ABSTRACT
A mapping function relation is generated by a variational mode decomposition (VMD) transform, and an adaptive image encryption algorithm based on VMD is proposed. The image sequence is generated using VMD is divided into high frequency, middle frequency, and low frequency according to the entropy value of its mode transformation. The advantages of this algorithm are that the cross-mapping is generated according to VMD, the low-frequency part is the main energy concentration area of the image, the image processing encryption is carried out in the other generated images, the encryption does not affect the original image, and the robustness is improved. The simulation results showed that the algorithm had a good effect of encryption and restoration by measuring the root mean square error and the Euclidean distance. Experiment showed that the proposed method was more robust to the complex distribution of faces than the existing methods considered, yielding favourably comparable results to the state-of-the-art methods on data encryption. The results also showed that the proposed method was scalable in other areas of datasets. Furthermore, we showed that the proposed method did not need the number of features as a prior, was aware of noises and outliers, and could be extended to a multi-view version for more accurate clustering accuracy. These steps, which should require generation of the final output from the styled paper, are mentioned here in this paragraph. First, users have to run "Reference Numbering" from the "Reference Elements" menu; this is the first step to start the bibliography marking (it should be clicked while keeping the cursor at the beginning of the reference list). After the marking is complete, the reference element runs all the options under the "Cross Linking" menu.
- JIANG Hong, SU Yang. Denoising Method Based on Improved Wavelet Threshold Function. [J] Laser & Infrared, 2016, 46(1):119--122.Google Scholar
- Jiang L, Fu C, Liu W, etal. Lidar Backscattering Signal Denoising Method based on Adaptive Multi-scale Morpho-logical Filtering and EMD [J]. Infrared and Laser Engineering, 2015, 44(5):1673--1679.Google Scholar
- Xia H, Shang guan M, Wang C, et al. Micro-pulse upcon-version Doppler lidar for wind and visibility detection in the atmospheric boundary layer[J]. Optics Letters, 2016, 41(22):5218Google ScholarCross Ref
- Chang J, Zhu L, Li H, et al. Noise reduction in Lidar signal using correlation-based EMD combined with soft thresholding and roughness penalty[J]. Optics Communications, 2018, 407:290--295.Google ScholarCross Ref
- CUI Shanzheng, GUO Yanzhen, LIANG Zhao, et al. Application of variational mode decomposition in removing ECG signal baseline drift[J]. Journal of Electronic Measurement and Instrumentation, 2018, 32(2): 167--171.Google Scholar
- Konstantin Dragomiretskiy, Dominique Zosso Variational Mode Decomposition IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 62, NO., 2014, 531--544.Google Scholar
- An X, Yang J. Denoising of hydropower unit vibration signal based on variational mode decomposition and approximate entropy[J]. Transactions of the Institute of Measurement&Control, 2016, 38(3).Google Scholar
- N. Pustelnik, P. Borgnat, and P. Flandrin, A multicomponent proximalalgorithm for empirical mode decomposition, in Proc. IEEE 20th Eur. Signal Process. Conf. (EUSIPCO), 2012, 1880--1884.Google Scholar
- T. Y. Hou and Z. Shi, Adaptive data analysis via sparse time-frequency representation, Adv. Adapt. Data Anal., vol. 03, no. 1 & 2. 1--28, Apr. 2011.Google Scholar
- XU Fan, CHANG Jian-hua, LIU Bing-gang, etl. De-noising method research for lidar echo signal based on variational mode decomposition [J]. LASER&INFARED. 2018, Vol. 48, No. 11, 1443--1448.Google Scholar
- XIAO Han, LV Yong, WANG Tao. Detrended fluctuation analysis to gears vibration signals and its application infault classification[J]. Journal of Vibration Engineering, 2015(2):331--336.Google Scholar
- M. Rostaghi, H. Azami, Dispersion entropy: a measure for time series analysis, IEEE Signal Process. Lett. 2016 (23), 1--1.Google Scholar
- F. ACastano, AM. Hernandez, Autoregressive Models of Electrocardiographicsignal Contaminated with Motion Artifacts: Benchmark for Biomedical Signalprocessing Studies, in: VII Latin American Congress on BiomedicalEngineering CLAIB 2016, Bucaramanga, Santander, Colombia, October 26th to 28th, 2016 IFMBE Proceedings, 2017, pp. 437--440.Google Scholar
