{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T04:24:17Z","timestamp":1729225457619,"version":"3.27.0"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"26","license":[{"start":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T00:00:00Z","timestamp":1680134400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T00:00:00Z","timestamp":1680134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Key-Area Research and Development Program of Guangdong Province","award":["2018B010108001"]},{"name":"Science and Technology Plan Project of Jiangmen","award":["2020030103080008999"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s11042-023-14804-4","type":"journal-article","created":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T06:03:05Z","timestamp":1680156185000},"page":"40009-40038","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A two-stage chaotic encryption algorithm for color face image based on circular diffusion"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9969-2697","authenticated-orcid":false,"given":"Jinwei","family":"Yu","sequence":"first","affiliation":[]},{"given":"Xiaoyuan","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Langwen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,30]]},"reference":[{"key":"14804_CR1","doi-asserted-by":"crossref","first-page":"105942","DOI":"10.1016\/j.optlastec.2019.105942","volume":"124","author":"AA Abd El-Latif","year":"2020","unstructured":"Abd El-Latif A A, Abd-El-Atty B, Abou-Nassar E M, Venegas-Andraca S E (2020) Controlled alternate quantum walks based privacy preserving healthcare images in internet of things. Optics & Laser Technol 124:105942","journal-title":"Optics & Laser Technol"},{"issue":"1","key":"14804_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-019-56847-4","volume":"10","author":"AA Abd El-Latif","year":"2020","unstructured":"Abd El-Latif A A, Abd-El-Atty B, Amin M, Iliyasu A M (2020) Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications. Sci Rep 10(1):1\u201316","journal-title":"Sci Rep"},{"issue":"12","key":"14804_CR3","doi-asserted-by":"crossref","first-page":"4653","DOI":"10.1016\/j.cnsns.2012.05.033","volume":"17","author":"A Akhshani","year":"2012","unstructured":"Akhshani A, Akhavan A, Lim S-C, Hassan Z (2012) An image encryption scheme based on quantum logistic map. Commun Nonlinear Sci Numer Simul 17(12):4653\u20134661","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"14804_CR4","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.cnsns.2017.12.017","volume":"60","author":"S Amina","year":"2018","unstructured":"Amina S, Mohamed F K (2018) An efficient and secure chaotic cipher algorithm for image content preservation. Commun Nonlinear Sci Numer Simul 60:12\u201332","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"14804_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.sigpro.2018.11.010","volume":"157","author":"M Asgari-Chenaghlu","year":"2019","unstructured":"Asgari-Chenaghlu M, Balafar M-A, Feizi-Derakhshi M-R (2019) A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation. Signal Process 157:1\u201313","journal-title":"Signal Process"},{"key":"14804_CR6","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1016\/j.ins.2020.07.007","volume":"542","author":"M Asgari-Chenaghlu","year":"2021","unstructured":"Asgari-Chenaghlu M, Feizi-Derakhshi M-R, Nikzad-Khasmakhi N, Feizi-Derakhshi A-R, Ramezani M, Jahanbakhsh-Nagadeh Z, Rahkar-Farshi T, Zafarani-Moattar E, Ranjbar-Khadivi M, Balafar M-A (2021) Cy: chaotic yolo for user intended image encryption and sharing in social media. Inf Sci 542:212\u2013227","journal-title":"Inf Sci"},{"issue":"5","key":"14804_CR7","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MSP.2015.2438131","volume":"32","author":"M Barni","year":"2015","unstructured":"Barni M, Droandi G, Lazzeretti R (2015) Privacy protection in biometric-based recognition systems: a marriage between cryptography and signal processing. IEEE Signal Process Mag 32(5):66\u201376","journal-title":"IEEE Signal Process Mag"},{"key":"14804_CR8","doi-asserted-by":"crossref","first-page":"108041","DOI":"10.1016\/j.sigpro.2021.108041","volume":"183","author":"X Chai","year":"2021","unstructured":"Chai X, Zhi X, Gan Z, Zhang Y, Chen Y, Fu J (2021) Combining improved genetic