{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T08:23:13Z","timestamp":1742804593495,"version":"3.37.3"},"reference-count":48,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61961022","61822109"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004479","name":"Natural Science Foundation of Jiangxi Province","doi-asserted-by":"publisher","award":["20181BBH80002"],"id":[{"id":"10.13039\/501100004479","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Signal Processing"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1016\/j.sigpro.2020.107580","type":"journal-article","created":{"date-parts":[[2020,4,4]],"date-time":"2020-04-04T00:31:18Z","timestamp":1585960278000},"page":"107580","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":108,"special_numbering":"C","title":["A visually secure image encryption scheme based on semi-tensor product compressed sensing"],"prefix":"10.1016","volume":"173","author":[{"given":"Wenying","family":"Wen","sequence":"first","affiliation":[]},{"given":"Yukun","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Yuming","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3385-8364","authenticated-orcid":false,"given":"Ming","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"6","key":"10.1016\/j.sigpro.2020.107580_bib0001","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","article-title":"Symmetric ciphers based on two-dimensional chaotic maps","volume":"8","author":"Fridrich","year":"1998","journal-title":"Int. J. Bifurcation Chaos"},{"issue":"2","key":"10.1016\/j.sigpro.2020.107580_bib0002","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JPHOT.2017.2690462","article-title":"Optical image encryption with divergent illumination and asymmetric keys","volume":"9","author":"Wang","year":"2017","journal-title":"IEEE Photonics J."},{"key":"10.1016\/j.sigpro.2020.107580_bib0003","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1016\/j.sigpro.2016.12.008","article-title":"Chaotic image cryptosystem using dna deletion and dna insertion","volume":"134","author":"Hu","year":"2017","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2020.107580_bib0004","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","article-title":"Exploiting self-adaptive permutation\u2013diffusion and dna random encoding for secure and efficient image encryption","volume":"142","author":"Chen","year":"2018","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2020.107580_bib0005","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.optlastec.2016.05.012","article-title":"Image encryption and compression based on kronecker compressed sensing and elementary cellular automata scrambling","volume":"84","author":"Chen","year":"2016","journal-title":"Opt. Laser Technol."},{"key":"10.1016\/j.sigpro.2020.107580_bib0006","first-page":"1","article-title":"An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata","author":"Chai","year":"2018","journal-title":"Neural Comput. Appl."},{"issue":"5","key":"10.1016\/j.sigpro.2020.107580_bib0007","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MNET.001.1800478","article-title":"Serious challenges and potential solutions for the industrial internet of things with edge intelligence","volume":"33","author":"Zhang","year":"2019","journal-title":"IEEE Netw."},{"key":"10.1016\/j.sigpro.2020.107580_sbref0008","doi-asserted-by":"crossref","DOI":"10.1109\/TII.2019.2957404","article-title":"A low-overhead, confidentiality-assured, and authenticated data acquisition framework for IoT","author":"Zhang","year":"2019","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"10.1016\/j.sigpro.2020.107580_bib0009","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.sigpro.2018.04.014","article-title":"A compression-diffusion-permutation strategy for securing image","volume":"150","author":"Huang","year":"2018","journal-title":"Signal Process."},{"issue":"2","key":"10.1016\/j.sigpro.2020.107580_bib0010","doi-asserted-by":"crossref","first-page":"1093","DOI":"10.1109\/COMST.2018.2878943","article-title":"Secure wireless communications based on compressive sensing: a survey","volume":"21","author":"Zhang","year":"2018","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"10.1016\/j.sigpro.2020.107580_bib0011","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.neucom.2016.04.053","article-title":"Embedding cryptographic features in compressive sensing","volume":"205","author":"Zhang","year":"2016","journal-title":"Neurocomputing"},{"issue":"2","key":"10.1016\/j.sigpro.2020.107580_bib0012","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1109\/TIT.2005.862083","article-title":"Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information","volume":"52","author":"Cand\u00e8s","year":"2006","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"10.1016\/j.sigpro.2020.107580_bib0013","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","article-title":"Compressed sensing","volume":"52","author":"Donoho","year":"2006","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"10.1016\/j.sigpro.2020.107580_bib0014","first-page":"21","article-title":"An introduction to compressive sampling [a sensing\/sampling paradigm that goes against the common knowledge in data acquisition]","volume":"25","author":"Cand\u00e8s","year":"2008","journal-title":"IEEE Signal Process. Mag."