{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T17:44:25Z","timestamp":1724435065375},"reference-count":55,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802111","61872125","61871175"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Foundation of Henan Province of China","award":["182102210027","182102410051"]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2018T110723","2016M602235"],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Scientific Research Projects for Colleges and Universities of Henan Province","award":["19A413001"]},{"name":"Chongqing Key Laboratory of Mobile Communications Technology","award":["cqupt-mct-201901"]},{"name":"Graduate Education Innovation and Quality Improvement Project of Henan University","award":["SYL18020105"]},{"name":"Henan Higher Education Teaching Reform Research and Practice Project","award":["2019SJGLX080Y"]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Signal Processing"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1016\/j.sigpro.2020.107525","type":"journal-article","created":{"date-parts":[[2020,2,6]],"date-time":"2020-02-06T00:37:09Z","timestamp":1580949429000},"page":"107525","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":70,"special_numbering":"C","title":["Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy"],"prefix":"10.1016","volume":"171","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-1609-0624","authenticated-orcid":false,"given":"Xiuli","family":"Chai","sequence":"first","affiliation":[]},{"given":"Haiyang","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1138-1887","authenticated-orcid":false,"given":"Zhihua","family":"Gan","sequence":"additional","affiliation":[]},{"given":"Yushu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yiran","family":"Chen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.sigpro.2020.107525_bib0001","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s11071-012-0707-5","article-title":"A new algorithm of the combination of image compression and encryption technology based on cross chaotic map","volume":"72","author":"Tong","year":"2013","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.sigpro.2020.107525_bib0002","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.cnsns.2015.02.025","article-title":"Secure binary arithmetic coding based on digitalized modified logistic map and linear feedback shift register","volume":"27","author":"Zhang","year":"2015","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"10.1016\/j.sigpro.2020.107525_bib0003","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.optlaseng.2019.04.011","article-title":"A fast image encryption algorithm based on compressive sensing and hyperchaotic map","volume":"121","author":"Xu","year":"2019","journal-title":"Opt. Lasers Eng."},{"key":"10.1016\/j.sigpro.2020.107525_bib0004","doi-asserted-by":"crossref","first-page":"2507","DOI":"10.1109\/ACCESS.2016.2569421","article-title":"A review of compressive sensing in information security field","volume":"4","author":"Zhang","year":"2016","journal-title":"IEEE Access"},{"key":"10.1016\/j.sigpro.2020.107525_bib0005","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/TSP.2013.2284762","article-title":"Permutation meets parallel compressed sensing: How to relax restricted isometry property property for 2D sparse signals","volume":"62","author":"Fang","year":"2014","journal-title":"IEEE T. Signal Process"},{"key":"10.1016\/j.sigpro.2020.107525_bib0006","doi-asserted-by":"crossref","unstructured":"Rachlin Y, Baron D. The secrecy of compressed sensing measurements. In: 2008 46 th Annual Allerton Conference on Communication, Control and Computing, 2008: 813\u2013817.","DOI":"10.1109\/ALLERTON.2008.4797641"},{"key":"10.1016\/j.sigpro.2020.107525_bib0007","doi-asserted-by":"crossref","first-page":"2235","DOI":"10.1007\/s11071-018-4689-9","article-title":"Joint image compression-encryption scheme using entropy coding and compressive sensing","volume":"95","author":"Song","year":"2019","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.sigpro.2020.107525_bib0008","article-title":"An efficient chaos-based compression and encryption scheme using block compressive sensing and elementary cellular automata","author":"Chai","year":"2018","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.sigpro.2020.107525_bib0009","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.optcom.2014.12.084","article-title":"Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform","volume":"343","author":"Zhou","year":"2015","journal-title":"Opt. Commun."