Efficient Entropic Security with Joint Compression and Encryption Approach Based on Compressed Sensing with Multiple Chaotic Systems

被引:8
作者
Wang, Jingya [1 ]
Song, Xianhua [1 ]
Abd El-Latif, Ahmed A. [2 ,3 ]
机构
[1] Harbin Univ Sci & Technol, Sch Sci, Harbin 150080, Peoples R China
[2] Prince Sultan Univ, Coll Comp & Informat Sci, EIAS Data Sci Lab, Riyadh 11586, Saudi Arabia
[3] Menoufia Univ, Fac Sci, Dept Math & Comp Sci, Shibin Al Kawm 32511, Egypt
关键词
image encryption; compressed sensing; chaotic system; bit-cycle operation; double XOR operation; IMAGE ENCRYPTION; ALGORITHM; REPRESENTATION; PERMUTATION;
D O I
10.3390/e24070885
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
This paper puts forward a new algorithm that utilizes compressed sensing and two chaotic systems to complete image compression and encryption concurrently. First, the hash function was utilized to obtain the initial parameters of two chaotic maps, which were the 2D-SLIM and 2D-SCLMS maps, respectively. Second, a sparse coefficient matrix was transformed from the plain image through discrete wavelet transform. In addition, one of the chaotic sequences created by 2D-SCLMS system performed pixel transformation on the sparse coefficient matrix. The other chaotic sequences created by 2D-SLIM were utilized to generate a measurement matrix and perform compressed sensing operations. Subsequently, the matrix rotation was combined with row scrambling and column scrambling, respectively. Finally, the bit-cycle operation and the matrix double XOR were implemented to acquire the ciphertext image. Simulation experiment analysis showed that the compressed encryption scheme has advantages in compression performance, key space, and sensitivity, and is resistant to statistical attacks, violent attacks, and noise attacks.
引用
收藏
页数:22
相关论文
共 56 条
[1]   Controlled alternate quantum walks based privacy preserving healthcare images in Internet of Things [J].
Abd EL-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Abou-Nassar, Eman M. ;
Venegas-Andraca, Salvador E. .
OPTICS AND LASER TECHNOLOGY, 2020, 124
[2]   A new meaningful secret sharing scheme based on random grids, error diffusion and chaotic encryption [J].
Abd El-Latif, Ahmed A. ;
Yan, Xuehu ;
Li, Li ;
Wang, Ning ;
Peng, Jia-Liang ;
Niu, Xiamu .
OPTICS AND LASER TECHNOLOGY, 2013, 54 :389-400
[3]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[4]   Efficient modified RC5 based on chaos adapted to image encryption [J].
Amin, Mohamed ;
Abd El-Latif, Ahmed A. .
JOURNAL OF ELECTRONIC IMAGING, 2010, 19 (01)
[5]   Fully Porous 3D Printed Titanium Femoral Stem to Reduce Stress-Shielding Following Total Hip Arthroplasty [J].
Arabnejad, Sajad ;
Johnston, Burnett ;
Tanzer, Michael ;
Pasini, Damiano .
JOURNAL OF ORTHOPAEDIC RESEARCH, 2017, 35 (08) :1774-1783
[6]   Chaotic watermark for blind forgery detection in images [J].
Benrhouma, Oussama ;
Hermassi, Houcemeddine ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (14) :8695-8718
[7]   Near-optimal signal recovery from random projections: Universal encoding strategies? [J].
Candes, Emmanuel J. ;
Tao, Terence .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (12) :5406-5425
[8]   Cryptanalysis of a DNA-based image encryption scheme [J].
Chen, Junxin ;
Chen, Lei ;
Zhou, Yicong .
INFORMATION SCIENCES, 2020, 520 :130-141
[9]   Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression [J].
Chen, Junxin ;
Zhang, Yu ;
Qi, Lin ;
Fu, Chong ;
Xu, Lisheng .
OPTICS AND LASER TECHNOLOGY, 2018, 99 :238-248
[10]   Color image encryption based on programmable complemented maximum length cellular automata and generalized 3-D chaotic cat map [J].
Choi, Un Sook ;
Cho, Sung Jin ;
Kim, Jin Gyoung ;
Kang, Sung Won ;
Kim, Han Doo .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (31-32) :22825-22842