Image encryption based on a single‐round dictionary and chaotic sequences in cloud computing

Summary With the increasing popularity of multimedia technology and the prevalence of various smart electronic devices, severe security problems have recently arisen in information and communication systems. The image maintenance can be treated as a typical example of cloud storage outsourcing as im...

Full description

Saved in:
Bibliographic Details
Published in:Concurrency and computation Vol. 33; no. 7; p. 1
Main Authors: Li, Yinghua, Yu, He, Song, Bin, Chen, Jinjun
Format: Journal Article
Language:English
Published: Hoboken Wiley Subscription Services, Inc 10-04-2021
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Summary With the increasing popularity of multimedia technology and the prevalence of various smart electronic devices, severe security problems have recently arisen in information and communication systems. The image maintenance can be treated as a typical example of cloud storage outsourcing as images require much more storage space than text documents. An image encryption method with high efficiency is crucial to preserve the privacy of sensitive and critical images in cloud‐edge communications. Compressive sensing (CS) is capable of reconstructing compressible or sparse signals using fewer measurements than traditional methods when the support of the signals is unobtainable in advance. Encryption methods based on CS decrease resources demands during signal acquisition and protect the image data to avoid theft of confidential information by malicious users. Moreover, the CS‐based encryption method can achieve the encryption and the compression of an image simultaneously. Recently, a considerable amount of work using CS theory has been reported. However, most of the existing methods result in recovered images with unsatisfactory quality and employ a massive measurement matrix as the encryption key. This paper proposes an encryption scheme for images on cloud based on a single‐round dictionary and chaotic sequences. Both the experimental and analytical results verify the proposed scheme's effectiveness, high level of security, and substantial image quality improvement after decryption.
AbstractList With the increasing popularity of multimedia technology and the prevalence of various smart electronic devices, severe security problems have recently arisen in information and communication systems. The image maintenance can be treated as a typical example of cloud storage outsourcing as images require much more storage space than text documents. An image encryption method with high efficiency is crucial to preserve the privacy of sensitive and critical images in cloud‐edge communications. Compressive sensing (CS) is capable of reconstructing compressible or sparse signals using fewer measurements than traditional methods when the support of the signals is unobtainable in advance. Encryption methods based on CS decrease resources demands during signal acquisition and protect the image data to avoid theft of confidential information by malicious users. Moreover, the CS‐based encryption method can achieve the encryption and the compression of an image simultaneously. Recently, a considerable amount of work using CS theory has been reported. However, most of the existing methods result in recovered images with unsatisfactory quality and employ a massive measurement matrix as the encryption key. This paper proposes an encryption scheme for images on cloud based on a single‐round dictionary and chaotic sequences. Both the experimental and analytical results verify the proposed scheme's effectiveness, high level of security, and substantial image quality improvement after decryption.
Summary With the increasing popularity of multimedia technology and the prevalence of various smart electronic devices, severe security problems have recently arisen in information and communication systems. The image maintenance can be treated as a typical example of cloud storage outsourcing as images require much more storage space than text documents. An image encryption method with high efficiency is crucial to preserve the privacy of sensitive and critical images in cloud‐edge communications. Compressive sensing (CS) is capable of reconstructing compressible or sparse signals using fewer measurements than traditional methods when the support of the signals is unobtainable in advance. Encryption methods based on CS decrease resources demands during signal acquisition and protect the image data to avoid theft of confidential information by malicious users. Moreover, the CS‐based encryption method can achieve the encryption and the compression of an image simultaneously. Recently, a considerable amount of work using CS theory has been reported. However, most of the existing methods result in recovered images with unsatisfactory quality and employ a massive measurement matrix as the encryption key. This paper proposes an encryption scheme for images on cloud based on a single‐round dictionary and chaotic sequences. Both the experimental and analytical results verify the proposed scheme's effectiveness, high level of security, and substantial image quality improvement after decryption.
Summary With the increasing popularity of multimedia technology and the prevalence of various smart electronic devices, severe security problems have recently arisen in information and communication systems. The image maintenance can be treated as a typical example of cloud storage outsourcing as images require much more storage space than text documents. An image encryption method with high efficiency is crucial to preserve the privacy of sensitive and critical images in cloud‐edge communications. Compressive sensing (CS) is capable of reconstructing compressible or sparse signals using fewer measurements than traditional methods when the support of the signals is unobtainable in advance. Encryption methods based on CS decrease resources demands during signal acquisition and protect the image data to avoid theft of confidential information by malicious users. Moreover, the CS‐based encryption method can achieve the encryption and the compression of an image simultaneously. Recently, a considerable amount of work using CS theory has been reported. However, most of the existing methods result in recovered images with unsatisfactory quality and employ a massive measurement matrix as the encryption key. This paper proposes an encryption scheme for images on cloud based on a single‐round dictionary and chaotic sequences. Both the experimental and analytical results verify the proposed scheme's effectiveness, high level of security, and substantial image quality improvement after decryption.
