{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T17:57:13Z","timestamp":1732039033677},"reference-count":71,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T00:00:00Z","timestamp":1583452800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T00:00:00Z","timestamp":1583452800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1604145","61802111","61872125"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Foundation of Henan Province of China","award":["182102210027","182102410051"]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2018T110723","2016M602235"],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Scientific Research Projects for Colleges and Universities of Henan Province","award":["19A413001"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput & Applic"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s00521-020-04808-8","type":"journal-article","created":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T16:04:49Z","timestamp":1583510689000},"page":"14113-14141","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":63,"title":["An effective image compression\u2013encryption scheme based on compressive sensing (CS) and game of life (GOL)"],"prefix":"10.1007","volume":"32","author":[{"given":"Zhihua","family":"Gan","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1609-0624","authenticated-orcid":false,"given":"Xiuli","family":"Chai","sequence":"additional","affiliation":[]},{"given":"Jitong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yushu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yiran","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,6]]},"reference":[{"key":"4808_CR1","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.sigpro.2017.08.020","volume":"143","author":"C Cao","year":"2018","unstructured":"Cao C, Sun KH, Liu WH (2018) A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process 143:122\u2013133","journal-title":"Signal Process"},{"key":"4808_CR2","doi-asserted-by":"crossref","first-page":"7111","DOI":"10.1007\/s00521-018-3541-y","volume":"31","author":"ZH Gan","year":"2019","unstructured":"Gan ZH, Chai XL, Han DJ, Chen YR (2019) A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Comput Appl 31:7111\u20137130","journal-title":"Neural Comput Appl"},{"key":"4808_CR3","doi-asserted-by":"crossref","first-page":"245","DOI":"10.3390\/e21030245","volume":"21","author":"AH Zahid","year":"2019","unstructured":"Zahid AH, Arshad MJ, Ahmad M (2019) A novel construction of efficient substitution-boxes using cubic fractional transformation. Entropy 21:245","journal-title":"Entropy"},{"key":"4808_CR4","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.optlaseng.2016.07.010","volume":"88","author":"A Belazi","year":"2017","unstructured":"Belazi A, Ei-Latif AAA, Diaconu AV, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37\u201350","journal-title":"Opt Lasers Eng"},{"key":"4808_CR5","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1016\/j.optlastec.2013.05.023","volume":"57","author":"S Liu","year":"2014","unstructured":"Liu S, Guo CL, Sheridan JT (2014) A review of optical image encryption techniques. Opt Laser Technol 57:327\u2013342","journal-title":"Opt Laser Technol"},{"key":"4808_CR6","first-page":"112","volume":"66","author":"XW Li","year":"2015","unstructured":"Li XW, Lee I-K (2015) Modified computational integral imaging-based double image encryption using fractional Fourier transform. Opt Lasers Eng 66:112\u2013121","journal-title":"Opt Lasers Eng"},{"key":"4808_CR7","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/s11071-013-1070-x","volume":"75","author":"XY Wang","year":"2014","unstructured":"Wang XY, Xu DH (2014) A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn 75:345\u2013353","journal-title":"Nonlinear Dyn"},{"key":"4808_CR8","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","volume":"142","author":"JX Chen","year":"2018","unstructured":"Chen JX, Zhu ZL, Zhang LB, Zhang YS, Yang BQ (2018) Exploiting self-adaptive permutation\u2013diffusion and DNA random encoding for secure and efficient image encryption. Signal Process 142:340\u2013353","journal-title":"Signal Process"},{"key":"4808_CR9","doi-asserted-by":"crossref","first-page":"100504","DOI":"10.1088\/1674-1056\/26\/10\/100504","volume":"26","author":"LM