{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:26:10Z","timestamp":1730222770291,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/fskd.2017.8393183","type":"proceedings-article","created":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T22:38:33Z","timestamp":1531780713000},"page":"2584-2589","source":"Crossref","is-referenced-by-count":0,"title":["A novel image encryption algorithm based on the analysis sparse representation and double random phase encoding"],"prefix":"10.1109","author":[{"given":"Biao","family":"Xu","sequence":"first","affiliation":[]},{"given":"Peng","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Ye","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"472","volume":"51","author":"zhang","year":"2013","journal-title":"Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform Optics & Lasers in Engineering"},{"key":"ref11","volume":"15","author":"tao","year":"2007","journal-title":"Double image encryption based on random phase encoding in the fractional Fourier domain Optics Express"},{"journal-title":"A Two-dimensional Mapping with a Strange Attractor The Theory of Chaotic Attractors","year":"1976","author":"hnon","key":"ref12"},{"key":"ref13","first-page":"1112","volume":"52","author":"fang","year":"2016","journal-title":"Blind source separation using analysis sparse constraint Electronics Letters"},{"key":"ref14","first-page":"661","volume":"61","author":"rubinstein","year":"2013","journal-title":"Analysis K-SVD A Dictionary-Learning Algorithm for the Analysis Sparse Model IEEE Transactions on Signal Processing"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6289144"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1137\/090753504","volume":"8","author":"cai","year":"0","journal-title":"Split Bregman Methods and Frame Based Image Restoration Siam Journal on Multiscale Modeling & Simulation"},{"key":"ref17","first-page":"152","volume":"47","author":"liu","year":"2013","journal-title":"Double image encryption scheme by using random phase encoding and pixel exchanging in the gyrator transform domains Optics & Laser Technology"},{"key":"ref4","first-page":"562","volume":"285","author":"wang","year":"2012","journal-title":"A new image encryption algorithm based on chaos Optics Communications"},{"key":"ref3","first-page":"514","volume":"11","author":"wang","year":"2011","journal-title":"A new chaos-based fast image encryption algorithm Applied Soft Computing"},{"key":"ref6","first-page":"74","volume":"19","author":"zhang","year":"2014","journal-title":"An image encryption scheme based on rotation matrix bit-level permutation and block diffusion Communications in Nonlinear Science & Numerical Simulation"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"3653","DOI":"10.1016\/j.cnsns.2014.03.016","volume":"19","author":"zhang","year":"2014","journal-title":"A chaotic image encryption scheme owning temp-value feedback Communications in Nonlinear Science & Numerical Simulation"},{"key":"ref8","first-page":"10253","volume":"15","author":"frauel","year":"2007","journal-title":"Resistance of the double random phase encryption against various attacks Optics Express"},{"key":"ref7","first-page":"767","volume":"20","author":"refregier","year":"1995","journal-title":"Optical image encryption based on input plane and Fourier plane random encoding Opt Lett"},{"key":"ref2","first-page":"324","volume":"275","author":"liu","year":"2007","journal-title":"Double image encryption based on iterative fractional Fourier transform Optics Communications"},{"key":"ref1","first-page":"299","article-title":"A Novel Image Encryption Scheme Using Chaos and Hybrid Cellular Automata","volume":"25","author":"hanis","year":"2016","journal-title":"International Journal of Innovative Research in Science"},{"key":"ref9","first-page":"2629","volume":"56","author":"xiang","year":"2007","journal-title":"Ciphertext only Attack on Double Random Phase Encoding Optical Encryption System"}],"event":{"name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","start":{"date-parts":[[2017,7,29]]},"location":"Guilin","end":{"date-parts":[[2017,7,31]]}},"container-title":["2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8384043\/8392854\/08393183.pdf?arnumber=8393183","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T22:53:48Z","timestamp":1598223228000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8393183\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/fskd.2017.8393183","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}