algorithm and matrix semi-tensor product (stp) in color image encryption. Signal Process 183:108041","journal-title":"Signal Process"},{"key":"14804_CR9","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.optlaseng.2019.04.004","volume":"121","author":"X-D Chen","year":"2019","unstructured":"Chen X-D, Wang Y, Wang J, Wang Q-H (2019) Asymmetric color cryptosystem based on compressed sensing and equal modulus decomposition in discrete fractional random transform domain. Opt Lasers Eng 121:143\u2013149","journal-title":"Opt Lasers Eng"},{"key":"14804_CR10","doi-asserted-by":"crossref","unstructured":"Dwivedi R, Dey S, Sharma M A, Goel A (2019) A fingerprint based crypto-biometric system for secure communication. J Ambient Intell Humaniz Comput, 1\u201315","DOI":"10.1007\/s12652-019-01437-5"},{"key":"14804_CR11","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.patcog.2017.01.024","volume":"67","author":"M Gomez-Barrero","year":"2017","unstructured":"Gomez-Barrero M, Maiorana E, Galbally J, Campisi P, Fierrez J (2017) Multi-biometric template protection based on homomorphic encryption. Pattern Recogn 67:149\u2013163","journal-title":"Pattern Recogn"},{"key":"14804_CR12","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.inffus.2017.10.003","volume":"42","author":"M Gomez-Barrero","year":"2018","unstructured":"Gomez-Barrero M, Rathgeb C, Li G, Ramachandra R, Galbally J, Busch C (2018) Multi-biometric template protection based on bloom filters. Inform Fus 42:37\u201350","journal-title":"Inform Fus"},{"key":"14804_CR13","unstructured":"Huang G B, Mattar M, Berg T, Learned-Miller E (2008) Labeled faces in the wild: a database forstudying face recognition in unconstrained environments. In: Workshop on faces in\u2019Real-Life\u2019Images: detection, alignment, and recognition"},{"key":"14804_CR14","first-page":"102428","volume":"50","author":"KC Jithin","year":"2020","unstructured":"Jithin KC, Sankar S (2020) Colour image encryption algorithm combining arnold map, dna sequence operation, and a mandelbrot set. J Inform Secur Applic 50:102428","journal-title":"J Inform Secur Applic"},{"issue":"5","key":"14804_CR15","doi-asserted-by":"crossref","first-page":"1671","DOI":"10.1016\/j.ijleo.2013.09.040","volume":"125","author":"A Kadir","year":"2014","unstructured":"Kadir A, Hamdulla A, Guo W-Q (2014) Color image encryption using skew tent map and hyper chaotic system of 6th-order cnn. Optik 125(5):1671\u20131675","journal-title":"Optik"},{"key":"14804_CR16","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/j.ijleo.2016.10.036","volume":"129","author":"A Kadir","year":"2017","unstructured":"Kadir A, Aili M, Sattar M (2017) Color image encryption scheme using coupled hyper chaotic system with multiple impulse injections. Optik 129:231\u2013238","journal-title":"Optik"},{"issue":"6","key":"14804_CR17","doi-asserted-by":"crossref","first-page":"1595","DOI":"10.1109\/TCSVT.2018.2851983","volume":"29","author":"X Kang","year":"2018","unstructured":"Kang X, Ming A, Tao R (2018) Reality-preserving multiple parameter discrete fractional angular transform and its application to color image encryption. IEEE Trans Circuits Syst Video Technol 29(6):1595\u20131607","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"1","key":"14804_CR18","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/s11831-018-9298-8","volume":"27","author":"M Kaur","year":"2020","unstructured":"Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods Eng 27(1):15\u201343","journal-title":"Arch Comput Methods Eng"},{"issue":"9","key":"14804_CR19","doi-asserted-by":"crossref","first-page":"11017","DOI":"10.1007\/s11042-017-4966-5","volume":"77","author":"S Kumar","year":"2018","unstructured":"Kumar S, Singh S K, Singh A K, Tiwari S, Singh R S (2018) Privacy preserving security using biometrics in cloud computing. Multimed Tools Applic 77(9):11017\u201311039","journal-title":"Multimed Tools Applic"},{"issue":"10","key":"14804_CR20","doi-asserted-by":"crossref","first-page":"3367","DOI":"10.1142\/S0218127405013988","volume":"15","author":"Y Li","year":"2005","unstructured":"Li Y, Tang WKS, Chen G (2005) Generating hyperchaos via state feedback control. Int J Bifur Chaos 15(10):3367\u20133375","journal-title":"Int J Bifur Chaos"},{"key":"14804_CR21","doi-asserted-by":"crossref","unstructured":"Li