{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:54:56Z","timestamp":1760784896698},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T00:00:00Z","timestamp":1599177600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T00:00:00Z","timestamp":1599177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11042-020-09779-5","type":"journal-article","created":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T12:03:01Z","timestamp":1599220981000},"page":"691-710","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["Double image compression-encryption algorithm based on fractional order hyper chaotic system and DNA approach"],"prefix":"10.1007","volume":"80","author":[{"given":"Yu-Guang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Bo-Wen","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Yi-Hua","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Wei-Min","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,4]]},"reference":[{"key":"9779_CR1","unstructured":"\u201cData Encryption Standard\u201d (1977) Federal Information Processing Standards Publication (FIPS PUB) No. 46, National Bureau of Standards, Washington, DC"},{"issue":"11","key":"9779_CR2","doi-asserted-by":"publisher","first-page":"1914","DOI":"10.1364\/OL.35.001914","volume":"35","author":"A Alfalou","year":"2010","unstructured":"Alfalou A, Brosseau C (2010) Exploiting root-mean-square time-frequency structure for multiple-image optical compression and encryption. Opt Lett 35(11):1914\u20131916","journal-title":"Opt Lett"},{"issue":"1\u20132","key":"9779_CR3","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/S0375-9601(98)00086-3","volume":"240","author":"MS Baptista","year":"1998","unstructured":"Baptista MS (1998) Cryptography with chaos. Phys Lett A 240(1\u20132):50\u201354","journal-title":"Phys Lett A"},{"issue":"4","key":"9779_CR4","doi-asserted-by":"publisher","first-page":"848","DOI":"10.1109\/TCSI.2005.859617","volume":"53","author":"R Bose","year":"2006","unstructured":"Bose R, Pathak S (2006) A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system. IEEE Trans Circuits Syst I Reg Papers 53(4):848\u2013857","journal-title":"IEEE Trans Circuits Syst I Reg Papers"},{"key":"9779_CR5","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.sigpro.2016.11.016","volume":"134","author":"X Chai","year":"2017","unstructured":"Chai X, Gan Z, Chen Y, Zhang Y (2017) A visually secure image encryption scheme based on compressive sensing. Signal Process 134:35\u201351","journal-title":"Signal Process"},{"issue":"1","key":"9779_CR6","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"XL Chai","year":"2019","unstructured":"Chai XL, Fu XL, Gan ZH, Lu Y, Chen YR (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155(1):44\u201362","journal-title":"Signal Process"},{"key":"9779_CR7","doi-asserted-by":"publisher","first-page":"105837","DOI":"10.1016\/j.optlaseng.2019.105837","volume":"124","author":"X Chai","year":"2020","unstructured":"Chai X, Wu H, Gan Z, Zhang Y, Chen Y, Nixon KW (2020) An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding. Opt Lasers Eng 124:105837","journal-title":"Opt Lasers Eng"},{"key":"9779_CR8","doi-asserted-by":"publisher","first-page":"107525","DOI":"10.1016\/j.sigpro.2020.107525","volume":"171","author":"X Chai","year":"2020","unstructured":"Chai X, Wu H, Gan Z, Zhang Y, Chen Y (2020) Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy. Signal Process 171:107525","journal-title":"Signal Process"},{"key":"9779_CR9","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.1142\/S0218127499001024","volume":"9","author":"GR Chen","year":"1999","unstructured":"Chen GR, Ueta T (1999) Yet another chaotic attractor. Int J Bifurc Chaos 9:1465\u20131466","journal-title":"Int J Bifurc Chaos"},{"issue":"9","key":"9779_CR10","doi-asserted-by":"publisher","first-page":"1690","DOI":"10.1016\/j.ins.2009.12.021","volume":"180","author":"TH Chen","year":"2010","unstructured":"Chen TH, Wu CS (2010) Compression-unimpaired batch-image encryption combining vector quantization and index compression. Inf Sci 180(9):1690\u20131701","journal-title":"Inf