CN112711766B - Image transmission system based on scrambling block compressed sensing, encryption method and decryption method - Google Patents

Image transmission system based on scrambling block compressed sensing, encryption method and decryption method Download PDF

Info

Publication number
CN112711766B
CN112711766B CN202110005734.9A CN202110005734A CN112711766B CN 112711766 B CN112711766 B CN 112711766B CN 202110005734 A CN202110005734 A CN 202110005734A CN 112711766 B CN112711766 B CN 112711766B
Authority
CN
China
Prior art keywords
image
sequence
key
matrix
scrambled
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110005734.9A
Other languages
Chinese (zh)
Other versions
CN112711766A (en
Inventor
王兰
杨兵
石熙
韦鹏程
佘远俊
张霖
彭亚飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Ecological Environment Monitoring Center
Chongqing University of Education
Original Assignee
Chongqing Ecological Environment Monitoring Center
Chongqing University of Education
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Ecological Environment Monitoring Center, Chongqing University of Education filed Critical Chongqing Ecological Environment Monitoring Center
Priority to CN202110005734.9A priority Critical patent/CN112711766B/en
Publication of CN112711766A publication Critical patent/CN112711766A/en
Application granted granted Critical
Publication of CN112711766B publication Critical patent/CN112711766B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The application provides an image transmission system based on scrambling block compressed sensing, an encryption method and a decryption method, original images are transformed to a frequency domain (a sparse coefficient matrix is obtained) through wavelet transform, and a key k is generated through Logistic-Tent chaotic mapping 1 And constructing a scrambling matrix to scramble the sparse system matrix to obtain the scrambling matrix, then partitioning the scrambling matrix, and measuring each block. Quantizing the obtained measured value by a quantizer to obtain an integer value; key k is formed by utilizing Logistic-Tent chaotic mapping 2 Carrying out confusion operation on the whole numerical value to obtain a confusion sequence; generating a key k by utilizing Logistic-Tent chaotic mapping 3 Performing diffusion operation to obtain a final ciphertext; sending the cipher text to the image receiving equipment, and sending the key k 1 Key k 2 And a secret key k 3 Shared with the image receiving device.

