{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T17:55:07Z","timestamp":1762624507384,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,11,7]],"date-time":"2020-11-07T00:00:00Z","timestamp":1604707200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,7]],"date-time":"2020-11-07T00:00:00Z","timestamp":1604707200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-10149-4","type":"journal-article","created":{"date-parts":[[2020,11,7]],"date-time":"2020-11-07T17:02:45Z","timestamp":1604768565000},"page":"9055-9074","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Dual embedding model: a new framework for visually meaningful image encryption"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4040-2448","authenticated-orcid":false,"given":"Yu-Guang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Bao-Pu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yong-Li","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yi-Hua","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Wei-Min","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,7]]},"reference":[{"key":"10149_CR1","doi-asserted-by":"publisher","first-page":"106165","DOI":"10.1016\/j.optlastec.2020.106165","volume":"127","author":"JO Armijo-Correa","year":"2020","unstructured":"Armijo-Correa JO, Murgu\u00eda JS, Mej\u00eda-Carlos M, Arce-Guevara VE, Aboytes-Gonz\u00e1lez JA (2020) An improved visually meaningful encrypted image scheme. Opt Laser Technol 127:106165","journal-title":"Opt Laser Technol"},{"key":"10149_CR2","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.ins.2015.06.049","volume":"324","author":"L Bao","year":"2015","unstructured":"Bao L, Zhou Y (2015) Image encryption: generating visually meaningful encrypted images. Inf Sci 324:197\u2013207","journal-title":"Inf Sci"},{"issue":"3","key":"10149_CR3","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1006\/acha.1997.0238","volume":"5","author":"AR Calderbank","year":"1998","unstructured":"Calderbank AR, Daubechies I, Sweldens W, Yeo BL (1998) Wavelet transforms that map integers to integers. Appl Comput Harmon Anal 5(3):332\u2013369","journal-title":"Appl Comput Harmon Anal"},{"key":"10149_CR4","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1016\/j.jvcir.2016.08.003","volume":"44","author":"X Cao","year":"2017","unstructured":"Cao X, Wei X, Guo R, Wang C (2017) No embedding: a novel image cryptosystem for meaningful encryption. J Vis Commun Image Represent 44:236\u2013249","journal-title":"J Vis Commun Image Represent"},{"key":"10149_CR5","first-page":"197","volume":"54","author":"Y Cao","year":"2018","unstructured":"Cao Y, Zhou Z, Sun X et al (2018) Coverless information hiding based on the molecular structure images of material. Comp Mater Cont 54:197\u2013207","journal-title":"Comp Mater Cont"},{"key":"10149_CR6","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197\u2013213","journal-title":"Opt Lasers Eng"},{"key":"10149_CR7","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.sigpro.2016.11.016","volume":"134","author":"X Chai","year":"2017","unstructured":"Chai X, Gan Z, Chen Y, Zhang Y (2017) A visually secure image encryption scheme based on compressive sensing. Signal Process 134:35\u201351","journal-title":"Signal Process"},{"key":"10149_CR8","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.sigpro.2018.02.007","volume":"148","author":"X Chai","year":"2018","unstructured":"Chai X, Zheng X, Gan Z, Han D, Chen Y (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124\u2013144","journal-title":"Signal Process"},{"key":"10149_CR9","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s00521-017-2993-9","volume":"31","author":"X Chai","year":"2019","unstructured":"Chai X, Gan Z, Yuan K, Chen Y, Liu X (2019) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput & Applic 31:219\u2013237","journal-title":"Neural Comput & Applic"},{"key":"10149_CR10","doi-asserted-by":"publisher","first-page":"105837","DOI":"10.1016\/j.optlaseng.2019.105837","volume":"124","author":"X Chai","year":"2020","unstructured":"Chai X, Wu