登录    注册    忘记密码    使用帮助

详细信息

Visually asymmetric image encryption algorithm based on SHA-3 and compressive sensing by embedding encrypted image  ( SCI-EXPANDED收录 EI收录)   被引量:48

文献类型:期刊文献

英文题名:Visually asymmetric image encryption algorithm based on SHA-3 and compressive sensing by embedding encrypted image

作者:Huang, Xiaoling[1];Dong, Youxia[1];Zhu, Hongyong[1];Ye, Guodong[1]

机构:[1]Guangdong Ocean Univ, Fac Math & Comp Sci, Zhanjiang 524088, Peoples R China

年份:2022

卷号:61

期号:10

起止页码:7637

外文期刊名:ALEXANDRIA ENGINEERING JOURNAL

收录:SCI-EXPANDED(收录号:WOS:000752138700011)、、EI(收录号:20220311486376)、Scopus(收录号:2-s2.0-85122967824)、WOS

基金:Thanks to Reviewers and Editor for useful suggestions. This work was supported in part by the National Natural Science Foundation of China (No.61972103), the Natural Science Foundation of Guangdong Province of China (No.2019A1515011361), the Key Scientific Research Project of Education Department of Guangdong Province of China (No.2020ZDZX3064), and the Postgraduate Education Innovation Project of Guangdong Ocean University of China (No.202143).

语种:英文

外文关键词:Image encryption; Compressive sensing; Integer wavelet transform; RSA; SHA-3

外文摘要:This paper presents a new asymmetric image encryption and hiding algorithm based on SHA-3 and compressive sensing. First, to resist the chosen-plaintext attack (CPA) and the knownplaintext attack (KPA), SHA-3 is employed to calculate the hash values of the plain image, and they are transformed into the initial values of the chaotic map. Second, the plain image is divided into blocks which are processed by sparse transform, scrambling, compressive measurement, and merged. Then they are quantized and scrambled again to get an encrypted image. Third, the encrypted image is filled with zeros to the same size as the plain image. Then three numbers from the hundreds digit, tens digit, and single digit of each pixel are extracted respectively. Finally, the carrier image is transformed by integer wavelet transform (IWT) to get four coefficients, and then the above three numbers are embedded into low-frequency coefficients respectively. By inverse IWT, the carrier image containing secrets (CICS) can be obtained. The experimental results show that the algorithm has strong imperceptibility and key sensitivity. Especially, when the embedding coefficient is set to 1.0, the NC value between the carrier image (CI) and the CICS can reach 0.9999, and the PSNR value can reach about 43 dB.(c) 2022 THE AUTHORS. Published by Elsevier BV on behalf of Faculty of Engineering, Alexandria University This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/ licenses/by-nc-nd/4.0/).

参考文献:

正在载入数据...

版权所有©广东海洋大学 重庆维普资讯有限公司 渝B2-20050021-8 
渝公网安备 50019002500408号 违法和不良信息举报中心