Sci"},{"issue":"2","key":"9779_CR11","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlastec.2017.09.008","volume":"99","author":"JX Chen","year":"2018","unstructured":"Chen JX, Zhang Y, Qi L (2018) Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression. Opt Laser Technol 99(2):238\u2013248","journal-title":"Opt Laser Technol"},{"issue":"7","key":"9779_CR12","doi-asserted-by":"publisher","first-page":"10097","DOI":"10.1007\/s11042-016-3600-2","volume":"76","author":"J Deng","year":"2017","unstructured":"Deng J, Zhao S, Wang Y, Wang L, Wang H, Sha H (2017) Image compression-encryption scheme combining 2D compressive sensing with discrete fractional random transform. Multimed Tools Appl 76(7):10097\u201310117","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"9779_CR13","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"DL Donoho","year":"2006","unstructured":"Donoho DL (2006) Compressed sensing. IEEE Trans Inf Theory 52(4):1289\u20131306","journal-title":"IEEE Trans Inf Theory"},{"issue":"1\u20132","key":"9779_CR14","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1504\/IJAIP.2019.099943","volume":"13","author":"S Dube","year":"2019","unstructured":"Dube S, Sharma K (2019) Hybrid approach to enhance contrast of image for forensic investigation using segmented histogram. Int J Adv Intell Paradigms 13(1\u20132):43\u201366","journal-title":"Int J Adv Intell Paradigms"},{"issue":"1","key":"9779_CR15","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.optlastec.2018.01.007","volume":"103","author":"LH Gong","year":"2018","unstructured":"Gong LH, Deng CZ, Pan SM (2018) Image compression-encryption algorithms by combining hyper-chaotic system with discrete fractional random transform. Opt Laser Technol 103(1):48\u201358","journal-title":"Opt Laser Technol"},{"issue":"5","key":"9779_CR16","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1109\/TMM.2006.879919","volume":"8","author":"M Grangetto","year":"2006","unstructured":"Grangetto M, Magli E, Olmo G (2006) Multimedia selective encryption by means of randomized arithmetic coding. IEEE Trans Multimedia 8(5):905\u2013917","journal-title":"IEEE Trans Multimedia"},{"issue":"10","key":"9779_CR17","doi-asserted-by":"publisher","first-page":"2987","DOI":"10.1016\/j.cnsns.2009.11.022","volume":"15","author":"H Hermassi","year":"2010","unstructured":"Hermassi H, Rhouma R, Belghith S (2010) Joint compression and encryption using chaotically mutated Huffman trees. Commun Nonlinear Sci Numer Simul 15(10):2987\u20132999","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"2","key":"9779_CR18","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/BF02837279","volume":"11","author":"DA Huffman","year":"2006","unstructured":"Huffman DA (2006) A method for the construction of minimum-redundancy codes. Resonance 11(2):91\u201399","journal-title":"Resonance"},{"issue":"3","key":"9779_CR19","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1109\/TMM.2008.917355","volume":"10","author":"G Jakimoski","year":"2008","unstructured":"Jakimoski G, Subbalakshmi KP (2008) Cryptanalysis of some multimedia encryption schemes. IEEE Trans Multimedia 10(3):330\u2013338","journal-title":"IEEE Trans Multimedia"},{"issue":"5\u20136","key":"9779_CR20","doi-asserted-by":"publisher","first-page":"3957","DOI":"10.1007\/s11042-019-7642-0","volume":"79","author":"S Kayalvizhi","year":"2020","unstructured":"Kayalvizhi S, Malarvizhi S (2020) A novel encrypted compressive sensing of images based on fractional order hyper chaotic Chen system and DNA operations. Multimed Tools Appl 79(5\u20136):3957\u20133974","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"9779_CR21","doi-asserted-by":"publisher","first-page":"2263","DOI":"10.1109\/TSP.2007.892710","volume":"55","author":"H Kim","year":"2007","unstructured":"Kim H, Wen JT, Villasenor J (2007) Secure arithmetic coding. IEEE Trans Signal Process 55(5):2263\u20132272","journal-title":"IEEE Trans Signal Process"},{"issue":"1","key":"9779_CR22","first-page":"534","volume":"109","author":"M Landir","year":"2019","unstructured":"Landir M, Hamiche