Description

Image transmission system based on scrambling block compressed sensing, encryption method and decryption method
Technical Field
The application relates to the technical field of image processing, in particular to an image transmission system based on scrambling block compressed sensing, and an encryption and decryption method.
Background
With the rapid development of information technology and network technology, the collection, processing, transmission and storage of images are attracting wide attention in many fields such as military security, medical processing and network transmission. In practical application, in order to reduce data transmission amount and ensure data safe transmission, compression and encryption processing are generally required, while most of the existing image encryption schemes are designed to be sensitive encryption, so that the decrypted data quality is low, even when a part of encrypted data is lost, the decrypted data cannot be correctly decrypted, and the compression operation is not considered. Most transmission channels are not safe and are easy to be attacked, and how to safely transmit images and resist the robustness of various attacks becomes an important problem in the field of image processing and information security.
The CS (Compressive Sensing) theory is an emerging research hotspot in the recent international, and the framework thereof has the characteristics of simultaneous compression, sampling and encryption, and can ensure the security of information to a certain extent. There is some preliminary discussion about security of compressed sensing. For example, it is demonstrated in some existing literature that although CS does not meet the perfect security defined by shannon, computational guarantees can be provided for confidentiality; some documents indicate that a compressed sensing symmetric cryptosystem formed by iteratively updating a measurement matrix can achieve perfect security in an information theory sense; the literature also proves that perfect safety can be realized by introducing energy constancy of measured values when a primary random Gaussian matrix is used as a measurement matrix for compressed sensing; alternatively, indistinguishable security can be achieved by updating the measurement matrix with the unitary matrix and the bidirectional keystream. Therefore, compressed sensing is a security that can achieve image transmission.
The CS theory indicates that sampling the signal at a frequency much lower than that determined by the Nyquist-Shannon sampling theorem under certain conditions can still ensure accurate recovery of the original signal, and is just suitable for robust transmission of images in resource-constrained environments. For example, some documents indicate that when the measurement matrix follows a gaussian distribution, the energy of each measurement is approximately equal, i.e., the measurements have a 'democratic' (democracy) property. It is considered that the reconstruction process of compressed sensing has better robustness to noise, making it a "robust encryption" technology for promising multimedia data, and even if additional noise is introduced into the encrypted data, the original signal can be recovered with high fidelity, which is extremely suitable for the reconstruction requirement of partially lost data after the image in the resource-limited or non-peer-to-peer network is transmitted through an insecure channel.
At present, scholars at home and abroad have conducted partial research on image robustness encryption. An image robust encryption algorithm based on compressed sensing is designed in foreign documents, packet loss attack can be resisted, but a measurement matrix is used as a key, so that the transmission quantity is large, and the transmission load is increased; an algorithm for image encryption based on compressed sensing is also proposed in the literature, but the histogram distribution of the algorithm is uneven, the pixel correlation is more remarkable, and the algorithm does not guarantee enough security. And a robust encryption algorithm of a multi-focus image based on compressed sensing, which is proposed for the multi-focus image, has better robustness against attack, but is mainly directed for the multi-focus image, and the application range is limited.
While domestic research mainly uses image robust coding algorithms mostly. Such as: a robust SAR image coding transmission scheme emphasizes coding efficiency, but does not consider the security of image robust transmission; for another example, based on an image encryption algorithm of compressed sensing and real-time dynamic scrambling, the robustness of resisting shearing attack is simply analyzed, but the PSNR value (Peak Signal To Noise Ratio) of a recovered image still needs To be improved; or the robustness of resisting noise is analyzed based on the design of an image encryption scheme of parallel compressed sensing and chaotic mapping.
In summary, most of the existing encryption algorithms based on compressed sensing do not specially aim at the transmission problems of resisting noise attack, shearing attack, statistical attack and plaintext attack selection in an insecure channel, and especially, the research of considering security and robustness of a ciphertext in the transmission process is not considered.
Disclosure of Invention
The embodiment of the application aims to provide an image transmission system based on scrambling block compressed sensing, an encryption method and a decryption method, so as to reduce channel bandwidth and ensure image safe and robust transmission.
In order to achieve the above object, embodiments of the present application are implemented as follows:
in a first aspect, an embodiment of the present application provides an image encryption method based on compressed sensing of a scrambling block, which is applied to an image transmission device, and includes:
transforming the original image wavelet to a frequency domain by using DWT as a sparse basis psi to obtain a sparse coefficient matrix;
obtaining scrambling matrix R and key k by using Logistic-Tent chaotic mapping system 1 And determining a scrambled image according to the original image and the scrambling matrix R, wherein the secret key k 1 Is (r) 1 ,z 1 ),r 1 Control parameter for this chaotic mapping, z 1 The chaos initial value of the chaos mapping is obtained;
dividing the scrambled image into M sizes of
Figure BDA0002883070460000021
To obtain corresponding M scrambled image blocks P i (x) And, for each of said scrambled image blocks P i (x) Performing compressed sensing measurement to obtain each scrambled image block P i (x) Compressed perceptual measurement y of i
For each of the compressed perceptual measurements y i Quantizing it to an integer value Z i
Utilizing the Logistic-Tent chaotic mapping system to map the integer value Z i Performing aliasing operation to obtain an aliased sequence
Figure BDA0002883070460000031
And a secret key k 2
Figure BDA0002883070460000032
The key k 2 Is (r) 2 ,z 2 ),r 2 Control parameter for this chaotic mapping, z 2 The chaos initial value of the chaos mapping is obtained;
utilizing the Logistic-Tent chaotic mapping system to map the confusion sequence
Figure BDA0002883070460000033
Performing diffusion operation to obtain a pseudo-random sequence V and a secret key k 3 Said secret key k 3 Is (r) 3 ,z 3 ),r 3 Control parameter for this chaotic mapping, z 3 The chaos initial value of the chaos mapping is obtained;
carrying out key stream conversion on the pseudorandom sequence V to obtain a key stream sequence K (i), and carrying out key stream conversion on the pseudorandom sequence V according to the key stream sequence K (i) and the confusion sequence
Figure BDA0002883070460000034
Determining the ciphertext C i
The ciphertext C i Sending the key k to an image receiving device 1 The key k 2 And said key k 3 Sharing to the image receiving apparatus so that the image receiving apparatus bases on the ciphertext C i The key k 1 The key k 2 And said key k 3 And reconstructing the original image by combining a preset image decryption method, wherein the image decryption method is the reverse process of the image encryption method.
In the embodiment of the application, the original image is transformed to the frequency domain by using wavelet transform (to obtain a sparse coefficient matrix), and the sparse coefficient matrix is subjected to chaotic mapping by using a Logistic-Tent chaotic mapping system to obtain a scrambling matrix and a key k 1 (the control parameters and the chaos initial value of the chaos mapping) further determine a scrambled image, then divide the scrambled image to obtain corresponding M scrambled image blocks, and then perform compressed sensing measurement on each scrambled image block. Firstly, the pixels of the whole image are reordered (namely scrambled), the spatial correlation of adjacent pixel blocks can be eliminated, the simultaneous sampling and compression can be realized by utilizing a compressed sensing theory, the data transmission quantity can be reduced, and the efficiency can be improved. The image is firstly subjected to wavelet transformation to a frequency domain, and then the image frequency domain coefficients are scrambled, so that the sparsity of a sampling object tends to be uniform, the RIP performance of compressed sensing can be effectively relaxed, and the improvement of the image reconstruction quality can be facilitated. Therefore, the scrambled block compressed sensing is adopted for measurement, the data transmission quantity can be effectively reduced, the transmission efficiency is guaranteed, and meanwhile the data transmission quantity is used as the first layer of encryption. Then, quantization processing (quantizing into integer value) is carried out on the compressed sensing measured value, and confusion operation is carried out on the integer value by utilizing a Logistic-Tent chaotic mapping system to obtain a confusion sequence and a key k 2 Namely the control parameters and the chaos initial value of the chaos mapping; and then, carrying out diffusion operation on the confusion sequence by using a Logistic-Tent chaotic mapping system to obtain a pseudorandom sequence and a secret key k 3 Namely the control parameters and the chaos initial value of the chaos mapping; then, carrying out key stream conversion on the pseudorandom sequence to obtain a key stream sequence, and determining a ciphertext according to the key stream sequence and the confusion sequence; sending the ciphertext to an image receiving device, and sending a secret key k 1 Key k 2 And a secret key k 3 Shared with the image receiving device. The Logistic-Tent mapping is utilized to encrypt the quantization value by adopting a confusion-diffusion mechanism, the chaotic range of mapping is wider, the chaotic performance of mapping is better, the security of data transmission can be ensured by constructing a key stream, and statistical attack is resisted, so that the security is further ensured. Through the analysis in various aspects such as the spatial comparison of the compressed and encrypted images and the reconstructed images under different sampling rates, the analysis of the relation between the sampling rate and the packet loss rate, the comparison of compression performance, the analysis of key space, the analysis of pixel correlation, the analysis of robustness for resisting packet loss, shearing and noise attack, the comprehensive comparison analysis and the like, the scheme proves that the image is subjected to the analysis in various aspects such asSecurity, effectiveness and robustness of transmission over an unsecured channel after encryption. The decryption reconstruction process is realized by utilizing an inverse process, comprises inverse quantization and inverse confusion-diffusion operation, and can adopt a GRSR reconstruction algorithm to obtain high-performance reconstruction of an image and ensure transmission robustness. Experimental simulation results and comparative analysis show that the PSNR value of a reconstructed image of an original image is 20.4dB at a sampling rate of 0.05; the PSNR value of the reconstructed image also reaches 22.24dB under the packet loss rate of 90 percent; the reconstructed image still retains the main information and is visually acceptable under a 256 × 256 cropping attack. Therefore, the scheme has high compression performance, can resist common attacks such as brute force attack, statistical attack, packet loss attack, shearing attack, noise attack and the like, has high robustness, and has wide applicability to practical application scenes under various resource-limited conditions. The data acquisition, the effective transmission and the reduction of the calculation load are realized, and the safe and robust transmission of the image can also be realized.
With reference to the first aspect, in a first possible implementation manner of the first aspect, the chaotic mapping is performed on the sparse coefficient matrix by using a Logistic-Tent chaotic mapping system to obtain a scrambling matrix R and a key k 1 The method comprises the following steps:
generating a pseudo-random sequence p1 by using the Logistic-Tent chaotic mapping system, and carrying out the chaotic mapping of the time on a control parameter r 1 And chaos initial value z 1 As a key k 1 =(r 1 ,z 1 );
For the pseudo-random sequence p 1 Iterating h + MxN times, and discarding the previous h values;
setting a value of each element of the N × N matrix to zero;
for the pseudo-random sequence p 1 Sorting in ascending order, and sorting R (p) 2 (m), m) is set to 1 to obtain a reordered sequence p 2 The scrambling matrix R is thus obtained, where m ∈ {1, 2, … N }.
With reference to the first aspect, in a second possible implementation manner of the first aspect, the scrambling image block P is a block of a block i (x) Performing compressed sensing measurement to obtain each scrambled mapImage block P i (x) Compressed perceptual measurement y of i The method comprises the following steps:
