Image encryption based on a single‐round dictionary and chaotic sequences in cloud computing
Summary With the increasing popularity of multimedia technology and the prevalence of various smart electronic devices, severe security problems have recently arisen in information and communication systems. The image maintenance can be treated as a typical example of cloud storage outsourcing as im...
Saved in:
Published in: | Concurrency and computation Vol. 33; no. 7; p. 1 |
---|---|
Main Authors: | , , , |
Format: | Journal Article |
Language: | English |
Published: |
Hoboken
Wiley Subscription Services, Inc
10-04-2021
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | Summary
With the increasing popularity of multimedia technology and the prevalence of various smart electronic devices, severe security problems have recently arisen in information and communication systems. The image maintenance can be treated as a typical example of cloud storage outsourcing as images require much more storage space than text documents. An image encryption method with high efficiency is crucial to preserve the privacy of sensitive and critical images in cloud‐edge communications. Compressive sensing (CS) is capable of reconstructing compressible or sparse signals using fewer measurements than traditional methods when the support of the signals is unobtainable in advance. Encryption methods based on CS decrease resources demands during signal acquisition and protect the image data to avoid theft of confidential information by malicious users. Moreover, the CS‐based encryption method can achieve the encryption and the compression of an image simultaneously. Recently, a considerable amount of work using CS theory has been reported. However, most of the existing methods result in recovered images with unsatisfactory quality and employ a massive measurement matrix as the encryption key. This paper proposes an encryption scheme for images on cloud based on a single‐round dictionary and chaotic sequences. Both the experimental and analytical results verify the proposed scheme's effectiveness, high level of security, and substantial image quality improvement after decryption. |
---|---|
AbstractList | With the increasing popularity of multimedia technology and the prevalence of various smart electronic devices, severe security problems have recently arisen in information and communication systems. The image maintenance can be treated as a typical example of cloud storage outsourcing as images require much more storage space than text documents. An image encryption method with high efficiency is crucial to preserve the privacy of sensitive and critical images in cloud‐edge communications. Compressive sensing (CS) is capable of reconstructing compressible or sparse signals using fewer measurements than traditional methods when the support of the signals is unobtainable in advance. Encryption methods based on CS decrease resources demands during signal acquisition and protect the image data to avoid theft of confidential information by malicious users. Moreover, the CS‐based encryption method can achieve the encryption and the compression of an image simultaneously. Recently, a considerable amount of work using CS theory has been reported. However, most of the existing methods result in recovered images with unsatisfactory quality and employ a massive measurement matrix as the encryption key. This paper proposes an encryption scheme for images on cloud based on a