{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T12:38:47Z","timestamp":1765370327862,"version":"3.37.3"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T00:00:00Z","timestamp":1694563200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T00:00:00Z","timestamp":1694563200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16702-1","type":"journal-article","created":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T04:01:25Z","timestamp":1694577685000},"page":"29777-29803","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A visually secure image encryption algorithm based on block compressive sensing and deep neural networks"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4040-2448","authenticated-orcid":false,"given":"Yu-Guang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Ming-Xin","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Yi-Hua","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Wei-Min","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Dong-Hua","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Liao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,13]]},"reference":[{"issue":"1","key":"16702_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJSSCI.285593","volume":"14","author":"A Gaurav","year":"2022","unstructured":"Gaurav A, Psannis K, Perakovi\u0107 D (2022) Security of cloud-based medical internet of things (miots): A survey. Int J Software Sci Comput Intell 14(1):1\u201316","journal-title":"Int J Software Sci Comput Intell"},{"issue":"5","key":"16702_CR2","doi-asserted-by":"crossref","first-page":"2334","DOI":"10.1109\/JBHI.2021.3128775","volume":"27","author":"Z Xu","year":"2023","unstructured":"Xu Z, He D, Vijayakumar P et al (2023) Certificateless public auditing scheme with data privacy and dynamics in group user model of cloud-assisted medical WSNs. IEEE J Biomed Health 27(5):2334\u20132344","journal-title":"IEEE J Biomed Health"},{"issue":"1","key":"16702_CR3","first-page":"1","volume":"12","author":"B Joshi","year":"2022","unstructured":"Joshi B, Joshi B, Mishra A et al (2022) A comparative study of privacy-preserving homomorphic encryption techniques in cloud computing. Int J Cloud Appl Comput 12(1):1\u201311","journal-title":"Int J Cloud Appl Comput"},{"key":"16702_CR4","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/ACCESS.2017.2775038","volume":"6","author":"Q Zheng","year":"2017","unstructured":"Zheng Q, Wang X, Khan MK et al (2017) A lightweight authenticated encryption scheme based on chaotic scml for railway cloud service. IEEE Access 6:711\u2013722","journal-title":"IEEE Access"},{"key":"16702_CR5","unstructured":"Mishra A (2023) Homomorphic encryption: securing sensitive data in the age of cloud computing. https:\/\/insights2techinfo.com."},{"key":"16702_CR6","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/j.optlaseng.2015.09.008","volume":"78","author":"Y Wang","year":"2016","unstructured":"Wang Y, Quan C, Tay CJ (2016) Asymmetric optical image encryption based on an improved amplitude-phase retrieval algorithm. Opt Las Eng 78:8\u201316","journal-title":"Opt Las Eng"},{"key":"16702_CR7","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1007\/s11042-020-09779-5","volume":"80","author":"YG Yang","year":"2021","unstructured":"Yang YG, Guan BW, Zhou YH et al (2021) Double image compression-encryption algorithm based on fractional order hyper chaotic system and DNA approach. Multimed Tools Appl 80:691\u2013710","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"16702_CR8","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1007\/s11071-015-2521-3","volume":"84","author":"A Souyah","year":"2016","unstructured":"Souyah A, Faraoun KM (2016) Fast and efficient randomized encryption scheme for digital images based on Quadtree decomposition and reversible memory cellular automata. Nonlinear Dyn 84(2):715\u2013732","journal-title":"Nonlinear Dyn"},{"key":"16702_CR9","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/j.ins.2016.01.078","volume":"345","author":"YG Yang","year":"2016","unstructured":"Yang YG, Tian J, Lei H, Zhou YH, Shi WM (2016) Novel quantum image encryption using one-dimensional quantum cellular automata. Inf Sci 345:257\u2013270","journal-title":"Inf Sci"},{"key":"16702_CR10","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"ZY Hua","year":"2019","unstructured":"Hua ZY, Zhou YC, Huang HJ (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403\u2013419","journal-title":"Inf Sci"},{"issue":"1","key":"16702_CR11","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1007\/s11071-021-07192-7","volume":"108","author":"X