{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T01:59:38Z","timestamp":1775008778483,"version":"3.50.1"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T00:00:00Z","timestamp":1661472000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T00:00:00Z","timestamp":1661472000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62071015, 61972142, 62171264"],"award-info":[{"award-number":["62071015, 61972142, 62171264"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s11042-022-13689-z","type":"journal-article","created":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T04:02:52Z","timestamp":1661486572000},"page":"10835-10866","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Efficient color image encryption by color-grayscale conversion based on steganography"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4040-2448","authenticated-orcid":false,"given":"Yu-Guang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Bao-Pu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yi-Hua","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Wei-Min","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Liao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,26]]},"reference":[{"key":"13689_CR1","doi-asserted-by":"crossref","unstructured":"Athira V, George S N, Deepthi P P (2013) A novel encryption method based on compressive sensing. International Mutli-conference on automation, computing, communication, control and compressed sensing (iMac4s). IEEE: 271-275","DOI":"10.1109\/iMac4s.2013.6526421"},{"key":"13689_CR2","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.ins.2015.06.049","volume":"324","author":"L Bao","year":"2015","unstructured":"Bao L, Zhou Y (2015) Image encryption: generating visually meaningful encrypted images. Inf Sci 324:197\u2013207","journal-title":"Inf Sci"},{"key":"13689_CR3","doi-asserted-by":"publisher","first-page":"15977","DOI":"10.1007\/s11042-022-12623-7","volume":"81","author":"W Bao","year":"2022","unstructured":"Bao W, Zhu C (2022) A secure and robust image encryption algorithm based on compressive sensing and DNA coding. Multimed Tools Appl 81:15977\u201315996","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"13689_CR4","doi-asserted-by":"publisher","first-page":"4534","DOI":"10.1109\/TCSI.2021.3082895","volume":"68","author":"H Bao","year":"2021","unstructured":"Bao H, Hua Z, Li H, Chen M, Bao B (2021) Discrete memristor hyperchaotic maps. IEEE Trans Circuits Syst I: Regul Pap 68(11):4534\u20134544","journal-title":"IEEE Trans Circuits Syst I: Regul Pap"},{"issue":"3","key":"13689_CR5","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1006\/acha.1997.0238","volume":"5","author":"AR Calderbank","year":"1998","unstructured":"Calderbank AR, Daubechies I, Sweldens W, Yeo BL (1998) Wavelet transforms that map integers to integers. Appl Comput Harmon Anal 5(3):332\u2013369","journal-title":"Appl Comput Harmon Anal"},{"key":"13689_CR6","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.sigpro.2016.11.016","volume":"134","author":"X Chai","year":"2017","unstructured":"Chai X, Gan Z, Chen Y, Zhang Y (2017) A visually secure image encryption scheme based on compressive sensing. Signal Process 134:35\u201351","journal-title":"Signal Process"},{"key":"13689_CR7","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.sigpro.2018.02.007","volume":"148","author":"X Chai","year":"2018","unstructured":"Chai X, Zheng X, Gan Z, Han D, Chen Y (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124\u2013144","journal-title":"Signal Process"},{"key":"13689_CR8","doi-asserted-by":"publisher","first-page":"105837","DOI":"10.1016\/j.optlaseng.2019.105837","volume":"124","author":"X Chai","year":"2020","unstructured":"Chai X, Wu H, Gan Z, Zhang Y, Chen Y, Nixon KW (2020) An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding. Opt Lasers Eng 124:105837","journal-title":"Opt Lasers