版权所有:内蒙古大学图书馆 技术提供:维普资讯• 智图
内蒙古自治区呼和浩特市赛罕区大学西街235号 邮编: 010021
作者机构:Northeastern Univ Software Coll Shenyang 110819 Liaoning Peoples R China Northeastern Univ Sch Comp Sci & Engn Shenyang 110819 Liaoning Peoples R China
出 版 物:《NONLINEAR DYNAMICS》 (非线性动力学)
年 卷 期:2019年第95卷第3期
页 面:2235-2261页
核心收录:
学科分类:08[工学] 0802[工学-机械工程] 0801[工学-力学(可授工学、理学学位)]
基 金:National Natural Science Foundation of China [61374178, 61402092, 61603182] Online Education Research Fund of the MOE Research Center for Online Education, China (Qtone Education) [2016ZD306] Ph.D. Start-Up Foundation of Liaoning Province, China Fundamental Research Funds for the Central Universities [N171704004]
主 题:Joint image compression-encryption Compressive sensing Entropy coding Chaos Bit-plane
摘 要:Recently, compressive sensing (CS)-based joint compression-encryption schemes have been widely investigated due to their high efficiency and good security for images. However, the existing schemes typically have a lower compression ratio (CR), and there may be a flaw during their compression processes. Therefore, in this paper, according to the intrinsic features of images, we propose a novel compression architecture to enhance the CR. Meanwhile, based on this architecture, a joint image compression-encryption scheme using entropy coding and CS is designed to implement a complete compression and encryption process. In this joint scheme, a presented bit-level lossless compression-encryption algorithm based on entropy coding for the higher bit-planes is incorporated to improve the quality of the reconstructed image and ensure the security. Alternately, this joint scheme also contains an improved CS-based lossy compression-encryption algorithm for the lower bit-planes, which can guarantee the efficiency and security. Through the cooperation between the proposed lossless and lossy coding, the higher reconstruction performance can be achieved. SHA-256 is combined with all initial keys in the proposed joint scheme to generate the updated keys for chaos cryptosystem to maintain high security and resist some common attacks. Experimental and analytical results illustrate the superiority of the proposed joint scheme compared with the existing compression-encryption schemes and JPEG, as well as good encryption performance.