},{"key":"10.1016\/j.sigpro.2020.107525_bib0010","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.optlaseng.2018.05.014","article-title":"Double-image compression and encryption algorithm based on co-sparse representation and random pixel exchanging","volume":"110","author":"Zhou","year":"2018","journal-title":"Opt. Lasers Eng."},{"key":"10.1016\/j.sigpro.2020.107525_bib0011","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.sigpro.2018.04.014","article-title":"A compression-diffusion-permutation strategy for securing image","volume":"150","author":"Huang","year":"2018","journal-title":"Signal Process"},{"key":"10.1016\/j.sigpro.2020.107525_bib0012","doi-asserted-by":"crossref","first-page":"2191","DOI":"10.1007\/s11042-017-4370-1","article-title":"A fast and efficient approach to color-image encryption based on compressive sensing and fractional Fourier transform","volume":"77","author":"Zhang","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.sigpro.2020.107525_bib0013","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.sigpro.2018.02.007","article-title":"An image encryption algorithm based on chaotic system and compressive sensing","volume":"148","author":"Chai","year":"2018","journal-title":"Signal Process"},{"key":"10.1016\/j.sigpro.2020.107525_bib0014","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/j.sigpro.2019.03.022","article-title":"A robust image encryption algorithm based on Chua's circuit and compressive sensing","volume":"161","author":"Luo","year":"2019","journal-title":"Signal Process"},{"key":"10.1016\/j.sigpro.2020.107525_bib0015","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.optlastec.2014.02.015","article-title":"Novel image compression-encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing","volume":"62","author":"Zhou","year":"2014","journal-title":"Opt. Laser Technol."},{"key":"10.1016\/j.sigpro.2020.107525_bib0016","first-page":"197","article-title":"Image encryption: generating visually meaningful encrypted images. Inf","volume":"324","author":"Bao","year":"2015","journal-title":"Sci"},{"key":"10.1016\/j.sigpro.2020.107525_bib0017","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.optlaseng.2016.10.009","article-title":"An algorithm for encryption of secret images into meaningful images","volume":"90","author":"Kanso","year":"2017","journal-title":"Opt. Lasers Eng."},{"key":"10.1016\/j.sigpro.2020.107525_bib0018","series-title":"Proceedings of the 2016 IEEE Students\u2019 Technology Symposium","first-page":"266","article-title":"An efficient visually meaningful image encryption using Arnold transform","author":"Manikandan","year":"2016"},{"key":"10.1016\/j.sigpro.2020.107525_bib0019","article-title":"Eliminating the texture features in visually meaningful cipher images","author":"Yang","year":"2017","journal-title":"Inf. Sci."},{"key":"10.1016\/j.sigpro.2020.107525_bib0020","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.sigpro.2016.11.016","article-title":"A visually secure image encryption scheme based on compressive sensing","volume":"134","author":"Chai","year":"2017","journal-title":"Signal Process"},{"key":"10.1016\/j.sigpro.2020.107525_bib0021","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1016\/j.sigpro.2018.10.001","article-title":"A visually secure image encryption scheme based on parallel compressive sensing","volume":"155","author":"Wang","year":"2019","journal-title":"Signal Process"},{"issue":"12","key":"10.1016\/j.sigpro.2020.107525_bib0022","first-page":"36","article-title":"Novel four-wing hyper-chaos system and its application in image encryption","volume":"53","author":"Zhan","year":"2017","journal-title":"Comput. Eng. Appl."},{"key":"10.1016\/j.sigpro.2020.107525_bib0023","first-page":"2322","article-title":"Dynamic analysis of digital chaotic maps via state-mapping networks","volume":"66","author":"Li","year":"2019","journal-title":"IEEE T. Circuits- I"},{"key":"10.1016\/j.sigpro.2020.107525_bib0024","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1016\/j.eswa.2018.11.041","article-title":"Central pixel selection strategy based on local gray-value distribution by using gradient information to enhance LBP for texture classification","volume":"120","author":"Pan","year":"2019","journal-title":"Expert syst. Appl."},{"issue":"4","key":"10.1016\/j.sigpro.2020.107525_bib0025","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","article-title":"Compressed sensing","volume":"52","author":"Donoho","year":"2006","journal-title":"IEEE T. Inform. Theory"},{"key":"10.1016\/j.sigpro.2020.107525_bib0026","first-page":"1433","article-title":"Compressive sampling","volume":"3","author":"Emmanue","year":"2006","journal-title":"Int. Congr. Math."