Chinese Journal of Network and Information Security ›› 2022, Vol. 8 ›› Issue (5): 88-97.doi: 10.11959/j.issn.2096-109x.2022058
• Papers • Previous Articles Next Articles
Yuguang YANG, Guodong CAO
Revised:
2022-05-12
Online:
2022-10-15
Published:
2022-10-01
Supported by:
CLC Number:
Yuguang YANG, Guodong CAO. New image encryption algorithm based on double chaotic system and compressive sensing[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 88-97.
"
图像 | 明文图像 | 密文图像 | |||||
水平方向 | 垂直方向 | 对角线方向 | 水平方向 | 垂直方向 | 对角线方向 | ||
Lena | 0.972 1 | 0.984 7 | 0.956 8 | 0.001 | -0.002 4 | 0.000 8 | |
Cameramen | 0.982 4 | 0.989 6 | 0.972 2 | -0.000 2 | 0.005 2 | -0.000 8 | |
House | 0.995 6 | 0.994 5 | 0.990 4 | -0.003 3 | 0.005 2 | -0.000 7 | |
Jetplane | 0.972 7 | 0.970 3 | 0.948 7 | 0.007 4 | 0.001 1 | -0.004 5 | |
Lake | 0.975 9 | 0.976 4 | 0.961 2 | -0.001 6 | 0.000 3 | -0.005 5 | |
Livingroom | 0.946 3 | 0.952 9 | 0.912 0 | 0.000 3 | 0.000 9 | -0.007 4 | |
Woman | 0.996 4 | 0.996 9 | 0.994 5 | -0.001 | -0.002 4 | -0.001 1 | |
Peppers | 0.980 4 | 0.980 3 | 0.970 6 | -0.001 4 | -0.003 4 | 0.007 7 | |
Pirate | 0.977 5 | 0.981 3 | 0.967 0 | -0.008 5 | -0.001 5 | -0.003 5 | |
Walkbridge | 0.941 6 | 0.939 4 | 0.904 8 | 0.000 2 | -0.002 4 | 0.001 3 | |
均值 | 0.972 4 | 0.974 5 | 0.955 5 | -0.000 71 | 0.000 06 | -0.001 37 |
[1] | KAUR M , SINGH S , KAUR M ,et al. A systematic review of metaheuristic-based image encryption techniques[J]. Archives of Computational Methods in Engineering, 2022,29(5): 2563-257. |
[2] | CANDES E J , TAO T . Near-optimal signal recovery from random projections:Universal encoding strategies[J]. IEEE Transactions on Information Theory, 2006,52(12): 5406-5425. |
[3] | ORSDEMIR A , ALTUN H O , SHARMA G ,et al. On the security and robustness of encryption via compressed sensing[C]// MILCOM 2008 IEEE Military Communications Conference. 2008: 1-7. |
[4] | XU Q , SUN K , CAO C ,et al. A fast image encryption algorithm based on compressive sensing and hyperchaotic map[J]. Optics and Lasers in Engineering, 2019,12(10): 203-214. |
[5] | YE G , PAN C , DONG Y ,et al. Image encryption and hiding algo-rithm based on compressive sensing and random numbers inser-tion[J]. Signal Processing, 2020,172: 107563 |
[6] | XU Q , SUN K , HE S ,et al. An effective image encryption algo-rithm based on compressive sensing and 2D-SLIM[J]. Optics and Lasers in Engineering, 2020,134: 106178. |
[7] | WANG X , LIU C , JIANG D . A novel triple-image encryption and hiding algorithm based on chaos,compressive sensing and 3D DCT[J]. Information Sciences, 2021,574: 505-527. |
[8] | LI L , FANG Y , LIU L ,et al. Overview of compressed sensing:sensing model,reconstruction algorithm,and its applications[J]. Applied Sciences, 2020,10(17): 5909. |
[9] | AHMID M , KAZAR O . A comprehensive review of the internet of things security[J]. Journal of Applied Security Research, 2021,5(4): 1-17. |
[10] | LIU Y , ZHANG L Y , WANG J ,et al. Chosen-plaintext attack of an image encryption scheme based on modified permutation–diffusion structure[J]. Nonlinear Dynamics, 2016,84(4): 2241-2250. |
[11] | CIVINO R , BLONDEAU C , SALA M . Differential attacks:using alternative operations[J]. Designs,Codes and Cryptography, 2019,87(2): 225-247. |
[12] | KSHEERASAGAR T K , ANURADHA S , AVADHOOTHA G ,et al. Performance analysis of DS-CDMA using different chaotic se-quences[C]// 2016 International Conference on Wireless Communi-cations,Signal Processing and Networking (WiSPNET). 2016: 2421-2425. |
[13] | GONG L H , LUO H X , WU R Q ,et al. New 4D chaotic system with hidden attractors and self-excited attractors and its application in image encryption based on RNG[J]. Physica A:Statistical Me-chanics and its Applications, 2022,591: 126793. |
[14] | LIU E , TEMLYAKOV V N . The orthogonal super greedy algorithm and applications in compressed sensing[J]. IEEE Transactions on Information Theory, 2011,58(4): 2040-2047. |
