{"id":"https://openalex.org/W3153833593","doi":"https://doi.org/10.1155/2021/6625579","title":"A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model","display_name":"A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model","publication_year":2021,"publication_date":"2021-04-09","ids":{"openalex":"https://openalex.org/W3153833593","doi":"https://doi.org/10.1155/2021/6625579","mag":"3153833593"},"language":"en","primary_location":{"id":"doi:10.1155/2021/6625579","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6625579","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/6625579.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2021/6625579.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100355531","display_name":"Zhuo Liu","orcid":"https://orcid.org/0000-0002-7591-7775"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]},{"id":"https://openalex.org/I4210087731","display_name":"Guizhou Education University","ror":"https://ror.org/002x6f380","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210087731"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhuo Liu","raw_affiliation_strings":["College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China","School of Mathematics and Big Data, Guizhou Education University, Guiyang 550018, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China","institution_ids":["https://openalex.org/I10535382"]},{"raw_affiliation_string":"School of Mathematics and Big Data, Guizhou Education University, Guiyang 550018, China","institution_ids":["https://openalex.org/I4210087731"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052330166","display_name":"Yong Wang","orcid":"https://orcid.org/0000-0002-5247-043X"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yong Wang","raw_affiliation_strings":["College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015011245","display_name":"Leo Yu Zhang","orcid":"https://orcid.org/0000-0001-9330-2662"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Leo Yu Zhang","raw_affiliation_strings":["School of Information Technology, Deakin University, Victoria 3216, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Victoria 3216, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100357282","display_name":"Jun Ma","orcid":"https://orcid.org/0000-0002-6127-000X"},"institutions":[{"id":"https://openalex.org/I22716506","display_name":"Lanzhou University of Technology","ror":"https://ror.org/03panb555","country_code":"CN","type":"education","lineage":["https://openalex.org/I22716506"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Ma","raw_affiliation_strings":["Department of Physics, Lanzhou University of Technology, Lanzhou 730050, China"],"affiliations":[{"raw_affiliation_string":"Department of Physics, Lanzhou University of Technology, Lanzhou 730050, China","institution_ids":["https://openalex.org/I22716506"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5052330166"],"corresponding_institution_ids":["https://openalex.org/I10535382"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.874,"has_fulltext":true,"cited_by_count":10,"citation_normalized_percentile":{"value":0.7522254,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"2021","issue":null,"first_page":"1","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.967199981212616,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8348935842514038},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8058912754058838},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.6197724938392639},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5241137742996216},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5146051645278931},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4930231273174286},{"id":"https://openalex.org/keywords/digital-image","display_name":"Digital image","score":0.4698200523853302},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.45522794127464294},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.37636590003967285},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33746105432510376},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.28250056505203247},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.27475541830062866},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.27353420853614807},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2648859918117523}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8348935842514038},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8058912754058838},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.6197724938392639},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5241137742996216},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5146051645278931},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4930231273174286},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.4698200523853302},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.45522794127464294},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.37636590003967285},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33746105432510376},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.28250056505203247},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.27475541830062866},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27353420853614807},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2648859918117523},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1155/2021/6625579","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6625579","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/6625579.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:6338496c1ff94ba7ae4a718899a1dbe3","is_oa":true,"landing_page_url":"https://doaj.org/article/6338496c1ff94ba7ae4a718899a1dbe3","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2021 (2021)","raw_type":"article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30150184","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401102","display_name":"Own your potential (DEAKIN)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:figshare.com:article/20670852","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/A_Novel_Compressive_Image_Encryption_with_an_Improved_2D_Coupled_Map_Lattice_Model/20670852","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1155/2021/6625579","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6625579","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/6625579.