{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T19:25:43Z","timestamp":1772133943157,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2021,4,6]],"date-time":"2021-04-06T00:00:00Z","timestamp":1617667200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,6]],"date-time":"2021-04-06T00:00:00Z","timestamp":1617667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"PhD Scientific Research Foundation of Henan Normal University","award":["qd18027"],"award-info":[{"award-number":["qd18027"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11042-021-10850-y","type":"journal-article","created":{"date-parts":[[2021,4,6]],"date-time":"2021-04-06T07:02:31Z","timestamp":1617692551000},"page":"24437-24454","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["An image encryption algorithm based on a novel 1D chaotic map and compressive sensing"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8430-0243","authenticated-orcid":false,"given":"Yuqiang","family":"Dou","sequence":"first","affiliation":[]},{"given":"Ming","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,6]]},"reference":[{"issue":"4","key":"10850_CR1","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/MSP.2007.4286571","volume":"24","author":"R Baraniuk","year":"2007","unstructured":"Baraniuk R (2007) Compressive sensing (lecture notes). IEEE Signal Process Mag 24(4):118\u2013121","journal-title":"IEEE Signal Process Mag"},{"key":"10850_CR2","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1109\/TIT.2005.862083","volume":"52","author":"EJ Candes","year":"2006","unstructured":"Candes EJ, Romberg J, Tao T (2006) Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans Inf Theory 52:489\u2013509","journal-title":"IEEE Trans Inf Theory"},{"key":"10850_CR3","doi-asserted-by":"crossref","unstructured":"Cao C, Sun K, Liu W. (2017) A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal processing 143(2.):122-133.","DOI":"10.1016\/j.sigpro.2017.08.020"},{"key":"10850_CR4","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.sigpro.2018.02.007","volume":"148","author":"X Chai","year":"2018","unstructured":"Chai X, Zheng X, Gan Z, Han D, Chen Y (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124\u2013144","journal-title":"Signal Process"},{"key":"10850_CR5","doi-asserted-by":"publisher","first-page":"4961","DOI":"10.1007\/s00521-018-3913-3","volume":"32","author":"X Chai","year":"2018","unstructured":"Chai X, Fu X, Gan Z et al (2018) An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata. Neural Comput Applic 32:4961\u20134988","journal-title":"Neural Comput Applic"},{"key":"10850_CR6","doi-asserted-by":"crossref","unstructured":"Chen J, Zhang Y, Qi L, Fu C , Xu L (2018) Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression Optics & Laser Technology, S0030399217305534.","DOI":"10.1016\/j.optlastec.2017.09.008"},{"key":"10850_CR7","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"DL Donoho","year":"2006","unstructured":"Donoho DL (2006) Compressed sensing. IEEE Trans Inf Theor 52:1289\u20131306","journal-title":"IEEE Trans Inf Theor"},{"key":"10850_CR8","doi-asserted-by":"crossref","unstructured":"Han J, Claudio M (1995) The influence of the sigmoid function parameters on the speed of back propagation learning. International Workshop on Artificial Neural Networks: from Natural to Artificial Neural Computation Springer-Verlag:195\u2013201.","DOI":"10.1007\/3-540-59497-3_175"},{"key":"10850_CR9","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.jvcir.2017.01.022","volume":"44","author":"G Hu","year":"2017","unstructured":"Hu G, Xiao D, Wang Y, Xiang T (2017) An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications. J Vis Commun Image R 44:116\u2013127","journal-title":"J Vis Commun Image R"},{"key":"10850_CR10","first-page":"1","volume":"12","author":"Y Huang","year":"2019","unstructured":"Huang Y et al (2019) Analysis and FPGA realization of a novel 5D Hyperchaotic four-wing Memristive system, active control synchronization, and secure communication application. Complexity 12:1\u201318","journal-title":"Complexity"},{"issue":"9\u201310","key":"10850_CR11","doi-asserted-by":"publisher","first-page":"6135","DOI":"10.1007\/s11042-019-08282-w","volume":"79","author":"B