Zhang","year":"2017","unstructured":"Zhang LM, Sun KH, Liu WH, He SB (2017) A novel color image encryption scheme using fractional-order hyperchaotic system and DNA sequence operations. Chin Phys B 26:100504","journal-title":"Chin Phys B"},{"key":"4808_CR10","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/j.ins.2013.11.027","volume":"264","author":"Y Wu","year":"2014","unstructured":"Wu Y, Zhou YC, Noonan JP, Agaian S (2014) Design of image cipher using latin squares. Inf Sci 264:317\u2013339","journal-title":"Inf Sci"},{"key":"4808_CR11","doi-asserted-by":"crossref","first-page":"1151","DOI":"10.1007\/s11071-015-2057-6","volume":"81","author":"JX Chen","year":"2015","unstructured":"Chen JX, Zhu ZL, Fu C, Zhang LB, Zhang YS (2015) An efficient image encryption scheme using lookup table-based confusion and diffusion. Nonlinear Dyn 81:1151\u20131166","journal-title":"Nonlinear Dyn"},{"key":"4808_CR12","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.asoc.2015.08.008","volume":"37","author":"XJ Wu","year":"2015","unstructured":"Wu XJ, Kan HB, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24\u201339","journal-title":"Appl Soft Comput"},{"key":"4808_CR13","doi-asserted-by":"crossref","first-page":"8660","DOI":"10.1109\/ACCESS.2018.2890116","volume":"7","author":"ZY Hua","year":"2019","unstructured":"Hua ZY, Xu BX, Jin F, Huang HJ (2019) Image encryption using josephus problem and filtering diffusion. IEEE Access 7:8660\u20138674","journal-title":"IEEE Access"},{"key":"4808_CR14","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"DL Donoho","year":"2006","unstructured":"Donoho DL (2006) Compressed sensing. IEEE Trans Inf Theory 52:1289\u20131306","journal-title":"IEEE Trans Inf Theory"},{"key":"4808_CR15","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1109\/TIT.2005.862083","volume":"52","author":"EJ Candes","year":"2006","unstructured":"Candes EJ, Romberg J, Tao T (2006) Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans Inf Theory 52:489\u2013509","journal-title":"IEEE Trans Inf Theory"},{"key":"4808_CR16","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/MSP.2007.4286571","volume":"24","author":"RG Baraniuk","year":"2007","unstructured":"Baraniuk RG (2007) Compressive sensing. IEEE Signal Process Mag 24:118\u2013121","journal-title":"IEEE Signal Process Mag"},{"key":"4808_CR17","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.sigpro.2018.04.014","volume":"150","author":"H Huang","year":"2018","unstructured":"Huang H, He X, Xiang Y, Wen WX, Zhang YS (2018) A compression\u2013diffusion\u2013permutation strategy for securing image. Signal Process 150:183\u2013190","journal-title":"Signal Process"},{"key":"4808_CR18","doi-asserted-by":"crossref","first-page":"105837","DOI":"10.1016\/j.optlaseng.2019.105837","volume":"124","author":"XL Chai","year":"2020","unstructured":"Chai XL, Wu HY, Gan ZH, Zhang YS, Chen YR, Nixon KW (2020) An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding. Opt Lasers Eng 124:105837","journal-title":"Opt Lasers Eng"},{"key":"4808_CR19","doi-asserted-by":"crossref","first-page":"19209","DOI":"10.1007\/s11042-017-5378-2","volume":"77","author":"R Ponuma","year":"2018","unstructured":"Ponuma R, Amutha R (2018) Compressive sensing based image compression\u2013encryption using novel 1D-chaotic map. Multimed Tools Appl 77:19209\u201319234","journal-title":"Multimed Tools Appl"},{"key":"4808_CR20","doi-asserted-by":"crossref","first-page":"10097","DOI":"10.1007\/s11042-016-3600-2","volume":"76","author":"J Deng","year":"2017","unstructured":"Deng J, Zhao S, Wang Y, Wang L, Wang H, Sha H (2017) Image compression\u2013encryption scheme combining 2D compressive sensing with discrete fractional random transform. Multimed Tools Appl 76:10097\u201310117","journal-title":"Multimed Tools Appl"},{"key":"4808_CR21","first-page":"7802611","volume":"9","author":"JX Chen","year":"2017","unstructured":"Chen JX, Zhang YS, Zhang LY (2017) On the security of optical ciphers under the architecture of compressed sensing combining with double random phase encoding. IEEE Photonics J 9:7802611","journal-title":"IEEE Photonics J"},{"key":"4808_CR22","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.optcom.2014.12.084","volume":"343","author":"NR Zhou","year":"2015","unstructured":"Zhou