{"id":"https://openalex.org/W3116277437","doi":"https://doi.org/10.1155/2020/6665702","title":"Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing","display_name":"Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing","publication_year":2020,"publication_date":"2020-12-29","ids":{"openalex":"https://openalex.org/W3116277437","doi":"https://doi.org/10.1155/2020/6665702","mag":"3116277437"},"language":"en","primary_location":{"id":"doi:10.1155/2020/6665702","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/6665702","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/6665702.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/6665702.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026074373","display_name":"Yongli Tang","orcid":"https://orcid.org/0000-0003-2783-7065"},"institutions":[{"id":"https://openalex.org/I4210166499","display_name":"Henan Polytechnic University","ror":"https://ror.org/05vr1c885","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210166499"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongli Tang","raw_affiliation_strings":["School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo 454003, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo 454003, China","institution_ids":["https://openalex.org/I4210166499"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101414988","display_name":"Mingjie Zhao","orcid":"https://orcid.org/0000-0002-6911-7990"},"institutions":[{"id":"https://openalex.org/I4210166499","display_name":"Henan Polytechnic University","ror":"https://ror.org/05vr1c885","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210166499"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingjie Zhao","raw_affiliation_strings":["School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo 454003, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo 454003, China","institution_ids":["https://openalex.org/I4210166499"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100734102","display_name":"Lixiang Li","orcid":"https://orcid.org/0000-0001-8541-308X"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lixiang Li","raw_affiliation_strings":["Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunication, Beijing 100876, China"],"affiliations":[{"raw_affiliation_string":"Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunication, Beijing 100876, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100734102"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":2.1565,"has_fulltext":true,"cited_by_count":15,"citation_normalized_percentile":{"value":0.86992153,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10500","display_name":"Sparse and Compressive Sensing Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10500","display_name":"Sparse and Compressive Sensing Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11210","display_name":"Mathematical Analysis and Transform Methods","score":0.9868000149726868,"subfield":{"id":"https://openalex.org/subfields/2604","display_name":"Applied Mathematics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8311737179756165},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8039059638977051},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.7981033325195312},{"id":"https://openalex.org/keywords/compressed-sensing","display_name":"Compressed sensing","score":0.685772716999054},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5146199464797974},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.4095519185066223},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.359282910823822},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.30740392208099365},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.17878711223602295},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16850629448890686},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.16397958993911743}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8311737179756165},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8039059638977051},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.7981033325195312},{"id":"https://openalex.org/C124851039","wikidata":"https://www.wikidata.org/wiki/Q2665459","display_name":"Compressed sensing","level":2,"score":0.685772716999054},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5146199464797974},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.4095519185066223},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.359282910823822},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.30740392208099365},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.17878711223602295},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16850629448890686},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.16397958993911743}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/6665702","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/6665702","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/6665702.