{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:03:47Z","timestamp":1773511427802,"version":"3.50.1"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T00:00:00Z","timestamp":1642982400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T00:00:00Z","timestamp":1642982400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["61802111"],"award-info":[{"award-number":["61802111"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["61872125"],"award-info":[{"award-number":["61872125"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["61871175"],"award-info":[{"award-number":["61871175"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2022,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>With the advancement of multimedia technology and coming of big data era, the size of image data is significantly increased. However, the traditional image encryption methods cannot solve the emerging problems of efficient compression. To settle with this challenge, an effective content-adaptive image compression and encryption method based on compressive sensing and double random phase encoding (DRPE) is proposed in this paper. The original image is converted to one low-frequency part and three high-frequency parts by DWT and then permutated by sorting-based chaotic sequences. Afterward, a novel measurement matrix optimization algorithm based on adaptive step size is presented to measure the high-frequency components. To enhance the security of the scheme, the DRPE, quantization, and diffusion are successively performed on the complex matrix composed of the shuffled low-frequency component and three measurement value matrices to obtain the cipher image. Logistic-Sine chaotic system is utilized to produce the chaotic keystreams for the encryption process, and its system parameter and initial value are determined by the information entropy of the plain image and external key parameters, so that the proposed cipher can withstand known-plaintext and chosen-plaintext attacks effectively. Numerical experiments demonstrate the effectiveness of the proposed image compression and encryption algorithm.<\/jats:p>","DOI":"10.1007\/s40747-022-00644-6","type":"journal-article","created":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T13:11:09Z","timestamp":1643029869000},"page":"2291-2309","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Content-adaptive image compression and encryption via optimized compressive sensing with double random phase encoding driven by chaos"],"prefix":"10.1007","volume":"8","author":[{"given":"Zhihua","family":"Gan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5727-8933","authenticated-orcid":false,"given":"Xiuli","family":"Chai","sequence":"additional","affiliation":[]},{"given":"Jianqiang","family":"Bi","sequence":"additional","affiliation":[]},{"given":"Xiuhui","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,24]]},"reference":[{"key":"644_CR1","doi-asserted-by":"crossref","first-page":"107652","DOI":"10.1016\/j.sigpro.2020.107652","volume":"175","author":"HS Ye","year":"2020","unstructured":"Ye HS, Zhou NR, Gong LH (2020) Multi-image compression\u2013encryption scheme based on quaternion discrete fractional Hartley transform and improved pixel adaptive diffusion. Signal Process 175:107652","journal-title":"Signal Process"},{"key":"644_CR2","doi-asserted-by":"crossref","first-page":"745","DOI":"10.1007\/s11071-018-4391-y","volume":"94","author":"GD Ye","year":"2018","unstructured":"Ye GD, Pan C, Huang XL, Mei QX (2018) An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dyn 94:745\u2013756","journal-title":"Nonlinear Dyn"},{"key":"644_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2020.07.051","volume":"544","author":"M Wang","year":"2021","unstructured":"Wang M, Wang X, Zhao T, Zhang C, Xia Z, Yao N (2021) Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme. Inf Sci 544:1\u201324","journal-title":"Inf Sci"},{"key":"644_CR4","doi-asserted-by":"crossref","first-page":"107074","DOI":"10.1016\/j.optlastec.2021.107074","volume":"140","author":"XJ Li","year":"2021","unstructured":"Li XJ, Mou J, Xiong L, Wang ZS, Xu J (2021) Fractional-order double-ring erbium-doped fiber laser chaotic system and its application on image encryption. Opt Laser Technol 140:107074","journal-title":"Opt Laser Technol"},{"key":"644_CR5","doi-asserted-by":"crossref","first-page":"1587","DOI":"10.1007\/s11071-019-05378-8","volume":"99","author":"WY