Exploiting high-quality reconstruction image encryption strategy by optimized orthogonal compressive sensing
Compressive sensing is favored because it breaks through the constraints of Nyquist sampling law in signal reconstruction. However, the security defects of joint compression encryption and the problem of low quality of reconstructed image restoration need to be solved urgently. In view of this, this...
Saved in:
Published in | Scientific reports Vol. 14; no. 1; pp. 8805 - 17 |
---|---|
Main Authors | , , , , , , , |
Format | Journal Article |
Language | English |
Published |
London
Nature Publishing Group UK
16.04.2024
Nature Publishing Group Nature Portfolio |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Compressive sensing is favored because it breaks through the constraints of Nyquist sampling law in signal reconstruction. However, the security defects of joint compression encryption and the problem of low quality of reconstructed image restoration need to be solved urgently. In view of this, this paper proposes a compressive sensing image encryption scheme based on optimized orthogonal measurement matrix. Utilizing a combination of DWT and OMP, along with chaos, the proposed scheme achieves high-security image encryption and superior quality in decryption reconstruction. Firstly, the orthogonal optimization method is used to improve the chaotic measurement matrix. Combined with Part Hadamard matrix, the measurement matrix with strong orthogonal characteristics is constructed by Kronecker product. Secondly, the original image is sparsely represented by DWT. Meanwhile, Arnold scrambling is used to disturb the correlation between its adjacent pixels. Following this, the image is compressed and measured in accordance with the principles of compressive sensing and obtain the intermediate image to be encrypted. Finally, the chaotic sequence generated based on 2D-LSCM is used to perform on odd-even interleaved diffusion and row-column permutation at bit-level to obtain the final ciphertext. The experimental results show that this scheme meets the cryptographic requirements of obfuscation, diffusion and avalanche effects, and also has a large key space, which is sufficient to resist brute-force cracking attacks. Based on the sparse and reconstruction algorithm of compressive sensing proposed in this paper, it has better image restoration quality than similar algorithms. Consequently, the compressive sensing image encryption scheme enhances both security and reconstruction quality, presenting promising applications in the evolving landscape of privacy protection for network big data. |
---|---|
AbstractList | Compressive sensing is favored because it breaks through the constraints of Nyquist sampling law in signal reconstruction. However, the security defects of joint compression encryption and the problem of low quality of reconstructed image restoration need to be solved urgently. In view of this, this paper proposes a compressive sensing image encryption scheme based on optimized orthogonal measurement matrix. Utilizing a combination of DWT and OMP, along with chaos, the proposed scheme achieves high-security image encryption and superior quality in decryption reconstruction. Firstly, the orthogonal optimization method is used to improve the chaotic measurement matrix. Combined with Part Hadamard matrix, the measurement matrix with strong orthogonal characteristics is constructed by Kronecker product. Secondly, the original image is sparsely represented by DWT. Meanwhile, Arnold scrambling is used to disturb the correlation between its adjacent pixels. Following this, the image is compressed and measured in accordance with the principles of compressive sensing and obtain the intermediate image to be encrypted. Finally, the chaotic sequence generated based on 2D-LSCM is used to perform on odd-even interleaved diffusion and row-column permutation at bit-level to obtain the final ciphertext. The experimental results show that this scheme meets the cryptographic requirements of obfuscation, diffusion and avalanche effects, and also has a large key space, which is sufficient to resist brute-force cracking attacks. Based on the sparse and reconstruction algorithm of compressive sensing proposed in this paper, it has better image restoration quality than similar algorithms. Consequently, the compressive sensing image encryption scheme enhances both security and reconstruction quality, presenting promising applications in the evolving landscape of privacy protection for network big data. Compressive sensing is favored because it breaks through the constraints of Nyquist sampling law in signal reconstruction. However, the security defects of joint compression encryption and the problem of low quality of reconstructed image restoration need to be solved urgently. In view of this, this paper proposes a compressive sensing image encryption scheme based on optimized orthogonal measurement matrix. Utilizing a combination of DWT and OMP, along with chaos, the proposed scheme achieves high-security image encryption and superior quality in decryption reconstruction. Firstly, the orthogonal optimization method is used to improve the chaotic measurement matrix. Combined with Part Hadamard matrix, the measurement matrix with strong orthogonal characteristics is constructed by Kronecker product. Secondly, the original image is sparsely represented by DWT. Meanwhile, Arnold scrambling is used to disturb the correlation between its adjacent pixels. Following this, the image is compressed and measured in accordance with the principles of compressive sensing and obtain the intermediate image to be encrypted. Finally, the chaotic sequence generated based on 2D-LSCM is used to perform on odd-even interleaved diffusion and row-column permutation at bit-level to obtain the final ciphertext. The experimental results show that this scheme meets the cryptographic requirements of obfuscation, diffusion and avalanche effects, and also has a large key space, which is sufficient to resist brute-force