Author Song, Bin
Li, Yinghua
Yu, He
Chen, Jinjun
Author_xml – sequence: 1
  givenname: Yinghua
  surname: Li
  fullname: Li, Yinghua
  organization: Xidian University
– sequence: 2
  givenname: He
  surname: Yu
  fullname: Yu, He
  organization: Sun Yat‐sen University
– sequence: 3
  givenname: Bin
  orcidid: 0000-0002-8096-3370
  surname: Song
  fullname: Song, Bin
  email: bsong@mail.xidian.edu.cn
  organization: Xidian University
– sequence: 4
  givenname: Jinjun
  surname: Chen
  fullname: Chen, Jinjun
  organization: Swinburne University of Technology
BookMark eNp1kEtOwzAQhi1UJNqCxBEssWGT4kcezRJVpVSqBAvYYjn2pLhK7WAnQt1xBM7ISXAoYsdqZjTfPP5_gkbWWUDokpIZJYTdqBZmGZ2zEzSmGWcJyXk6-stZfoYmIewIoZRwOkYv673cAgar_KHtjLO4kgE0jonEwdhtA18fn971VmNt1EBIf8AylupVus4oHOCtj_MQsLFYNa6PLbdv-y5On6PTWjYBLn7jFD3fLZ8W98nmYbVe3G4Sxcr4WDpnuQRQdV5rSZgCyaIYznVZ0SqvM5KWVNOaMVpxmktZ6TwtimKueAFaRYlTdHXc23oXvwmd2Lne23hSsIyULGUkG6jrI6W8C8FDLVpv9lGPoEQM7ononhjci2hyRN9NA4d_ObF4XP7w38ubc60
CitedBy_id crossref_primary_10_1002_cpe_6773
crossref_primary_10_1002_cpe_7620
crossref_primary_10_1002_cpe_7983
crossref_primary_10_1002_cpe_7464
crossref_primary_10_1002_cpe_6495
crossref_primary_10_1002_cpe_7067
crossref_primary_10_1002_cpe_7980
crossref_primary_10_1002_cpe_6535
crossref_primary_10_1002_cpe_7624
crossref_primary_10_1002_cpe_6655
crossref_primary_10_1002_cpe_5565
crossref_primary_10_1002_cpe_7984
crossref_primary_10_1002_cpe_7060
crossref_primary_10_1016_j_jpdc_2019_09_009
crossref_primary_10_1002_cpe_7869
crossref_primary_10_1002_cpe_5447
crossref_primary_10_1002_cpe_6812
crossref_primary_10_1002_cpe_6818
crossref_primary_10_1002_cpe_7059
crossref_primary_10_1002_cpe_7851
crossref_primary_10_1117_1_JEI_32_5_052303
crossref_primary_10_1002_cpe_7177
crossref_primary_10_1002_cpe_7331
crossref_primary_10_1002_cpe_5435
crossref_primary_10_1002_cpe_7975
crossref_primary_10_1002_cpe_7051
crossref_primary_10_1002_cpe_7170
crossref_primary_10_1002_cpe_8022
crossref_primary_10_1002_cpe_7055
crossref_primary_10_1002_cpe_6481
crossref_primary_10_1002_cpe_7246
crossref_primary_10_1002_cpe_6430
crossref_primary_10_1002_cpe_7486
crossref_primary_10_1002_cpe_5462
crossref_primary_10_1002_cpe_7525
crossref_primary_10_1002_cpe_6710
crossref_primary_10_1002_cpe_6797
crossref_primary_10_1002_cpe_8053
crossref_primary_10_1145_3331174
crossref_primary_10_1002_cpe_6782
crossref_primary_10_1002_cpe_7474
crossref_primary_10_1007_s11042_023_15958_x
crossref_primary_10_1002_cpe_7238
crossref_primary_10_1002_cpe_7513
crossref_primary_10_1002_cpe_7479
crossref_primary_10_1002_cpe_8045
crossref_primary_10_1002_cpe_7919
crossref_primary_10_1002_cpe_6669
crossref_primary_10_1002_cpe_7301
crossref_primary_10_1002_cpe_6574
crossref_primary_10_1002_cpe_8079
crossref_primary_10_1002_cpe_5765
crossref_primary_10_1002_cpe_6699
crossref_primary_10_1002_cpe_5367
crossref_primary_10_1109_ACCESS_2023_3276723
crossref_primary_10_1002_cpe_7947
crossref_primary_10_1002_cpe_7704
crossref_primary_10_1002_cpe_6614