NR, Pan SM, Li HL, Wang D, Zhou YC (2015) Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun 343:10\u201321","journal-title":"Opt Commun"},{"key":"4808_CR23","doi-asserted-by":"crossref","first-page":"1650191","DOI":"10.1142\/S0218127416501911","volume":"26","author":"YS Zhang","year":"2016","unstructured":"Zhang YS, Zhou JT, Chen F, Zhang Leo Y, Xiao D, Chen B, Liao XF (2016) A block compressive sensing based scalable encryption framework for protecting significant image regions. Int J Bifurc Chaos 26:1650191","journal-title":"Int J Bifurc Chaos"},{"key":"4808_CR24","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.optlastec.2017.09.008","volume":"99","author":"JX Chen","year":"2018","unstructured":"Chen JX, Zhang Y, Qi L, Fu C, Xu LS (2018) Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression. Opt Laser Technol 99:238\u2013248","journal-title":"Opt Laser Technol"},{"key":"4808_CR25","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.optlastec.2014.02.015","volume":"62","author":"NR Zhou","year":"2014","unstructured":"Zhou NR, Zhang AD, Zheng F, Gong LHC (2014) Novel image compression\u2013encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt Laser Technol 62:152\u2013160","journal-title":"Opt Laser Technol"},{"key":"4808_CR26","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.optlaseng.2018.05.014","volume":"110","author":"NR Zhou","year":"2018","unstructured":"Zhou NR, Jiang H, Gong LH, Xie XW (2018) Double-image compression and encryption algorithm based on co-sparse representation and random pixel exchanging. Opt Lasers Eng 110:72\u201379","journal-title":"Opt Lasers Eng"},{"key":"4808_CR27","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/j.optlastec.2019.01.039","volume":"115","author":"LH Gong","year":"2019","unstructured":"Gong LH, Qiu KD, Deng CZ, Zhou NR (2019) An image compression and encryption algorithm based on chaotic system and compressive sensing. Opt Laser Technol 115:257\u2013267","journal-title":"Opt Laser Technol"},{"key":"4808_CR28","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.optlastec.2016.02.018","volume":"82","author":"NR Zhou","year":"2016","unstructured":"Zhou NR, Pan SM, Cheng S, Zhou YC (2016) Image compression\u2013encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121\u2013133","journal-title":"Opt Laser Technol"},{"key":"4808_CR29","doi-asserted-by":"crossref","first-page":"2282","DOI":"10.1016\/j.ijleo.2015.11.064","volume":"127","author":"N Rawat","year":"2016","unstructured":"Rawat N, Kim B, Kumar R (2016) Fast digital image encryption based on compressive sensing using structurally random matrices and Arnold transform technique. Optik 127:2282\u20132286","journal-title":"Optik"},{"key":"4808_CR30","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.image.2016.04.002","volume":"45","author":"H Liu","year":"2016","unstructured":"Liu H, Xiao D, Zhang R, Zhang YS, Bai S (2016) Robust and hierarchical watermarking of encrypted images based on compressive sensing. Signal Process Image\u00a045:41\u201351","journal-title":"Signal Process Image"},{"key":"4808_CR31","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/TSP.2013.2284762","volume":"62","author":"H Fang","year":"2014","unstructured":"Fang H, Vorobyov SA, Jiang H, Taheri O (2014) Permutation meets parallel compressed sensing: how to relax restricted isometry property for 2D sparse signals. IEEE Trans Signal Process 62:196\u2013210","journal-title":"IEEE Trans Signal Process"},{"key":"4808_CR32","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.neucom.2016.04.053","volume":"205","author":"YS Zhang","year":"2016","unstructured":"Zhang YS, Zhou JT, Chen F, Zhang Leo Y, Wong K-W, He X, Xiao D (2016) Embedding cryptographic features in compressive sensing. Neurocomputing 205:472\u2013480","journal-title":"Neurocomputing"},{"key":"4808_CR33","doi-asserted-by":"crossref","first-page":"2333","DOI":"10.1007\/s11071-016-2648-x","volume":"84","author":"XJ Tong","year":"2016","unstructured":"Tong XJ, Zhang M, Wang Z, Ma J (2016) A joint color image encryption and compression scheme based on hyper-chaotic system. Nonlinear Dyn 84:2333\u20132356","journal-title":"Nonlinear Dyn"},{"key":"4808_CR34","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.sigpro.2018.02.007","volume":"148","author":"XL