{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T13:52:30Z","timestamp":1754488350980,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1109\/conielecomp.2016.7438556","type":"proceedings-article","created":{"date-parts":[[2016,3,24]],"date-time":"2016-03-24T16:20:21Z","timestamp":1458836421000},"page":"81-86","source":"Crossref","is-referenced-by-count":6,"title":["Image compressive sensing cryptographic analysis"],"prefix":"10.1109","author":[{"given":"P. J.","family":"Escamilla-Ambrosio","sequence":"first","affiliation":[]},{"given":"M.","family":"Salinas-Rosales","sequence":"additional","affiliation":[]},{"given":"E.","family":"Aguirre-Anaya","sequence":"additional","affiliation":[]},{"given":"R.","family":"Acosta-Bermejo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"On the security of compressed sensing based signal cryptosystem","author":"yang","year":"2014","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2008.4797641"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2012.6419328"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IWCIT.2013.6555751"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854351"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2014.12.084"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.07.026"},{"key":"ref17","first-page":"33002?1","article-title":"Homomorphic image encryption","volume":"18","author":"elashry","year":"2009","journal-title":"Journal of Electronic Imaging"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICEE.2007.4287293"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1364\/OE.20.002363"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.858979"},{"key":"ref3","article-title":"Compressive sensing: from compressing while sampling to compressing and securing while ampling","author":"abdulghani","year":"2010","journal-title":"32nd Annual International Conference of the IEEE EMBS"},{"key":"ref6","article-title":"Block compressed sensing of images using directional transforms","author":"mun","year":"2009","journal-title":"16th IEEE International Conference on Image Processing"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38398-4_1"},{"key":"ref8","first-page":"259","article-title":"Benefit of dual tree complex wavelet transform over discrete wavelet transform for image fusion","volume":"1","author":"singh","year":"2015","journal-title":"International Journal of Innovative Research in Science"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1137\/S1064827596304010"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2013.158"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.914731"},{"journal-title":"Cryptographic Algorithms on Reconfigurable Hardware","year":"2006","author":"rodr\u00edguez-henr\u00edquez","key":"ref9"},{"key":"ref20","first-page":"31","article-title":"NPCR and UACI rendomness tests for image encryption","author":"wu","year":"2011","journal-title":"IEEE Journal of Selected Areas in Telecommunications"},{"key":"ref22","article-title":"Recommendation for pair-wise key establishment schemes using integer factorization cryptography","author":"barker","year":"2014","journal-title":"NIST Special Publication 80055 Revision 1"},{"key":"ref21","article-title":"Recommendation for pairwise key establishment schemes using discrtete logarithm cryptography","author":"barker","year":"2013","journal-title":"NIST Special Publication 800&#x2013;56 A Revision 2"}],"event":{"name":"2016 International Conference on Electronics, Communications and Computers (CONIELECOMP)","start":{"date-parts":[[2016,2,24]]},"location":"Cholula","end":{"date-parts":[[2016,2,26]]}},"container-title":["2016 International Conference on Electronics, Communications and Computers (CONIELECOMP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7434514\/7438533\/07438556.pdf?arnumber=7438556","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,23]],"date-time":"2016-09-23T16:02:42Z","timestamp":1474646562000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7438556\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/conielecomp.2016.7438556","relation":{},"subject":[],"published":{"date-parts":[[2016,2]]}}}