crossref_primary_10_1002_cpe_7824
crossref_primary_10_1016_j_jpdc_2019_03_010
crossref_primary_10_1002_cpe_6564
crossref_primary_10_1002_ett_4034
crossref_primary_10_1002_cpe_7530
crossref_primary_10_1002_cpe_5599
crossref_primary_10_1002_cpe_7932
crossref_primary_10_1002_cpe_8102
crossref_primary_10_1002_cpe_6720
crossref_primary_10_1002_cpe_8103
crossref_primary_10_1016_j_cose_2023_103095
crossref_primary_10_1002_cpe_7370
crossref_primary_10_1002_cpe_7491
crossref_primary_10_1109_COMST_2019_2944748
crossref_primary_10_1002_cpe_7131
crossref_primary_10_1007_s11042_023_14438_6
crossref_primary_10_1109_ACCESS_2023_3341103
crossref_primary_10_1002_cpe_6723
crossref_primary_10_1002_cpe_7201
crossref_primary_10_1002_cpe_7844
crossref_primary_10_1002_cpe_8015
crossref_primary_10_1002_cpe_6994
crossref_primary_10_3390_electronics10091066
crossref_primary_10_1002_cpe_7561
crossref_primary_10_1007_s41478_023_00627_x
crossref_primary_10_1002_cpe_7560
crossref_primary_10_1002_cpe_7162
crossref_primary_10_1109_TKDE_2019_2949309
crossref_primary_10_1002_cpe_7846
crossref_primary_10_1002_cpe_7845
crossref_primary_10_1002_cpe_6518
crossref_primary_10_1002_cpe_7037
crossref_primary_10_1002_cpe_8006
crossref_primary_10_1002_cpe_7315
crossref_primary_10_1002_cpe_6461
crossref_primary_10_1002_cpe_7395
crossref_primary_10_1002_cpe_7670
crossref_primary_10_1002_cpe_7030
crossref_primary_10_1002_cpe_6504
crossref_primary_10_1002_cpe_7714
crossref_primary_10_1002_cpe_6904
crossref_primary_10_1109_TMC_2022_3208420
Cites_doi 10.1137/070703983
10.1109/IWCIT.2013.6555751
10.1002/cpa.20124
10.1109/ICC.2005.1494554
10.1109/TIFS.2015.2450676
10.1109/TIFS.2016.2590944
10.1109/TIFS.2013.2295032
10.1007/s10915-012-9616-5
10.1016/j.optcom.2010.03.064
10.1016/j.optcom.2011.02.066
10.1109/TIT.2006.871582
10.1007/s11227-008-0184-2
10.1016/j.jss.2012.04.002
10.1016/j.jvcir.2013.08.007
10.1007/978-3-319-49583-5_50
10.1109/TSG.2012.2212730
10.1109/TCYB.2017.2682561
10.1364/AO.54.001782
10.1109/TIT.2006.885507
10.1007/978-1-4614-4544-9
10.1016/j.ijleo.2014.06.054
10.1109/TMM.2016.2581593
10.1109/ITW.2011.6089519
10.1109/MILCOM.2008.4753187
10.1016/j.ins.2013.04.009
10.1145/2545883
10.1016/j.image.2015.09.001
10.1016/j.optlastec.2014.02.015
10.1109/TELFOR.2012.6419328
10.1109/TIFS.2015.2493982
10.1109/ICASSP.2014.6854351
10.1007/s12596-013-0147-8
10.1137/080725891
10.1109/ALLERTON.2008.4797641
10.1109/TMM.2016.2564100
10.1145/2903717
10.1109/MSP.2007.914731
10.1109/MWC.2016.7553030
10.1109/IIHMSP.2011.53
10.1007/978-3-642-11799-2_28
10.1016/j.chaos.2006.11.009
10.1109/TCSVT.2008.928225
10.1109/ACCESS.2016.2569421
10.1007/s11042-012-1337-0
10.1109/TIT.2005.862083
10.1016/j.neucom.2016.04.053
10.1109/JSYST.2014.2300535
10.1109/ACCESS.2014.2362522
10.1109/ISCAS.2015.7169254
ContentType Journal Article
Copyright 2019 John Wiley & Sons, Ltd.
2021 John Wiley & Sons, Ltd.
Copyright_xml – notice: 2019 John Wiley & Sons, Ltd.
– notice: 2021 John Wiley & Sons, Ltd.
