2020
DOI: 10.1007/s00521-020-04724-x
|View full text |Cite
|
Sign up to set email alerts
|

Subdata image encryption scheme based on compressive sensing and vector quantization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 27 publications
(9 citation statements)
references
References 35 publications
0
9
0
Order By: Relevance
“…Assuming that μ all i j (g i j ) 2 is the overall correlation coefficient, and it may be expressed as (11)…”
Section: Overall Correlation Coefficientmentioning
confidence: 99%
See 1 more Smart Citation
“…Assuming that μ all i j (g i j ) 2 is the overall correlation coefficient, and it may be expressed as (11)…”
Section: Overall Correlation Coefficientmentioning
confidence: 99%
“…However, these schemes cannot efficiently compress the images to save the transmission and storage pressures. Compressive sensing (CS) may compress, encrypt, and sample the plain image simultaneously [10][11][12], and some image encryption algorithms based on CS have been proposed accordingly.…”
Section: Introductionmentioning
confidence: 99%
“…Because the digital image has the characteristics of a considerable amount of information and high data redundancy, the conventional data encryption technology, such as AES, DES, etc, cannot totally satisfy the demands of digital image [3][4][5]. To protect the image content security, lots of image encryption algorithms based on various techniques have been proposed, such as compressed sensing [6][7][8], DNA computing [9][10][11], Latin square [12], S-box [13][14][15], RNA operation [16], etc. Most of image encryption algorithms include the confusion and diffusion stages [17][18][19].…”
Section: Introductionmentioning
confidence: 99%
“…Chai et al [39] proposed a scheme to compress and encrypt two color images at the same time through parallel operations on their RGB components, which improves efficiency and enhances security. To further reduce the bandwidth and computing load, Fan et al [41] proposed an algorithm combined with vector quantization (VQ) and CS, distinguishing important and secondary information. Important data are extracted by a VQ compression algorithm, and the secondary data are compressed by a CS algorithm, so as to achieve higher compression efficiency.…”
Section: Introductionmentioning
confidence: 99%