H, Lin Z, Shen X, Brandt J, Hua G (2015) A convolutional neural network cascade for face detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), pp 5325\u20135334","DOI":"10.1109\/CVPR.2015.7299170"},{"key":"14804_CR22","doi-asserted-by":"crossref","unstructured":"Li Q, Wang X, Ma B, Wang X, Wang C, Gao S, Shi Y (2021) Concealed attack for robust watermarking based on generative model and perceptual loss. IEEE Trans Circuits Syst Video Technol","DOI":"10.1109\/TCSVT.2021.3138795"},{"issue":"6","key":"14804_CR23","doi-asserted-by":"crossref","first-page":"814","DOI":"10.11834\/jig.170433","volume":"23","author":"Y Liang","year":"2018","unstructured":"Liang Y, Zhang SW (2018) Image encryption algorithm based on bit-level synchronous permutation diffusion and pixel-level annular diffusion. J Image Graph 23(6):814\u2013826","journal-title":"J Image Graph"},{"issue":"10","key":"14804_CR24","doi-asserted-by":"crossref","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","volume":"59","author":"H Liu","year":"2010","unstructured":"Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Applic 59(10):3320\u20133327","journal-title":"Comput Math Applic"},{"issue":"16\u201317","key":"14804_CR25","doi-asserted-by":"crossref","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","volume":"284","author":"H Liu","year":"2011","unstructured":"Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16\u201317):3895\u20133903","journal-title":"Opt Commun"},{"issue":"5","key":"14804_CR26","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu H, Wang X, et al. (2012) Image encryption using dna complementary rule and chaotic maps. Appl Soft Comput 12(5):1457\u20131466","journal-title":"Appl Soft Comput"},{"key":"14804_CR27","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.sigpro.2015.01.016","volume":"113","author":"H Liu","year":"2015","unstructured":"Liu H, Kadir A (2015) Asymmetric color image encryption scheme using 2d discrete-time map. Signal Process 113:104\u2013112","journal-title":"Signal Process"},{"key":"14804_CR28","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1175\/1520-0469(1963)020<0130:DNF>2.0.CO;2","volume":"20","author":"E Lorenz","year":"1963","unstructured":"Lorenz E (1963) Deterministic non-period flows. J Atmos Sci 20:130\u2013141","journal-title":"J Atmos Sci"},{"key":"14804_CR29","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/j.sigpro.2019.03.022","volume":"161","author":"Y Luo","year":"2019","unstructured":"Luo Y, Lin J, Liu J, Wei D, Cao L, Zhou R, Cao Y, Ding X (2019) A robust image encryption algorithm based on Chua\u2019s circuit and compressive sensing. Signal Process 161:227\u2013247","journal-title":"Signal Process"},{"issue":"4","key":"14804_CR30","doi-asserted-by":"crossref","first-page":"2477","DOI":"10.1109\/TIT.2018.2873132","volume":"65","author":"N Merhav","year":"2018","unstructured":"Merhav N (2018) Ensemble performance of biometric authentication systems based on secret key generation. IEEE Trans Inf Theory 65(4):2477\u20132491","journal-title":"IEEE Trans Inf Theory"},{"key":"14804_CR31","doi-asserted-by":"crossref","unstructured":"Morampudi M K, Prasad MVNK, Raju USN (2020) Privacy-preserving iris authentication using fully homomorphic encryption. Multimedia Tools and Applications, 1\u201323","DOI":"10.1016\/j.compeleceng.2020.106924"},{"issue":"3","key":"14804_CR32","doi-asserted-by":"crossref","first-page":"2877","DOI":"10.1007\/s11071-020-05625-3","volume":"100","author":"PK Naskar","year":"2020","unstructured":"Naskar P K, Bhattacharyya S, Nandy D, Chaudhuri A (2020) A robust image encryption scheme using chaotic tent map and cellular automata. Nonlinear Dyn 100(3):2877\u20132898","journal-title":"Nonlinear Dyn"},{"key":"14804_CR33","unstructured":"Redmon J, Farhadi A (2018) Yolov3: an incremental improvement. arXiv:1804.02767"},{"key":"14804_CR34","doi-asserted-by":"crossref","first-page":"137116","DOI":"10.1109\/ACCESS.2020.3011724","volume":"8","author":"A Sambas","year":"2020","unstructured":"Sambas A, Vaidyanathan S, Tlelo-Cuautle E, Abd-El-Atty B, Abd El-Latif A A, Guill\u00e9n-Fern\u00e1ndez O, Hidayat Y, Gundara G, et al. (2020) A 3-d multi-stable system with a peanut-shaped equilibrium curve: circuit design, fpga realization, and an