H, Gan Z et al (2020) An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding. Opt Lasers Eng 124:105837","journal-title":"Opt Lasers Eng"},{"key":"10149_CR11","doi-asserted-by":"crossref","unstructured":"Chai X, Wu H, Gan Z, et al. (2020) Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy. Signal Processing:107525","DOI":"10.1016\/j.sigpro.2020.107525"},{"key":"10149_CR12","doi-asserted-by":"crossref","unstructured":"X. Chen, H. Sun, Y. Tobe, et al. (2015) Coverless information hiding method based on the Chinese mathematical expression. International Conference on Cloud Computing and Security. Springer, Cham, pp.133\u2013143","DOI":"10.1007\/978-3-319-27051-7_12"},{"key":"10149_CR13","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"Z Hua","year":"2016","unstructured":"Hua Z, Zhou Y (2016) Image encryption using 2D logistic-adjusted-sine map. Inf Sci 339:237\u2013253","journal-title":"Inf Sci"},{"key":"10149_CR14","doi-asserted-by":"crossref","unstructured":"F. Jie, P. Ping, G. Zeyu, et al. (2019) A meaningful visually secure image encryption scheme. 2019 IEEE Fifth International Conference on Big Data Computing Service and Applications (Big Data Service). IEEE, pp.199\u2013204","DOI":"10.1109\/BigDataService.2019.00034"},{"key":"10149_CR15","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.optlaseng.2016.10.009","volume":"90","author":"A Kanso","year":"2017","unstructured":"Kanso A, Ghebleh M (2017) An algorithm for encryption of secret images into meaningful images. Opt Lasers Eng 90:196\u2013208","journal-title":"Opt Lasers Eng"},{"key":"10149_CR16","first-page":"217","volume":"40","author":"K Karampidis","year":"2018","unstructured":"Karampidis K, Kavallieratou E, Papadourakis G (2018) A review of image steganalysis techniques for digital forensics. J Info Secur Appl 40:217\u2013235","journal-title":"J Info Secur Appl"},{"key":"10149_CR17","first-page":"9803519","volume":"2018","author":"M Li","year":"2018","unstructured":"Li M, Fan H, Ren H et al (2018) Meaningful image encryption based on reversible data hiding in compressive sensing domain. Secur Commun Netw 2018:9803519","journal-title":"Secur Commun Netw"},{"key":"10149_CR18","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.optlaseng.2016.03.019","volume":"84","author":"W Liu","year":"2016","unstructured":"Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26\u201336","journal-title":"Opt Lasers Eng"},{"key":"10149_CR19","doi-asserted-by":"crossref","unstructured":"Nandur D, Vanamala HR (2018) Visually meaningful encrypted images using Arnold transform and other transforms. 2018 International Conference on Computing, Power and Communication Technologies (GUCON). IEEE, pp. 322\u2013326.","DOI":"10.1109\/GUCON.2018.8675044"},{"key":"10149_CR20","doi-asserted-by":"publisher","first-page":"170168","DOI":"10.1109\/ACCESS.2019.2955570","volume":"7","author":"P Ping","year":"2019","unstructured":"Ping P, Fu J, Mao Y, Xu F, Gao J (2019) Meaningful encryption: generating visually meaningful encrypted images by compressive sensing and reversible color transformation. IEEE Access 7:170168\u2013170184","journal-title":"IEEE Access"},{"key":"10149_CR21","doi-asserted-by":"publisher","first-page":"25707","DOI":"10.1007\/s11042-019-07808-6","volume":"78","author":"R Ponuma","year":"2019","unstructured":"Ponuma R, Amutha R, Aparna S et al (2019) Visually meaningful image encryption using data hiding and chaotic compressive sensing. Multimed Tools Appl 78:25707\u201325729","journal-title":"Multimed Tools Appl"},{"key":"10149_CR22","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.ipl.2015.09.016","volume":"116","author":"S Sun","year":"2016","unstructured":"Sun S (2016) A novel edge based image steganography with 2k correction and Huffman encoding. Inf Process Lett 116:93\u201399","journal-title":"Inf Process Lett"},{"key":"10149_CR23","doi-asserted-by":"publisher","first-page":"817","DOI":"10.2478\/amcs-2019-0060","volume":"29","author":"T Tuncer","year":"2019","unstructured":"Tuncer T, Dogan S, Tadeusiewicz R, P\u0142awiak