{"id":"https://openalex.org/W4416429234","doi":"https://doi.org/10.1109/jiot.2025.3635225","title":"Image Compression and Encryption Based on Compressive Sensing and Game of Life With Semi-Tensor Product","display_name":"Image Compression and Encryption Based on Compressive Sensing and Game of Life With Semi-Tensor Product","publication_year":2025,"publication_date":"2025-11-20","ids":{"openalex":"https://openalex.org/W4416429234","doi":"https://doi.org/10.1109/jiot.2025.3635225"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3635225","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3635225","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029885091","display_name":"Yiting Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I9086337","display_name":"Taiyuan University of Technology","ror":"https://ror.org/03kv08d37","country_code":"CN","type":"education","lineage":["https://openalex.org/I9086337"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yiting Guo","raw_affiliation_strings":["School of Computer Science and Technology, Taiyuan University of Technology, Jinzhong, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Taiyuan University of Technology, Jinzhong, China","institution_ids":["https://openalex.org/I9086337"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100692075","display_name":"Hao Zhang","orcid":"https://orcid.org/0000-0003-4281-1461"},"institutions":[{"id":"https://openalex.org/I9086337","display_name":"Taiyuan University of Technology","ror":"https://ror.org/03kv08d37","country_code":"CN","type":"education","lineage":["https://openalex.org/I9086337"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Zhang","raw_affiliation_strings":["School of Computer Science and Technology, Taiyuan University of Technology, Jinzhong, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Taiyuan University of Technology, Jinzhong, China","institution_ids":["https://openalex.org/I9086337"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108653848","display_name":"Changhong Zou","orcid":"https://orcid.org/0009-0007-8584-6185"},"institutions":[{"id":"https://openalex.org/I39333907","display_name":"Yanshan University","ror":"https://ror.org/02txfnf15","country_code":"CN","type":"education","lineage":["https://openalex.org/I39333907"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengye Zou","raw_affiliation_strings":["School of Information Science and Engineering, Yanshan University, Qinhuangdao, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Yanshan University, Qinhuangdao, China","institution_ids":["https://openalex.org/I39333907"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015285865","display_name":"Shuang Zhou","orcid":"https://orcid.org/0000-0001-6399-643X"},"institutions":[{"id":"https://openalex.org/I126924076","display_name":"Chongqing Normal University","ror":"https://ror.org/01dcw5w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I126924076"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuang Zhou","raw_affiliation_strings":["School of Mathematics, Chongqing Normal University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics, Chongqing Normal University, Chongqing, China","institution_ids":["https://openalex.org/I126924076"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023232152","display_name":"Pengfei Yan","orcid":"https://orcid.org/0000-0002-8635-8403"},"institutions":[{"id":"https://openalex.org/I9086337","display_name":"Taiyuan University of Technology","ror":"https://ror.org/03kv08d37","country_code":"CN","type":"education","lineage":["https://openalex.org/I9086337"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pengfei Yan","raw_affiliation_strings":["School of Computer Science and Technology, Taiyuan University of Technology, Jinzhong, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Taiyuan University of Technology, Jinzhong, China","institution_ids":["https://openalex.org/I9086337"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5029885091"],"corresponding_institution_ids":["https://openalex.org/I9086337"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.36480253,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"4","first_page":"6387","last_page":"6400"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.8008999824523926,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.8008999824523926,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10500","display_name":"Sparse and Compressive Sensing Techniques","score":0.10480000078678131,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.005799999926239252,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scrambling","display_name":"Scrambling","score":0.710099995136261},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6402999758720398},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.5166000127792358},{"id":"https://openalex.org/keywords/lossless-compression","display_name":"Lossless compression","score":0.4959000051021576},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.47749999165534973},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4763000011444092},{"id":"https://openalex.org/keywords/image-compression","display_name":"Image compression","score":0.453000009059906},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.42179998755455017},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.41999998688697815},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4077000021934509}],"concepts":[{"id":"https://openalex.org/C182548165","wikidata":"https://www.wikidata.org/wiki/Q2261483","display_name":"Scrambling","level":2,"score":0.710099995136261},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7031000256538391},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6402999758720398},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5902000069618225},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.5166000127792358},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4999000132083893},{"id":"https://openalex.org/C81081738","wikidata":"https://www.wikidata.org/wiki/Q55542","display_name":"Lossless