{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T04:25:49Z","timestamp":1775190349675,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:00:00Z","timestamp":1654128000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:00:00Z","timestamp":1654128000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s11042-021-11656-8","type":"journal-article","created":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T04:04:32Z","timestamp":1654142672000},"page":"22033-22062","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["A visually meaningful image encryption algorithm based on adaptive 2D compressive sensing and chaotic system"],"prefix":"10.1007","volume":"82","author":[{"given":"Yu-Guang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Bao-Pu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yong-Li","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yi-Hua","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Wei-Min","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Liao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,2]]},"reference":[{"key":"11656_CR1","doi-asserted-by":"publisher","first-page":"106165","DOI":"10.1016\/j.optlastec.2020.106165","volume":"127","author":"JO Armijo-Correa","year":"2020","unstructured":"Armijo-Correa JO, Murgu\u00eda JS, Mej\u00eda-Carlos M et al (2020) An improved visually meaningful encrypted image scheme. Opt Laser Technol 127:106165","journal-title":"Opt Laser Technol"},{"key":"11656_CR2","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.ins.2015.06.049","volume":"324","author":"L Bao","year":"2015","unstructured":"Bao L, Zhou Y (2015) Image encryption: generating visually meaningful encrypted images. Inf Sci 324:197\u2013207","journal-title":"Inf Sci"},{"issue":"3","key":"11656_CR3","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1006\/acha.1997.0238","volume":"5","author":"AR Calderbank","year":"1998","unstructured":"Calderbank AR, Daubechies I, Sweldens W et al (1998) Wavelet transforms that map integers to integers. Appl Comput Harmon Anal 5(3):332\u2013369","journal-title":"Appl Comput Harmon Anal"},{"key":"11656_CR4","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.sigpro.2016.11.016","volume":"134","author":"X Chai","year":"2017","unstructured":"Chai X, Gan Z, Chen Y et al (2017) A visually secure image encryption scheme based on compressive sensing. Signal Process 134:35\u201351","journal-title":"Signal Process"},{"key":"11656_CR5","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.sigpro.2018.02.007","volume":"148","author":"X Chai","year":"2018","unstructured":"Chai X, Zheng X, Gan Z et al (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124\u2013144","journal-title":"Signal Process"},{"key":"11656_CR6","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"X Chai","year":"2019","unstructured":"Chai X, Fu X, Gan Z et al (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44\u201362","journal-title":"Signal Process"},{"key":"11656_CR7","doi-asserted-by":"publisher","first-page":"105837","DOI":"10.1016\/j.optlaseng.2019.105837","volume":"124","author":"X Chai","year":"2020","unstructured":"Chai X, Wu H, Gan Z et al (2020) An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding. Opt Lasers Eng 124:105837","journal-title":"Opt Lasers Eng"},{"key":"11656_CR8","doi-asserted-by":"publisher","first-page":"107525","DOI":"10.1016\/j.sigpro.2020.107525","volume":"171","author":"X Chai","year":"2020","unstructured":"Chai X, Wu H, Gan Z et al (2020) Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy. Signal Process 171:107525","journal-title":"Signal Process"},{"key":"11656_CR9","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.ins.2020.10.007","volume":"556","author":"X Chai","year":"2021","unstructured":"Chai X, Wu H, Gan Z et al (2021) An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing. Inf Sci 556:305\u2013340","journal-title":"Inf Sci"},{"issue":"03","key":"11656_CR10","doi-asserted-by":"publisher","first-page":"1750046","DOI":"10.1142\/S0218127417500468","volume":"27","author":"E