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1002/cpe.5182
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts
CrossRef

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1532-0634
EndPage 1
ExternalDocumentID 10_1002_cpe_5182
CPE5182
Genre article
GrantInformation_xml – fundername: National Natural Science Foundation of China
  funderid: 61772387; 61802296
– fundername: Fundamental Research Funds of Ministry of Education and China Mobile
  funderid: MCM20170202
– fundername: China Postdoctoral Science Foundation
  funderid: 2017M620438
GroupedDBID .3N
.DC
.GA
05W
0R~
10A
1L6
1OC
33P
3SF
3WU
4.4
50Y
50Z
51W
51X
52M
52N
52O
52P
52S
52T
52U
52W
52X
5GY
5VS
66C
702
7PT
8-0
8-1
8-3
8-4
8-5
8UM
930
A03
AAESR
AAEVG
AAHHS
AANLZ
AAONW
AAXRX
AAZKR
ABCQN
ABCUV
ABEML
ABIJN
ACAHQ
ACCFJ
ACCZN
ACPOU
ACSCC
ACXBN
ACXQS
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADOZA
ADXAS
ADZMN
ADZOD
AEEZP
AEIGN
AEIMD
AEQDE
AEUQT
AEUYR
AFBPY
AFFPM
AFGKR
AFPWT
AHBTC
AITYG
AIURR
AIWBW
AJBDE
AJXKR
ALMA_UNASSIGNED_HOLDINGS
ALUQN
AMBMR
AMYDB
ATUGU
AUFTA
AZBYB
BAFTC
BDRZF
BFHJK
BHBCM
BMNLL
BROTX
BRXPI
BY8
CS3
D-E
D-F
DCZOG
DPXWK
DR2
DRFUL
DRSTM
EBS
F00
F01
F04
F5P
G-S
G.N
GNP
GODZA
HGLYW
HHY
HZ~
IX1
JPC
KQQ
LATKE
LAW
LC2
LC3
LEEKS
LH4
LITHE
LOXES
LP6
LP7
LUTES
LYRES
MEWTI
MK4
MRFUL
MRSTM
MSFUL
MSSTM
MXFUL
MXSTM
N04
N05
N9A
O66
O9-
OIG
P2W
P2X
P4D
PQQKQ
Q.N
Q11
QB0
QRW
R.K
ROL
RWI
RX1
SUPJJ
TN5
UB1
V2E
W8V
W99
WBKPD
WIH
WIK
WOHZO
WQJ
WRC
WXSBR
WYISQ
WZISG
XG1
XV2
~IA
~WT
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c2932-4826aeecf6fda02cea210033d9b1b6f50491d1f221b316aabd647778c37edc063
IEDL.DBID 33P
ISSN 1532-0626
IngestDate Thu Oct 10 17:53:18 EDT 2024
Fri Aug 23 04:43:58 EDT 2024
Sat Aug 24 01:04:29 EDT 2024
IsPeerReviewed true
IsScholarly true
Issue 7
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2932-4826aeecf6fda02cea210033d9b1b6f50491d1f221b316aabd647778c37edc063
ORCID 0000-0002-8096-3370
PQID 2509242056
PQPubID 2045170
PageCount 1
ParticipantIDs proquest_journals_2509242056
crossref_primary_10_1002_cpe_5182
wiley_primary_10_1002_cpe_5182_CPE5182
PublicationCentury 2000
PublicationDate 10 April 2021
PublicationDateYYYYMMDD 2021-04-10
PublicationDate_xml – month: 04
  year: 2021
  text: 10 April 2021
  day: 10
PublicationDecade 2020
PublicationPlace Hoboken
PublicationPlace_xml – name: Hoboken
PublicationTitle Concurrency and computation
PublicationYear 2021
Publisher Wiley Subscription Services, Inc
Publisher_xml – name: Wiley Subscription Services, Inc
References 2015; 37
2006; 52
2015; 39
2015; 5
2012
2011
2010
2013; 24
2008; 18
2008; 38
2006; 59
2015; 10
2015; 54
2016; 10
2008
2014; 47
2007
2006; 3
2005
2016; 205
2010; 283
2016; 18
2008; 1
2014; 62
2014; 258
2018; 48
2014; 43
2016; 12
2016; 11
2016; 4
2012; 3
2014; 2
2013; 54
2015; 63
2008; 25
2008; 45
2016
2015
2014
2013
2014; 9
2011; 284
2009; 2
2014; 72
2014; 125
2016; 23
2012; 85
e_1_2_9_31_1
e_1_2_9_52_1
e_1_2_9_50_1
e_1_2_9_10_1
e_1_2_9_35_1
e_1_2_9_56_1
e_1_2_9_12_1
e_1_2_9_54_1
Li J (e_1_2_9_8_1) 2015; 5
e_1_2_9_14_1
e_1_2_9_39_1
e_1_2_9_16_1
e_1_2_9_37_1
e_1_2_9_18_1
e_1_2_9_41_1
e_1_2_9_20_1
e_1_2_9_22_1
e_1_2_9_45_1
e_1_2_9_24_1
e_1_2_9_43_1
Cambareri V (e_1_2_9_47_1) 2015; 63
e_1_2_9_6_1
e_1_2_9_4_1
e_1_2_9_2_1
Shah RJ (e_1_2_9_3_1) 2014; 2
e_1_2_9_26_1
e_1_2_9_49_1
e_1_2_9_28_1
Candes EJ (e_1_2_9_11_1) 2006
e_1_2_9_30_1
e_1_2_9_53_1
e_1_2_9_51_1
e_1_2_9_34_1
e_1_2_9_57_1
e_1_2_9_13_1
e_1_2_9_32_1
e_1_2_9_55_1
Xiao D (e_1_2_9_33_1) 2015; 37
e_1_2_9_15_1
e_1_2_9_38_1
e_1_2_9_17_1
e_1_2_9_36_1
e_1_2_9_19_1
e_1_2_9_42_1
e_1_2_9_40_1
e_1_2_9_21_1
e_1_2_9_46_1
e_1_2_9_23_1
e_1_2_9_44_1
e_1_2_9_7_1
e_1_2_9_5_1
e_1_2_9_9_1
e_1_2_9_25_1
e_1_2_9_27_1
e_1_2_9_48_1
e_1_2_9_29_1
References_xml – year: 2011
– volume: 25
  start-page: 21
  issue: 2
  year: 2008
  end-page: 30
  article-title: An introduction to compressive sampling
  publication-title: IEEE Signal Process Mag
– volume: 9
  start-page: 208
  issue: 2
  year: 2014
  end-page: 220
  article-title: Role‐dependent privacy preservation for secure V2G networks in the smart grid
  publication-title: IEEE Trans Inf Forensics Secur
– volume: 12
  issue: 4s
  year: 2016
  article-title: Image encryption based on compressive sensing and scrambled index for secure multimedia transmission
  publication-title: ACM Trans Multimed Comput Commun Appl
– volume: 63
  start-page: 2183
  issue: 9
  year: 2015
  end-page: 2195
  article-title: Low‐complexity multiclass encryption by compressed sensing
  publication-title: IEEE Trans Signal Process
– volume: 85
  start-page: 2077
  issue: 9
  year: 2012
  end-page: 2085
  article-title: Cryptanalyzing a chaos‐based image encryption algorithm using alternate structure
  publication-title: J Syst Softw
– volume: 2
  start-page: 1477
  issue: 5
  year: 2014
  end-page: 1481
  article-title: Multimedia security techniques
  publication-title: Int J Innov Res Electr Electron Instrum Control Eng
– year: 2005
– volume: 52
  start-page: 5406
  issue: 12
  year: 2006
  end-page: 5425
  article-title: Near‐optimal signal recovery from random projections: universal encoding strategies?
