{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:24:16Z","timestamp":1772641456137,"version":"3.50.1"},"reference-count":35,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702356"],"award-info":[{"award-number":["61702356"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004480","name":"Shanxi Province Natural Science Foundation","doi-asserted-by":"publisher","award":["20210302124050"],"award-info":[{"award-number":["20210302124050"]}],"id":[{"id":"10.13039\/501100004480","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004480","name":"Shanxi Province Natural Science Foundation","doi-asserted-by":"publisher","award":["202203021221074"],"award-info":[{"award-number":["202203021221074"]}],"id":[{"id":"10.13039\/501100004480","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.ins.2025.123034","type":"journal-article","created":{"date-parts":[[2025,12,25]],"date-time":"2025-12-25T00:02:35Z","timestamp":1766620955000},"page":"123034","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Visually secure steganography scheme for color images based on Trans-CS network, Cantor and 4D-TSCNN"],"prefix":"10.1016","volume":"742","author":[{"given":"Hao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jie","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yiting","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Teng","sequence":"additional","affiliation":[]},{"given":"Xiufang","family":"Feng","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.ins.2025.123034_b0005","doi-asserted-by":"crossref","first-page":"1241","DOI":"10.1109\/TCSVT.2023.3288038","article-title":"Progressive histogram modification for JPEG reversible data hiding","volume":"34","author":"Li","year":"2023","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.ins.2025.123034_b0010","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2024.128714","article-title":"Deep learning-based image encryption techniques: fundamentals, current trends, challenges and future directions","volume":"612","author":"Singh","year":"2025","journal-title":"Neurocomputing"},{"key":"10.1016\/j.ins.2025.123034_b0015","article-title":"A robust bit-level image encryption based on Bessel map","volume":"462","author":"Toktas","year":"2024","journal-title":"Appl. Math Comput."},{"issue":"4","key":"10.1016\/j.ins.2025.123034_b0020","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communication theory of secrecy systems","volume":"28","author":"Shannon","year":"1949","journal-title":"Bell Syst. Tech. J."},{"key":"10.1016\/j.ins.2025.123034_b0025","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2023.113841","article-title":"An n-dimensional modulo chaotic system with expected Lyapunov exponents and its application in image encryption","volume":"174","author":"Ding","year":"2023","journal-title":"Chaos, Solitons Fractals"},{"issue":"9","key":"10.1016\/j.ins.2025.123034_b0030","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1080\/09500340.2024.2418371","article-title":"An image encryption algorithm for color images based on a cellular neural network and the Chua's chaotic system","volume":"71","author":"Huang","year":"2024","journal-title":"J. Mod. Opt."},{"issue":"2","key":"10.1016\/j.ins.2025.123034_b0035","article-title":"Chaotic CS encryption: an efficient image encryption algorithm based on chebyshev chaotic system and compressive sensing","volume":"79","author":"Sun","year":"2024","journal-title":"Comput., Mater. Continua"},{"issue":"8","key":"10.1016\/j.ins.2025.123034_b0040","doi-asserted-by":"crossref","first-page":"7467","DOI":"10.1109\/TCSVT.2024.3370668","article-title":"Evit: Privacy-preserving image retrieval via encrypted vision transformer in cloud computing","volume":"34","author":"Feng","year":"2024","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"9","key":"10.1016\/j.ins.2025.123034_b0045","doi-asserted-by":"crossref","first-page":"4949","DOI":"10.1109\/TCYB.2024.3363748","article-title":"MTC-CSNet: Marrying transformer and convolution for image compressed sensing","volume":"54","author":"Shen","year":"2024","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.ins.2025.123034_b0050","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2025.122511","article-title":"Dual-Branch CNN-Transformer network for robust