{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T10:30:17Z","timestamp":1723804217279},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T00:00:00Z","timestamp":1646611200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T00:00:00Z","timestamp":1646611200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11042-022-12607-7","type":"journal-article","created":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T11:07:26Z","timestamp":1646651246000},"page":"17401-17436","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Cloud-decryption-assisted image compression and encryption based on compressed sensing"],"prefix":"10.1007","volume":"81","author":[{"given":"Jiangyu","family":"Fu","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1138-1887","authenticated-orcid":false,"given":"Zhihua","family":"Gan","sequence":"additional","affiliation":[]},{"given":"Xiuli","family":"Chai","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,7]]},"reference":[{"key":"12607_CR1","doi-asserted-by":"crossref","unstructured":"Anand A, Raj A, Kohli R, Bibhu V (2016) Proposed symmetric key cryptography algorithm for data security. 2016 international conference on innovation and challenges in cyber security (ICICCS-INBUSH), Noida, pp. 159-162","DOI":"10.1109\/ICICCS.2016.7542294"},{"issue":"19","key":"12607_CR2","doi-asserted-by":"crossref","first-page":"27569","DOI":"10.1007\/s11042-019-07852-2","volume":"78","author":"S Anwar","year":"2019","unstructured":"Anwar S, Meghana S (2019) A pixel permutation based image encryption technique using chaotic map. Multimed Tools Appl 78(19):27569\u201327590","journal-title":"Multimed Tools Appl"},{"key":"12607_CR3","doi-asserted-by":"crossref","first-page":"6663","DOI":"10.1007\/s11227-019-02878-7","volume":"75","author":"A Arab","year":"2019","unstructured":"Arab A, Rostami MJ, Ghavami B (2019) An image encryption method based on chaos system and AES algorithm. J Supercomput 75:6663\u20136682","journal-title":"J Supercomput"},{"issue":"31","key":"12607_CR4","doi-asserted-by":"crossref","first-page":"31581","DOI":"10.1007\/s11042-018-6112-4","volume":"77","author":"K Ashwini","year":"2018","unstructured":"Ashwini K, Amutha R (2018) Fast and secured cloud assisted recovery scheme for compressively sensed signals using new chaotic system. Multimed Tools Appl 77(31):31581\u201331606","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"12607_CR5","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/s10208-004-0162-x","volume":"6","author":"EJ Cand\u00e8s","year":"2006","unstructured":"Cand\u00e8s EJ, Romberg J (2006) Quantitative robust uncertainty principles and optimally sparse decompositions. Found Comput Math 6(2):227\u2013254","journal-title":"Found Comput Math"},{"key":"12607_CR6","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.sigpro.2018.02.007","volume":"148","author":"XL Chai","year":"2018","unstructured":"Chai XL, Zheng XY, Gan ZH, Han DJ, Chen YR (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124\u2013144","journal-title":"Signal Process"},{"key":"12607_CR7","doi-asserted-by":"crossref","unstructured":"Chai XL, Wu HY, Gan ZH, Zhang YS, Chen YR Nixon KW (2020) An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding. Opt lasers Eng 124: UNSP 105837","DOI":"10.1016\/j.optlaseng.2019.105837"},{"key":"12607_CR8","doi-asserted-by":"crossref","first-page":"107684","DOI":"10.1016\/j.sigpro.2020.107684","volume":"176","author":"XL Chai","year":"2020","unstructured":"Chai XL, Bi JQ, Gan ZH, Liu XX, Zhang YS, Chen YR (2020) Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process 176:107684","journal-title":"Signal Process"},{"issue":"12","key":"12607_CR9","doi-asserted-by":"crossref","first-page":"8065","DOI":"10.1007\/s00521-019-04312-8","volume":"32","author":"XL