An Efficient Meaningful Double-Image Encryption Algorithm Based On Parallel Compressive Sensing and FRFT Embedding
An Efficient Meaningful Double-Image Encryption Algorithm Based On Parallel Compressive Sensing and FRFT Embedding
An Efficient Meaningful Double-Image Encryption Algorithm Based On Parallel Compressive Sensing and FRFT Embedding
https://doi.org/10.1007/s11042-023-14601-z
Donghua Jiang 1 & Lidong Liu 1,2 & Liya Zhu 3 & Xingyuan Wang 4 & Yingpin Chen 5 &
Xianwei Rong 6
Abstract
The transmission of images via the Internet has grown exponentially in the past few
decades. However, the Internet considered as an insecure method of information trans-
mission may cause serious privacy issues. To overcome such potential security issues, a
novel visually meaningful double-image encryption (VMDIE) algorithm conjugating
quantum cellular neural network (QCNN), compressive sensing (CS) and fractional
Fourier transform (FRFT) is proposed in this paper. First, the wavelet coefficients of
two plain images are scrambled by the Fisher-Yates confusion algorithm, and compressed
by key-controlled partial Hadamard matrix. The final meaningful cipher image is gener-
ated by embedding the encrypted images into a same-scale host image via the FRFT-based
embedding approach. Besides, the eigenvalues of plain images are utilized to generate
secret key streams to improve the ability of proposed VMDIE algorithm to withstand
various plaintext attacks. Afterward, the plaintext eigenvalues are hidden into the alpha
channel of meaningful cipher image under control of keys to relieve unnecessary storage
space and transmission cost. Ultimately, simulation results and security analyses indicate
that the proposed VMDIE algorithm is effective and can withstand multiple attacks.
1 Introduction
With the advent of big data era, a large number of digital images are manufactured and
transmitted on the Internet every moment, which will also be accompanied with various
* Lidong Liu
[email protected]
Donghua Jiang
[email protected]
security issues [9, 46]. Therefore, how to efficiently and securely transmit digital images
without being intercepted and tampered is of great significance. As an effective protection
method, image encryption (IE) technology can encrypt the natural image into a noise-like
image, from which any useful information cannot be visually attained by eavesdroppers, thus
playing a role in protecting image information. Additionally, compressive sensing (CS)
technology, proposed by Candes and Donoho in 2006 [3, 7], is a technology that can
simultaneously under-sample, compress and encrypt the sparse signals. Hence, it is not an
unattractive option to design an efficient image cryptosystem by combining IE technology and
CS technology.
The CS technology can be seen as a variant of symmetric encryption, in which the sparse
signal, measurement matrix and sensor matrix respectively correspond to the plaintext, secret
key and ciphertext in cryptosystem from the perspective of cryptography. Moreover, Rachlin
et al. [30] pointed out that the CS-based cryptosystem has sufficient computational security to
withstand the only-ciphertext attacks and brute force attacks. However, since the sensor matrix
is obtained by performing linear projection on the sparse signal, it is vulnerable to the known-
and chosen-plaintext attacks [11, 43]. Thus, to attain a higher security level, researchers have
proposed varied image protection algorithms by combining compressive sensing with other
encryption techniques, such as chaos theory [4, 15, 28], coding technology [33, 37], cellular
automata [21, 24], neural network [34, 38] and so on.
For example, a parallel image compression-encryption algorithm is presented by Huang
[17]. In his scheme, the plain image is first divided into several sub-images and then linearly
measured by 1-D CS. Afterward, a series of operations, such as permutation, substitution and
block-wise XOR, are performed on the quantized measurement value matrixes to generate the
final cipher image. However, the large-scale Gaussian random matrix used as the secret keys in
Huang’s scheme requires additional storage space and transmission cost. Subsequently, to
eliminate this issue, key-controlled partial Hadamard matrix [48, 50], partial random block
weighing matrix [45], structurally random matrix [31] and chaos-based measurement matrix
[11, 47, 49] are introduced to compress the plain image. Besides, in the encryption phase, the
counter mode [13, 14], hash function [11, 29] and plaintext eigenvalue [10] are applied to
withstand the plaintext analysis-based security attack models, since different plain images
correspond to different key streams. Nevertheless, the above-mentioned CS-based image
encryption algorithm can prevent image data from leakage, but it cannot provide protection
in appearance.
Therefore in [1], Bao et al. proposed a feasible framework for simultaneous encryption and
steganography, that is encryption-embedding framework. In Bao’s scheme, the plain image is
first encrypted by an existing encryption algorithm to obtain a noise-like or texture-like cipher
image. After that, the meaningless cipher image is decomposed and embedded into a publicly
accessible host image by lifting wavelet transform (IWT). In the absence of compression stage,
the resolution of meaningful cipher image is four times that of the plain image, which increases
the unnecessary cost in storage and transmission. Later, many improved visually meaningful
image encryption algorithms [5, 6, 18, 40, 41] have been proposed one after another. Such as
[50], where the plain image is first encrypted and compressed through the coefficient random
scrambling strategy and compressive sensing with block-wise manner. Then the robust
singular value decomposition embedding approach is employed to embed the meaningless
cipher image into a host image with the same resolution of the plain image. Besides, the
counter mode is utilized to update the encryption keys to against the chosen-plaintext attacks.
Multimedia Tools and Applications
In this paper, we put forward a visually meaningful double-image encryption scheme based
on parallel compressive sensing and FRFT embedding. It mainly consists of two stages: pre-
encryption process and embedding process. To prevent image information from leakage, in the
first stage, the Fisher-Yates confusion and compressive sensing are utilized to encrypt and
compress the two plain images in discrete wavelet domain to attain the meaningless cipher
images. Afterward, in the second stage, the meaningless cipher images are embedded into a
host image via the FRFT embedding approach, so that their appearance is protected. Besides,
the 4-D quantum cellular neural network and improved 2-D Henon map, whose initial values
are generated from the plaintext eigenvalues, are applied to construct secret key streams and
key-controlled measurement matrix in encryption stage.
The innovations and contributions of this paper are summarized as follows.
(1) An efficient and visually meaningful encryption algorithm for double images based on
quantum cellular neural network, parallel compressive sensing and FRFT embedding is
designed to improve transmission efficiency.
(2) A key-controlled double embedding approach, that is FRFT-based embedding approach,
is proposed to improve the security of embedding phase.
(3) A novel “One cipher image corresponds to one key” mechanism is proposed to withstand
the plaintext analysis-based security attack models.
(4) Simulation analysis and comparison results indicate that the proposed encryption scheme
has high efficiency and can withstand multiple attacks.