cracking attacks. Based on the sparse and reconstruction algorithm of compressive sensing proposed in this paper, it has better image restoration quality than similar algorithms. Consequently, the compressive sensing image encryption scheme enhances both security and reconstruction quality, presenting promising applications in the evolving landscape of privacy protection for network big data.Compressive sensing is favored because it breaks through the constraints of Nyquist sampling law in signal reconstruction. However, the security defects of joint compression encryption and the problem of low quality of reconstructed image restoration need to be solved urgently. In view of this, this paper proposes a compressive sensing image encryption scheme based on optimized orthogonal measurement matrix. Utilizing a combination of DWT and OMP, along with chaos, the proposed scheme achieves high-security image encryption and superior quality in decryption reconstruction. Firstly, the orthogonal optimization method is used to improve the chaotic measurement matrix. Combined with Part Hadamard matrix, the measurement matrix with strong orthogonal characteristics is constructed by Kronecker product. Secondly, the original image is sparsely represented by DWT. Meanwhile, Arnold scrambling is used to disturb the correlation between its adjacent pixels. Following this, the image is compressed and measured in accordance with the principles of compressive sensing and obtain the intermediate image to be encrypted. Finally, the chaotic sequence generated based on 2D-LSCM is used to perform on odd-even interleaved diffusion and row-column permutation at bit-level to obtain the final ciphertext. The experimental results show that this scheme meets the cryptographic requirements of obfuscation, diffusion and avalanche effects, and also has a large key space, which is sufficient to resist brute-force cracking attacks. Based on the sparse and reconstruction algorithm of compressive sensing proposed in this paper, it has better image restoration quality than similar algorithms. Consequently, the compressive sensing image encryption scheme enhances both security and reconstruction quality, presenting promising applications in the evolving landscape of privacy protection for network big data. Abstract Compressive sensing is favored because it breaks through the constraints of Nyquist sampling law in signal reconstruction. However, the security defects of joint compression encryption and the problem of low quality of reconstructed image restoration need to be solved urgently. In view of this, this paper proposes a compressive sensing image encryption scheme based on optimized orthogonal measurement matrix. Utilizing a combination of DWT and OMP, along with chaos, the proposed scheme achieves high-security image encryption and superior quality in decryption reconstruction. Firstly, the orthogonal optimization method is used to improve the chaotic measurement matrix. Combined with Part Hadamard matrix, the measurement matrix with strong orthogonal characteristics is constructed by Kronecker product. Secondly, the original image is sparsely represented by DWT. Meanwhile, Arnold scrambling is used to disturb the correlation between its adjacent pixels. Following this, the image is compressed and measured in accordance with the principles of compressive sensing and obtain the intermediate image to be encrypted. Finally, the chaotic sequence generated based on 2D-LSCM is used to perform on odd-even interleaved diffusion and row-column permutation at bit-level to obtain the final ciphertext. The experimental results show that this scheme meets the cryptographic requirements of obfuscation, diffusion and avalanche effects, and also has a large key space, which is sufficient to resist brute-force cracking attacks. Based on the sparse and reconstruction algorithm of compressive sensing proposed in this paper, it has better image restoration quality than similar algorithms. Consequently, the compressive sensing image encryption scheme enhances both security and reconstruction quality, presenting promising applications in the evolving landscape of privacy protection for network big data. |
ArticleNumber | 8805 |
Author | Bai, Chixin Liu, Tengyu Wen, Heping Lin, Yiting Chen, Lei Hu, Yingchun He, Daojing Yang, Lincheng |
Author_xml | – sequence: 1 givenname: Heping orcidid: 0000-0002-1178-4598 surname: Wen fullname: Wen, Heping organization: Zhongshan Institute, University of Electronic Science and Technology of China, School of Information and Communication Engineering, University of Electronic Science and Technology of China – sequence: 2 givenname: Lincheng orcidid: 0009-0008-5777-9541 surname: Yang fullname: Yang, Lincheng organization: Zhongshan Institute, University of Electronic Science and Technology of China – sequence: 3 givenname: Chixin orcidid: 0009-0004-9942-810X surname: Bai fullname: Bai, Chixin organization: Zhongshan Institute, University of Electronic Science and Technology of China – sequence: 4 givenname: Yiting orcidid: 0000-0003-4159-3132 surname: Lin fullname: Lin, Yiting organization: Zhongshan Institute, University of Electronic Science and Technology of China, School of Information and Communication Engineering, University of Electronic Science and Technology of China – sequence: 5 givenname: Tengyu orcidid: 0009-0007-6275-3007 surname: Liu fullname: Liu, Tengyu organization: Zhongshan Institute, University of Electronic Science and Technology of China – sequence: 6 givenname: Lei surname: Chen fullname: Chen, Lei email: chenlei_security@163.com organization: School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), GuangDong Engineering Technology Research Center of Cryptographic Product and System Evaluation – sequence: 7 givenname: Yingchun surname: Hu fullname: Hu, Yingchun organization: GuangDong Engineering Technology Research Center of Cryptographic Product and System Evaluation – sequence: 8 givenname: Daojing orcidid: 0000-0002-3820-8128 surname: He fullname: He, Daojing organization: School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen) |
