{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T05:26:07Z","timestamp":1736227567421,"version":"3.32.0"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T00:00:00Z","timestamp":1662681600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of King Saud University - Computer and Information Sciences"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1016\/j.jksuci.2022.09.006","type":"journal-article","created":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T07:25:33Z","timestamp":1663226733000},"page":"9252-9272","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":8,"special_numbering":"PB","title":["Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication"],"prefix":"10.1007","volume":"34","author":[{"given":"Zhihua","family":"Gan","sequence":"first","affiliation":[]},{"given":"Shiping","family":"Song","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Daojun","family":"Han","sequence":"additional","affiliation":[]},{"given":"Jiangyu","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Xiuli","family":"Chai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"18","key":"10.1016\/j.jksuci.2022.09.006_b0005","doi-asserted-by":"crossref","first-page":"28521","DOI":"10.1007\/s11042-021-11051-3","article-title":"Remodeling randomness prioritization to boost-up security of RGB image encryption","volume":"80","author":"AI-Roithy","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.jksuci.2022.09.006_b0010","doi-asserted-by":"crossref","unstructured":"Assia El Mahdaoui, Abdeldjalil Ouahabi, Mohamed Said Moulay. Image denoising using a compressive sensing approach based on regularization constraints. Sensors 22 (2022) 2199.","DOI":"10.3390\/s22062199"},{"key":"10.1016\/j.jksuci.2022.09.006_b0015","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.image.2017.10.012","article-title":"Hierarchical secret image sharing scheme in compressed sensing","volume":"61","author":"Bhattacharjee","year":"2018","journal-title":"Signal Process. Image Commun."},{"key":"10.1016\/j.jksuci.2022.09.006_b0020","doi-asserted-by":"crossref","DOI":"10.1016\/j.optlaseng.2019.105837","article-title":"An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding","volume":"124","author":"Chai","year":"2020","journal-title":"Opt. Lasers Eng."},{"key":"10.1016\/j.jksuci.2022.09.006_b0025","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2021.108041","article-title":"Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption","volume":"183","author":"Chai","year":"2021","journal-title":"Signal Process."},{"issue":"3","key":"10.1016\/j.jksuci.2022.09.006_b0030","doi-asserted-by":"crossref","first-page":"2671","DOI":"10.1007\/s11071-022-07328-3","article-title":"An image encryption scheme based on multi-objective optimization and block compressed sensing","volume":"108","author":"Chai","year":"2022","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.jksuci.2022.09.006_b0035","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.ins.2022.05.008","article-title":"Preserving privacy while revealing thumbnail for content-based encrypted image retrieval in the cloud","volume":"604","author":"Chai","year":"2022","journal-title":"Inf. Sci."},{"key":"10.1016\/j.jksuci.2022.09.006_b0040","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2021.103424","article-title":"Security measurement of a medical image communication scheme based on chaos and DNA","volume":"83","author":"Chen","year":"2022","journal-title":"J. Vis. Commun. Image R."},{"key":"10.1016\/j.jksuci.2022.09.006_b0045","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/j.optlastec.2019.01.039","article-title":"An image compression and encryption algorithm based on chaotic system and compressive sensing","volume":"115","author":"Gong","year":"2019","journal-title":"Opt. Laser Technol."},{"key":"10.1016\/j.jksuci.2022.09.006_b0050","doi-asserted-by":"crossref","first-page":"73782","DOI":"10.1109\/ACCESS.2019.2919294","article-title":"Polynomial based progressive secret image sharing scheme with smaller shadow size","volume":"7","author":"Guo","year":"2019","journal-title":"IEEE Access."},{"issue":"11","key":"10.1016\/j.jksuci.2022.09.006_b0055","doi-asserted-by":"crossref","first-page":"7951","DOI":"10.1007\/s11042-019-08427-x","article-title":"Hiding shares by multimedia image steganography for optimized counting-based secret sharing","volume":"79","author":"Gutub","year":"2020","journal-title":"Multimed. Tools Appl."},{"issue":"5","key":"10.1016\/j.jksuci.2022.09.006_b0060","doi-asserted-by":"crossref","first-page":"5591","DOI":"10.1007\/s11042-017-5293-6","article-title":"Counting-based secret sharing technique for multimedia applications","volume":"78","author":"Gutub","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.jksuci.2022.09.006_b0065","doi-asserted-by":"crossref","DOI":"10.1016\/j.optlastec.2020.106489","article-title":"Image encryption based on compressive sensing and chaos systems","volume":"132","author":"Hadj Brahim","year":"2020","journal-title":"Opt. Laser Technol."