Chai","year":"2020","unstructured":"Chai XL, Zheng XY, Gan ZH, Chen YR (2020) Exploiting plaintext-related mechanism for secure color image encryption. Neural Comput Applic 32(12):8065\u20138088","journal-title":"Neural Comput Applic"},{"key":"12607_CR10","doi-asserted-by":"crossref","first-page":"108041","DOI":"10.1016\/j.sigpro.2021.108041","volume":"183","author":"XL Chai","year":"2021","unstructured":"Chai XL, Zhi XC, Gan ZH, Zhang YS, Chen YR, Fu JY (2021) Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption. Signal Process 183:108041","journal-title":"Signal Process"},{"key":"12607_CR11","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.optlastec.2016.05.012","volume":"84","author":"TH Chen","year":"2016","unstructured":"Chen TH, Zhang M, Wu J, Yuen C, Tong Y (2016) Image encryption and compression based on kronecker compressed sensing and elementary cellular automata scrambling. Opt Laser Technol 84:118\u2013133","journal-title":"Opt Laser Technol"},{"key":"12607_CR12","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.optlastec.2017.09.008","volume":"99","author":"JX Chen","year":"2018","unstructured":"Chen JX, Zhang Y, Qi L, Fu C, Xu LS (2018) Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression. Opt Laser Technol 99:238\u2013248","journal-title":"Opt Laser Technol"},{"key":"12607_CR13","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","volume":"142","author":"JX Chen","year":"2018","unstructured":"Chen JX, Zhu ZL, Zhang LB, Zhang YS, Yang BQ (2018) Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption. Signal Process 142:340\u2013353","journal-title":"Signal Process"},{"issue":"13","key":"12607_CR14","first-page":"1416","volume":"66","author":"MJ Chen","year":"2019","unstructured":"Chen MJ, He XT, Gong LH, Chen RL (2019) Image compression and encryption scheme with hyper-chaotic system and mean error control. J Mod Opt 66(13):1416\u20131424","journal-title":"J Mod Opt"},{"issue":"1","key":"12607_CR15","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/s11071-019-04791-3","volume":"96","author":"JX Chen","year":"2019","unstructured":"Chen JX, Chen L, Zhang LY, Zhu ZL (2019) Medical image cipher using hierarchical diffusion and non-sequential encryption. Nonlinear Dynam 96(1):301\u2013322","journal-title":"Nonlinear Dynam"},{"issue":"14","key":"12607_CR16","doi-asserted-by":"crossref","first-page":"19229","DOI":"10.1007\/s11042-019-7256-6","volume":"78","author":"SM Darwish","year":"2019","unstructured":"Darwish SM (2019) A modified image selective encryption-compression technique based on 3D chaotic maps and arithmetic coding. Multimed Tools Appl 78(14):19229\u201319252","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"12607_CR17","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"DL Donoho","year":"2006","unstructured":"Donoho DL (2006) Compressed sensing. IEEE Trans Inform Theory 52(4):1289\u20131306","journal-title":"IEEE Trans Inform Theory"},{"issue":"11","key":"12607_CR18","doi-asserted-by":"crossref","first-page":"7111","DOI":"10.1007\/s00521-018-3541-y","volume":"31","author":"ZH Gan","year":"2019","unstructured":"Gan ZH, Chai XL, Han DJ, Chen YR (2019) A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Comput Applic 31(11):7111\u20137130","journal-title":"Neural Comput Applic"},{"issue":"37\u201338","key":"12607_CR19","doi-asserted-by":"crossref","first-page":"26927","DOI":"10.1007\/s11042-020-09058-3","volume":"79","author":"M Ghazvini","year":"2020","unstructured":"Ghazvini M, Mirzadi M, Parvar N (2020) A modified method for image encryption based on chaotic map and genetic algorithm. Multimed Tools Appl 79(37\u201338):26927\u201326950","journal-title":"Multimed Tools