2023
DOI: 10.1007/s40747-023-00989-6
|View full text |Cite
|
Sign up to set email alerts
|

A visually meaningful double-image encryption scheme using 2D compressive sensing and multi-rule DNA encoding

Abstract: A visually meaningful double-image encryption scheme using 2D compressive sensing and multi-rule DNA encoding is presented. First, scrambling, diffusing and 2D compressive sensing are performed on the two plain images, and two privacy images are obtained, respectively. Then, the two privacy images are re-encrypted using DNA encoding theory to obtain two secret images. Finally, integer wavelet transform (IWT) is performed on the carrier image to obtain the wavelet coefficients, then the two secret images are em… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 32 publications
0
6
0
Order By: Relevance
“…Let CR be the compression ratio, t be the threshold of threshold secret sharing, and B be the block size of BCS. For plain images of size Ń N, the algorithm in [37] has no compression stage, the algorithm in [38] uses parallel CS, the algorithm in [8] uses BCS, and the algorithm in [11] uses 2D CS. The algorithms in [8,11,16,39] do not use threshold secret sharing, and the algorithms in [37][38][39] do not belong to visually meaningful image encryption.…”
Section: Comparison With Other Image Encryption Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…Let CR be the compression ratio, t be the threshold of threshold secret sharing, and B be the block size of BCS. For plain images of size Ń N, the algorithm in [37] has no compression stage, the algorithm in [38] uses parallel CS, the algorithm in [8] uses BCS, and the algorithm in [11] uses 2D CS. The algorithms in [8,11,16,39] do not use threshold secret sharing, and the algorithms in [37][38][39] do not belong to visually meaningful image encryption.…”
Section: Comparison With Other Image Encryption Methodsmentioning
confidence: 99%
“…For plain images of size Ń N, the algorithm in [37] has no compression stage, the algorithm in [38] uses parallel CS, the algorithm in [8] uses BCS, and the algorithm in [11] uses 2D CS. The algorithms in [8,11,16,39] do not use threshold secret sharing, and the algorithms in [37][38][39] do not belong to visually meaningful image encryption. From the perspective of the quality of the reconstructed image, the PSNR value of the reconstruction quality of our algorithm can reach 35.76dB.…”
Section: Comparison With Other Image Encryption Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Diffusion is to adjust the pixel value of the image, cover the statistical properties of plain-image into the cipher-image, and implement the even distribution of pixels. A wealth of image encryption algorithms (IEAs) has recently been designed based on numerous technologies, such as substitution box [8][9][10][11], Josephus traversal [12,13], hash functions [14][15][16][17][18], DNA sequence operation [19][20][21], fractal theory [22], compression sensing [23,24], deep learning [25,26] and chaos theory [27][28][29][30][31][32]. Among those different tools, the IEA using chaos theory has been proved their enormous achievement due to the suitable properties of chaotic system (CS) for cryptography, such as the pseudo-randomness of dynamic systems, the non-periodicity of motion trajectories and the sensitivity to initial conditions.…”
Section: Introductionmentioning
confidence: 99%