{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T06:47:06Z","timestamp":1774766826551,"version":"3.50.1"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,5,18]],"date-time":"2023-05-18T00:00:00Z","timestamp":1684368000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,18]],"date-time":"2023-05-18T00:00:00Z","timestamp":1684368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62071015"],"award-info":[{"award-number":["62071015"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11042-023-15662-w","type":"journal-article","created":{"date-parts":[[2023,5,18]],"date-time":"2023-05-18T03:24:24Z","timestamp":1684380264000},"page":"3621-3655","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A new visually meaningful double-image encryption algorithm combining 2D compressive sensing with fractional-order chaotic system"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4040-2448","authenticated-orcid":false,"given":"Yu-Guang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Zi-Jia","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bao-Pu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yi-Hua","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Wei-Min","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Liao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,18]]},"reference":[{"issue":"13","key":"15662_CR1","doi-asserted-by":"crossref","first-page":"17799","DOI":"10.1007\/s11042-019-7166-7","volume":"78","author":"AA Abdulla","year":"2019","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78(13):17799\u201317823","journal-title":"Multimed Tools Appl"},{"issue":"08","key":"15662_CR2","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li SJ (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcation Chaos 16(08):2129\u20132151","journal-title":"Int J Bifurcation Chaos"},{"key":"15662_CR3","doi-asserted-by":"crossref","first-page":"106165","DOI":"10.1016\/j.optlastec.2020.106165","volume":"127","author":"JO Armijo-Correa","year":"2020","unstructured":"Armijo-Correa JO, Murgu\u00eda JS, Mej\u00eda-Carlos M, Arce-Guevara VE, Aboytes-Gonz\u00e1lez JA (2020) An improved visually meaningful encrypted image scheme. Opt Laser Technol 127:106165","journal-title":"Opt Laser Technol"},{"key":"15662_CR4","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.ins.2015.06.049","volume":"324","author":"L Bao","year":"2015","unstructured":"Bao L, Zhou YC (2015) Image encryption: generating visually meaningful encrypted images. Inf Sci 324:197\u2013207","journal-title":"Inf Sci"},{"issue":"12","key":"15662_CR5","doi-asserted-by":"crossref","first-page":"4203","DOI":"10.1109\/TIT.2005.858979","volume":"51","author":"EJ Candes","year":"2005","unstructured":"Candes EJ, Tao T (2005) Decoding by linear programming. IEEE Trans Inf Theory 51(12):4203\u20134215","journal-title":"IEEE Trans Inf Theory"},{"key":"15662_CR6","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.sigpro.2016.11.016","volume":"134","author":"XL Chai","year":"2017","unstructured":"Chai XL, Gan ZH, Chen YR, Zhang YS (2017) A visually secure image encryption scheme based on compressive sensing. Signal Process 134:35\u201351","journal-title":"Signal Process"},{"key":"15662_CR7","doi-asserted-by":"crossref","first-page":"105837","DOI":"10.1016\/j.optlaseng.2019.105837","volume":"124","author":"XL Chai","year":"2020","unstructured":"Chai XL, Wu HY, Gan ZH, Zhang YS, Chen YR, Nixon KW (2020) An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding. Opt Lasers Eng 124:105837","journal-title":"Opt Lasers Eng"},{"key":"15662_CR8","doi-asserted-by":"crossref","first-page":"107525","DOI":"10.1016\/j.sigpro.2020.107525","volume":"171","author":"XL Chai","year":"2020","unstructured":"Chai