{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T09:16:25Z","timestamp":1772183785782,"version":"3.50.1"},"reference-count":46,"publisher":"Institution of Engineering and Technology (IET)","issue":"6","license":[{"start":{"date-parts":[[2022,2,3]],"date-time":"2022-02-03T00:00:00Z","timestamp":1643846400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61801127"],"award-info":[{"award-number":["61801127"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012245","name":"Science and Technology Planning Project of Guangdong Province","doi-asserted-by":"publisher","award":["2019B010140002"],"award-info":[{"award-number":["2019B010140002"]}],"id":[{"id":"10.13039\/501100012245","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012245","name":"Science and Technology Planning Project of Guangdong Province","doi-asserted-by":"publisher","award":["2020B111110002"],"award-info":[{"award-number":["2020B111110002"]}],"id":[{"id":"10.13039\/501100012245","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Image Processing"],"published-print":{"date-parts":[[2022,5]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>In this paper, a secure plaintext\u2010related image encryption scheme based on compressive sensing and a tent\u2010sine system is proposed. First, the discrete wavelet transform (DWT) is used to transform the plain image to get a coefficient matrix. Second, several chaotic sequences generated by the tent\u2010sine chaotic map are used to scramble the coefficient matrix and construct a measurement matrix. Afterward, compressive sensing is performed on the coefficient matrix to obtain a small\u2010sized encrypted image. Finally, an image encryption scheme related to plaintext is designed. In particular, the proposed system uses the original image information to participate in the encryption process, ensuring the high sensitivity of the cryptosystem to minor differences in the plain image and good performance on resisting known\/selected plaintext attacks. Furthermore, to convey the plaintext\u2010related parameters to the receiver, the dimension of the ciphertext image is expanded, and the parameters are embedded into the ciphertext image. Simulation results and security analysis show that the proposed image encryption system has strong plaintext sensitivity and robustness for effectively resisting various typical attacks such as brute\u2010force attacks, statistical attacks, and differential\u00a0attacks.<\/jats:p>","DOI":"10.1049\/ipr2.12429","type":"journal-article","created":{"date-parts":[[2022,2,4]],"date-time":"2022-02-04T01:14:13Z","timestamp":1643937253000},"page":"1544-1557","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Novel and secure plaintext\u2010related image encryption algorithm based on compressive sensing and tent\u2010sine system"],"prefix":"10.1049","volume":"16","author":[{"given":"Shufeng","family":"Huang","sequence":"first","affiliation":[{"name":"School of Automation Guangdong University of Technology  Guangzhou P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9636-499X","authenticated-orcid":false,"given":"Linqing","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Advanced Manufacturing Guangdong University of Technology  Guangzhou P. R. China"}]},{"given":"Shuting","family":"Cai","sequence":"additional","affiliation":[{"name":"School of Automation Guangdong University of Technology  Guangzhou P. R. China"}]},{"given":"Xiaoming","family":"Xiong","sequence":"additional","affiliation":[{"name":"School of Automation Guangdong University of Technology  Guangzhou P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7111-1494","authenticated-orcid":false,"given":"Yuan","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Automation Guangdong University of Technology  Guangzhou P. R. China"}]}],"member":"265","published-online":{"date-parts":[[2022,2,3]]},"reference":[{"key":"e_1_2_9_2_1","doi-asserted-by":"crossref","unstructured":"Pehl\u00efvano\u011flu M.K. Duru N.:Encryption of Walsh Hadamard transform applied images with the aes encryption algorithm. In:2016 24th Signal Processing and Communication Application Conference (SIU) pp.301\u2013304.IEEE Piscataway(2016).https:\/\/doi.org\/10.1109\/SIU.2016.7495737","DOI":"10.1109\/SIU.2016.7495737"},{"key":"e_1_2_9_3_1","doi-asserted-by":"crossref","unstructured":"Zhang Q. Ding Q.:Digital image encryption based on advanced encryption standard (AES). In:2015 Fifth International Conference on Instrumentation and Measurement Computer Communication and Control (IMCCC) pp.1218\u20131221.IEEE Piscataway(2015).https:\/\/doi.org\/10.1109\/IMCCC.2015.261","DOI":"10.1109\/IMCCC.2015.261"},{"key":"e_1_2_9_4_1","doi-asserted-by":"crossref","unstructured":"Pathak S. kamble R. Chaursia D.:An efficient data encryption standard image encryption technique with RGB random uncertainty. In:2014 International Conference on Reliability Optimization and Information Technology (ICROIT) pp.413\u2013421.IEEE Piscataway(2014).https:\/\/doi.org\/10.1109\/ICROIT.2014.6798366","DOI":"10.1109\/ICROIT.2014.6798366"},{"key":"e_1_2_9_5_1","first-page":"1","article-title":"Adaptive steganographic algorithm using cryptographic encryption rsa algorithms","volume":"2","author":"Sharma M.","year":"2013","journal-title":"J. Eng. Comp. Appl. Sci."