for each of said scrambled image blocks P i (x) And independently measuring through a measurement matrix to obtain each scrambled image block P i (x) The compressed perceptual measurement value yi of (a), the measurement matrix is:
y i =φP i (x)φ T
wherein, the first and the second end of the pipe are connected with each other,
Figure BDA0002883070460000041
representing the scrambled image block P i (x) Compressed perceptual measurement of; p i (x)=vec(x)×R;
Figure BDA0002883070460000042
Representing scrambled image blocks P i (x) By selecting the Hadamard matrix
Figure BDA0002883070460000043
Front of a Hadamard matrix of size
Figure BDA0002883070460000044
Obtaining a row;
or, the measurement matrix is:
Figure BDA0002883070460000045
wherein the content of the first and second substances,
Figure BDA0002883070460000046
Figure BDA0002883070460000047
is a Kronecker product operator; vec (y) i ) Denotes y i Line order vectorization of, vec (P) i (x) ) represents P i (x) Vectorizing the line order of (c);
or, the measurement matrix is:
Figure BDA0002883070460000051
or, the measurement matrix is:
Figure BDA0002883070460000052
in this implementation, the measurement matrix in the compressed sensing measurement of the scrambled image block may be represented as a structural random matrix, which is almost irrelevant to all other orthogonal matrices and theoretically has exactly the same sensing characteristics as the random observation matrix.
With reference to the first aspect, in a third possible implementation manner of the first aspect, the compression perception measurement value y is obtained by applying a compression perception measurement value to each of the compressed perception measurement values y i Quantizing it to an integer value Z i The method comprises the following steps:
for each of the compressed perceptual measurements y i Quantizing the data by a preset quantization formula to obtain a corresponding integer value Z i The preset quantization formula is as follows:
Z i =round(δ i-1 +y i ),
Figure BDA0002883070460000053
wherein Z is i Representing the compressed perceptual measurement y i Quantized integer value, δ representing the compressed perceptual measurement y i Error residual value of (2), initial residual value delta 0 Round (a) denotes returning the integer value closest to a.
In this implementation, the compressed sensing measurement is quantized in such a way that it can fit into the distribution of most of the measurements, and the error residual of the previous measurement is added to the quantization of the next measurement with a diffusion effect.
With reference to the first aspect, in a fourth possible implementation manner of the first aspect, the using the Logistic-Tent hybridChaotic mapping system for said integer value Z i Performing aliasing operation to obtain an aliased sequence
Figure BDA00028830704600000510
And a secret key k 2 The method comprises the following steps:
utilizing the Logistic-Tent chaotic mapping system to carry out the control parameter r of the chaotic mapping 2 And chaos initial value z 2 As a key k 2 =(r 2 ,z 2 );
For the integer value Z i Iteration n 0 + MXN times, discarding the first N 0 Values to generate a sequence
Figure BDA0002883070460000054
The sequence b ═ b (n) 0 +1),b(n 0 +2),…,b(n 0 +M×N)]Obtaining new sequences in ascending order
Figure BDA0002883070460000055
Searching
Figure BDA0002883070460000056
In the sequence of
Figure BDA0002883070460000057
Form an index sequence by the corresponding index values
Figure BDA0002883070460000058
For the index sequence
Figure BDA0002883070460000059
By transforming in the following way:
Figure BDA0002883070460000061
wherein z is i =vec(Z i ) Is denoted by Z i Is denoted as z i
To pair
Figure BDA0002883070460000062
Obtaining the confusion sequence after recombination
Figure BDA0002883070460000063
With reference to the first aspect, in a fifth possible implementation manner of the first aspect, the confusion sequence is mapped by using the Logistic-Tent chaotic mapping system
Figure BDA0002883070460000064
Performing diffusion operation to obtain a pseudo-random sequence V and a secret key k 3 The method comprises the following steps:
utilizing the Logistic-Tent chaotic mapping system to carry out the control parameter r of the chaotic mapping 3 And chaos initial value z 3 As a key k 3 =(r 3 ,z 3 );
For the confusion sequence
Figure BDA0002883070460000065
Iteration n 1 + MXN times, discarding the first N 1 Values to form the pseudorandom sequence V ═ V (n) 1 +1),V(n 1 +2),…,V(n 1 +M×N)]。
With reference to the first aspect, in a sixth possible implementation manner of the first aspect, the performing key stream transformation on the pseudorandom sequence V to obtain a key stream sequence k (i), and performing key stream transformation according to the key stream sequence k (i) and the confusion sequence
Figure BDA00028830704600000611
Determining the ciphertext C i The method comprises the following steps:
converting the pseudo-random sequence V into a keystream sequence K (i) having a value of [0, 255] using the following equation:
K(i)=mod(floor(V(i)×2 14 ),256);
applying the following formula to the obfuscated sequence
Figure BDA0002883070460000066
Performing logical XOR to obtain the ciphertext C i
Figure BDA0002883070460000067
Wherein, C i For the ciphertext, C 0 Is a seed, C 0 ∈[0,255];C i-1 Representing a previous encrypted integer value;
Figure BDA0002883070460000068
representing a current integer value of the obfuscated sequence; k i Representing a key stream element.
In a second aspect, an embodiment of the present application provides an image decryption method based on scrambled block compressed sensing, which is applied to an image receiving device, and is configured to decrypt and reconstruct an original image processed by an image encryption method based on scrambled block compressed sensing according to any one of the first aspect or possible implementation manners of the first aspect, where the image decryption method includes:
receiving the ciphertext C transmitted by the image transmitting apparatus i And obtaining the secret key k shared by the image transmission device 1 The key k 2 And said key k 3
Using said key k 3 For the ciphertext C i Performing inverse transformation of the diffusion operation to obtain the pseudorandom sequence V, and performing the key stream transformation on the pseudorandom sequence V to obtain the key stream sequence K (i);
processing the keystream sequence K (i) by the following formula to obtain the obfuscated sequence
Figure BDA0002883070460000069
Figure BDA00028830704600000610
Wherein, the
Figure BDA0002883070460000071
K i 、C i 、C i-1 Representing the decrypted value, the keystream element value, the current encrypted value, and the previous encrypted value, respectively;
according to said secret key k 2 And the confusion sequence
Figure BDA0002883070460000072
Reducing the integer value Z by combining the confusion operation process of the Logistic-Tent chaotic mapping system i
For the integer value Z i Obtaining a compressed sensing measurement value y after inverse quantization i Then, the GRSR algorithm is utilized to pass the secret key k 1 Creating a measurement matrix versus compressed perceptual measurement y i Reconstructing to obtain the sparse coefficient matrix;
and reconstructing the sparse coefficient matrix into the original image by utilizing inverse wavelet transform.
In the embodiment of the application, the ciphertext and the key which are encrypted and transmitted by the image encryption method based on scrambling block compressed sensing are decrypted and reconstructed in the mode, so that the quality of the restored original image can be well ensured.
In a third aspect, an embodiment of the present application provides an image transmission system based on compressed sensing of scrambled blocks, including an image transmission device and an image reception device,
the image transmission device is configured to execute the image encryption method based on the scrambled block compressed sensing according to the first aspect or any one of possible implementation manners of the first aspect;
the image receiving device is configured to execute the image decryption method based on the compressed sensing of the scrambled block according to the second aspect.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and that those skilled in the art can also obtain other related drawings based on the drawings without inventive efforts.
Fig. 1 is a bifurcation diagram of Logistic mapping.
FIG. 2 is a diagram of a fork of the Skaew Tent map.
FIG. 3 is a bifurcation diagram of the Logistic-Tent mapping.
FIG. 4 is a Lyapunov index diagram of a Logistic-Tent map.
Fig. 5 is a schematic diagram of an image transmission system based on compressed sensing of scrambled blocks according to an embodiment of the present application.
Fig. 6 is an overall flowchart of implementing secure image transmission based on compressed sensing of a scrambled block according to an embodiment of the present application.
Fig. 7 is a flowchart of an image encryption method based on compressed sensing of scrambled blocks according to an embodiment of the present application.
Fig. 8 is a flowchart of an image decryption method for compressed sensing of scrambled blocks according to an embodiment of the present application.
Fig. 9 is a spatial contrast diagram of an original image, an encrypted image, and a reconstructed image at different compression rates according to an embodiment of the present application.
Fig. 10 is an encrypted image and a histogram distribution thereof according to an embodiment of the present application.
Fig. 11 is a schematic diagram of a sensitivity experiment result of the encryption phase provided in the embodiment of the present application.
Fig. 12 is a diagram illustrating a sensitivity test result of a decryption stage according to an embodiment of the present application.
Fig. 13 is a schematic diagram of a pixel correlation provided in the embodiment of the present application.
Fig. 14 is a schematic diagram of a cropping attack and an image reconstruction result provided in an embodiment of the present application.
Fig. 15 is a schematic diagram of noise interference and image reconstruction results provided in the embodiment of the present application.
Fig. 16 is a schematic diagram of gaussian noise interference and image reconstruction results provided in the embodiment of the present application.
Icon: 100-image transmission system based on compressed sensing of scrambled blocks; 110-an image transfer device; 120-image receiving device.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
To facilitate understanding of the present solution, a brief introduction is made to the Logistic-Tent mapping and the compressive sensing theory.
The Logistic-Tent mapping is formed by combining two classical one-dimensional chaotic mappings, namely the Logistic mapping and the Sview Tent mapping. The Logistic map is defined as:
z n+1 =αz n (1-z n ), (1)
the Skaw Tent map is defined as:
Figure BDA0002883070460000081
initial state value z 0 E (0, 1), control parameter alpha e [3.75, 4 ∈],μ∈(0,1)。
The Logistic-Tent mapping is described as follows:
Figure BDA0002883070460000082
initial state value z of the system 0 Belongs to (0, 1), and the control parameter r belongs to [0, 4 ]]. The Logistic-Tent mapping has a larger chaotic space than the Logistic mapping and the Sview Tent mapping, and the generated chaotic sequence is more uniformly distributed.
Referring to fig. 1 to 4, fig. 1 is a bifurcation diagram of a logic map, fig. 2 is a bifurcation diagram of a Skew Tent map, fig. 3 is a bifurcation diagram of a logic-Tent map, and fig. 4 is a Lyapunov index diagram of the logic-Tent map.
From the three chaotic bifurcation diagrams in fig. 1 to fig. 3, it can be seen that the cascaded Logistic-Tent mappings are uniformly distributed in the control parameter range, and from fig. 4, it can also be seen that the Lyapunov exponent of the Logistic-Tent mappings is a positive number in the whole control parameter (0, 4), which indicates that the Logistic-Tent mappings have a larger key space.
The compressed sensing theory breaks the limitations of the Nyquist/Shannon sampling theorem, and when the sampling rate is much less than Nyquist sampling, a sparse signal can be reconstructed using few measurements. That is, for K sparse signals or images, compressed sensing can accurately recover the original signal or image from M measurements that are much less than N samples, and therefore, image processing based on compressed sensing with simultaneous sampling and compression can reduce computation and transmission costs.
One-dimensional signal x ∈ R N Generally non-sparse, the sparse representation can be performed by the sparse transform matrix Ψ:
x=Ψθ, (4)
where θ is a sparse coefficient, if θ has only k non-zero entries, it can be called k sparse, and Ψ is an N × N orthogonal transform matrix. The measurement process uses a measurement matrix phi that is not coherent with the sparse basis psi to obtain a linear measurement y, namely:
y=φx, (5)
where φ is an M N measurement matrix, i.e.:
y=φΨθ, (6)
then, the approximate value of the sparse coefficient theta can be recovered by solving the following non-convex optimization problem, and finally, the original signal x can be obtained through orthogonal basis transformation.
min||θ|| 0 s.t.y=φx=φΨθ, (7)
l 0 The optimization problem is an NP (Non-deterministic problem of Polynomial complexity), and therefore, in the technical solution in the embodiment of the present application, a GRSR (Sparse Gradient Projection) algorithm is used for Reconstruction.
