Journal on Communications ›› 2022, Vol. 43 ›› Issue (5): 45-57.doi: 10.11959/j.issn.1000-436x.2022101
• Papers • Previous Articles Next Articles
Hua REN1, Shaozhang NIU1, Ruyong REN1, Zhen YUE2
Revised:
2022-01-03
Online:
2022-05-25
Published:
2022-05-01
Supported by:
CLC Number:
Hua REN, Shaozhang NIU, Ruyong REN, Zhen YUE. Research on meaningful image encryption algorithm based on 2-dimensional compressive sensing[J]. Journal on Communications, 2022, 43(5): 45-57.
"
图像 | 方向 | 秘密图像 | 载体图像 | 加密图像 |
水平 | 0.031 4 | 0.944 0 | 0.948 0 | |
Parrots | 垂直 | 0.011 1 | 0.971 3 | 0.971 6 |
对角线 | 0.012 4 | 0.915 7 | 0.931 4 | |
水平 | -0.054 5 | 0.947 9 | 0.939 0 | |
Monarch | 垂直 | 0.109 0 | 0.974 8 | 0.965 5 |
对角线 | 0.016 9 | 0.928 7 | 0.911 0 | |
水平 | 0.072 9 | 0.943 3 | 0.944 1 | |
Camera | 垂直 | 0.061 5 | 0.971 0 | 0.972 1 |
对角线 | -0.013 1 | 0.917 1 | 0.923 2 | |
水平 | -0.029 4 | 0.941 8 | 0.937 7 | |
Boats | 垂直 | 0.058 6 | 0.969 9 | 0.969 3 |
对角线 | 0.022 9 | 0.920 9 | 0.920 7 | |
水平 | 0.093 3 | 0.944 1 | 0.944 5 | |
Barbara | 垂直 | 0.034 7 | 0.968 9 | 0.970 1 |
对角线 | -0.007 6 | 0.920 0 | 0.924 4 |
"
明文图像 | 载体图像 | 文献[ | 文献[ | 文献[ | 文献[ | 文献[ | 本文算法 |
Len | Peppers | 32.351 3 | 34.513 4 | 31.798 6 | 35.143 5 | 41.667 3 | 42.320 7 |
Jet | Baboon | 37.105 8 | 35.156 7 | 32.597 6 | 32.456 5 | 41.505 9 | 42.325 4 |
Girl | Goldhill | 36.112 5 | 34.254 3 | 32.064 7 | 32.224 3 | 41.601 6 | 42.323 4 |
Barbara | Bridge | 35.562 9 | 36.113 4 | 31.739 7 | 33.435 5 | 41.490 3 | 42.249 3 |
平均 | — | 35.283 1 | 35.009 5 | 32.050 2 | 33.315 0 | 41.566 3 | 42.304 7 |
"
明文图像 | 载体图像 | 文献[ | 文献[ | 文献[ | 文献[ | 文献[ | 本文算法 |
Lena | Peppers | 0.925 7 | 0.995 2 | 0.990 3 | 0.991 8 | 0.996 7 | 0.998 3 |
Jet | Baboon | 0.983 3 | 0.995 6 | 0.995 5 | 0.979 7 | 0.997 6 | 0.998 3 |
Girl | Goldhill | 0.966 6 | 0.997 3 | 0.994 2 | 0.964 1 | 0.997 2 | 0.997 5 |
Barbara | Bridge | 0.978 3 | 0.998 2 | 0.994 6 | 0.988 9 | 0.998 6 | 0.999 4 |
平均 | — | 0.963 5 | 0.996 6 | 0.993 7 | 0.981 1 | 0.997 5 | 0.998 4 |
"
明文图像 | 载体图像 | 文献[ | 文献[ | 文献[ | 文献[ | 文献[ | 本文算法 | |||||||||||
PSNR/dB | MSSIM | PSNR/dB | MSSIM | PSNR/dB | MSSIM | PSNR/dB | MSSIM | PSNR/dB | MSSIM | PSNR/dB | MSSIM | |||||||
Lena (512像素× 512像素) | 28.443 5 | 0.812 8 | 28.553 4 | 0.993 2 | 27.123 2 | 0.814 5 | 32.118 5 | 0.867 0 | 35.778 4 | 0.985 8 | 36.145 0 | 0.986 1 | ||||||
Barbara (512像素× 512像素) | Boats (512像素× 512像素) | 28.443 5 | 0.812 8 | 28.553 4 | 0.993 2 | 26.987 5 | 0.801 6 | 31.672 1 | 0.828 9 | 35.753 8 | 0.985 8 | 36.279 5 | 0.986 3 | |||||
Jet (512像素× 512像素) | 28.443 5 | 0.812 8 | 28.553 4 | 0.993 2 | 26.714 5 | 0.793 4 | 31.982 1 | 0.896 7 | 35.103 1 | 0.983 4 | 35.894 6 | 0.985 3 | ||||||
Peppers (512像素× 512像素) | 28.443 5 | 0.812 8 | 28.553 4 | 0.993 2 | 27.014 5 | 0.803 4 | 29.960 2 | 0.784 5 | 35.485 4 | 0.984 1 | 35.969 1 | 0.985 5 |
[1] | REN H , NIU S Z . Separable reversible data hiding in homomorphic encrypted domain using POB number system[J]. Multimedia Tools and Applications, 2022,81(2): 2161-2187. |
[2] | 印曦, 黄伟庆 . 基于混沌理论的彩色 QR 编码水印技术研究[J]. 通信学报, 2018,39(7): 50-58. |