XL, Wu HY, Gan ZH, Zhang YS, Chen YR (2020) Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy. Signal Process 171:107525","journal-title":"Signal Process"},{"key":"15662_CR9","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1016\/j.ins.2020.10.007","volume":"556","author":"XL Chai","year":"2021","unstructured":"Chai XL, Wu HY, Gan ZH, Han DJ, Zhang YS, Chen YR (2021) An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing. Inf Sci 556:305\u2013340","journal-title":"Inf Sci"},{"issue":"1","key":"15662_CR10","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1137\/S003614450037906X","volume":"43","author":"SS Chen","year":"2001","unstructured":"Chen SS, Donoho DL, Saunders MA (2001) Atomic decomposition by basis pursuit. SIAM Rev 43(1):129\u2013159","journal-title":"SIAM Rev"},{"key":"15662_CR11","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.sigpro.2014.03.039","volume":"104","author":"G Chen","year":"2014","unstructured":"Chen G, Li DF, Zhang JS (2014) Iterative gradient projection algorithm for two-dimensional compressive sensing sparse image reconstruction. Signal Process 104:15\u201326","journal-title":"Signal Process"},{"issue":"03","key":"15662_CR12","doi-asserted-by":"crossref","first-page":"1750046","DOI":"10.1142\/S0218127417500468","volume":"27","author":"E Chen","year":"2017","unstructured":"Chen E, Min LQ, Chen GR (2017) Discrete chaotic systems with one-line equilibria and their application to image encryption. Int J Bifurcation Chaos 27(03):1750046","journal-title":"Int J Bifurcation Chaos"},{"key":"15662_CR13","unstructured":"Crandall R (1998) Some notes on steganography. Posted on steganography mailing list, pp. 1\u20136"},{"issue":"7","key":"15662_CR14","doi-asserted-by":"crossref","first-page":"10097","DOI":"10.1007\/s11042-016-3600-2","volume":"76","author":"J Deng","year":"2017","unstructured":"Deng J, Zhao S, Wang Y, Wang L, Wang H, Sha H (2017) Image compression-encryption scheme combining 2D compressive sensing with discrete fractional random transform. Multimed Tools Appl 76(7):10097\u201310117","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"15662_CR15","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"DL Donoho","year":"2006","unstructured":"Donoho DL (2006) Compressed sensing. IEEE Trans Inf Theory 52(4):1289\u20131306","journal-title":"IEEE Trans Inf Theory"},{"key":"15662_CR16","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1016\/j.matcom.2019.11.009","volume":"172","author":"S Eshaghi","year":"2020","unstructured":"Eshaghi S, Ghaziani RK, Ansari A (2020) Hopf bifurcation, chaos control and synchronization of a chaotic fractional-order system with chaos entanglement function. Math Comput Simul 172:321\u2013340","journal-title":"Math Comput Simul"},{"issue":"4","key":"15662_CR17","doi-asserted-by":"crossref","first-page":"889","DOI":"10.1007\/s11432-012-4551-5","volume":"55","author":"Y Fang","year":"2012","unstructured":"Fang Y, Wu JJ, Huang BM (2012) 2D sparse signal recovery via 2D orthogonal matching pursuit. SCIENCE CHINA Inf Sci 55(4):889\u2013897","journal-title":"SCIENCE CHINA Inf Sci"},{"key":"15662_CR18","doi-asserted-by":"crossref","first-page":"107252","DOI":"10.1016\/j.optlastec.2021.107252","volume":"142","author":"XH Gao","year":"2021","unstructured":"Gao XH (2021) Image encryption algorithm based on 2D hyperchaotic map. Opt Laser Technol 142:107252","journal-title":"Opt Laser Technol"},{"key":"15662_CR19","doi-asserted-by":"crossref","unstructured":"Ghaffari A, Babaie-Zadeh M, Jutten C (2009) Sparse decomposition of two-dimensional signals. In 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 3157\u20133160","DOI":"10.1109\/ICASSP.2009.4960294"},{"key":"15662_CR20","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/j.optlastec.2019.01.039","volume":"115","author":"LH