Eng"},{"key":"13689_CR9","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.ins.2020.10.007","volume":"556","author":"X Chai","year":"2021","unstructured":"Chai X, Wu H, Gan Z, Han D, Zhang Y, Chen Y (2021) An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing. Inf Sci 556:305\u2013340","journal-title":"Inf Sci"},{"issue":"3","key":"13689_CR10","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"CK Chan","year":"2004","unstructured":"Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469\u2013474","journal-title":"Pattern Recogn"},{"issue":"3","key":"13689_CR11","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3):749\u2013761","journal-title":"Chaos Solitons Fractals"},{"issue":"03","key":"13689_CR12","doi-asserted-by":"publisher","first-page":"1750046","DOI":"10.1142\/S0218127417500468","volume":"27","author":"E Chen","year":"2017","unstructured":"Chen E, Min L, Chen G (2017) Discrete chaotic systems with one-line equilibria and their application to image encryption. Int J Bifurcat Chaos 27(03):1750046","journal-title":"Int J Bifurcat Chaos"},{"issue":"2","key":"13689_CR13","doi-asserted-by":"publisher","first-page":"1722","DOI":"10.3934\/mbe.2021089","volume":"18","author":"X Chen","year":"2021","unstructured":"Chen X, Zou M, Yang B, Wang Z, Wu N, Qi L (2021) A visually secure image encryption method based on integer wavelet transform and rhombus prediction. Math Biosci Eng: MBE 18(2):1722\u20131739","journal-title":"Math Biosci Eng: MBE"},{"issue":"7","key":"13689_CR14","doi-asserted-by":"publisher","first-page":"10097","DOI":"10.1007\/s11042-016-3600-2","volume":"76","author":"J Deng","year":"2017","unstructured":"Deng J, Zhao S, Wang Y, Wang L, Wang H, Sha H (2017) Image compression-encryption scheme combining 2D compressive sensing with discrete fractional random transform. Multimed Tools Appl 76(7):10097\u201310117","journal-title":"Multimed Tools Appl"},{"key":"13689_CR15","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.ins.2022.01.031","volume":"593","author":"Y Dong","year":"2022","unstructured":"Dong Y, Zhao G, Ma Y, Pan Z, Wu R (2022) A novel image encryption scheme based on pseudo-random coupled map lattices with hybrid elementary cellular automata. Inf Sci 593:121\u2013154","journal-title":"Inf Sci"},{"issue":"4","key":"13689_CR16","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"DL Donoho","year":"2006","unstructured":"Donoho DL (2006) Compressed sensing. IEEE Trans Inf Theory 52(4):1289\u20131306","journal-title":"IEEE Trans Inf Theory"},{"key":"13689_CR17","doi-asserted-by":"publisher","first-page":"106881","DOI":"10.1016\/j.optlaseng.2021.106881","volume":"150","author":"CF Duan","year":"2022","unstructured":"Duan CF, Zhou J, Gong LH, Wu JY, Zhou NR (2022) New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method. Opt Lasers Eng 150:106881","journal-title":"Opt Lasers Eng"},{"issue":"7","key":"13689_CR18","doi-asserted-by":"publisher","first-page":"1589","DOI":"10.1016\/j.sigpro.2011.01.002","volume":"91","author":"A Eftekhari","year":"2011","unstructured":"Eftekhari A, Babaie-Zadeh M, Moghaddam HA (2011) Two-dimensional random projection. Signal Process 91(7):1589\u20131603","journal-title":"Signal Process"},{"key":"13689_CR19","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1007\/s11071-021-07192-7","volume":"108","author":"X Gao","year":"2022","unstructured":"Gao X, Mou J, Xiong L, Sha Y, Yan H, Cao Y (2022) A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dynamics 108:613\u2013636","journal-title":"Nonlinear Dynamics"},{"key":"13689_CR20","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"Z Hua","year":"2016","unstructured":"Hua Z, Zhou Y (2016) Image encryption using 2D logistic-adjusted-sine map. Inf Sci 339:237\u2013253","journal-title":"Inf Sci"},{"issue":"4","key":"13689_CR21","doi-asserted-by":"publisher","first-page":"4505","DOI":"10.1007\/s11071-021-06472-6","volume":"104","author":"Z