The rest of this paper is arranged as follows. The background related to the proposed image
algorithm is described in Section 2. The third section and fourth section respectively introduce
the specific steps of proposed VMDIE algorithm and corresponding decryption algorithm in
detail. Moreover, simulation results and performance analysis are given in Section 5. After
that, our encryption algorithm is compared with the existing related algorithms, and the results
are listed in the sixth section. Then, a brief summary and future work are shown in the final
section.
2 Background
In this subsection, two chaotic systems are introduced which are 4-D hyperchaotic quantum
cellular neural network and improved 2-D Henon map. Among them, the quantum cellular
neural network is used to construct the secret key streams with high unpredictability in
encryption. Additionally, to save storage space and reduce transmission costs, a key-
controlled measurement matrix is generated according to the improved Henon chaotic map.
Quantum cellular neural network (QCNN) is constructed by several quantum cellular automata
(QCA) [19]. And it has complex dynamic characteristics due to quantum interaction between
the quantum dots. For the two-cell QCNN, its state equation is defined as
Multimedia Tools and Applications
8 pffiffiffiffiffiffiffiffiffiffi
>
> ẋ1 ¼ −2w1 1−x21 sinx2
>
> x1
>
> pffiffiffiffiffiffiffiffiffiffi
<ẋ2 ¼ −w2 ðx1 −x3 Þ þ 2w1 1−x2 cosx2
>
qffiffiffiffiffiffiffiffiffiffi 1
ð1Þ
>
> ẋ3 ¼ −2w3 1−x3 sinx4
2
>
>
>
> x3
>
: 4 ¼ −w4 ðx3 −x1 Þ þ 2w3 pffiffiffiffiffiffiffiffiffi2ffi cosx4
ẋ
1−x3
where x1 and x3 are polarizations. x2 and x4 are the quantum phase. Moreover, w1 and w3 are
the proportional coefficients of inter-dot energy in each cell. w2 and w4 are the weighted impact
coefficients of the difference in the polarizations of adjacent cells. Additionally, when
w1 = w3 = 0.28, w2 = 0.7 and w4 ∈ (0.1, 1], Eq. (1) enters the hyper-chaotic state, and its corre-
sponding hyperchaotic trajectories are plotted in Fig. 1.
Since the classical 2-D Henon map [12] has a small key space and its chaotic trajectories are
simple, an improved Henon map (IHM) is proposed in [44]. Its system equation is as follows.
unþ1 ¼ 1−au2n sinvn
ð2Þ
vnþ1 ¼ sinbvn þ un
where a and b are system control parameters. Furthermore, un + 1 and vn + 1 are the generated
pseudo-random numbers, belonging to [−1, 1]. Figure 2 displays the bifurcation diagram of
variable u under the condition that a is set to 2.1 and the initial value is [0.53, 0.89]T. As Fig. 2
shows, when b ∈ (−∞, −0.74] ∪ [0.74, +∞), the improved Henon map is in a chaotic state.
Compressive sensing [3, 7] refers to using a measurement matrix unrelated to sparse transform
basis to linearly project the high-dimensional natural signals into a low-dimensional space.
And then, reconstructing the original signals with high probability from these few projections.
Suppose that the natural signal y = {y1, y2, y3, …, yN} can be expressed linearly by a group of
orthonormal basis, as displayed in Eq. (3).
N
y ¼ ΨS ¼ ∑ S i Ψ i ð3Þ
i¼1
In Eq. (3), Ψ = [Ψ1, Ψ2, Ψ3, …, ΨN] is the basis matrix. And the column vector S sized of N × 1 is
the sparse representation coefficient of y in Ψ domain. Besides, if ‖S‖0 = k, y is said to be k-
sparse on the orthonormal basis Ψ. Then the process of linearly measuring the signal y with
sparsity through the measurement matrix Φ ∈ ℝM × N can be expressed as
z ¼ Φy ¼ ΦΨS ¼ ΘS ð4Þ
where z = {z1, z2, z3, …, zM} is the observed vector, and Θ = ΦΨ is called as the sensing matrix.
Since Eq. (4) is an underdetermined equation system, other regular constraints need to be
added to restore the natural signal y. Related studies [2] indicate that if the signal y is sparse
enough on the orthogonal basis Ψ, and when the matrices Φ and Ψ are irrelevant, the sparse
coefficient vector S can be recovered from the vector z with high probability by solving the
convex optimization problem, shown in Eq. (5). Finally, the inverse transform of sparse
representation is performed on the vector S to restore the natural signal y.
b
S ¼ argmin kS k0 ; s:t: z ¼ ΘS ð5Þ
In Eq. (5), ‖S‖0 refers to the l0-norm of vector S, which is equal to the number of non-zero
elements in the vector.
Fractional Fourier transform (FRFT) is a generalized form of Fourier transform [8, 35]. It is
obtained by rotating the natural signal counterclockwise at any angle on the time axis.
Therefore, the FRFT of a signal contains both its time- and frequency-domain features. The
p1, p2-order FRFT of a 2-D signal f(x, y) is defined as Eq. (6).
þ∞ þ∞
F p1;p2 ðu; vÞ ¼ ∫−∞ ∫−∞ f ðx; yÞk p1;p2 ðx; y; u; vÞdxdy ð6Þ
Multimedia Tools and Applications
pffiffiffiffiffiffiffiffiffiffiffipffiffiffiffiffiffiffiffiffiffiffi
1−icotα 1−icotβ iðx2 þu2 Þ
In Eq. (6), the kernel function k p1;p2 ðx; y; u; vÞ ¼ 2π exp 2tanα − sinαixu
iðy2 þv2 Þ
exp 2tanβ − sinβiyv
, where α
and β represent the rotation angles on the x and y axes, respectively.
Fisher-Yates algorithm [23], also known as Knuth random scrambling algorithm, is utilized to
scramble the sparse coefficients of plain image to reduce the strong correlation between
adjacent elements. Its scrambling process is illustrated in Fig. 3. In operation, the chaotic
sequence generated by the 4-D QCNN is employed to replace each randomly generated
number, effectively controlling the elements exchanged each time. Meanwhile, the initial
conditions of 4-D QCNN are calculated by extracting partial pixels of plain image with the
secret keys. Therefore, different plain images correspond to different scrambling sequences.
Logistic map is utilized to extract partial pixels of plain images P1 and P2 to generate the
initial values of 4-D QCCN, assuming that their resolutions are both m × n. Its definition is
displayed in Eq. (7). When the system parameter μ is between 3.57 and 4, this non-linear map
exhibits chaotic characteristics.
rn ¼ μ rn−1 ð1−rn−1 Þ; n ¼ 2; 3; … ð7Þ
The detailed approach for generating the initial values of QCNN is displayed as follows.