Gong","year":"2019","unstructured":"Gong LH, Qiu KD, Deng CZ, Zhou NR (2019) An image compression and encryption algorithm based on chaotic system and compressive sensing. Opt Laser Technol 115:257\u2013267","journal-title":"Opt Laser Technol"},{"issue":"3","key":"15662_CR21","first-page":"1","volume":"19","author":"WW Hu","year":"2020","unstructured":"Hu WW, Zhou RG, Luo J, Jiang SX, Luo GF (2020) Quantum image encryption algorithm based on Arnold scrambling and wavelet transforms. Quantum Inf Process 19(3):1\u201329","journal-title":"Quantum Inf Process"},{"key":"15662_CR22","doi-asserted-by":"crossref","first-page":"107998","DOI":"10.1016\/j.sigpro.2021.107998","volume":"183","author":"ZY Hua","year":"2021","unstructured":"Hua ZY, Zhang KY, Li YM, Zhou YC (2021) Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing. Signal Process 183:107998","journal-title":"Signal Process"},{"key":"15662_CR23","doi-asserted-by":"crossref","unstructured":"Huang R, Sakurai K (2011) A robust and compression-combined digital image encryption method based on compressive sensing. In 2011 seventh international conference on intelligent information hiding and multimedia signal processing, pp. 105\u2013108. IEEE","DOI":"10.1109\/IIHMSP.2011.53"},{"key":"15662_CR24","doi-asserted-by":"crossref","first-page":"126976","DOI":"10.1016\/j.optcom.2021.126976","volume":"492","author":"DM Huo","year":"2021","unstructured":"Huo DM, Zhu ZL, Wei LS, Han C, Zhou X (2021) A visually secure image encryption scheme based on 2D compressive sensing and integer wavelet transform embedding. Opt Commun 492:126976","journal-title":"Opt Commun"},{"key":"15662_CR25","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.optlaseng.2016.10.009","volume":"90","author":"A Kanso","year":"2017","unstructured":"Kanso A, Ghebleh M (2017) An algorithm for encryption of secret images into meaningful images. Opt Lasers Eng 90:196\u2013208","journal-title":"Opt Lasers Eng"},{"key":"15662_CR26","first-page":"47","volume":"43","author":"ZT Li","year":"2018","unstructured":"Li ZT, He Y (2018) Steganography with pixel-value differencing and modulus function based on PSO. J Inf Secur Appl 43:47\u201352","journal-title":"J Inf Secur Appl"},{"issue":"1","key":"15662_CR27","first-page":"78","volume":"7","author":"WJ Lin","year":"2011","unstructured":"Lin WJ, Zhao RZ, Li H (2011) The NSL0 algorithm for compressive sensing signal reconstruction. New Ind 7(1):78\u201384","journal-title":"New Ind"},{"issue":"16","key":"15662_CR28","doi-asserted-by":"crossref","first-page":"2514","DOI":"10.1016\/j.ijleo.2012.08.017","volume":"124","author":"P Lu","year":"2013","unstructured":"Lu P, Xu ZY, Lu X, Liu XY (2013) Digital image information encryption based on compressive sensing and double random-phase encoding technique. Optik 124(16):2514\u20132518","journal-title":"Optik"},{"key":"15662_CR29","doi-asserted-by":"crossref","first-page":"111318","DOI":"10.1016\/j.chaos.2021.111318","volume":"152","author":"ZL Man","year":"2021","unstructured":"Man ZL, Li JQ, Di XQ, Sheng YH, Liu ZF (2021) Double image encryption algorithm based on neural network and chaos. Chaos, Solitons Fractals 152:111318","journal-title":"Chaos, Solitons Fractals"},{"issue":"1","key":"15662_CR30","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1109\/TSP.2008.2007606","volume":"57","author":"H Mohimani","year":"2008","unstructured":"Mohimani H, Babaie-Zadeh M, Jutten C (2008) A fast approach for overcomplete sparse decomposition based on smoothed \u21130 norm. IEEE Trans Signal Process 57(1):289\u2013301","journal-title":"IEEE Trans Signal