An Image Encryption Algorithm Based on Compressive Sensing and M Sequence
An Image Encryption Algorithm Based on Compressive Sensing and M Sequence
ABSTRACT In this article, a new image encryption algorithm based on compressive sensing (CS) and
M sequence is proposed to decrease the image communication load and improve the security of image
communication in the internet of things. Most of the available image encryption schemes are based on
chaotic systems to shuffle the image pixels. Before shuffling the image pixels, the random sequence, which
is produced by a chaotic system, need to be sorted. This sorting operation is avoided by utilizing a modified
linear feedback shift register (LFSR) state sequence. Then, the security of the proposed scheme is improved
by combining CS with an improved 1D chaotic system, which is used to construct a measurement matrix.
The computational complexity is reduced by the use of the improved 1D chaotic system. Simultaneously,
the amount of image data is reduced. Simulation results and performance analyses demonstrate that the
proposed encryption scheme can greatly reduce the amount of image data and has good security and
robustness.
INDEX TERMS M sequence, compressive sensing, image encryption, improved 1D chaotic map.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
220646 VOLUME 8, 2020
Y. Dou, M. Li: Image Encryption Algorithm Based on Compressive Sensing and M Sequence
proposed in [25]. To further enhance the performance, process can be avoided by the use of the modified LFSR
the double random phase encoding (DRPE) optical encryp- state sequence. Meanwhile, the better permutation effect is
tion technique is utilized. An efficient image compression- attained. Then, CS is utilized to reduce the data amount of
encryption scheme based on Chen’s hyper-chaotic system and the plain image through the measurement matrix, which is
2D compressive sensing is proposed in [26], in which the produced by the improved 1D chaotic system. Furthermore,
hyper-chaotic system is used to generate two measurement the security of the proposed encryption scheme is improved
matrices. A novel encrypted compressive sensing of images by regarding the control parameters of the improved 1D
based on fractional order hyper chaotic Chen system and chaotic system as secret keys. For the meantime, the com-
DNA operation is proposed in [27] in which 4-Dimensioanal putational complexity is reduced by the use of the improved
Fractional order hyper chaotic chen system is used to generate 1D chaotic system.
the measurement matrix. A game-of-life-based scrambling Furthermore, the SHA-512 hash function value of the
method (PDGSM) in [28] is introduced to shuffle the sparse plain image is used to produce the control parameters of the
coefficient matrix of the plain image, in which the respective improved 1D map and linear feedback shift register (LFSR)
permutation matrix is constructed by the rules of game of life. to increase the correlation of the proposed encryption scheme
In this encryption scheme, chaotic sequences are generated and the plain image.
from a 5D memristive hyper chaotic system. This article is organized as follows. In Section II a brief
However, in most of the above algorithms combining com- introduction about compressive sensing is firstly given. Then,
pressive sensing and chaotic maps the measurement matrices M sequence and the improved chaotic map are elaborated.
are generated by adopting multi-dimensional chaotic maps. The proposed image encryption scheme is explained in
Owing to the complex structure and multiple parameters of Section III. In Section IV, the experimental results and the
the multi-dimensional chaotic maps, the difficulty of imple- performance of the proposed scheme are discussed. Finally,
mentation and the computation complexity increase. On the the conclusion is drawn in Section V.
contrary, 1D chaotic maps in [35]–[40] have the advantages
that their structures are simple and they are easy to imple- II. PRELIMINARIES
ment. In this article, an improved 1D chaotic map in [41] A. M SEQUENCE
is used to construct the measurement matrix for compressed The logic expression is of n-order LFSR as the following
sensing.
Linear feedback shift register (LFSR) have been widely an = C1 an−1 ⊕ C2 an−2 ⊕ C3 an−3 ⊕ · · · ⊕ a0 (1)
used in modern communication systems, coding theory and where ⊕ represents module-2 sum. The flow is shown in
cryptography. The mathematical theory of M sequences Fig.1. Each register state will change as the clock triggers.
is firstly described in [42]. A pseudo random n-order M
sequence is the longest linear feedback of a shift regis-
ter sequence of 2n −1 length in which consecutive n-length
strings exactly experience all binary n-length strings in [43].
To improve the linear complexity of LFSR sequences, nonlin-
ear feedback shift register sequences (NLFSR) are presented
such as [44], [45]. However, NLFSR sequences don’t experi-
ence all binary n-length strings only once.
