{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:46:43Z","timestamp":1777704403127,"version":"3.51.4"},"reference-count":17,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2018,7,26]],"date-time":"2018-07-26T00:00:00Z","timestamp":1532563200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2018,10,27]]},"abstract":"<jats:p>At present, special domain image encryption and compression algorithms have problems such as poor encryption and image compression, long time consuming of encryption and compression, and no guarantee of image compression quality. In this regard, this paper proposes an encryption and compression algorithm for spatial domain image selection based on hyperchaotic system. The hyperchaotic Chen system is selected to decompose the dynamics of the hyperchaotic system. The decomposition result is replaced by image scrambling, and the chaotic sequence output from the hyperchaotic Chen system is preprocessed. The two groups of sequences are used to complete the image scrambling so that the image is encrypted for the first time. The discrete cosine basis is applied to make sparse representation of the original image after scrambling. The partial Hadamard matrix, which is controlled by the Logistic chaotic map, is used as the measurement matrix in the compressed sensing, and the two-dimensional projection measurement of the image is done to complete the image compression. The hyperchaotic Chen system is used to cyclically shift the projection results to change the pixel value of the image, and the final cipher image is obtained. The experimental results show that the algorithm anti-attack coefficient is 0.99, the average compression time is 7 s, and the compressed image has high resolution and strong confidentiality. The proposed algorithm is superior to the current algorithm in security and other performance, and can provide support for this field.<\/jats:p>","DOI":"10.3233\/jifs-169753","type":"journal-article","created":{"date-parts":[[2018,7,27]],"date-time":"2018-07-27T19:26:29Z","timestamp":1532719589000},"page":"4329-4337","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":2,"title":["Research on image selective encryption and compression algorithm under hyperchaotic system"],"prefix":"10.1177","volume":"35","author":[{"given":"Hua","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Information Engineering, Zhengzhou Institute of Technology, Zhengzhou, China"}]},{"given":"S.V.","family":"Wilke","sequence":"additional","affiliation":[{"name":"St Petersburg State University, Theodosius Dobzhansky Center Genome Bioinformation, St Petersburg, Russia"}]}],"member":"179","published-online":{"date-parts":[[2018,7,26]]},"reference":[{"key":"e_1_3_2_2_2","first-page":"103","article-title":"Application of 16 bit image lossy compression based on the JPEG standard","volume":"32","author":"Xu N.N.","year":"2016","unstructured":"XuN.N. and LiC.G., Application of 16 bit image lossy compression based on the JPEG standard, Telecommunications Science32 (2016), 103\u2013108.","journal-title":"Telecommunications Science"},{"key":"e_1_3_2_3_2","first-page":"50","article-title":"Reversible data hiding in encrypted images based on lossless compression","volume":"39","author":"Zheng S.L.","year":"2016","unstructured":"ZhengS.L., CaoM., HuD.H., et al.,Reversible data hiding in encrypted images based on lossless compression, Journal of Hefei University of Technology(Natural Science)39 (2016), 50\u201355.","journal-title":"Journal of Hefei University of Technology(Natural Science)"},{"key":"e_1_3_2_4_2","first-page":"2804","article-title":"Robust JPEG compression image encryption algorithm with information embedding feature","volume":"33","author":"Guo H.","year":"2016","unstructured":"GuoH., HeJ., and LiL., Robust JPEG compression image encryption algorithm with information embedding feature, Application Research of Computers33 (2016), 2804\u20132809.","journal-title":"Application Research of Computers"},{"issue":"3","key":"e_1_3_2_5_2","first-page":"38","article-title":"A new multiple-image encryption method based on compressive sensing","volume":"37","author":"Wang M.T.","year":"2016","unstructured":"WangM.T., ZhouX., HuY.J., et al.,A new multiple-image encryption method based on compressive sensing, Laser Journal37(3) (2016), 38\u201341.","journal-title":"Laser Journal"},{"key":"e_1_3_2_6_2","first-page":"317","article-title":"Lossy image compression using SVD and contourlet transform","volume":"34","author":"Chen Y.X.","year":"2017","unstructured":"ChenY.X., HuangZ.C. and FengL., Lossy image compression using SVD and contourlet transform, Application Research of Computers34 (2017), 317\u2013320.","journal-title":"Application Research of Computers"},{"key":"e_1_3_2_7_2","first-page":"1838","article-title":"Image compression algorithm based on wavelet transform and HVS","volume":"30","author":"Hui Q.J.","year":"2016","unstructured":"HuiQ.J., LiH.A. and LuY., Image compression algorithm based on wavelet transform and HVS, Journal of Electronic Measurement and Instrumentation30 (2016), 1838\u20131844.","journal-title":"Journal of Electronic Measurement and Instrumentation"},{"key":"e_1_3_2_8_2","first-page":"267","article-title":"Multispectral image compression based on uniting KL transform and wavelet transform","volume":"45","author":"Ji Q.","year":"2016","unstructured":"JiQ., ShiW.X., TianM., et al.,Multispectral image compression based on uniting KL transform and wavelet transform, Infrared and Laser Engineering45 (2016), 267\u2013273.","journal-title":"Infrared and Laser Engineering"},{"key":"e_1_3_2_9_2","first-page":"281","article-title":"Image compression method based on sparse representation of classified redundant dictionary","volume":"43","author":"Wang K.P.","year":"2017","unstructured":"WangK.P., YangZ.Y. and EnD., Image compression method based on sparse representation of classified redundant dictionary, Computer Engineering43 (2017), 281\u2013287.","journal-title":"Computer Engineering"},{"key":"e_1_3_2_10_2","first-page":"706","article-title":"The medical image compression method based on fuzzy C-mean clustering","volume":"23","author":"Mu K.","year":"2016","unstructured":"MuK. and LiW.N., The medical image compression method based on fuzzy C-mean clustering, Control Engineering of China23 (2016), 706\u2013710.","journal-title":"Control Engineering of China"},{"issue":"1","key":"e_1_3_2_11_2","first-page":"89","article-title":"Ridit and exponential type scores for estimating the kappa statistic","volume":"45","author":"Yilmaz A.E.","year":"2018","unstructured":"YilmazA.E. and AktasS., Ridit and exponential type scores for estimating the kappa statistic, Kuwait Journal of Science45(1) (2018), 89\u201399.","journal-title":"Kuwait Journal of Science"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsps.2017.04.027"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2014.927639"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.3934\/dcdss.2018010"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sjbs.2016.09.010"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jallcom.2016.10.188"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.21042\/AMNS.2017.2.00034"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.21042\/AMNS.2017.2.00038"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169753","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169753","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:41:08Z","timestamp":1777455668000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169753"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,26]]},"references-count":17,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,10,27]]}},"alternative-id":["10.3233\/JIFS-169753"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169753","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,26]]}}}