compression","level":3,"score":0.4959000051021576},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.47749999165534973},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4763000011444092},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.453000009059906},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.42179998755455017},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.41999998688697815},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4077000021934509},{"id":"https://openalex.org/C134765980","wikidata":"https://www.wikidata.org/wiki/Q879126","display_name":"Bitwise operation","level":2,"score":0.36559998989105225},{"id":"https://openalex.org/C17349429","wikidata":"https://www.wikidata.org/wiki/Q1049914","display_name":"Matrix multiplication","level":3,"score":0.36149999499320984},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.3434000015258789},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3386000096797943},{"id":"https://openalex.org/C1769480","wikidata":"https://www.wikidata.org/wiki/Q1345239","display_name":"Entropy encoding","level":3,"score":0.3352000117301941},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.33480000495910645},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.321399986743927},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.3190999925136566},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3122999966144562},{"id":"https://openalex.org/C124851039","wikidata":"https://www.wikidata.org/wiki/Q2665459","display_name":"Compressed sensing","level":2,"score":0.2879999876022339},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.2773999869823456},{"id":"https://openalex.org/C136695289","wikidata":"https://www.wikidata.org/wiki/Q415568","display_name":"Bitstream","level":3,"score":0.2736000120639801},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.26589998602867126},{"id":"https://openalex.org/C94835093","wikidata":"https://www.wikidata.org/wiki/Q3113333","display_name":"Data compression ratio","level":5,"score":0.26429998874664307},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.26109999418258667},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.2574000060558319},{"id":"https://openalex.org/C95925971","wikidata":"https://www.wikidata.org/wiki/Q3100414","display_name":"Parity-check matrix","level":4,"score":0.25609999895095825},{"id":"https://openalex.org/C106487976","wikidata":"https://www.wikidata.org/wiki/Q685816","display_name":"Matrix (chemical analysis)","level":2,"score":0.25429999828338623},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.2531000077724457}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3635225","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3635225","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W2013503531","https://openalex.org/W2266200509","https://openalex.org/W2520792837","https://openalex.org/W2799561125","https://openalex.org/W2904224070","https://openalex.org/W2919234133","https://openalex.org/W2979824845","https://openalex.org/W3082246755","https://openalex.org/W3117068596","https://openalex.org/W3120779539","https://openalex.org/W3135879898","https://openalex.org/W3176974171","https://openalex.org/W4214510920","https://openalex.org/W4220717539","https://openalex.org/W4220999568","https://openalex.org/W4221094777","https://openalex.org/W4281571458","https://openalex.org/W4299349578","https://openalex.org/W4380762782","https://openalex.org/W4391958520","https://openalex.org/W4392193363","https://openalex.org/W4396876169","https://openalex.org/W4407304478","https://openalex.org/W4407948341","https://openalex.org/W4411142916","https://openalex.org/W4411865836","https://openalex.org/W4413785573","https://openalex.org/W4413940425"],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1],"proposes":[2,174],"an":[3],"image":[4,40,180],"compression":[5,84,181],"and":[6,19,36,59,129,178,182],"encryption":[7,113,183],"algorithm":[8,148],"based":[9,134],"on":[10,135],"3D":[11],"Logistic-Sine-Memristor":[12],"coupled":[13],"map":[14],"(3D-LSMCM),":[15],"compressed":[16],"sensing":[17],"(CS)":[18],"the":[20,31,43,111,120,130,143,162,167],"Game":[21],"of":[22,33,119,146,166],"Life":[23],"scrambling":[24,125],"with":[25,126,158,185],"Semi-Tensor":[26,66],"Product":[27,67],"(STP-GoL)":[28],"to":[29,52,103,151],"solve":[30],"problems":[32],"computational":[34,97,144],"redundancy":[35],"security":[37],"vulnerability":[38],"in":[39,79,110],"transmission.":[41],"First,":[42],"3D-LSMCM":[44],"is":[45,101,149],"initialized":[46],"by":[47,154],"using":[48],"a":[49,54,175],"hash":[50],"function":[51],"generate":[53],"random":[55],"chaotic":[56,123],"sequence":[57],"iteratively":[58],"it":[60],"improves":[61],"key":[62],"unpredictability.":[63],"Second,":[64],"The":[65,115],"(STP)":[68],"measurement":[69],"matrix":[70,92,108],"constructed":[71],"from":[72],"these":[73],"sequences":[74],"significantly":[75],"reduces":[76],"storage":[77],"requirements":[78],"CS":[80],"whilst":[81],"supporting":[82],"lossless":[83],"through":[85],"arithmetic":[86],"coding.":[87],"STP":[88,100,127,136],"technology":[89],"enables":[90],"flexible":[91],"dimension":[93],"design,":[94],"effectively":[95],"lowering":[96],"costs.":[98],"Finally,":[99],"used":[102],"convert":[104],"logical":[105],"operations":[106,109],"into":[107],"entire":[112],"process.":[114],"cryptographic":[116],"technique":[117],"consists":[118],"STP-GoL":[121],"scrambling,":[122],"global":[124],"(STP-CG)":[128],"chain":[131],"XOR":[132],"diffusion":[133],"(STP-CXOR).":[137],"Furthermore,":[138],"theoretical":[139],"analysis":[140],"indicates":[141],"that":[142],"complexity":[145],"this":[147,172],"expected":[150],"be":[152],"reduced":[153],"approximately":[155],"28%":[156],"compared":[157],"recent":[159],"studies,":[160],"while":[161],"average":[163],"information":[164],"entropy":[165],"ciphertext":[168],"reaches":[169],"7.9987.":[170],"Overall,":[171],"study":[173],"novel,":[176],"secure":[177],"efficient":[179],"method,":[184],"its":[186],"source":[187],"code":[188],"publicly":[189],"available":[190],"at":[191],"https://github.com/Ssshou7/STP-GoL.":[192]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-11-20T00:00:00"}