BackLink | https://www.ncbi.nlm.nih.gov/pubmed/38627475$$D View this record in MEDLINE/PubMed |
BookMark | eNp9Uk1v1DAQtVARLaV_gAOKxIVLwB9xEp8QqtpSqRIXOFuOPcl6ldipnVTN_nq8mxbaHuqLRzPvPT_PzHt05LwDhD4S_JVgVn-LBeGizjEtci5oVeW7N-iE4oLnlFF69CQ-RmcxbnE6nIqCiHfomNUlrYqKn6D-4n7svZ2s67KN7Tb57ax6Oy1ZAO1dnMKsJ-tdZgfVQQZOh2U8JFJJTdAtWbNkPqUGuwOT-TBtfOed6jPthzFAjPYOsgguphc-oLet6iOcPdyn6M_lxe_zn_nNr6vr8x83ueYFmXJRtSnQAIJyxo0hUJSqZAynFKVKVZSLkpgWqGiLugDVENxWDAgxHKBp2Sm6XnWNV1s5hmQ-LNIrKw8JHzqpwmR1D1JhRhuDheGpX4wyUSuNTUNaTHhFiU5a31etcW4GMBpc-nj_TPR5xdmN7PydJARTklSTwpcHheBvZ4iTHGzU0PfKgZ-jZLhIJjAje-jnF9Ctn0Pq5h7FRElFWZYJ9emppX9eHqeaAPUK0MHHGKCV2k5qP7bk0PaSYLnfIbnukEw7JA87JHeJSl9QH9VfJbGVFBPYdRD-236F9RdVadz4 |
CitedBy_id | crossref_primary_10_1038_s41598_024_81603_8 crossref_primary_10_1016_j_aej_2024_11_115 |
Cites_doi | 10.1016/j.ijleo.2022.170312 10.1016/j.sigpro.2018.03.010 10.1109/TCSVT.2023.3270882 10.1007/s11071-022-08119-6 10.3390/math10152751 10.1016/j.isci.2023.108610 10.1109/JIOT.2022.3228781 10.1109/TCC.2022.3171547 10.1109/TCYB.2020.2973221 10.1109/JLT.2023.3244202 10.1007/s11071-023-08516-5 10.1364/OE.467578 10.1016/j.chaos.2023.113791 10.1007/s11704-022-1419-8 10.1109/ACCESS.2021.3123571 10.1007/s11042-023-14826-y 10.1016/j.eswa.2022.119076 10.1140/epjp/s13360-023-04242-4 10.1016/j.chaos.2022.112781 10.1016/j.sigpro.2017.08.020 10.1109/TII.2022.3217482 10.1016/j.ins.2022.11.104 10.1109/JLT.2022.3226768 10.1016/j.eswa.2023.121514 10.1016/j.eswa.2022.118924 10.3390/math11143133 10.1016/j.eswa.2022.118426 10.1016/j.eswa.2023.121452 10.1007/s11042-021-10757-8 10.1109/LSP.2023.3290836 10.1016/j.ijleo.2022.169676 10.1007/s11071-021-06663-1 10.1016/j.chaos.2023.113909 10.1016/j.eswa.2022.118845 10.1016/j.image.2021.116246 10.1007/s11220-022-00407-0 10.1364/OL.480981 10.1109/LSP.2023.3308012 10.1007/s11071-023-08859-z 10.3390/math10173180 10.1016/j.optlaseng.2019.105837 10.1109/TII.2021.3125375 10.1109/JIOT.2022.3142933 10.1016/j.eswa.2024.123748 10.1109/TCSI.2023.3279371 |
ContentType | Journal Article |
Copyright | The Author(s) 2024. corrected publication 2024 2024. The Author(s). The Author(s) 2024. corrected publication 2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. The Author(s) 2024 |
Copyright_xml | – notice: The Author(s) 2024. corrected publication 2024 – notice: 2024. The Author(s). – notice: The Author(s) 2024. corrected publication 2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: The Author(s) 2024 |
DBID | C6C AAYXX CITATION NPM 3V. 7X7 7XB 88A 88E 88I 8FE 8FH 8FI 8FJ 8FK ABUWG AEUYN AFKRA AZQEC BBNVY BENPR BHPHI CCPQU DWQXO FYUFA GHDGH GNUQQ HCIFZ K9. LK8 M0S M1P M2P M7P PHGZM PHGZT PIMPY PJZUB PKEHL PPXIY PQEST PQGLB PQQKQ PQUKI Q9U 7X8 5PM DOA |
DOI | 10.1038/s41598-024-59277-z |
DatabaseName | Springer Nature OA Free Journals CrossRef PubMed ProQuest Central (Corporate) Health & Medical Collection ProQuest Central (purchase pre-March 2016) Biology Database (Alumni Edition) Medical Database (Alumni Edition) Science Database (Alumni Edition) ProQuest SciTech Collection ProQuest Natural Science Journals ProQuest Hospital Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest One Sustainability ProQuest Central UK/Ireland ProQuest Central Essentials Biological Science Collection ProQuest Central Natural Science Collection ProQuest One Community College ProQuest Central Korea Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Central Student Proquest SciTech Premium Collection ProQuest Health & Medical Complete (Alumni) Biological Sciences ProQuest Health & Medical Collection Medical Database Science Database Biological Science Database ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central Basic MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef PubMed Publicly Available Content Database ProQuest Central Student ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest One Health & Nursing ProQuest Natural Science Collection ProQuest Biology Journals (Alumni Edition) ProQuest Central ProQuest One Applied & Life Sciences ProQuest One Sustainability ProQuest Health & Medical Research Collection Health Research Premium Collection Health and Medicine Complete (Alumni Edition) Natural Science Collection ProQuest Central Korea Health & Medical Research Collection Biological Science Collection ProQuest Central (New) ProQuest Medical Library (Alumni) ProQuest Science Journals (Alumni Edition) ProQuest Biological Science Collection ProQuest Central Basic ProQuest Science Journals ProQuest One Academic Eastern Edition ProQuest Hospital Collection Health Research Premium Collection (Alumni) Biological Science Database ProQuest SciTech Collection ProQuest Hospital Collection (Alumni) ProQuest Health & Medical Complete ProQuest Medical Library ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) MEDLINE - Academic |
DatabaseTitleList | Publicly Available Content Database MEDLINE - Academic PubMed CrossRef |
Database_xml | – sequence: 1 dbid: C6C name: Springer Nature OA Free Journals url: http://www.springeropen.com/ sourceTypes: Publisher – sequence: 2 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 3 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 4 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Biology |
EISSN | 2045-2322 |
EndPage | 17 |
ExternalDocumentID | oai_doaj_org_article_a032bd09d520432398ac0db1f015721c PMC11021520 38627475 10_1038_s41598_024_59277_z |
Genre | Journal Article |
GrantInformation_xml | – fundername: Guangdong Basic and Applied Basic Research Foundation grantid: 2023A1515011717 – fundername: Zhongshan Science and Technology grantid: 2021B2062 – fundername: Key Fields of the Education Department of Guangdong Province grantid: 2023ZDZX1041 |
GroupedDBID | 0R~ 3V. 4.4 53G 5VS 7X7 88A 88E 88I 8FE 8FH 8FI 8FJ AAFWJ AAJSJ AAKDD ABDBF ABUWG ACGFS ACSMW ACUHS ADBBV ADRAZ AENEX AEUYN AFKRA AJTQC ALIPV ALMA_UNASSIGNED_HOLDINGS AOIJS AZQEC BAWUL BBNVY BCNDV BENPR BHPHI BPHCQ BVXVI C6C CCPQU DIK DWQXO EBD EBLON EBS ESX FYUFA GNUQQ GROUPED_DOAJ GX1 HCIFZ HH5 HMCUK HYE KQ8 LK8 M0L M1P M2P M48 M7P M~E NAO OK1 PIMPY PQQKQ PROAC PSQYO RNT RNTTT RPM SNYQT UKHRP AASML AAYXX AFPKN CITATION PHGZM PHGZT NPM PJZUB PPXIY PQGLB 7XB 8FK AARCD K9. PKEHL PQEST PQUKI Q9U 7X8 5PM PUEGO |
