2022
DOI: 10.1016/j.jksuci.2022.09.006
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 54 publications
0
3
0
Order By: Relevance
“…Additionally, the proposed scheme encryption and decryption effects are quantitatively analyzed, by evaluating the image quality using peak signal-to-noise ratio (PSNR), mean structural similarity (MSSIM ) and normalized coefficient (NC). The calculation formulas are given in equations ( 21), ( 22) and (23) [29], the quantitative results are listed in table 2. From table 2, the PSNR cip are more than 45 dB, and the MSSIM , cip NC cip are also close to the ideal value, meaning that the image sensitive message is effectively protected, where the symbol 'cip' indicates a cipher image.…”
Section: Encryption and Decryption Resultsmentioning
confidence: 99%
“…Additionally, the proposed scheme encryption and decryption effects are quantitatively analyzed, by evaluating the image quality using peak signal-to-noise ratio (PSNR), mean structural similarity (MSSIM ) and normalized coefficient (NC). The calculation formulas are given in equations ( 21), ( 22) and (23) [29], the quantitative results are listed in table 2. From table 2, the PSNR cip are more than 45 dB, and the MSSIM , cip NC cip are also close to the ideal value, meaning that the image sensitive message is effectively protected, where the symbol 'cip' indicates a cipher image.…”
Section: Encryption and Decryption Resultsmentioning
confidence: 99%
“…The main characteristic of fractional-order Lü systems is that they capture non-local and memory behaviors which cannot be explained by the classical models. Let (a, b, c) = (36,3,20), (x 0 , y 0 , z 0 ) = (0.2, 0.5, 0.3) and (q 1 , q 2 , q 3 ) = (0.985, 0.99, 0.98), its chaotic plot is shown in Figure 1, which shows its complex behavior. Moreover, Figure 2 gives the C 0 and SE complexity analyses for the fractional order Lü system, which further demonstrates its capability to generate complex phenomena that have potential applications in the designing of image encryption scheme.…”
Section: Fractional Order Lü Systemmentioning
confidence: 99%
“…These include methods such as the symmetric key method [1], the public-key method [2,3], the DNA coding method [4]. However, these methods may not be sufficient to deal with the sophisticated attacks of modern attackers.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, researchers have proposed selective encryption algorithms 6 10 Selective encryption offers two primary advantages over the complete encryption algorithm. First, it enables fast encryption and decryption since only a portion of the data needs to undergo encryption, thus showing considerable superiority in networks that deal with massive amounts of image data in real-time communication.…”
Section: Introductionmentioning
confidence: 99%