1 2 3 4 5 6 7 1 2 7 4 5 6 3
Randomly select a number among the Randomly select a number among the
former four elements to exchange with 5 former five elements to exchange with 6
6 2 5 4 7 1 3 6 2 7 4 5 1 3
...
5 4 6 2 7 1 3
Fig. 3 The scrambling process of Fisher-Yates algorithm
Multimedia Tools and Applications
First, the Logistic map is iterated (mn + T0) times with the initial value r0, and the first T0
elements are discarded to obtain a chaotic sequence r = {r1, r2, r3, …, rmn}. Then the sequence r
is sorted in ascending order to generate a new sequence Tr.
Step 1: Calculate the sum of [P1Tr(1), P1Tr(2), …, P1Tr(mn/2)] and [P2Tr(mn/2 + 1), P2Tr(mn/2 +
2), …, P2Tr(mn)] and its average value av1 is determined. The mathematical descrip-
tion of this step is shown as follows.
mn=2
su ¼ ∑ P1ðTri Þ þ P2 Trmn=2þi ð8Þ
i¼1
su
av1 ¼ ð9Þ
mn
Step 1: Step 3. Finally, the initial values of 4-D QCNN are calculated by performing Eq.
(11), where the symbol “mod” means modular operation, ⌊x⌋ represents an integer
not greater than x, and ki (i = 1, 2) are the internal key parameters.
8
>
> ẋ1 ¼ fv þ k 1 mod 1
>
<
ẋ2 ¼ fv þ ẋ1 mod 2 þ 2
ð11Þ
> ẋ3 ¼ fv 103 þ k 2 mod 1
>
>
:
ẋ4 ¼ fv 103 þ ẋ3 mod 2 þ 2
Storing the entire measurement matrix directly requires a lot of memory space, and sufficient
bandwidth needs to be used to transmit it to the decoder. Thus, in this paper, the measurement
matrix is determined by the chaotic sequence that is generated by the improved 2-D Henon
map. In the meantime, to improve the anti-attack ability of proposed algorithm, partial content
of two plain images will be used to generate the initial values of IHM.
The process of generating the initial values of improved 2-D Henon map is as follows.
1 mn=2
av2 ¼ ∑ P1 Trmn=2þi þ P2ðTri Þ ð12Þ
m n i¼1
Then the parameter gv is obtained by performing Eq. (13) on the average value av2, where
len(x) represents the number of integer parts of x. For example, len(153.72902) = 3.
j k
gv ¼ av2 10−lenðav2 Þ 255 255−1 ð13Þ
Multimedia Tools and Applications
Step 2: Finally, the initial values of IHM are computed according to the following Eq. (14),
where k3 and k4 are the internal key parameters. Additionally, sign(·) means sign
function.
u0 ¼ logk 3 gv mod 1 signðgv−k 3 Þ
ð14Þ
v0 ¼ u0 þ k 4 mod 1
The flow chart of proposed VMDIE algorithm is displayed in Fig. 4. As Fig. 4 shows, it
mainly consists of two stages. In the first stage, the secret information carried by two plain
images is encrypted and compacted by the Fisher-Yates confusion and the key-controlled
partial Hadamard matrix, respectively. Then, in the second stage, on the one hand, the
encrypted data is randomly embedded into the host image through the 2-D fractional Fourier
transform embedding, and this process is controlled by the index sequence generated from the
key-controlled partial
Parallel measurement
Hadama matrix Stage 1: Pre-encryption
Index confusion
Host image HI 2D DCT Encrypted image EI1 Encrypted image EI2 Secret keys α, β
Parameters fv, gv
Alpha channel
Cipher image CI Real Part RP2 Imaginary part IP2 Inverse 2D DCT
Stage 2: Embedding
4-D QCNN. In addition, some important parameters are also hidden in the alpha channel of
final visually meaningful cipher image.
Step 1: To further improve the sparsity of coefficient matrices P3 and P4, the elements
whose absolute values are less than or equal to the threshold values Ts1 and Ts2 are
forced to be set to zero. And the matrices after threshold processing are denoted as
P5 and P6 respectively.
Step 2: After sparse processing, most of the energy of two plain images P1 and P2 is mainly
concentrated in the upper left corner of the matrices P5 and P6, which is not
conducive to parallel compression. Thus, the Fisher-Yates confusion is
utilized to evenly distribute the energy to the entire matrix. The 4-D QCNN is iterated (mn +
h i
T0) times with the initial value ẋ1 ; ẋ2 ; ẋ3 ; ẋ4 T. Then four chaotic sequences with size of
1 × mn are obtained by abandoning the former T0 values, as shown in Eq. (16).
8
>
> X ¼ fx1 ; x2 ; x3 ; …; xmn g
<
Y ¼ fy1 ; y2 ; y3 ; …; ymn g
ð16Þ
> Z ¼ fz1 ; z2 ; z3 ; …; zmn g
>
:
W ¼ fw1 ; w2 ; w3 ; …; wmn g
Step 3: Then, the random sequences X and Y are processed according to the following
equation.
Tx ¼ X 1010 mod ½mn : −1 : 1 þ 1
ð17Þ
Ty ¼ Y 1010 mod ½mn : −1 : 1 þ 1
Step 4: As described in Section 2.4, the Fisher-Yates algorithm is used to scramble the
matrices P5 and P6, which is controlled by the sequences Tx and Ty. After
confusion, the resulting matrices are named P7 and P8 respectively.
Step 5: Next, the measurement matrix Φ ∈ ℝcn × m is constructed using the hardware-friendly
Hadamard matrix, where cn = CR × n. CR is the preset compression rate. The 2-D
Multimedia Tools and Applications
IHM is iterated (mn + T0) times under the condition that the system parameter and the
initial value are set to [2.1, 6.74] and [u0, v0]T, respectively. Then, the chaotic
sequence U ¼ fuT 0 þ1 ; uT 0 þ2 ; uT 0 þ3 ; …; uT 0 þmn g is determined.
Step 6: Construct a Hadamard matrix H sized of m × m. It is calculated by the Kronecker
product of two low-order matrices, and its recursion equation is shown in Eq. (18).
Additionally, considering the constraints of the Hadamard matrix, we assume that m
can be divisible by four.
H 2n−1 H 2n−1
H ¼ H 2 ⊗H 2n−1 ¼ ð18Þ
H 2n−1 −H 2n−1
pffiffi
þ1 þ1
where H 2 ¼ 2
.
2 þ1 −1
Step 7: Sort the sequence U in the ascending order to generate the index sequence Tu. Then,
the key-controlled partial Hadamard matrix Φ is obtained by the following equation.