},{"issue":"12","key":"10.1016\/j.sigpro.2020.107525_bib0027","doi-asserted-by":"crossref","first-page":"4203","DOI":"10.1109\/TIT.2005.858979","article-title":"Decoding by linear programming","volume":"51","author":"Candes","year":"2005","journal-title":"IEEE T. Inform. Theory"},{"key":"10.1016\/j.sigpro.2020.107525_bib0028","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.sigpro.2014.03.039","article-title":"Iterative gradient projection algorithm for two-dimensional compressive sensing sparse image reconstruction","volume":"104","author":"Chen","year":"2014","journal-title":"Signal Process"},{"key":"10.1016\/j.sigpro.2020.107525_bib0029","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.ins.2017.05.009","article-title":"2D compressive sensing and multi-feature fusion for effective 3D shape retrieval","volume":"409-410","author":"Zhou","year":"2017","journal-title":"Inf. Sci."},{"issue":"7","key":"10.1016\/j.sigpro.2020.107525_bib0030","doi-asserted-by":"crossref","first-page":"1589","DOI":"10.1016\/j.sigpro.2011.01.002","article-title":"Two-dimensional random projection","volume":"91","author":"Eftekhari","year":"2011","journal-title":"Signal Process"},{"issue":"12","key":"10.1016\/j.sigpro.2020.107525_bib0031","doi-asserted-by":"crossref","first-page":"3397","DOI":"10.1109\/78.258082","article-title":"Matching pursuits with time-frequency dictionaries","volume":"41","author":"Mallat","year":"1993","journal-title":"IEEE T. Signal Process."},{"key":"10.1016\/j.sigpro.2020.107525_bib0032","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/j.acha.2008.07.002","article-title":"CoSaMP: iterative signal recovery from incomplete and inaccurate samples","volume":"26","author":"Needell","year":"2009","journal-title":"Appl. Comput. Harmon"},{"key":"10.1016\/j.sigpro.2020.107525_bib0033","first-page":"289","article-title":"A fast approach for over complete sparse decomposition based on smoothed l 0 norm. IEEE T","volume":"57","author":"Mohimani","year":"2009","journal-title":"Signal Process"},{"key":"10.1016\/j.sigpro.2020.107525_bib0034","unstructured":"https:\/\/www.sciencedirect.com\/topics\/engineering\/singular-value-decompostion."},{"issue":"28","key":"10.1016\/j.sigpro.2020.107525_bib0035","first-page":"102","article-title":"An optimization algorithm for measurement matrix in compressed sensing","volume":"8","author":"Tian","year":"2015","journal-title":"Electron. Sci. Technol."},{"key":"10.1016\/j.sigpro.2020.107525_bib0036","article-title":"Visually meaningful multi-image encryption scheme","year":"2018","journal-title":"Arab. J. Sci. Eng."},{"key":"10.1016\/j.sigpro.2020.107525_bib0037","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1007\/s11071-015-2008-2","article-title":"A novel color image encryption algorithm based on spatial permutation and quantum chaotic map","volume":"81","year":"2015","journal-title":"Nonlinear Dyn."},{"key":"10.1016\/j.sigpro.2020.107525_bib0038","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.ijleo.2017.07.063","article-title":"Chandranbabu. Crypt analysis of an image compression-encryption algorithm and a modified scheme using compressive sensing","volume":"147","author":"Ponnaian","year":"2017","journal-title":"Opt. - Int. J. Light Electron Opt"},{"key":"10.1016\/j.sigpro.2020.107525_bib0039","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.optlastec.2017.09.008","article-title":"Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression","volume":"99","author":"Chen","year":"2018","journal-title":"Opt. Laser Technol."},{"issue":"1","key":"10.1016\/j.sigpro.2020.107525_bib0040","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","article-title":"A novel image encryption scheme based on improved hyperchaotic sequences","volume":"285","author":"Zhu","year":"2012","journal-title":"Opt. Commun."},{"key":"10.1016\/j.sigpro.2020.107525_bib0041","doi-asserted-by":"crossref","DOI":"10.1016\/j.optlaseng.2019.105837","article-title":"An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding","volume":"124","author":"Chai","year":"2020","journal-title":"Opt Lasers Eng"},{"issue":"5","key":"10.1016\/j.sigpro.2020.107525_bib0042","first-page":"628","article-title":"Color image encryption using one-time keys and coupled chaotic systems","volume":"29","author":"Dong","year":"2014","journal-title":"Signal Process: Image"},{"key":"10.1016\/j.sigpro.2020.107525_bib0043","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.optcom.2014.12.043","article-title":"A color image encryption with heterogeneous bit-permutation and correlated chaos","volume":"342","author":"Wang","year":"2015","journal-title":"Opt. Commun."