single‐round dictionary and chaotic sequences. Both the experimental and analytical results verify the proposed scheme's effectiveness, high level of security, and substantial image quality improvement after decryption. Summary With the increasing popularity of multimedia technology and the prevalence of various smart electronic devices, severe security problems have recently arisen in information and communication systems. The image maintenance can be treated as a typical example of cloud storage outsourcing as images require much more storage space than text documents. An image encryption method with high efficiency is crucial to preserve the privacy of sensitive and critical images in cloud‐edge communications. Compressive sensing (CS) is capable of reconstructing compressible or sparse signals using fewer measurements than traditional methods when the support of the signals is unobtainable in advance. Encryption methods based on CS decrease resources demands during signal acquisition and protect the image data to avoid theft of confidential information by malicious users. Moreover, the CS‐based encryption method can achieve the encryption and the compression of an image simultaneously. Recently, a considerable amount of work using CS theory has been reported. However, most of the existing methods result in recovered images with unsatisfactory quality and employ a massive measurement matrix as the encryption key. This paper proposes an encryption scheme for images on cloud based on a single‐round dictionary and chaotic sequences. Both the experimental and analytical results verify the proposed scheme's effectiveness, high level of security, and substantial image quality improvement after decryption. Summary With the increasing popularity of multimedia technology and the prevalence of various smart electronic devices, severe security problems have recently arisen in information and communication systems. The image maintenance can be treated as a typical example of cloud storage outsourcing as images require much more storage space than text documents. An image encryption method with high efficiency is crucial to preserve the privacy of sensitive and critical images in cloud‐edge communications. Compressive sensing (CS) is capable of reconstructing compressible or sparse signals using fewer measurements than traditional methods when the support of the signals is unobtainable in advance. Encryption methods based on CS decrease resources demands during signal acquisition and protect the image data to avoid theft of confidential information by malicious users. Moreover, the CS‐based encryption method can achieve the encryption and the compression of an image simultaneously. Recently, a considerable amount of work using CS theory has been reported. However, most of the existing methods result in recovered images with unsatisfactory quality and employ a massive measurement matrix as the encryption key. This paper proposes an encryption scheme for images on cloud based on a single‐round dictionary and chaotic sequences. Both the experimental and analytical results verify the proposed scheme's effectiveness, high level of security, and substantial image quality improvement after decryption. |
Author | Song, Bin Li, Yinghua Yu, He Chen, Jinjun |
