Visually secure encryption embedded with multiple types of images using semi-tensor product compressed sensing

被引:1
作者
Fu, Jianzhao [1 ]
Guo, Peilian [1 ]
机构
[1] Shandong Normal Univ, Sch Informat Sci & Engn, 1 Daxue Rd, Jinan 250358, Peoples R China
基金
中国国家自然科学基金;
关键词
visual security; semi-tensor product compressed sensing; image encryption; chaotic system; CHAOTIC SYSTEM; ALGORITHM;
D O I
10.1088/1402-4896/ad5e45
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
An image encryption scheme with visual security is designed by combining the semi-tensor product compressed sensing (STP-CS) with multi-embedding strategy. Specifically, the optimized measurement matrix is firstly generated by chaotic system and singular value decomposition (SVD), and the optimized measurement matrix is used to obtain the measurement value matrix by STP-CS operation on the color image. Next, the reorganized measurement value matrix is scrambled and diffused with the key matrix generated by 2D Logistic-Sine-coupling map (2D-LSCM) to obtain the noise-like encrypted image. Finally, an image embedding method is introduced to embed the compressed noise-like encrypted image into a color or grayscale carrier image to obtain a visually secure color or grayscale encrypted image. SHA-256 is used to generate the initial values of chaotic systems, which are embedded into the carrier image to effectively reduce transmission and storage. The simulation results show that the visually secure encryption scheme is more reliable and outperforms other encryption algorithms.
引用
收藏
页数:18
相关论文
共 34 条
  • [11] From STP to game-based control
    Cheng, Daizhan
    Qi, Hongsheng
    Liu, Zequn
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (01)
  • [12] Compressed sensing
    Donoho, DL
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (04) : 1289 - 1306
  • [13] 2D Logistic-Sine-coupling map for image encryption
    Hua, Zhongyun
    Jin, Fan
    Xu, Binxuan
    Huang, Hejiao
    [J]. SIGNAL PROCESSING, 2018, 149 : 148 - 161
  • [14] Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks
    Li, Chengqing
    Feng, Bingbing
    Li, Shujun
    Kurths, Juergen
    Chen, Guanrong
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2019, 66 (06) : 2322 - 2335
  • [15] Fractional-order double-ring erbium-doped fiber laser chaotic system and its application on image encryption
    Li, Xuejun
    Mou, Jun
    Xiong, Li
    Wang, Zhisen
    Xu, Ji
    [J]. OPTICS AND LASER TECHNOLOGY, 2021, 140 (140)
  • [16] A novel plaintext-related image encryption scheme using hyper-chaotic system
    Li, Zhen
    Peng, Changgen
    Li, Liangrong
    Zhu, Xiaoyan
    [J]. NONLINEAR DYNAMICS, 2018, 94 (02) : 1319 - 1333
  • [17] Verifiable visually meaningful image encryption based on compressed sensing (CS) and improved game of life (IGOL)
    Long, Guoqiang
    Zhou, Lin
    Gan, Zhihua
    Chai, Xiuli
    Fu, Zhifeng
    Ma, Yakun
    [J]. OPTIK, 2022, 262
  • [18] Intelligent Classification and Recognition of Acoustic Targets Based on Semi-tensor Product Deep Neural Network
    Ma, Shilei
    Wang, Haiyan
    Shen, Xiaohong
    Wang, Xin
    [J]. OCEANS 2019 - MARSEILLE, 2019,
  • [19] Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption
    Preishuber, Mario
    Huetter, Thomas
    Katzenbeisser, Stefan
    Uhl, Andreas
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) : 2137 - 2150
  • [20] Comparative analysis of integer wavelet transforms in reversible data hiding using threshold based histogram modification
    Shaik, Ahmad
    Thanikaiselvan, V.
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (07) : 878 - 889