},{"key":"10.1016\/j.sigpro.2020.107580_bib0015","series-title":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","first-page":"813","article-title":"The secrecy of compressed sensing measurements","author":"Rachlin","year":"2008"},{"issue":"5","key":"10.1016\/j.sigpro.2020.107580_bib0016","doi-asserted-by":"crossref","first-page":"3442","DOI":"10.1109\/JIOT.2017.2781737","article-title":"Low-cost and confidentiality-preserving data acquisition for internet of multimedia things","volume":"5","author":"Zhang","year":"2017","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"10.1016\/j.sigpro.2020.107580_bib0017","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1109\/TIFS.2017.2749982","article-title":"Low-cost security of IoT sensor nodes with rakeness-based compressed sensing: statistical and known-plaintext attacks","volume":"13","author":"Mangia","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"10.1016\/j.sigpro.2020.107580_bib0018","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1109\/TBCAS.2017.2665659","article-title":"Secure and energy-efficient data transmission system based on chaotic compressive sensing in body-to-body networks","volume":"11","author":"Peng","year":"2017","journal-title":"IEEE Trans. Biomed. Circuits Syst."},{"issue":"2","key":"10.1016\/j.sigpro.2020.107580_bib0019","doi-asserted-by":"crossref","first-page":"1402","DOI":"10.1109\/JIOT.2018.2844727","article-title":"Compressive sensing of medical images with confidentially homomorphic aggregations","volume":"6","author":"Wang","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.sigpro.2020.107580_bib0020","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/j.sigpro.2019.03.022","article-title":"A robust image encryption algorithm based on Chua\u2019s circuit and compressive sensing","volume":"161","author":"Luo","year":"2019","journal-title":"Signal Processing"},{"key":"10.1016\/j.sigpro.2020.107580_bib0021","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.ins.2015.06.049","article-title":"Image encryption: generating visually meaningful encrypted images","volume":"324","author":"Bao","year":"2015","journal-title":"Inf. Sci."},{"key":"10.1016\/j.sigpro.2020.107580_bib0022","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.sigpro.2016.11.016","article-title":"A visually secure image encryption scheme based on compressive sensing","volume":"134","author":"Chai","year":"2017","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2020.107580_bib0023","doi-asserted-by":"crossref","first-page":"105837","DOI":"10.1016\/j.optlaseng.2019.105837","article-title":"An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding","volume":"124","author":"Chai","year":"2020","journal-title":"Opt. Lasers Eng."},{"key":"10.1016\/j.sigpro.2020.107580_bib0024","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.dsp.2016.07.003","article-title":"Semi-tensor compressed sensing","volume":"58","author":"Xie","year":"2016","journal-title":"Digit. Signal Process."},{"issue":"5","key":"10.1016\/j.sigpro.2020.107580_bib0025","doi-asserted-by":"crossref","first-page":"1013","DOI":"10.1109\/TMI.2011.2145070","article-title":"Guest editorial compressive sensing for biomedical imaging","volume":"30","author":"Wang","year":"2011","journal-title":"IEEE Trans. Med. Imaging"},{"issue":"11","key":"10.1016\/j.sigpro.2020.107580_bib0026","doi-asserted-by":"crossref","first-page":"1650191","DOI":"10.1142\/S0218127416501911","article-title":"A block compressive sensing based scalable encryption framework for protecting significant image regions","volume":"26","author":"Zhang","year":"2016","journal-title":"Int. J. Bifurcation Chaos"},{"issue":"1","key":"10.1016\/j.sigpro.2020.107580_bib0027","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1109\/TSP.2008.2007606","article-title":"A fast approach for overcomplete sparse decomposition based on smoothed l0 norm","volume":"57","author":"Mohimani","year":"2008","journal-title":"IEEE Trans. Signal Process."},{"issue":"2","key":"10.1016\/j.sigpro.2020.107580_bib0028","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1007\/s11424-007-9027-0","article-title":"A survey on semi-tensor product of matrices","volume":"20","author":"Cheng","year":"2007","journal-title":"J. Syst. Sci. Complexity"},{"issue":"3","key":"10.1016\/j.sigpro.2020.107580_bib0029","first-page":"195","article-title":"Semi-tensor product of matrices and its application to Morgens problem","volume":"44","author":"Cheng","year":"2001","journal-title":"Sci. China Ser."},{"issue":"2","key":"10.1016\/j.sigpro.2020.107580_bib0030","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/s10255-003-0097-z","article-title":"On semi-tensor product of matrices and its applications","volume":"19","author":"Cheng","year":"2003","journal-title":"Acta Math. Appl. Sin."},{"issue":"3","key":"10.1016\/j.sigpro.2020.107580_bib0031","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1049\/iet-spr.2012.0380","article-title":"Colour spaces effects on improved discrete wavelet transform-based digital image watermarking using arnold transform map","volume":"7","author":"Khalili","year":"2013","journal-title":"IET Signal Proc."},{"key":"10.1016\/j.sigpro.2020.107580_bib0032","series-title":"2009 First International Conference on Information Science and Engineering","first-page":"1164","article-title":"Arnold transformation algorithm and anti-arnold transformation algorithm","author":"Wu","year":"2009"},{"issue":"3","key":"10.1016\/j.sigpro.2020.107580_bib0033","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.1007\/s11071-018-4251-9","article-title":"A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map","volume":"93","author":"Luo","year":"2018","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"10.1016\/j.sigpro.2020.107580_bib0034","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1016\/j.cnsns.2014.06.005","article-title":"A novel image encryption algorithm based on chaos maps with Markov properties","volume":"20","author":"Liu","year":"2015","journal-title":"Commun. Nonlin. Sci. Numer. Simul."