相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article
Computer Science, Artificial Intelligence
Yong Zhang et al.
Summary: This paper studied the confusion and diffusion of images based on the finite group algorithm and proposed a new uniform image cryptosystem. It also suggested a keystream extension algorithm based on any length key. Simulation experiments showed that the proposed image cryptography algorithm could be a candidate algorithm for network image security technology.
EXPERT SYSTEMS WITH APPLICATIONS
(2023)
Article
Engineering, Mechanical
Jiuyang Xin et al.
Summary: In today's world, encrypting images has become essential due to the increasing impact they have on human life. Among different methods, chaotic encryption stands out for its unpredictability and sensitivity to initial conditions. This paper introduces a time-varying three-dimensional variable-structure chaotic system (3DVSCS) whose distinguished dynamical characteristics are verified using various metrics. Taking advantage of the chaotic sequences generated by the 3DVSCS, a novel encryption system (3DVSCS-IES) with a confusion-diffusion architecture is presented. Security analyses demonstrate that the proposed algorithm outperforms some typical state-of-the-art methods.
NONLINEAR DYNAMICS
(2023)
Article
Computer Science, Artificial Intelligence
Xingyuan Wang et al.
Summary: In this paper, a dynamic coupled map lattices system with nonlinear perturbations (NPDCML) is proposed. Test results demonstrate that the NPDCML system has superior spatiotemporal performance and chaotic characteristics compared to the conventional CML system, with a larger parameter space and better cryptographic advantages. Based on the NPDCML system, a new image encryption scheme is introduced, utilizing diffusion prior to confusion. Through bit plane decomposition and mutual diffusion of high and low bit planes, the image is scrambled and encrypted. Analysis of various test results confirms the effectiveness of the encryption scheme against common attacks, highlighting the good chaotic characteristics and cryptographic advantages of the NPDCML system.
Article
Computer Science, Information Systems
Shuang Zhou et al.
Summary: This paper presents a novel framework for generating new chaotic signals for image encryption based on the finite precision of computers. The method involves selecting a chaotic system, obtaining its trajectory, perturbing the initial values to obtain another trajectory, and calculating the evolution error to obtain a new chaotic signal. The proposed method is successfully applied to simulate three new chaotic signals for image encryption and exhibits a higher level of security than other sophisticated methods.
INFORMATION SCIENCES
(2023)
Article
Computer Science, Information Systems
Yu-Guang Yang et al.
Summary: In this paper, a novel method for color image encryption is proposed, which enhances the security and performance of encryption by reducing the dimension and compressing the color image. The unification between binary image encryption and grayscale image encryption is achieved.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Engineering, Mechanical
Donghan Li et al.
Summary: This paper proposes a new chaotic logistic-sine coupling map and a cross-plane colour image encryption algorithm based on this map. Experimental results show that the algorithm is highly secure and allows for the transmission of keys and other sensitive data over a public channel.
NONLINEAR DYNAMICS
(2023)
Article
Computer Science, Interdisciplinary Applications
Muhammad Imran Haider et al.
Summary: Efficient multiple pseudo-random number sequences and substitution boxes are crucial for secure data encryption. By using the indexing technique over elliptic curves, we propose a computationally efficient mechanism for generating multiple PRNS and S-boxes with low computational cost and high security strength.
MATHEMATICS AND COMPUTERS IN SIMULATION
(2023)
Article
Mathematics, Interdisciplinary Applications
Xingyuan Wang et al.
Summary: This paper proposes two new chaotic systems, one-dimensional Logistic-Chebyshev map (1DLCM) and Logistic-Chebyshev dynamic coupled map lattices (LCDCML). Based on these systems, a pixel-level and bit-level image encryption algorithm is proposed, which is validated to have higher security through experimental simulation and performance analysis.
CHAOS SOLITONS & FRACTALS
(2022)
Article
Engineering, Biomedical
Yuhan Hu et al.