Process"},{"issue":"33","key":"15662_CR31","doi-asserted-by":"crossref","first-page":"25115","DOI":"10.1007\/s11042-020-09034-x","volume":"79","author":"F Musanna","year":"2020","unstructured":"Musanna F, Dangwal D, Kumar S (2020) A novel chaos-based approach in conjunction with MR-SVD and pairing function for generating visually meaningful cipher images. Multimed Tools Appl 79(33):25115\u201325142","journal-title":"Multimed Tools Appl"},{"issue":"33","key":"15662_CR32","first-page":"2655","volume":"12","author":"YL Peng","year":"2012","unstructured":"Peng YL, He YG, Lin B (2012) Noise signal recovery algorithm based on singular value decomposition in compressed sensing. Chin J Sci Instrum 12(33):2655\u20132660","journal-title":"Chin J Sci Instrum"},{"key":"15662_CR33","doi-asserted-by":"crossref","first-page":"170168","DOI":"10.1109\/ACCESS.2019.2955570","volume":"7","author":"P Ping","year":"2019","unstructured":"Ping P, Fu J, Mao YC, Xu F, Gao J (2019) Meaningful encryption: generating visually meaningful encrypted images by compressive sensing and reversible color transformation. IEEE Access 7:170168\u2013170184","journal-title":"IEEE Access"},{"issue":"28","key":"15662_CR34","first-page":"102","volume":"8","author":"XL Tian","year":"2015","unstructured":"Tian XL, Xi ZH (2015) An optimization algorithm for measurement matrix in compressed sensing. Electro Sci Technol 8(28):102\u2013111","journal-title":"Electro Sci Technol"},{"issue":"12","key":"15662_CR35","doi-asserted-by":"crossref","first-page":"4655","DOI":"10.1109\/TIT.2007.909108","volume":"53","author":"JA Tropp","year":"2007","unstructured":"Tropp JA, Gilbert AC (2007) Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans Inf Theory 53(12):4655\u20134666","journal-title":"IEEE Trans Inf Theory"},{"issue":"1\u20132","key":"15662_CR36","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/S0377-0427(00)00393-9","volume":"123","author":"CF Van Loan","year":"2000","unstructured":"Van Loan CF (2000) The ubiquitous kronecker product. J Comput Appl Math 123(1\u20132):85\u2013100","journal-title":"J Comput Appl Math"},{"key":"15662_CR37","doi-asserted-by":"crossref","first-page":"116246","DOI":"10.1016\/j.image.2021.116246","volume":"95","author":"XY Wang","year":"2021","unstructured":"Wang XY, Su YN (2021) Image encryption based on compressed sensing and DNA encoding. Signal Process Image Commun 95:116246","journal-title":"Signal Process Image Commun"},{"key":"15662_CR38","doi-asserted-by":"crossref","first-page":"107316","DOI":"10.1016\/j.optlastec.2021.107316","volume":"143","author":"XY Wang","year":"2021","unstructured":"Wang XY, Zhao MC (2021) An image encryption algorithm based on hyperchaotic system and DNA coding. Opt Laser Technol 143:107316","journal-title":"Opt Laser Technol"},{"key":"15662_CR39","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1016\/j.sigpro.2018.10.001","volume":"155","author":"H Wang","year":"2019","unstructured":"Wang H, Xiao D, Li M, Xiang YP, Li XY (2019) A visually secure image encryption scheme based on parallel compressive sensing. Signal Process 155:218\u2013232","journal-title":"Signal Process"},{"key":"15662_CR40","doi-asserted-by":"crossref","first-page":"164685","DOI":"10.1016\/j.ijleo.2020.164685","volume":"213","author":"YT Wang","year":"2020","unstructured":"Wang YT, Tang MW, Wang Z (2020) High-capacity adaptive steganography based on LSB and hamming code. Optik 213:164685","journal-title":"Optik"},{"key":"15662_CR41","doi-asserted-by":"crossref","unstructured":"Wei JJ, Zhang M, Tong XJ (2021) Image encryption algorithm based on fractional order chaotic system. In 2021 IEEE 12th international conference on software engineering and service Science (ICSESS), pages 72\u201375. IEEE","DOI":"10.1109\/ICSESS52187.2021.9522343"},{"key":"15662_CR42","doi-asserted-by":"publisher","unstructured":"Wen WY, Hong YK, Fang YM, Li M, Li M (2020) A visually secure image encryption scheme based on semi-tensor product compressed sensing. Signal Process 173:107580.