2019
DOI: 10.3390/e21090819
|View full text |Cite
|
Sign up to set email alerts
|

Image Encryption Scheme with Compressed Sensing Based on New Three-Dimensional Chaotic System

Abstract: In this paper, a new three-dimensional chaotic system is proposed for image encryption. The core of the encryption algorithm is the combination of chaotic system and compressed sensing, which can complete image encryption and compression at the same time. The Lyapunov exponent, bifurcation diagram and complexity of the new three-dimensional chaotic system are analyzed. The performance analysis shows that the chaotic system has two positive Lyapunov exponents and high complexity. In the encryption scheme, a new… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
27
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 52 publications
(38 citation statements)
references
References 55 publications
0
27
0
Order By: Relevance
“…Hence, the encryption effect is satisfactory. [14] 0.0056 0.0065 −0.0073 -Lena in [31] −0.0068 −0.0054 0.0010 -Lena in [32] 0.0059 −0.0042 0.0180 -Lena in [33] 0.0033 0.0027 0.0014 -Peppers in [34] −0.0047 −0.0024 −0.0028 -Peppers in [35] 0.0002 0.0022 0.0010 -Baboon in [35] 0.0004 −0.0047 0.0001 -…”
Section: Correlation Analysismentioning
confidence: 99%
“…Hence, the encryption effect is satisfactory. [14] 0.0056 0.0065 −0.0073 -Lena in [31] −0.0068 −0.0054 0.0010 -Lena in [32] 0.0059 −0.0042 0.0180 -Lena in [33] 0.0033 0.0027 0.0014 -Peppers in [34] −0.0047 −0.0024 −0.0028 -Peppers in [35] 0.0002 0.0022 0.0010 -Baboon in [35] 0.0004 −0.0047 0.0001 -…”
Section: Correlation Analysismentioning
confidence: 99%
“…As low-element underdetermined blind-source separation is problematic, to ensure collection of secured information at the receiving end, this paper uses digital chaos to hide and confidentially transmit the transmitter information [41,42]. The kinetic equation of the chaotic system [43] used in chaotic hiding techniques is shown in (4): Chaotic hiding information ensures secure communication. As low-element underdetermined blind-source separation is problematic, to ensure collection of secured information at the receiving end, this paper uses digital chaos to hide and confidentially transmit the transmitter information [41,42].…”
Section: Chaotic Systemmentioning
confidence: 99%
“…As low-element underdetermined blind-source separation is problematic, to ensure collection of secured information at the receiving end, this paper uses digital chaos to hide and confidentially transmit the transmitter information [41,42]. The kinetic equation of the chaotic system [43] used in chaotic hiding techniques is shown in (4): The characteristic analysis of a chaotic system [44] reveals that it has a complex structure and irregular dynamic behavior. It is proven in [43] that a chaotic system possesses a good image encryption effect.…”
Section: Chaotic Systemmentioning
confidence: 99%
“…Actually, most of these schemes have a high level of security, as opposed to a high implementation cost. Moreover, some new technologies have been introduced to the design and security analysis of image encryption schemes such as neural network [33], DNA coding [34], genetic recombination [31], compressed sensing [35], and machine leaning [36]. In general, there exists an irreconcilable contradiction between the security and implementation complexity of cryptographic algorithms.…”
Section: Introductionmentioning
confidence: 99%