Zero-Watermarking of medical images","volume":"720","author":"Li","year":"2025","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2025.123034_b0055","article-title":"Visually semantics-aware color image encryption based on cross-plane substitution and permutation","author":"Zhang","year":"2024","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"3","key":"10.1016\/j.ins.2025.123034_b0060","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00530-024-01370-4","article-title":"A visually meaningful secure image encryption algorithm based on conservative hyperchaotic system and optimized compressed sensing","volume":"30","author":"Tong","year":"2024","journal-title":"Multimedia Syst."},{"issue":"4","key":"10.1016\/j.ins.2025.123034_b0065","doi-asserted-by":"crossref","first-page":"862","DOI":"10.1109\/TCE.2022.3227401","article-title":"SIELNet: 3-D chaotic-map-based secure image encryption using customized residual dense spatial network","volume":"69","author":"Singh","year":"2022","journal-title":"IEEE Trans. Consum. Electron."},{"key":"10.1016\/j.ins.2025.123034_b0070","article-title":"Flexible visually secure image encryption with meta-learning compression and chaotic systems","volume":"19","author":"Wei","year":"2025","journal-title":"Neural Netw."},{"issue":"9","key":"10.1016\/j.ins.2025.123034_b0075","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11431-024-2980-x","article-title":"Asymmetric image encryption-hiding scheme based on reversible neural network","volume":"68","author":"Liu","year":"2025","journal-title":"Sci. China Technol. Sci."},{"issue":"9","key":"10.1016\/j.ins.2025.123034_b0080","doi-asserted-by":"crossref","DOI":"10.1016\/j.jfranklin.2024.106874","article-title":"2D and 3D compatible chaotic image encryption system based on checkers rules and shift register","volume":"361","author":"Cai","year":"2024","journal-title":"J. Franklin Inst."},{"issue":"10","key":"10.1016\/j.ins.2025.123034_b0085","doi-asserted-by":"crossref","first-page":"14694","DOI":"10.1007\/s11227-024-05983-4","article-title":"A new three-dimensional memristor chaotic circuit design and its application in image encryption","volume":"80","author":"Zhang","year":"2024","journal-title":"J. Supercomput."},{"key":"10.1016\/j.ins.2025.123034_b0090","doi-asserted-by":"crossref","DOI":"10.1016\/j.dsp.2024.104725","article-title":"A secure fractal compression scheme based on irregular Latin square, Julia and 2D-FCICM","volume":"155","author":"Yang","year":"2024","journal-title":"Digital Signal Process."},{"issue":"3","key":"10.1016\/j.ins.2025.123034_b0095","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1109\/TPAMI.2018.2883941","article-title":"ADMM-CSNet: a deep learning approach for image compressive sensing","volume":"42","author":"Yang","year":"2018","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.ins.2025.123034_b0100","doi-asserted-by":"crossref","first-page":"6991","DOI":"10.1109\/TIP.2022.3217365","article-title":"TransCS: a transformer-based hybrid architecture for image compressed sensing","volume":"31","author":"Shen","year":"2022","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.ins.2025.123034_b0105","article-title":"2D compressive sensing-based visually secure multi-level image encryption scheme","author":"He","year":"2023","journal-title":"IEEE Sens. J."},{"key":"10.1016\/j.ins.2025.123034_b0110","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2024.115521","article-title":"A multi-image encryption scheme based on block compressive sensing and nonlinear bifurcation diffusion","volume":"188","author":"Hu","year":"2024","journal-title":"Chaos, Solitons Fractals"},{"issue":"7","key":"10.1016\/j.ins.2025.123034_b0115","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1140\/epjb\/s10051-024-00743-y","article-title":"Circuit design and image encryption of CNN chaotic system based on memristor","volume":"97","author":"Zhang","year":"2024","journal-title":"Eur. Phys. J. B"},{"issue":"4","key":"10.1016\/j.ins.2025.123034_b0120","doi-asserted-by":"crossref","first-page":"2851","DOI":"10.1007\/s00500-023-09333-z","article-title":"Few-detail image encryption algorithm based on diffusion and confusion using Henon and Baker chaotic maps","volume":"28","author":"Naeem","year":"2024","journal-title":"Soft. Comput."