Referring to fig. 5, fig. 5 is a schematic diagram of an image transmission system 100 based on compressed sensing of scrambling blocks according to an embodiment of the present disclosure. In the embodiment, the image transmission system 100 based on compressed sensing of the scrambled block can be used for encrypted transmission of images to reduce channel bandwidth and ensure safe and robust transmission of images.
For example, the image transmission system 100 based on the compressed sensing of the scrambled blocks may include an image transmission device 110 and an image reception device 120. And the image transmission device 110 may be a terminal, the image encryption method based on the compressed sensing of the scrambling block is executed by the terminal; of course, the image transmission device 110 may also be a server, for example, a server interacting with a terminal, the terminal may send the image to the server, and the server needs to transmit the encrypted image to the image receiving device 120 via an unsecure channel, in which case, the image encryption method based on the compressed sensing of the scrambling block is performed by the server. Similarly, the image receiving device 120 may be a terminal or a server, and the image receiving device 120 is embedded with a program for executing an image decryption method based on scrambling block compressed sensing to decrypt an image, thereby implementing image secure and robust transmission of the image.
Referring to fig. 6, fig. 6 is an overall flowchart of implementing image secure transmission based on scrambling block compressed sensing according to an embodiment of the present application.
In this embodiment, the encryption process for the original image is the upper half, and the decryption reconstruction process is the lower half. The encryption process may include pixel scrambling, blocking, compression sampling, measurement value quantization, encryption, and the like, a stack of original images is compressed and encrypted, and the decryption reconstruction process may include decryption, inverse quantization, reconstruction, and the like, so as to decrypt and reconstruct the transmitted data to obtain the original images. The present scheme will be described in detail later with the image transmitting apparatus 110 performing the scrambled block compression perception-based image transmission method and the image receiving apparatus 120 performing the scrambled block compression perception-based image decryption method, respectively.
Referring to fig. 7, fig. 7 is a flowchart of an image encryption method based on compressed sensing of a scrambling block according to an embodiment of the present application. In this embodiment, the method for encrypting the image by scrambling block compressed sensing may include: step S11, step S12, step S13, step S14, step S15, step S16, step S17, and step S18.
For example, in order to securely transmit an image, the image transmission apparatus may acquire an original image to be transmitted by encryption.
After obtaining the original image, the image transmission apparatus may perform step S11.
Step S11: and transforming the original image wavelet to a frequency domain by using DWT as a sparse basis psi to obtain a sparse coefficient matrix.
In this embodiment, the image transmission apparatus may Wavelet-transform the original image into the frequency domain using DWT (Discrete Wavelet transform) as the sparse basis Ψ, resulting in a sparse coefficient matrix.
Resulting in a sparse coefficient matrix, the image transmission apparatus may perform step S12.
Step S12: carrying out chaotic mapping on the sparse coefficient matrix by using a Logistic-Tent chaotic mapping system to obtain a scrambling matrix R and a key k 1 And determining a scrambled image according to the original image and the scrambling matrix R, wherein the secret key k 1 Is (r) 1 ,z 1 ),r 1 Control parameter for this chaotic mapping, z 1 Is the chaos initial value of the chaos mapping.
In this embodiment, the image transmission device may perform chaotic mapping on the sparse coefficient matrix by using a Logistic-Tent chaotic mapping system to obtain a scrambling matrix R and a key k 1
For example, the image transmission device may generate a pseudo-random sequence p by using a Logistic-Tent chaotic mapping system 1 And the control parameter r of the chaotic mapping is carried out 1 And chaos initial value z 1 As a key k 1 =(r 1 ,z 1 ). For pseudo-random sequence p 1 Iteration h + mxn times can be performed, discarding the previous h values, where h > 0, for improving the sensitivity of the initial value.
Then, each element of the N matrix can be divided into two or moreThe value is set to zero (i.e. initialized) for the pseudo-random sequence p 1 Sorting R (p) in ascending order (although other sorting schemes may be used, the sorting scheme is not limited thereto), and 2 (m), m) is set to 1 to obtain a reordered sequence p 2 This results in a scrambling matrix R, where m ∈ {1, 2, … N }.
Obtaining a scrambling matrix R and a key k 1 Then, the image transmission device may multiply the original image by the scrambling matrix R to obtain a scrambled image with an encryption effect, and the image decryption may be implemented by multiplying the scrambled image by an inverse permutation matrix (i.e., an inverse matrix of the scrambling matrix R).
After the scrambled image is obtained, the image transmission apparatus may execute step S13.
Step S13: dividing the scrambled image into M sizes of
Figure BDA0002883070460000111
To obtain corresponding M scrambled image blocks P i (x) And, for each of said scrambled image blocks P i (x) Performing compressed sensing measurement to obtain each scrambled image block P i (x) Compressed perceptual measurement y of i
In this embodiment, the image transmission apparatus may divide the scrambled image into M pieces of size
Figure BDA0002883070460000112
To obtain corresponding M scrambled image blocks P i (x)。
Illustratively, the scrambled image is divided into M sizes
Figure BDA0002883070460000113
The ith scrambled image block (i.e., the non-overlapping sub-block) may be defined as P i (x),
P i (x)=vec(x)×R, (8)
Where vec (x) represents the row order vectorization of x.
Obtaining M scrambled image blocks P i (x)Thereafter, the image transmission apparatus may scramble the image blocks P for each i (x) Performing compressed sensing measurement to obtain each scrambled image block P i (x) Compressed perceptual measurement y of i
Illustratively, for each scrambled image block P i (x) Each scrambled image block P can be obtained by independent measurement through the measurement matrix i (x) Compressed perceptual measurement y of i
For example, the measurement matrix may be a simple random linear projection:
y i =φP i (x)φ T , (9)
wherein the content of the first and second substances,
Figure BDA0002883070460000114
representing scrambled image blocks P i (x) Compressed perceptual measurement of;
Figure BDA0002883070460000115
representing scrambled image blocks P i (x) The Hadamard matrix can be selected
Figure BDA0002883070460000116
Front of a Hadamard matrix of size
Figure BDA0002883070460000117
And (6) obtaining the line.
Since such a two-dimensional separable sensing operator described in equation (9) can be considered a case of a conventional column-based CS measurement operator, it is assumed that
Figure BDA0002883070460000118
Can be decomposed into
Figure BDA0002883070460000119
Then, the measurement matrix in equation (9) can be equivalent to:
Figure BDA00028830704600001110
wherein the content of the first and second substances,
Figure BDA0002883070460000121
Figure BDA0002883070460000122
is a Kronecker product operator; vec (y) i ) Denotes y i Line order vectorization of, vec (P) i (x) ) represents P i (x) Is vectorized.
Furthermore, equation (10) may represent the scrambled image block CS measurement and thus may be equivalently represented as the entire image CS measurement, i.e. the measurement matrix is:
Figure BDA0002883070460000123
as can be seen from the scrambling matrix R described above,
Figure BDA0002883070460000124
thus, further, the measurement matrix may be:
Figure BDA0002883070460000125
thus, the measurement matrix in the measurement scheme proposed for the entire image can be represented as a structurally random matrix
Figure BDA0002883070460000126
Almost irrelevant to all other orthogonal matrices and theoretically having exactly the same sensing characteristics as the random observed matrix.
The measured value y can be obtained through the sparse transformation and the measurement process, and meanwhile, the image can be regarded as being simultaneously compressed, sampled and encrypted by the first layer, so that the data security is enhanced while the data quantity is reduced.
Obtaining each scrambled image block P i (x) By compression ofPerception measurement value y i Thereafter, the image transmission apparatus may perform step S14.
Step S14: for each of the compressed perceptual measurements y i Performing quantization processing on the data to obtain an integer value Z i
Since the measured values obtained by compressed sensing sampling are generally real values, and the transmission channel is generally for a limited number of precision in practical applications, the image transmission apparatus in this embodiment can utilize the quantizer to transmit all the measured values y i Quantized to an integer value Z i
Illustratively, for each compressed perceptual measurement y i The image transmission device may quantize the image data by a preset quantization formula to obtain a corresponding integer value Z i . For example, the preset quantization formula may be:
Z i =round(δ i-1 +y i ), (14)
Figure BDA0002883070460000127
wherein Z is i Representing a measurement y on compressed sensing i Quantized integer value, δ representing the compressed perceptual measurement y i Error residual value of, initial residual value delta 0 Round (a) denotes the integer value returned to the nearest a. Thereby, the compressed sensing measured value is subjected to
Figure BDA0002883070460000128
Integer value obtained after quantization
Figure BDA0002883070460000129
The compressed sensing measurement value is quantized in such a way, so that the quantized integer value can adapt to the distribution interval of most measurement values, and the error residual value of the previous measurement value is added to the quantization of the next measurement value to have a diffusion effect.
Obtaining all compressed sensing measurement values y i Quantized integerValue Z i Thereafter, the image transfer apparatus may perform step S15.
Step S15: utilizing the Logistic-Tent chaotic mapping system to map the integer value Z i Performing aliasing operation to obtain an aliased sequence
Figure BDA0002883070460000131
And a secret key k 2
Figure BDA0002883070460000132
The key k 2 Is (r) 2 ,z 2 ),r 2 Control parameter for this chaotic mapping, z 2 The chaos initial value of the chaos mapping is obtained.
When the compressive sensing measurement matrix is used as a secret key, the compressive sensing framework can be regarded as an encryption scheme, but the security of the compressive sensing framework cannot meet the requirements of practical application, so that the security of image transmission is further ensured through encryption operation in the embodiment.
In this embodiment, the image transmission device may utilize a Logistic-Tent chaotic mapping system to perform the control parameter r of the chaotic mapping of this time 2 And chaos initial value z 2 As a key k 2 =(r 2 ,z 2 ) (ii) a For integer values Z i Can iterate n 0 + MXN times, the first N may be discarded to prevent transient effects 0 Values to generate a sequence:
Figure BDA0002883070460000133
the sequence b is ═ b (n) 0 +1),b(n 0 +2),…,b(n 0 +M×N)]The new sequences are obtained in ascending order:
Figure BDA0002883070460000134
then, the image transfer apparatus can search
Figure BDA0002883070460000135
In the sequence of
Figure BDA0002883070460000136
Forming an index sequence by using the corresponding index values:
Figure BDA0002883070460000137
for index sequences
Figure BDA0002883070460000138
May be transformed by:
Figure BDA0002883070460000139
wherein z is i =vec(Z i ) Is denoted by Z i Is denoted as z i
Image transfer apparatus pair
Figure BDA00028830704600001310
Recombination to obtain a confusion sequence
Figure BDA00028830704600001311
By adopting Logistic-Tent mapping, compared with single Skaew Tent mapping, the chaos range is wider, and the chaos performance is better.
Obtaining a confusion sequence
Figure BDA00028830704600001312
And a secret key k 2 Thereafter, the image transfer apparatus may perform step S16.
Step S16: utilizing the Logistic-Tent chaotic mapping system to map the confusion sequence
Figure BDA0002883070460000141
To carry outA diffusion operation to obtain a pseudorandom sequence V and a secret key k 3 Said secret key k 3 Is (r) 3 ,z 3 ),r 3 Control parameter for this chaotic mapping, z 3 The chaos initial value of the chaos mapping is obtained.
In order to further ensure that the encryption method of the scheme can resist statistical attack, the image transmission equipment can further map the confusion sequence through Logistic-Tent
Figure BDA0002883070460000142
A diffusion operation is performed.
In this embodiment, the image transmission device may utilize a Logistic-Tent chaotic mapping system to perform the control parameter r of the chaotic mapping of this time 3 And chaos initial value z 3 As a key k 3 =(r 3 ,z 3 ) And, for obfuscated sequences
Figure BDA0002883070460000143
Iteration n 1 + M × N times, the first N may be discarded to prevent transient effects 1 Values to form a pseudo-random sequence:
V=[V(n 1 +1),V(n 1 +2),…,V(n 1 +M×N)], (20)
and encrypting the quantization value by adopting a scrambling-diffusing mechanism through Logistic-Tent mapping, so that the security and robustness of image encryption can be further improved.
Obtaining a pseudorandom sequence V and a secret key k 3 Thereafter, the image transfer apparatus may perform step S17.
