Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication

被引:12
|
作者
Gan, Zhihua [1 ,2 ]
Song, Shiping [3 ]
Zhou, Lin [3 ]
Han, Daojun [4 ]
Fu, Jiangyu [3 ]
Chai, Xiuli [2 ,3 ]
机构
[1] Henan Univ, Inst Intelligent Network Syst, Sch Software, Intelligent Data Proc Engn Res Ctr Henan Prov, Kaifeng 475004, Peoples R China
[2] Henan Key Lab Cyberspace Situat Awareness, Zhengzhou 450001, Peoples R China
[3] Henan Univ, Sch Artificial Intelligence, Henan Key Lab Big Data Anal & Proc, Zhengzhou 450046, Peoples R China
[4] Henan Univ, Inst Image Proc & Pattern Recognit, Sch Comp & Informat Engn, Kaifeng 475004, Peoples R China
基金
中国国家自然科学基金;
关键词
Compressed sensing (CS); Secret image sharing (SIS); Integer wavelet transform (IWT)-M-embedding; Image encryption; SCHEME; ROBUST;
D O I
10.1016/j.jksuci.2022.09.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image encryption is an effective method to protect private images by converting them into meaningless ones, but many current image encryption algorithms still have security and efficiency problems. This paper combines compressed sensing (CS) and secret image sharing (SIS) to propose a certifiable visually secure image selection encryption. Firstly, a selective encryption based on multi-task convolutional neural network (SE-MTCNN) is presented to distinguish and encrypt the sensitive and non-sensitive information of plain images. Subsequently, the SIS algorithm is used to decompose the resulting plain image into multiple shadow images to disperse the risk of cryptographic image loss and resist hacking attacks. Herein, a pseudo-convolutional sliding scrambling based on chaotic sequences driven by plaintext (PCSS-CSDP) is proposed to eliminate the correlation between adjacent image pixels. Finally, the IWTM-embedding algorithm is used to embed shadow images into carrier images to get multiple visually meaningful cipher images. Additionally, a new authentication scheme based on bit-level cyclic shifts and dynamic combination (AS-BCSDC) is introduced, and the obtained authentication information is fused into cipher images to prevent the deception of illegal users and malicious tampering of cloud platform. Experiments demonstrate the effectiveness of our algorithm, and it may be applied for image secure communication.
引用
下载
收藏
页码:9252 / 9272
页数:21
相关论文
共 50 条
  • [21] A visually secure image encryption scheme based on parallel compressive sensing
    Wang, Hui
    Xiao, Di
    Li, Min
    Xiang, Yanping
    Li, Xinyan
    SIGNAL PROCESSING, 2019, 155 : 218 - 232
  • [22] Progressive secret image sharing based on Boolean operations and polynomial interpolations
    Chen, Hao
    Xiong, Lizhi
    Yang, Ching-Nung
    MULTIMEDIA SYSTEMS, 2024, 30 (04)
  • [23] Secure biometric image sensor and authentication scheme based on compressed sensing
    Suzuki, Hiroyuki
    Suzuki, Masamichi
    Urabe, Takuya
    Obi, Takashi
    Yamaguchi, Masahiro
    Ohyama, Nagaaki
    APPLIED OPTICS, 2013, 52 (33) : 8161 - 8168
  • [24] Improved Extended Polynomial-based Secret Image Sharing Scheme using QR Code
    Fu, Zhengxin
    Liu, Sijia
    Xia, Kun
    Yu, Bin
    2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2018, : 233 - 237
  • [25] Hierarchical secret image sharing scheme in compressed sensing
    Bhattacharjee, Tapasi
    Maity, Santi P.
    Islam, Sheikh Rafiul
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018, 61 : 21 - 32
  • [26] Verifiable visually meaningful image encryption algorithm based on compressive sensing and (t, n)-threshold secret sharing
    Yang, Yu-Guang
    Wang, Tao
    Zhou, Yi-Hua
    Shi, Wei-Min
    Jiang, Dong-Hua
    Liao, Xin
    PHYSICA SCRIPTA, 2024, 99 (02)
  • [27] A Visually Secure Image Encryption Based on the Fractional Lorenz System and Compressive Sensing
    Ren, Hua
    Niu, Shaozhang
    Chen, Jiajun
    Li, Ming
    Yue, Zhen
    FRACTAL AND FRACTIONAL, 2022, 6 (06)
  • [28] A secure secret image sharing with steganography and authentication by Hamming code (15,11) for compressed images
    Charoghchi, Sara
    Mashhadi, Samaneh
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (11) : 31933 - 31955
  • [29] A secure secret image sharing with steganography and authentication by Hamming code (15,11) for compressed images
    Sara Charoghchi
    Samaneh Mashhadi
    Multimedia Tools and Applications, 2024, 83 : 31933 - 31955
  • [30] Polynomial Based Progressive Secret Image Sharing Scheme With Smaller Shadow Size
    Guo, Yongzhen
    Ma, Zhuo
    Zhao, Meng
    IEEE ACCESS, 2019, 7 : 73782 - 73789