{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T06:47:27Z","timestamp":1768805247433,"version":"3.49.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Key R & D plan in Shanxi Province","award":["202102020101007"],"award-info":[{"award-number":["202102020101007"]}]},{"DOI":"10.13039\/501100004480","name":"Natural Science Foundation of ShanXi Province","doi-asserted-by":"crossref","award":["20210302124050"],"award-info":[{"award-number":["20210302124050"]}],"id":[{"id":"10.13039\/501100004480","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702356"],"award-info":[{"award-number":["61702356"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s11227-023-05703-4","type":"journal-article","created":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T09:03:15Z","timestamp":1697446995000},"page":"6042-6067","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Multimodal medical image protection algorithm based on 3D-CICCM and Fresnel transform"],"prefix":"10.1007","volume":"80","author":[{"given":"Rui-yun","family":"Chang","sequence":"first","affiliation":[]},{"given":"Xiu-fang","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Cheng-Ye","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"5703_CR1","doi-asserted-by":"publisher","first-page":"1405","DOI":"10.1007\/s11277-021-08584-z","volume":"127","author":"F Masood","year":"2021","unstructured":"Masood F, Driss M, Boulila W, Ahmad J, Rehman SU, Jan SU, Qayyum A, Buchanan WJ (2021) A lightweight chaos-based medical image encryption scheme using random shuffling and XOR operations. Wirel Pers Commun 127:1405","journal-title":"Wirel Pers Commun"},{"issue":"10","key":"5703_CR2","doi-asserted-by":"publisher","first-page":"2589","DOI":"10.1109\/TMI.2021.3059282","volume":"40","author":"W Huang","year":"2021","unstructured":"Huang W, Yang H, Liu X, Li C, Zhang I, Wang R, Zheng H, Wang S (2021) A coarse-to-fine deformable transformation framework for unsupervised multi-contrast MR image registration with dual consistency constraint. IEEE Trans Med Imaging 40(10):2589\u20132599","journal-title":"IEEE Trans Med Imaging"},{"key":"5703_CR3","doi-asserted-by":"publisher","first-page":"2033","DOI":"10.1109\/TCSS.2022.3140862","volume":"10","author":"A Anand","year":"2022","unstructured":"Anand A, Singh AK (2022) Hybrid nature-inspired optimization and encryption-based watermarking for E-healthcare. IEEE Trans Comput Soc Syst 10:2033\u20132040","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"4","key":"5703_CR4","doi-asserted-by":"publisher","first-page":"2188","DOI":"10.1109\/TNSE.2022.3157867","volume":"9","author":"B Wang","year":"2022","unstructured":"Wang B, Jiawei S, Wang W, Zhao P (2022) Image copyright protection based on blockchain and zero-watermark. IEEE Trans Netw Sci Eng 9(4):2188\u20132199","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"6","key":"5703_CR5","doi-asserted-by":"publisher","first-page":"2689","DOI":"10.1007\/s00500-021-06423-8","volume":"26","author":"M Kaur","year":"2022","unstructured":"Kaur M, Singh D, Kumar V (2022) Improved seven-dimensional (i7D) hyperchaotic map-based image encryption technique. Soft Comput 26(6):2689\u20132698","journal-title":"Soft Comput"},{"issue":"3","key":"5703_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3498342","volume":"18","author":"KN Singh","year":"2022","unstructured":"Singh KN, Singh AK (2022) Towards integrating image encryption with compression: a survey. ACM Trans Multimed Comput Commun Appl (TOMM) 18(3):1\u201321","journal-title":"ACM Trans Multimed Comput Commun Appl (TOMM)"},{"key":"5703_CR7","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.neucom.2020.09.024","volume":"422","author":"H Li","year":"2021","unstructured":"Li H, Yang M, Yu Z (2021) Joint image fusion and super-resolution for enhanced visualization via semi-coupled discriminative dictionary learning and advantage embedding. Neurocomputing 422:62\u201384","journal-title":"Neurocomputing"},{"issue":"4","key":"5703_CR8","doi-asserted-by":"publisher","first-page":"1647","DOI":"10.1109\/JBHI.2018.2869096","volume":"23","author":"Y Yang","year":"2018","unstructured":"Yang Y, Wu J, Huang S, Fang Y, Lin P, Que Y (2018) Multimodal medical image fusion based on fuzzy discrimination with structural patch decomposition. IEEE J Biomed Health Inform 23(4):1647\u20131660","journal-title":"IEEE J