Hua","year":"2021","unstructured":"Hua Z, Zhu Z, Chen Y, Li Y (2021) Color image encryption using orthogonal Latin squares and a new 2D chaotic system. Nonlinear Dynamics 104(4):4505\u20134522","journal-title":"Nonlinear Dynamics"},{"key":"13689_CR22","doi-asserted-by":"publisher","first-page":"107998","DOI":"10.1016\/j.sigpro.2021.107998","volume":"183","author":"Z Hua","year":"2021","unstructured":"Hua Z, Zhang K, Li Y, Zhou Y (2021) Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing. Signal Process 183:107998","journal-title":"Signal Process"},{"key":"13689_CR23","doi-asserted-by":"publisher","unstructured":"Hua Z, Chen Y, Bao H, Zhou Y (2021) Two-dimensional parametric polynomial chaotic system. IEEE Trans Syst Man Cybern Syst. https:\/\/doi.org\/10.1109\/TSMC.2021.3096967","DOI":"10.1109\/TSMC.2021.3096967"},{"issue":"3","key":"13689_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00340-020-7397-3","volume":"126","author":"D Huo","year":"2020","unstructured":"Huo D, Zhu X, Dai G, Yang H, Zhou X, Feng M (2020) Novel image compression\u2013encryption hybrid scheme based on DNA encoding and compressive sensing. Applied Physics B 126(3):1\u20139","journal-title":"Applied Physics B"},{"key":"13689_CR25","doi-asserted-by":"publisher","first-page":"126976","DOI":"10.1016\/j.optcom.2021.126976","volume":"492","author":"D Huo","year":"2021","unstructured":"Huo D, Zhu Z, Wei L, Han C, Zhou X (2021) A visually secure image encryption scheme based on 2D compressive sensing and integer wavelet transform embedding. Opt Commun 492:126976","journal-title":"Opt Commun"},{"issue":"30","key":"13689_CR26","doi-asserted-by":"publisher","first-page":"36305","DOI":"10.1007\/s11042-021-11386-x","volume":"80","author":"N Iqbal","year":"2021","unstructured":"Iqbal N, Hanif M (2021) An efficient grayscale image encryption scheme based on variable length row-column swapping operations. Multimed Tools Appl 80(30):36305\u201336339","journal-title":"Multimed Tools Appl"},{"key":"13689_CR27","doi-asserted-by":"publisher","first-page":"108220","DOI":"10.1016\/j.sigpro.2021.108220","volume":"188","author":"D Jiang","year":"2021","unstructured":"Jiang D, Liu L, Zhu L, Wang X, Rong X, Chai H (2021) Adaptive embedding: a novel meaningful image encryption scheme based on parallel compressive sensing and slant transform. Signal Process 188:108220","journal-title":"Signal Process"},{"key":"13689_CR28","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.optlaseng.2016.10.009","volume":"90","author":"A Kanso","year":"2017","unstructured":"Kanso A, Ghebleh M (2017) An algorithm for encryption of secret images into meaningful images. Opt Lasers Eng 90:196\u2013208","journal-title":"Opt Lasers Eng"},{"key":"13689_CR29","doi-asserted-by":"publisher","first-page":"13792","DOI":"10.1109\/ACCESS.2020.2966264","volume":"8","author":"T Li","year":"2020","unstructured":"Li T, Du B, Liang X (2020) Image encryption algorithm based on logistic and two-dimensional lorenz. IEEE Access 8:13792\u201313805","journal-title":"IEEE Access"},{"issue":"14","key":"13689_CR30","doi-asserted-by":"publisher","first-page":"21979","DOI":"10.1007\/s11042-021-10692-8","volume":"80","author":"X Liao","year":"2021","unstructured":"Liao X, Wang H (2021) An innovative technique for image encryption using tri-partite graph and chaotic maps. Multimed Tools Appl 80(14):21979\u201322005","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"13689_CR31","first-page":"220","volume":"1","author":"CC Lin","year":"2010","unstructured":"Lin CC, Shiu PF (2010) High capacity data hiding scheme for DCT-based images. J Inf Hiding Multimed Signal Process 1(3):220\u2013240","journal-title":"J Inf Hiding Multimed Signal Process"},{"key":"13689_CR32","doi-asserted-by":"publisher","unstructured":"Lin H, Wang C, Cui L, Sun Y, Xu C, Yu F (2022) Brain-like initial-boosted hyperchaos and application in biomedical