Idrees","year":"2020","unstructured":"Idrees B, Zafar S, Rashid T, Gao W (2020) Image encryption algorithm using S-box and dynamic H\u00e9non bit level permutation. Multimed Tools Appl 79(9\u201310):6135\u20136162","journal-title":"Multimed Tools Appl"},{"key":"10850_CR12","doi-asserted-by":"publisher","first-page":"5455","DOI":"10.1007\/s11042-015-2515-7","volume":"75","author":"A Jain","year":"2016","unstructured":"Jain A, Rajpal N (2016) A robust image encrytion algorithm resistant to attacks using DNA and chaotic logistic maps. Mutitimed Tools Appl 75:5455\u20135472","journal-title":"Mutitimed Tools Appl"},{"issue":"5","key":"10850_CR13","first-page":"795","volume":"4","author":"RR Kumar","year":"2014","unstructured":"Kumar RR, Kumar MB (2014) A new chaotic image encryption using parametric switching based permutation and diffusion. Ictact J Image Video Process 4(5):795\u2013804(10)","journal-title":"Ictact J Image Video Process"},{"key":"10850_CR14","doi-asserted-by":"crossref","unstructured":"Li T, Yang M, Wu J, Jing X (2017) A Novel Image Encryption Algorithm Based on a Fractional-Order Hyper chaotic System and DNA Computing. Complexity:1\u201313","DOI":"10.1155\/2017\/9010251"},{"issue":"24","key":"10850_CR15","doi-asserted-by":"publisher","first-page":"6590","DOI":"10.1016\/j.ijleo.2013.05.092","volume":"124","author":"XY Liu","year":"2013","unstructured":"Liu XY, Cao YP, Lu P, Lu X, Li Y (2013) Optical image encryption technique based on compressed sensing and Arnold transformation. Optik 124(24):6590\u20136593","journal-title":"Optik"},{"issue":"8","key":"10850_CR16","doi-asserted-by":"publisher","first-page":"10217","DOI":"10.1007\/s11042-017-5406-2","volume":"77","author":"J Liu","year":"2018","unstructured":"Liu J, Yang D, Zhou H, Chen S (2018) A digital image encryption algorithm based on bit-planes and an improved logistic map. Multimed Tools Appl 77(8):10217\u201310233","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10850_CR17","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s11554-019-00917-3","volume":"17","author":"Y Luo","year":"2020","unstructured":"Luo Y, Qin J, Xiang X, Tan Y, Liu Q, Xiang L (2020) Coverless real-time image information hiding based on image block matching and dense convolutional network. J Real-Time Image Proc 17(1):125\u2013135","journal-title":"J Real-Time Image Proc"},{"issue":"10","key":"10850_CR18","first-page":"78","volume":"24","author":"C Lv-Chen","year":"2015","unstructured":"Lv-Chen C, Yu-Ling L, Sen-Hui Q, Jun-Xiu L (2015) A perturbation method to the tent map based on Lyapunov exponent and its application. Chin Phys B 24(10):78\u201385","journal-title":"Chin Phys B"},{"key":"10850_CR19","doi-asserted-by":"crossref","unstructured":"Machkour, M. , Saaidi, A. , & Benmaati, M. L. . (2015). A novel image encryption algorithm based on the two-dimensional logistic map and the latin square image cipher. 3D Research.","DOI":"10.1007\/s13319-015-0068-1"},{"key":"10850_CR20","doi-asserted-by":"crossref","unstructured":"Mallat SG, Zhang Z. Matching pursuits with time-frequency dictionaries. IEEE Transactions on Signal Processing 41(12): 3397\u20133415.","DOI":"10.1109\/78.258082"},{"issue":"1","key":"10850_CR21","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/s11071-011-0006-6","volume":"67","author":"O Mirzaei","year":"2012","unstructured":"Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyperchaos. Nonlinear Dyn 67(1):557\u2013566","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"10850_CR22","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1007\/s11042-013-1699-y","volume":"74","author":"B Norouzi","year":"2015","unstructured":"Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2015) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed Tools Appl 74(3):781\u2013811","journal-title":"Multimed Tools Appl"},{"key":"10850_CR23","doi-asserted-by":"crossref","unstructured":"Pak C, Huang L A new color image encryption using combination of the 1D chaotic map. Signal Processing 138:129\u2013137.","DOI":"10.1016\/j.sigpro.2017.03.011"},{"issue":"9","key":"10850_CR24","doi-asserted-by":"publisher","first-page":"12027","DOI":"10.1007\/s11042-018-6739-1","volume":"78","author":"C Pak","year":"2017","unstructured":"Pak C, An K, Jang P (2017) A