Author_xml | – sequence: 1 givenname: Yinghua surname: Li fullname: Li, Yinghua organization: Xidian University – sequence: 2 givenname: He surname: Yu fullname: Yu, He organization: Sun Yat‐sen University – sequence: 3 givenname: Bin orcidid: 0000-0002-8096-3370 surname: Song fullname: Song, Bin email: bsong@mail.xidian.edu.cn organization: Xidian University – sequence: 4 givenname: Jinjun surname: Chen fullname: Chen, Jinjun organization: Swinburne University of Technology |
BookMark | eNp1kEtOwzAQhi1UJNqCxBEssWGT4kcezRJVpVSqBAvYYjn2pLhK7WAnQt1xBM7ISXAoYsdqZjTfPP5_gkbWWUDokpIZJYTdqBZmGZ2zEzSmGWcJyXk6-stZfoYmIewIoZRwOkYv673cAgar_KHtjLO4kgE0jonEwdhtA18fn971VmNt1EBIf8AylupVus4oHOCtj_MQsLFYNa6PLbdv-y5On6PTWjYBLn7jFD3fLZ8W98nmYbVe3G4Sxcr4WDpnuQRQdV5rSZgCyaIYznVZ0SqvM5KWVNOaMVpxmktZ6TwtimKueAFaRYlTdHXc23oXvwmd2Lne23hSsIyULGUkG6jrI6W8C8FDLVpv9lGPoEQM7ononhjci2hyRN9NA4d_ObF4XP7w38ubc60 |
CitedBy_id | crossref_primary_10_1002_cpe_6773 crossref_primary_10_1002_cpe_7620 crossref_primary_10_1002_cpe_7983 crossref_primary_10_1002_cpe_7464 crossref_primary_10_1002_cpe_6495 crossref_primary_10_1002_cpe_7067 crossref_primary_10_1002_cpe_7980 crossref_primary_10_1002_cpe_6535 crossref_primary_10_1002_cpe_7624 crossref_primary_10_1002_cpe_6655 crossref_primary_10_1002_cpe_5565 crossref_primary_10_1002_cpe_7984 crossref_primary_10_1002_cpe_7060 crossref_primary_10_1016_j_jpdc_2019_09_009 crossref_primary_10_1002_cpe_7869 crossref_primary_10_1002_cpe_5447 crossref_primary_10_1002_cpe_6812 crossref_primary_10_1002_cpe_6818 crossref_primary_10_1002_cpe_7059 crossref_primary_10_1002_cpe_7851 crossref_primary_10_1117_1_JEI_32_5_052303 crossref_primary_10_1002_cpe_7177 crossref_primary_10_1002_cpe_7331 crossref_primary_10_1002_cpe_5435 crossref_primary_10_1002_cpe_7975 crossref_primary_10_1002_cpe_7051 crossref_primary_10_1002_cpe_7170 crossref_primary_10_1002_cpe_8022 crossref_primary_10_1002_cpe_7055 crossref_primary_10_1002_cpe_6481 crossref_primary_10_1002_cpe_7246 crossref_primary_10_1002_cpe_6430 crossref_primary_10_1002_cpe_7486 crossref_primary_10_1002_cpe_5462 crossref_primary_10_1002_cpe_7525 crossref_primary_10_1002_cpe_6710 crossref_primary_10_1002_cpe_6797 crossref_primary_10_1002_cpe_8053 crossref_primary_10_1145_3331174 crossref_primary_10_1002_cpe_6782 crossref_primary_10_1002_cpe_7474 crossref_primary_10_1007_s11042_023_15958_x crossref_primary_10_1002_cpe_7238 crossref_primary_10_1002_cpe_7513 crossref_primary_10_1002_cpe_7479 crossref_primary_10_1002_cpe_8045 crossref_primary_10_1002_cpe_7919 crossref_primary_10_1002_cpe_6669 crossref_primary_10_1002_cpe_7301 crossref_primary_10_1002_cpe_6574 crossref_primary_10_1002_cpe_8079 crossref_primary_10_1002_cpe_5765 crossref_primary_10_1002_cpe_6699 crossref_primary_10_1002_cpe_5367 crossref_primary_10_1109_ACCESS_2023_3276723 crossref_primary_10_1002_cpe_7947 crossref_primary_10_1002_cpe_7704 crossref_primary_10_1002_cpe_6614 crossref_primary_10_1002_cpe_7824 crossref_primary_10_1016_j_jpdc_2019_03_010 crossref_primary_10_1002_cpe_6564 crossref_primary_10_1002_ett_4034 crossref_primary_10_1002_cpe_7530 crossref_primary_10_1002_cpe_5599 crossref_primary_10_1002_cpe_7932 crossref_primary_10_1002_cpe_8102 crossref_primary_10_1002_cpe_6720 crossref_primary_10_1002_cpe_8103 crossref_primary_10_1016_j_cose_2023_103095 crossref_primary_10_1002_cpe_7370 crossref_primary_10_1002_cpe_7491 crossref_primary_10_1109_COMST_2019_2944748 crossref_primary_10_1002_cpe_7131 crossref_primary_10_1007_s11042_023_14438_6 crossref_primary_10_1109_ACCESS_2023_3341103 crossref_primary_10_1002_cpe_6723 crossref_primary_10_1002_cpe_7201 crossref_primary_10_1002_cpe_7844 crossref_primary_10_1002_cpe_8015 crossref_primary_10_1002_cpe_6994 