ID | FETCH-LOGICAL-c541t-97fc54cee92535dd1e46a6330cee22aa725961dfe29f484eab10f73e11d5eebf3 |
IEDL.DBID | M48 |
ISSN | 2045-2322 |
IngestDate | Wed Aug 27 01:29:47 EDT 2025 Thu Aug 21 18:34:11 EDT 2025 Fri Jul 11 00:21:53 EDT 2025 Wed Aug 13 07:02:06 EDT 2025 Mon Jul 21 06:01:32 EDT 2025 Thu Apr 24 23:11:52 EDT 2025 Tue Jul 01 00:51:52 EDT 2025 Fri Feb 21 02:39:40 EST 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Keywords | Frequency domain compression Image encryption Compressive sensing Optimized orthogonal |
Language | English |
License | 2024. The Author(s). Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/. |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c541t-97fc54cee92535dd1e46a6330cee22aa725961dfe29f484eab10f73e11d5eebf3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
ORCID | 0009-0007-6275-3007 0000-0002-1178-4598 0000-0003-4159-3132 0000-0002-3820-8128 0009-0008-5777-9541 0009-0004-9942-810X |
OpenAccessLink | http://journals.scholarsportal.info/openUrl.xqy?doi=10.1038/s41598-024-59277-z |
PMID | 38627475 |
PQID | 3039629666 |
PQPubID | 2041939 |
PageCount | 17 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_a032bd09d520432398ac0db1f015721c pubmedcentral_primary_oai_pubmedcentral_nih_gov_11021520 proquest_miscellaneous_3040320310 proquest_journals_3039629666 pubmed_primary_38627475 crossref_citationtrail_10_1038_s41598_024_59277_z crossref_primary_10_1038_s41598_024_59277_z springer_journals_10_1038_s41598_024_59277_z |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-04-16 |
PublicationDateYYYYMMDD | 2024-04-16 |
PublicationDate_xml | – month: 04 year: 2024 text: 2024-04-16 day: 16 |
PublicationDecade | 2020 |
PublicationPlace | London |
PublicationPlace_xml | – name: London – name: England |
PublicationTitle | Scientific reports |
PublicationTitleAbbrev | Sci Rep |
PublicationTitleAlternate | Sci Rep |
PublicationYear | 2024 |
Publisher | Nature Publishing Group UK Nature Publishing Group Nature Portfolio |
Publisher_xml | – name: Nature Publishing Group UK – name: Nature Publishing Group – name: Nature Portfolio |
References | Erkan, Toktas, Lai (CR6) 2023; 213 Zhou, Qiu, Qi, Zhang (CR28) 2023; 175 Wen (CR16) 2022; 10 Erkan, Toktas, Memiş, Lai, Hu (CR23) 2023; 111 CR30 Lai, Yang, Liu (CR27) 2022; 165 Teng, Wang, Yang, Xian (CR10) 2021; 105 Hua, Jin, Xu, Huang (CR46) 2018; 149 Toktas, Erkan, Gao, Pak (CR33) 2024; 462 Wen, Lin, Yang, Chen (CR39) 2024 Wang, Liu, Jiang (CR42) 2022; 209 Ye, Liu, Yap, Goi (CR41) 2023; 111 Feng (CR24) 2022; 10 Su, Wang, Xu, Zou, Liu (CR54) 2023; 24 Luo, Liang, Zhang, Liu, Wang (CR19) 2022; 111 Liu, Sun, Wang, He (CR2) 2023; 174 Chen, Mou, Cao, Yan, Jahanshahi (CR17) 2023; 82 Feng, Zhang, Qin (CR25) 2021; 2021 Feng, Qin, Zhang, Ahmad (CR8) 2021; 9 Chai (CR40) 2023; 10 Ding, Liu, Wang, Sun (CR1) 2023; 138 Wen (CR26) 2023; 15 Cao, Sun, Liu (CR49) 2018; 143 Wang, Su (CR43) 2021; 95 Huang, Cai (CR21) 2023; 19 Zou, Wang, Zhou, Xu, Huang (CR7) 2022; 430 Wen, Lin (CR38) 2024; 237 CR48 Hua, Liu, Zheng, Yi, Zhang (CR34) 2023 Gao (CR3) 2022; 30 Huang, Dong, Ye, Shi (CR4) 2022; 17 Kocak, Erkan, Toktas, Gao (CR31) 2024; 237 Wen, Huang, Lin (CR20) 2023; 35 Mansouri, Wang (CR53) 2021; 80 Zhou, Zhang, Zhao, Yi, Lan (CR14) 2023; 30 Liang (CR45) 2023; 75 Liang, Zhang, Luo, Wang, Qiu (CR37) 2023; 41 Chai (CR51) 2020; 124 Wen, Kang, Wu, Lin, Huang (CR18) 2023; 11 Lu, Li, Liao, Tao, Cai (CR9) 2023; 11 Ye, Zhang, Xiao, Yi, Lan (CR13) 2023; 30 Ma, Chai, Gan, Zhang (CR15) 2023 Zhang (CR52) 2023; 272 Wang, Wang (CR47) 2023; 213 Wen, Lin, Kang, Zhang, Zou (CR32) 2023; 27 Zhou, Wang, Zhang (CR29) 2023; 621 Wen, Lin (CR35) 2023; 35 Wu (CR12) 2023; 48 Yuan, Cai (CR5) 2022; 18 Lu, Liao, Xiang, Li, Huang (CR22) 2021; 51 Luo, Zhang, Wang, Liang, Qiu (CR36) 2023; 41 Lai, Hu, Erkan, Toktas (CR11) 2023; 213 Wang (CR50) 2021; 95 Chen, Ye (CR44) 2022; 267 Q Lu (59277_CR22) 2021; 51 X Chai (59277_CR51) 2020; 124 C Zou (59277_CR7) 2022; 430 S Zhou (59277_CR28) 2023; 175 X Ye (59277_CR13) 2023; 30 Y Su (59277_CR54) 2023; 24 Y Ding (59277_CR1) 2023; 138 Y Luo (59277_CR36) 2023; 41 T Wu (59277_CR12) 2023; 48 A Mansouri (59277_CR53) 2021; 80 O Kocak (59277_CR31) 2024; 237 U Erkan (59277_CR23) 2023; 111 H Wen (59277_CR26) 2023; 15 Z Chen (59277_CR44) 2022; 267 Y Luo (59277_CR19) 2022; 111 W Feng (59277_CR25) 2021; 2021 C Cao (59277_CR49) 2018; 143 X Yuan (59277_CR5) 2022; 18 X Huang (59277_CR4) 2022; 17 D Lu (59277_CR9) 2023; 11 59277_CR30 H Wen (59277_CR32) 2023; 27 H Wen (59277_CR18) 2023; 11 Z Hua (59277_CR34) 2023 U Erkan (59277_CR6) 2023; 213 Q Lai (59277_CR27) 2022; 165 H Huang (59277_CR21) 2023; 19 X Liang (59277_CR37) 2023; 41 H Wen (59277_CR35) 2023; 35 W Feng (59277_CR24) 2022; 10 H Wen (59277_CR38) 2024; 237 L Teng (59277_CR10) 2021; 105 C Zhang (59277_CR52) 2023; 272 Q Lai (59277_CR11) 2023; 213 Z Hua (59277_CR46) 2018; 149 X Chen (59277_CR17) 2023; 82 H Wen (59277_CR39) 2024 X Wang (59277_CR43) 2021; 95 X Wang (59277_CR47) 2023; 213 Y Ma (59277_CR15) 2023 X Liu (59277_CR2) 2023; 174 X Wang (59277_CR42) 2022; 209 Z Gao (59277_CR3) 2022; 30 H Wen (59277_CR20) 2023; 35 W Zhou (59277_CR14) 2023; 30 J Liang (59277_CR45) 2023; 75 H Wen (59277_CR16) 2022; 10 G Ye (59277_CR41) 2023; 111 59277_CR48 X Wang (59277_CR50) 2021; 95 S Zhou (59277_CR29) 2023; 621 A Toktas (59277_CR33) 2024; 462 X Chai (59277_CR40) 2023; 10 W Feng (59277_CR8) 2021; 9 |
