2022
DOI: 10.1007/s11071-022-07930-5
|View full text |Cite
|
Sign up to set email alerts
|

Secure image storage system based on compressed sensing and 2D-SLLIM in cloud environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 47 publications
0
6
0
Order By: Relevance
“…Table 2 shows the obtained chi-square values of test images. It can be easily seen that none of the values cross the limitation value mentioned in the literature [39]. This implies that the histogram's distribution is uniform, and Therefore, it is impossible for the attacker to derive any useful conclusions from the histogram of encrypted images.…”
Section: Visual and Histogram Analysismentioning
confidence: 93%
See 1 more Smart Citation
“…Table 2 shows the obtained chi-square values of test images. It can be easily seen that none of the values cross the limitation value mentioned in the literature [39]. This implies that the histogram's distribution is uniform, and Therefore, it is impossible for the attacker to derive any useful conclusions from the histogram of encrypted images.…”
Section: Visual and Histogram Analysismentioning
confidence: 93%
“…where N = 256, the number of gray levels; x(i) and y(e) are obtained probability and mathematical probability of the content showing. When the significance values of chi-square test is less than [39], it depicts that the Chi-square (χ 2 ) test is passed. Table 2 shows the obtained chi-square values of test images.…”
Section: Visual and Histogram Analysismentioning
confidence: 99%
“…where h(x s ) is the probability that s occurs within the image p, N then denotes the gray level of the image p. For this test, multiple kinds of images are selected to calculate their Inf values, and the results are presented in Table 5. The table shows that after the encryption algorithm, all the [29] 0.0095 0.0044 0.0076 Yadollahi [30] 0.0208 0.0137 0.0146 Zhou [31] -0.0057 -0.0121 0.0029 Lai [32] 0.0015 0.0048 0.0016 Bazerra [33] -0.0018 0.0025 -0.0015 Zheng [34] -0.0027 0.0023 0.0088 Hussain [35] 0.0002 -0.0014 -0.0018 Su [36] 0.0019 0.0021 0.0029 Wang [37] 0.0005 0.0051 -0.0034 Pak [38] 0.0005 0.0024 -0.0017 Zhang [39] 0.0190 -0.0302 -0.0648 Wang [40] 0.0138 0.0113 0.0053 Luo [41] -0.0019 0.0021 -0.0046 Zhang [42] -0.0351 0.0238 -0.0057 entropy values are greater than 7.99, infinitely close to 8. In addition, we compared the information entropy values of of Baboon image from other schemes, displayed in Table 6.…”
Section: Information Entropy Analysismentioning
confidence: 99%
“…It can be seen that the entropy value of our algorithm is closer to the optimal entropy value, indicating that the encryption algorithm in this paper has some advantages over the entropy attack method. [29] 7.9971 Yadollahi [30] 7.9973 Zhou [31] 7.9971 Lai [32] 7.9970 Bazerra [33] 7.9971 Zheng [34] 7.9974 Hussain [35] 7.9973 Su [36] 7.9960 Wang [37] 7.9975 Pak [38] 7.9970 Zhang [39] 7.9974 Wang [40] 7.9971 Luo [41] 7.9974 Zhang [42] 7.9972…”
Section: Information Entropy Analysismentioning
confidence: 99%
“…Diffusion is to adjust the pixel value of the image, cover the statistical properties of plain-image into the cipher-image, and implement the even distribution of pixels. A wealth of image encryption algorithms (IEAs) has recently been designed based on numerous technologies, such as substitution box [8][9][10][11], Josephus traversal [12,13], hash functions [14][15][16][17][18], DNA sequence operation [19][20][21], fractal theory [22], compression sensing [23,24], deep learning [25,26] and chaos theory [27][28][29][30][31][32]. Among those different tools, the IEA using chaos theory has been proved their enormous achievement due to the suitable properties of chaotic system (CS) for cryptography, such as the pseudo-randomness of dynamic systems, the non-periodicity of motion trajectories and the sensitivity to initial conditions.…”
Section: Introductionmentioning
confidence: 99%