Appl"},{"key":"12607_CR20","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.optlastec.2018.01.007","volume":"103","author":"LH Gong","year":"2018","unstructured":"Gong LH, Deng CZ, Pan SM, Zhou NR (2018) Image compression-encryption algorithms by combining hyper-chaotic system with discrete fractional random transform. Opt Laser Technol 103:48\u201358","journal-title":"Opt Laser Technol"},{"key":"12607_CR21","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/j.optlastec.2019.01.039","volume":"115","author":"LH Gong","year":"2019","unstructured":"Gong LH, Qiu KD, Deng CZ, Zhou NR (2019) An image compression and encryption algorithm based on chaotic system and compressive sensing. Opt Laser Technol 115:257\u2013267","journal-title":"Opt Laser Technol"},{"key":"12607_CR22","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.optlaseng.2019.03.006","volume":"121","author":"LH Gong","year":"2019","unstructured":"Gong LH, Qiu KD, Deng CZ, Zhou NR (2019) An optical image compression and encryption scheme based on compressive sensing and RSA algorithm. Opt Lasers Eng 121:169\u2013180","journal-title":"Opt Lasers Eng"},{"key":"12607_CR23","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.ins.2016.09.045","volume":"387","author":"GQ Hu","year":"2017","unstructured":"Hu GQ, Xiao D, Xiang T, Bai S, Zhang YS (2017) A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud. Inf Sci 387:132\u2013145","journal-title":"Inf Sci"},{"key":"12607_CR24","doi-asserted-by":"crossref","first-page":"8660","DOI":"10.1109\/ACCESS.2018.2890116","volume":"7","author":"ZY Hua","year":"2019","unstructured":"Hua ZY, Xu BX, Jin F, Huang HJ (2019) Image encryption using Josephus problem and filtering diffusion. IEEE Access 7:8660\u20138674","journal-title":"IEEE Access"},{"key":"12607_CR25","doi-asserted-by":"crossref","first-page":"1063","DOI":"10.1016\/j.ins.2020.09.032","volume":"546","author":"ZY Hua","year":"2021","unstructured":"Hua ZY, Zhu ZH, Yi S, Zhang Z, Huang HJ (2021) Cross-plane colour image encryption using a two-dimensional logistic tent modular map. Inf Sci 546:1063\u20131083","journal-title":"Inf Sci"},{"key":"12607_CR26","doi-asserted-by":"crossref","unstructured":"Jha DP, Kohli R, Gupta A (2016) Proposed encryption algorithm for data security using matrix properties. 2016 international conference on innovation and challenges in cyber security (ICICCS-INBUSH), Noida, pp. 86-90","DOI":"10.1109\/ICICCS.2016.7542316"},{"issue":"23\u201324","key":"12607_CR27","doi-asserted-by":"crossref","first-page":"16797","DOI":"10.1007\/s11042-019-7235-y","volume":"79","author":"WI Khedr","year":"2020","unstructured":"Khedr WI (2020) A new efficient and configurable image encryption structure for secure transmission. Multimed Tools Appl 79(23\u201324):16797\u201316821","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"12607_CR28","first-page":"1503112","volume":"11","author":"LL Li","year":"2019","unstructured":"Li LL, Xie YY, Liu YZ (2019) Exploiting optical chaos for color image encryption and secure resource sharing in cloud. IEEE Photonics J 11(3):1503112","journal-title":"IEEE Photonics J"},{"issue":"2","key":"12607_CR29","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/s11633-018-1159-2","volume":"17","author":"YR Liang","year":"2020","unstructured":"Liang YR, Xiao ZY (2020) Image encryption algorithm based on compressive sensing and fractional DCT via polynomial interpolation. Int J Autom Comput 17(2):292\u2013304","journal-title":"Int J Autom Comput"},{"issue":"1","key":"12607_CR30","doi-asserted-by":"crossref","first-page":"82","DOI":"10.3390\/sym11010082","volume":"11","author":"L Liu","year":"2019","unstructured":"Liu L, Wang LF, Shi YQ, Chang CC (2019) Separable data-hiding