},{"issue":"3","key":"10.1016\/j.sigpro.2020.107580_bib0035","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1016\/j.aeue.2013.08.007","article-title":"Improved algorithm for image encryption based on dna encoding and multi-chaotic maps","volume":"68","author":"Zhang","year":"2014","journal-title":"AEU Int. J. Electron.Commun."},{"issue":"2","key":"10.1016\/j.sigpro.2020.107580_bib0036","first-page":"90","article-title":"Image encryption based on chaotic map and reversible integer wavelet transform","volume":"65","author":"Wei","year":"2014","journal-title":"J. Electr. Eng."},{"issue":"3","key":"10.1016\/j.sigpro.2020.107580_bib0037","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1007\/s00521-016-2490-6","article-title":"Image salient regions encryption for generating visually meaningful ciphertext image","volume":"29","author":"Wen","year":"2018","journal-title":"Neural Comput. Appl."},{"issue":"3","key":"10.1016\/j.sigpro.2020.107580_bib0038","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","article-title":"A symmetric image encryption scheme based on 3d chaotic cat maps","volume":"21","author":"Chen","year":"2004","journal-title":"Chaos Solitons Fractals"},{"key":"10.1016\/j.sigpro.2020.107580_bib0039","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.optcom.2014.12.026","article-title":"Infrared target-based selective encryption by chaotic maps","volume":"341","author":"Wen","year":"2015","journal-title":"Opt. Commun."},{"issue":"3","key":"10.1016\/j.sigpro.2020.107580_bib0040","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","article-title":"A novel chaos-based image encryption using dna sequence operation and secure hash algorithm SHA-2","volume":"83","author":"Guesmi","year":"2016","journal-title":"Nonlinear Dyn."},{"issue":"7","key":"10.1016\/j.sigpro.2020.107580_bib0041","first-page":"759","article-title":"Decision table reduction based on conditional information entropy","volume":"25","author":"Wang","year":"2002","journal-title":"Chin. J. Comput."},{"issue":"1","key":"10.1016\/j.sigpro.2020.107580_bib0042","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/BF00130487","article-title":"Color indexing","volume":"7","author":"Swain","year":"1991","journal-title":"Int. J. Comput. Vis."},{"key":"10.1016\/j.sigpro.2020.107580_bib0043","doi-asserted-by":"crossref","first-page":"105836","DOI":"10.1016\/j.optlaseng.2019.105836","article-title":"Image encryption scheme by combining the hyper-chaotic system with quantum coding","volume":"124","author":"Luo","year":"2020","journal-title":"Opt. Lasers Eng."},{"key":"10.1016\/j.sigpro.2020.107580_bib0044","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.ins.2017.02.036","article-title":"Design of image cipher using block-based scrambling and image filtering","volume":"396","author":"Hua","year":"2017","journal-title":"Inf. Sci."},{"issue":"4","key":"10.1016\/j.sigpro.2020.107580_bib0045","doi-asserted-by":"crossref","first-page":"1061","DOI":"10.1109\/TNNLS.2018.2860964","article-title":"Online robust low-rank tensor modeling for streaming data analysis","volume":"30","author":"Li","year":"2018","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.sigpro.2020.107580_bib0046","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1016\/j.snb.2018.11.034","article-title":"Automatic de-noising of close-range hyperspectral images with a wavelength-specific shearlet-based image noise reduction method","volume":"281","author":"Mishra","year":"2019","journal-title":"Sens. Actuators B"},{"key":"10.1016\/j.sigpro.2020.107580_bib0047","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.optlastec.2014.02.015","article-title":"Novel image compression\u2013encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing","volume":"62","author":"Zhou","year":"2014","journal-title":"Opt. Laser Technol."},{"key":"10.1016\/j.sigpro.2020.107580_bib0048","doi-asserted-by":"crossref","first-page":"38507","DOI":"10.1109\/ACCESS.2019.2906052","article-title":"An image encryption method based on elliptic curve ElGamal encryption and chaotic systems","volume":"7","author":"Luo","year":"2019","journal-title":"IEEE Access"}],"container-title":["Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168420301237?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168420301237?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,5,7]],"date-time":"2020-05-07T08:55:18Z","timestamp":1588841718000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0165168420301237"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":48,"alternative-id":["S0165168420301237"],"URL":"https:\/\/doi.org\/10.1016\/j.sigpro.2020.107580","relation":{},"ISSN":["0165-1684"],"issn-type":[{"type":"print","value":"0165-1684"}],"subject":[],"published":{"date-parts":[[2020,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A visually secure image encryption scheme based on semi-tensor product compressed sensing","name":"articletitle","label":"Article Title"},{"value":"Signal Processing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.sigpro.2020.107580","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"107580"}}