2019
DOI: 10.1109/access.2019.2940996
|View full text |Cite
|
Sign up to set email alerts
|

Public Key Image Encryption Based on Compressed Sensing

Abstract: The compression feature of compressed sensing (CS) enables that the ciphertext lengths of multimedia encryption schemes have reduced dramatically, and the simple linear measurements make the encryption process extremely efficient. Therefore, CS based image encryption schemes have attached wide attentions in recent years. However, almost all CS based image encryption schemes follow the framework of symmetric encryption. In this paper, we propose the first CS based public key image encryption scheme PKIE-CS with… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 37 publications
0
3
0
Order By: Relevance
“…In [3] authors explained into medical image security focused on image encryption and information hiding has grown. In [4] authors explained a simple but efficient method by using matrix multiplication to change the value of a pixel in an image, which made the algorithm very simple but also made it very difficult for intruders to extract the information in the images. In [5] authors described abut 5-D hyperchaotic map actually the result of combining a logistic map with 3D Lorenz, which exhibited dual operating modes.…”
Section: Related Workmentioning
confidence: 99%
“…In [3] authors explained into medical image security focused on image encryption and information hiding has grown. In [4] authors explained a simple but efficient method by using matrix multiplication to change the value of a pixel in an image, which made the algorithm very simple but also made it very difficult for intruders to extract the information in the images. In [5] authors described abut 5-D hyperchaotic map actually the result of combining a logistic map with 3D Lorenz, which exhibited dual operating modes.…”
Section: Related Workmentioning
confidence: 99%
“…For other schemes in [27] and [28], they can complete compression and encryption, but cannot resist the man-in-the-middle attack. The schemes in [7] and [30] can complete encryption, but cannot satisfy identity authenticity and resist the man-in-the-middle attack. For this proposed scheme, it has superior performance, which not only completes compression, encryption and image sharing, but also has the characters of identity authenticity and against the man-in-the-middle attack.…”
Section: H the Performance And Comparisonmentioning
confidence: 99%
“…So far, many research results exist that are based on chaotic image encryption, such as the Hopfield chaotic neural network [ 6 , 7 , 8 ], which is a typical dynamic neural network with rich dynamic properties; however, the self-feedback Hopfield network used to generate chaotic phenomena is complex in its structure, computationally intensive with fixed parameters, DNA encryption [ 9 , 10 , 11 , 12 ], DNA computation with huge parallelism, and has huge storage and ultra-low power consumption. The compressed sensing (CS) [ 13 , 14 , 15 , 16 ] compression feature allows multimedia encryption schemes with a much reduced length of ciphertext, and simple linear measurements make the encryption process very efficient. Therefore, CS-based image encryption schemes have also attracted a lot of attention in recent years.…”
Section: Introductionmentioning
confidence: 99%