{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T01:49:12Z","timestamp":1764812952710,"version":"3.37.3"},"reference-count":31,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,12,29]],"date-time":"2020-12-29T00:00:00Z","timestamp":1609200000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972051","62032002","20IRTSTHN013","LNCT2019-A04","2018GGJS058"],"award-info":[{"award-number":["61972051","62032002","20IRTSTHN013","LNCT2019-A04","2018GGJS058"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Support Plan of Scientific and Technological Innovation Team in Universities of Henan Province","award":["61972051","62032002","20IRTSTHN013","LNCT2019-A04","2018GGJS058"],"award-info":[{"award-number":["61972051","62032002","20IRTSTHN013","LNCT2019-A04","2018GGJS058"]}]},{"name":"Henan Key Laboratory of Network Cryptography Technology","award":["61972051","62032002","20IRTSTHN013","LNCT2019-A04","2018GGJS058"],"award-info":[{"award-number":["61972051","62032002","20IRTSTHN013","LNCT2019-A04","2018GGJS058"]}]},{"name":"Research Foundation of Young Core Instructor in Henan Province","award":["61972051","62032002","20IRTSTHN013","LNCT2019-A04","2018GGJS058"],"award-info":[{"award-number":["61972051","62032002","20IRTSTHN013","LNCT2019-A04","2018GGJS058"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,12,29]]},"abstract":"<jats:p>The rapid development of the Internet leads to a surge in the amount of information transmission and brings many security problems. For multimedia information transmission, especially digital images, it is necessary to compress and encrypt at the same time. The emergence of compressive sensing solves this problem. Compressive sensing can compress and encrypt at the same time, which can not only reduce the transmission bandwidth of the network but also improve the security of the system. However, when using compressive sensing encryption, the whole measurement matrix needs to be stored, and the compressive sensing can be combined with a chaotic system, so only the generation parameters of the matrix need to be stored, and the security of the system can be further improved by using the sensitivity of the chaotic system. This paper introduces a secure and efficient image compression-encryption scheme using a new chaotic structure and compressive sensing. The chaotic map used in the scheme is generated by our new and universal chaotic structure, which not only expands the chaotic range of the chaotic system but also improves the performance of the chaotic system. After analyzing the performance comparison of traditional one-dimensional chaotic maps and some existing methods, the image compression-encryption scheme based on a new chaotic structure and compressive sensing has a good encryption effect and large keyspace, which can resist brute force attack and statistical attack.<\/jats:p>","DOI":"10.1155\/2020\/6665702","type":"journal-article","created":{"date-parts":[[2020,12,30]],"date-time":"2020-12-30T01:35:12Z","timestamp":1609292112000},"page":"1-15","source":"Crossref","is-referenced-by-count":13,"title":["Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing"],"prefix":"10.1155","volume":"2020","author":[{"given":"Yongli","family":"Tang","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo 454003, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6911-7990","authenticated-orcid":true,"given":"Mingjie","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo 454003, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8541-308X","authenticated-orcid":true,"given":"Lixiang","family":"Li","sequence":"additional","affiliation":[{"name":"Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunication, Beijing 100876, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.02.036"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2014.11.017"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2006.871582"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2005.862083"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/tcsii.2017.2721972"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2004.09.035"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2015.11.017"},{"issue":"2","key":"8","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1109\/TCSII.2010.2040315","article-title":"Simultaneous arithmetic coding and encryption using chaotic maps","volume":"57","author":"K. W. Wong","year":"2010","journal-title":"IEEE Transactions on Circuits and Systems II: Express Briefs"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/tcsii.2017.2709347"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2015.10.004"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.11.095"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/tcsi.2014.2365767"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2010.04.056"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/tbcas.2017.2665659"},{"key":"15","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1016\/j.sigpro.2018.10.001","article-title":"A visually secure image encryption scheme based on parallel compressive sensing","volume":"155","author":"H. Wang","year":"2017","journal-title":"Signal Processing"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.02.007"},{"issue":"9","key":"17","doi-asserted-by":"crossref","first-page":"12027","DOI":"10.1007\/s11042-018-6739-1","article-title":"A novel bit-level color image encryption using improved 1D chaotic map","volume":"78","author":"P. Chanil","year":"2019","journal-title":"Multimedia Tools and Applications"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/tcsii.2018.2865255"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.04.021"},{"first-page":"24","article-title":"The analyses of an improved 2-order Chebyshev chaotic sequence","author":"X. Li","key":"20"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5378-2"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2006.885507"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2011.12.006"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s10957-014-0581-z"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0437847100"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2009.5"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2004.834793"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/78.258082"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2007.909108"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2011.2173241"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.acha.2008.07.002"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/6665702.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/6665702.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/6665702.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,30]],"date-time":"2020-12-30T01:35:20Z","timestamp":1609292120000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/6665702\/"}},"subtitle":[],"editor":[{"given":"Lingwei","family":"Xu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,12,29]]},"references-count":31,"alternative-id":["6665702","6665702"],"URL":"https:\/\/doi.org\/10.1155\/2020\/6665702","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2020,12,29]]}}}