image encryption. IEEE Trans Industr Inform:1. https:\/\/doi.org\/10.1109\/TII.2022.3155599","DOI":"10.1109\/TII.2022.3155599"},{"key":"13689_CR33","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1016\/j.optlastec.2013.05.023","volume":"57","author":"S Liu","year":"2014","unstructured":"Liu S, Guo C, Sheridan JT (2014) A review of optical image encryption techniques. Opt Laser Technol 57:327\u2013342","journal-title":"Opt Laser Technol"},{"key":"13689_CR34","doi-asserted-by":"crossref","unstructured":"Loukhaoukha K, Nabti M, Zebbiche K (2013) An efficient image encryption algorithm based on blocks permutation and Rubik's cube principle for iris images. The 8th international workshop on systems, signal processing and their applications (WoSSPA). IEEE: 267-272","DOI":"10.1109\/WoSSPA.2013.6602374"},{"issue":"8","key":"13689_CR35","doi-asserted-by":"publisher","first-page":"9325","DOI":"10.1007\/s11042-017-4938-9","volume":"77","author":"K Loukhaoukha","year":"2018","unstructured":"Loukhaoukha K, Refaey A, Zebbiche K, Shami A (2018) Efficient and secure cryptosystem for fingerprint images in wavelet domain. Multimed Tools Appl 77(8):9325\u20139339","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"13689_CR36","doi-asserted-by":"publisher","first-page":"13133","DOI":"10.1007\/s11042-017-4935-z","volume":"77","author":"A Miri","year":"2018","unstructured":"Miri A, Faez K (2018) An image steganography method based on integer wavelet transform. Multimed Tools Appl 77(11):13133\u201313144","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"13689_CR37","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1109\/TSP.2008.2007606","volume":"57","author":"H Mohimani","year":"2008","unstructured":"Mohimani H, Babaie-Zadeh M, Jutten C (2008) A fast approach for overcomplete sparse decomposition based on smoothed l0 norm. IEEE Trans Signal Process 57(1):289\u2013301","journal-title":"IEEE Trans Signal Process"},{"key":"13689_CR38","doi-asserted-by":"publisher","first-page":"170168","DOI":"10.1109\/ACCESS.2019.2955570","volume":"7","author":"P Ping","year":"2019","unstructured":"Ping P, Fu J, Mao Y, Xu F, Gao J (2019) Meaningful encryption: generating visually meaningful encrypted images by compressive sensing and reversible color transformation. IEEE Access 7:170168\u2013170184","journal-title":"IEEE Access"},{"key":"13689_CR39","doi-asserted-by":"publisher","first-page":"1773","DOI":"10.1007\/s11071-022-07276-y","volume":"108","author":"N Rani","year":"2022","unstructured":"Rani N, Sharma SR, Mishra V (2022) Grayscale and colored image encryption model using a novel fused magic cube. Nonlinear Dynamics 108:1773\u20131796","journal-title":"Nonlinear Dynamics"},{"issue":"3","key":"13689_CR40","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379\u2013423","journal-title":"Bell Syst Tech J"},{"key":"13689_CR41","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.ins.2019.02.049","volume":"486","author":"X Wang","year":"2019","unstructured":"Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340\u2013358","journal-title":"Inf Sci"},{"key":"13689_CR42","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.sigpro.2018.10.001","volume":"155","author":"H Wang","year":"2019","unstructured":"Wang H, Xiao D, Li M, Xiang Y, Li X (2019) A visually secure image encryption scheme based on parallel compressive sensing. Signal Process 155:218\u2013232","journal-title":"Signal Process"},{"key":"13689_CR43","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/j.ins.2021.06.032","volume":"574","author":"X Wang","year":"2021","unstructured":"Wang X, Liu C, Jiang D (2021) A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT. Inf Sci 574:505\u2013527","journal-title":"Inf Sci"},{"key":"13689_CR44","doi-asserted-by":"publisher","first-page":"107753","DOI":"10.1016\/j.optlastec.2021.107753","volume":"148","author":"S Wang","year":"2022","unstructured":"Wang