2023
DOI: 10.1016/j.optlastec.2023.109345
|View full text |Cite
|
Sign up to set email alerts
|

A visually secure image encryption scheme based on adaptive block compressed sensing and non-negative matrix factorization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(2 citation statements)
references
References 38 publications
0
2
0
Order By: Relevance
“…Optical remote sensing imaging technology is an important branch of remote sensing technology, serving as the "eyes" for human exploration of the universe and the unknown world. Satellite remote sensing image data with "four highs" characteristics of high space, high time, high spectrum and high radiation resolution provides important information and services for human monitoring and research on the earth's environment and resources [1][2][3][4][5]. The traditional remote sensing satellite image signal acquisition process uses an optical remote sensing camera to perform Nyquist full sampling imaging on the target, then converts the collected analog signal to digital, and finally compresses and encodes the image information through digital processing [6,7].…”
Section: Introductionmentioning
confidence: 99%
“…Optical remote sensing imaging technology is an important branch of remote sensing technology, serving as the "eyes" for human exploration of the universe and the unknown world. Satellite remote sensing image data with "four highs" characteristics of high space, high time, high spectrum and high radiation resolution provides important information and services for human monitoring and research on the earth's environment and resources [1][2][3][4][5]. The traditional remote sensing satellite image signal acquisition process uses an optical remote sensing camera to perform Nyquist full sampling imaging on the target, then converts the collected analog signal to digital, and finally compresses and encodes the image information through digital processing [6,7].…”
Section: Introductionmentioning
confidence: 99%
“…Key sensitivity: Chaos-based encryption algorithms exhibit key sensitivity, indicating that even a slight alteration to the encryption key results in a significantly altered encrypted picture. This characteristic improves the system's security and resilience to brute-force assaults [6].…”
Section: Introductionmentioning
confidence: 99%