Summary: In this paper, a new parallel CS reconstruction model for DCE-MRI is proposed to improve reconstruction quality by adjusting the importance of time and space sparsity. The results demonstrate that the proposed method achieves the lowest reconstruction error and highest image structural similarity at high acceleration rates.
IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING
(2022)
Article
Computer Science, Artificial Intelligence
Jianming Wang et al.
Summary: This paper proposes a new blocked ARCS method for surveillance videos, which estimates the sparsity of original signals by observing the result of CS measurement, and achieves higher accuracy in block division. The method has the advantages of low computational complexity, small memory footprint, and low power consumption, making it suitable for various applications.
IEEE TRANSACTIONS ON IMAGE PROCESSING
(2022)
Article
Computer Science, Artificial Intelligence
Yongpeng Ren et al.
Summary: The proposed method in this article utilizes a stacked generator network assisted by patch discriminator for image inpainting through multistage, effectively processing high-level semantic information to produce natural results. By splitting the masked image into different patches and introducing patch discriminator, the network can achieve high-quality inpainting results surpassing existing methods.
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS
(2022)
Article
Optics
Xiuli Chai et al.
Summary: This paper presents a robust compressed sensing image encryption algorithm using generative adversarial network, convolutional neural network, and chaotic system, which enhances network robustness through dual denoiser structure and noise injection training strategy. Experimental results demonstrate the method's excellent performance in terms of reconstruction quality, efficiency, robustness, and security.
JOURNAL OF MODERN OPTICS
(2022)
Article
Engineering, Mechanical
Xinyu Gao et al.
Summary: This paper proposes a multiple-image encryption algorithm based on single-channel scrambling, diffusion, and chaotic system. The algorithm encrypts the image set by fusing and converting from the RGB channel to the HSV channel. For single-channel encryption, scrambling and diffusion operations are performed. The algorithm shows excellent encryption speed and security performance based on performance analysis.
NONLINEAR DYNAMICS
(2022)
Article
Computer Science, Artificial Intelligence
Qingtang Su et al.
Summary: This paper proposes a dual-color image watermarking scheme based on URV decomposition and image correction, which has good invisibility, strong robustness, and high security.
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS
(2022)
Article
Computer Science, Information Systems
Xiuli Chai et al.
Summary: This article investigates the issue of content-based encrypted image retrieval in the cloud, and proposes a Thumbnail Preserving Encryption (TPE) method based on genetic algorithm, which obfuscates and diffuses pixels to achieve encrypted privacy protection while preserving thumbnail availability. Additionally, a color histogram-based retrieval algorithm is introduced, and the Bhattacharyya distance is utilized to improve retrieval accuracy.
INFORMATION SCIENCES
(2022)
Article
Computer Science, Artificial Intelligence
Guodong Ye et al.
Summary: In this paper, an asymmetric image encryption scheme based on blind signature and the improved Lorenz system is proposed. The scheme can generate high-entropy, attack-resistant cipher images and achieve image authentication.
EXPERT SYSTEMS WITH APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Haiping Chen et al.
Summary: A fast image encryption algorithm based on an improved 6-D chaotic system is proposed in this study, aiming at the security and efficiency of image transmission. This algorithm uses a hyper-chaotic system to generate random sequences and achieves encryption through image preprocessing and encryption matrix generation. Experimental results demonstrate excellent security performance and encryption/decryption speed.
Article
Engineering, Electrical & Electronic
Xiuli Chai et al.
Summary: In this study, a more efficient thumbnail preserving encryption (TPE) algorithm is proposed using CycleGan to simulate randomized unary encoding (RUE). The algorithm ensures the visual quality of encrypted images through thumbnail consistency loss and improves the quality of decrypted images via ssim-loss. Additionally, a decryption network with a key is retrained to decrypt cipher images in multiple domains, and a binary string is used as the key for facilitating image sharing.
