{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:44:10Z","timestamp":1740149050423,"version":"3.37.3"},"reference-count":44,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,12,3]],"date-time":"2020-12-03T00:00:00Z","timestamp":1606953600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61961022","2020BAB202022"],"award-info":[{"award-number":["61961022","2020BAB202022"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004479","name":"Natural Science Foundation of Jiangxi Province","doi-asserted-by":"publisher","award":["61961022","2020BAB202022"],"award-info":[{"award-number":["61961022","2020BAB202022"]}],"id":[{"id":"10.13039\/501100004479","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,12,3]]},"abstract":"<jats:p>Cloud platforms provide a good stage for storing and sharing big image data for users, although some privacy issues arise. Image encryption technology can prevent privacy leakage and can ensure secure image data sharing on cloud platforms. Hence, in this paper, an unequal encryption scheme based on saliency detection is proposed. First, based on the mechanism of visual perception and the theory of feature integration, the visual attention model is employed to realize the recognition of significant regions and insignificant regions. Then, a dynamic DNA encryption algorithm is proposed to exploit heavyweight encryption for significant regions, while semi-tensor product compressed sensing is introduced to exploit lightweight encryption and compression for insignificant regions. Experimental results demonstrate that the proposed framework can serve to secure big image data services.<\/jats:p>","DOI":"10.1155\/2020\/8842376","type":"journal-article","created":{"date-parts":[[2020,12,4]],"date-time":"2020-12-04T00:35:47Z","timestamp":1607042147000},"page":"1-13","source":"Crossref","is-referenced-by-count":0,"title":["An Unequal Image Privacy Protection Method Based on Saliency Detection"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6754-5115","authenticated-orcid":true,"given":"Rongxin","family":"Tu","sequence":"first","affiliation":[{"name":"School of Information Management, Jiangxi University of Finance and Economics, Nanchang 330013, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3098-4640","authenticated-orcid":true,"given":"Wenying","family":"Wen","sequence":"additional","affiliation":[{"name":"School of Information Management, Jiangxi University of Finance and Economics, Nanchang 330013, China"}]},{"given":"Changsheng","family":"Hua","sequence":"additional","affiliation":[{"name":"School of Information Management, Jiangxi University of Finance and Economics, Nanchang 330013, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2957404"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.09.029"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/4195852"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-017-1612-0"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8402578"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2019.105816"},{"key":"7","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1016\/j.dsp.2012.02.005","article-title":"Selective image encryption based on pixels of interest and singular value decomposition","volume":"22","author":"B. Gaurav","year":"2012","journal-title":"Digital Signal Processing"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1142\/s0218127418500104"},{"key":"9","article-title":"Video frames encryption based on DNA sequences and chaos. Eleventh international conference on digital image processing (ICDIP 2019)","volume":"11179","author":"W. Wen","year":"2019","journal-title":"International Society for Optics and Photonics"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2014.12.026"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2490-6"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/5935292"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2013.04.029"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.03.019"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-018-4391-y"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2018.11.017"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.07.034"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2019.2904793"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2018.03.011"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107563"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2019.105837"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1142\/s021812749800098x"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.06.049"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.01.017"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.10.004"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.10.034"},{"first-page":"1","article-title":"Multi wings chaotic encryption for physical layer security in optical PAM4-DMT System","author":"Y. Chen","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.12.008"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107484"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2020.2966511"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8275074"},{"first-page":"813","article-title":"The secrecy of compressed sensing measurements","author":"Y. Rachlin","key":"32"},{"key":"33","doi-asserted-by":"crossref","first-page":"3442","DOI":"10.1109\/JIOT.2017.2781737","article-title":"Low-cost and confidentiality-preserving data acquisition for internet of multimedia things","volume":"5","author":"Y. Zhang","year":"2017","journal-title":"IEEE Internet of Things Journal"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/tbcas.2017.2665659"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2015.12.006"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/34.730558"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2012.2199126"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107580"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8316194"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1142\/s0218127416501911"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-019-05378-8"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2924083"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1007\/s11045-018-0589-x"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1142\/s0218127406015970"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8842376.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8842376.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8842376.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,4]],"date-time":"2020-12-04T00:35:52Z","timestamp":1607042152000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8842376\/"}},"subtitle":[],"editor":[{"given":"Guodong","family":"Ye","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,12,3]]},"references-count":44,"alternative-id":["8842376","8842376"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8842376","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2020,12,3]]}}}