\u00a0https:\/\/doi.org\/10.1016\/j.sigpro.2020.107580.","DOI":"10.1016\/j.sigpro.2020.107580"},{"key":"15662_CR43","doi-asserted-by":"crossref","first-page":"107077","DOI":"10.1016\/j.optlastec.2021.107077","volume":"140","author":"D Xiao","year":"2021","unstructured":"Xiao D, Zhao MH, Wang MD (2021) Low-cost and secure multi-image encryption scheme based on p-tensor product compressive sensing. Opt Laser Technol 140:107077","journal-title":"Opt Laser Technol"},{"key":"15662_CR44","doi-asserted-by":"crossref","first-page":"106178","DOI":"10.1016\/j.optlaseng.2020.106178","volume":"134","author":"QY Xu","year":"2020","unstructured":"Xu QY, Sun KH, He SB, Zhu CX (2020) An effective image encryption algorithm based on compressive sensing and 2D-SLIM. Opt Lasers Eng 134:106178","journal-title":"Opt Lasers Eng"},{"key":"15662_CR45","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.ins.2017.11.009","volume":"429","author":"YG Yang","year":"2018","unstructured":"Yang YG, Zhang YC, Chen XB, Zhou YH, Shi WM (2018) Eliminating the texture features in visually meaningful cipher images. Inf Sci 429:102\u2013119","journal-title":"Inf Sci"},{"key":"15662_CR46","doi-asserted-by":"publisher","unstructured":"Yang YG, Guan BW, Li J, Li D, Zhou YH, Shi WM (2019) Image compression-encryption scheme based on fractional order hyper-chaotic systems combined with 2D compressed sensing and DNA encoding. Opt Laser Technol 119:105661. https:\/\/doi.org\/10.1016\/j.optlastec.2019.105661.","DOI":"10.1016\/j.optlastec.2019.105661"},{"key":"15662_CR47","doi-asserted-by":"publisher","unstructured":"Yang YG, Zou L, Zhou YH, Shi WM (2020) Visually meaningful encryption for color images by using qi hyper-chaotic system and singular value decomposition in YCbCr color space. Optik 213:164422. https:\/\/doi.org\/10.1016\/j.ijleo.2020.164422.","DOI":"10.1016\/j.ijleo.2020.164422"},{"key":"15662_CR48","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1016\/j.ins.2021.01.041","volume":"562","author":"YG Yang","year":"2021","unstructured":"Yang YG, Wang BP, Yang YL, Zhou YH, Shi WM (2021) Visually meaningful image encryption based on universal embedding model. Inf Sci 562:304\u2013324","journal-title":"Inf Sci"},{"issue":"6","key":"15662_CR49","doi-asserted-by":"crossref","first-page":"9055","DOI":"10.1007\/s11042-020-10149-4","volume":"80","author":"YG Yang","year":"2021","unstructured":"Yang YG, Wang BP, Yang YL, Zhou YH, Shi WM (2021) Dual embedding model: a new framework for visually meaningful image encryption. Multimed Tools Appl 80(6):9055\u20139074","journal-title":"Multimed Tools Appl"},{"key":"15662_CR50","doi-asserted-by":"publisher","unstructured":"Yang YG, Wang BP, Yang YL, Zhou YH, Shi WM, Liao X (n.d.) A visually meaningful image encryption algorithm based on adaptive 2D compressive sensing and chaotic system. Multimed Tools Appl, https:\/\/doi.org\/10.1007\/s11042-021-11656-8.","DOI":"10.1007\/s11042-021-11656-8"},{"key":"15662_CR51","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.ins.2021.08.073","volume":"580","author":"YG Yang","year":"2021","unstructured":"Yang YG, Wang BP, Pei SK, Zhou YH, Shi WM, Liao X (2021) Using M-ary decomposition and virtual bits for visually meaningful image encryption. Inf Sci 580:174\u2013201. https:\/\/doi.org\/10.1016\/j.ins.2021.08.073","journal-title":"Inf Sci"},{"key":"15662_CR52","doi-asserted-by":"publisher","first-page":"10835","DOI":"10.1007\/s11042-022-13689-z","volume":"82","author":"YG