Gao","year":"2022","unstructured":"Gao X, Mou J, Xiong L et al (2022) A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dyn 108(1):613\u2013636","journal-title":"Nonlinear Dyn"},{"key":"16702_CR12","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.ins.2015.06.049","volume":"324","author":"L Bao","year":"2015","unstructured":"Bao L, Zhou YC (2015) Image encryption: generating visually meaningful encrypted images. Inf Sci 324:197\u2013207","journal-title":"Inf Sci"},{"key":"16702_CR13","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.ins.2017.11.009","volume":"429","author":"YG Yang","year":"2018","unstructured":"Yang YG, Zhang YC, Chen XB et al (2018) Eliminating the texture features in visually meaningful cipher images. Inf Sci 429:102\u2013119","journal-title":"Inf Sci"},{"key":"16702_CR14","unstructured":"Cand\u00e8s EJ (2004) Compressive sampling. Math Subject Classification, Primary 00A69, 41-02, 68P30; Secondary 62C65"},{"issue":"3","key":"16702_CR15","doi-asserted-by":"crossref","first-page":"e14072","DOI":"10.1016\/j.heliyon.2023.e14072","volume":"9","author":"D Huo","year":"2023","unstructured":"Huo D, Zhu Z, Zhou X et al (2023) A flexible and visually meaningful multi-image compression encryption and hiding scheme based on 2D compressive sensing. Heliyon 9(3):e14072","journal-title":"Heliyon"},{"key":"16702_CR16","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.sigpro.2018.02.007","volume":"148","author":"XL Chai","year":"2018","unstructured":"Chai XL, Zheng XY, Gan ZH, Han DJ, Chen YR (2018) An image encryption algorithm based on chaotic system and compressive sensing. Sig Process 148:124\u2013144","journal-title":"Sig Process"},{"key":"16702_CR17","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.optlastec.2016.05.012","volume":"84","author":"TH Chen","year":"2016","unstructured":"Chen TH, Zhang M, Wu JH, Yuen C, Tong Y (2016) Image encryption and compression based on Kronecker compressed sensing and elementary cellular automata scrambling. Opt Las Technol 84:118\u2013133","journal-title":"Opt Las Technol"},{"issue":"6","key":"16702_CR18","doi-asserted-by":"crossref","first-page":"784","DOI":"10.3390\/e24060784","volume":"24","author":"J Wei","year":"2022","unstructured":"Wei J, Zhang M, Tong X (2022) Multi-image compression-encryption algorithm based on compressed sensing and optical encryption. Entropy 24(6):784","journal-title":"Entropy"},{"key":"16702_CR19","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.optlaseng.2017.06.013","volume":"98","author":"GQ Hu","year":"2017","unstructured":"Hu GQ, Xiao D, Wang Y, Xiang T, Zhou Q (2017) Securing image information using double random phase encoding and parallel compressive sensing with updated sampling processes. Opt Las Eng 98:123\u2013133","journal-title":"Opt Las Eng"},{"key":"16702_CR20","doi-asserted-by":"crossref","unstructured":"Han J, Loffeld O, Hartmann K, Wang R (2010) Multi-image fusion based on compressive sensing. 2010 International Conference on Audio, Language and Image Processing, Shanghai, China, pp 1463-1469","DOI":"10.1109\/ICALIP.2010.5684502"},{"key":"16702_CR21","volume":"67","author":"GP Fu","year":"2020","unstructured":"Fu GP, Hong SH, Li FL, Wang L (2020) A novel multi-focus image fusion method based on distributed compressed sensing. J Vis Commun Image R 67:102760","journal-title":"J Vis Commun Image R"},{"issue":"6","key":"16702_CR22","doi-asserted-by":"crossref","first-page":"5919","DOI":"10.1007\/s11071-022-07995-2","volume":"111","author":"MA Lone","year":"2023","unstructured":"Lone MA, Qureshi S (2023) Encryption scheme for RGB images using chaos and affine hill cipher technique. Nonlinear Dyn 111(6):5919\u20135939","journal-title":"Nonlinear Dyn"},{"issue":"15","key":"16702_CR23","doi-asserted-by":"crossref","first-page":"19209","DOI":"10.1007\/s11042-017-5378-2","volume":"77","author":"R Ponuma","year":"2018","unstructured":"Ponuma R, Amutha R (2018) Compressive sensing based image compression-encryption using Novel 1D-Chaotic map. Multimed Tools Appl 77(15):19209\u201319234","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"16702_CR24","doi-asserted-by":"crossref","first-page":"11857","DOI":"10.1007\/s11042-018-6745-3","volume":"78","author":"R Ponuma","year":"2019","unstructured":"Ponuma R, Amutha R (2019) Encryption of image data using compressive sensing and chaotic system. Multimed Tools Appl 78(9):11857\u201311881","journal-title":"Multimed Tools Appl"},{"key":"16702_CR25","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/j.optlastec.2019.01.039","volume":"115","author":"LH Gong","year":"2019","unstructured":"Gong LH, Qiu