P (2019) Improved reference image encryption methods based on 2K correction in the integer wavelet domain. Int J Appl Math Comput Sci 29:817\u2013829","journal-title":"Int J Appl Math Comput Sci"},{"key":"10149_CR24","unstructured":"Vanamala HR, Nandur D (2019) Genetic algorithm and chaotic maps based visually meaningful image encryption. TENCON 2019-2019 IEEE Region 10 Conference (TENCON). IEEE, 892-896"},{"key":"10149_CR25","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.sigpro.2018.10.001","volume":"155","author":"H Wang","year":"2019","unstructured":"Wang H, Xiao D, Li M, Xiang Y, Li X (2019) A visually secure image encryption scheme based on parallel compressive sensing. Signal Process 155:218\u2013232","journal-title":"Signal Process"},{"key":"10149_CR26","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ab52bc","volume":"95","author":"Q Xu","year":"2020","unstructured":"Xu Q, Sun K, Zhu C (2020) A visually secure asymmetric image encryption scheme based on RSA algorithm and hyperchaotic map. Phys Scr 95:035223","journal-title":"Phys Scr"},{"key":"10149_CR27","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.ins.2016.01.078","volume":"345","author":"YG Yang","year":"2016","unstructured":"Yang YG, Tian J, Lei H, Zhou YH, Shi WM (2016) Novel quantum image encryption using one-dimensional quantum cellular automata. Inf Sci 345:257\u2013270","journal-title":"Inf Sci"},{"key":"10149_CR28","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ins.2017.11.009","volume":"429","author":"YG Yang","year":"2018","unstructured":"Yang YG, Zhang YC, Chen XB, Zhou YH, Shi WM (2018) Eliminating the texture features in visually meaningful cipher images. Inf Sci 429:102\u2013119","journal-title":"Inf Sci"},{"key":"10149_CR29","doi-asserted-by":"publisher","first-page":"105661","DOI":"10.1016\/j.optlastec.2019.105661","volume":"119","author":"YG Yang","year":"2019","unstructured":"Yang YG, Guan BW, Li J et al (2019) Image compression-encryption scheme based on fractional order hyper-chaotic systems combined with 2D compressed sensing and DNA encoding. Opt Laser Technol 119:105661","journal-title":"Opt Laser Technol"},{"key":"10149_CR30","doi-asserted-by":"crossref","unstructured":"Yang YG, Zou L, Zhou YH, et al. (2020) Visually meaningful encryption for color images by using Qi hyper-chaotic system and singular value decomposition in YCbCr color space. Optik:164422","DOI":"10.1016\/j.ijleo.2020.164422"},{"key":"10149_CR31","doi-asserted-by":"publisher","first-page":"4927","DOI":"10.1007\/s00500-018-3151-8","volume":"23","author":"Z Zhou","year":"2019","unstructured":"Zhou Z, Mu Y, Wu QJ (2019) Coverless image steganography using partial-duplicate image retrieval. Soft Comput 23:4927\u20134938","journal-title":"Soft Comput"},{"key":"10149_CR32","doi-asserted-by":"publisher","first-page":"7965","DOI":"10.1007\/s11042-018-6444-0","volume":"78","author":"L Zou","year":"2019","unstructured":"Zou L, Sun J, Gao M, Wan W, Gupta BB (2019) A novel coverless information hiding method based on the average pixel value of the sub-images. Multimed Tools Appl 78:7965\u20137980","journal-title":"Multimed Tools Appl"},{"key":"10149_CR33","doi-asserted-by":"crossref","unstructured":"Jiang DH, Xu GB (2020) Nonlocal sets of orthogonal product states in an arbitrary multipartite quantum system. Phys Rev A 102:032211","DOI":"10.1103\/PhysRevA.102.032211"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10149-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-10149-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10149-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T21:44:27Z","timestamp":1614635067000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-10149-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,7]]},"references-count":33,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10149"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10149-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,11,7]]},"assertion":[{"value":"5 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}