ABSTRACT
In the case of limited bandwidth and storage space, the traditional image encryption algorithm cannot achieve both compression and encryption. This paper studies the image encryption algorithm based on compressed sensing theory. In this paper, the chaotic sequence generated by various chaotic equations is applied to construct the perceptual matrix, and then the parallel signal compression sampling scheme is assumed to process the original signal. Then the scrambling and diffusion mechanism is used to further encrypt the measured value which improves the security of transmitting ciphertext. Finally, the Orthogonal Matching Pursuit (OMP) is utilized to reconstruct the measured values to obtain the reconstructed signal to recover the image. The test results manifest that the high compression ratio can be maintained on the basis of ensuring the encryption efficiency and quality of the image. The security performance test results such as key space, plaintext sensitivity and information entropy illustrate that the encryption algorithm in this paper has high security.
- D. L. Donoho, "Compressed sensing," IEEE Transactions on Information Theory, vol. 52, iss. 4, pp. 1289--1306, 2006.Google ScholarDigital Library
- Y. Jun, S. E. I. Wei, C. H. Yang, and J. Zhu, "High-quality image restoration from partial mixed adaptive-random measurements," Multimedia Tools and Applications, vol.75, iss.11, pp. 6189--6205, 2016.Google ScholarDigital Library
- Q. Wang, M. Wei, X. Chen, and Z. Miao, "Joint encryption and compression of 3D images based on tensor compressive sensing with non-autonomous 3D chaotic system," Multimedia Tools and Applications, vol. 77, pp. 1715--1734, 2018.Google ScholarDigital Library
- R. Tan, S. Y. Chiu, H. H. Nguyen, D. K. Y. Yau, and D. Jung, "A Joint Data Compression and Encryption Approach for Wireless Energy Auditing Networks," ACM Transactions on Sensor Networks, vol. 13, iss. 2, pp. 1--32, 2017.Google ScholarDigital Library
- X. Chai, X. Zheng, Z. Gan, D. Han, and Y. Chen., "an image encryption algorithm based on chaotic system and compressive sensing,". Signal Processing, vol. 148, iss. 1, pp. 124--144, 2018.Google ScholarDigital Library
- Y. Zhang, K. W. Wong, D. Xiao, and L. Y. Zhang. "Embedding cryptographic features in compressive sensing," Neurocomputing, 10.1016/j.neucom.2016.04.053, 2016.Google ScholarDigital Library
Index Terms
- Research on Image Encryption Based on Compressed Sensing
Recommendations
Introducing the counter mode of operation to Compressed Sensing based encryption
Compressed Sensing based encryption is computationally secure in a one time key scenario, but it does not resist chosen-plaintext attacks (CPA) due to the deterministic encryption process. This paper introduces the counter mode of operation to ...
Cryptanalysis of the RCES/RSES image encryption scheme
Recently, a chaos-based image encryption scheme called RCES (also called RSES) was proposed. This paper analyses the security of RCES, and points out that it is insecure against the known/chosen-plaintext attacks: the number of required known/chosen ...
A multi-party secure encryption-sharing hybrid scheme for image data base on compressed sensing
AbstractA multi-party secure encryption-sharing hybrid scheme for image data base on compressed sensing (CS) is proposed. Traditional image compression and encryption schemes only transmit a single secret image in the network, which is easy to ...
Comments