  publication-title: IEEE Trans Inf Theory
– volume: 39
  start-page: 202
  year: 2015
  end-page: 211
  article-title: Robust coding of encrypted images via structural matrix
  publication-title: Signal Process Image Commun
– volume: 11
  start-page: 2594
  issue: 11
  year: 2016
  end-page: 2608
  article-title: A privacy‐preserving and copy‐deterrence content‐based image retrieval scheme in cloud computing
  publication-title: IEEE Trans Inf Forensics Secur
– volume: 258
  start-page: 403
  year: 2014
  end-page: 415
  article-title: Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications
  publication-title: Inf Sci
– volume: 24
  start-page: 1232
  issue: 8
  year: 2013
  end-page: 1242
  article-title: Dictionary learning based reconstruction for distributed compressed video sensing
  publication-title: J Vis Commun Image Represent
– year: 2014
– volume: 18
  start-page: 1297
  issue: 7
  year: 2016
  end-page: 1304
  article-title: Significance evaluation of video data over media cloud based on compressed sensing
  publication-title: IEEE Trans Multimed
– volume: 2
  start-page: 323
  issue: 2
  year: 2009
  end-page: 343
  article-title: The split Bregman method for L1‐regularized problems
  publication-title: SIAM J Imaging Sci
– volume: 10
  start-page: 1125
  issue: 3
  year: 2016
  end-page: 1136
  article-title: A novel sensory data processing framework to integrate sensor networks with mobile cloud
  publication-title: IEEE Syst J
– volume: 10
  start-page: 2182
  issue: 10
  year: 2015
  end-page: 2195
  article-title: On known‐plaintext attacks to a compressed sensing‐based encryption: a quantitative analysis
  publication-title: IEEE Trans Inf Forensics Secur
– volume: 52
  start-page: 1289
  issue: 4
  year: 2006
  end-page: 1306
  article-title: Compressed sensing
  publication-title: IEEE Trans Inf Theory
– volume: 18
  start-page: 1168
  issue: 8
  year: 2008
  end-page: 1174
  article-title: Scrambling for privacy protection in video surveillance systems
  publication-title: IEEE Trans Circuits Syst Video Technol
– year: 2008
– start-page: 480
  year: 2010
  end-page: 497
– start-page: 644
  year: 2016
  end-page: 657
– volume: 38
  start-page: 213
  issue: 1
  year: 2008
  end-page: 220
  article-title: Image encryption based on a new total shuffling algorithm
  publication-title: Chaos Solit Fractals
– volume: 62
  start-page: 152
  year: 2014
  end-page: 160
  article-title: Novel image compression‐encryption hybrid algorithm based on key‐controlled measurement matrix in compressive sensing
  publication-title: Opt Laser Technol
– volume: 283
  start-page: 3037
  issue: 15
  year: 2010
  end-page: 3042
  article-title: Novel image encryption algorithm based on multiple‐parameter discrete fractional random transform
  publication-title: Opt Commun
– volume: 18
  start-page: 1720
  issue: 9
  year: 2016
  end-page: 1732
  article-title: Bi‐level protected compressive sampling
  publication-title: IEEE Trans Multimed
– year: 2015
– volume: 48
  start-page: 1163
  issue: 4
  year: 2018
  end-page: 1175
  article-title: On the security of a class of diffusion mechanisms for image encryption
  publication-title: IEEE Trans Cybern
– volume: 4
  start-page: 2507
  year: 2016
  end-page: 2519
  article-title: A review of compressive sensing in information security field
  publication-title: IEEE Access
– volume: 205
  start-page: 472
  year: 2016
  end-page: 480
  article-title: Embedding cryptographic features in compressive sensing
  publication-title: Neurocomputing
– volume: 72
  start-page: 71
  issue: 1
  year: 2014
  end-page: 93
  article-title: A parallel image encryption method based on compressive sensing
  publication-title: Multimed Tools Appl
– volume: 11
  start-page: 313