scheme for encrypted image to protect privacy of user in cloud. Symmetry-Basel 11(1):82","journal-title":"Symmetry-Basel"},{"key":"12607_CR31","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/j.sigpro.2019.03.022","volume":"161","author":"YL Luo","year":"2019","unstructured":"Luo YL, Lin J, Liu JX, Wei DQ, Cao LC, Zhou RL, Cao Y, Ding XM (2019) A robust image encryption algorithm based on Chua\u2019s circuit and compressive sensing. Signal Process 161:227\u2013247","journal-title":"Signal Process"},{"key":"12607_CR32","doi-asserted-by":"crossref","first-page":"30344","DOI":"10.1109\/ACCESS.2019.2901302","volume":"7","author":"S Ma","year":"2019","unstructured":"Ma S, Zhang Y, Yang ZG, Hu JH, Lei X (2019) A new plaintext-related image encryption scheme based on chaotic sequence. IEEE Access 7:30344\u201330360","journal-title":"IEEE Access"},{"key":"12607_CR33","first-page":"6572105","volume":"2019","author":"C Pan","year":"2019","unstructured":"Pan C, Ye GD, Huang XL, Zhou JW (2019) Novel meaningful image encryption based on block compressive sensing. Secur Commun Netw 2019:6572105\u20136572112","journal-title":"Secur Commun Netw"},{"key":"12607_CR34","doi-asserted-by":"crossref","unstructured":"Patel U, Dadhania P (2019) Multilevel data encryption using AES and RSA for image and textual information data. 2019 innovations in power and advanced computing technologies (I-PACT), Vellore","DOI":"10.1109\/i-PACT44901.2019.8960227"},{"issue":"9","key":"12607_CR35","doi-asserted-by":"crossref","first-page":"11857","DOI":"10.1007\/s11042-018-6745-3","volume":"78","author":"R Ponuma","year":"2019","unstructured":"Ponuma R, Amutha R (2019) Encryption of image data using compressive sensing and chaotic system. Multimed Tools Appl 78(9):11857\u201311881","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"12607_CR36","doi-asserted-by":"crossref","first-page":"10373","DOI":"10.1007\/s11042-018-6539-7","volume":"78","author":"S Som","year":"2018","unstructured":"Som S, Mitra A, Palit S, Chaudhuri BB (2018) A selective bitplane image encryption scheme using chaotic maps. Multimed Tools Appl 78(8):10373\u201310400","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"12607_CR37","doi-asserted-by":"crossref","first-page":"2235","DOI":"10.1007\/s11071-018-4689-9","volume":"95","author":"YJ Song","year":"2019","unstructured":"Song YJ, Zhu ZL, Zhang W, Guo L, Yang X, Yu H (2019) Joint image compression-encryption scheme using entropy coding and compressive sensing. Nonlinear Dynam 95(3):2235\u20132261","journal-title":"Nonlinear Dynam"},{"key":"12607_CR38","doi-asserted-by":"publisher","first-page":"19011","DOI":"10.1007\/s11042-021-10549-0","volume":"80","author":"ANK Telem","year":"2021","unstructured":"Telem ANK, Fotsin HB, Kengne J (2021) Image encryption algorithm based on dynamic DNA coding operations and 3D chaotic systems. Multimed Tools Appl 80:19011\u201319041. https:\/\/doi.org\/10.1007\/s11042-021-10549-0","journal-title":"Multimed Tools Appl"},{"key":"12607_CR39","unstructured":"USC-SIPI (1977) The USC-SIPI Image Database. Available: http:\/\/sipi.usc.edu\/database\/database.php?volume=misc. Accessed 20 Mar 2020"},{"key":"12607_CR40","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.ins.2019.08.041","volume":"507","author":"XY Wang","year":"2020","unstructured":"Wang XY, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16\u201336","journal-title":"Inf Sci"},{"key":"12607_CR41","doi-asserted-by":"crossref","first-page":"106202","DOI":"10.1016\/j.optlaseng.2020.106202","volume":"134","author":"YJ Xian","year":"2020","unstructured":"Xian YJ, Wang XY, Yan XP, Li Q, Wang XY (2020) Image encryption based on chaotic sub-block scrambling and chaotic digit selection diffusion. Opt