application to image encryption. IEEE Access 8:137116\u2013137132","journal-title":"IEEE Access"},{"issue":"37","key":"14804_CR35","doi-asserted-by":"crossref","first-page":"28023","DOI":"10.1007\/s11042-020-09182-0","volume":"79","author":"D Shah","year":"2020","unstructured":"Shah D, Shah T (2020) A novel discrete image encryption algorithm based on finite algebraic structures. Multimed Tools Applic 79(37):28023\u201328042","journal-title":"Multimed Tools Applic"},{"key":"14804_CR36","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1016\/j.ijleo.2018.01.064","volume":"159","author":"A ur Rehman","year":"2018","unstructured":"ur Rehman A, Liao X, Ashraf R, Ullah S, Wang H (2018) A color image encryption technique using exclusive-or with dna complementary rules based on chaos theory and sha-2. Optik 159:348\u2013367","journal-title":"Optik"},{"key":"14804_CR37","doi-asserted-by":"crossref","first-page":"162921","DOI":"10.1016\/j.ijleo.2019.06.021","volume":"193","author":"MY Valandar","year":"2019","unstructured":"Valandar M Y, Barani M J, Ayubi P (2019) A fast color image encryption technique based on three dimensional chaotic map. Optik 193:162921","journal-title":"Optik"},{"key":"14804_CR38","doi-asserted-by":"crossref","unstructured":"Viola P, Jones M (2001) Rapid object detection using a boosted cascade of simple features. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), vol 1. IEEE, pp I\u2013I","DOI":"10.1109\/CVPR.2001.990517"},{"key":"14804_CR39","doi-asserted-by":"crossref","unstructured":"Wang X, Liu P (2021) A new full chaos coupled mapping lattice and its application in privacy image encryption. IEEE Trans Circuits Syst I Regul Pap","DOI":"10.1109\/TCSI.2021.3133318"},{"key":"14804_CR40","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.ins.2021.04.013","volume":"569","author":"X Wang","year":"2021","unstructured":"Wang X, Yang J (2021) A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Inf Sci 569:217\u2013240","journal-title":"Inf Sci"},{"key":"14804_CR41","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.ins.2021.07.096","volume":"579","author":"X Wang","year":"2021","unstructured":"Wang X, Zhang M (2021) An image encryption algorithm based on new chaos and diffusion values of a truth table. Inf Sci 579:128\u2013149","journal-title":"Inf Sci"},{"issue":"4","key":"14804_CR42","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"X Wang","year":"2012","unstructured":"Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101\u20131108","journal-title":"Signal Process"},{"key":"14804_CR43","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"X Wang","year":"2015","unstructured":"Wang X, Zhang Y-Q, Bao X-M (2015) A novel chaotic image encryption scheme using dna sequence operations. Opt Lasers Eng 73:53\u201361","journal-title":"Opt Lasers Eng"},{"key":"14804_CR44","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10\u201318","journal-title":"Opt Lasers Eng"},{"key":"14804_CR45","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1016\/j.sigpro.2017.11.005","volume":"144","author":"H Wang","year":"2018","unstructured":"Wang H, Xiao D, Chen X, Huang H (2018) Cryptanalysis and enhancements of image encryption using combination of the 1d chaotic map. Signal Process 144:444\u2013452","journal-title":"Signal Process"},{"issue":"12","key":"14804_CR46","doi-asserted-by":"crossref","first-page":"18875","DOI":"10.1007\/s11042-021-10511-0","volume":"80","author":"K Wang","year":"2021","unstructured":"Wang K, Wu X, Wang H, Kan H, Kurths J (2021) New color image cryptosystem via sha-512 and hybrid domain. Multimed Tools Applic 80 (12):18875\u201318899","journal-title":"Multimed Tools Applic"},{"key":"14804_CR47","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.asoc.2015.08.008","volume":"37","author":"X Wu","year":"2015","unstructured":"Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on dna sequences and multiple improved 1d chaotic maps. Appl Soft Comput 37:24\u201339","journal-title":"Appl Soft Comput"},{"key":"14804_CR48","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1016\/j.sigpro.2018.02.028","volume":"148","author":"X Wu","year":"2018","unstructured":"Wu X, Wang K, Wang X, Kan H, Kurths J (2018) Color image dna encryption using nca map-based cml and one-time keys. Signal