},{"issue":"39","key":"10.1016\/j.jksuci.2022.09.006_b0070","doi-asserted-by":"crossref","first-page":"30087","DOI":"10.1007\/s11042-020-09513-1","article-title":"Efficient reversible data hiding multimedia technique based on smart image interpolation","volume":"79","author":"Hassan","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.jksuci.2022.09.006_b0075","doi-asserted-by":"crossref","first-page":"22141","DOI":"10.1109\/ACCESS.2021.3054842","article-title":"An image compression and encryption algorithm based on the fractional-order simplest chaotic circuit","volume":"9","author":"Hu","year":"2021","journal-title":"IEEE Access."},{"key":"10.1016\/j.jksuci.2022.09.006_b0080","doi-asserted-by":"crossref","first-page":"8660","DOI":"10.1109\/ACCESS.2018.2890116","article-title":"Image encryption using josephus problem and filtering diffusion","volume":"7","author":"Hua","year":"2019","journal-title":"IEEE Access."},{"issue":"4","key":"10.1016\/j.jksuci.2022.09.006_b0085","doi-asserted-by":"crossref","first-page":"4505","DOI":"10.1007\/s11071-021-06472-6","article-title":"Color image encryption using orthogonal Latin squares and a new 2D chaotic system","volume":"104","author":"Hua","year":"2021","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.jksuci.2022.09.006_b0090","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2021.107998","article-title":"Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing","volume":"183","author":"Hua","year":"2021","journal-title":"Signal Process."},{"key":"10.1016\/j.jksuci.2022.09.006_b0095","doi-asserted-by":"crossref","DOI":"10.1016\/j.optcom.2021.126976","article-title":"A visually secure image encryption scheme based on 2D compressive sensing and integer wavelet transform embedding","volume":"492","author":"Huo","year":"2021","journal-title":"Opt. Commun."},{"key":"10.1016\/j.jksuci.2022.09.006_b0100","doi-asserted-by":"crossref","first-page":"117861","DOI":"10.1016\/j.eswa.2022.117861","article-title":"Color image encryption and authentication using dynamic DNA encoding and hyper chaotic system","volume":"206","author":"Jasra","year":"2022","journal-title":"Expert Syst. Appl."},{"issue":"14","key":"10.1016\/j.jksuci.2022.09.006_b0105","doi-asserted-by":"crossref","first-page":"3698","DOI":"10.1049\/ipr2.12237","article-title":"Image encryption algorithm for crowd data based on a new hyperchaotic system and Bernstein polynomial","volume":"15","author":"Jiang","year":"2021","journal-title":"IET Image Process."},{"key":"10.1016\/j.jksuci.2022.09.006_b0110","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2021.108220","article-title":"Adaptive embedding: a novel meaningful image encryption scheme based on parallel compressive sensing and slant transform","volume":"188","author":"Jiang","year":"2021","journal-title":"Signal Process."},{"key":"10.1016\/j.jksuci.2022.09.006_b0115","first-page":"1","article-title":"Meaningful image encryption based on reversible data hiding in compressive sensing domain","volume":"2018","author":"Li","year":"2018","journal-title":"Secur. Commun. Networks."},{"key":"10.1016\/j.jksuci.2022.09.006_b0120","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2022.111989","article-title":"A novel plaintext-related chaotic image encryption scheme with no additional plaintext information","volume":"158","author":"Li","year":"2022","journal-title":"Chaos Solitons Fract"},{"issue":"3","key":"10.1016\/j.jksuci.2022.09.006_b0125","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/s11859-018-1313-2","article-title":"A verifiable secret image sharing scheme based on compressive sensing","volume":"23","author":"Li","year":"2018","journal-title":"Wuhan Univ. J. Nat. Sci."},{"issue":"1","key":"10.1016\/j.jksuci.2022.09.006_b0130","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.image.2013.10.003","article-title":"A novel real-time and progressive secret image sharing with flexible shadows based on compressive sensing","volume":"29","author":"Liu","year":"2014","journal-title":"Signal Process. Image Commun."},{"key":"10.1016\/j.jksuci.2022.09.006_b0135","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.image.2018.05.004","article-title":"Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes","volume":"66","author":"Liu","year":"2018","journal-title":"Signal Process. Image Commun."},{"key":"10.1016\/j.jksuci.2022.09.006_b0140","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/j.sigpro.2019.03.022","article-title":"A robust image encryption algorithm based on Chua\u2019s circuit and compressive sensing","volume":"161","author":"Luo","year":"2019","journal-title":"Signal Process."