详细信息
Visually asymmetric image encryption algorithm based on SHA-3 and compressive sensing by embedding encrypted image ( SCI-EXPANDED收录 EI收录) 被引量:48
文献类型:期刊文献
英文题名:Visually asymmetric image encryption algorithm based on SHA-3 and compressive sensing by embedding encrypted image
作者:Huang, Xiaoling[1];Dong, Youxia[1];Zhu, Hongyong[1];Ye, Guodong[1]
机构:[1]Guangdong Ocean Univ, Fac Math & Comp Sci, Zhanjiang 524088, Peoples R China
年份:2022
卷号:61
期号:10
起止页码:7637
外文期刊名:ALEXANDRIA ENGINEERING JOURNAL
收录:SCI-EXPANDED(收录号:WOS:000752138700011)、、EI(收录号:20220311486376)、Scopus(收录号:2-s2.0-85122967824)、WOS
基金:Thanks to Reviewers and Editor for useful suggestions. This work was supported in part by the National Natural Science Foundation of China (No.61972103), the Natural Science Foundation of Guangdong Province of China (No.2019A1515011361), the Key Scientific Research Project of Education Department of Guangdong Province of China (No.2020ZDZX3064), and the Postgraduate Education Innovation Project of Guangdong Ocean University of China (No.202143).
语种:英文
外文关键词:Image encryption; Compressive sensing; Integer wavelet transform; RSA; SHA-3
外文摘要:This paper presents a new asymmetric image encryption and hiding algorithm based on SHA-3 and compressive sensing. First, to resist the chosen-plaintext attack (CPA) and the knownplaintext attack (KPA), SHA-3 is employed to calculate the hash values of the plain image, and they are transformed into the initial values of the chaotic map. Second, the plain image is divided into blocks which are processed by sparse transform, scrambling, compressive measurement, and merged. Then they are quantized and scrambled again to get an encrypted image. Third, the encrypted image is filled with zeros to the same size as the plain image. Then three numbers from the hundreds digit, tens digit, and single digit of each pixel are extracted respectively. Finally, the carrier image is transformed by integer wavelet transform (IWT) to get four coefficients, and then the above three numbers are embedded into low-frequency coefficients respectively. By inverse IWT, the carrier image containing secrets (CICS) can be obtained. The experimental results show that the algorithm has strong imperceptibility and key sensitivity. Especially, when the embedding coefficient is set to 1.0, the NC value between the carrier image (CI) and the CICS can reach 0.9999, and the PSNR value can reach about 43 dB.(c) 2022 THE AUTHORS. Published by Elsevier BV on behalf of Faculty of Engineering, Alexandria University This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/ licenses/by-nc-nd/4.0/).
参考文献:
正在载入数据...