novel bit-level color image encryption using improved 1D chaotic map. Multimedia Tools Appl 78(9):12027\u201312042","journal-title":"Multimedia Tools Appl"},{"key":"10850_CR25","unstructured":"Pati YC, Rezaiifar R, And P. S. Krishnaprasad orthogonal matching pursuit: recursive function approximation with applications to wavelet decomposition. In Proc. of the 27th annual Asilomar conference on signals, Systems and Computers"},{"issue":"15","key":"10850_CR26","doi-asserted-by":"publisher","first-page":"19209","DOI":"10.1007\/s11042-017-5378-2","volume":"77","author":"R Ponuma","year":"2018","unstructured":"Ponuma R, Amutha R (2018) Compressive sensing based image compression-encryption using novel 1D-chaotic map. Multimed Tools Appl 77(15):19209\u201319234","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"10850_CR27","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1007\/s11042-012-1292-9","volume":"71","author":"Y Sangeetha","year":"2014","unstructured":"Sangeetha Y, Meenakshi S, Sundaram CS (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71(3):1469\u20131497","journal-title":"Multimed Tools Appl"},{"key":"10850_CR28","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1016\/j.protcy.2012.10.063","volume":"6","author":"SG Shaila","year":"2012","unstructured":"Shaila SG, Vadivel A (2012) Block encoding of color histogram for content based image retrieval applications. Procedia Technology 6:526\u2013533","journal-title":"Procedia Technology"},{"issue":"4","key":"10850_CR29","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.jvcir.2016.01.003","volume":"36","author":"SG Shaila","year":"2016","unstructured":"Shaila SG, Vadivel A (2016) Indexing and encoding based image feature representation with bin overlapped similarity measure for CBIR applications. Journal of Visual Communication & Image Representation 36(4):40\u201355","journal-title":"Journal of Visual Communication & Image Representation"},{"key":"10850_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ACCESS.2018.2876146","volume":"7","author":"W Shao","year":"2019","unstructured":"Shao W, Cheng M, Luo C et al (2019) An image encryption scheme based on hybrid electro-optic chaotic sources and compressive sensing. IEEE Access 7:1\u20131","journal-title":"IEEE Access"},{"key":"10850_CR31","doi-asserted-by":"crossref","unstructured":"Shao W, Cheng M , Luo C, Deng L , Liu D (2019) An image encryption scheme based on hybrid electro-optic chaotic sources and compressive sensing. IEEE access 1-1.","DOI":"10.1109\/ACCESS.2019.2949704"},{"issue":"5","key":"10850_CR32","doi-asserted-by":"publisher","first-page":"6229","DOI":"10.1007\/s11042-016-3311-8","volume":"76","author":"X Wang","year":"2017","unstructured":"Wang X, Liu C (2017) A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed Tools Appl 76(5):6229\u20136245","journal-title":"Multimed Tools Appl"},{"key":"10850_CR33","doi-asserted-by":"crossref","unstructured":"Ye G, Pan C, Huang X, Zhao Z, and He J (2018) A chaotic image encryption algorithm based on information entropy. Int. J. Bifurcation Chaos 28 (1): Art. no. 1850010.","DOI":"10.1142\/S0218127418500104"},{"key":"10850_CR34","doi-asserted-by":"crossref","unstructured":"Ye G, Pan C, Huang X, Zhao Z, and He J (2018) A chaotic image encryption algorithm based on information entropy. Int. J. Bifurcation Chaos 28 (1):Art. no. 1850010.","DOI":"10.1142\/S0218127418500104"},{"issue":"8","key":"10850_CR35","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1166\/mex.2020.1734","volume":"10","author":"X Yin","year":"2020","unstructured":"Yin X, Zhang M, Wang L, Liu Y (2020) Interface debonding performance of precast segmental nano-materials based concrete (PSNBC) beams. Mater Express 10(8):1317\u20131327","journal-title":"Mater Express"},{"issue":"8","key":"10850_CR36","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1109\/LSP.2010.2052243","volume":"17","author":"L Yu","year":"2010","unstructured":"Yu L, Barbot JP, Zheng G et al (2010) Compressive sensing with chaotic sequence[J]. IEEE Signal Processing Letters 17(8):731\u2013734","journal-title":"IEEE Signal Processing Letters"},{"issue":"4","key":"10850_CR37","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1007\/s11071-013-0750-x","volume":"72","author":"Y Zhang","year":"2013","unstructured":"Zhang Y, Xiao D (2013) Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack. Nonlinear Dynamics 72(4):751\u2013756","journal-title":"Nonlinear Dynamics"},{"key":"10850_CR38","doi-asserted-by":"crossref","unstructured":"Zhang YS, Xiao D, Shu YL, Li J (2011) A novel image encryption scheme based on a linear hyperbolic chaotic sys-tem of partial differential equations. Signal process-image Commun. 