Step S17: carrying out key stream conversion on the pseudorandom sequence V to obtain a key stream sequence K (i), and carrying out key stream conversion on the pseudorandom sequence V according to the key stream sequence K (i) and the confusion sequence
Figure BDA0002883070460000144
Determining the ciphertext C j
In this embodiment, the image transmission device may perform key stream transformation on the pseudorandom sequence V to obtain a key stream sequence k (i).
Illustratively, the pseudorandom sequence V may be converted into a keystream sequence k (i) having a value of [0, 255] using the following equation:
K(i)=mod(floor(V(i)×2 14 ),256), (21)
of course, this can be expressed by the following ways, which are not limited herein:
K(i)←floor(V(i)×2 14 )mod255, (22)
the image transfer device may then be based on the keystream sequence K (i) and the obfuscated sequence
Figure BDA0002883070460000145
Determining the ciphertext C i . Illustratively, the obfuscated sequence may be paired using the following formula
Figure BDA0002883070460000146
Performing logical XOR to obtain the ciphertext C i
Figure BDA0002883070460000147
Wherein, C i Is a ciphertext, C 0 Is a seed, C 0 ∈[0,255];C i-1 Representing a previous encrypted integer value;
Figure BDA0002883070460000148
representing a current integer value of the obfuscated sequence; k is i Representing a keystream element.
Determining the ciphertext C i Key k 1 Key k 2 And a secret key k 3 Thereafter, the image transfer apparatus may perform step S18.
Step S18: the ciphertext C i Sending the key k to an image receiving device 1 The key k 2 And said key k 3 Sharing to the image receiving device so that the image receiving device is based on the ciphertext C i The key k 1 The key k 2 And said key k 3 In combination with presetsThe image decryption method of (2) reconstructs the original image, wherein the image decryption method is the inverse process of the image encryption method.
In this embodiment, the image transmission apparatus may transmit the ciphertext C i Sending to the image receiving device and sending the key k 1 Key k 2 And a secret key k 3 Sharing to the image receiving apparatus so that the image receiving apparatus is based on the ciphertext C i Key k 1 Key k 2 And a secret key k 3 And reconstructing the original image by combining a preset image decryption method (i.e., an image decryption method based on scrambling block compressed sensing), where the image decryption method is an inverse process of the image encryption method, and will be described in detail later.
Original images are transformed to a frequency domain (sparse coefficient matrix is obtained) by utilizing wavelet transform, and a Logistic-Tent chaotic mapping system is utilized to carry out chaotic mapping on a sparse coefficient matrix to obtain a scrambling matrix and a key k 1 (the control parameters and the chaos initial value of the chaos mapping) further determine a scrambled image, then divide the scrambled image to obtain corresponding M scrambled image blocks, and then perform compressed sensing measurement on each scrambled image block. Firstly, the pixels of the whole image are reordered (namely scrambled), the spatial correlation of adjacent pixel blocks can be eliminated, the simultaneous sampling and compression can be realized by utilizing a compressed sensing theory, the data transmission quantity can be reduced, and the efficiency can be improved. The image is firstly subjected to wavelet transformation to a frequency domain, and then the image frequency domain coefficients are scrambled, so that the sparsity of a sampling object tends to be uniform, the RIP performance of compressed sensing can be effectively relaxed, and the improvement of the image reconstruction quality can be facilitated. Therefore, the scrambled block compressed sensing is adopted for measurement, the data transmission quantity can be effectively reduced, the transmission efficiency is guaranteed, and meanwhile the data transmission quantity is used as the first layer of encryption. Then, quantization processing (quantizing into integer value) is carried out on the compressed sensing measured value, and confusion operation is carried out on the integer value by utilizing a Logistic-Tent chaotic mapping system to obtain a confusion sequence and a key k 2 Namely the control parameters and the chaos initial value of the chaos mapping; and then, carrying out diffusion operation on the confusion sequence by using a Logistic-Tent chaotic mapping system to obtain a pseudorandom sequence and a secret key k 3 The control parameters and the chaos initial value of the chaos mapping are obtained; then, carrying out key stream conversion on the pseudorandom sequence to obtain a key stream sequence, and determining a ciphertext according to the key stream sequence and the confusion sequence; sending the ciphertext to an image receiving device, and sending a secret key k 1 Key k 2 And a secret key k 3 Shared with the image receiving device. The Logistic-Tent mapping is utilized to encrypt the quantization value by adopting a confusion-diffusion mechanism, the chaotic range of mapping is wider, the chaotic performance of mapping is better, the security of data transmission can be ensured by constructing a key stream, and statistical attack is resisted, so that the security is further ensured.
For a detailed description of the decryption and reconstruction process of an image, please refer to fig. 8, and fig. 8 is a flowchart of an image decryption method based on compressed sensing of a scrambling block according to an embodiment of the present application. In the present embodiment, the image decryption method of scrambled block compressed sensing is applied to an image receiving apparatus and may include step S21, step S22, step S23, step S24, step S25, and step S26.
In the present embodiment, the ciphertext C is transmitted at the image transmission apparatus i Shared secret key k 1 Key k 2 And a secret key k 3 Thereafter, the image receiving apparatus may perform step S21.
Step S21: receiving the ciphertext C transmitted by the image transmitting apparatus i And obtaining the secret key k shared by the image transmission device 1 The key k 2 And said key k 3
In the present embodiment, the image receiving apparatus can receive the ciphertext C transmitted by the image transmitting apparatus i And obtaining a key k shared by the image transfer apparatus 1 Key k 2 And a secret key k 3
After that, the image receiving apparatus may perform step S22.
Step S22: using said key k 3 For the ciphertext C i And performing inverse transformation of the diffusion operation to obtain the pseudorandom sequence V, and performing the key stream transformation on the pseudorandom sequence V to obtain the key stream sequence K (i).
In this embodiment, the image receiving apparatus may utilize the inverse of the diffusion operation, utilizing the key k 3 For ciphertext C i And carrying out inverse transformation of diffusion operation to obtain a pseudorandom sequence V. The pseudo-random sequence V is then converted into a keystream sequence k (i) by equation (21) or equation (22).
Then, the image receiving apparatus may perform step S23.
Step S23: applying the following formula to the keystream sequence K (i) to obtain the obfuscated sequence
Figure BDA0002883070460000161
Figure BDA0002883070460000162
Wherein, the
Figure BDA0002883070460000163
K i 、C i 、C i-1 Representing the decrypted value, the keystream element value, the current encrypted value, and the previous encrypted value, respectively.
In this embodiment, the image receiving device may process the key stream sequence k (i) using the following formula to obtain an obfuscated sequence
Figure BDA0002883070460000164
Figure BDA0002883070460000165
Wherein the content of the first and second substances,
Figure BDA0002883070460000166
K i 、C i 、C i-1 representing the decrypted value, the keystream element value, the current encrypted value, and the previous encrypted value, respectively.
Obtaining a confusion sequence
Figure BDA0002883070460000167
Thereafter, the image receiving apparatus may perform step S24.
Step S24: according to said secret key k 2 And the confusion sequence
Figure BDA0002883070460000168
Combining the confusion operation process of the Logistic-Tent chaotic mapping system, and reducing to obtain the integer value Z i
In this embodiment, the image receiving apparatus may be based on the key k 2 And confusion sequences
Figure BDA0002883070460000169
Reducing to obtain an integer value Z by combining the confusion operation process of the Logistic-Tent chaotic mapping system i
For example, the image receiving device may first use the key k 2 Iterative Logistic-Tent mapping n 0 + mxn times, and then by steps in the aliasing operation:
sequencing the obtained sequences in an ascending order to obtain a new sequence; then, the image receiving apparatus may search for the index value corresponding to the element in the previous sequence in the obtained next sequence to obtain an index sequence:
Figure BDA00028830704600001610
then through the index sequence
Figure BDA00028830704600001611
For the confusion sequence
Figure BDA00028830704600001612
Inverse scrambling and reduction to obtain quantized integer value Z i
To obtain an integer value Z i Thereafter, the image receiving apparatus may perform step S25.
Step S25: for the integer value Z i Obtaining a compressed sensing measurement value y after inverse quantization i Then, the GRSR algorithm is utilized to pass the secret key k 1 Creating a measurement matrix versus compressed perceptual measurement y i And reconstructing to obtain the sparse coefficient matrix.
In bookIn an embodiment, the image receiving apparatus may correct the integer value Z by inverse quantization i Processing to obtain a compressed sensing measurement value y i . The image receiving device may then use the GRSR algorithm, via key k 1 Creating a measurement matrix versus compressed perceptual measurement y i And reconstructing to obtain a sparse coefficient matrix.
After obtaining the sparse coefficient matrix, the image receiving apparatus may perform step S26.
Step S26: and reconstructing the sparse coefficient matrix into the original image by utilizing inverse wavelet transform.
In the present embodiment, the image receiving apparatus can reconstruct the sparse coefficient matrix into the original image using the inverse wavelet transform.
In order to verify the effects (validity, robustness, security and the like) of the image encryption method and the image decryption method in the image transmission system based on the compressed sensing of the scrambled block provided by the embodiment of the application, the following experiment proves.
In this embodiment, the grayscale images with the sizes of 256 × 256 and 512 × 512 are selected respectively through experiments, and the GRSR algorithm is used as the reconstruction algorithm. The experimental environment is a personal computer implementation algorithm of an Intel Core i5 CPU, an 8GB memory and a Windows 1064 bit operating system, the size of a block in compressed sensing measurement is 32 multiplied by 32, and a key k 1 、k 2 、k 3 Parameter (r) mapped by three pairs of Logistic-Tent 1 ,z 1 )、(r 2 ,z 2 )、(r 3 ,z 3 ) Configured to measure, perform obfuscation and diffusion operations, respectively. Will r (i.e. r) 1 、r 2 、r 3 ) Set to a 15-bit fractional number, initial value z 0 Set to a 15-bit fractional number.
Analysis of image encryption results: the experiment selects the spatial contrast of the original image, the encrypted image and the reconstructed image at different compression rates with a lens of 512 × 512 and a house of 256 × 256, and the result is shown in fig. 9. When the sampling rate is 0.75, it means that the compression-sampled image is 75% of the original image. The quality of the reconstructed image is measured by adopting the peak signal-to-noise ratio PSNR, and the higher the value of the quality, the better the image quality is. Its unit is dB. The formula is as follows:
Figure BDA0002883070460000171
wherein, the mean square error between the original image and the decrypted image is represented by MSE, and the expression is as follows:
Figure BDA0002883070460000172
it can be seen from fig. 9 that the highest PSNR value of the reconstructed image can reach 40.7325. It can also be seen that the reconstructed image retains most of the features of the original image, and the quality of the decrypted image is still acceptable to some extent at different sampling rates, which indicates that the algorithm herein has a better recovery effect, and at the same time, has better compression capability and is beneficial to transmission and storage.
Analysis of compression performance: in this embodiment, a 512 × 512 lena image is selected and sampled at a sampling rate of 0.05 to 0.95, and the distribution trend of PSNR values after reconstruction is shown in table 1, where PSNR values of reconstructed images increase with increasing sampling rate. As can be seen from table 1, the PSNR values of the reconstructed images exceed 30dB when the sampling rate exceeds 0.35. The PSNR values for which 256 × 256 lena images were selected for compression performance comparison in this scheme and other methods (method 1: visual security image encryption scheme based on parallel compressed sensing; method 2: synchronous compressed encrypted image encoding scheme based on parallel compressed sensing) are listed in table 2. As can be seen from table 2, the reconstruction quality of the algorithm proposed herein is improved by 5.69dB compared to the best result of method 1, and is improved by 5.35 to 10.57dB compared to the reconstruction quality of method 2 under the same compression rate. Illustrating that the algorithm proposed herein outperforms these methods in compression performance.
Table 1: PSNR value of reconstructed images at different sampling rates
Figure BDA0002883070460000181
Table 2: compression Performance comparison with methods 1 and 2
Figure BDA0002883070460000182
