{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:16:54Z","timestamp":1771658214826,"version":"3.50.1"},"reference-count":32,"publisher":"Zhejiang University Press","issue":"6","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front Inform Technol Electron Eng"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1631\/fitee.2400721","type":"journal-article","created":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T01:35:56Z","timestamp":1751333756000},"page":"847-861","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["SPJEU: a self-sufficient plaintext-related JPEG image encryption scheme based on a unified key","SPJEU: \u4e00\u79cd\u57fa\u4e8e\u7edf\u4e00\u5bc6\u94a5\u81ea\u7ed9\u81ea\u8db3\u7684\u5173\u8054\u660e\u6587JPEG\u56fe\u50cf\u52a0\u5bc6\u65b9\u6848"],"prefix":"10.1631","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3385-8364","authenticated-orcid":false,"given":"Ming","family":"Li","sequence":"first","affiliation":[]},{"given":"Wenwen","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Mengdie","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8183-8435","authenticated-orcid":false,"given":"Yushu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2025,7,1]]},"reference":[{"key":"ref1","volume-title":"A novel pseudo-random number generator based on multi-objective optimization for image-cryptographic applications","author":"Haider","year":"2023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/tmm.2018.2817065"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2018.2882850"},{"key":"ref4","first-page":"1","article-title":"Robust and secure image encryption schemes during JPEG compression process","volume-title":"Proc IS&T Int Symp on Electronic Imaging: Imaging and Multimedia Analytics in a Web and Mobile World","author":"He","year":"2016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2022.3208030"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.111989"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2017.01.021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/tmm.2017.2786860"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.11.018"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2019.0276"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2016.04.018"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/00207160701294376"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tcsi.2016.2598822"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/icip.2012.6466845"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2020.2990952"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/e21080815"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2014.11.008"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/tmm.2014.2316154"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2016.2634161"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2018.2797897"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/tmm.2022.3148591"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2021.3069811"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/itact.2015.7492652"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1364\/ol.20.000767"},{"key":"ref25","first-page":"4559","article-title":"Format-compliant perceptual encryption method for JPEG XT","volume-title":"Proc IEEE Int Conf on Image Processing","author":"Ting","year":"2019"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.06.010"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/tcsi.2022.3172116"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"102587","DOI":"10.1016\/j.dsp.2019.102587","article-title":"One-to-many image en-cryption with privacy-preserving homomorphic outsourced decryption based on compressed sensing","volume":"95","author":"Xie","year":"2019","journal-title":"Dig Signal Process"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.03.001"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103722"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.03.054"},{"key":"ref32","first-page":"461","article-title":"An ACP-based approach to color image encryption using DNA sequence operation and hyper-chaotic system","volume-title":"Proc IEEE Int Conf on Systems, Man, and Cybernetics","author":"Zheng","year":"2017"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2400721.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1631\/FITEE.2400721\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2400721.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:53:22Z","timestamp":1771656802000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1631\/FITEE.2400721"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":32,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["721"],"URL":"https:\/\/doi.org\/10.1631\/fitee.2400721","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6]]},"assertion":[{"value":"18 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"All the authors declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}