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:183e302aca144de6b91b401030ba9f15","is_oa":true,"landing_page_url":"https://doaj.org/article/183e302aca144de6b91b401030ba9f15","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/6665702","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/6665702","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/6665702.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G127458052","display_name":null,"funder_award_id":"61972051","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2396152343","display_name":null,"funder_award_id":"62032002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2685161984","display_name":null,"funder_award_id":"LNCT2019-A04","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2802911279","display_name":null,"funder_award_id":"Young","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G465811208","display_name":null,"funder_award_id":"2018GGJS058","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8208342437","display_name":null,"funder_award_id":"1 and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8473897616","display_name":null,"funder_award_id":"20IRTSTHN013","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3116277437.pdf","grobid_xml":"https://content.openalex.org/works/W3116277437.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W1621331350","https://openalex.org/W1830572398","https://openalex.org/W1974073264","https://openalex.org/W1998706302","https://openalex.org/W2026713334","https://openalex.org/W2035069444","https://openalex.org/W2046658845","https://openalex.org/W2092886131","https://openalex.org/W2111303611","https://openalex.org/W2113005260","https://openalex.org/W2116148865","https://openalex.org/W2127271355","https://openalex.org/W2129638195","https://openalex.org/W2145096794","https://openalex.org/W2151693816","https://openalex.org/W2154332973","https://openalex.org/W2156364114","https://openalex.org/W2157072231","https://openalex.org/W2158338470","https://openalex.org/W2221861198","https://openalex.org/W2289917018","https://openalex.org/W2588353154","https://openalex.org/W2612400923","https://openalex.org/W2619972866","https://openalex.org/W2733953350","https://openalex.org/W2767289158","https://openalex.org/W2790033804","https://openalex.org/W2895660505","https://openalex.org/W2897664099","https://openalex.org/W2900684459","https://openalex.org/W3098520355","https://openalex.org/W4250955649","https://openalex.org/W6636652102"],"related_works":["https://openalex.org/W2158224665","https://openalex.org/W2379589510","https://openalex.org/W4300044672","https://openalex.org/W1881631164","https://openalex.org/W2810730439","https://openalex.org/W1976264255","https://openalex.org/W2358292267","https://openalex.org/W2378166785","https://openalex.org/W1964277756","https://openalex.org/W2376048186"],"abstract_inverted_index":{"The":[0,39,149],"rapid":[1],"development":[2],"of":[3,13,41,65,73,106,116,127,172,181,190],"the":[4,11,36,54,62,66,71,74,82,91,103,107,114,117,125,128,154,169,173,179,182,187,199],"Internet":[5],"leads":[6],"to":[7,31,87,110],"a":[8,98,134,142,205,213],"surge":[9],"in":[10,153],"amount":[12],"information":[14,23],"transmission":[15,63],"and":[16,33,51,90,113,136,146,161,195,209,217,226],"brings":[17],"many":[18],"security":[19,72,115],"problems.":[20],"For":[21],"multimedia":[22],"transmission,":[24],"especially":[25],"digital":[26],"images,":[27],"it":[28],"is":[29,156],"necessary":[30],"compress":[32,50],"encrypt":[34,52],"at":[35,53],"same":[37,55],"time.":[38],"emergence":[40],"compressive":[42,79,92,147,210],"sensing":[43,48,80,93,211],"solves":[44],"this":[45],"problem.":[46],"Compressive":[47],"can":[49,58,94,119,221],"time,":[56],"which":[57,165,220],"not":[59,166],"only":[60,102,167],"reduce":[61],"bandwidth":[64],"network":[67],"but":[68,176],"also":[69,177],"improve":[70],"system.":[75,130,184],"However,":[76],"when":[77],"using":[78,124,141],"encryption,":[81],"whole":[83],"measurement":[84],"matrix":[85,108],"needs":[86],"be":[88,95,111,120],"stored,":[89,112],"combined":[96],"with":[97],"chaotic":[99,129,144,150,163,170,174,183,193,207],"system,":[100],"so":[101],"generation":[104],"parameters":[105],"need":[109],"system":[118,175],"further":[121],"improved":[122],"by":[123,158],"sensitivity":[126],"This":[131],"paper":[132],"introduces":[133],"secure":[135],"efficient":[137],"image":[138,200],"compression-encryption":[139,201],"scheme":[140,155,202],"new":[143,160,206],"structure":[145,208],"sensing.":[148],"map":[151],"used":[152],"generated":[157],"our":[159],"universal":[162],"structure,":[164],"expands":[168],"range":[171],"improves":[178],"performance":[180,188],"After":[185],"analyzing":[186],"comparison":[189],"traditional":[191],"one-dimensional":[192],"maps":[194],"some":[196],"existing":[197],"methods,":[198],"based":[203],"on":[204],"has":[212],"good":[214],"encryption":[215],"effect":[216],"large":[218],"keyspace,":[219],"resist":[222],"brute":[223],"force":[224],"attack":[225],"statistical":[227],"attack.":[228]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
