Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication

被引:12
|
作者
Gan, Zhihua [1 ,2 ]
Song, Shiping [3 ]
Zhou, Lin [3 ]
Han, Daojun [4 ]
Fu, Jiangyu [3 ]
Chai, Xiuli [2 ,3 ]
机构
[1] Henan Univ, Inst Intelligent Network Syst, Sch Software, Intelligent Data Proc Engn Res Ctr Henan Prov, Kaifeng 475004, Peoples R China
[2] Henan Key Lab Cyberspace Situat Awareness, Zhengzhou 450001, Peoples R China
[3] Henan Univ, Sch Artificial Intelligence, Henan Key Lab Big Data Anal & Proc, Zhengzhou 450046, Peoples R China
[4] Henan Univ, Inst Image Proc & Pattern Recognit, Sch Comp & Informat Engn, Kaifeng 475004, Peoples R China
基金
中国国家自然科学基金;
关键词
Compressed sensing (CS); Secret image sharing (SIS); Integer wavelet transform (IWT)-M-embedding; Image encryption; SCHEME; ROBUST;
D O I
10.1016/j.jksuci.2022.09.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image encryption is an effective method to protect private images by converting them into meaningless ones, but many current image encryption algorithms still have security and efficiency problems. This paper combines compressed sensing (CS) and secret image sharing (SIS) to propose a certifiable visually secure image selection encryption. Firstly, a selective encryption based on multi-task convolutional neural network (SE-MTCNN) is presented to distinguish and encrypt the sensitive and non-sensitive information of plain images. Subsequently, the SIS algorithm is used to decompose the resulting plain image into multiple shadow images to disperse the risk of cryptographic image loss and resist hacking attacks. Herein, a pseudo-convolutional sliding scrambling based on chaotic sequences driven by plaintext (PCSS-CSDP) is proposed to eliminate the correlation between adjacent image pixels. Finally, the IWTM-embedding algorithm is used to embed shadow images into carrier images to get multiple visually meaningful cipher images. Additionally, a new authentication scheme based on bit-level cyclic shifts and dynamic combination (AS-BCSDC) is introduced, and the obtained authentication information is fused into cipher images to prevent the deception of illegal users and malicious tampering of cloud platform. Experiments demonstrate the effectiveness of our algorithm, and it may be applied for image secure communication.
引用
下载
收藏
页码:9252 / 9272
页数:21
相关论文
共 50 条
  • [31] A visually secure image encryption scheme based on adaptive block compressed sensing and non-negative matrix factorization
    Shi, Yuandi
    Chen, Rongrong
    Liu, Donglin
    Wang, Bin
    OPTICS AND LASER TECHNOLOGY, 2023, 163
  • [32] Visual Secure Image Encryption Scheme Based on Compressed Sensing and Regional Energy
    Shi, Mengna
    Guo, Shiyu
    Song, Xiaomeng
    Zhou, Yanqi
    Wang, Erfu
    ENTROPY, 2021, 23 (05)
  • [33] Invertible secret image sharing with steganography and authentication for AMBTC compressed images
    Wu, Xiaotian
    Yang, Ching-Nung
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2019, 78 : 437 - 447
  • [34] Exploiting 2D compressed sensing and information entropy for secure color image compression and encryption
    Zhihua Gan
    Jianqiang Bi
    Wenke Ding
    Xiuli Chai
    Neural Computing and Applications, 2021, 33 : 12845 - 12867
  • [35] Exploiting 2D compressed sensing and information entropy for secure color image compression and encryption
    Gan, Zhihua
    Bi, Jianqiang
    Ding, Wenke
    Chai, Xiuli
    NEURAL COMPUTING & APPLICATIONS, 2021, 33 (19): : 12845 - 12867
  • [36] An image authentication scheme based on digital watermarking and image secret sharing
    Hsieh, Shang-Lin
    Tsai, I-Ju
    Yeh, Chung-Ping
    Chang, Chia-Ming
    MULTIMEDIA TOOLS AND APPLICATIONS, 2011, 52 (2-3) : 597 - 619
  • [37] An image authentication scheme based on digital watermarking and image secret sharing
    Shang-Lin Hsieh
    I-Ju Tsai
    Chung-Ping Yeh
    Chia-Ming Chang
    Multimedia Tools and Applications, 2011, 52 : 597 - 619
  • [38] Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression
    Chen, Junxin
    Zhang, Yu
    Qi, Lin
    Fu, Chong
    Xu, Lisheng
    OPTICS AND LASER TECHNOLOGY, 2018, 99 : 238 - 248
  • [39] A visually secure image encryption scheme based on compressed sensing and Chebyshev-dynamics coupled map lattices in cloud environment
    Qi Ren
    Lin Teng
    Xingyuan Wang
    Donghua Jiang
    The European Physical Journal Plus, 138
  • [40] A visually secure image encryption scheme based on compressed sensing and Chebyshev-dynamics coupled map lattices in cloud environment
    Ren, Qi
    Teng, Lin
    Wang, Xingyuan
    Jiang, Donghua
    EUROPEAN PHYSICAL JOURNAL PLUS, 2023, 138 (05):