KD, Deng CZ, Zhou NR (2019) An image compression and encryption algorithm based on chaotic system and compressive sensing. Opt Las Technol 115:257\u2013267","journal-title":"Opt Las Technol"},{"issue":"3","key":"16702_CR26","doi-asserted-by":"crossref","first-page":"2831","DOI":"10.1007\/s11071-022-07736-5","volume":"110","author":"X Rong","year":"2022","unstructured":"Rong X, Jiang D, Zheng M et al (2022) Meaningful data encryption scheme based on newly designed chaotic map and P-tensor product compressive sensing in WBANs. Nonlinear Dyn 110(3):2831\u20132847","journal-title":"Nonlinear Dyn"},{"key":"16702_CR27","doi-asserted-by":"crossref","first-page":"22033","DOI":"10.1007\/s11042-021-11656-8","volume":"82","author":"YG Yang","year":"2023","unstructured":"Yang YG, Wang BP, Yang YL, Zhou YH et al (2023) A visually meaningful image encryption algorithm based on adaptive 2D compressive sensing and chaotic system. Multimed Tools Appl 82:22033\u201322062","journal-title":"Multimed Tools Appl"},{"key":"16702_CR28","doi-asserted-by":"crossref","first-page":"23899","DOI":"10.1007\/s11042-022-12069-x","volume":"82","author":"H Liu","year":"2023","unstructured":"Liu H, Liu J, Ma C (2023) Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption. Multimed Tools Appl 82:23899\u201323914","journal-title":"Multimed Tools Appl"},{"key":"16702_CR29","unstructured":"Gan L (2007) Block compressed sensing of natural images. In: 15th International Conference on Digital Signal Processing, Cardiff, UK, pp 403\u2013406"},{"key":"16702_CR30","doi-asserted-by":"crossref","unstructured":"Kulkarni K, Lohit S, Turaga P, Kerviche R, Ashok A (2016) ReconNet: non-iterative reconstruction of images from compressively sensed measurements. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, pp 449\u2013458","DOI":"10.1109\/CVPR.2016.55"},{"issue":"4","key":"16702_CR31","first-page":"297","volume":"4","author":"JE Fowler","year":"2012","unstructured":"Fowler JE, Mun S, Tramel EW (2012) Block-based compressed sensing of images and video. Foundations and Trends\u00ae. Signal Processing 4(4):297\u2013416","journal-title":"Signal Processing"},{"key":"16702_CR32","unstructured":"Metzler CA, Mousavi A, Baraniuk RG (2017) Learned D-AMP: principled neural network-based compressive image recovery. NIPS'17: Proceedings of the 31st International Conference on Neural Information Processing Systems, pp 1770-1781"},{"key":"16702_CR33","doi-asserted-by":"crossref","unstructured":"Zhang J, Ghanem B (2018) ISTA-Net: interpretable optimization-inspired deep network for image compressive sensing. IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp 1-6","DOI":"10.1109\/CVPR.2018.00196"},{"key":"16702_CR34","first-page":"1","volume-title":"2018 IEEE International Conference on Multimedia and Expo (ICME)","author":"S Zhou","year":"2018","unstructured":"Zhou S, Xiang S, Liu X, Li H (2018) Asymmetric block-based compressive sensing for image signals. In: 2018 IEEE International Conference on Multimedia and Expo (ICME). San Diego, CA, USA, pp 1\u20136"},{"key":"16702_CR35","doi-asserted-by":"crossref","unstructured":"Shi W, Jiang F, Liu S, Zhao D (2018) Multi-scale deep networks for image compressed sensing. 2018 25th IEEE International Conference on Image Processing (ICIP), Athens, Greece, pp 46-50","DOI":"10.1109\/ICIP.2018.8451352"},{"key":"16702_CR36","doi-asserted-by":"crossref","first-page":"2627","DOI":"10.1109\/TMM.2020.3014561","volume":"23","author":"SW Zhou","year":"2021","unstructured":"Zhou SW, He Y, Liu YH, Li CQ, Zhang JM (2021) Multi-channel deep networks for block-based image compressive sensing. IEEE Trans Multimed 23:2627\u20132640","journal-title":"IEEE Trans Multimed"},{"issue":"12","key":"16702_CR37","doi-asserted-by":"crossref","first-page":"2050173","DOI":"10.1142\/S0218127420501734","volume":"30","author":"H Liu","year":"2020","unstructured":"Liu H, Kadir A, Xu C (2020) Color image encryption with cipher feedback and coupling chaotic map. Int J Bifurcat Chaos 30(12):2050173","journal-title":"Int J Bifurcat Chaos"},{"key":"16702_CR38","doi-asserted-by":"crossref","first-page":"164925","DOI":"10.1016\/j.ijleo.2020.164925","volume":"216","author":"H Liu","year":"2020","unstructured":"Liu H, Xu Y, Ma C (2020) Chaos-based image hybrid encryption algorithm using key stretching and hash feedback. Optik 216:164925","journal-title":"Optik"},{"key":"16702_CR39","doi-asserted-by":"crossref","unstructured":"Mun S, Fowler JE (2010) Block compressed sensing of images using directional transforms. 