28(3), 292\u2013300 (2013)","DOI":"10.1016\/j.image.2012.12.009"},{"issue":"8","key":"10850_CR39","doi-asserted-by":"publisher","first-page":"2378","DOI":"10.1109\/TIP.2011.2109730","volume":"20","author":"L Zhang","year":"2011","unstructured":"Zhang L, Zhang L, Mou X, Zhang D (2011) FSIM: a feature similarity index for image quality assessment. IEEE Trans Image Process 20(8):2378\u20132386","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"10850_CR40","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1007\/s11071-014-1235-2","volume":"76","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Xiao D, Wen W, Li M (2014) Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Nonlinear Dyn 76(3):1645\u20131650","journal-title":"Nonlinear Dyn"},{"key":"10850_CR41","first-page":"1","volume":"12","author":"Z Zhang","year":"2020","unstructured":"Zhang Z et al (2020) Dynamic analysis, circuit design, and synchronization of a novel 6D Memristive four-wing Hyperchaotic system with multiple coexisting attractors. Complexity 12:1\u201317","journal-title":"Complexity"},{"key":"10850_CR42","first-page":"1","volume":"99","author":"J Zhang","year":"2020","unstructured":"Zhang J et al (2020) A cascaded R-CNN with multiscale attention and imbalanced samples for traffic sign detection. IEEE Access 99:1\u20131","journal-title":"IEEE Access"},{"issue":"18","key":"10850_CR43","doi-asserted-by":"publisher","first-page":"5075","DOI":"10.1016\/j.ijleo.2014.06.054","volume":"125","author":"N Zhou","year":"2014","unstructured":"Zhou N, Zhang A, Wu J, Pei D, Yang Y (2014) Novel hybrid image compression\u2013encryption algorithm based on compressive sensing. Optik-International Journal for Light and Electron Optics 125(18):5075\u20135508","journal-title":"Optik-International Journal for Light and Electron Optics"},{"key":"10850_CR44","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172\u2013182","journal-title":"Signal Process"},{"key":"10850_CR45","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.optlastec.2016.02.018","volume":"82","author":"NR Zhou","year":"2016","unstructured":"Zhou NR, Pan SM, Cheng S, Zhou ZH (2016) Image compression encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121\u2013133","journal-title":"Opt Laser Technol"},{"key":"10850_CR46","doi-asserted-by":"publisher","DOI":"10.1051\/matecconf\/202030903017","volume":"309","author":"K Zhu","year":"2020","unstructured":"Zhu K, Cheng J (2020) Color image encryption via compressive sensing and chaotic systems. MATEC Web of Conferences 309:03017","journal-title":"MATEC Web of Conferences"},{"issue":"6","key":"10850_CR47","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1016\/j.image.2013.02.004","volume":"28","author":"H Zhu","year":"2013","unstructured":"Zhu H, Zhao C, Zhang X (2013) A novel image encryption\u2013compression scheme using hyper-chaos and Chinese remainder theorem. Signal Process-Image 28(6):670\u2013680","journal-title":"Signal Process-Image"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10850-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10850-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10850-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T04:15:17Z","timestamp":1625458517000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10850-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,6]]},"references-count":47,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["10850"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10850-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,6]]},"assertion":[{"value":"3 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 November 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 March 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 April 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}