Chai","year":"2018","unstructured":"Chai XL, Zheng XY, Gan ZH, Hua DJ, Chen YR (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124\u2013144","journal-title":"Signal Process"},{"key":"4808_CR35","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.sigpro.2016.11.016","volume":"134","author":"XL Chai","year":"2017","unstructured":"Chai XL, Gan ZH, Chen YR, Zhang YS (2017) A visually secure image encryption scheme based on compressive sensing. Signal Process 134:35\u201351","journal-title":"Signal Process"},{"key":"4808_CR36","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1016\/j.sigpro.2018.10.001","volume":"155","author":"H Wang","year":"2019","unstructured":"Wang H, Xiao D, Li M, Xiang YP, Li XY (2019) A visually secure image encryption scheme based on parallel compressive sensing. Signal Process 155:218\u2013232","journal-title":"Signal Process"},{"issue":"6","key":"4808_CR37","doi-asserted-by":"crossref","first-page":"060505","DOI":"10.1088\/1674-1056\/24\/6\/060505","volume":"24","author":"D Xiao","year":"2015","unstructured":"Xiao D, Cai HK, Zheng HY (2015) A joint image encryption and watermarking algorithm based on compressive sensing and chaotic map. Chin Phys B 24(6):060505","journal-title":"Chin Phys B"},{"key":"4808_CR38","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.optlastec.2016.05.012","volume":"84","author":"TH Chen","year":"2016","unstructured":"Chen TH, Zhang M, Wu JH, Yuen C, Tong Y (2016) Image encryption and compression based on kronecker compressed sensing and elementary cellular automata scrambling. Opt Laser Technol 84:118\u2013133","journal-title":"Opt Laser Technol"},{"key":"4808_CR39","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.jvcir.2017.01.022","volume":"44","author":"GQ Hu","year":"2017","unstructured":"Hu GQ, Xiao D, Wang Y, Xiang T (2017) An image coding scheme using parallel compressive sensing for simultaneous compression\u2013encryption applications. J Vis Commun Image Represent 44:116\u2013127","journal-title":"J Vis Commun Image Represent"},{"key":"4808_CR40","first-page":"2183","volume":"63","author":"V Cambareri","year":"2015","unstructured":"Cambareri V, Mangia M, Pareschi F, Rovatti R, Setti G (2015) Low-complexity multiclass encryption by compressed sensing. IEEE Trans Signal Process 63:2183\u20132195","journal-title":"IEEE Trans Signal Process"},{"key":"4808_CR41","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.sigpro.2018.05.008","volume":"151","author":"DD Liu","year":"2018","unstructured":"Liu DD, Zhang W, Yu H, Zhu ZL (2018) An image encryption scheme using self-adaptive selective permutation and inter-intra feedback diffusion. Signal Process 151:130\u2013143","journal-title":"Signal Process"},{"issue":"1","key":"4808_CR42","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1007\/s11071-016-2912-0","volume":"86","author":"A Souyah","year":"2016","unstructured":"Souyah A, Faraoun KM (2016) An image encryption scheme combining chaos-memory cellular automata and weighted histogram. Nonlinear Dyn 86(1):639\u2013653","journal-title":"Nonlinear Dyn"},{"key":"4808_CR43","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.optlaseng.2015.03.007","volume":"71","author":"R Enayatifar","year":"2015","unstructured":"Enayatifar R, Sadaei HJ, Abdullah AH, Lee M, Isnin IF (2015) A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Opt Laser Eng 71:33\u201341","journal-title":"Opt Laser Eng"},{"issue":"4","key":"4808_CR44","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MMUL.2011.54","volume":"19","author":"ALA Dalhoum","year":"2012","unstructured":"Dalhoum ALA, Mahafzah BA, Awwad AA, Aldhamari I, Ortega A, Alfonseca M (2012) Digital image scrambling using 2D cellular automata. IEEE Multimed 19(4):28\u201336","journal-title":"IEEE Multimed"},{"key":"4808_CR45","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","volume":"90","author":"AY Niyat","year":"2017","unstructured":"Niyat AY, Moattar MH, Torshiz MN (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng 90:225\u2013237","journal-title":"Opt Lasers Eng"},{"issue":"7","key":"4808_CR46","doi-asserted-by":"crossref","first-page":"634","DOI":"10.1002\/sec.1386","volume":"9","author":"B Murugan","year":"2016","unstructured":"Murugan B, Gounder AGN, Manohar