Lasers Eng 134:106202","journal-title":"Opt Lasers Eng"},{"issue":"9","key":"12607_CR42","doi-asserted-by":"crossref","first-page":"819","DOI":"10.3390\/e21090819","volume":"21","author":"YQ Xie","year":"2019","unstructured":"Xie YQ, Yu JY, Guo SY, Ding Q, Wang E (2019) Image encryption scheme with compressed sensing based on new three-dimensional chaotic system. Entropy-Switz 21(9):819","journal-title":"Entropy-Switz"},{"key":"12607_CR43","doi-asserted-by":"crossref","first-page":"106178","DOI":"10.1016\/j.optlaseng.2020.106178","volume":"134","author":"QY Xu","year":"2020","unstructured":"Xu QY, Sun KH, He SB, Zhu CX (2020) An effective image encryption algorithm based on compressive sensing and 2D-SLIM. Opt Lasers Eng 134:106178","journal-title":"Opt Lasers Eng"},{"key":"12607_CR44","doi-asserted-by":"crossref","first-page":"107373","DOI":"10.1016\/j.sigpro.2019.107373","volume":"169","author":"FF Yang","year":"2020","unstructured":"Yang FF, Mou J, Liu J, Ma CG, Yan HZ (2020) Characteristic analysis of the fractional-order hyperchaotic complex system and its image encryption application. Signal Process 169:107373","journal-title":"Signal Process"},{"key":"12607_CR45","doi-asserted-by":"crossref","first-page":"105703","DOI":"10.1016\/j.optlastec.2019.105703","volume":"120","author":"SY Yao","year":"2019","unstructured":"Yao SY, Chen LF, Zhong Y (2019) An encryption system for color image based on compressive sensing. Opt Laser Technol 120:105703","journal-title":"Opt Laser Technol"},{"key":"12607_CR46","doi-asserted-by":"crossref","first-page":"107563","DOI":"10.1016\/j.sigpro.2020.107563","volume":"172","author":"GD Ye","year":"2020","unstructured":"Ye GD, Pan C, Dong YX, Shi Y, Huang XL (2020) Image encryption and hiding algorithm based on compressive sensing and random numbers insertion. Signal Process 172:107563","journal-title":"Signal Process"},{"key":"12607_CR47","doi-asserted-by":"crossref","first-page":"105816","DOI":"10.1016\/j.optlaseng.2019.105816","volume":"124","author":"SS Yu","year":"2020","unstructured":"Yu SS, Zhou NR, Gong LH, Nie Z (2020) Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system. Opt Lasers Eng 124:105816","journal-title":"Opt Lasers Eng"},{"key":"12607_CR48","doi-asserted-by":"crossref","unstructured":"Zhang R, Xiao D (2020) A secure image permutation-substitution framework based on chaos and compressive sensing. Int J Distrib Sens Netw 16(3) 1550147720912949","DOI":"10.1177\/1550147720912949"},{"issue":"5","key":"12607_CR49","doi-asserted-by":"crossref","first-page":"1380","DOI":"10.1109\/JIOT.2017.2732357","volume":"4","author":"YS Zhang","year":"2017","unstructured":"Zhang YS, Huang H, Xiang Y, Zhang LY, He X (2017) Harnessing the hybrid cloud for secure big image data service. IEEE Internet Things 4(5):1380\u20131388","journal-title":"IEEE Internet Things"},{"issue":"5","key":"12607_CR50","doi-asserted-by":"crossref","first-page":"3442","DOI":"10.1109\/JIOT.2017.2781737","volume":"5","author":"YS Zhang","year":"2018","unstructured":"Zhang YS, He Q, Xiang Y, Zhang LY, Liu B, Chen JX, Xie YY (2018) Low-cost and confidentiality-preserving data acquisition for internet of multimedia things. IEEE Internet Things 5(5):3442\u20133451","journal-title":"IEEE Internet Things"},{"key":"12607_CR51","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.ins.2019.05.024","volume":"496","author":"YS Zhang","year":"2019","unstructured":"Zhang YS, Xiang Y, Zhang LY, Yang LX, Zhou JT (2019) Efficiently and securely outsourcing compressed sensing reconstruction to a cloud. Inf Sci 496:150\u2013160","journal-title":"Inf Sci"},{"issue":"12","key":"12607_CR52","doi-asserted-by":"crossref","first-page":"7566","DOI":"10.1109\/TII.2019.2957404","volume":"16","author":"YS