  issue: 2
  year: 2016
  end-page: 327
  article-title: Analysis of one‐time random projections for privacy preserving compressed sensing
  publication-title: IEEE Trans Inf Forensics Secur
– volume: 1
  start-page: 143
  year: 2008
  end-page: 168
  article-title: Bregman iterative algorithms for ‐minimization with applications to compressed sensing
  publication-title: SIAM J Imaging Sci
– year: 2007
– volume: 125
  start-page: 5075
  issue: 18
  year: 2014
  end-page: 5080
  article-title: Novel hybrid image compression‐encryption algorithm based on compressive sensing
  publication-title: Optik‐Int J Light Electron Opt
– volume: 59
  start-page: 1207
  issue: 8
  year: 2006
  end-page: 1223
  article-title: Stable signal recovery from incomplete and inaccurate measurements
  publication-title: Commun Pure Appl Math
– volume: 47
  issue: 1
  year: 2014
  article-title: Security and privacy protection in visual sensor networks: a survey
  publication-title: ACM Comput Surv
– volume: 45
  start-page: 44
  issue: 1
  year: 2008
  end-page: 65
  article-title: Scalable and efficient key management for heterogeneous sensor networks
  publication-title: J Supercomput
– year: 2012
– volume: 23
  start-page: 82
  issue: 4
  year: 2016
  end-page: 89
  article-title: Social vehicle swarms: a novel perspective on socially aware vehicular communication architecture
  publication-title: IEEE Wirel Commun
– volume: 52
  start-page: 489
  issue: 2
  year: 2006
  end-page: 509
  article-title: Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information
  publication-title: IEEE Trans Inf Theory
– volume: 54
  start-page: 1782
  issue: 7
  year: 2015
  end-page: 1793
  article-title: Compressive sensing based robust multispectral double‐image encryption
  publication-title: Appl Opt
– volume: 284
  start-page: 2789
  issue: 12
  year: 2011
  end-page: 2796
  article-title: Novel single‐channel color image encryption algorithm based on chaos and fractional fourier transform
  publication-title: Opt Commun
– volume: 43
  start-page: 1
  issue: 1
  year: 2014
  end-page: 17
  article-title: A novel approach for secure compressive sensing of images using multiple chaotic maps
  publication-title: J Opt
– volume: 3
  start-page: 1722
  issue: 4
  year: 2012
  end-page: 1733
  article-title: Aggregated‐proofs based privacy‐preserving authentication for V2G networks in the smart grid
  publication-title: IEEE Trans Smart Grid
– volume: 37
  start-page: 1248
  issue: 5
  year: 2015
  end-page: 1254
  article-title: Robust and separable watermarking algorithm in encrypted image based on compressive sensing
  publication-title: J Electron Inf Technol
– volume: 54
  start-page: 684
  issue: 2‐3
  year: 2013
  end-page: 695
  article-title: Error forgetting of Bregman iteration
  publication-title: J Sci Comput
– volume: 2
  start-page: 1149
  year: 2014
  end-page: 1176
  article-title: Information security in big data: privacy and data mining
  publication-title: IEEE Access
– volume: 5
  year: 2015
  article-title: Compressive optical image encryption
  publication-title: Sci Rep
– volume: 3
  start-page: 1433
  year: 2006
  end-page: 1452
– year: 2013
– ident: e_1_2_9_48_1
  doi: 10.1137/070703983
– ident: e_1_2_9_18_1
  doi: 10.1109/IWCIT.2013.6555751
– ident: e_1_2_9_14_1
  doi: 10.1002/cpa.20124
– ident: e_1_2_9_31_1
  doi: 10.1109/ICC.2005.1494554
– ident: e_1_2_9_20_1
  doi: 10.1109/TIFS.2015.2450676
– ident: e_1_2_9_2_1
  doi: 10.1109/TIFS.2016.2590944
– ident: e_1_2_9_23_1
  doi: 10.1109/TIFS.2013.2295032
– ident: e_1_2_9_50_1
  doi: 10.1007/s10915-012-9616-5
– ident: e_1_2_9_42_1
  doi: 10.1016/j.optcom.2010.03.064
– ident: e_1_2_9_43_1
  doi: 10.1016/j.optcom.2011.02.066
– ident: e_1_2_9_12_1
