{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:10:02Z","timestamp":1763341802779,"version":"3.45.0"},"reference-count":45,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.062051","type":"journal-article","created":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T02:08:21Z","timestamp":1739758101000},"page":"2927-2946","source":"Crossref","is-referenced-by-count":0,"title":["Joint Watermarking and Encryption for Social Image Sharing"],"prefix":"10.32604","volume":"83","author":[{"given":"Conghuan","family":"Ye","sequence":"first","affiliation":[]},{"given":"Shenglong","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Shi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qiankun","family":"Zuo","sequence":"additional","affiliation":[]},{"given":"Bing","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"102103","DOI":"10.1016\/j.inffus.2023.102103","article-title":"Generation and detection of manipulated multimodal audiovisual content: advances, trends and open challenges","volume":"103","author":"Liz-L\u00f3pez","year":"2024","journal-title":"Inf Fusion"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"101932","DOI":"10.1016\/j.jksuci.2024.101932","article-title":"Encryption-then-embedding-based hybrid data hiding scheme for medical images","author":"Meng","year":"2024","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"125854","DOI":"10.1016\/j.eswa.2024.125854","article-title":"Secure medical image encryption scheme for Healthcare IoT using novel hyperchaotic map and DNA cubes","volume":"264","author":"Lai","year":"2025","journal-title":"Expert Syst Appl"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"2831","DOI":"10.1007\/s11071-024-10334-2","article-title":"A color image compression and encryption algorithm combining compressed sensing, Sudoku matrix, and hyperchaotic map","volume":"113","author":"Yao","year":"2025","journal-title":"Nonlinear Dyn"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"119036","DOI":"10.1016\/j.eswa.2022.119036","article-title":"Privacy-preserving and traceable federated learning for data sharing in industrial IoT applications","volume":"213","author":"Chen","year":"2023","journal-title":"Expert Syst Appl"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"115740","DOI":"10.1016\/j.chaos.2024.115740","article-title":"A memristive Ikeda map and its application in image encryption","volume":"190","author":"Wang","year":"2025","journal-title":"Chaos Soliton Fract"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"114650","DOI":"10.1016\/j.chaos.2024.114650","article-title":"Hua ZY: ND-CS: a circularly shifting chaotic map generation method","volume":"181","author":"Wu","year":"2024","journal-title":"Chaos Soliton Fract"},{"key":"ref8","article-title":"Two-dimensional coupled complex chaotic map","author":"Hua","year":"2024","journal-title":"IEEE Trans Ind Inform"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"106904","DOI":"10.1016\/j.neunet.2024.106904","article-title":"Multiscroll hopfield neural network with extreme multistability and its application in video encryption for IIoT","volume":"182","author":"Yu","year":"2025","journal-title":"Neural Netw"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"114361","DOI":"10.1016\/j.chaos.2023.114361","article-title":"A comprehensive survey on image encryption: taxonomy, challenges, and future directions","volume":"178","author":"SaberiKamarposhti","year":"2024","journal-title":"Chao Soliton Fract"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"121452","DOI":"10.1016\/j.eswa.2023.121452","article-title":"PSO-based image encryption scheme using modular integrated logistic exponential map","volume":"237","author":"Kocak","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"123583","DOI":"10.1016\/j.eswa.2024.123583","article-title":"Cross-channel color image encryption through 2D hyperchaotic hybrid map of optimization test functions","volume":"249","author":"Toktas","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"123190","DOI":"10.1016\/j.eswa.2024.123190","article-title":"Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption","volume":"246","author":"Feng","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref14","first-page":"103921","article-title":"Color image encryption algorithm based on hybrid chaos and layered strategies","volume":"89","author":"Huang","year":"2025","journal-title":"J Inf Secur Appl"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"3297","DOI":"10.3390\/math12203297","article-title":"Fast color image encryption algorithm based on DNA coding and multi-chaotic systems","volume":"12","author":"Wang","year":"2024","journal-title":"Mathematics"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"3917","DOI":"10.3390\/math12243917","article-title":"A novel multi-channel image encryption algorithm leveraging pixel reorganization and hyperchaotic maps","volume":"12","author":"Feng","year":"2024","journal-title":"Mathematics"},{"key":"ref17","first-page":"101612","article-title":"Optimal algorithm for color medical encryption and compression images based on DNA coding and a hyperchaotic system in the moments","volume":"50","author":"Bencherqui","year":"2024","journal-title":"Eng Sci Technol, Int J"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"125328","DOI":"10.1016\/j.eswa.2024.125328","article-title":"A new 2D cross hyperchaotic Sine-modulation-Logistic map and its application in bit-level image encryption","volume":"261","author":"Wang","year":"2025","journal-title":"Expert Syst Appl"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"115146","DOI":"10.1016\/j.chaos.2024.115146","article-title":"Unmanned ship image encryption method based on a new four-wing three-dimensional chaotic system and compressed sensing","volume":"185","author":"Yan","year":"2024","journal-title":"Chao Soliton Fract"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s10489-024-05918-9","article-title":"Novel discrete initial-boosted Tabu learning neuron: dynamical analysis, DSP implementation, and batch medical image encryption","volume":"55","author":"Zhang","year":"2025","journal-title":"Appl Intell"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"10360","DOI":"10.1007\/s10489-024-05613-9","article-title":"Chaotic image encryption based on partial face recognition