crossref_primary_10_3390_electronics10091066 crossref_primary_10_1002_cpe_7561 crossref_primary_10_1007_s41478_023_00627_x crossref_primary_10_1002_cpe_7560 crossref_primary_10_1002_cpe_7162 crossref_primary_10_1109_TKDE_2019_2949309 crossref_primary_10_1002_cpe_7846 crossref_primary_10_1002_cpe_7845 crossref_primary_10_1002_cpe_6518 crossref_primary_10_1002_cpe_7037 crossref_primary_10_1002_cpe_8006 crossref_primary_10_1002_cpe_7315 crossref_primary_10_1002_cpe_6461 crossref_primary_10_1002_cpe_7395 crossref_primary_10_1002_cpe_7670 crossref_primary_10_1002_cpe_7030 crossref_primary_10_1002_cpe_6504 crossref_primary_10_1002_cpe_7714 crossref_primary_10_1002_cpe_6904 crossref_primary_10_1109_TMC_2022_3208420 |
Cites_doi | 10.1137/070703983 10.1109/IWCIT.2013.6555751 10.1002/cpa.20124 10.1109/ICC.2005.1494554 10.1109/TIFS.2015.2450676 10.1109/TIFS.2016.2590944 10.1109/TIFS.2013.2295032 10.1007/s10915-012-9616-5 10.1016/j.optcom.2010.03.064 10.1016/j.optcom.2011.02.066 10.1109/TIT.2006.871582 10.1007/s11227-008-0184-2 10.1016/j.jss.2012.04.002 10.1016/j.jvcir.2013.08.007 10.1007/978-3-319-49583-5_50 10.1109/TSG.2012.2212730 10.1109/TCYB.2017.2682561 10.1364/AO.54.001782 10.1109/TIT.2006.885507 10.1007/978-1-4614-4544-9 10.1016/j.ijleo.2014.06.054 10.1109/TMM.2016.2581593 10.1109/ITW.2011.6089519 10.1109/MILCOM.2008.4753187 10.1016/j.ins.2013.04.009 10.1145/2545883 10.1016/j.image.2015.09.001 10.1016/j.optlastec.2014.02.015 10.1109/TELFOR.2012.6419328 10.1109/TIFS.2015.2493982 10.1109/ICASSP.2014.6854351 10.1007/s12596-013-0147-8 10.1137/080725891 10.1109/ALLERTON.2008.4797641 10.1109/TMM.2016.2564100 10.1145/2903717 10.1109/MSP.2007.914731 10.1109/MWC.2016.7553030 10.1109/IIHMSP.2011.53 10.1007/978-3-642-11799-2_28 10.1016/j.chaos.2006.11.009 10.1109/TCSVT.2008.928225 10.1109/ACCESS.2016.2569421 10.1007/s11042-012-1337-0 10.1109/TIT.2005.862083 10.1016/j.neucom.2016.04.053 10.1109/JSYST.2014.2300535 10.1109/ACCESS.2014.2362522 10.1109/ISCAS.2015.7169254 |
ContentType | Journal Article |
Copyright | 2019 John Wiley & Sons, Ltd. 2021 John Wiley & Sons, Ltd. |
Copyright_xml | – notice: 2019 John Wiley & Sons, Ltd. – notice: 2021 John Wiley & Sons, Ltd. |
DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1002/cpe.5182 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1532-0634 |
EndPage | 1 |
ExternalDocumentID | 10_1002_cpe_5182 CPE5182 |
Genre | article |
GrantInformation_xml | – fundername: National Natural Science Foundation of China funderid: 61772387; 61802296 – fundername: Fundamental Research Funds of Ministry of Education and China Mobile funderid: MCM20170202 – fundername: China Postdoctoral Science Foundation funderid: 2017M620438 |
GroupedDBID | .3N .DC .GA 05W 0R~ 10A 1L6 1OC 33P 3SF 3WU 4.4 50Y 50Z 51W 51X 52M 52N 52O 52P 52S 52T 52U 52W 52X 5GY 5VS 66C 702 7PT 8-0 8-1 8-3 8-4 8-5 8UM 930 A03 AAESR AAEVG AAHHS AANLZ AAONW AAXRX AAZKR ABCQN ABCUV ABEML ABIJN ACAHQ ACCFJ ACCZN ACPOU ACSCC ACXBN ACXQS ADBBV ADEOM ADIZJ ADKYN ADMGS ADOZA ADXAS ADZMN ADZOD AEEZP AEIGN AEIMD AEQDE AEUQT AEUYR AFBPY AFFPM AFGKR AFPWT AHBTC AITYG AIURR AIWBW AJBDE AJXKR ALMA_UNASSIGNED_HOLDINGS ALUQN AMBMR AMYDB ATUGU AUFTA AZBYB BAFTC BDRZF BFHJK BHBCM BMNLL BROTX BRXPI BY8 CS3 D-E D-F DCZOG DPXWK DR2 DRFUL DRSTM EBS F00 F01 F04 F5P G-S G.N GNP GODZA HGLYW HHY HZ~ IX1 JPC KQQ LATKE LAW LC2 LC3 LEEKS LH4 LITHE LOXES LP6 LP7 LUTES LYRES MEWTI MK4 MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM N04 N05 N9A O66 O9- OIG P2W P2X P4D PQQKQ Q.N Q11 QB0 QRW R.K ROL RWI RX1 SUPJJ TN5 UB1 V2E W8V W99 WBKPD WIH WIK WOHZO WQJ WRC WXSBR WYISQ WZISG XG1 XV2 ~IA ~WT AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c2932-4826aeecf6fda02cea210033d9b1b6f50491d1f221b316aabd647778c37edc063 |