Yang","year":"2023","unstructured":"Yang YG, Wang BP, Zhou YH, Shi WM, Liao X (2023) Efficient color image encryption by color grayscale conversion based on steganography. Multimed Tools Appl 82:10835\u201310866. https:\/\/doi.org\/10.1007\/s11042-022-13689-z","journal-title":"Multimed Tools Appl"},{"key":"15662_CR53","doi-asserted-by":"crossref","unstructured":"Yu JG, Yoon EJ, Shin SH, Yoo KY (2008) A new image steganography based on 2k correction and edge-detection. In Fifth International Conference on Information Technology: New Generations (itng 2008), pp. 563\u2013568. IEEE","DOI":"10.1109\/ITNG.2008.101"},{"issue":"8","key":"15662_CR54","doi-asserted-by":"crossref","first-page":"731","DOI":"10.1109\/LSP.2010.2052243","volume":"17","author":"L Yu","year":"2010","unstructured":"Yu L, Barbot JP, Zheng G, Sun H (2010) Compressive sensing with chaotic sequence. IEEE Signal Process Lett 17(8):731\u2013734","journal-title":"IEEE Signal Process Lett"},{"key":"15662_CR55","doi-asserted-by":"crossref","first-page":"107073","DOI":"10.1016\/j.optlastec.2021.107073","volume":"141","author":"XQ Zhang","year":"2021","unstructured":"Zhang XQ, Hu YM (2021) Multiple-image encryption algorithm based on the 3D scrambling model and dynamic DNA coding. Opt Laser Technol 141:107073","journal-title":"Opt Laser Technol"},{"key":"15662_CR56","doi-asserted-by":"publisher","unstructured":"Zhang X P, Ren R L, Feng G R, Qian Z X (2011) Compressing encrypted image using compressive sensing. In 2011 seventh international conference on intelligent information hiding and multimedia signal processing 222\u2013225. https:\/\/doi.org\/10.1109\/IIHMSP.2011.12","DOI":"10.1109\/IIHMSP.2011.12"},{"issue":"05","key":"15662_CR57","doi-asserted-by":"crossref","first-page":"1330014","DOI":"10.1142\/S0218127413300140","volume":"23","author":"HT Zhang","year":"2013","unstructured":"Zhang HT, Liu XZ, Shen XM, Liu J (2013) Chaos entanglement: a new approach to generate chaos. Int J Bifurcation Chaos 23(05):1330014","journal-title":"Int J Bifurcation Chaos"},{"issue":"4","key":"15662_CR58","doi-asserted-by":"crossref","first-page":"1721","DOI":"10.1007\/s11071-015-1911-x","volume":"80","author":"JF Zhao","year":"2015","unstructured":"Zhao JF, Wang SY, Chang YX, Li XF (2015) A novel image encryption scheme based on an improper fractional-order chaotic system. Nonlin Dyn 80(4):1721\u20131729","journal-title":"Nonlin Dyn"},{"key":"15662_CR59","doi-asserted-by":"crossref","first-page":"107629","DOI":"10.1016\/j.sigpro.2020.107629","volume":"175","author":"LY Zhu","year":"2020","unstructured":"Zhu LY, Song HS, Zhang X, Yan MD, Zhang T, Wang XY, Xu J (2020) A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding. Signal Process 175:107629","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15662-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15662-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15662-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,6]],"date-time":"2024-01-06T05:09:04Z","timestamp":1704517744000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15662-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,18]]},"references-count":59,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["15662"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15662-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,18]]},"assertion":[{"value":"14 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 May 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work, there is no professional or other personal interest of any nature or kind in any product, service and\/or company that could be construed as influencing the position presented in, or the review of, the manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}