S (2016) A hybrid image encryption algorithm using chaos and Conway\u2019s game-of-life cellular automata. Secur Commun Netw 9(7):634\u2013651","journal-title":"Secur Commun Netw"},{"key":"4808_CR47","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1016\/j.jocs.2016.09.002","volume":"21","author":"MG Kechaidou","year":"2017","unstructured":"Kechaidou MG, Sirakoulis GC (2017) Game of life variations for image scrambling. J Comput Sci 21:432\u2013447","journal-title":"J Comput Sci"},{"key":"4808_CR48","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3913-3","author":"XL Chai","year":"2018","unstructured":"Chai XL, Fu XL, Gan ZH, Zhang YS, Lu Y, Chen YR (2018) An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata. Neural Comput Appl. https:\/\/doi.org\/10.1007\/s00521-018-3913-3","journal-title":"Neural Comput Appl"},{"key":"4808_CR49","first-page":"1637","volume":"190","author":"T Xiang","year":"2007","unstructured":"Xiang T, Liao XF, Wong K (2007) An improved particle swarm optimization algorithm combined with piecewise linear chaotic map. Appl Math Comput 190:1637\u20131645","journal-title":"Appl Math Comput"},{"key":"4808_CR50","unstructured":"Wikipedia. http:\/\/en.wikipedia.org\/wiki\/Conway\u2019s_Game_of_Life2011"},{"key":"4808_CR51","first-page":"486","volume":"46","author":"FH Min","year":"2018","unstructured":"Min FH, Wang ZL, Cao Y, Wang ER (2018) Multistability analysis of a dual-memristor circuit based on hyperbolic function. Acta Electron Sin 46:486\u2013494","journal-title":"Acta Electron Sin"},{"issue":"19","key":"4808_CR52","first-page":"373","volume":"63","author":"JB Guo","year":"2014","unstructured":"Guo JB, Wang R (2014) Construction of a circulant compressive measurement matrix based on chaotic sequence and RIPless theory. Acta Phys Sin 63(19):373\u2013382","journal-title":"Acta Phys Sin"},{"key":"4808_CR53","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.optcom.2015.05.043","volume":"354","author":"NR Zhou","year":"2015","unstructured":"Zhou NR, Yang JP, Tan CF, Pan SM, Zhou ZH (2015) Double-image encryption scheme combining DWT-based compressive sensing with discrete fractional random transform. Opt Commun 354:112\u2013121","journal-title":"Opt Commun"},{"key":"4808_CR54","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6996-z","author":"H Liu","year":"2018","unstructured":"Liu H, Wen F, Kadir A (2018) Construction of a new 2D Chebyshev\u2013Sine map and its application to color image encryption. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-018-6996-z","journal-title":"Multimed Tools Appl"},{"key":"4808_CR55","doi-asserted-by":"crossref","first-page":"1943","DOI":"10.1007\/s11071-014-1259-7","volume":"76","author":"XY Wang","year":"2014","unstructured":"Wang XY, Guo K (2014) A new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 76:1943\u20131950","journal-title":"Nonlinear Dyn"},{"key":"4808_CR56","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.optcom.2014.10.021","volume":"338","author":"HJ Liu","year":"2015","unstructured":"Liu HJ, Kadir A, Gong PJ (2015) A fast color image encryption scheme using one-time S-boxes based on complex chaotic system and random noise. Opt Commun 338:340\u2013347","journal-title":"Opt Commun"},{"key":"4808_CR57","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ins.2014.02.156","volume":"273","author":"YQ Zhang","year":"2014","unstructured":"Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf Sci 273:329\u2013351","journal-title":"Inf Sci"},{"key":"4808_CR58","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"XL Chai","year":"2017","unstructured":"Chai XL, Chen YR, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197\u2013213","journal-title":"Opt Lasers Eng"},{"key":"4808_CR59","doi-asserted-by":"crossref","first-page":"9907","DOI":"10.1007\/s11042-016-3585-x","volume":"76","author":"XL Chai","year":"2017","unstructured":"Chai XL, Yang K, Gan ZH (2017) A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimed Tools Appl 76:9907\u20139927","journal-title":"Multimed Tools Appl"},{"key":"4808_CR60","doi-asserted-by":"crossref","first-page":"1159","DOI":"10.1007\/s11042-015-3088-1","volume":"76","author":"XL Chai","year":"2017","unstructured":"Chai XL (2017) An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimed Tools Appl 76:1159\u20131175","journal-title":"Multimed Tools Appl"},{"key":"4808_CR61","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/s11071-013-1074-6","volume":"75","author":"GD Ye","year":"2014","unstructured":"Ye GD (2014) A block image encryption algorithm based on wave transmission and chaotic systems. Nonlinear Dyn 75:417\u2013427","journal-title":"Nonlinear Dyn"},{"key":"4808_CR62","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.1007\/s11071-018-4251-9","volume":"93","author":"YL Luo","year":"2018","unstructured":"Luo YL, Zhou RL, Liu JX, Cao Y, Ding XM (2018) A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map. Nonlinear Dyn 93:1165\u20131181","journal-title":"Nonlinear Dyn"},{"key":"4808_CR63","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17\u201325","journal-title":"Opt Lasers Eng"},{"key":"4808_CR64","doi-asserted-by":"crossref","first-page":"107373","DOI":"10.1016\/j.sigpro.2019.107373","volume":"169","author":"FF Yang","year":"2020","unstructured":"Yang FF, Mou J, Liu J, Ma CG, Yan HZ (2020) Characteristic analysis of the fractional-order hyperchaotic complex system and its image encryption application. Signal Process 169:107373","journal-title":"Signal Process"},{"key":"4808_CR65","doi-asserted-by":"crossref","first-page":"75834","DOI":"10.1109\/ACCESS.2018.2883690","volume":"6","author":"CQ Li","year":"2018","unstructured":"Li CQ, Lin DD, Feng BB, Lu JH (2018) Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6:75834\u201375842","journal-title":"IEEE Access"},{"key":"4808_CR66","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MMUL.2018.2873472","volume":"25","author":"CQ Li","year":"2018","unstructured":"Li CQ, Lin DD, Lu JH, Hao F (2018) Cryptanalyzing an image encryption algorithm based on autoblocking electrocardiography. IEEE Multimed 25:46\u201356","journal-title":"IEEE Multimed"},{"key":"4808_CR67","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1016\/j.ins.2017.11.021","volume":"430\u2013431","author":"YL Zhang","year":"2018","unstructured":"Zhang YL, Liu YS, Wang C, Zhou JT, Zhang YS, Chen GR (2018) Improved known-plaintext attack to permutation-only multimedia ciphers. Inf Sci 430\u2013431:228\u2013239","journal-title":"Inf Sci"},{"key":"4808_CR68","doi-asserted-by":"crossref","first-page":"2399","DOI":"10.1007\/s11071-018-4332-9","volume":"93","author":"JX Chen","year":"2018","unstructured":"Chen JX, Han FF, Qian W, Yao YD, Zhu ZL (2018) Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map. Nonlinear Dyn 93:2399\u20132413","journal-title":"Nonlinear Dyn"},{"key":"4808_CR69","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MMUL.2017.3051512","volume":"24","author":"CQ Li","year":"2017","unstructured":"Li CQ, Lin DD, Lu JH (2017) Cryptanalyzing an image-scrambling encryption algorithm of pixel bits. IEEE Multimed 24:64\u201371","journal-title":"IEEE Multimed"},{"key":"4808_CR70","first-page":"102361","volume":"48","author":"C Li","year":"2019","unstructured":"Li C, Zhang Y, Xie EY (2019) When an attacker meets a cipher-image in 2018: a year in review. J Inf Secur Appl 48:102361","journal-title":"J Inf Secur Appl"},{"issue":"7","key":"4808_CR71","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.sigpro.2014.01.020","volume":"100","author":"YC Zhou","year":"2014","unstructured":"Zhou YC, Cao WJ, Chen CLP (2014) Image encryption using binary bit plane. Signal Process 100(7):197\u2013207","journal-title":"Signal Process"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-020-04808-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-020-04808-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-020-04808-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,6]],"date-time":"2021-03-06T00:34:25Z","timestamp":1614990865000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-020-04808-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,6]]},"references-count":71,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["4808"],"URL":"https:\/\/doi.org\/10.1007\/s00521-020-04808-8","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,6]]},"assertion":[{"value":"30 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 February 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"All authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}