2 3
H ðTu1 ; 1 : endÞ
6 H ðTu2 ; 1 : endÞ 7
6 H ðTu3 ; 1 : endÞ 7
Φ¼6 7 ð19Þ
4 ⋮ 5
H ðTucn ; 1 : endÞ
Step 8: The matrices P7 and P8 are compressive in parallel by the key-controlled measure-
ment matrix Φ to generate the encrypted matrices P9 and P10. This process can be
described by Eq. (20).
Step 1: Select host image HI ∈ ℕm × n and perform the 2-D discrete cosine transform on it,
which is formulated in Eq. (21).
Step 2: The sub-matrix H2 is determined by Eq. (22). And then, apply the 2-D fractional
Fourier transform on it with the rotation angle [α, β] to get the complex matrix
H3 = RP1 + IP1ζ. ζ is the imaginary unit.
2 m n m 3
H1 þ 1; þ 1 ⋯ H1 þ 1; n
6 2 2 2 7
H2 ¼ 6
4 ⋮ ⋱ ⋮ 7
5 ð22Þ
n
H1 m; þ 1 ⋯ H1ðm; nÞ
2
By sorting the chaotic sequences [Z1, Z2, Z3, …, Zcn × n] and [W1, W2, W3, …, Wcn × n] in ascend-
ing order, the index sequences Tz, and Tw are acquired. Then the index confusion is carried out
on the P9 and P10 according to Eq. (23), where i = 1, 2, …, cn × n.
P11ðiÞ ¼ P9ðTzðiÞÞ
ð23Þ
P12ðiÞ ¼ P10ðTwðiÞÞ
Step 3: Step 4. The matrices P11 and P12 are embedded into the real and imaginary parts of
the complex matrix H3, respectively, after adjusting their amplitudes by the gain
factor γ. These operations are formulated by Eq. (24).
RP2 ¼ RP1 þ ð1−γ Þ P11
ð24Þ
IP2 ¼ IP1 þ ð1−γ Þ P12
Step 4: Then, perform the inverse 2-D fractional Fourier transform on the complex matrix
H4 = RP2 + IP2ζ and replace the lower right corner of matrix H1 to obtain a new
complex matrix H5.
Step 5: Next, the complex matrix H6 = RP3 + IP3ζ is generated by applying the inverse 2-D
discrete cosine transform on the matrix H5.
To facilitate storage, the matrix IP3 is processed by the following equation. Then the Alp is
used as the alpha channel together with the matrix RP3 to generate the final visually
meaningful cipher image CI ∈ ℕm × n.
Alp ¼ 247 þ IP3 ð25Þ
Step 6: In the proposed scheme, there are different parameters (fv and gv) for different plain
images. Thus, considering the basic principles of symmetric encryption, we embed
them into the alpha channel of final cipher image. See Eq. (26) for the specific
operation. At this point, the entire encryption operations are complete.
Alp h1 1010 mod ½m; n þ 1 ¼ fv 255
ð26Þ
Alp h2 1010 mod ½m; n þ 1 ¼ gv 255
Multimedia Tools and Applications
The inverse process of VMDIE algorithm is the decryption algorithm, which also includes two
processes, namely the extraction and decryption process. To successfully recover the plain
images, some of internal secret keys need to be transmitted to the decoder through a secure
channel, including ki (i = 1, 2, 3, 4), α, β, γ and hi (i = 1, 2). Meanwhile, the internal secret keys
fv and gv are extracted from the alpha channel of visually meaningful cipher image. Besides,
the host image is indispensable for extracting the encrypted data from the cipher image. Thus,
it is recommended to randomly select the host image from the public image databases to avoid
increasing extra transmission costs. Then, the detailed decryption process is shown below.
Step 1: the parameters fv and gv are extracted from the alpha channel of cipher image
according to Eq. (27). Then, to avoid affecting the quality of the decrypted images,
the values of these two parameters in the Alp are set to 247 after extraction.
fv ¼ Alp h1 1010 mod ½m; n þ 1 255−1
ð27Þ
gv ¼ Alp h2 1010 mod ½m; n þ 1 255−1
Step 2: By performing Eq. (11) and Eq. (14), the initial values of 4-D QCNN and the 2-D
IHM are obtained. And then, iterate them to generate the key streams X, Y, Z, W and
U.
Step 3: The modified matrix Alp is processed by the following equation to extract the IP3.
The complex matrix H5 is determined by carrying out the 2-D discrete cosine transform on the
H6 = RP3 + IP3ζ.
Step 4: After performing the 2-D fractional Fourier transform on the H4, The matrices P11
and P12 are obtained according to the Eq. (29).
P11 ¼ ðRP2−RP1Þ ð1−γ Þ−1
ð29Þ
P12 ¼ ðIP2−IP1Þ ð1−γ Þ−1
Step 5: After inverse scrambling of matrices P11 and P12 with the index sequences Tz and
Tw respectively, the encrypted matrices P9 and P10 are generated.
Multimedia Tools and Applications
Step 2: Inverse Fisher-Yates confusion (IFYC) is applied to the matrices P7 and P8 with the
Tx and Ty generated by sorting the sequences X and Y, returning the matrices P5 and
P6, respectively.
Step 3: By performing inverse sparse transform, displayed in Eq. (31), on the P5 and P6,
then the plain images P1 and P2 with resolution of m × n are reconstructed.
P1 ¼ Ψ T P5 Ψ
ð31Þ
P2 ¼ Ψ T P6 Ψ
The simulation experiments are all carried out on the laptop computer equipped with 1.8GHz
i7-8550U CPU and 16G RAM. The operating system is Microsoft Windows 10, and the
simulation platform is selected as Matlab 2018b. Three groups of plain images and host images
with different resolutions are used for the test images. Among them, most of test images are
randomly selected from (https://openi.nlm.nih.gov/), (https://ccia.ugr.es/cvg/dbimagenes/) and
(https://sipi.usc.edu/database/). Meanwhile, the internal secret keys are set as follows: k1 = 0.
9723, k2 = 0.7875, k3 = 0.3746, k4 = 0.2481, h1 = 0.2849, h2 = 0.7128, α = 1.41, β = 0.6 and γ =
0.998. Additionally, the remaining encryption parameters are Ts1 = 35, Ts2 = 25, CR = 0.25,
r0 = 0.4751, μ = 3.99. And in the encryption phase, the chaotic systems first iterate 500 times to
eliminate the transient effect.