S, Peng Q, Du B (2022) Chaotic color image encryption based on 4D chaotic maps and DNA sequence. Opt Laser Technol 148:107753","journal-title":"Opt Laser Technol"},{"key":"13689_CR45","doi-asserted-by":"crossref","unstructured":"Wu Y, Zhou Y, Noonan J P, Panetta K, Agaian S (2010) Image encryption using the sudoku matrix. Mobile multimedia\/image processing, security, and applications 2010. International Society for Optics and Photonics, 7708: 77080P","DOI":"10.1117\/12.853197"},{"issue":"2","key":"13689_CR46","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. J Sel Areas Telecommun (JSAT) 1(2):31\u201338","journal-title":"J Sel Areas Telecommun (JSAT)"},{"key":"13689_CR47","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","volume":"222","author":"Y Wu","year":"2013","unstructured":"Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci 222:323\u2013342","journal-title":"Inf Sci"},{"key":"13689_CR48","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.ins.2013.11.027","volume":"264","author":"Y Wu","year":"2014","unstructured":"Wu Y, Zhou Y, Noonan JP, Agaian S (2014) Design of image cipher using latin squares. Inf Sci 264:317\u2013339","journal-title":"Inf Sci"},{"key":"13689_CR49","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.ins.2022.03.025","volume":"596","author":"Y Xian","year":"2022","unstructured":"Xian Y, Wang X, Teng L, Yan X, Li Q, Wang X (2022) Cryptographic system based on double parameters fractal sorting vector and new spatiotemporal chaotic system. Inf Sci 596:304\u2013320","journal-title":"Inf Sci"},{"issue":"4","key":"13689_CR50","doi-asserted-by":"publisher","first-page":"1490","DOI":"10.1109\/TCE.2007.4429242","volume":"53","author":"Y Yang","year":"2007","unstructured":"Yang Y, Yuhua P, Zhaoguang L (2007) A fast algorithm for YCbCr to RGB conversion. IEEE Trans Consum Electron 53(4):1490\u20131493","journal-title":"IEEE Trans Consum Electron"},{"key":"13689_CR51","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.ins.2016.01.078","volume":"345","author":"YG Yang","year":"2016","unstructured":"Yang YG, Tian J, Lei H, Zhou YH, Shi WM (2016) Novel quantum image encryption using one-dimensional quantum cellular automata. Inf Sci 345:257\u2013270","journal-title":"Inf Sci"},{"key":"13689_CR52","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ins.2017.11.009","volume":"429","author":"YG Yang","year":"2018","unstructured":"Yang YG, Zhang YC, Chen XB, Zhou YH, Shi WM (2018) Eliminating the texture features in visually meaningful cipher images. Inf Sci 429:102\u2013119","journal-title":"Inf Sci"},{"key":"13689_CR53","doi-asserted-by":"publisher","first-page":"105661","DOI":"10.1016\/j.optlastec.2019.105661","volume":"119","author":"YG Yang","year":"2019","unstructured":"Yang YG, Guan BW, Li J, Li D, Zhou YH, Shi WM (2019) Image compression-encryption scheme based on fractional order hyper-chaotic systems combined with 2D compressed sensing and DNA encoding. Opt Laser Technol 119:105661","journal-title":"Opt Laser Technol"},{"key":"13689_CR54","doi-asserted-by":"publisher","first-page":"164422","DOI":"10.1016\/j.ijleo.2020.164422","volume":"213","author":"YG Yang","year":"2020","unstructured":"Yang YG, Zou L, Zhou YH, Shi WM (2020) Visually meaningful encryption for color images by using Qi hyper-chaotic system and singular value decomposition in YCbCr color space. Optik 213:164422","journal-title":"Optik"},{"key":"13689_CR55","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.ins.2021.01.041","volume":"562","author":"YG Yang","year":"2021","unstructured":"Yang YG, Wang BP, Yang YL, Zhou YH, Shi WM (2021) Visually meaningful image encryption based on universal embedding model. Inf Sci 562:304\u2013324","journal-title":"Inf Sci"},{"issue":"6","key":"13689_CR56","doi-asserted-by":"publisher","first-page":"9055","DOI":"10.1007\/s11042-020-10149-4","volume":"80","author":"YG