M-sequences have attracted much attention due to
their good randomness properties [46]–[49]. Based on the FIGURE 1. n-order LFSR flow.
knowledge of finite fields, many research results about
M-sequences have been obtained in [47], [48]. As for Move an from the left to the right of Equation 1 and the
constructing M-sequences, some combinatorial algorithms following equation is obtained
are presented in [52]–[54]. Recently, the new construction n
method by the semi-prefer-XOR rule is proposed in [55]. 0=
X
Ci an−i . (2)
In general, M sequence can be used in MIMO radar sys-
i=0
tems in [56], magneto-acoustic imaging in [57] and stream
cipher in [58]. Define a polynomial of F (x) corresponding to Equation (3)
According to the above analyses, a novel image com- as below
n
pression and encryption algorithm is introduced based on X
compressed sensing, M sequence and the improved 1D sys- F (x) = Ci x i (3)
tem. M sequence is one of stream cipher, which is usually i=0
used to change image pixel value by XOR operation. In this which is called characteristic polynomial. If the characteristic
article, the LFSR state sequence is modified into an appropri- polynomial is a primitive one, the pseudo random sequence
ate sequence which experiences all binary n-length numbers generated by the LFSR will have a 2n − 1 length period and
only once. When the plain image is shuffled, the sorting it will be called M sequence.
The polynomial F (x) of degree n is a primitive polyno- weighting coefficients are zeros or close to zero, s can be
mial if expressed as Equation 6
1. F (x) is irreducible.
s = 9T ξ (6)
2. F (x) is exactly divisible by x m + 1 where m = 2n − 1.
3. F (x) can’t be divisible by x q + 1 where q < m where 9 is the orthogonal basis matrix and ξ is the weighting
The coefficients of F (x) can be treated as a secret coefficient vector in RN . The measurement result y can be
key. The LFSR state sequence can be noted as S = obtained by a measurement matrix 8 with size M × N as the
(an−1 an−2 an−3 · · · a0 ) where the period length of S is 2n − 1. following formula
S can also be treated as a secret key. Convert S into a decimal
y = 8ξ = 89ξ = 2ξ (7)
number of DS by Equation (4).
where N < M and 2 = 89. 2 is called sensor matrix.
DS = an−1 × 2n−1 + an−2 × 2n−2 + an−3 × 2n−3 If the measurement matrix 8 satisfies the Restricted Isom-
+ · · · + a0 (4) etry Property (RIP), the signal s can be recovered by solving
the non-convex problem as the following
DS will experience all the integers from 1 to 2n −1 and each (
value will be experienced only once. The number of n-order min kξ k0
(8)
primitive polynomial is λ = 1n ϕ (2n − 1), where ϕ (·) is s. t. y = 8 = 89ξ = 2ξ
Euler’s totient function.
For example, F (x) = x 4 + x + 1 is a 4-order primitive . This problem can be solved by the algorithms such as
polynomial. We can get the corresponding linear feedback Matching Pursuit (MP) in [20], Orthogonal Matching Pursuit
expression as Equation (5) (OMP) in [21] and SL0 algorithm in [22].
where parameter r ∈ (0 , 1] and xn is the output chaotic can be converted to 64 decimal numbers: h1 , h2 , · · · , h64 .
sequence. SSS is defined as the following equation The corresponding initial values are computed via
h1 ⊗ h2 ⊗ · · · ⊗ h5
xn+1 = r × sin (π × xn ) × 2k
x0 = + t1
256
− floor r × sin (π × xn ) × 2k h6 ⊗ h7 ⊗ · · · ⊗ h10
(13) (16)
u= × 10 + t2
256
k = h11 ⊗ h12 ⊗ · · · ⊗ h15 × 3 + 8 + t3
• Chebyshev-Chebyshev system (CCS)
The Chebyshev map is also one of 1D chaotic systems and 64
can be described by the following equation. t1 , t2 and t3 are the external keys.
xn+1 = FC (a, xn ) = cos (a × arccos xn ) (14) B. GENERATION OF THE INITIAL CONDITION OF LFSR
If LFSR is n-order, there should be the condition of 2n − 1 ≥
where parameter a ∈ N . CCS is defined as
M × N where M × N is the pixel number of the plain image.
xn+1 = cos (a × arccos xn ) × 2k The initial state can be acquired by selecting n bit binary
values from 512 bit hash values.
