2021
DOI: 10.3390/s21030758
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Plaintext-Related Chaotic Image Encryption Scheme Based on Compressive Sensing

Abstract: With the development of mobile communication network, especially 5G today and 6G in the future, the security and privacy of digital images are important in network applications. Meanwhile, high resolution images will take up a lot of bandwidth and storage space in the cloud applications. Facing the demands, an efficient and secure plaintext-related chaotic image encryption scheme is proposed based on compressive sensing for achieving the compression and encryption simultaneously. In the proposed scheme, the in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
10

Relationship

1
9

Authors

Journals

citations
Cited by 37 publications
(24 citation statements)
references
References 34 publications
0
24
0
Order By: Relevance
“…If we choose an accuracy of 10 −14 for the four variables ( μ 1 , x 0 , μ 2 , y 0 ), we obtain a key space of 10 56 ≈ 2 187 . As [ 34 , 35 , 36 ] pointed out, the effective key space of the image encryption system should be greater than 2 100 in order to prevent brute force attacks, so the key space of our algorithm is sufficiently large to resist against brute force attacks.…”
Section: The Original Image Encryption Cryptosystemmentioning
confidence: 99%
“…If we choose an accuracy of 10 −14 for the four variables ( μ 1 , x 0 , μ 2 , y 0 ), we obtain a key space of 10 56 ≈ 2 187 . As [ 34 , 35 , 36 ] pointed out, the effective key space of the image encryption system should be greater than 2 100 in order to prevent brute force attacks, so the key space of our algorithm is sufficiently large to resist against brute force attacks.…”
Section: The Original Image Encryption Cryptosystemmentioning
confidence: 99%
“…Through visual inspection, it is evident that the contents are encrypted and an intruder cannot get any ideas about the original spectrogram. However, a visual inspection alone is not sufficient, and security should be proven through statistical analyses [51]. Figures 13-15 show the histograms of the red, green, and blue channels, respectively.…”
Section: Security Analysesmentioning
confidence: 99%
“…Chaos is a complex nonlinear phenomenon with special dynamical properties, and various chaotic systems are found and widely used in the fields of electronic communication systems, control systems, and so on [1][2][3][4][5][6]. Chaotic circuits have become an important tool for studying chaos theory due to easy observation.…”
Section: Introductionmentioning
confidence: 99%