Histogram analysis: the frequency of the image pixel intensity value can be displayed through an image histogram, and for a meaningful ordinary image, the histogram distribution is always uneven because the pixel value distribution of the ordinary image is relatively concentrated. An effective image encryption algorithm should generate an encrypted image with a uniform histogram. In fig. 10, (a), (e), (b), and (f) are the original images lena and peppers, respectively, and the corresponding histogram distributions, and in fig. 10, (c), (g), (d), and (h) are the encrypted images and the histogram distributions thereof, respectively. The fluctuation range of the histogram of the plaintext image is large and is distributed unevenly; the image histograms after encryption are uniformly distributed, and the difference between the encrypted image and the plaintext image is huge. This demonstrates that the method in this embodiment is able to resist a certain degree of statistical attack.
And (3) key space analysis: in the image encryption method based on scrambling block compressed sensing provided by this embodiment, three pairs of keys k are used 1 、k 2 、k 3 Has a floating point number precision of 10 -15 Precision of floating point number of chaos initial value is 10 -15 The key space size can be calculated as:
keyspace=(10 15 ×10 15 ) 3 =10 90 ≈2 300 , (27)
and 2 100 The key space can better resist brute force attack, so that the key space of the scheme can be theoretically enough to resist brute force attack.
Key sensitivity analysis: the key sensitivity means that the wrong key and the correct key have extremely small changes to cause the incorrect encryption or decryption, and the better the key sensitivity is, the better the effect of resisting the differential attack is.
The result of the sensitivity experiment in the encryption stage is shown in fig. 11, and the differential image of the correct key and the incorrect key is completely disordered, which indicates that the scheme has sensitivity to the encryption key.
Among them, in fig. 11:
(a) is an original image;
(b) is ciphertext encrypted using the correct key (z ═ 0.234857728820643);
(c) is ciphertext encrypted using the error key (z ═ 0.234857728820644);
(d) are differential images.
The results of the sensitivity experiments in the decryption phase are shown in fig. 12: the correct key can be used for normal decryption, and the wrong key can not be used for decryption, so that the algorithm has sensitivity to the decryption key.
Among them, in fig. 12:
(e) is an encrypted image;
(f) decrypting the correct key (r is 3.997636563976482, z is 0.215663864979742) to obtain an image;
(g) decrypting the resulting image for the error key (r ═ 3.997636563976483); (h) the resulting image is decrypted for the wrong key (z ═ 0.215663864979743).
Therefore, the scheme is sensitive to the key and can resist differential attack.
Pixel correlation analysis: the analysis attack of the cryptographic algorithm by using the essential attribute of high correlation among the pixels of the natural image is called as statistical attack, in order to resist the statistical attack, the correlation coefficient of the encrypted image is much weaker than that of the original image, and the lower the correlation coefficient among the pixels of the encrypted image, the better the effect of resisting the statistical attack. 8000 pixels are randomly selected as samples from the original image, the measured image and the encrypted image for pixel correlation in the present embodiment.
The first line in fig. 13 represents the correlation distribution between adjacent pixels in the plaintext image in the horizontal, vertical, and diagonal directions; the second row represents the correlation distribution between adjacent pixels of the measured image after compressed perceptual measurement; line 3 shows the correlation distribution between adjacent pixels of the encrypted image of the proposed encryption algorithm. As can be seen from fig. 13, the correlation coefficient of the plaintext image exhibits a concentrated distribution; and the correlation of the measurement image in the horizontal direction and the diagonal direction is reduced to some extent; but there is still a high correlation in the vertical direction; the correlation distribution of the encrypted image shows that the points of the image are distributed in a discrete and uniform manner, which indicates that the correlation among the pixels is low. The scheme is shown to be capable of resisting statistical attack to a certain extent.
And (3) analyzing robustness of packet loss resistance: the image is compressed and perceptually sampled to obtain a measurement value y with a length of M, which can be divided into a plurality of packets at equal intervals. Each packet carries a similar amount of information to the original image, since the importance of the measured values is approximately equal. Assuming m measurements per packet, there are a total
Figure BDA0002883070460000202
And (5) packaging. The receiving end will update the sampling rate according to the number of received packets, and the packet loss rate is indicated as PLR, which can be up to 30% in practical cases [33 ]]. The sampling rate is denoted SR, i.e. SR ═ M/N. Assuming SR ═ α (0 < α < 1), PLR ≦ β (0 ≦ β ≦ 0.3), when α ≦ 0.75 and β ≦ 0.2, the measured value M ═ N0.75 ≦ 512 × 0.75 ≦ 196608, M/100 ═ 1966 packets, the number of dropped packets 1966 × 0.2 ≦ 393, the packets received by the receiving end 1966-. If the packet loss rate is not considered, the amount of reduction is 65536. The real sampling rate is close to alpha (1-beta) through the analysis, and meanwhile, the transmission of the data volume can be reduced through compressed sensing sampling, and the load of the network can be reduced. That is, the amount of the specific reduction in the practical application is affected by the sampling rate and the packet loss rate.
Robust analysis of shear resistance: when data is subjected to malicious shearing attack in a transmission channel, the loss of the information block can influence the content of a reconstructed image, but the compressed sensing sampling quantization is carried out on the image, the measured values have democratic property, and the energy of each measured value is approximately equal, so that the algorithm can resist the shearing attack theoretically.
The encrypted images of lena were subjected to clipping attack experiments with 20 × 20, 30 × 30, 50 × 50, 100 × 100, 128 × 128, and 256 × 256 pixel blocks, respectively, and the reconstructed images thereof are shown in fig. 14 (a) to (f). When the cropping size is 256 × 256, the reconstructed image is still visually acceptable, in line with theoretical reasoning.
Robust analysis of noise immunity: in insecure channel transmission, the ciphertext image is also susceptible to interference of various noises, and has a large influence on the quality of the decrypted image. Fig. 15(a), (b), (c), and table 3 show reconstructed images obtained by adding salt and pepper noises with intensities of 0.01, 0.05, and 0.10 to the ciphertext image of lena, and their PSNR values, respectively. Experiments show that when the intensity of the salt and pepper noise reaches 0.1, the reconstructed image still retains the main information of the original image and is visually acceptable, and the PSNR value still reaches 13.78dB, so that the method has certain robustness to the salt and pepper noise.
Table 3: PSNR (Peak Signal to noise ratio) value of reconstructed image subjected to salt and pepper noises with different intensities
Figure BDA0002883070460000201
The encrypted image is susceptible to gaussian noise, which is added to the ciphertext image in the form of equation (28).
G′=G+σW, (28)
Where G' denotes a ciphertext image to which noise is added, G denotes an encrypted image, W denotes gaussian noise data, and σ denotes a gaussian noise intensity coefficient.
Reconstructed images obtained by adding gaussian noise having σ of 1, σ of 5, σ of 15, and σ of 20 to the ciphertext image of lens are shown in (a) to (d) of fig. 16. The result shows that the reconstructed image has certain distortion with the increase of the noise intensity sigma, but the main information of the reconstructed image can still be seen visually when sigma is 20, which shows that the algorithm has better robustness to Gaussian noise.
And (3) comprehensive analysis: according to the scheme, the compressed sensing of the scrambling block realizes efficient and rapid transmission and storage through simultaneous sampling, compression and encryption, has a good recovery effect, can well resist common attacks such as brute force attack, statistical attack, packet loss attack, shearing attack and noise attack while ensuring the transmission efficiency, and has robustness. Therefore, the scheme has better innovation in comprehensive performance and better applicability in practical application scenes under various resource-limited conditions.
In summary, the embodiment of the present application provides an image transmission system, an encryption method and a decryption method based on scrambling block compressed sensing, an original image is transformed to a frequency domain (to obtain a sparse coefficient matrix) by using wavelet transform, and a Logistic-Tent chaotic mapping system is used to perform chaotic mapping on the sparse coefficient matrix to obtain a scrambling matrix and a key k 1 (the control parameters and the chaos initial value of the chaos mapping) further determine a scrambled image, then divide the scrambled image to obtain corresponding M scrambled image blocks, and then perform compressed sensing measurement on each scrambled image block. Firstly, the pixels of the whole image are reordered (namely scrambled), the spatial correlation of adjacent pixel blocks can be eliminated, the simultaneous sampling and compression can be realized by utilizing a compressed sensing theory, the data transmission quantity can be reduced, and the efficiency can be improved. The image is firstly subjected to wavelet transformation to a frequency domain, and then the image frequency domain coefficients are scrambled, so that the sparsity of a sampling object tends to be uniform, the RIP performance of compressed sensing can be effectively relaxed, and the improvement of the image reconstruction quality can be facilitated. Therefore, the scrambled block compressed sensing is adopted for measurement, the data transmission quantity can be effectively reduced, the transmission efficiency is guaranteed, and meanwhile the data transmission quantity is used as the first layer of encryption. Then, quantization processing (quantizing into integer value) is carried out on the compressed sensing measured value, and confusion operation is carried out on the integer value by utilizing a Logistic-Tent chaotic mapping system to obtain a confusion sequence and a key k 2 Namely the control parameters and the chaos initial value of the chaos mapping; and then, carrying out diffusion operation on the confusion sequence by using a Logistic-Tent chaotic mapping system to obtain a pseudorandom sequence and a secret key k 3 Namely the control parameters and the chaos initial value of the chaos mapping; then, carrying out key stream conversion on the pseudorandom sequence to obtain a key stream sequence, and determining a ciphertext according to the key stream sequence and the confusion sequence; sending the ciphertext to an image receiving device, and sending a secret key k 1 Key k 2 And a secret key k 3 Shared with the image receiving device. Applying a confusion-diffusion mechanism to the quantization value by using Logistic-Tent mappingEncryption is carried out, the chaotic range of mapping is wider, the chaotic performance of mapping is better, and the security of data transmission can be ensured by constructing a key stream, so that statistical attack is resisted, and the security is further ensured. Through the analysis in various aspects such as the spatial comparison of the compressed and encrypted images and the reconstructed images under different sampling rates, the analysis of the relation between the sampling rate and the packet loss rate, the comparison of compression performance, the analysis of key space, the analysis of pixel correlation, the analysis of robustness for resisting packet loss, shearing and noise attack, the comprehensive comparison analysis and the like, the safety, effectiveness and robustness of the transmission through an unsafe channel after the images are encrypted are proved. The decryption reconstruction process is realized by utilizing an inverse process, comprises inverse quantization and inverse confusion-diffusion operation, and can adopt a GRSR reconstruction algorithm to obtain high-performance reconstruction of an image and ensure transmission robustness. Experimental simulation results and comparative analysis show that the PSNR value of a reconstructed image of an original image is 20.4dB at a sampling rate of 0.05; the PSNR value of the reconstructed image also reaches 22.24dB under the packet loss rate of 90 percent; the reconstructed image still retains the main information and is visually acceptable under a 256 × 256 cropping attack. Therefore, the scheme has high compression performance, can resist common attacks such as brute force attack, statistical attack, packet loss attack, shearing attack, noise attack and the like, has high robustness, and has wide applicability to practical application scenes under various resource-limited conditions. The data acquisition, the effective transmission and the reduction of the calculation load are realized, and the safe and robust transmission of the image can also be realized.
In this document, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
The above description is only an example of the present application and is not intended to limit the scope of the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (8)