− floor cos (a × arccos xn ) × 2k (15)
The dynamical analysis in [39] has shown that the C. PROCESS OF ENCRYPTION ALGORITHM
improved 1D chaotic systems have excellent chaotic behav- As shown in Fig. 4, the steps for the encryption algorithm can
iors. For example, the bifurcation diagram and Lyapunov be descripted as follows.
exponent of LLS are shown in Fig.2 and Fig.3, which indicate Step 1: The SHA-512 hash function of the plain image is
that The chaotic range of LLS is (0, 10) and is much larger generated and the secret keys are obtained according to Part
than Logistic System. A and Part B of section III
Step 2: The sparse coefficients matrix α is obtained by
transform the plain image I into discrete wavelet transform
(DWT) domain of 9.
Step 3: Convert α into the 1D image pixel matrix P =
p1 , p2 , · · · , pM ×N with length M × N .
Step 4: The n-order LFSR state sequence DS is obtained
by selecting a primitive polynomial of F (x) according to the
initial value. The permutation position sequence T is obtained
by Algorithm 1.
FIGURE 2. The bifurcation diagram of (a)Logistic map; (b)LLS. Algorithm 1 Obtain the Permutation Sequence DS
1: Input: Initial condition
2: set k = 0
3: for i from 1 to 2n −1
4: S (i) = (an−1 an−2 an−3 · · · a0 ) ;
5: DS (i) = an−1 × 2n−1 + an−2 × 2n−2 + an−3
× 2n−3 + · · · + a0
6: if DS(i) <= M ∗ N
7: T(k) = DS(i);
8: k = k+1;
9: end
10: end
FIGURE 3. The Lyapunov exponent of (a)Logistic map; (b)LLS.
Step 7: Q is obtained by quantifying the elements of matrix Y Step 1: Produce the chaotic sequence X according to [36]
into the range from 0 to 255 with the sigmoid function in [60]. with the secret keys and obtain W according to X . Matrix Q
Step 8: The diffusion matrix W is obtained by the following is obtained by executing the inverse diffusion process.
equation Step 2: Y is obtained by executing the inverse quantization
according to the inverse sigmoid function.
W (i) = mod floor X (i) × 1014 , 256 . (19) Step 3: Construct the measurement matrix 8 and recon-
Step 9: Reshape matrix Q into a sequence of Q’ and obtain struct the matrix U from Y by SL0 algorithm.
the diffused sequence C by the following equations. Step 4: Obtain the LFSR state sequence DS and acquire the
( permutation sequence T according to Algorithm 1.
C (1) = mod (C (0) + Q’ (1) + W (1) , 256) Step 5: Obtain the sparse coefficient matrix α and
(20)
C (i) = mod (C (i − 1) + Q’ (i) + W (i) , 256) acquire the original plain image by inverse discrete wavelet
transform (IDWT).
Step 10 Reshape sequence C into matrix C’ with the same
size of Y and C’ is the final encrypted image.
IV. SIMULATIONS AND SECURITY ANALYSIS
D. PROCESS OF THE DECRYPTION ALGORITHM Simulation results and security analyses of the proposed
The decryption procedure is the reverse of encryption pro- encryption scheme are given out in this section. Eight gray-
cess. The flowchart of the decryption is shown in Fig.5. The scale images, including ‘Lena’, ‘Pepper’, ‘Baboon’, ‘Boat’,
detailed process is as follows. ‘man’, ‘Lake’, ‘Run’ and ‘Sat’, which are shown in Fig. 6,
FIGURE 7. Cipher images (a1)-(c1) of Lena when CR = 0.25, 0.5 and 0.75; FIGURE 8. Cipher images (a1)-(c1) of Pepper when CR = 0.25, 0.5 and
Decrypted images: (a2)-(c2) when CR = 0.25, 0.5 and 0.75; 0.75; Decrypted images: (a2)-(c2) when CR = 0.25, 0.5 and 0.75;
with size 256 × 256 are chosen to validate the proposed volume ratio between compressed image and plain image
scheme in the following experiments. Simulation exper- which is computed according to the following equation
iments have been carried out on an Intel(R) Core(TM)
i7-9700 processor with 3 GHz and 32 GB memory capac- hc × wc
CR = (21)
ity. The simulation software is MALTAB R2016b. The ini- hI × wI
tial parameters of the proposed encryption algorithm are
set as x0 = 0.5321, u1 = 5.4374, t0 = 0.4560, and where hI and wI denote the height and width of the original
k1 = 14. The initial state of LFSR is set a binary number image and hc and wc are that of the cipher image.
of ‘11111111111111111’. The primitive polynomial coeffi- According to Figs. 7-11, it is evident that the cipher
cients of F (x) is set ‘00100000000000001’. images are unrecognizable and the image data amount is
reduced according to CR. Compared to the original images,
A. ENCRYPTION RESULTS AND DECRYPTION RESULTS the decrypted images have preserved the main information of
FOR DIFFERENT IMAGES the original images and they become more similar when CR
Five plain gray images are utilized as the test images includ- is increasing.
ing ‘Lena’, ‘Pepper’, ‘Baboon’, ‘Run’ and ‘Sat’.