IEEE SIGNAL PROCESSING LETTERS
(2022)
Article
Computer Science, Artificial Intelligence
Guodong Ye et al.
Summary: A new improved Lorenz system (ImproLS) is designed in this paper and an asymmetric image encryption scheme based on blind signature is proposed. The scheme utilizes the RSA algorithm to generate cipher keys, employs ImproLS to generate initial values, and embeds digital signature in the wavelet domain, achieving double protection for image encryption and signing.
EXPERT SYSTEMS WITH APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Xiuli Chai et al.
Summary: A novel double color image encryption algorithm combining 2D compressive sensing with an embedding technique is proposed in this paper, achieving compression and encryption simultaneously and obtaining visually meaningful cipher images. Confusion of the compressed cipher images is done by index sequences generated from a 6D hyperchaotic system, while the relationship of the algorithm with plain images is enhanced by embedding feature parameters into the carrier image.
INFORMATION SCIENCES
(2021)
Article
Engineering, Electrical & Electronic
Ye Tian et al.
Summary: Our proposed framework, SWDGAN, aims to balance reconstruction quality, practicability, and running efficiency by introducing a whole image dense residual denoising module based on generative adversarial network (GAN). This method improves feature representation while removing blocking artifacts, enhancing reconstruction quality and running efficiency.
JOURNAL OF ELECTRONIC IMAGING
(2021)
Article
Computer Science, Information Systems
Yong Zhang
Summary: Image encryption is essential for ensuring the security of image information in network communications. A new unified image encryption system with identical encryption and decryption algorithms was proposed in this paper, utilizing an external key and the Henon map for key generation. The system achieved encryption/decryption speeds of 59 Mbps on a computer equipped with i7-9750H CPU, demonstrating strong sensitivities to secret keys, plain images, and ciphered images with a maximum relative error of only 0.55%. The proposed system can be considered as a candidate scheme for network image information security.
INFORMATION SCIENCES
(2021)
Article
Automation & Control Systems
Yushu Zhang et al.
Summary: This article presents a method for securely processing industrial big image data using a chaotic compressive sensing scheme, named privacy-assured FogCS. The method involves secure image data collection in sensor nodes, normalization of measurements in fog nodes, and transmission to clouds for storage and authentication. Simulation analyses show the feasibility and efficiency of the privacy-assured FogCS scheme.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Computer Science, Artificial Intelligence
Zhihua Gan et al.
Summary: This paper proposes a novel color image compression and encryption algorithm by combining 2D CS, information entropy and chaos. The algorithm sparsely transforms the color image using DWT and encrypts it with two random measurement matrices, then shuffles and diffuses the measurement value matrices to obtain the final cipher image with improved security.
NEURAL COMPUTING & APPLICATIONS
(2021)
Article
Engineering, Mechanical
Xingyuan Wang et al.
Summary: This paper proposes an efficient and adjustable visual image encryption scheme combining a 6D hyperchaotic system, compressive sensing, and Bezier curve embedding. The scheme shows high decryption quality, visual security, robustness, and operating efficiency, outperforming existing related schemes.
NONLINEAR DYNAMICS
(2021)
Article
Computer Science, Artificial Intelligence
Kunshu Wang et al.
Summary: A new double color images encryption algorithm is introduced in this paper based on compressive sensing and wavelet basis, which can achieve image encryption and compression simultaneously. The algorithm divides the original images into non-overlapping blocks, constructs pseudo-random measurement matrices using chaotic maps, shuffles the measurements with Latin squares, and diffuses the image using key streams generated from chaotic maps and plain images to enhance security. Experimental results and security analysis demonstrate the effectiveness and security of the proposed algorithm in reducing data volume and simplifying keys.
NEURAL COMPUTING & APPLICATIONS
(2021)
Article
Computer Science, Artificial Intelligence
Sakshi Patel et al.