1. An image encryption method based on scrambling block compressed sensing is characterized by being applied to an image transmission device and comprising the following steps:
performing wavelet transformation on an original image to a frequency domain by using DWT as a sparse basis psi to obtain a sparse coefficient matrix;
generating key k by using Logistic-Tent chaotic mapping system 1 Constructing a scrambling matrix R, and determining a scrambled image according to the original image and the scrambling matrix R, wherein a secret key k 1 Is (r) 1 ,z 1 ),r 1 Control parameter for this chaotic mapping, z 1 The chaos initial value of the chaos mapping is obtained;
dividing the scrambled image into M sizes of
Figure FDA0003788307430000011
To obtain corresponding M scrambled image blocks P i (x) And, for each of said scrambled image blocks P i (x) Performing compressed sensing measurement to obtain each scrambled image block P i (x) Compressed perceptual measurement y of i
For each of the compressed perceptual measurements y i Quantizing it to an integer value Z i
Utilizing the Logistic-Tent chaotic mapping system to map the integer value Z i Performing aliasing operation to obtain an aliased sequence
Figure FDA0003788307430000012
And a secret key k 2
Figure FDA0003788307430000013
The key k 2 Is (r) 2 ,z 2 ),r 2 Control parameter for this chaotic mapping, z 2 The chaos initial value of the chaos mapping is obtained;
utilizing the Logistic-Tent chaotic mapping system to perform alignment on the confusion sequence
Figure FDA0003788307430000014
Performing diffusion operation to obtain a pseudo-random sequence V and a secret key k 3 Said secret key k 3 Is (r) 3 ,z 3 ),r 3 Control parameter for this chaotic mapping, z 3 The chaos initial value of the chaos mapping is obtained;
carrying out key stream conversion on the pseudorandom sequence V to obtain a key stream sequence K (i), and carrying out key stream conversion on the pseudorandom sequence V according to the key stream sequence K (i) and the confusion sequence
Figure FDA0003788307430000015
Determining the ciphertext C i
The ciphertext C i Sending the key k to an image receiving device 1 The key k 2 And said key k 3 Sharing to the image receiving device so that the image receiving device is based on the ciphertext C i The key k 1 The key k 2 And said key k 3 Reconstructing the original image by combining a preset image decryption method, wherein the image decryption method is the reverse process of the image encryption method;
wherein for each of said scrambled image blocks P i (x) Performing compressed sensing measurement to obtain each scrambled image block P i (x) Compressed perceptual measurement y of i The method comprises the following steps:
for each of said scrambled image blocks P i (x) And independently measuring through a measurement matrix to obtain each scrambled image block P i (x) Compressed perceptual measurement y of i The measurement matrix is:
y i =φP i (x)φ T
wherein the content of the first and second substances,
Figure FDA0003788307430000021
representing the scrambled image block P i (x) Compressed perceptual measurement of; p i (x)=vec(x)×R;
Figure FDA0003788307430000022
Representing scrambled image blocks P i (x) By selecting the Hadamard matrix
Figure FDA0003788307430000023
Front of a Hadamard matrix of size
Figure FDA0003788307430000024
Obtaining a row;
or, the measurement matrix is:
Figure FDA0003788307430000025
wherein, the first and the second end of the pipe are connected with each other,
Figure FDA0003788307430000026
Figure FDA0003788307430000027
is a Kronecker product operator; vec (y) i ) Denotes y i Order vectorization of (c), vec (P) i (x) ) represents P i (x) Vectorizing the order of (a);
or, the measurement matrix is:
Figure FDA0003788307430000028
or, the measurement matrix is:
Figure FDA0003788307430000029
2. the image encryption method based on scrambling block compressed sensing of claim 1, wherein the sparse coefficients are mapped by using a Logistic-Tent chaotic mapping systemCarrying out chaotic mapping on the matrix to obtain a scrambling matrix R and a secret key k 1 The method comprises the following steps:
generating a pseudo-random sequence p by using the Logistic-Tent chaotic mapping system 1 And the control parameter r for the chaotic mapping is obtained 1 And chaos initial value z 1 As a key k 1 =(r 1 ,z 1 );
For the pseudo-random sequence p 1 Iterating for h + NXN times, and discarding the previous h values;
setting a value of each element of the N × N matrix to zero;
for the pseudo-random sequence p 1 Sorting in ascending order, and sorting R (p) 2 (m), m) is set to 1 to obtain a reordered sequence p 2 The scrambling matrix R is thus obtained, where m ∈ {1, 2, … N }.
3. The method according to claim 1, wherein said compressed sensing for each of said compressed sensing measures y i Quantizing it to an integer value Z i The method comprises the following steps:
for each of the compressed perceptual measurements y i Quantizing the data by a preset quantization formula to obtain a corresponding integer value Z i The preset quantization formula is as follows:
Z i =round(δ i-1 +y i ),
Figure FDA0003788307430000031
wherein, Z i Representing the compressed perceptual measurement y i Quantized integer value, δ representing the compressed perceptual measurement y i Error residual value of, initial residual value delta 0 Round (a) denotes the integer value returned to the nearest a.
4. The scrambled block compressed perception-based image encryptor of claim 1The method is characterized in that the integer value Z is mapped by using the Logistic-Tent chaotic mapping system i Performing aliasing operation to obtain an aliased sequence
Figure FDA0003788307430000032
And a secret key k 2 The method comprises the following steps:
utilizing the Logistic-Tent chaotic mapping system to carry out the control parameter r of the chaotic mapping 2 And chaos initial value z 2 As a key k 2 =(r 2 ,z 2 );
For the integer value Z i Iteration n 0 + MXN times, discarding the first N 0 Values to generate a sequence
Figure FDA0003788307430000033
The sequence b is ═ b (n) 0 +1),b(n 0 +2),…,b(n 0 +M×N)]Obtaining new sequences in ascending order
Figure FDA0003788307430000034
Searching
Figure FDA0003788307430000035
In the sequence of
Figure FDA0003788307430000036
Form an index sequence by the corresponding index values
Figure FDA0003788307430000037
For the index sequence
Figure FDA0003788307430000038
Is transformed by:
Figure FDA0003788307430000039
wherein z is i =vec(Z i ) Is represented by Z i Is denoted as z i
To pair
Figure FDA00037883074300000310
Obtaining the confusion sequence after recombination
Figure FDA00037883074300000311
5. The image encryption method based on scrambling block compressed sensing of claim 1, wherein the obfuscating sequence is subjected to the Logistic-Tent chaotic mapping system
Figure FDA00037883074300000312
Performing diffusion operation to obtain a pseudo-random sequence V and a secret key k 3 The method comprises the following steps:
utilizing the control parameter r of the Logistic-Tent chaotic mapping system 3 And chaos initial value z 3 As a key k 3 =(r 3 ,z 3 );
For the obfuscated sequence
Figure FDA0003788307430000041
Iteration n 1 + MXN times, discarding the first N 1 Values to form the pseudorandom sequence V ═ V (n) 1 +1),V(n 1 +2),…,V(n 1 +M×N)]。
6. The image encryption method based on compressed sensing of scrambled blocks according to claim 1, wherein said transforming said pseudorandom sequence V into a key stream sequence K (i), and obtaining a key stream sequence K (i) according to said key stream sequence K (i) and said obfuscated sequence
Figure FDA0003788307430000042
Determining the ciphertext C i The method comprises the following steps:
converting the pseudo-random sequence V into a keystream sequence K (i) having a value of [0, 255] using the following equation:
K(i)=mod(floor(V(i)×2 14 ),256);
applying the following formula to the obfuscated sequence
Figure FDA0003788307430000043
Performing logical XOR to obtain the ciphertext C i
Figure FDA0003788307430000044
Wherein, C i For the ciphertext, C 0 Is a seed, C 0 ∈[0,255];C i-1 Representing a previous encrypted integer value;
Figure FDA0003788307430000045
representing a current integer value of the obfuscated sequence; k i Representing a keystream element.
7. An image decryption method based on scrambled block compressed sensing, which is applied to an image receiving device and used for decrypting and reconstructing an original image processed based on the image encryption method based on scrambled block compressed sensing of any one of claims 1 to 6, and the image decryption method comprises:
receiving the ciphertext C transmitted by the image transmitting apparatus i And obtaining the secret key k shared by the image transmission device 1 The key k 2 And said key k 3
Using said key k 3 For the ciphertext C i Performing inverse transformation of the diffusion operation to obtain the pseudorandom sequence V, and performing the keystream transformation on the pseudorandom sequence V to obtain the keystream sequenceK(i);
Processing the keystream sequence K (i) by obtaining the obfuscated sequence by
Figure FDA0003788307430000046
Figure FDA0003788307430000047
Wherein, the
Figure FDA0003788307430000048
K i 、C i 、C i-1 Representing the decrypted value, the keystream element value, the current encrypted value, and the previous encrypted value, respectively;
according to said secret key k 2 And the confusion sequence
Figure FDA0003788307430000049
Reducing the integer value Z by combining the confusion operation process of the Logistic-Tent chaotic mapping system i
For the integer value Z i Obtaining a compressed sensing measurement value y after inverse quantization i Then, the GRSR algorithm is utilized to pass the secret key k 1 Creating a measurement matrix versus compressed perceptual measurement y i Reconstructing to obtain the sparse coefficient matrix;
and reconstructing the sparse coefficient matrix into the original image by utilizing inverse wavelet transform.
8. An image transmission system based on compressed sensing of scrambling blocks is characterized by comprising an image transmission device and an image receiving device,
the image transmission device is used for executing the image encryption method based on the scrambled block compressed sensing of any one of claims 1 to 6:
the image receiving device is configured to execute the image decryption method based on the compressed sensing of scrambled blocks according to claim 7.
CN202110005734.9A 2021-01-05 2021-01-05 Image transmission system based on scrambling block compressed sensing, encryption method and decryption method Active CN112711766B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110005734.9A CN112711766B (en) 2021-01-05 2021-01-05 Image transmission system based on scrambling block compressed sensing, encryption method and decryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110005734.9A CN112711766B (en) 2021-01-05 2021-01-05 Image transmission system based on scrambling block compressed sensing, encryption method and decryption method