References_xml | – volume: 75 start-page: 103487 year: 2023 ident: CR45 article-title: A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme publication-title: J. Inf. Secur. Appl. – volume: 272 start-page: 170312 year: 2023 ident: CR52 article-title: Plaintext-related image encryption scheme without additional plaintext based on 2dcs publication-title: Optik doi: 10.1016/j.ijleo.2022.170312 – volume: 15 start-page: 1 year: 2023 end-page: 11 ident: CR26 article-title: Secure optical image communication using double random transformation and memristive chaos publication-title: IEEE Photonics J. – volume: 149 start-page: 148 year: 2018 end-page: 161 ident: CR46 article-title: 2d logistic-sine-coupling map for image encryption publication-title: Signal Process. doi: 10.1016/j.sigpro.2018.03.010 – volume: 430 start-page: 127291 year: 2022 ident: CR7 article-title: A novel image encryption algorithm based on DNA strand exchange and diffusion publication-title: Appl. Math. Comput. – year: 2023 ident: CR34 article-title: Reversible data hiding over encrypted images via preprocessing-free matrix secret sharing publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2023.3270882 – volume: 111 start-page: 6791 year: 2022 end-page: 6811 ident: CR19 article-title: An image encryption scheme based on block compressed sensing and Chen’s system publication-title: Nonlinear Dyn. doi: 10.1007/s11071-022-08119-6 – volume: 10 start-page: 2751 year: 2022 ident: CR24 article-title: Image encryption algorithm based on plane-level image filtering and discrete logarithmic transform publication-title: Mathematics doi: 10.3390/math10152751 – volume: 27 start-page: 108610 year: 2023 ident: CR32 article-title: Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain-diffusion publication-title: iScience doi: 10.1016/j.isci.2023.108610 – volume: 10 start-page: 7380 year: 2023 end-page: 7392 ident: CR40 article-title: Exploiting semi-tensor product compressed sensing and hybrid cloud for secure medical image transmission publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2022.3228781 – volume: 11 start-page: 1927 year: 2023 end-page: 1939 ident: CR9 article-title: Verifiable privacy-preserving queries on multi-source dynamic DNA datasets publication-title: IEEE Trans. Cloud Comput. doi: 10.1109/TCC.2022.3171547 – volume: 2021 start-page: 1 year: 2021 end-page: 19 ident: CR25 article-title: A secure and efficient image transmission scheme based on two chaotic maps publication-title: Complexity – volume: 35 start-page: 101612 year: 2023 ident: CR35 article-title: Cryptanalyzing an image cipher using multiple chaos and DNA operations publication-title: J. King Saud Univ. Comput. Inf. Sci. – volume: 51 start-page: 3224 year: 2021 end-page: 3237 ident: CR22 article-title: Privacy masking stochastic subgradient-push algorithm for distributed online optimization publication-title: IEEE Trans. Cybern. doi: 10.1109/TCYB.2020.2973221 – volume: 41 start-page: 4663 year: 2023 end-page: 4671 ident: CR36 article-title: Robust key update with controllable accuracy using support vector machine for secure Ofdma-Pon publication-title: J. Lightwave Technol. doi: 10.1109/JLT.2023.3244202 – volume: 111 start-page: 13535 year: 2023 end-page: 13560 ident: CR41 article-title: Reversible image hiding algorithm based on compressive sensing and deep learning publication-title: Nonlinear Dyn. doi: 10.1007/s11071-023-08516-5 – volume: 30 start-page: 31209 year: 2022 ident: CR3 article-title: Experimental demonstration of synchronous privacy enhanced chaotic temporal phase en/decryption for high speed secure optical communication publication-title: Opt. Express doi: 10.1364/OE.467578 – volume: 174 start-page: 113791 year: 2023 ident: CR2 article-title: A class of novel discrete memristive chaotic map publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2023.113791 – volume: 17 start-page: 173804 year: 2022 ident: CR4 article-title: Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform publication-title: Front. Comput. Sci. doi: 10.1007/s11704-022-1419-8 – volume: 9 start-page: 145459 year: 2021 end-page: 145470 ident: CR8 article-title: Cryptanalysis and improvement of the image encryption scheme based on Feistel network and dynamic DNA encoding publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3123571 – volume: 82 start-page: 43797 year: 2023 end-page: 43818 ident: CR17 article-title: A chaotic color image encryption scheme based on improved Arnold scrambling and dynamic DNA encoding publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-023-14826-y – volume: 213 year: 2023 ident: CR6 article-title: 2d hyperchaotic system based on Schaffer function for image encryption publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2022.119076 – volume: 138 start-page: 638 year: 2023 ident: CR1 article-title: A new class of discrete modular memristors and application in chaotic systems publication-title: Eur. Phys. J. Plus doi: 10.1140/epjp/s13360-023-04242-4 – volume: 165 start-page: 112781 year: 2022 ident: CR27 article-title: Design and realization of discrete memristive hyperchaotic map with application in image encryption publication-title: Chaos, Solitons Fractals doi: 10.1016/j.chaos.2022.112781 – volume: 143 start-page: 122 year: 2018 end-page: 133 ident: CR49 article-title: A novel bit-level image encryption algorithm based on 2d-LICM hyperchaotic map publication-title: Signal Process. doi: 10.1016/j.sigpro.2017.08.020 – volume: 19 start-page: 8285 year: 2023 end-page: 8294 ident: CR21 article-title: Duple color image encryption system based on 3-d nonequilateral Arnold transform for IIot publication-title: IEEE Trans. Ind. Inform. doi: 10.1109/TII.2022.3217482 – volume: 621 start-page: 782 year: 2023 end-page: 798 ident: CR29 article-title: Novel image encryption scheme based on chaotic signals with finite-precision error publication-title: Inf. Sci. doi: 10.1016/j.ins.2022.11.104 – volume: 41 start-page: 1619 year: 2023 end-page: 1625 ident: CR37 article-title: Secure encryption and key management for Ofdm-Pon based on chaotic Hilbert motion publication-title: J. Lightwave Technol. doi: 10.1109/JLT.2022.3226768 – volume: 237 start-page: 121514 year: 2024 ident: CR38 article-title: Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2023.121514 – volume: 213 start-page: 118924 year: 2023 ident: CR47 article-title: Multiple medical image encryption algorithm based on scrambling of region of interest and diffusion of odd-even interleaved points publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2022.118924 – volume: 11 start-page: 3133 year: 2023 ident: CR18 article-title: Dynamic RNA coding color image cipher based on chain feedback structure publication-title: Mathematics doi: 10.3390/math11143133 – ident: CR30 – volume: 209 start-page: 118426 year: 2022 ident: CR42 article-title: A novel visually meaningful image encryption algorithm based on parallel compressive sensing and adaptive embedding publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2022.118426 – volume: 237 start-page: 121452 year: 2024 ident: CR31 article-title: Pso-based image encryption scheme using modular integrated logistic exponential map publication-title: Expert Syst. AppL. doi: 10.1016/j.eswa.2023.121452 – volume: 80 start-page: 21955 year: 2021 end-page: 21978 ident: CR53 article-title: A novel block-based image encryption scheme using a new sine powered chaotic map generator publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-021-10757-8 – volume: 30 start-page: 793 year: 2023 end-page: 797 ident: CR13 article-title: Usability enhanced thumbnail-preserving encryption based on data hiding for jpeg images publication-title: IEEE Signal Process. Lett. doi: 10.1109/LSP.2023.3290836 – volume: 267 start-page: 169676 year: 2022 ident: CR44 article-title: An asymmetric image encryption scheme based on hash sha-3, rsa and compressive sensing publication-title: Optik doi: 10.1016/j.ijleo.2022.169676 – volume: 105 start-page: 1859 year: 2021 end-page: 1876 ident: CR10 article-title: Color image encryption based on cross 2d hyperchaotic map using combined cycle shift scrambling and selecting diffusion publication-title: Nonlinear Dyn. doi: 10.1007/s11071-021-06663-1 – volume: 175 start-page: 113909 year: 2023 ident: CR28 article-title: A new conservative chaotic system and its application in image encryption publication-title: Chaos, Solitons Fractals doi: 10.1016/j.chaos.2023.113909 – volume: 462 start-page: 128340 year: 2024 ident: CR33 article-title: A robust bit-level image encryption based on Bessel map publication-title: Appl. Math. Comput. – volume: 213 year: 2023 ident: CR11 article-title: A novel pixel-split image encryption scheme based on 2d Salomon map publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2022.118845 – volume: 95 start-page: 116246 year: 2021 ident: CR50 article-title: Image encryption based on compressed sensing and DNA encoding publication-title: Signal Process. Image Commun. doi: 10.1016/j.image.2021.116246 – volume: 24 start-page: 5 year: 2023 ident: CR54 article-title: A three-dimensional (3d) space permutation and diffusion technique for chaotic image encryption using Merkel tree and dna code publication-title: Sens. Imaging doi: 10.1007/s11220-022-00407-0 – ident: CR48 – volume: 48 start-page: 684 year: 2023 end-page: 687 ident: CR12 article-title: Secure turbulence-resistant coherent free-space optical communications via chaotic region-optimized probabilistic constellation shaping publication-title: Opt. Lett. doi: 10.1364/OL.480981 – volume: 35 start-page: 101660 year: 2023 ident: CR20 article-title: High-quality color image compression-encryption using chaos and block permutation publication-title: J. King Saud Univ. Comput. Inf. Sci. – volume: 30 start-page: 1147 year: 2023 end-page: 1151 ident: CR14 article-title: Adversarial thumbnail-preserving transformation for facial images based on GAN publication-title: IEEE Signal Process. Lett. doi: 10.1109/LSP.2023.3308012 – volume: 111 start-page: 20377 year: 2023 end-page: 204054 ident: CR23 article-title: An image encryption method based on multi-space confusion using hyperchaotic 2d Vincent map derived from optimization benchmark function publication-title: Nonlinear Dyn. doi: 10.1007/s11071-023-08859-z – volume: 10 start-page: 3180 year: 2022 ident: CR16 article-title: Secure DNA-coding image optical communication using non-degenerate hyperchaos and dynamic secret-key publication-title: Mathematics doi: 10.3390/math10173180 – volume: 95 year: 2021 ident: CR43 article-title: Image encryption based on compressed sensing and DNA encoding publication-title: Signal Process. Image Commun. doi: 10.1016/j.image.2021.116246 – volume: 124 start-page: 105837 year: 2020 ident: CR51 article-title: An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic lsb embedding publication-title: Optics Lasers Eng. doi: 10.1016/j.optlaseng.2019.105837 – volume: 18 start-page: 4427 year: 2022 end-page: 4435 ident: CR5 article-title: Ichv: A new compression approach for industrial images publication-title: IEEE Trans. Ind. Inform. doi: 10.1109/TII.2021.3125375 – year: 2023 ident: CR15 article-title: Privacy-preserving TPE-based jpeg image retrieval in cloud-assisted internet of things publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2022.3142933 – year: 2024 ident: CR39 article-title: Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2024.123748 – volume: 213 year: 2023 ident: 59277_CR11 publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2022.118845 – volume: 124 start-page: 105837 year: 2020 ident: 59277_CR51 publication-title: Optics Lasers Eng. doi: 10.1016/j.optlaseng.2019.105837 – volume: 17 start-page: 173804 year: 2022 ident: 59277_CR4 publication-title: Front. Comput. Sci. doi: 10.1007/s11704-022-1419-8 – volume: 41 start-page: 4663 year: 2023 ident: 59277_CR36 publication-title: J. Lightwave Technol. doi: 10.1109/JLT.2023.3244202 – volume: 105 start-page: 1859 year: 2021 ident: 59277_CR10 publication-title: Nonlinear Dyn. doi: 10.1007/s11071-021-06663-1 – volume: 111 start-page: 6791 year: 2022 ident: 59277_CR19 publication-title: Nonlinear Dyn. doi: 10.1007/s11071-022-08119-6 – volume: 15 start-page: 1 year: 2023 ident: 59277_CR26 publication-title: IEEE Photonics J. – volume: 10 start-page: 7380 year: 2023 ident: 59277_CR40 publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2022.3228781 – volume: 462 start-page: 128340 year: 2024 ident: 59277_CR33 publication-title: Appl. Math. Comput. – volume: 111 start-page: 13535 year: 2023 ident: 59277_CR41 publication-title: Nonlinear Dyn. doi: 