[15] | MALLAT S G , ZHANG Z . Matching pursuits with time-frequency dictionaries[J]. IEEE Transactions on Signal Processing, 1993,41(12): 3397-3415. |
[16] | MOHIMANI H , BABAIE-ZADEH M , JUTTEN C . A fast approach for overcomplete sparse decomposition based on smoothed l0 norm[J]. IEEE Transactions on Signal Processing, 2008,57(1): 289-301. |
[17] | WANG X Y , ZHANG Y Q , BAO X M . A novel chaotic image encryption scheme using DNA sequence operations[J]. Optics and Lasers in Engineering, 2015,73: 53-61. |
[18] | WANG X , CHEN S , ZHANG Y . A chaotic image encryption algorithm based on random dynamic mixing[J]. Optics & Laser Technology, 2021,138: 106837. |
[19] | CHAI X L , GAN Z H , YUAN K ,et al. An image encryption scheme based on three-dimensional Brownian motion and chaotic system[J]. Chinese Physics B, 2017,26(2): 020504. |
[20] | AHMAD J , HWANG S O . A secure image encryption scheme based on chaotic maps and affine transformation[J]. Multimedia Tools and Applications, 2016,75(21): 13951-13976. |
[1] | Yilong WANG, Zhenyu LI, Daofu GONG, Fenlin LIU. Image double fragile watermarking algorithm based on block neighborhood [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 38-48. |
[2] | Renfeng CHEN, Hongbin ZHU. Research on credit card transaction security supervision based on PU learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 73-78. |
[3] | Guanyun FENG, Cai FU, Jianqiang LYU, Lansheng HAN. Insider threat detection based on operational attention and data augmentation [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 102-112. |
[4] | Genlin XIE, Guozhen CHENG, Yawen WANG, Qingfeng WANG. Software diversity evaluating method based on gadget feature analysis [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 161-173. |
[5] | Peng HOU, Zhixin LI, Fei ZHANG, Xu SUN, Dan CHEN, Yihao CUI, Hanbing ZHANG, Yinan JIN, Hongfeng CHAI. Technology and practice of intelligent governance for financial data security [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 174-187. |
[6] | Min XIAO, Faying MAO, Yonghong HUANG, Yunfei CAO. Anonymous trust management scheme of VANET based on attribute signature [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 33-45. |
[7] | Jianlong XU, Jian LIN, Yusen LI, Zhi XIONG. Distributed user privacy preserving adjustable personalized QoS prediction model for cloud services [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 70-80. |
[8] | Xunxun CHEN, Mingzhe LI, Ning LYU, Liang HUANG. Intrinsic assurance: a systematic approach towards extensible cybersecurity [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 92-102. |
[9] | Jiashuo SONG, Zhenzhen LI, Haiyang DING, Zichen LI. Efficient and fully simulated oblivious transfer protocol on elliptic curve [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 158-166. |
[10] | Fenghua LI, Hui LI, Ben NIU, Weidong QIU. Academic connotation and research trends of privacy computing [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 1-8. |
[11] | Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG. Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 9-19. |
[12] | Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG. Two-party cooperative blind signature based on SM2 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 39-51. |
[13] | Jun LIU, Lin YUAN, Zhishang FENG. Survey of key management schemes for cluster networks [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 52-69. |
[14] | Min XIAO, Tao YAO, Yuanni LIU, Yonghong HUANG. Dynamic and efficient vehicular cloud management scheme with privacy protection [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 70-83. |
[15] | Jiaying LIN, Wenbo ZHOU, Weiming ZHANG, Nenghai YU. Lip forgery detection via spatial-frequency domain combination [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 146-155. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|