IEDL.DBID | 33P |
ISSN | 1532-0626 |
IngestDate | Thu Oct 10 17:53:18 EDT 2024 Fri Aug 23 04:43:58 EDT 2024 Sat Aug 24 01:04:29 EDT 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 7 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c2932-4826aeecf6fda02cea210033d9b1b6f50491d1f221b316aabd647778c37edc063 |
ORCID | 0000-0002-8096-3370 |
PQID | 2509242056 |
PQPubID | 2045170 |
PageCount | 1 |
ParticipantIDs | proquest_journals_2509242056 crossref_primary_10_1002_cpe_5182 wiley_primary_10_1002_cpe_5182_CPE5182 |
PublicationCentury | 2000 |
PublicationDate | 10 April 2021 |
PublicationDateYYYYMMDD | 2021-04-10 |
PublicationDate_xml | – month: 04 year: 2021 text: 10 April 2021 day: 10 |
PublicationDecade | 2020 |
PublicationPlace | Hoboken |
PublicationPlace_xml | – name: Hoboken |
PublicationTitle | Concurrency and computation |
PublicationYear | 2021 |
Publisher | Wiley Subscription Services, Inc |
Publisher_xml | – name: Wiley Subscription Services, Inc |
References | 2015; 37 2006; 52 2015; 39 2015; 5 2012 2011 2010 2013; 24 2008; 18 2008; 38 2006; 59 2015; 10 2015; 54 2016; 10 2008 2014; 47 2007 2006; 3 2005 2016; 205 2010; 283 2016; 18 2008; 1 2014; 62 2014; 258 2018; 48 2014; 43 2016; 12 2016; 11 2016; 4 2012; 3 2014; 2 2013; 54 2015; 63 2008; 25 2008; 45 2016 2015 2014 2013 2014; 9 2011; 284 2009; 2 2014; 72 2014; 125 2016; 23 2012; 85 e_1_2_9_31_1 e_1_2_9_52_1 e_1_2_9_50_1 e_1_2_9_10_1 e_1_2_9_35_1 e_1_2_9_56_1 e_1_2_9_12_1 e_1_2_9_54_1 Li J (e_1_2_9_8_1) 2015; 5 e_1_2_9_14_1 e_1_2_9_39_1 e_1_2_9_16_1 e_1_2_9_37_1 e_1_2_9_18_1 e_1_2_9_41_1 e_1_2_9_20_1 e_1_2_9_22_1 e_1_2_9_45_1 e_1_2_9_24_1 e_1_2_9_43_1 Cambareri V (e_1_2_9_47_1) 2015; 63 e_1_2_9_6_1 e_1_2_9_4_1 e_1_2_9_2_1 Shah RJ (e_1_2_9_3_1) 2014; 2 e_1_2_9_26_1 e_1_2_9_49_1 e_1_2_9_28_1 Candes EJ (e_1_2_9_11_1) 2006 e_1_2_9_30_1 e_1_2_9_53_1 e_1_2_9_51_1 e_1_2_9_34_1 e_1_2_9_57_1 e_1_2_9_13_1 e_1_2_9_32_1 e_1_2_9_55_1 Xiao D (e_1_2_9_33_1) 2015; 37 e_1_2_9_15_1 e_1_2_9_38_1 e_1_2_9_17_1 e_1_2_9_36_1 e_1_2_9_19_1 e_1_2_9_42_1 e_1_2_9_40_1 e_1_2_9_21_1 e_1_2_9_46_1 e_1_2_9_23_1 e_1_2_9_44_1 e_1_2_9_7_1 e_1_2_9_5_1 e_1_2_9_9_1 e_1_2_9_25_1 e_1_2_9_27_1 e_1_2_9_48_1 e_1_2_9_29_1 |
References_xml | – year: 2011 – volume: 25 start-page: 21 issue: 2 year: 2008 end-page: 30 article-title: An introduction to compressive sampling publication-title: IEEE Signal Process Mag – volume: 9 start-page: 208 issue: 2 year: 2014 end-page: 220 article-title: Role‐dependent privacy preservation for secure V2G networks in the smart grid publication-title: IEEE Trans Inf Forensics Secur – volume: 12 issue: 4s year: 2016 article-title: Image encryption based on compressive sensing and scrambled index for secure multimedia transmission publication-title: ACM Trans Multimed Comput Commun Appl – volume: 63 start-page: 2183 issue: 9 year: 2015 end-page: 2195 article-title: Low‐complexity multiclass encryption by compressed sensing publication-title: IEEE Trans Signal Process – volume: 85 start-page: 2077 issue: 9 year: 2012 end-page: 2085 article-title: Cryptanalyzing a chaos‐based image encryption algorithm using alternate structure publication-title: J Syst Softw – volume: 2 start-page: 1477 issue: 5 year: 2014 end-page: 1481 article-title: Multimedia security