},{"issue":"33-34","key":"10.1016\/j.jksuci.2022.09.006_b0145","doi-asserted-by":"crossref","first-page":"25115","DOI":"10.1007\/s11042-020-09034-x","article-title":"A novel chaos-based approach in conjunction with MR-SVD and pairing function for generating visually meaningful cipher images","volume":"79","author":"Musanna","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.jksuci.2022.09.006_b0150","unstructured":"Nina Pantic, How many photos will be taken in 2021?, Https:\/\/Blog.Mylio.Com\/How-Many-Photos-Will-Be-Taken-in-2021-Stats. (2021)."},{"key":"10.1016\/j.jksuci.2022.09.006_b0155","doi-asserted-by":"crossref","first-page":"170168","DOI":"10.1109\/ACCESS.2019.2955570","article-title":"Meaningful encryption: generating visually meaningful encrypted images by compressive sensing and reversible color transformation","volume":"7","author":"Ping","year":"2019","journal-title":"IEEE Access."},{"key":"10.1016\/j.jksuci.2022.09.006_b0160","article-title":"Generating visually secure encrypted images by partial block pairing-substitution and semi-tensor product compressed sensing","volume":"120","author":"Ping","year":"2022","journal-title":"Digit. Signal Process. A Rev. J."},{"issue":"18","key":"10.1016\/j.jksuci.2022.09.006_b0165","doi-asserted-by":"crossref","first-page":"25707","DOI":"10.1007\/s11042-019-07808-6","article-title":"Visually meaningful image encryption using data hiding and chaotic compressive sensing","volume":"78","author":"Ponuma","year":"2019","journal-title":"Multimed. Tools Appl."},{"issue":"11","key":"10.1016\/j.jksuci.2022.09.006_b0170","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Commun. ACM."},{"issue":"3","key":"10.1016\/j.jksuci.2022.09.006_b0175","doi-asserted-by":"crossref","first-page":"2235","DOI":"10.1007\/s11071-018-4689-9","article-title":"Joint image compression\u2013encryption scheme using entropy coding and compressive sensing","volume":"95","author":"Song","year":"2019","journal-title":"Nonlinear Dyn."},{"issue":"5","key":"10.1016\/j.jksuci.2022.09.006_b0180","doi-asserted-by":"crossref","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","article-title":"Secret image sharing","volume":"26","author":"Thien","year":"2002","journal-title":"Comput. Graph."},{"key":"10.1016\/j.jksuci.2022.09.006_b0185","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s11220-021-00357-z","article-title":"A new chaotic image encryption algorithm based on L-shaped method of dynamic block","volume":"22","author":"Wang","year":"2021","journal-title":"Sens. Imaging."},{"key":"10.1016\/j.jksuci.2022.09.006_b0190","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.cose.2019.04.010","article-title":"A robust and secure image sharing scheme with personal identity information embedded","volume":"85","author":"Wang","year":"2019","journal-title":"Comput. Secur."},{"key":"10.1016\/j.jksuci.2022.09.006_b0195","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1016\/j.ins.2021.06.032","article-title":"A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT","volume":"574","author":"Wang","year":"2021","journal-title":"Inf. Sci."},{"key":"10.1016\/j.jksuci.2022.09.006_b0200","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1016\/j.sigpro.2018.10.001","article-title":"A visually secure image encryption scheme based on parallel compressive sensing","volume":"155","author":"Wang","year":"2019","journal-title":"Signal Process."},{"key":"10.1016\/j.jksuci.2022.09.006_b0205","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1016\/j.sigpro.2020.107580","article-title":"A visually secure image encryption scheme based on semi-tensor product compressed sensing","volume":"173","author":"Wen","year":"2020","journal-title":"Signal Process."},{"issue":"2","key":"10.1016\/j.jksuci.2022.09.006_b0210","doi-asserted-by":"crossref","first-page":"1587","DOI":"10.1007\/s11071-019-05378-8","article-title":"Colour light field image encryption based on DNA sequences and chaotic systems","volume":"99","author":"Wen","year":"2020","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.jksuci.2022.09.006_b0215","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2020.107580","article-title":"A visually secure image encryption scheme based on semi-tensor product compressed sensing","volume":"173","author":"Wen","year":"2020","journal-title":"Signal Process."},{"key":"10.1016\/j.jksuci.2022.09.006_b0220","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1016\/j.image.2019.08.007","article-title":"Invertible secret image sharing with steganography and authentication for AMBTC compressed images","volume":"78","author":"Wu","year":"2019","journal-title":"Signal Process. Image Commun"},{"key":"10.1016\/j.jksuci.2022.09.006_b0225","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2020.107571","article-title":"DWT-SISA: a secure and effective discrete wavelet transform-based secret image sharing with authentication","volume":"173","author":"Xiong","year":"2020","journal-title":"Signal Process."