A visually secure image encryption scheme based on parallel compressive sensing

被引:153
作者
Wang, Hui [1 ]
Xiao, Di [1 ]
Li, Min [1 ]
Xiang, Yanping [1 ]
Li, Xinyan [2 ]
机构
[1] Chongqing Univ, Coll Comp Sci, Key Lab Dependable Serv Comp Cyber Phys Soc, Minist Educ, Chongqing 400044, Peoples R China
[2] Yangtze Normal Univ, Sch Math & Stat, Chongqing 408100, Peoples R China
基金
中国国家自然科学基金;
关键词
Image encryption; Parallel compressive sensing; Visually secure cipher image; Discrete wavelet transform; Integer discrete wavelet transform; CHAOTIC SYSTEM; SIGNAL RECOVERY; ALGORITHM; PERMUTATION;
D O I
10.1016/j.sigpro.2018.10.001
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
It is generally recognized that encrypting an original image into meaningless cipher image is an ideal method to protect image information. However, during transmission, the meaningless cipher image would draw attention and thus attract attacks. Recently, compressive sensing (CS) and carrier images have been utilized by Chai et al. to construct a novel image encryption scheme with visual security. However, in this scheme, some extra transmission is required for possible decryption besides the encrypted image. Moreover, the imperceptibility of the cipher image can be further improved and the recovered image quality would be severely degraded if unsuitable carrier images are selected. In this paper, we design a visually secure encryption scheme by using the parallel compressive sensing (PCS) counter mode and embedding technique. In order to achieve higher security level, Logistic-Tent system and 3-D Cat map are introduced to construct the measurement matrices and to disturb the order of the embedded information, respectively. Furthermore, experimental results demonstrate that the cipher image exhibits superior imperceptibility and the recovered image possesses more satisfactory quality, which is independent of the carrier image. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:218 / 232
页数:15
相关论文
共 44 条
  • [31] Vinod P. N. P., 2013, DIFFUSION SUBSTITUTI, V23
  • [32] Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
    Wang, Cong
    Zhang, Bingsheng
    Ren, Kui
    Roveda, Janet M.
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2013, 1 (01) : 166 - 177
  • [33] Wang X., 2017, SUSTAINABILITY, V9, P1
  • [34] Wu X., 2014, COMPUT SCI
  • [35] Novel quantum image encryption using one-dimensional quantum cellular automata
    Yang, Yu-Guang
    Tian, Ju
    Lei, He
    Zhou, Yi-Hua
    Shi, Wei-Min
    [J]. INFORMATION SCIENCES, 2016, 345 : 257 - 270
  • [36] Scrambling-based speech encryption via compressed sensing
    Zeng, Li
    Zhang, Xiongwei
    Chen, Liang
    Fan, Zhangjun
    Wang, Yonggang
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2012,
  • [37] Bi-level Protected Compressive Sampling
    Zhang, Leo Yu
    Wong, Kwok-Wo
    Zhang, Yushu
    Zhou, Jiantao
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2016, 18 (09) : 1720 - 1732
  • [38] A chaotic image encryption scheme owning temp-value feedback
    Zhang, Leo Yu
    Hu, Xiaobo
    Liu, Yuansheng
    Wong, Kwok-Wo
    Gan, Jie
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (10) : 3653 - 3659
  • [39] Embedding cryptographic features in compressive sensing
    Zhang, Yushu
    Zhou, Jiantao
    Chen, Fei
    Zhang, Leo Yu
    Wong, Kwok-Wo
    He, Xing
    Xiao, Di
    [J]. NEUROCOMPUTING, 2016, 205 : 472 - 480
  • [40] On the security of symmetric ciphers based on DNA coding
    Zhang, Yushu
    Xiao, Di
    Wen, Wenying
    Wong, Kwok-Wo
    [J]. INFORMATION SCIENCES, 2014, 289 : 254 - 261