Yang","year":"2021","unstructured":"Yang YG, Wang BP, Yang YL, Zhou YH, Shi WM (2021) Dual embedding model: a new framework for visually meaningful image encryption. Multimed Tools Appl 80(6):9055\u20139074","journal-title":"Multimed Tools Appl"},{"key":"13689_CR57","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.ins.2021.08.073","volume":"580","author":"YG Yang","year":"2021","unstructured":"Yang YG, Wang BP, Pei SK, Zhou YH, Shi WM, Liao X (2021) Using M-ary decomposition and virtual bits for visually meaningful image encryption. Inf Sci 580:174\u2013201","journal-title":"Inf Sci"},{"key":"13689_CR58","doi-asserted-by":"publisher","unstructured":"Yang YG, Wang BP, Yang YL, Zhou YH, Shi WM, Liao X (2022) A visually meaningful image encryption algorithm based on adaptive 2D compressive sensing and chaotic system. Multimed Tools and Appl. https:\/\/doi.org\/10.1007\/s11042-021-11656-8","DOI":"10.1007\/s11042-021-11656-8"},{"issue":"1","key":"13689_CR59","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/TIFS.2010.2099114","volume":"6","author":"X Zhang","year":"2010","unstructured":"Zhang X (2010) Lossy compression and iterative reconstruction for encrypted image. IEEE Trans Inf Forensics Secur 6(1):53\u201358","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"13689_CR60","doi-asserted-by":"publisher","first-page":"24757","DOI":"10.1007\/s11042-022-12479-x","volume":"81","author":"H Zhong","year":"2022","unstructured":"Zhong H, Li G (2022) Multi-image encryption algorithm based on wavelet transform and 3D shuffling scrambling. Multimed Tools Appl 81:24757\u201324776. https:\/\/doi.org\/10.1007\/s11042-022-12479-x","journal-title":"Multimed Tools Appl"},{"key":"13689_CR61","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.optlastec.2016.02.018","volume":"82","author":"N Zhou","year":"2016","unstructured":"Zhou N, Pan S, Cheng S, Zhou Z (2016) Image compression\u2013encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121\u2013133","journal-title":"Opt Laser Technol"},{"key":"13689_CR62","doi-asserted-by":"publisher","first-page":"22161","DOI":"10.1109\/ACCESS.2019.2897721","volume":"7","author":"L Zhu","year":"2019","unstructured":"Zhu L, Song H, Zhang X, Yan M, Zhang L, Yan T (2019) A novel image encryption scheme based on nonuniform sampling in block compressive sensing. IEEE Access 7:22161\u201322174","journal-title":"IEEE Access"},{"key":"13689_CR63","doi-asserted-by":"publisher","first-page":"107629","DOI":"10.1016\/j.sigpro.2020.107629","volume":"175","author":"L Zhu","year":"2020","unstructured":"Zhu L, Song H, Zhang X, Yan M, Zhang T, Wang X, Xu J (2020) A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding. Signal Process 175:107629","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13689-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13689-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13689-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T16:27:22Z","timestamp":1677774442000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13689-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,26]]},"references-count":63,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["13689"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13689-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,26]]},"assertion":[{"value":"8 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 August 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work, there is no professional or other personal interest of any nature or kind in any product, service and\/or company that could be construed as influencing the position presented in, or the review of, the manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Ethics Committee approval was obtained from the Institutional Ethics Committee of Beijing University of Technology to the commencement of the study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics statement"}}]}}