(a) Plain image Lena (b) Plain image Woman (c) Host image Lake (d) Cipher image
(e) Decrypted image Lena (f) Decrypted image Woman (g) Histogram of (c) (h) Histogram of (d)
Fig. 5 Simulation results with Lena and Woman as plain images (resolution 512 × 512)
similarity (MSSIM) will be employed, which are defined in Eq. (32) and Eq. (33) [16]
respectively. Then, the PSNR and MSSIM values of simulation results are elaborated in
Table 1. As illustrated in Table 1, regardless of the resolution, the values of PSNRcip are
greater than 34 dB, and MSSIMcip are approximately equal to 1. Therefore, these numerical
results indicate that the encrypted data carried by the cipher images is highly invisible.
Moreover, the PSNRdec are basically greater than 30 dB. And as the resolution of plain image
increases, the reconstructed quality of decrypted image also increases. To a certain extent, the
reconstruction quality is satisfactory. In short, the proposed meaningful encryption scheme can
provide double protection of image data and appearance, as well as has great potential for
application in other fields such as medicine and transportation.
2552
PSNR ¼ 10 log
1 m n 2 ðdBÞ ð32Þ
∑ ∑ I 1i; j −I i;2 j
m n i¼1 j¼1
(a) Plain image Kidney (b) Plain image Brain (c) Host image Lung (d) Cipher image
(e) Decrypted image Kidney (f) Decrypted image Brain (g) Histogram of (c) (h) Histogram of (d)
Fig. 6 Simulation results with Kidney and Brain as plain images (resolution 512 × 512)
Multimedia Tools and Applications
(a) Plain image Plane (b) Plain image Boat (c) Host image Sailboat (d) Cipher image
(e) Decrypted image Plane (f) Decrypted image Boat (g) Histogram of (c) (h) Histogram of (d)
Fig. 7 Simulation results with Plane and Boat as plain images (resolution 512 × 512 × 3)
1 L 2μi μi þ C 1 2σi σi þ C 2 σi þ C 3
MSSIM ¼ ∑ 2 I 1 I 2 2 2 I 1 I 2 2 Ii1 I 2 i ð33Þ
L i¼1 μi þ μiI 2 þ C 1 σiI 1 þ σiI 2 þ C 2 σI 1 σI 2
I1
where C1 = (0.01 × 255)2, C2 = (0.03 × 255)2 and C3 = C2 × 0.5. Besides, μiI1 and σiI1 respectively
represent the mean value and variance of the i-th non-overlapping block in the image I1.
Considering that the amplitude of encrypted data is regulated by the gain factor γ in the
embedding process. Therefore, the influence of gain factor on the simulation results is given in
this section, which is plotted in Fig. 8. Among them, the red curves represent the PSNR
between final meaningful cipher images and host images. Moreover, the blue curves represent
the PSNR between plain images and decrypted images. It can be seen from the figure that as
the value of the gain factor increases, the red curve gradually rises. While for the blue curve, it
rises in the first stage and then falls. Additionally, in the case of weighing the quality of the
decrypted image and the visual security of the cipher image, the optimal gain factor is different
for different plain images.
Resolution Plain image Host image PSNRdec (dB) PSNRcip (dB) MSSIMcip
*Where the symbols PSNRcip and MSSIMcip mean the PSNR and MSSIM values between host image and final
cipher image, respectively. Additionally, the symbol PSNRdec is the PSNR value between plain image and
decrypted image
Multimedia Tools and Applications
Fig. 9 PSNR vs embedding position for different images with different resolutions
Multimedia Tools and Applications
The key space and key sensitivity together determine the ability of algorithm to resist violent attacks.
In this paper, the secret keys mainly consist of the following three parts. i.e., (a) the (k1, k2, k3, k4)
used for generating the initial values of two chaotic systems. (b) the (h1, h2) used for calculating the
location of internal parameters in the alpha channel and (c) the rotation angle (α, β). Suppose that the
step length of ki (i = 1, 2, 3, 4) and hi (i = 1, 2) are 10−14 and 10−10 respectively, while the step length
of rotation angle is 10−2. Thus, the total key space can be calculated by Eq. (34).
4 2 2
keytotal ¼ 1014 1010 2π 102 ¼ 4π2 1080 ð34Þ
Furthermore, the key space for other algorithms is listed in Table 2. It can be seen that
compared with [6, 32, 41, 50], the proposed VMDIE algorithm has a larger key space.
To qualitatively analyze the key sensitivity, the images “Lena” and “Woman” are subjected
to the proposed algorithm. Then, the modified secret keys by adding a slight change to one of
the correct keys are used to decryption. Moreover, the decrypt-ed images are illustrated in
Fig. 10. It can be clearly seen that when one of the correct keys is slightly changed, the
decrypted image does not visually reveal any useful information of plain image, indicating that
the proposed encryption scheme is sensitive to the keys. To sum up, our scheme is sufficiently
resistant to violent attacks.
The pixel distribution of an image can be reflected by the histogram. Since the strong
correlation between adjacent pixels in natural image, its histogram always presents an uneven
shape. However, for an effective meaningful image encryption algorithm, the histogram of final
visually secure cipher image should be as consistent as possible with that of the corres-ponding
host image. Next, the distance of histogram intersection [32] is introduced to measure the slight
differences among host images and cipher images, which can be calculated by Eq. (35).
−1
2B 2B
H ð J; VÞ ¼ ∑ minð Ji ; Vi Þ ∑ Vi ð35Þ
i¼1 i¼1
where (J, V) is a pair of histogram and B represents the bit depth of image. As shown in Eq. (35),
when the histograms J and V are equal, the H(J, V) reaches its maximum value, that is one. In
the experiment, the plain images with different resolutions are encrypted and embedded into
different host images. Then, the obtained results are listed in Table 3. It is observed that the
distance of histogram intersection between the host images and the cipher images is close to 1,
indicating that the proposed VMDIE algorithm has good visual security. Similarly, it can also
be seen that the host images have little impact on the value of H(J, V).
Considering that the meaningful cipher image transmitted over the channel will be inevitably
affected by various noises, resulting in loss of partial ciphertext data, which increases the
difficulty of recovering the plain image. We will perform several experiments to evaluate the
anti-noise performance of proposed VMDIE algorithm in this sub-section under the condition
that the parameters fv and gv hidden in the alpha channel are not destroyed. First, the plain
images “Lena” and “Woman” with resolution of 512 × 512 are encrypted and embedded into
the host image “Lake” via FRFT embedding approach. Then, multiple types of noise with
normalized intensity of 0.0001%, 0.0005%, 0.001% and 0.005% are added to the meaningful
cipher image respectively, including salt & pepper noise (SPN), speckled noise (SN) and
Gaussian noise (GN). The resultant decrypted images are plotted in Figs. 11, 12 and 13.
