{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T17:13:21Z","timestamp":1765041201510,"version":"3.41.2"},"reference-count":53,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,11,25]],"date-time":"2021-11-25T00:00:00Z","timestamp":1637798400000},"content-version":"vor","delay-in-days":328,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100009950","name":"Ministry of Education","doi-asserted-by":"publisher","award":["2018A0105"],"award-info":[{"award-number":["2018A0105"]}],"id":[{"id":"10.13039\/100009950","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>The application of multimedia sensors is widespread, and people need to transmit images more securely and efficiently. In this paper, an image transmission scheme based on two chaotic maps is proposed. The proposed scheme consists of two parts, secure image transmission between sensor nodes and sink nodes (SIT\u2010SS) and secure image transmission between sensor nodes and receivers (SIT\u2010SR). For resource\u2010constrained environments, SIT\u2010SS utilizes Tent\u2010Logistic Map (TLM) to generate chaotic sequences and adopts TLM\u2010Driven permutation and transformation to confuse image pixels. Then the cipher image is obtained through TLM\u2010Driven two\u2010dimensional compressed sensing. Compared with existing schemes, the secret key design of SIT\u2010SS is more reasonable and requires fewer hardware resources. When sampling ratio is greater than 0.6, its image reconstruction quality has obvious advantages. For environments with huge security threats, SIT\u2010SR adopts dynamic permutation and confusion based on discrete logarithms to confuse the image and exploits dynamic diffusion based on discrete logarithms to generate final cipher image. Similarly, compared with some existing schemes, the design of SIT\u2010SR is more practical, and the statistical characteristics of the cipher image are better. Finally, extensive simulation tests confirm the superiority of the proposed scheme.<\/jats:p>","DOI":"10.1155\/2021\/1898998","type":"journal-article","created":{"date-parts":[[2021,11,25]],"date-time":"2021-11-25T21:20:13Z","timestamp":1637875213000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["A Secure and Efficient Image Transmission Scheme Based on Two Chaotic Maps"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3023-5225","authenticated-orcid":false,"given":"Wei","family":"Feng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9834-081X","authenticated-orcid":false,"given":"Jing","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1309-0917","authenticated-orcid":false,"given":"Zhentao","family":"Qin","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,11,25]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2878943"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2017.2781737"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102361"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2953519"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2844727"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/tmm.2019.2923111"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2881129"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2021.108019"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3070348"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2019.2897839"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2957404"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.3014489"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.03.010"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2959137"},{"key":"e_1_2_10_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102844"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2016.12.007"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-1070-x"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127418500475"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.02.041"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2017.04.009"},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-017-3436-y"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.10.027"},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.3390\/e21060577"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.3390\/e21070656"},{"key":"e_1_2_10_25_2","doi-asserted-by":"publisher","DOI":"10.3390\/e21080790"},{"key":"e_1_2_10_26_2","doi-asserted-by":"publisher","DOI":"10.3390\/e22101091"},{"key":"e_1_2_10_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102854"},{"key":"e_1_2_10_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2021.108220"},{"key":"e_1_2_10_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2005.862083"},{"key":"e_1_2_10_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2006.871582"},{"key":"e_1_2_10_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2020.3008914"},{"key":"e_1_2_10_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2966511"},{"key":"e_1_2_10_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/tmm.2016.2581593"},{"key":"e_1_2_10_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2924083"},{"key":"e_1_2_10_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2886841"},{"key":"e_1_2_10_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2018.12.012"},{"key":"e_1_2_10_37_2","doi-asserted-by":"publisher","DOI":"10.3390\/app10175909"},{"key":"e_1_2_10_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcyb.2014.2363168"},{"key":"e_1_2_10_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.01.002"},{"key":"e_1_2_10_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.03.039"},{"key":"e_1_2_10_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2883690"},{"key":"e_1_2_10_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2893760"},{"key":"e_1_2_10_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2018.2880590"},{"key":"e_1_2_10_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2682561"},{"key":"e_1_2_10_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2867111"},{"key":"e_1_2_10_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/mmul.2017.3051512"},{"key":"e_1_2_10_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2018.2873472"},{"key":"e_1_2_10_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/mmul.2018.112142439"},{"key":"e_1_2_10_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2015.2489178"},{"key":"e_1_2_10_50_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127406015970"},{"key":"e_1_2_10_51_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-018-4056-x"},{"key":"e_1_2_10_52_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.07.049"},{"key":"e_1_2_10_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812080"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/1898998.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/1898998.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/1898998","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T23:00:20Z","timestamp":1723244420000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/1898998"}},"subtitle":[],"editor":[{"given":"Ahmed A.","family":"Abd El-Latif","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":53,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/1898998"],"URL":"https:\/\/doi.org\/10.1155\/2021\/1898998","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"type":"print","value":"1076-2787"},{"type":"electronic","value":"1099-0526"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-07-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-11-02","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-11-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"1898998"}}