Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication
Image encryption is an effective method to protect private images by converting them into meaningless ones, but many current image encryption algorithms still have security and efficiency problems. This paper combines compressed sensing (CS) and secret image sharing (SIS) to propose a certifiable vi...
Saved in:
| Main Authors: | , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Springer
2022-11-01
|
| Series: | Journal of King Saud University: Computer and Information Sciences |
| Subjects: | |
| Online Access: | http://www.sciencedirect.com/science/article/pii/S1319157822003275 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849324998303416320 |
|---|---|
| author | Zhihua Gan Shiping Song Lin Zhou Daojun Han Jiangyu Fu Xiuli Chai |
| author_facet | Zhihua Gan Shiping Song Lin Zhou Daojun Han Jiangyu Fu Xiuli Chai |
| author_sort | Zhihua Gan |
| collection | DOAJ |
| description | Image encryption is an effective method to protect private images by converting them into meaningless ones, but many current image encryption algorithms still have security and efficiency problems. This paper combines compressed sensing (CS) and secret image sharing (SIS) to propose a certifiable visually secure image selection encryption. Firstly, a selective encryption based on multi-task convolutional neural network (SE-MTCNN) is presented to distinguish and encrypt the sensitive and non-sensitive information of plain images. Subsequently, the SIS algorithm is used to decompose the resulting plain image into multiple shadow images to disperse the risk of cryptographic image loss and resist hacking attacks. Herein, a pseudo-convolutional sliding scrambling based on chaotic sequences driven by plaintext (PCSS-CSDP) is proposed to eliminate the correlation between adjacent image pixels. Finally, the IWT-M-embedding algorithm is used to embed shadow images into carrier images to get multiple visually meaningful cipher images. Additionally, a new authentication scheme based on bit-level cyclic shifts and dynamic combination (AS-BCSDC) is introduced, and the obtained authentication information is fused into cipher images to prevent the deception of illegal users and malicious tampering of cloud platform. Experiments demonstrate the effectiveness of our algorithm, and it may be applied for image secure communication. |
| format | Article |
| id | doaj-art-5849ce2c0e674f96bad2e127fcad28eb |
| institution | Kabale University |
| issn | 1319-1578 |
| language | English |
| publishDate | 2022-11-01 |
| publisher | Springer |
| record_format | Article |
| series | Journal of King Saud University: Computer and Information Sciences |
| spelling | doaj-art-5849ce2c0e674f96bad2e127fcad28eb2025-08-20T03:48:31ZengSpringerJournal of King Saud University: Computer and Information Sciences1319-15782022-11-0134109252927210.1016/j.jksuci.2022.09.006Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authenticationZhihua Gan0Shiping Song1Lin Zhou2Daojun Han3Jiangyu Fu4Xiuli Chai5School of Software, Intelligent Data Processing Engineering Research Center of Henan Province, Institute of Intelligent Network System, Henan University, Kaifeng 475004, China; Henan Key Laboratory of Cyberspace Situation Awareness, Zhengzhou 450001, ChinaSchool of Artificial Intelligence, Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Zhengzhou 450046, ChinaSchool of Artificial Intelligence, Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Zhengzhou 450046, China; Corresponding authors at: School of Artificial Intelligence, Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Zhengzhou 450046, China (L. Zhou, D. Han and X. Chai).School of Computer and Information Engineering, Institute of Image Processing and Pattern Recognition, Henan University, Kaifeng 475004, China; Corresponding authors at: School of Artificial Intelligence, Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Zhengzhou 450046, China (L. Zhou, D. Han and X. Chai).School of Artificial Intelligence, Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Zhengzhou 450046, ChinaHenan Key Laboratory of Cyberspace Situation Awareness, Zhengzhou 450001, China; School of Artificial Intelligence, Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Zhengzhou 450046, China; Corresponding authors at: School of Artificial Intelligence, Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Zhengzhou 450046, China (L. Zhou, D. Han and X. Chai).Image encryption is an effective method to protect private images by converting them into meaningless ones, but many current image encryption algorithms still have security and efficiency problems. This paper combines compressed sensing (CS) and secret image sharing (SIS) to propose a certifiable visually secure image selection encryption. Firstly, a selective encryption based on multi-task convolutional neural network (SE-MTCNN) is presented to distinguish and encrypt the sensitive and non-sensitive information of plain images. Subsequently, the SIS algorithm is used to decompose the resulting plain image into multiple shadow images to disperse the risk of cryptographic image loss and resist hacking attacks. Herein, a pseudo-convolutional sliding scrambling based on chaotic sequences driven by plaintext (PCSS-CSDP) is proposed to eliminate the correlation between adjacent image pixels. Finally, the IWT-M-embedding algorithm is used to embed shadow images into carrier images to get multiple visually meaningful cipher images. Additionally, a new authentication scheme based on bit-level cyclic shifts and dynamic combination (AS-BCSDC) is introduced, and the obtained authentication information is fused into cipher images to prevent the deception of illegal users and malicious tampering of cloud platform. Experiments demonstrate the effectiveness of our algorithm, and it may be applied for image secure communication.http://www.sciencedirect.com/science/article/pii/S1319157822003275Compressed sensing (CS)Secret image sharing (SIS)Integer wavelet transform (IWT)-M-embeddingImage encryption |
| spellingShingle | Zhihua Gan Shiping Song Lin Zhou Daojun Han Jiangyu Fu Xiuli Chai Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication Journal of King Saud University: Computer and Information Sciences Compressed sensing (CS) Secret image sharing (SIS) Integer wavelet transform (IWT)-M-embedding Image encryption |
| title | Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication |
| title_full | Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication |
| title_fullStr | Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication |
| title_full_unstemmed | Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication |
| title_short | Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication |
| title_sort | exploiting compressed sensing and polynomial based progressive secret image sharing for visually secure image selection encryption with authentication |
| topic | Compressed sensing (CS) Secret image sharing (SIS) Integer wavelet transform (IWT)-M-embedding Image encryption |
| url | http://www.sciencedirect.com/science/article/pii/S1319157822003275 |
| work_keys_str_mv | AT zhihuagan exploitingcompressedsensingandpolynomialbasedprogressivesecretimagesharingforvisuallysecureimageselectionencryptionwithauthentication AT shipingsong exploitingcompressedsensingandpolynomialbasedprogressivesecretimagesharingforvisuallysecureimageselectionencryptionwithauthentication AT linzhou exploitingcompressedsensingandpolynomialbasedprogressivesecretimagesharingforvisuallysecureimageselectionencryptionwithauthentication AT daojunhan exploitingcompressedsensingandpolynomialbasedprogressivesecretimagesharingforvisuallysecureimageselectionencryptionwithauthentication AT jiangyufu exploitingcompressedsensingandpolynomialbasedprogressivesecretimagesharingforvisuallysecureimageselectionencryptionwithauthentication AT xiulichai exploitingcompressedsensingandpolynomialbasedprogressivesecretimagesharingforvisuallysecureimageselectionencryptionwithauthentication |