Chen","year":"2017","unstructured":"Chen E, Min L, Chen G (2017) Discrete chaotic systems with one-line equilibria and their application to image encryption. Int J Bifurc Chaos 27(03):1750046","journal-title":"Int J Bifurc Chaos"},{"key":"11656_CR11","unstructured":"Data Encryption Standard (1977) Federal information processing standards publication (FIPS PUB) no. 46, National Bureau of Standards, Washington, DC"},{"issue":"7","key":"11656_CR12","doi-asserted-by":"publisher","first-page":"10097","DOI":"10.1007\/s11042-016-3600-2","volume":"76","author":"J Deng","year":"2017","unstructured":"Deng J, Zhao S, Wang Y et al (2017) Image compression-encryption scheme combining 2D compressive sensing with discrete fractional random transform. Multimed Tools Appl 76(7):10097\u201310117","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"11656_CR13","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"DL Donoho","year":"2006","unstructured":"Donoho DL (2006) Compressed sensing. IEEE Trans Inf Theory 52(4):1289\u20131306","journal-title":"IEEE Trans Inf Theory"},{"issue":"7","key":"11656_CR14","doi-asserted-by":"publisher","first-page":"1589","DOI":"10.1016\/j.sigpro.2011.01.002","volume":"91","author":"A Eftekhari","year":"2011","unstructured":"Eftekhari A, Babaie-Zadeh M, Moghaddam HA (2011) Two-dimensional random projection. Signal Process 91(7):1589\u20131603","journal-title":"Signal Process"},{"issue":"7","key":"11656_CR15","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1016\/j.jvcir.2013.06.006","volume":"24","author":"Z Gao","year":"2013","unstructured":"Gao Z, Xiong C, Ding L et al (2013) Image representation using block compressive sensing for compression applications. J Vis Commun Image Represent 24(7):885\u2013894","journal-title":"J Vis Commun Image Represent"},{"key":"11656_CR16","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"Z Hua","year":"2016","unstructured":"Hua Z, Zhou Y (2016) Image encryption using 2D Logistic-adjusted-Sine map. Inf Sci 339:237\u2013253","journal-title":"Inf Sci"},{"key":"11656_CR17","doi-asserted-by":"publisher","first-page":"107998","DOI":"10.1016\/j.sigpro.2021.107998","volume":"183","author":"Z Hua","year":"2021","unstructured":"Hua Z, Zhang K, Li Y et al (2021) Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing. Signal Process 183:107998","journal-title":"Signal Process"},{"key":"11656_CR18","doi-asserted-by":"publisher","first-page":"126976","DOI":"10.1016\/j.optcom.2021.126976","volume":"492","author":"D Huo","year":"2021","unstructured":"Huo D, Zhu Z, Wei L et al (2021) A visually secure image encryption scheme based on 2D compressive sensing and integer wavelet transform embedding. Opt Commun 492:126976","journal-title":"Opt Commun"},{"key":"11656_CR19","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.optlaseng.2016.10.009","volume":"90","author":"A Kanso","year":"2017","unstructured":"Kanso A, Ghebleh M (2017) An algorithm for encryption of secret images into meaningful images. Opt Lasers Eng 90:196\u2013208","journal-title":"Opt Lasers Eng"},{"issue":"12","key":"11656_CR20","doi-asserted-by":"publisher","first-page":"3397","DOI":"10.1109\/78.258082","volume":"41","author":"SG Mallat","year":"1993","unstructured":"Mallat SG, Zhang ZF (1993) Matching pursuits with time-frequency dictionaries. IEEE Trans Signal Process 41(12):3397\u20133415","journal-title":"IEEE Trans Signal Process"},{"issue":"1","key":"11656_CR21","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1109\/TSP.2008.2007606","volume":"57","author":"H Mohimani","year":"2009","unstructured":"Mohimani H, Babaie-Zadeh M, Jutten C (2009) A fast approach for over complete sparse decomposition based on smoothed l0 norm. IEEE Trans Signal Process 57(1):289\u2013301","journal-title":"IEEE Trans Signal Process"},{"issue":"33","key":"11656_CR22","doi-asserted-by":"publisher","first-page":"25115","DOI":"10.1007\/s11042-020-09034-x","volume":"79","author":"F Musanna","year":"2020","unstructured":"Musanna F, Dangwal D, Kumar S (2020) A novel chaos-based approach in conjunction with MR-SVD and pairing function