{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T03:51:53Z","timestamp":1773546713777,"version":"3.50.1"},"reference-count":60,"publisher":"Association for Computing Machinery (ACM)","issue":"3","funder":[{"name":"Liaoning Provincial Science and Technology Plan Joint Project","award":["2024-MSLH-033"],"award-info":[{"award-number":["2024-MSLH-033"]}]},{"name":"Technological innovation projects in the field of artificial intelligence in Liaoning province","award":["2023JH26\/10300011"],"award-info":[{"award-number":["2023JH26\/10300011"]}]},{"name":"Basic scientific research projects in department of education of Liaoning Province","award":["LJ212410152049"],"award-info":[{"award-number":["LJ212410152049"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62571079"],"award-info":[{"award-number":["62571079"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2026,3,31]]},"abstract":"<jats:p>To solve the problem of resource consumption and information security during color image transmission, multiple color images encryption scheme according to a three-dimensional discrete chaotic map with pseudo-random number signal generator and discrete wavelet transform (DWT) compression is proposed. Firstly, dynamics of three-dimensional discrete chaotic map is analyzed and found to provide better randomness for encryption schemes. Next, multiple color images of different sizes are compressed to 1\/4 of the original size after DWT processing. The multiple compressed images are merged into a plaintext cube, and the plaintext parameters associated with the cube are generated. The generated plaintext parameters are combined with the chaotic map to form the key. A series of sequences are generated by iteration for image confusion and diffusion to get cipher images. The final simulation results show that recovered plaintext image is still clearly visible even with lossy DWT compression. The security analysis results indicate that this scheme has high level of security protection for color images.<\/jats:p>","DOI":"10.1145\/3769123","type":"journal-article","created":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T14:20:38Z","timestamp":1761229238000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Multi-Image Encryption Scheme Based on Chaotic Pseudo-Random Signal Generator and DWT Compression"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-2274-8012","authenticated-orcid":false,"given":"Yidan","family":"Xu","sequence":"first","affiliation":[{"name":"Dalian Polytechnic University, Dalian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5790-7429","authenticated-orcid":false,"given":"Suo","family":"Gao","sequence":"additional","affiliation":[{"name":"Dalian Polytechnic University, Dalian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6154-8107","authenticated-orcid":false,"given":"Yinghong","family":"Cao","sequence":"additional","affiliation":[{"name":"Dalian Polytechnic University, Dalian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7774-2833","authenticated-orcid":false,"given":"Jun","family":"Mou","sequence":"additional","affiliation":[{"name":"Dalian Polytechnic University, Dalian, China"}]}],"member":"320","published-online":{"date-parts":[[2026,2,27]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3570165"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127424501852"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.114466"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13132647"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ad6f79"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.3390\/math12131990"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3204753"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2022.127901"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-024-09384-3"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123190"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.3390\/fractalfract9070426"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2024.3510355"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1063\/5.0270220"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2025.3545868"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3540097"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2023.3267785"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13348-3"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2024.04.012"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15171-w"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.115020"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.12.048"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1049\/ipr2.12429"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122030"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2025.102399"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.125854"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11431-024-2678-7"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ad3bf4"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972296"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.3390\/e25081147"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2024.3415415"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3278310"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124891"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.114113"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2022.09.004"},{"issue":"5","key":"e_1_3_1_36_2","first-page":"2824","article-title":"Discrete second-order memristor and its application to chaotic map","volume":"71","author":"Mou Jun","year":"2024","unstructured":"Jun Mou, Zhitang Han, Yinghong Cao, and Santo Banerjee. 2024. Discrete second-order memristor and its application to chaotic map. IEEE Transactions on Circuits and Systems II: Express Briefs 71, 5 (2024), 2824\u20132828.","journal-title":"IEEE Transactions on Circuits and Systems II: Express Briefs"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2024.3355120"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asr.2021.01.018"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3633459"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2008-2"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3708546"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-024-06624-6"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13640-017-0216-z"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-024-09521-y"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/ad1c5b"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.3390\/fractalfract7060474"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2021.116246"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-20145-3"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.03.032"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.07.049"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.115361"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cjph.2024.07.035"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.3390\/e27030276"},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117709"},{"key":"e_1_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2025.3567878"},{"key":"e_1_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.3390\/math13050726"},{"key":"e_1_3_1_57_2","first-page":"1","article-title":"Privacy image secrecy scheme based on Chaos-Driven fractal sorting matrix and Fibonacci Q-Matrix","author":"Yunlong Liao","year":"2025","unstructured":"Liao Yunlong, Lin Yiting, Xing Zheng, and Yuan Xiaochen. 2025. Privacy image secrecy scheme based on Chaos-Driven fractal sorting matrix and Fibonacci Q-Matrix. The Visual Computer (2025), 1\u201311.","journal-title":"The Visual Computer"},{"key":"e_1_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1364\/OL.566608"},{"key":"e_1_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08835-4"},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2021.107073"},{"key":"e_1_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-024-09292-6"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3769123","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T03:48:11Z","timestamp":1773546491000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3769123"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,27]]},"references-count":60,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,3,31]]}},"alternative-id":["10.1145\/3769123"],"URL":"https:\/\/doi.org\/10.1145\/3769123","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,27]]},"assertion":[{"value":"2025-07-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-11","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-02-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}