2019
DOI: 10.1016/j.sigpro.2018.10.001
|View full text |Cite
|
Sign up to set email alerts
|

A visually secure image encryption scheme based on parallel compressive sensing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
75
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 152 publications
(76 citation statements)
references
References 36 publications
1
75
0
Order By: Relevance
“…To expand the key space and increase the key security, two chaotic maps are employed in this scheme. In the CS phase of the proposed scheme, the Logistic-Tent map [27] is employed to construct a measurement matrix, which is the combination of Logistic map and Skew Tent map, and has superior performance than them. The dynamic equations are as follows:…”
Section: Chaotic Mapsmentioning
confidence: 99%
See 1 more Smart Citation
“…To expand the key space and increase the key security, two chaotic maps are employed in this scheme. In the CS phase of the proposed scheme, the Logistic-Tent map [27] is employed to construct a measurement matrix, which is the combination of Logistic map and Skew Tent map, and has superior performance than them. The dynamic equations are as follows:…”
Section: Chaotic Mapsmentioning
confidence: 99%
“…In recent years, CS [23][24][25] exploits far efficiency than the conventional sampling under the Shannon theorem and achieves compression and lightweight encryption simultaneously. Based on Parallel Compressive Sensing(PCS) [26], cryptographic specialists also focus on other technique to combine encryption and compression [27]. However, none of them can verify the participants' identity authentication and achieve tampering and forgery prevention.…”
Section: Introductionmentioning
confidence: 99%
“…has proposed an algorithm for bi-level protected CS to encrypt the signal, in which measurement matrix is obtained by product of key-dependent sensing matrix and key-dependent original basis. In the case of parallel CS, an image encryption algorithm has proposed by Wang et al (2019) in which DWT is applied on the plain image to get the sparse representation of the signal. Scrambling is applied on the sparse signal.…”
Section: Literature Reviewmentioning
confidence: 99%
“…is image encryption method camouflages the existence of the original image, thus reducing the possibility of being attacked to a certain extent. As of now, many meaningful image encryption algorithms have been proposed [20][21][22][23][24][25][26][27][28][29][30][31][32][33]. Inspired by [19], the work of [20] embeds multiple color images into nonessential areas of the carrier image to achieve visually meaningful effects.…”
Section: Introductionmentioning
confidence: 99%
“…e algorithm is quite robust but suffers from poor real-time performance and long encryption and decryption times. Compared to [21], the paper [22] uses parallel compressive sensing and integer discrete wavelet transform (IWT) to realize meaningful image encryption, which makes the algorithm more applicable and less time-consuming. However, it was pointed out in [23] that the construction of measurement matrices increases the computational complexity and storage requirements.…”
Section: Introductionmentioning
confidence: 99%