},{"key":"10.1016\/j.sigpro.2020.107525_bib0044","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","article-title":"Local Shannon entropy measure with statistical tests for image randomness","volume":"222","author":"Wu","year":"2013","journal-title":"Inf Sci."},{"key":"10.1016\/j.sigpro.2020.107525_bib0045","doi-asserted-by":"crossref","first-page":"7111","DOI":"10.1007\/s00521-018-3541-y","article-title":"A chaotic image encryption algorithm based on 3-D bit-plane permutation","volume":"31","author":"Gan","year":"2019","journal-title":"Neural Comput. Appl"},{"issue":"2","key":"10.1016\/j.sigpro.2020.107525_bib0046","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1016\/j.jss.2011.08.017","article-title":"A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system","volume":"85","author":"Wei","year":"2012","journal-title":"J. Syst. Software"},{"key":"10.1016\/j.sigpro.2020.107525_bib0047","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.sigpro.2015.01.016","article-title":"Asymmetric color image encryption scheme using 2D discrete-time map","volume":"113","author":"Liu","year":"2015","journal-title":"Signal Process"},{"key":"10.1016\/j.sigpro.2020.107525_bib0048","doi-asserted-by":"crossref","first-page":"8660","DOI":"10.1109\/ACCESS.2018.2890116","article-title":"Image encryption using josephus problem and filtering diffusion","volume":"7","author":"Hua","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.sigpro.2020.107525_bib0049","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2019.107373","article-title":"Characteristic analysis of the fractional-order hyperchaotic complex system and its image encryption application","volume":"169","author":"Yang","year":"2020","journal-title":"Signal Process"},{"key":"10.1016\/j.sigpro.2020.107525_bib0050","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.sigpro.2018.09.029","article-title":"A color image cryptosystem based on dynamic DNA encryption and chaos","volume":"155","author":"Chai","year":"2019","journal-title":"Signal Process"},{"key":"10.1016\/j.sigpro.2020.107525_bib0051","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MMUL.2018.2873472","article-title":"Cryptanalyzing an image encryption algorithm based on autoblocking electrocardiography","volume":"25","author":"Li","year":"2018","journal-title":"IEEE Multimed."},{"key":"10.1016\/j.sigpro.2020.107525_bib0052","doi-asserted-by":"crossref","first-page":"75834","DOI":"10.1109\/ACCESS.2018.2883690","article-title":"Cryptanalysis of a chaotic image encryption algorithm based on information entropy","volume":"6","author":"Li","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.sigpro.2020.107525_bib0053","article-title":"When an attacker meets a cipher-image in 2018: a year in review","volume":"48","author":"Li","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.sigpro.2020.107525_bib0054","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2019.107340","article-title":"An improved image encryption algorithm with finite computing precision","volume":"168","author":"Chen","year":"2020","journal-title":"Signal Process"},{"key":"10.1016\/j.sigpro.2020.107525_bib0055","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.sigpro.2017.08.020","article-title":"A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map","volume":"143","author":"Cao","year":"2018","journal-title":"Signal Process"}],"container-title":["Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168420300682?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168420300682?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,7,12]],"date-time":"2020-07-12T22:18:16Z","timestamp":1594592296000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0165168420300682"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":55,"alternative-id":["S0165168420300682"],"URL":"https:\/\/doi.org\/10.1016\/j.sigpro.2020.107525","relation":{},"ISSN":["0165-1684"],"issn-type":[{"value":"0165-1684","type":"print"}],"subject":[],"published":{"date-parts":[[2020,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy","name":"articletitle","label":"Article Title"},{"value":"Signal Processing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.sigpro.2020.107525","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"107525"}}