H, Kassim S (2019) A novel robust compression-encryption of images based on SPIHT coding and fractional-order discrete-time chaotic system. Opt Laser Technol 109(1):534\u2013546","journal-title":"Opt Laser Technol"},{"issue":"2","key":"9779_CR23","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1147\/rd.232.0149","volume":"23","author":"GG Langdon","year":"1979","unstructured":"Langdon GG, Rissanen JJ (1979) Arithmetic coding. IBM J Res 23(2):149\u2013162","journal-title":"IBM J Res"},{"issue":"8","key":"9779_CR24","doi-asserted-by":"publisher","first-page":"1960","DOI":"10.1109\/TMM.2017.2786860","volume":"20","author":"PY Li","year":"2018","unstructured":"Li PY, Lo KT (2018) A content-adaptive joint image compression and encryption scheme. IEEE Trans Multimed 20(8):1960\u20131972","journal-title":"IEEE Trans Multimed"},{"issue":"24","key":"9779_CR25","doi-asserted-by":"publisher","first-page":"6590","DOI":"10.1016\/j.ijleo.2013.05.092","volume":"124","author":"X Liu","year":"2013","unstructured":"Liu X, Cao Y, Lu P, Lu X, Li Y (2013) Optical image encryption technique based on compressed sensing and Arnold transformation. Optik 124(24):6590\u20136593","journal-title":"Optik"},{"issue":"21","key":"9779_CR26","doi-asserted-by":"publisher","first-page":"28633","DOI":"10.1007\/s11042-018-6013-6","volume":"77","author":"XP Lv","year":"2018","unstructured":"Lv XP, Liao XF, Yang B (2018) A novel scheme for simultaneous image compression and encryption based on wavelet packet transform and multi-chaotic systems. Multimed Tools Appl 77(21):28633\u201328663","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"9779_CR27","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1016\/j.cnsns.2007.12.001","volume":"14","author":"N Nagaraj","year":"2009","unstructured":"Nagaraj N, Vaidya PG, Bhat K (2009) Arithmetic coding as a non-linear dynamical system. Commun Nonlinear Sci Numer Simul 14(4):1013\u20131020","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"9779_CR28","unstructured":"National Institute of Standards and Technology (2001) Advanced encryption standard (AES)"},{"issue":"15","key":"9779_CR29","doi-asserted-by":"publisher","first-page":"19209","DOI":"10.1007\/s11042-017-5378-2","volume":"77","author":"R Ponuma","year":"2018","unstructured":"Ponuma R, Amutha R (2018) Compressive sensing based image compression-encryption using novel 1D-Chaotic map. Multimed Tools Appl 77(15):19209\u201319234","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"9779_CR30","first-page":"3","volume":"18","author":"K Sharma","year":"2017","unstructured":"Sharma K, Bala S, Bansal H, Shrivastava G (2017) Introduction to the special issue on secure solutions for network in scalable computing. Scalable Comput Pract Exp 18(3):3\u20135","journal-title":"Scalable Comput Pract Exp"},{"key":"9779_CR31","volume-title":"Steganography and Its Technique: Technical Overview. Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing","author":"G Shrivastava","year":"2013","unstructured":"Shrivastava G, Pandey A, Sharma K (2013) Steganography and Its Technique: Technical Overview. Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing. Springer, New York"},{"key":"9779_CR32","unstructured":"Shrivastava G, Nhu NG, Bouhlel MS, Sharma K (2017) Special issue on advance research in model driven security, privacy, and forensic of smart devices preface"},{"key":"9779_CR33","doi-asserted-by":"crossref","unstructured":"Shrivastava G, Kumar P, Gupta BB (2018) Handbook of research on network forensics and analysis techniques[M]","DOI":"10.4018\/978-1-5225-4100-4"},{"issue":"2","key":"9779_CR34","doi-asserted-by":"publisher","first-page":"1715","DOI":"10.1007\/s11042-017-4349-y","volume":"77","author":"QZ Wang","year":"2018","unstructured":"Wang QZ, Wei MY, Chen XM (2018) Joint encryption and compression of 3D images based on tensor compressive sensing with non-autonomous 3D chaotic system. Multimed Tools Appl 77(2):1715\u20131734","journal-title":"Multimed Tools Appl"},{"issue":"4356","key":"9779_CR35","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1038\/171737a0","volume":"171","author":"JD