},{"key":"10.1016\/j.jksuci.2022.09.006_b0230","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2021.108064","article-title":"CP-PSIS: CRT and polynomial-based progressive secret image sharing","volume":"185","author":"Xiong","year":"2021","journal-title":"Signal Process."},{"key":"10.1016\/j.jksuci.2022.09.006_b0235","doi-asserted-by":"crossref","first-page":"2912","DOI":"10.1109\/TIFS.2021.3065794","article-title":"Transform domain-based invertible and lossless secret image sharing with authentication","volume":"16","author":"Xiong","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.jksuci.2022.09.006_b0240","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.image.2018.11.002","article-title":"A general progressive secret image sharing construction method","volume":"71","author":"Yan","year":"2019","journal-title":"Signal Process. Image Commun."},{"issue":"7","key":"10.1016\/j.jksuci.2022.09.006_b0245","doi-asserted-by":"crossref","first-page":"2896","DOI":"10.1109\/TCSVT.2020.3025527","article-title":"A common method of share authentication in image secret sharing","volume":"31","author":"Yan","year":"2021","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.jksuci.2022.09.006_b0250","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1109\/TCSVT.2017.2771255","article-title":"K out of n region-based progressive visual cryptography","volume":"29","author":"Yang","year":"2019","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.jksuci.2022.09.006_b0255","doi-asserted-by":"crossref","DOI":"10.1016\/j.optlastec.2019.105703","article-title":"An encryption system for color image based on compressive sensing","volume":"120","author":"Yao","year":"2019","journal-title":"Opt. Laser Technol."},{"key":"10.1016\/j.jksuci.2022.09.006_b0260","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2020.107563","article-title":"Image encryption and hiding algorithm based on compressive sensing and random numbers insertion","volume":"172","author":"Ye","year":"2020","journal-title":"Signal Process."},{"issue":"12","key":"10.1016\/j.jksuci.2022.09.006_b0265","doi-asserted-by":"crossref","first-page":"7566","DOI":"10.1109\/TII.2019.2957404","article-title":"A low-overhead, confidentiality-assured, and authenticated data acquisition framework for IoT","volume":"16","author":"Zhang","year":"2020","journal-title":"IEEE Trans. Ind. Informatics."},{"issue":"10","key":"10.1016\/j.jksuci.2022.09.006_b0270","doi-asserted-by":"crossref","first-page":"6641","DOI":"10.1109\/TII.2020.2966511","article-title":"Secure transmission of compressed sampling data using edge clouds","volume":"16","author":"Zhang","year":"2020","journal-title":"IEEE Trans. Ind. Informatics."},{"issue":"10","key":"10.1016\/j.jksuci.2022.09.006_b0275","doi-asserted-by":"crossref","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","article-title":"Joint face detection and alignment using multitask cascaded convolutional networks","volume":"23","author":"Zhang","year":"2016","journal-title":"IEEE Signal Process. Lett."},{"issue":"1","key":"10.1016\/j.jksuci.2022.09.006_b0280","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1109\/TCYB.2019.2963138","article-title":"GAN-based key secret-sharing scheme in blockchain","volume":"51","author":"Zheng","year":"2021","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.jksuci.2022.09.006_b0285","doi-asserted-by":"crossref","DOI":"10.1016\/j.optlastec.2019.105769","article-title":"Secure image encryption scheme using double random-phase encoding and compressed sensing","volume":"121","author":"Zhou","year":"2020","journal-title":"Opt. Laser Technol."},{"key":"10.1016\/j.jksuci.2022.09.006_b0290","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2020.107629","article-title":"A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding","volume":"175","author":"Zhu","year":"2020","journal-title":"Signal Process."}],"container-title":["Journal of King Saud University - Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1319157822003275?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1319157822003275?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T17:19:02Z","timestamp":1736183942000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1319157822003275"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11]]},"references-count":58,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["S1319157822003275"],"URL":"https:\/\/doi.org\/10.1016\/j.jksuci.2022.09.006","relation":{},"ISSN":["1319-1578"],"issn-type":[{"type":"print","value":"1319-1578"}],"subject":[],"published":{"date-parts":[[2022,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication","name":"articletitle","label":"Article Title"},{"value":"Journal of King Saud University - Computer and Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jksuci.2022.09.006","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 The Author(s). Published by Elsevier B.V. on behalf of King Saud University.","name":"copyright","label":"Copyright"}]}}