YIN X , HUANG W Q . Research on color QR code watermarking technology based on chaos theory[J]. Journal on Communications, 2018,39(7): 50-58. | |
[3] | CHAI X L , FU X L , GAN Z H ,et al. A color image cryptosystem based on dynamic DNA encryption and chaos[J]. Signal Processing, 2019,155: 44-62. |
[4] | WU J H , LIAO X F , YANG B . Image encryption using 2D Hénon-Sine map and DNA approach[J]. Signal Processing, 2018,153: 11-23. |
[5] | WANG Y , QUAN C , TAY C J . Asymmetric optical image encryption based on an improved amplitude-phase retrieval algorithm[J]. Optics and Lasers in Engineering, 2016,78: 8-16. |
[6] | 吴颖芝, 郝立波, 陈炬桦 . T型邻居细胞自动机的分组加密方法[J]. 通信学报, 2009,30(S2): 52-60. |
WU Y Z , HAO L B , CHEN J H . Block cipher based on T-shaped cellular automata[J]. Journal on Communications, 2009,30(S2): 52-60. | |
[7] | KADHIM I J , PREMARATNE P , VIAL P J ,et al. Comprehensive survey of image steganography:techniques,evaluations,and trends in future research[J]. Neurocomputing, 2019,335: 299-326. |
[8] | BAO L , ZHOU Y C . Image encryption:generating visually meaningful encrypted images[J]. Information Sciences, 2015,324: 197-207. |
[9] | DONOHO D L . Compressed sensing[J]. IEEE Transactions on Information Theory, 2006,52(4): 1289-1306. |
[10] | BARANIUK R G . Compressive sensing[J]. IEEE Signal Processing Magazine, 2007,24(4): 118-121. |
[11] | CHAI X L , GAN Z H , CHEN Y R ,et al. A visually secure image encryption scheme based on compressive sensing[J]. Signal Processing, 2017,134: 35-51. |
[12] | WANG H , XIAO D , LI M ,et al. A visually secure image encryption scheme based on parallel compressive sensing[J]. Signal Processing, 2019,155: 218-232. |
[13] | CHAI X L , WU H Y , GAN Z H ,et al. An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding[J]. Optics and Lasers in Engineering, 2020,124:105837. |
[14] | WEN W Y , HONG Y K , FANG Y M ,et al. A visually secure image encryption scheme based on semi-tensor product compressed sensing[J]. Signal Processing, 2020,173:107580. |
[15] | ZHU L Y , SONG H S , ZHANG X ,et al. A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding[J]. Signal Processing, 2020,175:107629. |
[16] | YE G D , PAN C , DONG Y X ,et al. Image encryption and hiding algorithm based on compressive sensing and random numbers insertion[J]. Signal Processing, 2020,172:107563. |
[17] | WANG X Y , REN Q , JIANG D H . An adjustable visual image cryptosystem based on 6D hyperchaotic system and compressive sensing[J]. Nonlinear Dynamics, 2021,104(4): 4543-4567. |
[18] | ZHOU N R , PAN S M , CHENG S ,et al. Image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing[J]. Optics & Laser Technology, 2016,82: 121-133. |
[19] | CHAI X L , WU H Y , GAN Z H ,et al. An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing[J]. Information Sciences, 2021,556: 305-340. |
[20] | HUO D M , ZHU Z L , WEI L S ,et al. A visually secure image encryption scheme based on 2D compressive sensing and integer wavelet transform embedding[J]. Optics Communications, 2021,492:126976. |
[21] | ZHANG B , XIAO D , XIANG Y . Robust coding of encrypted images via 2D compressed sensing[J]. IEEE Transactions on Multimedia, 2021,23: 2656-2671. |