10.1007/s11071-023-08516-5 – volume: 24 start-page: 5 year: 2023 ident: 59277_CR54 publication-title: Sens. Imaging doi: 10.1007/s11220-022-00407-0 – volume: 11 start-page: 3133 year: 2023 ident: 59277_CR18 publication-title: Mathematics doi: 10.3390/math11143133 – volume: 80 start-page: 21955 year: 2021 ident: 59277_CR53 publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-021-10757-8 – volume: 41 start-page: 1619 year: 2023 ident: 59277_CR37 publication-title: J. Lightwave Technol. doi: 10.1109/JLT.2022.3226768 – volume: 430 start-page: 127291 year: 2022 ident: 59277_CR7 publication-title: Appl. Math. Comput. – ident: 59277_CR30 doi: 10.1109/TCSI.2023.3279371 – volume: 149 start-page: 148 year: 2018 ident: 59277_CR46 publication-title: Signal Process. doi: 10.1016/j.sigpro.2018.03.010 – volume: 95 year: 2021 ident: 59277_CR43 publication-title: Signal Process. Image Commun. doi: 10.1016/j.image.2021.116246 – year: 2023 ident: 59277_CR34 publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2023.3270882 – volume: 48 start-page: 684 year: 2023 ident: 59277_CR12 publication-title: Opt. Lett. doi: 10.1364/OL.480981 – volume: 213 start-page: 118924 year: 2023 ident: 59277_CR47 publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2022.118924 – volume: 621 start-page: 782 year: 2023 ident: 59277_CR29 publication-title: Inf. Sci. doi: 10.1016/j.ins.2022.11.104 – volume: 35 start-page: 101660 year: 2023 ident: 59277_CR20 publication-title: J. King Saud Univ. Comput. Inf. Sci. – year: 2024 ident: 59277_CR39 publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2024.123748 – volume: 213 year: 2023 ident: 59277_CR6 publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2022.119076 – volume: 237 start-page: 121452 year: 2024 ident: 59277_CR31 publication-title: Expert Syst. AppL. doi: 10.1016/j.eswa.2023.121452 – volume: 75 start-page: 103487 year: 2023 ident: 59277_CR45 publication-title: J. Inf. Secur. Appl. – volume: 267 start-page: 169676 year: 2022 ident: 59277_CR44 publication-title: Optik doi: 10.1016/j.ijleo.2022.169676 – volume: 175 start-page: 113909 year: 2023 ident: 59277_CR28 publication-title: Chaos, Solitons Fractals doi: 10.1016/j.chaos.2023.113909 – volume: 174 start-page: 113791 year: 2023 ident: 59277_CR2 publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2023.113791 – volume: 11 start-page: 1927 year: 2023 ident: 59277_CR9 publication-title: IEEE Trans. Cloud Comput. doi: 10.1109/TCC.2022.3171547 – volume: 2021 start-page: 1 year: 2021 ident: 59277_CR25 publication-title: Complexity – volume: 19 start-page: 8285 year: 2023 ident: 59277_CR21 publication-title: IEEE Trans. Ind. Inform. doi: 10.1109/TII.2022.3217482 – volume: 165 start-page: 112781 year: 2022 ident: 59277_CR27 publication-title: Chaos, Solitons Fractals doi: 10.1016/j.chaos.2022.112781 – volume: 10 start-page: 2751 year: 2022 ident: 59277_CR24 publication-title: Mathematics doi: 10.3390/math10152751 – volume: 9 start-page: 145459 year: 2021 ident: 59277_CR8 publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3123571 – volume: 10 start-page: 3180 year: 2022 ident: 59277_CR16 publication-title: Mathematics doi: 10.3390/math10173180 – year: 2023 ident: 59277_CR15 publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2022.3142933 – volume: 27 start-page: 108610 year: 2023 ident: 59277_CR32 publication-title: iScience doi: 10.1016/j.isci.2023.108610 – volume: 51 start-page: 3224 year: 2021 ident: 59277_CR22 publication-title: IEEE Trans. Cybern. doi: 10.1109/TCYB.2020.2973221 – volume: 30 start-page: 1147 year: 2023 ident: 59277_CR14 publication-title: IEEE Signal Process. Lett. doi: 10.1109/LSP.2023.3308012 – volume: 30 start-page: 793 year: 2023 ident: 59277_CR13 publication-title: IEEE Signal Process. Lett. doi: 10.1109/LSP.2023.3290836 – volume: 272 start-page: 170312 year: 2023 ident: 59277_CR52 publication-title: Optik doi: 10.1016/j.ijleo.2022.170312 – volume: 138 start-page: 638 year: 2023 ident: 59277_CR1 publication-title: Eur. Phys. J. Plus doi: 10.1140/epjp/s13360-023-04242-4 – volume: 209 start-page: 118426 year: 2022 ident: 59277_CR42 publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2022.118426 – volume: 30 start-page: 31209 year: 2022 ident: 59277_CR3 publication-title: Opt. Express doi: 10.1364/OE.467578 – ident: 59277_CR48 – volume: 237 start-page: 121514 year: 2024 ident: 59277_CR38 publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2023.121514 – volume: 82 start-page: 43797 year: 2023 ident: 59277_CR17 publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-023-14826-y – volume: 35 start-page: 101612 year: 2023 ident: 59277_CR35 publication-title: J. King Saud Univ. Comput. Inf. Sci. – volume: 95 start-page: 116246 year: 2021 ident: 59277_CR50 publication-title: Signal Process. Image Commun. doi: 10.1016/j.image.2021.116246 – volume: 111 start-page: 20377 year: 2023 ident: 59277_CR23 publication-title: Nonlinear Dyn. doi: 10.1007/s11071-023-08859-z – volume: 18 start-page: 4427 year: 2022 ident: 59277_CR5 publication-title: IEEE Trans. Ind. Inform. doi: 10.1109/TII.2021.3125375 – volume: 143 start-page: 122 year: 2018 ident: 59277_CR49 publication-title: Signal Process. doi: 10.1016/j.sigpro.2017.08.020 |
SSID | ssj0000529419 |
Score | 2.438334 |
Snippet | Compressive sensing is favored because it breaks through the constraints of Nyquist sampling law in signal reconstruction. However, the security defects of... Abstract Compressive sensing is favored because it breaks through the constraints of Nyquist sampling law in signal reconstruction. However, the security... |
SourceID | doaj pubmedcentral proquest pubmed crossref springer |
SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source Publisher |
StartPage | 8805 |
