2019
DOI: 10.1016/j.sigpro.2019.03.022
|View full text |Cite
|
Sign up to set email alerts
|

A robust image encryption algorithm based on Chua's circuit and compressive sensing

Abstract: In terms of Chua's circuit system, compressive sensing (CS) and Haar wavelet, a novel image compression-encryption scheme (CES) is proposed in this paper. Firstly, the plaintext image is decomposed into approximate component and detail components through Haar wavelet. Then the approximate component is diffused by the threshold processing of local binary patterns (LBP) operator-based chaotic sequence which is produced by the combination of Chua's circuit and Logistic map. Next, the Lissajous map is applied to g… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
32
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 110 publications
(32 citation statements)
references
References 66 publications
(64 reference statements)
0
32
0
Order By: Relevance
“…(2) It has high efficiency, which can encrypt three images at a time. And its efficiency is higher than that of in [33,36].…”
Section: Introductionmentioning
confidence: 81%
See 1 more Smart Citation
“…(2) It has high efficiency, which can encrypt three images at a time. And its efficiency is higher than that of in [33,36].…”
Section: Introductionmentioning
confidence: 81%
“…The common method for image compression in image encryption is the compressive sensing (CS) technology [30][31][32][33][34][35][36][37][38][39][40][41][42]. It can simultaneously sample and compress signals to reduce the transmission burden and storage space.…”
Section: Introductionmentioning
confidence: 99%
“…After that quantization is applied with the help of sigmoid function. In the case of robust image encryption Luo et al (2019) has proposed an algorithm in which DWT is applied to decompose the signal in approximate and detailed components. After that the approximation part is scattered by threshold processing of local binary pattern operator based chaotic sequence.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In a word, chaotic encryption provides a new choice for traditional encryption. In recent years, many effective chaos image encryption algorithms have been proposed [13][14][15][16][17][18][19][20][21][22][23][24][25].…”
Section: Introductionmentioning
confidence: 99%