2010 Data Compression Conference, Snowbird, UT, USA, pp 547-547","DOI":"10.1109\/DCC.2010.90"},{"key":"16702_CR40","unstructured":"Yu L, Barbot JP, Zheng G, Sun H (2010) Toeplitz-structured chaotic sensing matrix for compressive sensing. 2010 7th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP 2010), Newcastle upon Tyne, pp 229-233"},{"key":"16702_CR41","unstructured":"Frunzete M, Yu L, Barbot JP, Vlad A (2011) Compressive sensing matrix designed by tent map, for secure data transmission. In: Signal Processing Algorithms, Architectures, Arrangements, and Applications SPA 2011, Poznan, Poland, pp 1\u20136"},{"key":"16702_CR42","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"YC Zhou","year":"2014","unstructured":"Zhou YC, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Sig Process 97:172\u2013182","journal-title":"Sig Process"},{"issue":"4","key":"16702_CR43","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"16702_CR44","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.optlaseng.2016.10.009","volume":"90","author":"A Kanso","year":"2017","unstructured":"Kanso A, Ghebleh M (2017) An algorithm for encryption of secret images into meaningful images. Opt Las Eng 90:196\u2013208","journal-title":"Opt Las Eng"},{"issue":"6","key":"16702_CR45","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1016\/j.optlaseng.2013.01.001","volume":"51","author":"A Bakhshandeh","year":"2013","unstructured":"Bakhshandeh A, Eslami Z (2013) An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Opt Las Eng 51(6):665\u2013673","journal-title":"Opt Las Eng"},{"key":"16702_CR46","volume":"124","author":"XL Chai","year":"2020","unstructured":"Chai XL, Wu HY, Gan ZH et al (2020) An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding. Opt Las Eng 124:105837","journal-title":"Opt Las Eng"},{"key":"16702_CR47","volume":"175","author":"LY Zhu","year":"2020","unstructured":"Zhu LY, Song HS, Zhang X et al (2020) A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding. Sig Process 175:107629","journal-title":"Sig Process"},{"key":"16702_CR48","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1016\/j.sigpro.2018.10.001","volume":"155","author":"H Wang","year":"2019","unstructured":"Wang H, Xiao D, Li M, Xiang YP, Li XY (2019) A visually secure image encryption scheme based on parallel compressive sensing. Sig Process 155:218\u2013232","journal-title":"Sig Process"},{"key":"16702_CR49","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.sigpro.2016.11.016","volume":"134","author":"XL Chai","year":"2017","unstructured":"Chai XL, Gan ZH, Chen YR, Zhang YS (2017) A visually secure image encryption scheme based on compressive sensing. Sig Process 134:35\u201351","journal-title":"Sig Process"},{"key":"16702_CR50","doi-asserted-by":"crossref","first-page":"22161","DOI":"10.1109\/ACCESS.2019.2897721","volume":"7","author":"LY Zhu","year":"2019","unstructured":"Zhu LY, Song HS, Zhang X et al (2019) A novel image encryption scheme based on nonuniform sampling in block compressive sensing. IEEE Access 7:22161\u201322174","journal-title":"IEEE Access"},{"issue":"7","key":"16702_CR51","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1016\/j.jvcir.2013.06.006","volume":"24","author":"ZR Gao","year":"2013","unstructured":"Gao ZR, Xiong CY, Ding LX, Zhou C (2013) Image representation using block compressive sensing for compression applications. J Vis Commun Image R 24(7):885\u2013894","journal-title":"J Vis Commun Image R"},{"key":"16702_CR52","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.jappgeo.2014.01.015","volume":"103","author":"NR Zhou","year":"2014","unstructured":"Zhou NR, Xue G (2014) The ratio apparent resistivity definition of rectangular-loop TEM. J Appl Geophys 103:152\u2013160","journal-title":"J Appl Geophys"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16702-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16702-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16702-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T08:31:07Z","timestamp":1709800267000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16702-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,13]]},"references-count":52,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["16702"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16702-1","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,9,13]]},"assertion":[{"value":"15 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work, there is no professional or other personal interest of any nature or kind in any product, service and\/or company that could be construed as influencing the position presented in, or the review of, the manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}