},{"key":"e_1_2_9_6_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127417500912"},{"key":"e_1_2_9_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2017.11.009"},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4288-z"},{"key":"e_1_2_9_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/e21080790"},{"key":"e_1_2_9_10_1","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/26\/10\/100504"},{"key":"e_1_2_9_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.08.005"},{"key":"e_1_2_9_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.09.029"},{"key":"e_1_2_9_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09111-1"},{"key":"e_1_2_9_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2021.108041"},{"key":"e_1_2_9_15_1","first-page":"27611","article-title":"A novel image encryption scheme based on arnold scrambling and lucas series, Multim","volume":"78","author":"Batool S.I.","year":"2019","journal-title":"Tools and Applications"},{"key":"e_1_2_9_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106139"},{"key":"e_1_2_9_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.08.020"},{"key":"e_1_2_9_18_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym12091497"},{"key":"e_1_2_9_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08282-w"},{"key":"e_1_2_9_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/e20040282"},{"key":"e_1_2_9_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2013.05.092"},{"key":"e_1_2_9_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2019.105703"},{"key":"e_1_2_9_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107563"},{"key":"e_1_2_9_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00340-020-7397-3"},{"key":"e_1_2_9_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7642-0"},{"key":"e_1_2_9_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3913-3"},{"key":"e_1_2_9_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107629"},{"key":"e_1_2_9_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.11.016"},{"key":"e_1_2_9_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2021.108220"},{"key":"e_1_2_9_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10850-y"},{"key":"e_1_2_9_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.10.007"},{"key":"e_1_2_9_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107684"},{"key":"e_1_2_9_33_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21030758"},{"key":"e_1_2_9_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.02.007"},{"key":"e_1_2_9_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2018.11.015"},{"key":"e_1_2_9_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2011.2145070"},{"key":"e_1_2_9_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.crma.2008.03.014"},{"key":"e_1_2_9_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.10.034"},{"key":"e_1_2_9_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.08.079"},{"key":"e_1_2_9_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2014.06.054"},{"key":"e_1_2_9_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2019.04.011"},{"key":"e_1_2_9_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2016.02.018"},{"key":"e_1_2_9_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106178"},{"key":"e_1_2_9_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2019.105769"},{"key":"e_1_2_9_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-013-1699-y"},{"key":"e_1_2_9_46_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127406015970"},{"key":"e_1_2_9_47_1","doi-asserted-by":"publisher","DOI":"10.3390\/e21090819"}],"container-title":["IET Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/ipr2.12429","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/ipr2.12429","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/ipr2.12429","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T06:51:18Z","timestamp":1761634278000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/ipr2.12429"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,3]]},"references-count":46,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["10.1049\/ipr2.12429"],"URL":"https:\/\/doi.org\/10.1049\/ipr2.12429","archive":["Portico"],"relation":{},"ISSN":["1751-9659","1751-9667"],"issn-type":[{"value":"1751-9659","type":"print"},{"value":"1751-9667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,3]]},"assertion":[{"value":"2021-09-22","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-01-10","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-02-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}