The encrypted and corresponding decrypted results are B. PSNR AND SSIM ANALYSIS
illustrated in Figs. 7-11 where compression ratio is changing The quality of the reconstructed image is evaluated by the
from 0.25 to 0.75. Compression ratio (CR) is the image Peak Signal to Noise Ratio (PSNR) which is calculated by
TABLE 2. Comparison of PSNR of reconstructed image LENA for different measuring matrix.
FIGURE 9. Cipher images (a1)-(c1) of Baboon when CR = 0.25, 0.5 FIGURE 11. Cipher images (a1)-(c1) of Baboon when CR = 0.25, 0.5 and
and 0.75; Decrypted images: (a2)-(c2) when CR = 0.25, 0.5 and 0.75; 0.75; Decrypted images: (a2)-(c2) when CR = 0.25, 0.5 and 0.75;
(2µX µX 0 + C1 )(2σXX 0 + C 2 )
SSIM = (23)
(µ2X + µ2X 0 + C1 )(σX2 + σX2 0 + C2 )
FIGURE 12. a1-d1: histograms of four plain images; a2-d2: histograms of corresponding cipher images.
of their corresponding encrypted images are uniform. Hence, corresponding cipher image with CR equal to 0.5. According
the proposed scheme is robust against statistical attacks. to Table 4 the correlation coefficients of plain image are
near 1 and those of the cipher images are almost equal to 0
D. PIXEL CORRELATION ANALYSIS which means the correlation between the adjacent pixels has
It is well-known that there are high correlations between the been greatly reduced.
adjacent pixels, and a secure encryption algorithm should
reduce the correlation to improve the ability of resistance
E. KEY SPACE ANALYSIS
to statistical attacks. The correlation coefficient is defined
according to the following equation The key space of an image encryption scheme, which can
resist brute-force attacks, should be more than 2100 in [59].
PM
(xi − E (x))(yi − E (y)) In this article the secret keys of the proposed encryption
Cor (x, y) = qP i=1 (24) algorithm mainly include: x0 ∈ (0 , 1], u1 ∈ (0 , 10], k1 ∈
M 2 PM
i=1 (xi −E (x)) i=1 (yi − E (y))2
[8, 20] , S and the coefficient of F (x). S is generally larger
than 216 . If the computational precision of the computer is
where E (x) = M1 M j=1 xj , E (y) = M
1 PM
P
j=1 yj . x and y are 10−14 , the key space is about 1014 × 1014 × 10 × 216 ×
gray values of the adjacent pixels in the images and M is the λ ≈ λ2112 .
total number randomly chosen from the test image. Hence, the key space of our method is large enough to resist
The correlation diagram among adjacent pixels at horizon- all kinds of brute-force attacks.
tal, vertical and diagonal directions of the plain image of
‘Lena’ and the corresponding cipher image with CR equal
to 0.5 are shown as in Fig.13. The size of cipher images are F. KEY SENSITIVITY ANALYSIS
128 × 256. A good encryption scheme should be very sensitive to
Table 4 shows the correlation coefficients of horizontally, secret keys. The sensitivity can be evaluated by Number
vertically and diagonally of the plain images of ‘Baboon’, of pixel change rate (NPCR) and unified average change
‘Boat’, ‘Lake’, ‘man’, ‘Peppers’, ‘Run’ and ‘Sat’ and the intensity (UACI) which are defined by the
FIGURE 13. Correlation analyses of image Lena. a. horizontal correlation of original and encrypted images; vertical
correlation of original and encrypted images; diagonal correlation of original and encrypted images.