Wen","year":"2020","unstructured":"Wen WY, Wei KK, Zhang YS, Fang YM, Li M (2020) Colour light field image encryption based on DNA sequences and chaotic systems. Nonlinear Dyn 99:1587\u20131600","journal-title":"Nonlinear Dyn"},{"key":"644_CR6","doi-asserted-by":"crossref","first-page":"105851","DOI":"10.1016\/j.optlaseng.2019.105851","volume":"125","author":"XY Wang","year":"2020","unstructured":"Wang XY, Wang Y, Zhu XQ, Luo C (2020) A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level. Opt Lasers Eng 125:105851","journal-title":"Opt Lasers Eng"},{"key":"644_CR7","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/j.image.2016.12.007","volume":"52","author":"XL Chai","year":"2017","unstructured":"Chai XL, Gan ZH, Yang K, Chen YR, Liu XX (2017) An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process Image Commun 52:6\u201319","journal-title":"Signal Process Image Commun"},{"key":"644_CR8","doi-asserted-by":"crossref","first-page":"106626","DOI":"10.1016\/j.optlaseng.2021.106626","volume":"143","author":"YB Zhang","year":"2021","unstructured":"Zhang YB, Zhang L, Zhong Z, Yu L, Shan MG, Zhao YG (2021) Hyperchaotic image encryption using phase-truncated fractional Fourier transform and DNA-level operation. Opt Lasers Eng 143:106626","journal-title":"Opt Lasers Eng"},{"key":"644_CR9","doi-asserted-by":"crossref","first-page":"105816","DOI":"10.1016\/j.optlaseng.2019.105816","volume":"124","author":"SS Yu","year":"2020","unstructured":"Yu SS, Zhou NR, Gong LH, Nie Z (2020) Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system. Opt Lasers Eng 124:105816","journal-title":"Opt Lasers Eng"},{"key":"644_CR10","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"DL Donoho","year":"2006","unstructured":"Donoho DL (2006) Compressed sensing. IEEE Trans Inf Theory 52:1289\u20131306","journal-title":"IEEE Trans Inf Theory"},{"key":"644_CR11","doi-asserted-by":"crossref","first-page":"12771","DOI":"10.1007\/s00521-020-04724-x","volume":"32","author":"HJ Fan","year":"2020","unstructured":"Fan HJ, Zhou KL, Zhang E, Wen WY, Li M (2020) Subdata image encryption scheme based on compressive sensing and vector quantization. Neural Comput Appl 32:12771\u201312787","journal-title":"Neural Comput Appl"},{"key":"644_CR12","doi-asserted-by":"crossref","first-page":"2627","DOI":"10.1109\/TMM.2020.3014561","volume":"23","author":"SW Zhou","year":"2021","unstructured":"Zhou SW, He Y, Liu YH, Li CQ, Zhang JM (2021) Multi-channel deep networks for block-based image compressive sensing. IEEE Trans Multimed 23:2627\u20132640","journal-title":"IEEE Trans Multimed"},{"key":"644_CR13","doi-asserted-by":"crossref","first-page":"2507","DOI":"10.1109\/ACCESS.2016.2569421","volume":"4","author":"YS Zhang","year":"2016","unstructured":"Zhang YS, Zhang LY, Zhou JT, Liu LC, Chen F, He X (2016) A review of compressive sensing in information security field. IEEE Access 4:2507\u20132519","journal-title":"IEEE Access"},{"key":"644_CR14","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.jvcir.2017.01.022","volume":"44","author":"G Hu","year":"2017","unstructured":"Hu G, Xiao D, Wang Y, Xiang T (2017) An image coding scheme using parallel compressive sensing for simultaneous compression\u2013encryption applications. J Vis Commun Image Rep 44:116\u2013127","journal-title":"J Vis Commun Image Rep"},{"key":"644_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-05921-y","author":"KS Wang","year":"2021","unstructured":"Wang KS, Wu XJ, Gao TG (2021) Double color images compression\u2013encryption via compressive sensing. Neural Comput Appl. https:\/\/doi.org\/10.1007\/s00521-021-05921-y","journal-title":"Neural Comput Appl"},{"key":"644_CR16","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.optlastec.2014.02.015","volume":"62","author":"NR Zhou","year":"2014","unstructured":"Zhou NR, Zhang AD, Zheng F, Gong LH (2014) Novel image compression\u2013encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt Laser Technol 62:152\u2013160","journal-title":"Opt Laser Technol"},{"key":"644_CR17","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.sigpro.2018.04.014","volume":"150","author":"H Huang","year":"2018","unstructured":"Huang H, He X, Xiang Y, Wen WY, Zhang YS (2018) A compression\u2013diffusion\u2013permutation strategy for securing image. Signal Process 150:183\u2013190","journal-title":"Signal