{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T22:18:06Z","timestamp":1767651486428,"version":"3.37.3"},"reference-count":30,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,4,9]],"date-time":"2021-04-09T00:00:00Z","timestamp":1617926400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572089","BYJS202003","QianKeHeJiChu[2020]1Y422","2020ZD006"],"award-info":[{"award-number":["61572089","BYJS202003","QianKeHeJiChu[2020]1Y422","2020ZD006"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004502","name":"Chongqing University of Posts and Telecommunications","doi-asserted-by":"publisher","award":["61572089","BYJS202003","QianKeHeJiChu[2020]1Y422","2020ZD006"],"award-info":[{"award-number":["61572089","BYJS202003","QianKeHeJiChu[2020]1Y422","2020ZD006"]}],"id":[{"id":"10.13039\/501100004502","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Foundation Project of Guizhou Province","award":["61572089","BYJS202003","QianKeHeJiChu[2020]1Y422","2020ZD006"],"award-info":[{"award-number":["61572089","BYJS202003","QianKeHeJiChu[2020]1Y422","2020ZD006"]}]},{"name":"Key Project Research Achievements of Guizhou Education University in 2020","award":["61572089","BYJS202003","QianKeHeJiChu[2020]1Y422","2020ZD006"],"award-info":[{"award-number":["61572089","BYJS202003","QianKeHeJiChu[2020]1Y422","2020ZD006"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,4,9]]},"abstract":"<jats:p>The digital image, as the critical component of information transmission and storage, has been widely used in the fields of big data, cloud and frog computing, Internet of things, and so on. Due to large amounts of private information in the digital image, the image protection is fairly essential, and the designing of the encryption image scheme has become a hot issue in recent years. In this paper, to resolve the shortcoming that the probability density distribution (PDD) of the chaotic sequences generated in the original two-dimensional coupled map lattice (2D CML) model is uneven, we firstly proposed an improved 2D CML model according to adding the offsets for each node after every iteration of the original model, which possesses much better chaotic performance than the original one, and also its chaotic sequences become uniform. Based on the improved 2D CML model, we designed a compressive image encryption scheme. Under the condition of different keys, the uniform chaotic sequences generated by the improved 2D CML model are utilized for compressing, confusing, and diffusing, respectively. Meanwhile, the message authentication code (MAC) is employed for guaranteeing that the encryption image be integration. Finally, theoretical analysis and simulation tests both demonstrate that the proposed image encryption scheme owns outstanding statistical, well encryption performance, and high security. It has great potential for ensuring the digital image security in application.<\/jats:p>","DOI":"10.1155\/2021\/6625579","type":"journal-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T19:50:10Z","timestamp":1618084210000},"page":"1-21","source":"Crossref","is-referenced-by-count":6,"title":["A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7591-7775","authenticated-orcid":true,"given":"Zhuo","family":"Liu","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"},{"name":"School of Mathematics and Big Data, Guizhou Education University, Guiyang 550018, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5247-043X","authenticated-orcid":true,"given":"Yong","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9330-2662","authenticated-orcid":true,"given":"Leo Yu","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Victoria 3216, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6127-000X","authenticated-orcid":true,"given":"Jun","family":"Ma","sequence":"additional","affiliation":[{"name":"Department of Physics, Lanzhou University of Technology, Lanzhou 730050, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1364\/aop.1.000589"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.024"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.01.070"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1142\/s0218127420502338"},{"issue":"6","key":"5","article-title":"Multi-image encryption algorithm based on hyper-chaotic system","volume":"32","author":"Y. J. Xian","year":"2020","journal-title":"Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1002\/jor.23445"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.foodchem.2020.127101"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2020.107746","article-title":"Single-pixel compressive imaging based on random DoG filtering","volume":"178","author":"M. Abedi","year":"2021","journal-title":"Signal Process."},{"key":"9","article-title":"Image encryption and hiding algorithm based on compressive sensing and random numbers insertion","volume":"172","author":"G. D. Ye","year":"2020","journal-title":"Signal Process."},{"key":"10","doi-asserted-by":"publisher","DOI":"10.3390\/s20185162"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4071"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7405-y"},{"issue":"9","key":"13","first-page":"534","article-title":"Pseudo-random number generators and chaos","volume":"65","author":"S. Oishi","year":"1982","journal-title":"IEICE Transactions (1976\u20131990)"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-020-05804-2"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2020.125039"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3577-z"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2008-2"},{"key":"18","article-title":"Color image compression and encryption scheme based on compressive sensing and double random encryption strategy","volume":"176","author":"X. L. Chai","year":"2020","journal-title":"Signal Process"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7642-0"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(89)90227-3"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2488-0"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2006.885507"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1103\/physreve.56.4009"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.3390\/e20070535"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2015.09.014"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.03.011"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3064-9"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.3390\/e20040282"},{"key":"29","first-page":"6429","article-title":"A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps","volume":"5","author":"X. Wu","year":"2017","journal-title":"IEEE Access"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6346-1"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6625579.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6625579.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6625579.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T19:50:20Z","timestamp":1618084220000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/6625579\/"}},"subtitle":[],"editor":[{"given":"David","family":"Megias","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,4,9]]},"references-count":30,"alternative-id":["6625579","6625579"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6625579","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,4,9]]}}}