Watson","year":"1953","unstructured":"Watson JD, Crick FHC (1953) A structure for deoxyribose nucleic acid. Nature 171(4356):737\u2013738","journal-title":"Nature"},{"issue":"2","key":"9779_CR36","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/LSP.2005.861589","volume":"13","author":"JT Wen","year":"2006","unstructured":"Wen JT, Kim H, Villasenor J (2006) Binary arithmetic coding with key-based interval splitting. IEEE Signal Process Lett 13(2):69\u201372","journal-title":"IEEE Signal Process Lett"},{"key":"9779_CR37","doi-asserted-by":"publisher","first-page":"105661","DOI":"10.1016\/j.optlastec.2019.105661","volume":"119","author":"YG Yang","year":"2019","unstructured":"Yang YG, Guan BW, Li J, Li D, Zhou YH, Shi WM (2019) Image compression-encryption scheme based on fractional order hyper-chaotic systems combined with 2D compressed sensing and DNA encoding. Opt Laser Technol 119:105661","journal-title":"Opt Laser Technol"},{"issue":"5","key":"9779_CR38","doi-asserted-by":"publisher","first-page":"1366","DOI":"10.1016\/j.cnsns.2013.09.019","volume":"19","author":"YS Zhang","year":"2014","unstructured":"Zhang YS, Xiao D, Liu H, Nan H (2014) GLS coding based security solution to JPEG with the structure of aggregated compression and encryption. Commun Nonlinear Sci Numer Simul 19(5):1366\u20131374","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"10","key":"9779_CR39","doi-asserted-by":"publisher","first-page":"3368","DOI":"10.1109\/TCSI.2008.924117","volume":"55","author":"J Zhou","year":"2008","unstructured":"Zhou J, Au OC (2008) Comments on \u201ca novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system\u201d. IEEE Trans Circuits Syst I Reg Papers 55(10):3368\u20132269","journal-title":"IEEE Trans Circuits Syst I Reg Papers"},{"issue":"3","key":"9779_CR40","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/LSP.2006.884012","volume":"14","author":"J Zhou","year":"2007","unstructured":"Zhou J, Liang Z, Chen Y (2007) Security analysis of multimedia encryption schemes based on multiple Huffman table. IEEE Signal Process Lett 14(3):201\u2013204","journal-title":"IEEE Signal Process Lett"},{"issue":"5","key":"9779_CR41","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.1109\/TSP.2009.2013901","volume":"57","author":"J Zhou","year":"2009","unstructured":"Zhou J, Au OC, Wong PH (2009) Adaptive chosen-ciphertext attack on secure arithmetic coding. IEEE Trans Signal Process 57(5):1825\u20131838","journal-title":"IEEE Trans Signal Process"},{"key":"9779_CR42","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optcom.2014.12.084","volume":"343","author":"N Zhou","year":"2015","unstructured":"Zhou N, Li H, Wang D, Pan S, Zhou Z (2015) Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun 343:10\u201321","journal-title":"Opt Commun"},{"issue":"3","key":"9779_CR43","first-page":"121","volume":"82","author":"NR Zhou","year":"2018","unstructured":"Zhou NR, Pan SM, Cheng S, Zhou ZH (2018) Image compression encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82(3):121\u2013133","journal-title":"Opt Laser Technol"},{"issue":"9","key":"9779_CR44","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1016\/j.image.2013.02.004","volume":"28","author":"HG Zhu","year":"2013","unstructured":"Zhu HG, Zhao C, Zhang XD (2013) A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem. Signal Process Image Commun 28(9):670\u2013680","journal-title":"Signal Process Image Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09779-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09779-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09779-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,4]],"date-time":"2021-09-04T02:17:46Z","timestamp":1630721866000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09779-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,4]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["9779"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09779-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,4]]},"assertion":[{"value":"2 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}