Process"},{"key":"644_CR18","doi-asserted-by":"crossref","first-page":"107998","DOI":"10.1016\/j.sigpro.2021.107998","volume":"183","author":"ZY Hua","year":"2021","unstructured":"Hua ZY, Zhang KY, Li YM, Zhou YC (2021) Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing. Signal Process 183:107998","journal-title":"Signal Process"},{"key":"644_CR19","doi-asserted-by":"crossref","first-page":"4543","DOI":"10.1007\/s11071-021-06488-y","volume":"104","author":"XY Wang","year":"2021","unstructured":"Wang XY, Ren Q, Jiang DH (2021) An adjustable visual image cryptosystem based on 6D hyperchaotic system and compressive sensing. Nonlinear Dyn 104:4543\u20134567","journal-title":"Nonlinear Dyn"},{"key":"644_CR20","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.optlaseng.2018.05.014","volume":"110","author":"NR Zhou","year":"2018","unstructured":"Zhou NR, Jiang H, Gong LH, Xie XW (2018) Double-image compression and encryption algorithm based on co-sparse representation and random pixel exchanging. Opt Lasers Eng 110:72\u201379","journal-title":"Opt Lasers Eng"},{"key":"644_CR21","first-page":"122","volume":"2013","author":"RS Endra","year":"2013","unstructured":"Endra RS (2013) Compressive sensing-based image encryption with optimized sensing matrix. IEEE Int Conf Comput Intell Cybern 2013:122\u2013125","journal-title":"IEEE Int Conf Comput Intell Cybern"},{"key":"644_CR22","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/j.sigpro.2019.03.022","volume":"161","author":"YL Luo","year":"2019","unstructured":"Luo YL, Lin J, Liu JX, Wei DQ, Cao LC, Zhou RL, Cao Y, Ding XM (2019) A robust image encryption algorithm based on Chua\u2019s circuit and compressive sensing. Signal Process 161:227\u2013247","journal-title":"Signal Process"},{"key":"644_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-05937-4","author":"ZH Gan","year":"2021","unstructured":"Gan ZH, Bi JQ, Ding WK, Chai XL (2021) Exploiting 2D compressed sensing and information entropy for secure color image compression and encryption. Neural Comput Appl. https:\/\/doi.org\/10.1007\/s00521-021-05937-4","journal-title":"Neural Comput Appl"},{"key":"644_CR24","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1016\/j.ins.2020.10.007","volume":"556","author":"XL Chai","year":"2021","unstructured":"Chai XL, Wu HY, Gan ZH, Han DJ, Zhang YS, Chen YR (2021) An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing. Inf Sci 556:305\u2013340","journal-title":"Inf Sci"},{"key":"644_CR25","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.neucom.2016.04.053","volume":"205","author":"YS Zhang","year":"2016","unstructured":"Zhang YS, Zhou JT, Chen F, Zhang LY, Wong KW, He X, Xiao D (2016) Embedding cryptographic features in compressive sensing. Neurocomputing 205:472\u2013480","journal-title":"Neurocomputing"},{"key":"644_CR26","doi-asserted-by":"crossref","first-page":"2235","DOI":"10.1007\/s11071-018-4689-9","volume":"95","author":"YJ Song","year":"2019","unstructured":"Song YJ, Zhu ZL, Zhang W, Guo L, Yang X, Yu H (2019) Joint image compression\u2013encryption scheme using entropy coding and compressive sensing. Nonlinear Dyn 95:2235\u20132261","journal-title":"Nonlinear Dyn"},{"key":"644_CR27","doi-asserted-by":"crossref","first-page":"106178","DOI":"10.1016\/j.optlaseng.2020.106178","volume":"134","author":"QY Xu","year":"2020","unstructured":"Xu QY, Sun KH, He SB, Zhu CX (2020) An effective image encryption algorithm based on compressive sensing and 2D-SLIM. Opt Lasers Eng 134:106178","journal-title":"Opt Lasers Eng"},{"key":"644_CR28","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.optcom.2014.12.084","volume":"343","author":"NR Zhou","year":"2015","unstructured":"Zhou NR, Li HL, Wang D, Pan SM, Zhou ZH (2015) Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun 343:10\u201321","journal-title":"Opt Commun"},{"key":"644_CR29","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.sigpro.2018.02.007","volume":"148","author":"XL Chai","year":"2018","unstructured":"Chai XL, Zheng XY, Gan ZH, Han DJ, Chen YR (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124\u2013144","journal-title":"Signal Process"},{"key":"644_CR30","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s00340-020-7397-3","volume":"126","author":"DM Huo","year":"2020","unstructured":"Huo DM, Zhu XH, Dai GZ, Yang HC, Zhou X, Feng MH (2020) Novel image compression\u2013encryption hybrid scheme based on DNA encoding and compressive sensing. Appl Phys B Lasers Opt 