[22] | ZHANG X C , HAN F , NIU Y . Chaotic image encryption algorithm based on bit permutation and dynamic DNA encoding[J]. Computational Intelligence and Neuroscience,2017, 2017:6919675. |
[23] | SOLAMI A E , AHMAD M , VOLOS C ,et al. A new hyperchaotic system-based design for efficient bijective substitution-boxes[J]. Entropy, 2018,20(7): 525. |
[24] | LEE T Y , LIN S D . Dual watermark for image tamper detection and recovery[J]. Pattern Recognition, 2008,41(11): 3497-3506. |
[25] | CHEN G , LI D F , ZHANG J S . Iterative gradient projection algorithm for two-dimensional compressive sensing sparse image reconstruction[J]. Signal Processing, 2014,104: 15-26. |
[26] | RUDIN L I , OSHER S , FATEMI E . Nonlinear total variation based noise removal algorithms[J]. Physica D:Nonlinear Phenomena, 1992,60(1/2/3/4): 259-268. |
[27] | SENDUR L , SELESNICK I W . Bivariate shrinkage functions for wavelet-based denoising exploiting interscale dependency[J]. IEEE Transactions on Signal Processing, 2002,50(11): 2744-2756. |
[1] | Xiaoyuan YANG, Xinliang BI, Jia LIU, Siyuan HUANG. High-capacity image steganography algorithm combining image encryption and deep learning [J]. Journal on Communications, 2021, 42(9): 96-105. |
[2] | Bin XIAO,Wenming SHI,Weisheng LI,Jianfeng MA. Image encryption method based on multiple-order fractional discrete Tchebichef transform and generating sequence [J]. Journal on Communications, 2018, 39(5): 1-10. |
[3] | Jiu-fen LIU,Tao HAN,Yu-guo TIAN,Wen-bin LIU. Reversible data hiding in encrypted images using recompression [J]. Journal on Communications, 2015, 36(9): 13-25. |
[4] | . Image encryption algorithms based on chaos through dual scrambling of pixel position and bit [J]. Journal on Communications, 2014, 35(3): 25-222. |
[5] | Xiao-heng DENG,Chun-long LIAO,Cong-xu ZHU,Zhi-gang CHEN. Image encryption algorithms based on chaos through dual scrambling of pixel position and bit [J]. Journal on Communications, 2014, 35(3): 216-223. |
[6] | Tian-yu YE. Perfectly blind image watermarking scheme with multi-purpose based on region segment for sub-block and self-embedding technology [J]. Journal on Communications, 2013, 34(3): 148-156. |
[7] | Yong ZHU,Jia-nan WANG,Qun DING. New kind of CD-DCSK chaos shift keying secure communication system [J]. Journal on Communications, 2012, 33(5): 169-176. |
[8] | Chang-ci WEN,Qin WANG,Fu-min HUANG,Zhi-shu YUAN,Chun-sheng TAO. Self-adaptive encryption algorithm for image based on affine and composed chaos [J]. Journal on Communications, 2012, 33(11): 119-127. |
[9] | Qiu-hua LIN,Jie DANG,Fu-liang YIN. Correlation calculation decrypting for BSS-based image cryptosystem [J]. Journal on Communications, 2008, 29(1): 109-114. |
[10] | Pei-rong WANG,Zhe XU,Chong FU,Wei-yong ZHU,Xing-wei WANG. Composed Chaos-based image encryption algorithm [J]. Journal on Communications, 2006, 27(11A): 285-289. |
[11] | Jian-sheng GUO,Chen-hui JIN. An attack with known image to an image cryptosystem based on general cat map [J]. Journal on Communications, 2005, 26(2): 131-135. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|