SubjectTerms | 639/166 639/705/117 639/705/258 Algorithms Compressive sensing Frequency domain compression Humanities and Social Sciences Image encryption Image processing multidisciplinary Optimized orthogonal Science Science (multidisciplinary) Wavelet transforms |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwELZQpUpcEKU8QgsyEjeIGj8TH6GiqjhwolJvlh3bZaU2i7oFKfvrmbGzocurF26R40TWPDwzmplvCHmdUtJBBFmD66pqmcCHc31oa590C_a21U3M1Raf9OmZ_Hiuzm-N-sKasAIPXAh35BrBfWhMUNjFiWh1rm-CZwnsGEQvPd6-YPNuBVMF1ZsbyczUJdOI7mgFlgq7ybislcG85XrLEmXA_j95mb8XS_6SMc2G6OQheTB5kPRdOfkeuReHR2S3zJQc98llrqpbYDUzRSziurRNjjSHvjNcLF1cwU1CQUavx3xr0FXBqR2pH-kSlq4W6xgopnWWF-iuU6w-z1Wz3yNdYd37cPGYnJ18-Hx8Wk8jFepeSXZTmzbBAxhGw5VQIbAotdNCNLDEuXMtREOahRS5SbKT0XnWpFZExoKK0SfxhOwMyyE-I5Sn0HglPddJyiZ0hjmmUup9MJ3qkqoI25DX9hPeOI69uLQ57y06W1higSU2s8SuK_Jm_uZrQdv45-73yLV5JyJl5wWQHzvJj71LfipyuOG5ndR3ZcGuG80hEtQVeTW_BsXDbIob4vIb7pE4fB7c44o8LSIyn0R0ONKoBRp0W8KzddTtN8PiSwb3ZiyPGoafvt3I2c9z_Z0Wz_8HLQ7IfY4KglCW-pDsgEjGF-Bz3fiXWb1-AOLnKic priority: 102 providerName: Directory of Open Access Journals – databaseName: Health & Medical Collection dbid: 7X7 link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Lb9QwELagCIkLanmmD2QkbhA1ficnBIiq4sCJSnuz4theVmqTtilI2V_fGSebann0FjneyOsZz3z2jL8h5F2MUXvhZQ7QVeUyAoarG29yF7UBf2t0EVK2xXd9eia_LdRiOnDrp7TKjU1Mhtp3DZ6RH4OprTQHcK4_Xl7lWDUKo6tTCY2H5BFSl2FKl1mY-YwFo1iSVdNdmUKUxz34K7xTxmWuKoxerrf8UaLt_xfW_Dtl8o-4aXJHJ7vk6YQj6adR8HvkQWifkcdjZcnhOTlPuXUrzGmmyEicj5cnB5o2wDNpLF1dgD2hoKnXQ7IdtB_ZagfqBtpB08VqHTzF4E63RNBOMQc95c7-DrTH7Pd2-YKcnXz98eU0nwor5I2S7CavTIQHcI8VV0J5z4LUtRaigCbO69rAnkgzHwOvoixlqB0rohGBMa9CcFG8JDtt14bXhPLoC6ek4zpKWfiyYjVTMTbOV6Uqo8oI20yvbSbWcSx-cW5T9FuUdhSJBZHYJBK7zsj7-TeXI-fGvb0_o9TmnsiXnRq666Wdlp-tC8GdLyqv8C4wch7WTeEdi4CGYA_cZORwI3M7LeLe3qlcRt7Or2H5YUylbkP3C_tILEEPIDkjr0YVmUciSixsZGAOyi3l2Rrq9pt29TNRfDOWCg7DRz9s9OxuXP-fi_37_8YBecJR9ZGqUh-SHVC2cASY6sa9SQvnFkJYIqQ priority: 102 providerName: ProQuest – databaseName: Springer Nature OA Free Journals dbid: C6C link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3Ni9UwEA_riuBF_La6SgRvWsx3m6M-XBYPnlzYW2ia5Plgt132rULfX-9M-iFPV8FbSZMSMpPMpPOb3xDyJqVkggyqBNdVlyqBD9e0oSp9MhXY28qwmNEWX8zJqfp8ps8OiJhzYTJoP1Na5mN6Roe934KhwWQwoUptMey4u0VuI3U7avXKrJb_Khi5UtxO-TFM1jcM3bNBmar_Jv_yT5jkb7HSbIKO75N7k-9IP4yzfUAOYveQ3BmrSQ6PyHnG020Qx0yRhbgcEyYHmi-9C1Es3VzAGUJBO6-GfF7Q7chQO1A_0B6aLja7GCgGdPo1OuoUcecZL_sj0i0i3rv1Y3J6_Onr6qSciimUrVb8urRVggcwiVZoqUPgUZnGSMmgSYimqeAeZHhIUdikahUbz1mqZOQ86Bh9kk_IYdd38RmhIgXmtfLCJKVYqC1vuE6p9cHWuk66IHxeXtdOTONY8OLc5Yi3rN0oEgcicVkkbleQt8uYy5Fn45-9P6LUlp7IkZ0b-qu1m3TGNUwKH5gNGvN_keewaVnwPIEHBPfetiBHs8zdtHG3Diy6NQLugKYgr5fXsOUwjtJ0sf-OfRSWnQfHuCBPRxVZZiJrLGZUwRrUe8qzN9X9N93mW6b15jwXGYaPvpv17Ne8_r4Wz_-v-wtyV-BWQLpKc0QOQfniS_Crrv2rvJF-AsIqIQY priority: 102 providerName: Springer Nature |
Title | Exploiting high-quality reconstruction image encryption strategy by optimized orthogonal compressive sensing |
URI | https://link.springer.com/article/10.1038/s41598-024-59277-z https://www.ncbi.nlm.nih.gov/pubmed/38627475 https://www.proquest.com/docview/3039629666 https://www.proquest.com/docview/3040320310 https://pubmed.ncbi.nlm.nih.gov/PMC11021520 https://doaj.org/article/a032bd09d520432398ac0db1f015721c |
Volume | 14 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3di9NAEF_uA8EX8dvoWVbwTaPZze4meRDplTuOgoeohb4tSXa3FnqJtqeY_vXObD6kWgWfUjabsMxHZqYz8xtCnjvnlImNCMF1laFw4MPlpUnCwqkE7G2iIuurLS7VxUxM53J-QPpxRx0BN3tDO5wnNVuvXv342rwFhX_TtoynrzdghLBRjItQZpiS3B6SY7BMCSrqu87db7G-eSb8rA8EYQ_BmeBdH83-1-zYKg_pv88P_bOc8recqjdV57fJrc7HpONWKO6QA1vdJTfaqZPNPbLydXdLrHemiFYcto2VDfXB8QAoS5dX8K2hIMXrxn9X6KZFsm1o0dAalq6WW2soJn7qBTr0FOvTfV3td0s3WBlfLe6T2fnZp8lF2A1dCEsp2HWYJQ5-gOnMuIylMcwKlas4jmCJ8zxPIF5SzDjLMydSYfOCRS6JLWNGWlu4-AE5qurKPiKUOxMVUhRcOSEik2YsZ9K5sjBZKlMnA8J68uqyQyTHwRgr7TPjcapblmhgifYs0duAvBie-dLicfxz9ylybdiJWNp-oV4vdKeaOo9iXpgoMxL7hBEPMS8jUzAHnhLEx2VATnqe614-NVj-THGIFVVAng23QTUx35JXtv6GewSOpwcHOiAPWxEZThKnOPQoARqkO8Kzc9TdO9Xys4f_ZswPI4aXvuzl7Ne5_k6Lx_9FuSfkJkdNQFRLdUKOQPbsU3C_rosROUzmyYgcj8fTj1O4np5dvv8AqxM1Gfm_NEZe634C9A4x5Q |
linkProvider | Scholars Portal |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtR3JbtQw1CpTIbggdgIFjAQniBo7tpMcEKLQakrLCKFW6s0ksT0dqU3aTgFlPopv5D1nqYalt94ix7Ecv91vI-Slc06Z2IgQVFcZCgc6XF6aJCycSkDeJiqyPtpiosb74tOBPFghv_pcGAyr7HmiZ9SmLvGOfB1YbaY4KOfq3clpiF2j0Lvat9Bo0WLHNj_BZJu_3f4I8H3F-dbm3odx2HUVCEsp2HmYJQ4eQDZkXMbSGGaFyhWY9TDEeZ4nYBAoZpzlmROpsHnBIpfEljEjrS1cDOteI6siBlNmRFY3Nidfvg63Oug3EyzrsnOiOF2fg4TELDYuQpmhv3SxJAF9o4B_abd_B2n-4an1AnDrNrnVaa70fYtqd8iKre6S620vy-YeOfLRfDOMoqZYAzls0zUb6k3uoUwtnR0DB6NAG2eN51Z03tbHbWjR0BqGjmcLayi6k-opmgkUo959tO4PS-cYb19N75P9Kzn0B2RU1ZV9RCh3JiqkKLhyQkQmzVjOpHNlYbJUpk4GhPXHq8uuzjm22zjS3t8ep7oFiQaQaA8SvQjI6-Gbk7bKx6WzNxBqw0ys0O0H6rOp7ghe51HMCxNlRmL2MVZZzMvIFMyB_gVWdxmQtR7mumMbc32B5AF5MbwGgkcvTl7Z-jvOEdj0HtTygDxsUWTYSZxiK6UEziBdQp6lrS6_qWaHvqg4Y77FMSz6psezi339_yweX_4bz8mN8d7nXb27Pdl5Qm5yJAMslKnWyAgQzz4Fje68eNaRESXfrppyfwOsGmIr |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELZKEYgL4k2ggJHgBNHGjh_JASGgrFqKKg5U2ptJYntZqU1Kt4CyP41fx4zzqJZHb72tHK_leB6eycx8Q8gz772yqRUxmK4yFh5suKKyOi690nDfapW4kG2xr3YOxIeZnG2QX0MtDKZVDjoxKGrbVPiNfAKqNlccjHM18X1axKft6evjbzF2kMJI69BOo2ORPdf-BPdt-Wp3G2j9nPPp-8_vduK-w0BcScFO41x7-AH3RM5lKq1lTqhCgYsPQ5wXhQbnQDHrHc-9yIQrSpZ4nTrGrHSu9Cmse4lc1qlkKGN6psfvOxhBEyzv63SSNJss4a7EejYuYplj5HS1dheGlgH_snP_Ttf8I2YbrsLpDXK9t2Hpm47pbpINV98iV7qulu1tchjy-haYT00RDTnuCjdbGpzvEbCWLo5Al1GQkpM26C267JByW1q2tIGho8XKWYqBpWaODgPF_PeQt_vD0SVm3tfzO-TgQo78Ltmsm9rdJ5R7m5RSlFx5IRKb5axg0vuqtHkmMy8jwobjNVWPeI6NNw5NiLynmelIYoAkJpDErCLyYvzPcYf3ce7st0i1cSZidYeB5mRuetE3RZLy0ia5lViHjHiLRZXYknmwxMD_riKyNdDc9Apkac7YPSJPx8cg-hjPKWrXfMc5ApZGbNeI3OtYZNxJmmFTJQ1nkK0xz9pW15_Ui68BXpyx0OwYFn058NnZvv5_Fg_Of40n5CrIq_m4u7_3kFzjKAWImKm2yCbwnXsEpt1p-TjIECVfLlpofwMDPmT7 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Exploiting+high-quality+reconstruction+image+encryption+strategy+by+optimized+orthogonal+compressive+sensing&rft.jtitle=Scientific+reports&rft.au=Wen%2C+Heping&rft.au=Yang%2C+Lincheng&rft.au=Bai%2C+Chixin&rft.au=Lin%2C+Yiting&rft.date=2024-04-16&rft.issn=2045-2322&rft.eissn=2045-2322&rft.volume=14&rft.issue=1&rft_id=info:doi/10.1038%2Fs41598-024-59277-z&rft.externalDBID=n%2Fa&rft.externalDocID=10_1038_s41598_024_59277_z |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2045-2322&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2045-2322&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2045-2322&client=summon |