G. INFORMATION ENTROPY ANALYSIS It is evident that our encryption algorithm has better perfor-
The information entropy formula is as the following mance than the schemes in. [24], [34], [35].
v
X
H (x) = p(xi ) log 2 (p(xi )) (27) H. ROBUSTNESS ANALYSIS
i=1
Cipher images are easily influenced by noise and data loss
where p(xi ) is the probability of a message of xi and v is the during image transmission. A good image encryption scheme
number of the messages of the information source. For an should be able to resist these attacks. The image of ‘milk-
image with 256 gray levels, v is equal to 256. Table 5 presents drop’ is used to test the ability of the proposed encryption
the information entropies of the plain images and cipher scheme. At first, the image is encrypted by the proposed
images (CR = 0.75). The last row gives out the average scheme and the encrypted image is shown as Fig.14 (a1)
values of the information entropies of the plain images and Then, Fig.14 (a1) is attacked by ‘salt&pepper’ noise whose
cipher images. The information entropies of the correspond- intensity is 0.0001 and the result is shown as Fig.14 (b1).
ing cipher images are all more than 7.99 as shown in Table 5. At last Fig.14 (a1) is cropped with data loss size of 64 × 64
FIGURE 14. Noise and data loss attack (a1) the encrypted image; (b1) the encrypted image added with noise; (c1) the
encrypted image with 64∗64 loss; (a2-c2) the decrypted image corresponding to (a1-c1).
the cropped encrypted image is shown as Fig.14 (c1). [5] G. Ye, C. Pan, X. Huang, Z. Zhao, and J. He, ‘‘A chaotic image encryption
The corresponding decrypted images are shown as algorithm based on information entropy,’’ Int. J. Bifurcation Chaos, vol. 28,
no. 1, Jan. 2018, Art. no. 1850010.
Fig.14 (a2, b2, c2). As can be seen, they contain the main [6] M. Machkour, A. Saaidi, and M. L. Benmaati , ‘‘A novel image encryption
information of the original image when noise and crop attacks algorithm based on the two-dimensional logistic map and the Latin square
occur. image cipher,’’ 3D Res., vol. 6, Oct. 2015, Art. no. 36.
[7] A. Souyah and K. M. Faraoun, ‘‘An image encryption scheme combining
chaos-memory cellular automata and weighted histogram,’’ Nonlinear
V. CONCLUSION Dyn., vol. 86, no. 1, pp. 639–653, Oct. 2016.
In this article the modified LFSR state sequence is utilized [8] A. Jain and N. Rajpal, ‘‘A robust image encryption algorithm resistant to
to shuffle the sparse coefficient matrix of the plain image and attacks using DNA and chaotic logistic maps,’’ Multimedia Tools Appl.,
vol. 75, no. 10, pp. 5455–5472, May 2016.
good permutation effect has been achieved. Then, the amount
[9] K. Zhan, D. Wei, J. Shi, and J. Yu, ‘‘Cross-utilizing hyperchaotic and
of image data is greatly reduced by the use of CS. For the DNA sequences for image encryption,’’ J. Electron. Imag., vol. 26, no. 1,
meantime, CS is combined with the improved 1D chaotic Feb. 2017, Art. no. 013021.
system, by which the security of the proposed encryption [10] X. Huang and G. Ye, ‘‘An image encryption algorithm based on hyper-
chaos and DNA sequence,’’ Multimedia Tools Appl., vol. 72, no. 1,
scheme is improved. The improved 1D chaotic is used to pp. 57–70, Sep. 2014.
construct the measurement matrix and the initial parameters [11] A. U. Rehman, X. Liao, A. Kulsoom, and S. A. Abbas, ‘‘Selective encryp-
are used as the secret keys. Simulation results demonstrate tion for gray images based on chaos and DNA complementary rules,’’
Multimedia Tools Appl., vol. 74, no. 13, pp. 4655–4677, Jul. 2015.
the proposed encryption scheme can reduce the amount of
[12] D. L. Donoho, ‘‘Compressed sensing,’’ IEEE Trans. Inf. Theory, vol. 52,
image data and improve the security of image communication no. 4, pp. 1289–1306, Apr. 2006.
simultaneously. Performance analyses demonstrate that the [13] R. Baraniuk, ‘‘Compressive sensing [lecture notes],’’ IEEE Signal Process
proposed encryption scheme has a large key space and high Mag, vol. 24, no. 4, pp. 118–121, Jul. 2007.
[14] E. J. Candes and T. Tao, ‘‘Near-optimal signal recovery from random
key sensitivity and good robustness to noise and data loss. projections: Universal encoding strategies?’’ IEEE Trans. Inf. Theory,
For the meantime, our scheme can resist statistical attack and vol. 52, no. 12, pp. 5406–5425, Dec. 2006.
differential attack. [15] M. Lotfi and M. Vidyasagar, ‘‘A fast noniterative algorithm for compres-
sive sensing using binary measurement matrices,’’ IEEE Trans. Signal
Process., vol. 66, no. 15, pp. 4079–4089, Aug. 2018.