Publications (2)

Publication Number Publication Date
CN112711766A CN112711766A (en) 2021-04-27
CN112711766B true CN112711766B (en) 2022-09-16

Family

ID=75548195

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110005734.9A Active CN112711766B (en) 2021-01-05 2021-01-05 Image transmission system based on scrambling block compressed sensing, encryption method and decryption method

Country Status (1)

Country Link
CN (1) CN112711766B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113301046A (en) * 2021-05-25 2021-08-24 北京邮电大学 Compressed sensing data secure transmission method based on DRPE
CN113297607B (en) * 2021-06-25 2022-07-19 燕山大学 Image compression encryption and decryption method based on compressed sensing and DNA coding
CN113824681B (en) * 2021-08-11 2022-09-09 西安电子科技大学 Image data encryption transmission system based on compressed sensing
CN113824903B (en) * 2021-08-11 2022-12-02 西安电子科技大学 Image data transmission system based on compressed sensing technology
CN113746617B (en) * 2021-08-18 2023-07-18 暨南大学 Image transmission and reconstruction method and device based on chaotic compression encryption
CN113904764B (en) * 2021-09-18 2023-06-16 大连大学 Image encryption method based on multi-scale compressed sensing and Markov model
CN113873094B (en) * 2021-09-24 2023-05-23 电子科技大学 Chaotic compressed sensing image encryption method
CN113965660B (en) * 2021-10-19 2023-04-28 广东电网有限责任公司 Image encryption method, device and system
CN113973161B (en) * 2021-10-29 2023-11-21 重庆邮电大学 Image encryption method of compressed sensing and chaotic system based on deep learning
CN115205952B (en) * 2022-09-16 2022-11-25 深圳市企鹅网络科技有限公司 Online learning image acquisition method and system based on deep learning

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2018102042A4 (en) * 2018-12-10 2019-01-17 Li, Lili MISS A color image encryption based on optical chaos and secure sharing in cloud
CN110784619A (en) * 2019-10-24 2020-02-11 广西师范大学 Novel parallel image encryption method based on chaos
CN111050020A (en) * 2019-11-12 2020-04-21 河南大学 Color image compression encryption method based on compressed sensing and double random encryption mechanisms
CN111476250A (en) * 2020-03-24 2020-07-31 重庆第二师范学院 Image feature extraction and target identification method, system, storage medium and terminal
CN112134681A (en) * 2020-08-19 2020-12-25 河南大学 Image compression encryption method and cloud-assisted decryption method based on compressed sensing and optical transformation

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105243635B (en) * 2015-08-21 2018-05-01 南昌大学 Image encryption method with chaos system is perceived based on two dimensional compaction
CN111327900B (en) * 2020-01-21 2022-03-01 河南大学 Color image encryption method based on compressed sensing and deformation coupling mapping grid

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2018102042A4 (en) * 2018-12-10 2019-01-17 Li, Lili MISS A color image encryption based on optical chaos and secure sharing in cloud
CN110784619A (en) * 2019-10-24 2020-02-11 广西师范大学 Novel parallel image encryption method based on chaos
CN111050020A (en) * 2019-11-12 2020-04-21 河南大学 Color image compression encryption method based on compressed sensing and double random encryption mechanisms
CN111476250A (en) * 2020-03-24 2020-07-31 重庆第二师范学院 Image feature extraction and target identification method, system, storage medium and terminal
CN112134681A (en) * 2020-08-19 2020-12-25 河南大学 Image compression encryption method and cloud-assisted decryption method based on compressed sensing and optical transformation

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
A Compressive Sensing Based Image Encryption and Compression Algorithm With Identity Authentication and Blind Signcryption;XINYAN LI等;《网页在线公开:https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9265294》;20201120;第1-15页 *
Joint Quantization and Diffusion for Compressed Sensing Measurements of Natural Images;Leo Yu Zhang等;《网页在线公开:https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7169254》;20150730;第1-4页 *
基于压缩感知与实时动态置乱的图像加密算法;杨岿;《计算机工程与设计》;20181205;第39卷(第9期);第2879-2886页 *
基于压缩感知和混沌的图像鲁棒性加密研究;王兰;《中国优秀硕士学位论文全文数据库 信息科技辑》;20180615;第3-4章 *

Also Published As

Publication number Publication date
CN112711766A (en) 2021-04-27

Similar Documents

Publication Publication Date Title
CN112711766B (en) Image transmission system based on scrambling block compressed sensing, encryption method and decryption method
Zhou et al. Novel hybrid image compression–encryption algorithm based on compressive sensing
Liu et al. Robust and hierarchical watermarking of encrypted images based on compressive sensing
Huang et al. A parallel image encryption method based on compressive sensing
CN112637441B (en) Color image compression encryption method based on compressed sensing
Xiang et al. Joint SPIHT compression and selective encryption
CN112134681B (en) Image compression encryption method and cloud-assisted decryption method
Zhang et al. A novel 1D hybrid chaotic map-based image compression and encryption using compressed sensing and Fibonacci-Lucas transform
Noura et al. Design of a fast and robust chaos-based crypto-system for image encryption
Vijayaraghavan et al. Security for an image using bit-slice rotation method-image encryption
Zhang et al. Color Image Encryption Algorithm Combining Compressive Sensing with Arnold Transform.
Ponnaian et al. Crypt analysis of an image compression–encryption algorithm and a modified scheme using compressive sensing
Yang et al. A visually meaningful image encryption algorithm based on adaptive 2D compressive sensing and chaotic system
Zhang et al. Privacy-preserving compressed sensing for image simultaneous compression-encryption applications
Hsieh et al. A secure compressive sensing-based data gathering system via cloud assistance
Patel et al. Block based visually secure image encryption algorithm using 2D-Compressive Sensing and nonlinearity
Athira et al. A novel encryption method based on compressive sensing
Xiao et al. A joint image encryption and watermarking algorithm based on compressive sensing and chaotic map
Patel et al. A systematic survey on image encryption using compressive sensing
Naik et al. Selective image encryption using singular value decomposition and arnold transform.
Li et al. A verifiable secret image sharing scheme based on compressive sensing
Laiphrakpam et al. Image compression–encryption scheme using SPIHT and chaotic systems
Zhang et al. Privacy-preserving image compressed sensing by embedding a controllable noise-injected transformation for IoT devices
Sasidharan et al. Selective image encryption using DCT with stream cipher
Mehmood et al. A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant