2021
DOI: 10.1016/j.optcom.2021.126976
|View full text |Cite
|
Sign up to set email alerts
|

A visually secure image encryption scheme based on 2D compressive sensing and integer wavelet transform embedding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(16 citation statements)
references
References 35 publications
0
16
0
Order By: Relevance
“…The image encryption process often causes the pixel values in the plaintext image to change so that the ciphertext image can protect the statistical features of the plaintext image, resulting in different degrees of change in the image histogram. Therefore, histogram analysis is often used to evaluate encryption schemes, which can clearly visualize the difference between plaintext and ciphertext images [10].…”
Section: Analysis Of Histogrammentioning
confidence: 99%
“…The image encryption process often causes the pixel values in the plaintext image to change so that the ciphertext image can protect the statistical features of the plaintext image, resulting in different degrees of change in the image histogram. Therefore, histogram analysis is often used to evaluate encryption schemes, which can clearly visualize the difference between plaintext and ciphertext images [10].…”
Section: Analysis Of Histogrammentioning
confidence: 99%
“…Step 4: The discrete cosine transform [4,6] is used to sparse the dislocated chunk matrix with the following equation.…”
Section: Description Of the Encryption Algorithmmentioning
confidence: 99%
“…mod( *10 ,3)) H floor h (4) where h is the length intercepted from the X sequence as num = (M/8)*(N/8). floor is rounding down and mod is the remainder operation.The compressed R, G and B images are subjected to different forms of inter-block dislocation operations by means of three conditional judgements.If H(i) = 0, exchange the block images '' judgement is made based on the H-sequence values, and the final dislocated images SR, SG and SB are obtained.Step 8: Iterate over the Henon chaotic system to generate a chaotic sequence L of length M*N*d, sample it according to the sampling interval d, and obtain a new sequence y.…”
mentioning
confidence: 99%
“…However, when 1D CS (1DCS) is used to process 2D images, it transforms the images into a long column vector, which cannot preserve the original structure of the image and will overload the storage capacity. To solve this problem, Chai et al [3] and Huo et al [4] have used the 2D CS (2DCS) technique to compress and encrypt the original image and embed the hidden secret information into the wavelet coefficient matrix [5]. Although this approach greatly improves the speed and security of data transmission, it has a limited information embedding capacity.…”
Section: Introductionmentioning
confidence: 99%