  doi: 10.1109/TIT.2006.871582
– ident: e_1_2_9_22_1
  doi: 10.1007/s11227-008-0184-2
– ident: e_1_2_9_38_1
  doi: 10.1016/j.jss.2012.04.002
– ident: e_1_2_9_51_1
  doi: 10.1016/j.jvcir.2013.08.007
– volume: 5
  year: 2015
  ident: e_1_2_9_8_1
  article-title: Compressive optical image encryption
  publication-title: Sci Rep
  contributor:
    fullname: Li J
– ident: e_1_2_9_53_1
  doi: 10.1007/978-3-319-49583-5_50
– ident: e_1_2_9_25_1
  doi: 10.1109/TSG.2012.2212730
– ident: e_1_2_9_39_1
  doi: 10.1109/TCYB.2017.2682561
– ident: e_1_2_9_34_1
  doi: 10.1364/AO.54.001782
– ident: e_1_2_9_16_1
  doi: 10.1109/TIT.2006.885507
– ident: e_1_2_9_46_1
– ident: e_1_2_9_56_1
  doi: 10.1007/978-1-4614-4544-9
– ident: e_1_2_9_45_1
  doi: 10.1016/j.ijleo.2014.06.054
– volume: 2
  start-page: 1477
  issue: 5
  year: 2014
  ident: e_1_2_9_3_1
  article-title: Multimedia security techniques
  publication-title: Int J Innov Res Electr Electron Instrum Control Eng
  contributor:
    fullname: Shah RJ
– ident: e_1_2_9_15_1
  doi: 10.1109/TMM.2016.2581593
– volume: 37
  start-page: 1248
  issue: 5
  year: 2015
  ident: e_1_2_9_33_1
  article-title: Robust and separable watermarking algorithm in encrypted image based on compressive sensing
  publication-title: J Electron Inf Technol
  contributor:
    fullname: Xiao D
– ident: e_1_2_9_19_1
  doi: 10.1109/ITW.2011.6089519
– ident: e_1_2_9_27_1
  doi: 10.1109/MILCOM.2008.4753187
– ident: e_1_2_9_21_1
  doi: 10.1016/j.ins.2013.04.009
– ident: e_1_2_9_5_1
  doi: 10.1145/2545883
– ident: e_1_2_9_29_1
  doi: 10.1016/j.image.2015.09.001
– ident: e_1_2_9_44_1
  doi: 10.1016/j.optlastec.2014.02.015
– ident: e_1_2_9_26_1
  doi: 10.1109/TELFOR.2012.6419328
– ident: e_1_2_9_36_1
  doi: 10.1109/TIFS.2015.2493982
– ident: e_1_2_9_35_1
  doi: 10.1109/ICASSP.2014.6854351
– ident: e_1_2_9_9_1
  doi: 10.1007/s12596-013-0147-8
– ident: e_1_2_9_49_1
  doi: 10.1137/080725891
– ident: e_1_2_9_17_1
  doi: 10.1109/ALLERTON.2008.4797641
– ident: e_1_2_9_52_1
  doi: 10.1109/TMM.2016.2564100
– volume: 63
  start-page: 2183
  issue: 9
  year: 2015
  ident: e_1_2_9_47_1
  article-title: Low‐complexity multiclass encryption by compressed sensing
  publication-title: IEEE Trans Signal Process
  contributor:
    fullname: Cambareri V
– ident: e_1_2_9_57_1
  doi: 10.1145/2903717
– ident: e_1_2_9_13_1
  doi: 10.1109/MSP.2007.914731
– ident: e_1_2_9_7_1
  doi: 10.1109/MWC.2016.7553030
– ident: e_1_2_9_32_1
  doi: 10.1109/IIHMSP.2011.53
– ident: e_1_2_9_30_1
  doi: 10.1007/978-3-642-11799-2_28
– ident: e_1_2_9_40_1
– ident: e_1_2_9_54_1
  doi: 10.1016/j.chaos.2006.11.009
– ident: e_1_2_9_6_1
  doi: 10.1109/TCSVT.2008.928225
– ident: e_1_2_9_10_1
  doi: 10.1109/ACCESS.2016.2569421
– ident: e_1_2_9_55_1
  doi: 10.1007/s11042-012-1337-0
– ident: e_1_2_9_28_1
  doi: 10.1109/TIT.2005.862083
– ident: e_1_2_9_41_1
  doi: 10.1016/j.neucom.2016.04.053
– ident: e_1_2_9_24_1
  doi: 10.1109/JSYST.2014.2300535
– ident: e_1_2_9_4_1
  doi: 10.1109/ACCESS.2014.2362522
– ident: e_1_2_9_37_1
  doi: 10.1109/ISCAS.2015.7169254
– start-page: 1433
  volume-title: Proceedings of the International Congress of Mathematicians: Madrid, August 22‐30, 2006
  year: 2006
  ident: e_1_2_9_11_1
  contributor:
    fullname: Candes EJ
SSID ssj0011031
Score 2.6120574
Snippet Summary With the increasing popularity of multimedia technology and the prevalence of various smart electronic devices, severe security problems have recently...
Summary With the increasing popularity of multimedia technology and the prevalence of various smart electronic devices, severe security problems have recently...
With the increasing popularity of multimedia technology and the prevalence of various smart electronic devices, severe security problems have recently arisen...