REFERENCES
[16] M. Lotfi and M. Vidyasagar, ‘‘Compressed sensing using binary matrices
[1] Y. Zhang, D. Xiao, Y. Shu, and J. Li, ‘‘A novel image encryption scheme of nearly optimal dimensions,’’ IEEE Trans. Signal Process., vol. 88,
based on a linear hyperbolic chaotic system of partial differential equa- pp. 3008–3021, 2020.
tions,’’ Signal Process., Image Commun., vol. 28, no. 3, pp. 292–300, [17] E. J. Candès, ‘‘The restricted isometry property and its implications for
Mar. 2013. compressed sensing,’’ Comp. Rendus Mathematique, vol. 346, nos. 9–10,
[2] Y. Zhang and D. Xiao, ‘‘Double optical image encryption using discrete pp. 589–592, May 2008.
Chirikov standard map and chaos-based fractional random transform,’’ [18] S. Qaisar, R. M. Bilal, W. Iqbal, M. Naureen, and S. Lee, ‘‘Compressive
Opt. Lasers Eng., vol. 51, no. 4, pp. 472–480, Apr. 2013. sensing: From theory to applications, a survey,’’ J. Commun. Netw., vol. 15,
[3] G. Ye and K.-W. Wong, ‘‘An efficient chaotic image encryption algorithm no. 5, pp. 443–456, Oct. 2013.
based on a generalized Arnold map,’’ Nonlinear Dyn., vol. 69, no. 4, [19] E. J. Candes and T. Tao, ‘‘Decoding by linear programming,’’ IEEE Trans.
pp. 2079–2087, Sep. 2012. Inf. Theory, vol. 51, no. 12, pp. 4203–4215, Dec. 2005.
[4] O. Mirzaei, M. Yaghoobi, and H. Irani, ‘‘A new image encryption method: [20] S. G. Mallat and Z. Zhang, ‘‘Matching pursuits with time-frequency dic-
Parallel sub-image encryption with hyper chaos,’’ Nonlinear Dyn., vol. 67, tionaries,’’ IEEE Trans. Signal Process., vol. 41, no. 12, pp. 3397–3415,
no. 1, pp. 557–566, Jan. 2012. Dec. 1993.
[21] Y. C. Pati, R. Rezaiifar, and P. S. Krishnaprasad, ‘‘Orthogonal matching [45] A. Kholosha, ‘‘Clock-controlled shift registers and generalized Geffe key-
pursuit: Recursive function approximation with applications to wavelet stream generator,’’ in Proc. Int. Conf. Prog. Cryptol.-Indocrypt (DBLP),
decomposition,’’ in Proc. 27th Asilomar Conf. Signals, Syst. Comput., 2002, pp. 287–296.
Nov. 1993, pp. 40–44. [46] C. Li, X. Zeng, T. Helleseth, C. Li, and L. Hu, ‘‘The properties of a class of
[22] H. Mohimani, M. Babaie-Zadeh, and C. Jutten, ‘‘A fast approach for over linear FSRs and their applications to the construction of nonlinear FSRs,’’
complete sparse decomposition based on smoothed `0 norm,’’ IEEE Trans. IEEE Trans. Inf. Theory, vol. 60, no. 5, pp. 3052–3061, May 2014.
Signal Process., vol. 57, no. 1, pp. 289–301, Jan. 2009. [47] T. Helleseth, ‘‘Nonlinear shift registers—A survey and challenges,’’ in
[23] Q. Jiang, S. Li, Z. Zhu, H. Bai, X. He, and R. C. de Lamare, ‘‘Design Algebraic Curves and Finite Fields: Cryptography and Other Applications.
of compressed sensing system with probability-based prior information,’’ Berlin, Germany: De Gruyter, 2014, pp. 121–144.
