2022
DOI: 10.1016/j.ins.2022.06.011
|View full text |Cite
|
Sign up to set email alerts
|

A visually secure image encryption scheme using adaptive-thresholding sparsification compression sensing model and newly-designed memristive chaotic map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 33 publications
(5 citation statements)
references
References 40 publications
0
5
0
Order By: Relevance
“…is a measurement vector and M N. < Candes and Tao proved that the prerequisite for the signal to be accurately reconstructed is that the product of F and Y should satisfy the restricted isometry property (RIP) [23]. The commonly used measurement matrices include Bernoulli random matrix [15], partial Hadamard matrix [18] and structurally random matrix [24], etc Restoring x from y is the core of the CS theory, which is denoted as…”
Section: Cs and Ptp-csmentioning
confidence: 99%
See 1 more Smart Citation
“…is a measurement vector and M N. < Candes and Tao proved that the prerequisite for the signal to be accurately reconstructed is that the product of F and Y should satisfy the restricted isometry property (RIP) [23]. The commonly used measurement matrices include Bernoulli random matrix [15], partial Hadamard matrix [18] and structurally random matrix [24], etc Restoring x from y is the core of the CS theory, which is denoted as…”
Section: Cs and Ptp-csmentioning
confidence: 99%
“…As a basic circuit element with the unique memory, memristors has opened new research ideas for the fields of artificial intelligence [28], secure communication [24] and biological behavior simulation [29]. In this background, to demonstrate the threshold effect of electromagnetic induction, Bao et al [29] proposed a simple threshold flux-controlled memristor, which is defined as…”
Section: Memristormentioning
confidence: 99%
“…In addition, DM chaotic maps are hardware implemented by applying DSP platform [35][36][37] and an analog circuit [38]. One important application is that DM chaotic maps are used in image encryption algorithms [39][40][41].…”
Section: Introductionmentioning
confidence: 99%
“…To be more specific, Hua et al [15] proposed an adaptive threshold sparsity-based visually secure image encryption algorithm, which uses a matrix coding strategy to achieve lossless embedding and extraction of information. Later, Zhu et al [16] newly designed a memristive chaotic map and proposed an adaptive threshold sparsification model for visually secure image encryption. In Zhu's scheme, the Lp matrix parametrization is used to establish the threshold model, thus enhancing the compression performance.…”
Section: Introductionmentioning
confidence: 99%