SourceID proquest
crossref
wiley
SourceType Aggregation Database
Publisher
StartPage 1
SubjectTerms chaotic sequence
Cloud computing
Communications systems
Compressibility
compressive sampling
Data storage
Dictionaries
dictionary
Electronic devices
Encryption
Image acquisition
Image compression
image encryption
Image quality
Image reconstruction
Information storage
Multimedia
random permutation
Security
Theft
Title Image encryption based on a single‐round dictionary and chaotic sequences in cloud computing
URI https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fcpe.5182
https://www.proquest.com/docview/2509242056
Volume 33
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV29TsMwED5BJxbKrygUZCTEZmo7bdqwodKqLKgSIDER-VdUKmnV0oGNR-AZeRLOTtLCgITElESJHeviu_vO8X0HcCbjhEv0C5Qro2hTME1l0vF0d4kwnn_PBbqmwV379rFz3fM0OZdlLkzOD7FccPOaEey1V3Cp5o0Vaaie2osWomM0vxgkhOyNaLj8geCrF-RUqYIyBO0l7ywTjbLhT0-0gpffQWrwMv3qf8a3BZsFtiRX-WTYhjWb7UC1rNtACjXehaebF7QiBC9mb8FiEO_LDMETSfzawdh-vn_MfMElYkYh8QGHQSRe6mc5wd7Jcgc2GWVEjycLvBXeg6334KHfu-8OaFFngWp09oI2McSQ1moXOyOZ0FZiHMiiyCSKq9i1MIjghjshuIp4LKUyPnu13dFR2xqNGGcfKtkkswdAUNIW-2y2ZITukQuFcMRxbSKpYuaYrsFpKfN0mtNppDlxskhRYKkXWA3q5cdIC4Wap4jUMFIUCNdqcB7E_mv7tDvs-ePhXx88gg3hd6p4BkdWh8rrbGGPYX1uFidhUn0BPo3PBA
link.rule.ids 315,782,786,1408,27935,27936,46066,46490
linkProvider Wiley-Blackwell
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT8JAEJ4oHvQiPiOKuibGW6W7LYXGk0EIRCQkYuLJzb4aSbAQkIM3f4K_0V_ibB-gBxMTT-2m3UemOzvfbHe-ATgXQUgF2gWHSi0dn7nKEWHd0t2FTFv-vSiha2rf13qP9Zumpcm5ymNhUn6IxYab1YxkvbYKbjekK0vWUDUxl1WEx6uw5gd-aPM2eF5_8QvB5i9IyVKZ4yJsz5lnXVbJa_60RUuA-R2mJnamVfzXCLdgM4OX5DqdD9uwYuIdKOapG0imybvw1HnBhYRgYfqWLBrEmjNN8EYQu30wMp_vH1Obc4noYRL7gOMgAovqWYyxdbI4hE2GMVGj8RwfJf1g7T14aDUHjbaTpVpwFNp75vjoZQhjVBREWrhMGYGuoOt5OpRUBlEV_QiqacQYlR4NhJDaBrDW6sqrGa0Q5uxDIR7H5gAIitpgm35VeGghKZOISCKqtCdk4EauKsFZLnQ-SRk1eMqdzDgKjFuBlaCcfw2e6dSMI1hDZ5EhYivBRSL3X-vzRr9pr4d_ffEU1tuDuy7vdnq3R7DB7MEVS-jolqHwOp2bY1id6flJMsO-AEya0yU
linkToPdf http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8NAEB60gnixPrFadQXxFru7SdPGm_RBi1IKKngy7CtYqGlp7cGbP8Hf6C9xdtO0ehAET8mS7IPJzs43m51vAM5FGDGBdsFjUksv4FR5IqpburuIa8u_lzi6ps5drfdYb7YsTc5VHguT8UMsNtysZrj12ir4WCeVJWmoGpvLKqLjVVgLLAq34Rt-f_EHwaYvyLhSuUcRtefEs5RX8po_TdESX35Hqc7MtIv_GeAWbM7BJbnOZsM2rJh0B4p54gYy1-NdeOq-4DJCsDB5c0sGscZME7wRxG4eDM3n-8fEZlwieuAiH3AYRGBRPYsRtk4WR7DJICVqOJrhI9cP1t6Dh3brvtHx5okWPIXWnnsB-hjCGJWEiRaUKyPQEaS-ryPJZJhU0YtgmiWcM-mzUAipbfhqra78mtEKQc4-FNJRag6AoKQNthlUhY_2kXGJeCRhSvtChjShqgRnuczjccanEWfMyTxGgcVWYCUo5x8jnmvUNEaohq4iR7xWggsn9l_rx41-y14P__riKaz3m-34ttu7OYINbk-tWDZHWobC62RmjmF1qmcnbn59Afuz0dQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Image+encryption+based+on+a+single%E2%80%90round+dictionary+and+chaotic+sequences+in+cloud+computing&rft.jtitle=Concurrency+and+computation&rft.au=Li%2C+Yinghua&rft.au=Yu%2C+He&rft.au=Song%2C+Bin&rft.au=Chen%2C+Jinjun&rft.date=2021-04-10&rft.issn=1532-0626&rft.eissn=1532-0634&rft.volume=33&rft.issue=7&rft.spage=1&rft.epage=1&rft_id=info:doi/10.1002%2Fcpe.5182&rft.externalDBID=10.1002%252Fcpe.5182&rft.externalDocID=CPE5182
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1532-0626&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1532-0626&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1532-0626&client=summon