Besides, the values of PSNR between decrypted image and plain image under different noise
attacks are listed in Table 4.
As illustrated in Figs. 11, 12 and 13 and Table 4, when the attack intensity varies from
0.0001% to 0.005%, the quality of decrypted image drops significantly, and the maximum
drop reach 4.787 dB, but we can still visually identify the secret information carried by the
decrypted image. In another aspect, it can be seen from the experimental data that in the case of
the same noise attack intensity, GN has the greatest impact on our proposed scheme, while
Table 3 The difference between the histograms of host images and cipher images
(a) 0.0001% SPN (b) 0.0005% SPN (c) 0.001% SPN (d) 0.005% SPN
Decrypted image 1
(e) 0.0001% SPN (f) 0.0005% SPN (g) 0.001% SPN (h) 0.005% SPN
Decrypted image 2
(i) 0.0001% SPN (j) 0.0005% SPN (k) 0.001% SPN (l) 0.005% SPN
Fig. 11 Simulation results under SPN with different intensities
Cipher image
SPN and SN have the least impact. In general, the proposed VMDIE scheme has a good ability
to resist noise interference.
The ability of proposed VMDIE algorithm to resist cropping attacks is also evaluated in this
sub-section. Similarly, it is assumed that the parameters fv and gv in the meaningful cipher
image are not corrupted. Then, different positions of the cipher images are cut with sizes of
128 × 128, 180 × 180 and 256 × 256, which are drawn in the first row of Fig. 14. And the
corresponding decrypted images are depicted in the second and third row of Fig. 14.
Fig. 14 Decrypted results of the cipher image (512 × 512) suffering from different cropping attacks
It can be seen from the figure that the position of cropping blocks has basically no impact
on the visual quality of the decrypted image in our scheme. Besides, as the size of cropping
block increases, the reconstructed quality of decrypted image decreases. However, when a
quarter of cipher image data is lost, we can still find the information carried by the plain image
in decrypted image visually. And the PSNR of decrypted images are about 26.7 dB and
26.8 dB respectively, indicating that our VMDIE scheme can withstand the cropping attacks to
a certain extent, provided that the eigenvalues are not lost.
Up to now, many image encryption algorithms have been cracked by plaintext analysis-based
security attack models, such as [20, 25, 42]. The main reason is that different plain images
correspond to the stationary secret key streams in encryption stage. However, in this paper, the
pixel eigenvalue of two plain images is utilized to control the generated key stream. First, the
initial values of 4-D QCNN are determined by the eigenvalue fv. Then, it is iterated and sorted
to fabricate two sets of index sequences. One set of sequences is applied to control the Fisher-
Yates confusion performed on the image. And the remaining set of sequences is used to
randomly embed the encrypted data into the host image. In other aspects, the eigenvalue gv is
adopted to control the 2-D IHM to generate the key-controlled partial Hadamard matrix, which
is used to compress two plain images in parallel. In short, since the proposed VMDIE
algorithm can realize “one plain image corresponds to one key”, it can withstand known-
plaintext and chosen-plaintext attacks.
Additionally, in order not to violate the basic principles of symmetric cryptosystems, we
propose to embed the eigenvalues into the final meaningful cipher image and synchronously
transmit it to the decoders. Moreover, the scheme of hiding eigenvalues has two
Multimedia Tools and Applications
characteristics. First, the location of eigenvalues is controlled by secret keys. Secondly, the
eigenvalues are embedded in the alpha channel of visual cipher image to reduce the probability
of being attacked.
Except for considering the security of algorithm, running efficiency is also an indispensable
indicator to evaluate the performance of algorithm in practical application scenarios. In the first
place, the time complexity for proposed meaningful image encryption algorithm mainly
includes the time cost of following three phases, that is, the important parameter generation
phase, pre-encryption phase and embedding phase. Generally speaking, the complexity of
pretreatment for double images can be ignored. Added up, the time complexity for proposed
encryption scheme is Θ 52 þ CR n2 þ n . What’s more, the execution times required for
encryption and decryption of images with different resolutions are listed in Tables 5 and 6. In
these two tables, “Pretreatment” represents the phase that generates the initial values of two
chaotic systems. And “Reconstruction” stands for the process of recovering two natural images
from encrypted data through the SL0 reconstruction algorithm and the inverse Fisher-Yates
scrambling.
As can be seen, embedding and reconstructing the encrypted data account for a large
proportion of total encryption and decryption time. Such as for the plain image with size of
512 × 512, the FRFT embedding phase takes up about 89.465% of total time in encryption.
Moreover, the reconstruction phase occupies around 89.966% of total decryption time. In
another aspect, when the resolution of plain image changes from 256 × 256 to 512 × 512, the
time spent in the encryption and decryption process increases about 10 times and 6 times,
respectively. Thus, it is suggested to divide the large-scale plain image into several small sub-
images, and then perform encryption and embedding operations in parallel to shorten the
execution time.
To highlight the proposed VMDIE algorithm, we first summarize the characteristics of existing
visually meaningful image encryption algorithm, and compare them with ours. The
Table 5 Encryption time for plain images with different resolutions (Unit: s)
Table 6 Decryption time for plain images with different resolutions (Unit: s)
comparison results are displayed in Table 7. Besides, part of them is contrasted with our
proposed encryption algorithm from the following three aspects: visual security, anti-noise
performance and running efficiency. Moreover, the corresponding numerical results are
elaborated in Tables 8, 9 and 10. Note that for the sake of fairness, the experimental data of
[5, 32, 50] are obtained from their source articles or the related articles, and N/A means that the
value of corresponding indicator is not provided. It can be seen from the comparison results
1 The plain image with resolution of m ×n is Before the embedding phase, the compressive
pre-encrypted and embedded into a host image sensing is adopted to compress the plain image to
with resolution of 2m×2n to obtain a meaningful a quarter of its original resolution. Thus, the
cipher image, thus increasing the cost of storage meaningful cipher image has the same resolution
and transmission, such as [1, 41]. as the plain image in our scheme.
2 Only one plain image can be encrypted at a time, Two plain images can be simultaneously encrypted
such as [22, 27, 36, 39]. The encryption efficiency and embedded into the host image with the same
and transmission efficiency are limited. resolution as the plain image via the FRFT
embedding method in this paper. The transmission
efficiency has been improved, and there is no need
to provide additional transmission costs.
3 There are both quantization error and truncation error In our scheme, to reduce the influence of errors, the
in [22, 27, 36]. Because of the accumulation of encryp-ted data is directly embedded into a host
errors, the visual quality of the decrypted image is image under the control of gain factor, without
reduced. quantization operation.