Process 148:272\u2013287","journal-title":"Signal Process"},{"key":"14804_CR49","doi-asserted-by":"crossref","unstructured":"Xian Y, Wang X, Teng L (2021) Double parameters fractal sorting matrix and its application in image encryption. IEEE Trans Circuits Syst Video Technol","DOI":"10.1016\/j.ins.2020.09.055"},{"key":"14804_CR50","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.optlaseng.2019.04.011","volume":"121","author":"Q Xu","year":"2019","unstructured":"Xu Q, Sun K, Cao C, Zhu C (2019) A fast image encryption algorithm based on compressive sensing and hyperchaotic map. Opt Lasers Eng 121:203\u2013214","journal-title":"Opt Lasers Eng"},{"key":"14804_CR51","doi-asserted-by":"crossref","unstructured":"Xu Y, Yan W, Yang G, Luo J, Li T, He J (2019) Centerface: joint face detection and alignment using face as point. Sci Program, 2020","DOI":"10.1155\/2020\/7845384"},{"key":"14804_CR52","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1016\/j.optlastec.2018.04.030","volume":"106","author":"H- Xue","year":"2018","unstructured":"Xue H-, Du J, Li S-, Ma W- (2018) Region of interest encryption for color images based on a hyperchaotic system with three positive Lyapunov exponets. Opt Laser Technol 106:506\u2013516","journal-title":"Opt Laser Technol"},{"key":"14804_CR53","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.optlaseng.2016.06.006","volume":"89","author":"L Yao","year":"2017","unstructured":"Yao L, Yuan C, Qiang J, Feng S, Nie S (2017) An asymmetric color image encryption method by using deduced gyrator transform. Opt Lasers Eng 89:72\u201379","journal-title":"Opt Lasers Eng"},{"issue":"4","key":"14804_CR54","doi-asserted-by":"crossref","first-page":"4585","DOI":"10.1007\/s11042-017-4637-6","volume":"77","author":"C Yu","year":"2018","unstructured":"Yu C, Li J, Li X, Ren X, Gupta B B (2018) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Applic 77(4):4585\u20134608","journal-title":"Multimed Tools Applic"},{"issue":"10","key":"14804_CR55","doi-asserted-by":"crossref","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang K, Zhang Z, Li Z, Qiao Y (2016) Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process Lett 23(10):1499\u20131503","journal-title":"IEEE Signal Process Lett"},{"issue":"2","key":"14804_CR56","doi-asserted-by":"crossref","first-page":"2191","DOI":"10.1007\/s11042-017-4370-1","volume":"77","author":"D Zhang","year":"2018","unstructured":"Zhang D, Liao X, Yang B, Zhang Y (2018) A fast and efficient approach to color-image encryption based on compressive sensing and fractional fourier transform. Multimed Tools Applic 77(2):2191\u20132208","journal-title":"Multimed Tools Applic"},{"key":"14804_CR57","doi-asserted-by":"crossref","first-page":"105769","DOI":"10.1016\/j.optlastec.2019.105769","volume":"121","author":"K Zhou","year":"2020","unstructured":"Zhou K, Fan J, Fan H, Li M (2020) Secure image encryption scheme using double random-phase encoding and compressed sensing. Opt Laser Technol 121:105769","journal-title":"Opt Laser Technol"},{"issue":"11","key":"14804_CR58","doi-asserted-by":"crossref","first-page":"7227","DOI":"10.1007\/s11042-019-08226-4","volume":"79","author":"C Zhu","year":"2020","unstructured":"Zhu C, Gan Z, Lu Y, Chai X (2020) An image encryption algorithm based on 3-d dna level permutation and substitution scheme. Multimed Tools Applic 79(11):7227\u20137258","journal-title":"Multimed Tools Applic"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14804-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-14804-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14804-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T09:22:57Z","timestamp":1729156977000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-14804-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,30]]},"references-count":58,"journal-issue":{"issue":"26","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["14804"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-14804-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,3,30]]},"assertion":[{"value":"8 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 May 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}},{"value":"The authors declare that they have no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interests"}}]}}