNA coding. Inf Sci 289:254\u2013261","journal-title":"Inf Sci"},{"issue":"4","key":"9193_CR49","doi-asserted-by":"crossref","first-page":"1831","DOI":"10.1007\/s11071-015-2280-1","volume":"82","author":"Y Zhang","year":"2015","unstructured":"Zhang Y, Li Y, Wen W, Wu Y, Chen J (2015) Deciphering an image cipher based on 3-cell chaotic map and biological operations. Nonlinear Dyn 82 (4):1831\u20131837","journal-title":"Nonlinear Dyn"},{"key":"9193_CR50","doi-asserted-by":"crossref","first-page":"2507","DOI":"10.1109\/ACCESS.2016.2569421","volume":"4","author":"Y Zhang","year":"2016","unstructured":"Zhang Y, Zhang LY, Zhou J, Liu L, Chen F, He X (2016) A review of compressive sensing in information security field. IEEE Access 4:2507\u20132519","journal-title":"IEEE Access"},{"key":"9193_CR51","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.neucom.2016.04.053","volume":"205","author":"Y Zhang","year":"2016","unstructured":"Zhang Y, Zhou J, Chen F, Zhang LY, Wong KW, He X, Xiao D (2016) Embedding cryptographic features in compressive sensing. Neurocomputing 205:472\u2013480","journal-title":"Neurocomputing"},{"issue":"11","key":"9193_CR52","doi-asserted-by":"crossref","first-page":"6303","DOI":"10.1007\/s11042-015-2573-x","volume":"75","author":"P Zhen","year":"2016","unstructured":"Zhen P, Zhao G, Min L, Jin X (2016) Chaos-based image encryption scheme combining DNA coding and entropy, Multimed. Multimed Tools Appl 75 (11):6303\u20136319","journal-title":"Multimed Tools Appl"},{"key":"9193_CR53","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.optlastec.2014.02.015","volume":"62","author":"N Zhou","year":"2014","unstructured":"Zhou N, Zhang A, Zheng F, Gong L (2014) Novel image compression-encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt Laser Technol 62:152\u2013160","journal-title":"Opt Laser Technol"},{"key":"9193_CR54","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.optcom.2014.12.084","volume":"343","author":"N Zhou","year":"2015","unstructured":"Zhou N, Li H, Wang D, Pan S, Zhou Z (2015) Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun 343:10\u201321","journal-title":"Opt Commun"},{"key":"9193_CR55","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.optlastec.2016.02.018","volume":"82","author":"N Zhou","year":"2016","unstructured":"Zhou N, Pan S, Cheng S, Zhou Z (2016) Image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121\u2013133","journal-title":"Opt Laser Technol"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09193-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09193-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09193-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,3]],"date-time":"2021-07-03T01:23:37Z","timestamp":1625275417000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09193-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,3]]},"references-count":55,"journal-issue":{"issue":"35-36","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["9193"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09193-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,7,3]]},"assertion":[{"value":"6 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 June 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 July 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interests"}}]}}