- H. Azami, M. Rostaghi, D. Abasolo, J. Escudero, Refined composite multiscaledispersion entropy and its application to biomedical signals, IEEE Trans. Biomed. Eng. 2017 (64)(12) 2872--2879.Google Scholar
- A. B. Das, M. I. H. Bhuiyan, Discrimination and classification of focal andnon-focal EEG signals using entropy-based features in the EMD-DWT domain, Biomed. Signal Process. Control 2016 (29) 11--21.Google Scholar
- Zhang L F, Li J, Tian P. Application of Kalman Filter for Image Reconstruction of Electrical Capacitance Tomography[J]. Acta Metrologica Sinica, 2017, 38(3): 315--318.Google Scholar
- J. Manger, A chosen ciphertext attack on rsa optimal asymmetric encryption padding (oaep) as standardized in pkcs# 1 v2. 0, in: Annual International Cryptology Conference, Springer, 2001, pp. 230--238.Google Scholar
- X. Zhang W. Chen, A new chaotic algorithm for image encryption in: ICALIP 20 08 - 20 08 International Conference on Audio, Language and Image Processing, Proceedings, 2008, pp. 889--892.Google Scholar
- Tan Y, Huang H X, Xu J M, et al. Road edge detection from remote sensing image based on improved Sobel operator [J]. RemoteSensing for Land and R esources, 2016, 28 (3): 7--11.doi: 10. 6046/gtzyyg. 2016.03.02.Google Scholar
- Y. Zhou, L. Bao, C. L. P. Chen, A new 1D chaotic system for image encryption, Signal Process. 97 (2014) 172--182.Google ScholarDigital Library
- X Huang, Image encryption algorithm using chaotic chebyshev generator, Nonlinear Dyn. 67 (4) (2012) 2411--2417.Google ScholarCross Ref
- N. K. Pareek, V. Patidar, K. K. Sud, Image encryption using chaotic logistic map, Image Vis. Comput. 24 (9) (2006) 926--934.Google ScholarCross Ref
- G. Chen, Y. Mao, C. K. Chui, A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos Solit. Fract. 21 (3) (2004) 749--761.Google ScholarCross Ref
- D. Zhang, F. Zhang, Chaotic encryption and decryption of JPEG image, Optik (Stuttg) 125 (2) (2014) 717--720.Google ScholarCross Ref
- Z. Tang, X. Zhang, W. Lan, Efficient image encryption with block shuffling and chaotic map, Multimed. Tools Appl. 74 (15) (2015) 5429--5448.Google ScholarDigital Library
- A. Kanso, M. Ghebleh, A novel image encryption algorithm based on a 3D chaotic map, Commun. Nonlinear Sci. Numer. Simul. 17 (7) (2012) 2943--2959.Google ScholarCross Ref
- S. Liu, J. Sun, Z. Xu, An improved image encryption algorithm based on chaotic system, J. Comput. (Taipei) 4 (11) (2009) 1091--1100.Google ScholarCross Ref
- B. Wang, Y. Xie, C. Zhou, S. Zhou, X. Zheng, Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps, Optik (Stuttg) 127 (7) (2016) 3541--3545.Google ScholarCross Ref
- G. Srividya, P. Nandakumar, A Triple-Key chaotic image encryption method, in: ICCSP 2011 - 2011 International Conference on Communications and Signal Processing, 2011, pp. 266--270.Google ScholarCross Ref
- B. Norouzi, S. Mirzakuchaki, A fast color image encryption algorithm based on hyper-chaotic systems, Nonlinear Dyn. 78 (2) (2014) 995--1015Google ScholarCross Ref
- F. Y. Sun, S. T. Liu, Z. W. Lü, Image encryption using high-dimension chaotic sys- tem, Chin Phys. 16 (12) (2007) 3616--3623.Google ScholarCross Ref
- P. Khade, M. Narnaware, 3D Chaotic functions for image encryption, IJCSI Int. J. Comput. Sci. Issues 9 (3) (2012) 323--328.Google Scholar
- Y. Zhou, L. Bao, C. L. Chen Image encryption using a new parametric switching chaotic system, Signal Process. 93 (11) (2013) 3039--3052.Google ScholarDigital Library
- A. Pisarchik, M. Zanin, Image encryption with chaotically coupled chaotic maps, Physica D 237 (20) (2008) 2638--2648.Google ScholarCross Ref
- H. Al Haj Hassan, A. Kassem, Y. Harkouss, R. Assaf, S. El Assad, New chaotic image encryption technique, in: 2012 Symposium on Broadband Networks and Fast Internet, RELABIRA 2012, 2012, pp. 103--108.Google Scholar
- Z. Parvin, H. Seyedarabi, M. Shamsi, A new secure and sensitive image encryption scheme based on new substitution with chaotic function, Multimed. Tools Appl. 75 (17) (2016) 10631--10648.Google ScholarDigital Library
- S. El Assad, M. Farajallah, A new chaos-based image encryption system, Signal Process. Image Commun. 41 (2016) 144--157.Google ScholarDigital Library
- L. Bao, Y. Zhou, C. L. P. Chen, H. Liu, A new chaotic system for image encryption, in: Proceedings 2012 International Conference on System Science and Engi- neering, ICSSE 2012, IEEE, 2012, pp. 69--73.Google ScholarCross Ref