Biomed Health Inform"},{"issue":"4","key":"5703_CR9","doi-asserted-by":"publisher","first-page":"1082","DOI":"10.1109\/TIM.2019.2912239","volume":"69","author":"H Li","year":"2019","unstructured":"Li H, Wang Y, Yang Z, Wang R, Li X, Tao D (2019) Discriminative dictionary learning-based multiple component decomposition for detail-preserving noisy image fusion. IEEE Trans Instrum Meas 69(4):1082\u20131102","journal-title":"IEEE Trans Instrum Meas"},{"key":"5703_CR10","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1016\/j.ins.2021.04.052","volume":"569","author":"X Li","year":"2021","unstructured":"Li X, Zhou F, Tan H, Zhang W, Zhao C (2021) Multimodal medical image fusion based on joint bilateral filter and local gradient energy. Inf Sci 569:302\u2013325","journal-title":"Inf Sci"},{"issue":"7","key":"5703_CR11","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20(7):767\u2013769","journal-title":"Opt Lett"},{"key":"5703_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijleo.2017.02.001","volume":"136","author":"J Chen","year":"2017","unstructured":"Chen J, Zhu ZL, Fu C, Zhang LB, Zhang Y (2017) Information authentication using sparse representation of double random phase encoding in fractional Fourier transform domain. Optik 136:1\u20137","journal-title":"Optik"},{"key":"5703_CR13","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.optlaseng.2016.07.010","volume":"88","author":"A Belazi","year":"2017","unstructured":"Belazi A, Abd El-Latif AA, Diaconu AV, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37\u201350","journal-title":"Opt Lasers Eng"},{"issue":"6","key":"5703_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11082-021-02864-5","volume":"53","author":"OS Faragallah","year":"2021","unstructured":"Faragallah OS, Afifi A, Elashry IF, Naeem EA, El-Hoseny HM, El-sayed HS, Abbas AM (2021) Efficient optical double image cryptosystem using chaotic mapping-based Fresnel transform. Opt Quant Electron 53(6):1\u201326","journal-title":"Opt Quant Electron"},{"issue":"15","key":"5703_CR15","doi-asserted-by":"publisher","first-page":"4381","DOI":"10.1364\/AO.56.004381","volume":"56","author":"F Yi","year":"2017","unstructured":"Yi F, Jeoung Y, Moon I (2017) Three-dimensional image authentication scheme using sparse phase information in double random phase encoded integral imaging. Appl Opt 56(15):4381\u20134387","journal-title":"Appl Opt"},{"key":"5703_CR16","doi-asserted-by":"publisher","first-page":"105769","DOI":"10.1016\/j.optlastec.2019.105769","volume":"121","author":"K Zhou","year":"2020","unstructured":"Zhou K, Fan J, Fan H, Li M (2020) Secure image encryption scheme using double random-phase encoding and compressed sensing. Opt Laser Technol 121:105769","journal-title":"Opt Laser Technol"},{"issue":"18","key":"5703_CR17","doi-asserted-by":"publisher","first-page":"2093","DOI":"10.1080\/09500340.2018.1498547","volume":"65","author":"D Huo","year":"2018","unstructured":"Huo D, Zhou X, Zhang L, Zhou Y, Li H, Yi S (2018) Multiple-image encryption scheme via compressive sensing and orthogonal encoding based on double random phase encoding. J Mod Opt 65(18):2093\u20132102","journal-title":"J Mod Opt"},{"issue":"8","key":"5703_CR18","doi-asserted-by":"publisher","first-page":"1242","DOI":"10.3390\/math10081242","volume":"10","author":"R Zhang","year":"2022","unstructured":"Zhang R, Xiao D (2022) Double image encryption scheme based on compressive sensing and double random phase encoding. Mathematics 10(8):1242","journal-title":"Mathematics"},{"key":"5703_CR19","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.sigpro.2018.02.007","volume":"148","author":"X Chai","year":"2018","unstructured":"Chai X, Zheng X, Gan Z, Han D, Chen Y (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124\u2013144","journal-title":"Signal Process"},{"key":"5703_CR20","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.sigpro.2016.11.016","volume":"134","author":"X Chai","year":"2017","unstructured":"Chai X, Gan Z, Chen Y, Zhang Y (2017) A visually secure image encryption scheme based on compressive sensing. Signal Process 134:35\u201351","journal-title":"Signal Process"},{"issue":"9","key":"5703_CR21","doi-asserted-by":"publisher","first-page":"4961","DOI":"10.1007\/s00521-018-3913-3","volume":"32","author":"X Chai","year":"2020","unstructured":"Chai X, Fu X, Gan Z, Zhang Y, Lu Y, Chen