},{"key":"10.1016\/j.ins.2025.123034_b0125","doi-asserted-by":"crossref","DOI":"10.1109\/TII.2024.3395631","article-title":"A novel image encryption algorithm based on cyclic chaotic map in industrial IoT environments","author":"Alawida","year":"2024","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"9","key":"10.1016\/j.ins.2025.123034_b0130","doi-asserted-by":"crossref","DOI":"10.1088\/1402-4896\/ad69df","article-title":"Visually security privacy medical data protection scheme using compressive sensing and improved duffing chaotic system","volume":"99","author":"Huang","year":"2024","journal-title":"Phys. Scr."},{"key":"10.1016\/j.ins.2025.123034_b0135","article-title":"Multi-strategy color image encryption scheme based on compressed sensing and a novel 4D hyperchaotic system","author":"Zheng","year":"2025","journal-title":"Nonlinear Dyn."},{"issue":"4","key":"10.1016\/j.ins.2025.123034_b0140","doi-asserted-by":"crossref","first-page":"2979","DOI":"10.1007\/s11071-023-09203-1","article-title":"A visually secure image encryption scheme using newly designed 1D sinusoidal chaotic map and P-tensor product compressive sensing","volume":"112","author":"Gan","year":"2024","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.ins.2025.123034_b0145","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2025.126620","article-title":"A novel multi-color image compression encryption algorithm based on the reconstruction coefficient matrix and DNA point mutation operation","volume":"270","author":"Tang","year":"2025","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"10.1016\/j.ins.2025.123034_b0150","doi-asserted-by":"crossref","first-page":"1439","DOI":"10.1007\/s11071-023-09076-4","article-title":"A novel multi-scroll hyperchaotic system applicable for visually secure image cryptosystem using block compressive sensing","volume":"112","author":"Chai","year":"2024","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.ins.2025.123034_b0155","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2022.112584","article-title":"High-quality visually secure image cryptosystem using improved Chebyshev map and 2D compressive sensing model","volume":"163","author":"Huang","year":"2022","journal-title":"Chaos, Solitons Fractals"},{"issue":"10","key":"10.1016\/j.ins.2025.123034_b0160","doi-asserted-by":"crossref","DOI":"10.1088\/1402-4896\/acf52d","article-title":"A visually meaningful image encryption algorithm based on P-tensor product compressive sensing and newly-designed 2D memristive chaotic map","volume":"98","author":"Yang","year":"2023","journal-title":"Phys. Scr."},{"issue":"8","key":"10.1016\/j.ins.2025.123034_b0165","doi-asserted-by":"crossref","DOI":"10.1088\/1402-4896\/ace28b","article-title":"Visually meaningful image encryption scheme using multi-parameter fractal theory and block synchronous sorting diffusion","volume":"98","author":"Gan","year":"2023","journal-title":"Phys. Scr."},{"issue":"8","key":"10.1016\/j.ins.2025.123034_b0170","doi-asserted-by":"crossref","DOI":"10.1088\/1402-4896\/ad5e45","article-title":"Visually secure encryption embedded with multiple types of images using semi-tensor product compressed sensing","volume":"99","author":"Fu","year":"2024","journal-title":"Phys. Scr."},{"issue":"10","key":"10.1016\/j.ins.2025.123034_b0175","article-title":"Visually meaningful image encryption for secure and authenticated data transmission using chaotic maps","volume":"36","author":"Singh","year":"2024","journal-title":"J. King Saud Univ.-Comp. Inf. Sci."}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025525011715?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025525011715?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T11:29:31Z","timestamp":1772623771000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025525011715"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":35,"alternative-id":["S0020025525011715"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2025.123034","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Visually secure steganography scheme for color images based on Trans-CS network, Cantor and 4D-TSCNN","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2025.123034","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"123034"}}