for generating visually meaningful cipher images. Multimed Tools Appl 79(33):25115\u201325142","journal-title":"Multimed Tools Appl"},{"key":"11656_CR23","unstructured":"National Institute of Standards and Technology (2001) Advanced encryption standard (AES)"},{"key":"11656_CR24","doi-asserted-by":"publisher","first-page":"170168","DOI":"10.1109\/ACCESS.2019.2955570","volume":"7","author":"P Ping","year":"2019","unstructured":"Ping P, Fu J, Mao Y et al (2019) Meaningful encryption: generating visually meaningful encrypted images by compressive sensing and reversible color transformation. IEEE Access 7:170168\u2013170184","journal-title":"IEEE Access"},{"issue":"2","key":"11656_CR25","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.ipl.2015.09.016","volume":"116","author":"S Sun","year":"2016","unstructured":"Sun S (2016) A novel edge-based image steganography with 2k correction and Huffman encoding. Inf Process Lett 116(2):93\u201399","journal-title":"Inf Process Lett"},{"issue":"12","key":"11656_CR26","doi-asserted-by":"publisher","first-page":"4655","DOI":"10.1109\/TIT.2007.909108","volume":"53","author":"JA Tropp","year":"2007","unstructured":"Tropp JA, Gilbert AC (2007) Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans Inf Theory 53(12):4655\u20134666","journal-title":"IEEE Trans Inf Theory"},{"issue":"4","key":"11656_CR27","doi-asserted-by":"publisher","first-page":"817","DOI":"10.2478\/amcs-2019-0060","volume":"29","author":"T Tuncer","year":"2019","unstructured":"Tuncer T, Dogan S, Tadeusiewicz R et al (2019) Improved reference image encryption methods based on 2K correction in the integer Wavelet domain. Int J Appl Math Comput Sci 29(4):817\u2013829","journal-title":"Int J Appl Math Comput Sci"},{"key":"11656_CR28","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.sigpro.2018.10.001","volume":"155","author":"H Wang","year":"2019","unstructured":"Wang H, Xiao D, Li M et al (2019) A visually secure image encryption scheme based on parallel compressive sensing. Signal Process 155:218\u2013232","journal-title":"Signal Process"},{"key":"11656_CR29","doi-asserted-by":"publisher","first-page":"107580","DOI":"10.1016\/j.sigpro.2020.107580","volume":"173","author":"W Wen","year":"2020","unstructured":"Wen W, Hong Y, Fang Y et al (2020) A visually secure image encryption scheme based on semi-tensor product compressed sensing. Signal Process 173:107580","journal-title":"Signal Process"},{"issue":"2","key":"11656_CR30","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. J Sel Areas Telecommun (JSAT) 1(2):31\u201338","journal-title":"J Sel Areas Telecommun (JSAT)"},{"key":"11656_CR31","doi-asserted-by":"crossref","unstructured":"Xu GB, Jiang DH (2021) Novel methods to construct nonlocal sets of orthogonal product states in an arbitrary bipartite high-dimensional system. Quantum Inf Process 20:128","DOI":"10.1007\/s11128-021-03062-8"},{"key":"11656_CR32","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.ins.2016.01.078","volume":"345","author":"YG Yang","year":"2016","unstructured":"Yang YG, Tian J, Lei H et al (2016) Novel quantum image encryption using one-dimensional quantum cellular automata. Inf Sci 345:257\u2013270","journal-title":"Inf Sci"},{"key":"11656_CR33","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ins.2017.11.009","volume":"429","author":"YG Yang","year":"2018","unstructured":"Yang YG, Zhang YC, Chen XB et al (2018) Eliminating the texture features in visually meaningful cipher images. Inf Sci 429:102\u2013119","journal-title":"Inf Sci"},{"key":"11656_CR34","doi-asserted-by":"publisher","first-page":"105661","DOI":"10.1016\/j.optlastec.2019.105661","volume":"119","author":"YG Yang","year":"2019","unstructured":"Yang YG, Guan BW, Li J et al (2019) Image compression-encryption scheme based on fractional order hyper-chaotic systems combined with 2D compressed sensing and DNA encoding. Opt Laser Technol 119:105661","journal-title":"Opt Laser Technol"},{"key":"11656_CR35","doi-asserted-by":"publisher","first-page":"164422","DOI":"10.1016\/j.ijleo.2020.164422","volume":"213","author":"YG