4 The existing embedding methods, such as LSB [6], In the proposed FRFT-based embedding method, the
SVD [41, 50], IWT [1, 18], RCT [22], DCT [26] rota-tion angles of the fractional Fourier transform
and so on, cannot protect the hidden ciphertext. can be used as the keys to improve the security of
the hidden ciphertext.
5 Part of the existing visually meaningful image The characteristic information of the two plain
encryption algorithms are vulnerable to the images is utilized to generate the key stream in
chosen-plaintext and known-plaintext attacks, encryption, so that different plain images
since in their schemes, different plain images cor- correspond to different key streams. Additionally,
respond to the same key stream. in order not to violate the basic principles of the
symmetric encryption cryptosystem, the
eigenvalues are embedded in the alpha channel of
the meaningful cipher image under the control of
the key.
Multimedia Tools and Applications
Table 8 Comparisons of the PSNR and MSSIM between the cipher and host images in different encryption
schemes
Lena Peppers 18.5136 0.6726 32.3513 0.9257 31.7986 0.9903 36.0020 0.9963
Brain Cameraman 24.8700 0.6488 34.8967 0.9381 31.1582 0.9725 35.3293 0.9985
Jet Baboon 23.3967 0.6991 37.8967 0.9833 32.6033 0.9955 34.2920 0.9984
Barbara Bridge 25.2321 0.7337 35.5629 0.9783 31.7397 0.9946 34.1259 0.9982
Average 23.0031 0.6886 35.1769 0.9564 31.8250 0.9882 34.9373 0.9979
*To compare with the single-image visually meaningful encryption algorithm, in this experiment, two identical
plain images are placed in the proposed VMDIE algorithm
*In the above experiment, the plain image and host image are selected as “Jet” and “Goldhill”, respectively
that our designed VMDIE algorithm has better anti-noise performance and higher running
efficiency, compared with that in [5, 32]. As for the visual security, the proposed scheme in
this paper is comparable to the [32], but both are significantly better than that of [5].
7 Conclusion
This paper introduces an efficient VMDIE algorithm combined with QCNN, CS and FRFT-
based embedding approach, which can simultaneously realize the image data security and
appearance security. Besides, for withstanding the plaintext attacks, the eigenvalues of plain
images are adopted to generate the cipher flows. And then, these eigenvalues are embedded
into the alpha channel of meaningful cipher image to reduce the probability of being destroyed.
Table 10 Comparisons results of encryption and decryption times in different encryption schemes (Unit: f/s)
Moreover, compared with other existing related schemes, its transmission efficiency has been
improved twice. Eventually, a series of security analysis indicate that the proposed VMDIE
algorithm not only has high visual security and decryption quality, but also can resist the
diversified attacks, such as violent attack, noise attack, chosen-plaintext attack and so on. In
the following work, we will devote ourselves to further improving the sparsity of plain images
to attain the higher image compression rate.
Acknowledgments This work is supported by the National Natural Science Foundation of China [Grant
No.61701043, 41874140], the Shaanxi Province Science and Technology Program [Grant No.2020JM-220,
2020JQ-351], the Fundamental Research Funds for the Central Universities of China [Grant No.300102240205],
the Natural Science Foundation of Fujian Province [Grant No.2020 J05169] and the Natural Science Foundation
of Heilongjiang Province [Grant No.F2018022].
Data availability The image datasets generated and analyzed during the current study are available from the
corresponding author upon the reasonable request.
Declarations
Conflict of interest The authors report no conflicts of interest. The authors alone are responsible for the content
and writing of this paper.
References
1. Bao L, Zhou Y (2015) Image encryption: generating visually meaningful encrypted images. Inf Sci 324:
197–207
2. Baraniuk R (2007) Compressive sensing. IEEE Signal Process Mag 24:118–121
3. Candes E, Romberg J, Tao T (2006) Robust uncertainty principles: exact signal reconstruction from highly
incomplete frequency information. IEEE Trans Inf Theory 52:489–509
4. Cao W, Mao Y, Zhou Y (2020) Designing a 2D infinite collapse map for image encryption. Signal Process
171:107457
5. Chai X, Gan Z, Chen Y, Zhang Y (2017) A visually secure image encryption scheme based on compressive
sensing. Signal Process 134:35–51
6. Chai X, Wu H, Gan Z, Zhang Y, Chen Y, Nixon K (2020) An efficient visually meaningful image
compression and encryption scheme based on compressive sensing and dynamic LSB embedding. Opt
Laser Eng 124:105837
7. Donoho D (2006) Compressed sensing. IEEE Trans Inf Theory 52:1289–1306
8. Elhoseny H, Faragallah O, Ahmed H, Kazemian H, El-sayed H, El-Samie F (2016) The effect of fractional
Fourier transform angle in encryption quality for digital images. Optik 127:315–319
9. Fan H, Zhou K, Zhang E, Wen W, Li M (2020) Subdata image encryption scheme based on compressive
sensing and vector quantization. Neural Comput Applic 32:12771–12787
10. Gan Z, Chai X, Zhang J, Zhang Y, Chen Y (2020) An effective image compression-encryption scheme
based on compressive sensing (CS) and game of life (GOL). Neural Comput Applic 32:14113–14141
11. Gong L, Qiu K, Deng C, Zhou N (2019) An image compression and encryption algorithm based on chaotic
system and compressive sensing. Opt Laser Technol 115:257–267
12. Henon M (1976) A two-dimensional mapping with a strange attractor. Commun Math Phys 50(1):69–77
13. Hu G, Xiao D, Wang Y, Xiang T (2017) An image coding scheme using parallel compressive sensing for
simultaneous compression-encryption applications. J Vis Commun Image Represent 44:116–127
14. Hu G, Xiao D, Wang Y, Xiang T, Zhou Q (2017) Securing image information using double random phase
encoding and parallel compressive sensing with updated sampling processes. Opt Laser Eng 98:123–133
15. Hua Z, Zhou Y (2021) Exponential chaotic model for generating robust chaos. IEEE Trans Syst Man
Cybern -Syst 51(6):3713–3724
16. Hua ZY, Zhang KY, Li YM, Zhou YC (2021) Visually secure image encryption using adaptive-
thresholding sparsification and parallel compressive sensing. Signal Process 183:107998