and DNA diffusion","volume":"54","author":"Teng","year":"2024","journal-title":"Appl Intell"},{"key":"ref22","first-page":"2661","article-title":"An improved text-based and image-based CAPTCHA based on solving and response time","volume":"74","author":"Adesina","year":"2023","journal-title":"Comput Mater Contin"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"105530","DOI":"10.1016\/j.cageo.2024.105530","article-title":"Commutative encryption and watermarking algorithm based on compound chaotic systems and zero-watermarking for vector map","volume":"184","author":"Tan","year":"2024","journal-title":"Comput Geosci"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"109957","DOI":"10.1016\/j.optlastec.2023.109957","article-title":"Multi-images encryption and watermarking with small number of keys via computational ghost imaging","volume":"168","author":"Guan","year":"2024","journal-title":"Optics Laser Technol"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"050501","DOI":"10.1088\/1674-1056\/ad1c5b","article-title":"Novel self-embedding holographic watermarking image encryption protection scheme","volume":"33","author":"Wang","year":"2024","journal-title":"Chin Phys B"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"126853","DOI":"10.1016\/j.neucom.2023.126853","article-title":"GAN-based watermarking for encrypted images in healthcare scenarios","volume":"560","author":"Singh","year":"2023","journal-title":"Neurocomputing"},{"key":"ref27","first-page":"10","article-title":"Triple watermarking scheme for digital images","volume":"50","author":"Emmanuel Oluwatobi Asani","year":"2023","journal-title":"J Hunan Univ Nat Sci"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"6878","DOI":"10.1109\/JIOT.2023.3313812","article-title":"Multi-level privacy protection for social media based on 2D compressive sensing","volume":"11","author":"He","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"1105","DOI":"10.1109\/TCAD.2014.2307002","article-title":"Efficient and concurrent reliable realization of the secure cryptographic SHA-3 algorithm","volume":"33","author":"Bayat-Sarmadi","year":"2014","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"journal-title":"A new kind of science","year":"2002","author":"Wolfram","key":"ref30"},{"key":"ref31","unstructured":"Wolfram S. Theory and applications of cellular automata. 1986 [cited 2024 Dec 20]. https:\/\/www.amazon.com\/Applications-Cellular-Automata-INCLUDING-1983-1986\/dp\/9971501236."},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84996-217-9","author":"Adamatzky","year":"2010","journal-title":"Game of life cellular automata"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"1706","DOI":"10.1016\/j.physa.2008.12.021","article-title":"Detect overlapping and hierarchical community structure in networks","volume":"388","author":"Shen","year":"2009","journal-title":"Physica A"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"1897","DOI":"10.1109\/18.705568","article-title":"Collusion-secure fingerprinting for digital data","volume":"44","author":"Boneh","year":"1998","journal-title":"IEEE Trans Inf Theory"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1346330.1346335","article-title":"Optimal probabilistic fingerprint codes","volume":"55","author":"Tardos","year":"2008","journal-title":"J ACM"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1007\/s11235-013-9736-8","article-title":"A new fingerprinting scheme using social network analysis for majority attack","volume":"54","author":"Ye","year":"2013","journal-title":"Telecommun Syst"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"1458","DOI":"10.1109\/TSP.2004.826165","article-title":"The relationship of transform coefficients for differing transforms and\/or differing subblock sizes","volume":"52","author":"Davis","year":"2004","journal-title":"IEEE Trans Signal Process"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MMUL.2011.76","article-title":"Real-time compressed-domain video watermarking resistance to geometric distortions","volume":"19","author":"Wang","year":"2012","journal-title":"IEEE Multimed"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"918","DOI":"10.1109\/JPROC.2004.827356","article-title":"Video fingerprinting and encryption principles for digital rights management","volume":"92","author":"Kundur","year":"2004","journal-title":"Proc IEEE"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"B18","DOI":"10.1115\/1.1553433","article-title":"Gad-el-Hak M: a new kind of science","volume":"56","author":"Wolfram","year":"2003","journal-title":"Appl Mech Rev"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1016\/j.compeleceng.2017.04.004","article-title":"Nezamabadi-pour H. A novel parallel image encryption with chaotic windows based on logistic map","volume":"62","author":"Rostami","year":"2017","journal-title":"Comput Electr Eng"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/j.ins.2015.10.027","article-title":"Circular inter-intra pixels bit-level permutation and chaos-based image encryption","volume":"355","author":"Diaconu","year":"2016","journal-title":"Inf Sci"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.comcom.2020.01.038","article-title":"An improved DWT-SVD domain watermarking for medical information security","volume":"152","author":"Anand","year":"2020","journal-title":"Comput Commun"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"055543","DOI":"10.1088\/1402-4896\/ad3bef","article-title":"Hybrid watermarking and encryption techniques for securing three-dimensional information","volume":"99","author":"Liu","year":"2024","journal-title":"Phys Scr"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"11981","DOI":"10.1016\/j.ins.2023.119810","article-title":"Hybrid watermarking algorithm for medical images based on digital transformation and MobileNetV2","volume":"653","author":"Nawaz","year":"2024","journal-title":"Inf Sci"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-2\/TSP_CMC_62051\/TSP_CMC_62051.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:05:40Z","timestamp":1763341540000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n2\/60571"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":45,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.062051","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}