126:45","journal-title":"Appl Phys B Lasers Opt"},{"key":"644_CR31","doi-asserted-by":"crossref","first-page":"126683","DOI":"10.1016\/j.optcom.2020.126683","volume":"484","author":"X Jiang","year":"2021","unstructured":"Jiang X, Xiao Y, Xie YY, Liu BC, Ye YC, Song TT, Chai JX, Liu Y (2021) Exploiting optical chaos for double images encryption with compressive sensing and double random phase encoding. Opt Commun 484:126683","journal-title":"Opt Commun"},{"key":"644_CR32","doi-asserted-by":"crossref","first-page":"105781","DOI":"10.1016\/j.cnsns.2021.105781","volume":"99","author":"F Wang","year":"2021","unstructured":"Wang F, Xu J, Fan QJ (2021) Statistical properties of the detrended multiple cross-correlation coefficient. Commun Nonlinear Sci 99:105781","journal-title":"Commun Nonlinear Sci"},{"key":"644_CR33","doi-asserted-by":"crossref","first-page":"1025","DOI":"10.1002\/cpa.20227","volume":"61","author":"M Rudelson","year":"2008","unstructured":"Rudelson M, Vershynin R (2008) On sparse reconstruction from Fourier and Gaussian measurements. Commun Pure Appl Math 61:1025\u20131045","journal-title":"Commun Pure Appl Math"},{"key":"644_CR34","doi-asserted-by":"crossref","first-page":"5695","DOI":"10.1109\/TSP.2007.900760","volume":"55","author":"M Elad","year":"2007","unstructured":"Elad M (2007) Optimized projections for compressed sensing. IEEE Trans Signal Process 55:5695\u20135702","journal-title":"IEEE Trans Signal Process"},{"key":"644_CR35","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/0885-064X(91)90002-F","volume":"7","author":"SJ Szarek","year":"1991","unstructured":"Szarek SJ (1991) Condition numbers of random matrices. J Complex 7:131\u2013149","journal-title":"J Complex"},{"key":"644_CR36","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1109\/TIT.1974.1055219","volume":"20","author":"L Welch","year":"1974","unstructured":"Welch L (1974) Lower bounds on the maximum cross correlation of signals. IEEE Trans Inf Theory 20:397\u2013399","journal-title":"IEEE Trans Inf Theory"},{"key":"644_CR37","doi-asserted-by":"crossref","first-page":"999","DOI":"10.1016\/j.sigpro.2011.10.012","volume":"92","author":"V Abolghasemi","year":"2012","unstructured":"Abolghasemi V, Ferdoewsi S, Sanei S (2012) A gradient based alternating minimization approach for optimization of the measurement matrix in compressive sensing. Signal Process 92:999\u20131009","journal-title":"Signal Process"},{"key":"644_CR38","first-page":"192","volume":"33","author":"YL Ma","year":"2017","unstructured":"Ma YL, Pei LY, Jiang H (2017) Improved optimization algorithm for measurement matrix in compressed sensing. J Signal Process 33:192\u2013197","journal-title":"J Signal Process"},{"key":"644_CR39","first-page":"062","volume":"44","author":"JP Liu","year":"2016","unstructured":"Liu JP, Yang CY, Fang J, Wei G (2016) Improved optimization algorithm of the Gram measurement matrix based on gradient projection. J Huazhong Univ Sci Technol (Natural Science Edition) 44:062\u2013066","journal-title":"J Huazhong Univ Sci Technol (Natural Science Edition)"},{"key":"644_CR40","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/s40314-020-01225-4","volume":"39","author":"JK Sahoo","year":"2020","unstructured":"Sahoo JK, Behera R, Stanimirovic PS, Katsikis VN (2020) Computation of outer inverses of tensors using the QR decomposition. Comput Appl Math 39:199","journal-title":"Comput Appl Math"},{"key":"644_CR41","doi-asserted-by":"crossref","first-page":"1545","DOI":"10.1016\/j.apm.2019.08.026","volume":"77","author":"W Zhao","year":"2020","unstructured":"Zhao W, Chen YY, Liu JK (2020) An effective first order reliability method based on Barzilai\u2013Borwein step. Appl Math Model 77:1545\u20131563","journal-title":"Appl Math Model"},{"key":"644_CR42","first-page":"266","volume":"55","author":"ZY Shen","year":"2019","unstructured":"Shen ZY, Wang LX (2019) Adaptive step-size method for measurement matrix iterative optimization. Comput Eng Appl 55:266\u2013270","journal-title":"Comput Eng Appl"},{"key":"644_CR43","unstructured":"Lan MR (2017) Research on optimization and reconstruction algorithm of measurement matrix based on compressive sensing. Nanjing University of Posts and Telecommunications"},{"key":"644_CR44","unstructured":"Fang J (2015) Research on the measurement matrix and reconstruction algorithm in compressed sensing. South China University of