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1542567006","display_name":null,"funder_award_id":"BYJS202003","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2707769735","display_name":null,"funder_award_id":"61572089","funder_id":"https://openalex.org/F4320322687","funder_display_name":"Chongqing University of Posts and Telecommunications"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3814346097","display_name":null,"funder_award_id":"QianKeHeJiChu[2020]1Y422","funder_id":"https://openalex.org/F4320322687","funder_display_name":"Chongqing University of Posts and Telecommunications"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4020255992","display_name":null,"funder_award_id":"Project","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4875291083","display_name":null,"funder_award_id":"2020ZD006","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5725801159","display_name":null,"funder_award_id":"BYJS202003","funder_id":"https://openalex.org/F4320322687","funder_display_name":"Chongqing University of Posts and Telecommunications"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6016779305","display_name":null,"funder_award_id":"61572089","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6225238569","display_name":null,"funder_award_id":"QianKeHeJiChu[2020]1Y422","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6275062119","display_name":null,"funder_award_id":"202003","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7608752429","display_name":null,"funder_award_id":"Talent","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8738402027","display_name":null,"funder_award_id":"2020ZD006","funder_id":"https://openalex.org/F4320322687","funder_display_name":"Chongqing University of Posts and Telecommunications"}],"funders":[{"id":"https://openalex.org/F4320318381","display_name":"Guizhou Education University","ror":"https://ror.org/002x6f380"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321135","display_name":"Chongqing University","ror":"https://ror.org/023rhb549"},{"id":"https://openalex.org/F4320322687","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3153833593.pdf","grobid_xml":"https://content.openalex.org/works/W3153833593.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W1530653297","https://openalex.org/W1827147299","https://openalex.org/W1982747216","https://openalex.org/W2026612438","https://openalex.org/W2129638195","https://openalex.org/W2142980655","https://openalex.org/W2176627963","https://openalex.org/W2241882783","https://openalex.org/W2522836612","https://openalex.org/W2564423968","https://openalex.org/W2592206357","https://openalex.org/W2604466980","https://openalex.org/W2796532828","https://openalex.org/W2876368481","https://openalex.org/W2884760936","https://openalex.org/W2886611292","https://openalex.org/W2910387327","https://openalex.org/W2921570539","https://openalex.org/W2937906878","https://openalex.org/W2944475660","https://openalex.org/W2999085887","https://openalex.org/W3009587941","https://openalex.org/W3028018534","https://openalex.org/W3033768243","https://openalex.org/W3043315433","https://openalex.org/W3048752794","https://openalex.org/W3049294436","https://openalex.org/W3084001442","https://openalex.org/W3112281491","https://openalex.org/W6730718829"],"related_works":["https://openalex.org/W2376048186","https://openalex.org/W2104599943","https://openalex.org/W2387112055","https://openalex.org/W2391464897","https://openalex.org/W2376168677","https://openalex.org/W2025536124","https://openalex.org/W4387763778","https://openalex.org/W2368473326","https://openalex.org/W2358057490","https://openalex.org/W2368647523"],"abstract_inverted_index":{"The":[0],"digital":[1,41,220],"image,":[2,42],"as":[3],"the":[4,17,40,43,50,53,70,73,79,84,106,115,125,137,150,155,161,175,185,199,219],"critical":[5],"component":[6],"of":[7,19,27,36,52,78,114,152],"information":[8,38],"transmission":[9],"and":[10,23,29,49,128,171,193,210],"storage,":[11],"has":[12,57,214],"been":[13],"widely":[14],"used":[15],"in":[16,39,62,83,223],"fields":[18],"big":[20],"data,":[21],"cloud":[22],"frog":[24],"computing,":[25],"Internet":[26],"things,":[28],"so":[30],"on.":[31],"Due":[32],"to":[33,68,104],"large":[34],"amounts":[35],"private":[37],"image":[44,55,146,187,201,221],"protection":[45],"is":[46,93,180],"fairly":[47],"essential,":[48],"designing":[51],"encryption":[54,147,186,202,208],"scheme":[56,203],"become":[58,133],"a":[59,144],"hot":[60],"issue":[61],"recent":[63],"years.":[64],"In":[65],"this":[66],"paper,":[67],"resolve":[69],"shortcoming":[71],"that":[72,184,198],"probability":[74],"density":[75],"distribution":[76],"(PDD)":[77],"chaotic":[80,122,131,157],"sequences":[81,132,158],"generated":[82,159],"original":[85,116,126],"two-dimensional":[86],"coupled":[87],"map":[88],"lattice":[89],"(2D":[90],"CML)":[91],"model":[92,102,165],"uneven,":[94],"we":[95,142],"firstly":[96],"proposed":[97,200],"an":[98],"improved":[99,138,162],"2D":[100,139,163],"CML":[101,140,164],"according":[103],"adding":[105],"offsets":[107],"for":[108,168,182,217],"each":[109],"node":[110],"after":[111],"every":[112],"iteration":[113],"model,":[117,141],"which":[118],"possesses":[119],"much":[120],"better":[121],"performance":[123],"than":[124],"one,":[127],"also":[129],"its":[130],"uniform.":[134],"Based":[135],"on":[136],"designed":[143],"compressive":[145],"scheme.":[148],"Under":[149],"condition":[151],"different":[153],"keys,":[154],"uniform":[156],"by":[160],"are":[166],"utilized":[167],"compressing,":[169],"confusing,":[170],"diffusing,":[172],"respectively.":[173],"Meanwhile,":[174],"message":[176],"authentication":[177],"code":[178],"(MAC)":[179],"employed":[181],"guaranteeing":[183],"be":[188],"integration.":[189],"Finally,":[190],"theoretical":[191],"analysis":[192],"simulation":[194],"tests":[195],"both":[196],"demonstrate":[197],"owns":[204],"outstanding":[205],"statistical,":[206],"well":[207],"performance,":[209],"high":[211],"security.":[212],"It":[213],"great":[215],"potential":[216],"ensuring":[218],"security":[222],"application.":[224]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3}],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2025-10-10T00:00:00"}