Y (2020) An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata. Neural Comput Appl 32(9):4961\u20134988","journal-title":"Neural Comput Appl"},{"issue":"7","key":"5703_CR22","doi-asserted-by":"publisher","first-page":"10097","DOI":"10.1007\/s11042-016-3600-2","volume":"76","author":"J Deng","year":"2017","unstructured":"Deng J, Zhao S, Wang Y, Wang L, Wang H, Sha H (2017) Image compression-encryption scheme combining 2D compressive sensing with discrete fractional random transform. Multimed Tools Appl 76(7):10097\u201310117","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"5703_CR23","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"DL Donoho","year":"2006","unstructured":"Donoho DL (2006) Compressed sensing. IEEE Trans Inf Theory 52(4):1289\u20131306","journal-title":"IEEE Trans Inf Theory"},{"key":"5703_CR24","doi-asserted-by":"publisher","first-page":"116193","DOI":"10.1016\/j.eswa.2021.116193","volume":"190","author":"A Daoui","year":"2022","unstructured":"Daoui A, Karmouni H, Sayyouri M, Qjidaa H (2022) Robust image encryption and zero-watermarking scheme using SCA and modified logistic map. Expert Syst Appl 190:116193","journal-title":"Expert Syst Appl"},{"issue":"12","key":"5703_CR25","doi-asserted-by":"publisher","first-page":"3342","DOI":"10.1049\/ipr2.12569","volume":"16","author":"C Wei","year":"2022","unstructured":"Wei C, Li G (2022) A selective image encryption scheme using LICC hyperchaotic system. IET Image Proc 16(12):3342\u20133358","journal-title":"IET Image Proc"},{"issue":"9","key":"5703_CR26","doi-asserted-by":"publisher","first-page":"1270","DOI":"10.3390\/e24091270","volume":"24","author":"X Li","year":"2022","unstructured":"Li X, Zeng J, Ding Q, Fan C (2022) A novel color image encryption algorithm based on 5-D hyperchaotic system and DNA sequence. Entropy 24(9):1270","journal-title":"Entropy"},{"issue":"3","key":"5703_CR27","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/0167-2789(85)90011-9","volume":"16","author":"A Wolf","year":"1985","unstructured":"Wolf A, Swift JB, Swinney HL, Vastano JA (1985) Determining Lyapunov exponents from a time series. Physica D 16(3):285\u2013317","journal-title":"Physica D"},{"issue":"1","key":"5703_CR28","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.cnsns.2009.03.035","volume":"15","author":"W Xingyuan","year":"2010","unstructured":"Xingyuan W, Bing X, Huaguang Z (2010) A multi-ary number communication system based on hyperchaotic system of 6th-order cellular neural network. Commun Nonlinear Sci Numer Simul 15(1):124\u2013133","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"4","key":"5703_CR29","doi-asserted-by":"publisher","first-page":"2521","DOI":"10.1007\/s11071-017-3601-3","volume":"89","author":"W Liu","year":"2017","unstructured":"Liu W, Sun K, He S (2017) SF-SIMM high-dimensional hyperchaotic map and its performance analysis. Nonlinear Dyn 89(4):2521\u20132532","journal-title":"Nonlinear Dyn"},{"key":"5703_CR30","doi-asserted-by":"crossref","unstructured":"Rukhin A, Soto J, Nechvatal J, Smid M, Barker E, Leigh S, Vo S (2001). A statistical test suite for random and pseudorandom number generators for cryptographic applications, vol 22. US Department of Commerce, Technology Administration, National Institute of Standards and Technology","DOI":"10.6028\/NIST.SP.800-22"},{"key":"5703_CR31","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.optlaseng.2019.01.006","volume":"116","author":"L Sui","year":"2019","unstructured":"Sui L, Zhao X, Huang C, Tian A, Anand A (2019) An optical multiple-image authentication based on transport of intensity equation. Opt Lasers Eng 116:116\u2013124","journal-title":"Opt Lasers Eng"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05703-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05703-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05703-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T20:09:49Z","timestamp":1710274189000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05703-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":31,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["5703"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05703-4","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"30 September 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 October 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}