Zhang","year":"2019","unstructured":"Zhang YS, He Q, Chen G, Zhang XP, Xiang Y (2019) A low-overhead, confidentiality-assured, and authenticated data acquisition framework for IoT. IEEE Trans Ind Inform 16(12):7566\u20137578","journal-title":"IEEE Trans Ind Inform"},{"key":"12607_CR53","doi-asserted-by":"crossref","first-page":"115829","DOI":"10.1016\/j.image.2020.115829","volume":"84","author":"H Zhang","year":"2020","unstructured":"Zhang H, Wang XQ, Sun YJ, Wang XY (2020) A novel method for lossless image compression and encryption based on LWT, SPIHT and cellular automata. Signal Process-Image 84:115829","journal-title":"Signal Process-Image"},{"issue":"10","key":"12607_CR54","doi-asserted-by":"crossref","first-page":"6641","DOI":"10.1109\/TII.2020.2966511","volume":"16","author":"YS Zhang","year":"2020","unstructured":"Zhang YS, Wang P, Fang LM, He X, Han H, Chen B (2020) Secure transmission of compressed sampling data using edge clouds. IEEE Trans Ind Inform 16(10):6641\u20136651","journal-title":"IEEE Trans Ind Inform"},{"issue":"21\u201322","key":"12607_CR55","doi-asserted-by":"crossref","first-page":"14777","DOI":"10.1007\/s11042-018-7062-6","volume":"79","author":"Z Zhang","year":"2020","unstructured":"Zhang Z, Bi HB, Kong XX, Li N, Lu D (2020) Adaptive compressed sensing of color images based on salient region detection. Multimed Tools Appl 79(21\u201322):14777\u201314791","journal-title":"Multimed Tools Appl"},{"key":"12607_CR56","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1016\/j.ins.2020.03.054","volume":"526","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Chen AG, Tang YJ, Dang JY, Wang GP (2020) Plaintext-related image encryption algorithm based on perceptron-like network. Inf Sci 526:180\u2013202","journal-title":"Inf Sci"},{"issue":"5","key":"12607_CR57","doi-asserted-by":"crossref","first-page":"3401","DOI":"10.1109\/TII.2020.3008914","volume":"17","author":"YS Zhang","year":"2021","unstructured":"Zhang YS, Wang P, Huang H, Zhu YW, Xiao D, Xiang Y (2021) Privacy-assured FogCS: chaotic compressive sensing for secure industrial big image data processing in fog computing. IEEE Trans Ind Inform 17(5):3401\u20133411","journal-title":"IEEE Trans Ind Inform"},{"key":"12607_CR58","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.optlaseng.2018.05.014","volume":"110","author":"NR Zhou","year":"2018","unstructured":"Zhou NR, Jiang H, Gong LH, Xie XW (2018) Double-image compression and encryption algorithm based on co-sparse representation and random pixel exchanging. Opt Lasers Eng 110:72\u201379","journal-title":"Opt Lasers Eng"},{"key":"12607_CR59","doi-asserted-by":"crossref","first-page":"105769","DOI":"10.1016\/j.optlastec.2019.105769","volume":"121","author":"KL Zhou","year":"2020","unstructured":"Zhou KL, Fan JJ, Fan HJ, Li M (2020) Secure image encryption scheme using double random-phase encoding and compressed sensing. Opt Laser Technol 121:105769","journal-title":"Opt Laser Technol"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12607-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12607-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12607-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,4]],"date-time":"2022-05-04T10:35:17Z","timestamp":1651660517000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12607-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,7]]},"references-count":59,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["12607"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12607-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,7]]},"assertion":[{"value":"14 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 February 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}