- T. Zhang, Y. Zhou, C. L. P. Chen, A new combined chaotic system for image en- cryption, in: CSAE 2012 - Proceedings, 2012 IEEE International Conference on Computer Science and Automation Engineering, 2, 2012, pp. 331--335.Google Scholar
- M. Kalpana, K. Ratnavelu, P. Balasubramaniam, M. Kamali, Synchronization of chaotic-type delayed neural networks and its application, Nonlinear Dyn. (2018) 1--13.Google Scholar
- G. Jakimoski, L. Kocarev, Chaos and cryptography: block encryption ciphers based on chaotic maps, IEEE Trans. Circuits Syst. I 48 (2) (2001) 163--169.Google ScholarCross Ref
- Y. Zhou, W. Cao, C. Philip Chen, Image encryption using binary bitplane, Signal Process. 100 (2014) 197--207.Google ScholarDigital Library
- K. Ratnavelu, M. Kalpana, P. Balasubramaniam, K. Wong, P. Raveendran, Im- age encryption method based on chaotic fuzzy cellular neural networks, Signal Process. 140 (2017) 87--96.Google ScholarCross Ref
- X. Chai, X. Zheng, Z. Gan, D. Han, Y. Chen, An image encryption algorithm based on chaotic system and compressive sensing, Signal Process. 148 (2018) 124--144.Google ScholarDigital Library
- A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, Technical Report, Booz-Allen and Hamilton Inc Mclean Va, 2001.Google Scholar
- S. H. Strogatz, Nonlinear dynamics and chaos, 48, Addison-Wesley Pub, 1994.Google Scholar
- B. R. Hunt, E. Ott, Defining chaos, Chaos 25 (9) (2015).Google ScholarCross Ref
- L. Kocarev, S. Lian, Chaos-based cryptography: Theory, algorithms and applica- tions, 354, Springer, 2011.Google ScholarCross Ref
- M. Asgari Chenaghlu, S. Jamali, N. Nikzad Khasmakhi, A novel keyed parallel hashing scheme based on a new chaotic system, Chaos Solit. Fract. 87 (2016) 216--225.Google ScholarCross Ref
- S. Lynch, Dynamical systems with applications using MATLAB, Springer, 2004.Google ScholarCross Ref
- M. T. Rosenstein, J. J. Collins, C. J. De Luca, A practical method for calculating largest lyapunov exponents from small data sets, Physica D 65 (1--2) (1993) 117--134.Google ScholarDigital Library
- Z. Hua, Y. Zhou, Dynamic parameter-control chaotic system, IEEE Trans. Cybern 46 (12) (2016) 3330--3341.Google ScholarCross Ref
- Y. Wu, J. P. Noonan, S. Agaian, Shannon entropy based randomness measurement and test for image encryption, arXiv:1103.5520 (2011).Google Scholar
- A. G. Weber, The USC-SIPI Image Database Version 5, USC-SIPI Report, 1997.Google Scholar
- S. Amina, F. K. Mohamed, An efficient and secure chaotic cipher algorithm for image content preservation, Commun. Nonlinear Sci. Numer. Simul 60 (2018) 12--32.Google ScholarCross Ref
- E. Yavuz, M. C. Kasapba s ι, E. Yamaç, et al., A chaos-based image encryption al- gorithm with simple logical functions, Comput. Electr. Eng 54 (2016) 471--483.Google ScholarDigital Library
- M. Farajallah, S. El Assad, O. Deforges, Fast and secure chaos-based cryptosystem for images, Int. J. Bifurcation Chaos 26 (02) (2016) 1650021.Google ScholarCross Ref
- M. Farajallah, Chaos-based Crypto and Joint Crypto-Compression Systems for Images and Videos, Universite de Nantes, 2015 Ph. D. thesis.Google Scholar
- Z. liang Zhu, W. Zhang, K. wo Wong, H. Yu, A chaos-based symmetric image encryption scheme using a bit-level permutation, Inf. Sci. (NY) 181 (6) (2011) 1171--1186.Google Scholar
Index Terms
- Performance Analysis of Adaptive Variational Mode Decomposition Approach for Image Encryption
Recommendations
Image encryption
To protect image contents, most existing encryption algorithms are designed to transform an original image into a texture-like or noise-like image which is, however, an obvious visual sign indicating the presence of an encrypted image and thus results ...
Chaotic image encryption based on bidimensional empirical mode decomposition and double random phase encoding
AbstractIn this paper, to enhance the security of double random phase encoding (DRPE), Lorenz system and bidimensional empirical mode decomposition (BEMD) are introduced into an image encryption process. By means of BEMD, the original grayscale image is ...
Color image encryption method based on 2D-variational mode decomposition
In order to reduce the correlation between adjacent pixels in a plaintext image, and to solve the small key space problem of image encryption algorithms when a low-dimension chaotic map is used, a new encryption method for color images is proposed based ...
Comments