Summary: The paper combines the highly chaotic nature of hybrid chaos maps and neural networks to build a random number generator for cryptographic applications. The randomness of the generator is increased by a custom neural network with a user-defined layer transfer function. Various tests demonstrate the degree of randomness of the generator and the strength of the encryption algorithm.
NEURAL COMPUTING & APPLICATIONS
(2021)
Proceedings Paper
Computer Science, Artificial Intelligence
Liying Lu et al.
Summary: In this paper, we proposed the MASA network for Reference-based image super-resolution (RefSR), which includes two novel modules to address the issues of high-quality correspondence matching and distribution disparity between different images. The proposed Match & Extraction Module reduces computational cost and the Spatial Adaptation Module remaps feature distributions, making the network robust and effective for handling different reference images. Extensive experiments validate the effectiveness of our proposed model.
2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR 2021
(2021)
Article
Computer Science, Information Systems
Bo Zhang et al.
Summary: This paper proposes a 2DCS-based ETC scheme for encrypting images with nonlinear operations, compressing them with 2DCS, and implementing gray mapping to enhance performance. Additionally, a 2DPG-ED algorithm is introduced for original image reconstruction, achieving high security and low computational complexity with better robustness compared to previous CS-based ETC methods.
IEEE TRANSACTIONS ON MULTIMEDIA
(2021)
Article
Computer Science, Information Systems
Xunxiang Yao et al.
Summary: This study focuses on the importance of maintaining image roughness during image super-resolution, proposing an adaptive fractal interpolation function to address the issue. Experimental results demonstrate the effectiveness of this method in achieving high-performance super-resolution with minimal block artifacts.
IEEE TRANSACTIONS ON MULTIMEDIA
(2021)
Article
Optics
Kanglei Zhou et al.
OPTICS AND LASER TECHNOLOGY
(2020)
Article
Computer Science, Artificial Intelligence
Yubao Sun et al.
PATTERN RECOGNITION
(2020)
Article
Engineering, Electrical & Electronic
Guodong Ye et al.
Article
Optics
Ying-Qian Zhang et al.
OPTICS AND LASERS IN ENGINEERING
(2020)
Article
Engineering, Electrical & Electronic
Liya Zhu et al.
Article
Computer Science, Artificial Intelligence
Yubao Sun et al.
IEEE TRANSACTIONS ON IMAGE PROCESSING
(2020)
Article
Engineering, Electrical & Electronic
Xiuli Chai et al.
Article
Optics
Jie Zhou et al.
OPTICS AND LASER TECHNOLOGY
(2020)
Article
Computer Science, Artificial Intelligence
Wuzhen Shi et al.
IEEE TRANSACTIONS ON IMAGE PROCESSING
(2020)
Article
Engineering, Electrical & Electronic
Yuling Luo et al.
Article
Computer Science, Artificial Intelligence
Hantao Yao et al.
Proceedings Paper
Computer Science, Artificial Intelligence
Wuzhen Shi et al.
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019)
(2019)
Article
Engineering, Electrical & Electronic
Xiuli Chai et al.
Article
Engineering, Electrical & Electronic
Suhas Lohit et al.
IEEE TRANSACTIONS ON COMPUTATIONAL IMAGING
(2018)
Proceedings Paper
Computer Science, Artificial Intelligence
Jian Zhang et al.
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR)
(2018)
Proceedings Paper
Computer Science, Artificial Intelligence
Eirikur Agustsson et al.
2017 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW)
(2017)
Review
Computer Science, Information Systems
Yushu Zhang et al.
Article
Computer Science, Artificial Intelligence
Jian Zhang et al.
IEEE TRANSACTIONS ON IMAGE PROCESSING
(2014)
Proceedings Paper
Computer Science, Artificial Intelligence
Marco Bevilacqua et al.
PROCEEDINGS OF THE BRITISH MACHINE VISION CONFERENCE 2012
(2012)
Article
Computer Science, Information Systems
Emmanuel J. Candes et al.
IEEE TRANSACTIONS ON INFORMATION THEORY
(2006)