IEEE Trans. Multimedia, vol. 22, no. 3, pp. 594–609, Mar. 2020. [48] C. Li, X. Zeng, C. Li, T. Helleseth, and M. Li, ‘‘Construction of de Bruijn
[24] J. Chen, Y. Zhang, L. Qi, C. Fu, and L. Xu, ‘‘Exploiting chaos-based sequences from LFSRs with reducible characteristic polynomials,’’ IEEE
compressed sensing and cryptographic algorithm for image encryption and Trans. Inf. Theory, vol. 62, no. 1, pp. 610–624, Jan. 2016.
compression,’’ Opt. Laser Technol., vol. 99, pp. 238–248, Feb. 2018. [49] X. Wang and L. Jiang, ‘‘Cycle structure and adjacency graphs of a class
[25] X. Liu, Y. Cao, P. Lu, X. Lu, and Y. Li, ‘‘Optical image encryption of LFSRs and a new family of de bruijn cycles,’’ IEEE Access, vol. 6,
technique based on compressed sensing and arnold transformation,’’ Optik, pp. 38770–38779, 2018.
vol. 124, no. 24, pp. 6590–6593, Dec. 2013. [50] S. W. Golomb, Shift Register Sequences. Sydney, NSW, Australia:
[26] N. Zhou, S. Pan, S. Cheng, and Z. Zhou, ‘‘Image compression–encryption Holden-Day, 1982.
scheme based on hyper-chaotic system and 2D compressive sensing,’’ Opt. [51] S. W. Golomb and G. Gong, Signal Design for Good Correlation: For
Laser Technol., vol. 82, pp. 121–133, Aug. 2016. Wireless Communication, Cryptography, and Radar, vol. 18. Cambridge,
[27] S. Kayalvizhi and S. Malarvizhi, ‘‘A novel encrypted compressive sensing U.K.: Cambridge Univ. Press, 2005.
of images based on fractional order hyper chaotic chen system and DNA [52] M. Alhakim, ‘‘A simple combinatorial algorithm for de Bruijn sequences,’’
operations,’’ Multimedia Tools Appl., vol. 79, nos. 5–6, pp. 3957–3974, Amer. Math. Monthly, vol. 117, no. 8, pp. 728–732, 2010.
Feb. 2020. [53] A. Alhakim, ‘‘Spans of preference functions for de Bruijn sequences,’’
[28] Z. Gan, X. Chai, J. Zhang, Y. Zhang, and Y. Chen, ‘‘An effective Discrete Appl. Math., vol. 160, nos. 7–8, pp. 992–998, May 2012.
image compression–encryption scheme based on compressive sensing [54] H. Fredricksen, ‘‘A survey of full length nonlinear shift register cycle
(CS) and game of life (GOL),’’ Neural Comput. Appl., vol. 32, no. 17, algorithms,’’ SIAM Rev., vol. 24, no. 2, pp. 195–221, Apr. 1982.
pp. 14113–14141, Sep. 2020. [55] X. Wang, L. Zhang, and L. Jiang, ‘‘A new effective shift rule for
[29] G. Hu, D. Xiao, Y. Wang, and T. Xiang, ‘‘An image coding scheme using M-Sequences,’’ IEEE Access, vol. 8, pp. 74957–74964, 2020.
parallel compressive sensing for simultaneous compression-encryption [56] M. M. Feraidooni, D. Gharavian, S. Imani, and M. Alaee-Kerahroodi,
applications,’’ J. Vis. Commun. Image Represent., vol. 44, pp. 116–127, ‘‘Designing M-ary sequences and space-time receive filter for moving
Apr. 2017. target in cognitive MIMO radar systems,’’ Signal Process., vol. 174,
[30] X. Chai, X. Zheng, Z. Gan, D. Han, and Y. Chen, ‘‘An image encryption Sep. 2020, Art. no. 107620.
algorithm based on chaotic system and compressive sensing,’’ Signal [57] S. Zhang, R. Ma, T. Yin, and Z. Liu, ‘‘M-sequence-coded excitation for
Process., vol. 148, pp. 124–144, Jul. 2018. magneto-acoustic imaging,’’ Med. Biol. Eng. Comput., vol. 57, no. 5,
[31] X. Chai, X. Fu, Z. Gan, Y. Zhang, Y. Lu, and Y. Chen, ‘‘An efficient chaos- pp. 1059–1067, May 2019.
based image compression and encryption scheme using block compressive [58] L. Jiao, Y. Hao, and D. Feng, ‘‘Stream cipher designs: A review,’’ Sci.
sensing and elementary cellular automata,’’ Neural Comput. Appl., vol. 32, China Inf. Sci., vol. 63, no. 3, pp. 80–104, Mar. 2020.