Technology"},{"key":"644_CR45","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.1007\/s11071-018-4251-9","volume":"93","author":"YL Luo","year":"2018","unstructured":"Luo YL, Zhou RL, Liu JX, Cao Y, Ding XM (2018) A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map. Nonlinear Dyn 93:1165\u20131181","journal-title":"Nonlinear Dyn"},{"key":"644_CR46","first-page":"102361","volume":"48","author":"C Li","year":"2019","unstructured":"Li C, Zhang Y, Xie EY (2019) When an attacker meets a cipher-image in 2018: a year in review. J Inf Secur Appl 48:102361","journal-title":"J Inf Secur Appl"},{"key":"644_CR47","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak C, Huang LL (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129\u2013137","journal-title":"Signal Process"},{"key":"644_CR48","doi-asserted-by":"crossref","first-page":"105581","DOI":"10.1016\/j.optlastec.2019.105581","volume":"119","author":"XY Wang","year":"2019","unstructured":"Wang XY, Zhang JJ, Cao GH (2019) An image encryption algorithm based on ZigZag transform and LL compound chaotic system. Opt Laser Technol 119:105581","journal-title":"Opt Laser Technol"},{"key":"644_CR49","doi-asserted-by":"crossref","first-page":"27445","DOI":"10.1007\/s11042-021-10979-w","volume":"80","author":"ZL Man","year":"2021","unstructured":"Man ZL, Li JQ, Di XQ, Liu X, Zhou J, Wang J, Zhang XX (2021) A novel image encryption algorithm based on least squares generative adversarial network random number generator. Multimed Tools Appl 80:27445\u201327469","journal-title":"Multimed Tools Appl"},{"key":"644_CR50","doi-asserted-by":"crossref","first-page":"108041","DOI":"10.1016\/j.sigpro.2021.108041","volume":"183","author":"XL Chai","year":"2021","unstructured":"Chai XL, Zhi XC, Gan ZH, Zhang YS, Chen YR, Fu JY (2021) Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption. Signal Process 183:108041","journal-title":"Signal Process"},{"key":"644_CR51","doi-asserted-by":"crossref","first-page":"105703","DOI":"10.1016\/j.optlastec.2019.105703","volume":"120","author":"SY Yao","year":"2019","unstructured":"Yao SY, Chen LF, Zhong Y (2019) An encryption system for color image based on compressive sensing. Opt Laser Technol 120:105703","journal-title":"Opt Laser Technol"},{"key":"644_CR52","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","volume":"155","author":"XL Chai","year":"2019","unstructured":"Chai XL, Fu XL, Gan ZH, Lu Y, Chen YR (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44\u201362","journal-title":"Signal Process"},{"key":"644_CR53","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.optlastec.2019.02.009","volume":"115","author":"XY Wang","year":"2019","unstructured":"Wang XY, Zhao HY, Wang MX (2019) A new image encryption algorithm with nonlinear-diffusion based on Multiple coupled map lattices. Opt Laser Technol 115:42\u201357","journal-title":"Opt Laser Technol"},{"key":"644_CR54","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Labs Tech J 28:656\u2013715","journal-title":"Bell Labs Tech J"},{"key":"644_CR55","doi-asserted-by":"crossref","first-page":"107373","DOI":"10.1016\/j.sigpro.2019.107373","volume":"169","author":"FF Yang","year":"2020","unstructured":"Yang FF, Mou J, Liu J, Ma CG, Yan HZ (2020) Characteristic analysis of the fractional-order hyperchaotic complex system and its image encryption application. Signal Process 169:107373","journal-title":"Signal Process"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00644-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-022-00644-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00644-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T01:19:49Z","timestamp":1653873589000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-022-00644-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,24]]},"references-count":55,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["644"],"URL":"https:\/\/doi.org\/10.1007\/s40747-022-00644-6","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,24]]},"assertion":[{"value":"28 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Our research is not involved in human participants and animals.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All the listed authors have participated actively in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All the listed authors have agreed to publish our article in Complex & Intelligent Systems.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}