Multimedia Tools and Applications
17. Huang R, Rhee K, Uchida S (2014) A parallel image encryption method based on compressive sensing.
Multimed Tools Appl 72:71–93
18. Khan J, Boulila W, Ahmad J, Rubaiee S, Rehman A, Alroobaea R, Buchanan W (2020) DNA and plaintext
dependent chaotic visual selective image encryption. IEEE Access 8:159732–159744
19. Li J, Di X, Liu X, Chen X (2017) Image encryption based on quantum-CNN hyperchaos system and
anamorphic fractional Fourier transform. In 10th International Congress on Image and Signal Processing. J
Biomed Eng Inform:1–6
20. Li M, Wang P, Yue Y, Liu Y (2021) Cryptanalysis of a secure image encryption scheme based on a novel
2D sine-cosine cross-chaotic map. J Real-Time Image Proc 18:2135–2149
21. Mondal B, Singh S, Kumar P (2019) A secure image encryption scheme based on cellular automata and
chaotic skew tent map. J Inf Secur Appl 45:117–130
22. Musanna F, Dangwal D, Kumar S (2020) A novel chaos-based approach in conjunction with MR-SVD and
pairing function for generating visually meaningful cipher images. Multimed Tools Appl 79:25115–25142
23. Musanna F, Kumar S (2019) A novel fractional order chaos-based image encryption using fisher yates
algorithm and 3-D cat map. Multimed Tools Appl 78:14867–14895
24. Naskar P, Bhattacharyya S, Nandy D, Chaudhuri A (2020) A robust image encryption scheme using chaotic
tent map and cellular automata. Nonlinear Dyn. 100:2877–2898
25. Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal
Process 138:129–137
26. Pan C, Ye G, Huang X, Zhou J (2019) Novel meaningful image encryption based on block compressive
sensing. Secur Commun Netw:6572105
27. Ping P, Fu J, Mao Y, Xu F, Gao J (2019) Meaningful encryption: generating visually meaningful encrypted
images by compressive sensing and reversible color transformation. IEEE Access 7:170168–170184
28. Ping P, Xu F, Mao Y, Wang Z (2018) Designing permutation-substitution image encryption networks with
Henon map. Neuro-computing. 283:53–63
29. Ponuma R, Amutha R (2017) Compressive sensing based image compression-encryption using novel 1D-
chaotic map. Multimed Tools Appl 77:19209–19234
30. Rachlin, Y., Baron, D. The secrecy of compressed sensing measurements. in: Proceedings of the Allerton
Conference on Communi-cation, Control and Computing, 813–817 (2008).
31. Souyah A, Faraoun K (2016) Fast and efficient randomized encryption scheme for digital images based on
quadtree decomposition and reversible memory cellular automata. Nonlinear Dyn 84(2):715–732
32. Wang H, Xiao D, Li M, Xiang Y, Li X (2019) A visually secure image encryption scheme based on parallel
compressive sensing. Signal Process 155:218–232
33. Wang X, Guan N (2020) A novel chaotic image encryption algorithm based on extended zigzag confusion
and RNA operation. Opt Laser Technol 131:106366
34. Wang X, Li Z (2019) A color image encryption algorithm based on Hopfield chaotic neural network. Opt
Laser Eng 115:107–118
35. Wang X, Su Y (2020) Color image encryption based on chaotic compressed sensing and two-dimensional
fractional Fourier transform. Sci Rep 10:18556
36. Wen W, Hong Y, Fang Y, Li M, Li M (2020) A visually secure image encryption scheme based on semi-
tensor product compressed sensing. Signal Process 173:107580
37. Wen W, Wei K, Zhang Y, Fang Y, Li M (2020) Colour light field image encryption based on DNA
sequences and chaotic systems. Nonlinear Dyn. 99:1587–1600
38. Yang F, Mou J, Cao Y, Chu R (2020) An image encryption algorithm based on BP neural network and
hyperchaotic system. China Commun 17(5):21–28
39. Yang Y, Zou L, Zhou Y, Shi W (2020) Visually meaningful encryption for color images by using qi
hyperchaotic system and singular value decomposition in YCbCr color space. Optik 213:164422
40. Ye G, Pan C, Dong Y, Jiao K, Huang X (2021) A novel multi-image visually meaningful encryption
algorithm based on compressive sensing and Schur decomposition. Trans Emerg Telecommun Technol
32(2):e4071
41. Ye G, Pan C, Dong Y, Shi Y, Huang X (2020) Image encryption and hiding algorithm based on
compressive sensing and random numbers insertion. Signal Process 172:107563
42. Ye G, Pan C, Huang X, Zhao Z, He J (2018) A chaotic image encryption algorithm based on information
entropy. Int J Bifurcation Chaos 28(1):1850010
43. Zhang L, Wong K, Zhang Y, Zhou J (2016) Bi-level protected compressive sampling. IEEE T Multimedia
18(9):1720–1732
44. Zhao H, Xie S, Zhang J, Wu T (2020) Fast image encryption algorithm based on improved Henon map.
Application Research of Computers 37(12):3726–3730
45. Zhao H, Ye H, Wang R (2016) The construction of measurement matrices based on block weighing matrix
in compressed sensing. Signal Process 123:64–74
Multimedia Tools and Applications
46. Zhou K, Xu M, Luo J, Fan H, Li M (2019) Cryptanalyzing an image encryption based on a modified Henon
map using hybrid chaotic shift transform. Digit Signal Process 93:115–127
47. Zhou N, Pan S, Cheng S, Zhou Z (2016) Image compression-encryption scheme based on hyper-chaotic
system and 2D compressive sensing. Opt Laser Technol 82:121–133
48. Zhou N, Zhang A, Wu J, Pei D, Yang Y (2014) Novel hybrid image compression-encryption algorithm
based on compressive sensing. Optik 125:5075–5080
49. Zhu L, Song H, Zhang X, Yan M, Zhang L, Yan T (2019) A novel image encryption scheme based on
nonuniform sampling in block compressive sensing. IEEE Access 7:22161–22174
50. Zhu L, Song H, Zhang X, Yan M, Zhang T, Wang X, Xu J (2020) A robust meaningful image encryption
scheme based on block compressive sensing and SVD embedding. Signal Process 175:107629
Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps
and institutional affiliations.
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a
publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted
manuscript version of this article is solely governed by the terms of such publishing agreement and
applicable law.
Affiliations
Donghua Jiang 1 & Lidong Liu 1,2 & Liya Zhu 3 & Xingyuan Wang 4 & Yingpin Chen 5 &
Xianwei Rong 6
1
School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou 510006, China
2
School of Information Engineering, Chang’an University, Xi’an, China
3
School of Electrical and Control Engineering, Chang’an University, Xi’an 710064, China
4
School of Information Science and Technology, Dalian Maritime University, Da’lian 116026, China
5
School of Physics and Information Engineering, Minnan Normal University, Zhang’zhou 363000, China
6
Physics and Electronic Engineering School, Harbin Normal University, Harbin 150025, China