Yang","year":"2020","unstructured":"Yang YG, Zou L, Zhou YH et al (2020) Visually meaningful encryption for color images by using Qi hyper-chaotic system and singular value decomposition in YCbCr color space. Optik 213:164422","journal-title":"Optik"},{"key":"11656_CR36","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.ins.2021.01.041","volume":"562","author":"YG Yang","year":"2021","unstructured":"Yang YG, Wang BP, Yang YL et al (2021) Visually meaningful image encryption based on universal embedding model. Inf Sci 562:304\u2013324","journal-title":"Inf Sci"},{"key":"11656_CR37","doi-asserted-by":"publisher","first-page":"9055","DOI":"10.1007\/s11042-020-10149-4","volume":"80","author":"YG Yang","year":"2021","unstructured":"Yang YG, Wang BP, Yang YL et al (2021) Dual embedding model: a new framework for visually meaningful image encryption. Multimed Tools Appl 80:9055\u20139074","journal-title":"Multimed Tools Appl"},{"key":"11656_CR38","doi-asserted-by":"publisher","first-page":"107563","DOI":"10.1016\/j.sigpro.2020.107563","volume":"172","author":"GD Ye","year":"2020","unstructured":"Ye GD, Pan C, Dong YX, Shi Y, Huang XL (2020) Image encryption and hiding algorithm based on compressive sensing and random numbers insertion. Signal Process 172:107563","journal-title":"Signal Process"},{"issue":"2","key":"11656_CR39","doi-asserted-by":"crossref","first-page":"4071","DOI":"10.1002\/ett.4071","volume":"32","author":"GD Ye","year":"2021","unstructured":"Ye GD, Pan C, Dong YX, Jiao KX, Huang XL (2021) A novel multi-image&nbsp;visually&nbsp;meaningful&nbsp;encryption&nbsp;algorithm&nbsp;based on compressive sensing and Schur decomposition. Trans Emerg Telecommun Technol 32(2):4071","journal-title":"Trans Emerg Telecommun Technol"},{"key":"11656_CR40","doi-asserted-by":"publisher","first-page":"2507","DOI":"10.1109\/ACCESS.2016.2569421","volume":"4","author":"Y Zhang","year":"2016","unstructured":"Zhang Y, Zhang LY, Zhou J et al (2016) A review of compressive sensing in information security field. IEEE Access 4:2507\u20132519","journal-title":"IEEE Access"},{"issue":"6","key":"11656_CR41","doi-asserted-by":"publisher","first-page":"1802","DOI":"10.1007\/s10773-012-1274-8","volume":"52","author":"RG Zhou","year":"2013","unstructured":"Zhou RG, Wu Q, Zhang MQ et al (2013) Quantum image encryption and decryption algorithms based on quantum image geometric transformations. Int J Theor Phys 52(6):1802\u20131817","journal-title":"Int J Theor Phys"},{"key":"11656_CR42","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optcom.2014.12.084","volume":"343","author":"N Zhou","year":"2015","unstructured":"Zhou N, Li H, Wang D et al (2015) Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun 343:10\u201321","journal-title":"Opt Commun"},{"key":"11656_CR43","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.optlastec.2016.02.018","volume":"82","author":"N Zhou","year":"2016","unstructured":"Zhou N, Pan S, Cheng S et al (2016) Image compression\u2013encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121\u2013133","journal-title":"Opt Laser Technol"},{"key":"11656_CR44","doi-asserted-by":"publisher","first-page":"107629","DOI":"10.1016\/j.sigpro.2020.107629","volume":"175","author":"L Zhu","year":"2020","unstructured":"Zhu L, Song H, Zhang X et al (2020) A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding. Signal Process 175:107629","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11656-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11656-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11656-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T15:03:47Z","timestamp":1700665427000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11656-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,2]]},"references-count":44,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["11656"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11656-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,2]]},"assertion":[{"value":"10 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}