no. 9, pp. 4961–4988, May 2020. [59] B. Norouzi, S. M. Seyedzadeh, S. Mirzakuchaki, and M. R. Mosavi,
[32] W. Shao, M. Cheng, C. Luo, L. Deng, M. Zhang, S. Fu, M. Tang, ‘‘A novel image encryption based on row-column, masking and main
and D. Liu, ‘‘An image encryption scheme based on hybrid electro- diffusion processes with hyper chaos,’’ Multimedia Tools Appl., vol. 74,
optic chaotic sources and compressive sensing,’’ IEEE Access, vol. 7, no. 3, pp. 781–811, Feb. 2015.
pp. 156582–156591, 2019. [60] J. Han and M. Claudio, ‘‘The influence of the sigmoid function param-
[33] K. Zhu and J. Cheng, ‘‘Color image encryption via compressive sens- eters on the speed of backpropagation learning,’’ in Proc. Int. Workshop
ing and chaotic systems,’’ in Proc. MATEC Web Conf., vol. 309, 2020, Artif. Neural Netw., Natural Artif. Neural Comput. Berlin, Germany:
p. 03017. Springer-Verlag, 1995, pp. 195–201.
[34] N. Zhou, A. Zhang, J. Wu, D. Pei, and Y. Yang, ‘‘Novel hybrid image
compression-encryption algorithm based on compressive sensing,’’ Optik-
Int. J. Light Electron Opt., vol. 125, no. 18, pp. 508–5075, 2014. YUQIANG DOU received the B.E. degree from
[35] R. Ponuma and R. Amutha, ‘‘Compressive sensing based image Zhengzhou University in 2003, the master’s degree
compression-encryption using novel 1D-chaotic map,’’ Multimedia Tools from the Communication University of China
Appl., vol. 77, no. 15, pp. 19209–19234, Aug. 2018. in 2006, and the Ph.D. degree from the Key Lab-
[36] R. R. Kumar and M. B. Kumar, ‘‘A new chaotic image encryption using
oratory of Media Audio and Video, Communica-
parametric switching based permutation and diffusion,’’ ICTACT J. Image
Video Process., vol. 4, no. 4, pp. 795–804, Mar. 2014.
tion University of China, Ministry of Education,
[37] Y. Zhou, L. Bao, and C. L. P. Chen, ‘‘A new 1D chaotic system for image in 2016.
encryption,’’ Signal Process., vol. 97, pp. 172–182, Apr. 2014. He is currently a Teaching Staff Member with
[38] C. Lv-Chen, L. Yu-Ling, Q. Sen-Hui, and L. Jun-Xiu, ‘‘A perturbation the School of Computer and Information Engi-
method to the tent map based on Lyapunov exponent and its application,’’ neering, Henan Normal University. His research
Chin. Phys. B, vol. 24, no. 10, pp. 78–85, 2015. interests include image information hiding, multimedia security, and audio
[39] C. Pak and L. Huang, ‘‘A new color image encryption using combination signal processing.
of the 1D chaotic map,’’ Signal Process., vol. 138, pp. 129–137, Sep. 2017.
[40] C. Pak, K. An, P. Jang, J. Kim, and S. Kim, ‘‘A novel bit-level color image
encryption using improved 1D chaotic map,’’ Multimedia Tools Appl., MING LI received the master’s degree in science
vol. 78, no. 9, pp. 12027–12042, May 2019. from the College of Physics and Information Engi-
[41] L. Yu, J. P. Barbot, G. Zheng, and H. Sun, ‘‘Compressive sensing with neering, Henan Normal University, Henan, China,
chaotic sequence,’’ IEEE Signal Process. Lett., vol. 17, no. 8, pp. 731–734, in 2010, and the Ph.D. degree from the College
Aug. 2010.
of Computer Science of Chongqing University,
[42] N. Zierler, ‘‘Linear recurring sequences,’’ J. Soc. Ind. Appl. Math., vol. 7,
no. 1, pp. 31–48, Mar. 1959. Chongqing, China, in 2014.
[43] J. Mykkeltveit, M.-K. Siu, and P. Tong, ‘‘On the cycle structure of He is currently an Associate Professor with the
some nonlinear shift register sequences,’’ Inf. Control, vol. 43, no. 2, College of Computer and Information Engineer-
pp. 202–215, Nov. 1979. ing, Henan Normal University, China. His research
[44] M. Hell, T. Johansson, and W. Meier, ‘‘Grain: A stream cipher for con- interests include multimedia security, information
strained environments,’’ Int. J. Wireless Mobile Comput., vol. 2, no. 1, hiding, and compressive sensing.
pp. 86–93, 2007.