2022
DOI: 10.1088/1402-4896/acab3b
|View full text |Cite
|
Sign up to set email alerts
|

A Henon-like chaotic map and its application in image encryption combined with compressed sensing

Abstract: A new method of color image encryption is proposed in this paper, with the combination of a two-dimensional (2D) Henon-like chaotic map and compressed sensing for better performance. A sinusoidal function is introduced into the 2D Henon map for increasing randomness. Image encryption algorithm includes three procedures: compression of a color image through the Bernoulli observation matrix, encryption of the compressed image by 2D-Henon map with sinusoidal factor, and reconstruction of color image based on comp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 39 publications
(37 reference statements)
0
4
0
Order By: Relevance
“…When the image is destroyed by the attacker during transmission, a robust encryption algorithm can still restore the image without losing a lot of useful information [35,42]. We usually use cropping attack and noise attack to test the robustness.…”
Section: Robustness Testmentioning
confidence: 99%
“…When the image is destroyed by the attacker during transmission, a robust encryption algorithm can still restore the image without losing a lot of useful information [35,42]. We usually use cropping attack and noise attack to test the robustness.…”
Section: Robustness Testmentioning
confidence: 99%
“…Many encryption algorithms designed for text data, such as the Data Encryption Standard (DES) [10] and Advanced Encryption Standard (AES) [11], are generally unsuitable for the encryption of image because of the strong correlation among its adjacent pixels. Presently researchers are studying some new image encryption schemes with use of chaotic systems [12][13][14][15][16], DNA coding [17][18][19], compressive sensing [20,21], memristors [22,23], deep learning [24], and so on. In particular, chaotic systems are extensively applied in the encryption of image due to their high sensitivity, unpredictability, and other characteristics.…”
Section: Introductionmentioning
confidence: 99%
“…χ 2 test χ 2 test can be used to evaluate whether the image pixel distribution is uniform or not. The χ 2 value of an image can be calculated by equation(21) as å f i denotes the number of times indicating that the pixel value i appears in the image and f = M × N/256. At a degree of freedom with 255 and a significance level with α = 0.05, the test value of χ 2 is c =…”
mentioning
confidence: 99%
“…In recent years, the utilization of chaotic systems in image encryption has gained widespread recognition owing to their ability to generate random and unpredictable behaviors, rendering them an ideal choice for encryption [15,16]. To enhance the security and efficiency of chaos-based image encryption algorithms, researchers have put forth various methodologies [17,18]. This has led to the integration of chaotic image encryption with diverse technologies, including matrix semi-tensor products [19,20], Boolean networks [21,22], neural networks [23][24][25], DNA encoding [26][27][28], elliptic curves [29,30], and quantum encryption 2.…”
Section: Introductionmentioning
confidence: 99%