techniques publication-title: Int J Innov Res Electr Electron Instrum Control Eng – year: 2005 – volume: 52 start-page: 5406 issue: 12 year: 2006 end-page: 5425 article-title: Near‐optimal signal recovery from random projections: universal encoding strategies? publication-title: IEEE Trans Inf Theory – volume: 39 start-page: 202 year: 2015 end-page: 211 article-title: Robust coding of encrypted images via structural matrix publication-title: Signal Process Image Commun – volume: 11 start-page: 2594 issue: 11 year: 2016 end-page: 2608 article-title: A privacy‐preserving and copy‐deterrence content‐based image retrieval scheme in cloud computing publication-title: IEEE Trans Inf Forensics Secur – volume: 258 start-page: 403 year: 2014 end-page: 415 article-title: Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications publication-title: Inf Sci – volume: 24 start-page: 1232 issue: 8 year: 2013 end-page: 1242 article-title: Dictionary learning based reconstruction for distributed compressed video sensing publication-title: J Vis Commun Image Represent – year: 2014 – volume: 18 start-page: 1297 issue: 7 year: 2016 end-page: 1304 article-title: Significance evaluation of video data over media cloud based on compressed sensing publication-title: IEEE Trans Multimed – volume: 2 start-page: 323 issue: 2 year: 2009 end-page: 343 article-title: The split Bregman method for L1‐regularized problems publication-title: SIAM J Imaging Sci – volume: 10 start-page: 1125 issue: 3 year: 2016 end-page: 1136 article-title: A novel sensory data processing framework to integrate sensor networks with mobile cloud publication-title: IEEE Syst J – volume: 10 start-page: 2182 issue: 10 year: 2015 end-page: 2195 article-title: On known‐plaintext attacks to a compressed sensing‐based encryption: a quantitative analysis publication-title: IEEE Trans Inf Forensics Secur – volume: 52 start-page: 1289 issue: 4 year: 2006 end-page: 1306 article-title: Compressed sensing publication-title: IEEE Trans Inf Theory – volume: 18 start-page: 1168 issue: 8 year: 2008 end-page: 1174 article-title: Scrambling for privacy protection in video surveillance systems publication-title: IEEE Trans Circuits Syst Video Technol – year: 2008 – start-page: 480 year: 2010 end-page: 497 – start-page: 644 year: 2016 end-page: 657 – volume: 38 start-page: 213 issue: 1 year: 2008 end-page: 220 article-title: Image encryption based on a new total shuffling algorithm publication-title: Chaos Solit Fractals – volume: 62 start-page: 152 year: 2014 end-page: 160 article-title: Novel image compression‐encryption hybrid algorithm based on key‐controlled measurement matrix in compressive sensing publication-title: Opt Laser Technol – volume: 283 start-page: 3037 issue: 15 year: 2010 end-page: 3042 article-title: Novel image encryption algorithm based on multiple‐parameter discrete fractional random transform publication-title: Opt Commun – volume: 18 start-page: 1720 issue: 9 year: 2016 end-page: 1732 article-title: Bi‐level protected compressive sampling publication-title: IEEE Trans Multimed – year: 2015 – volume: 48 start-page: 1163 issue: 4 year: 2018 end-page: 1175 article-title: On the security of a class of diffusion mechanisms for image encryption publication-title: IEEE Trans Cybern – volume: 4 start-page: 2507 year: 2016 end-page: 2519 article-title: A review of compressive sensing in information security field publication-title: IEEE Access – volume: 205 start-page: 472 year: 2016 end-page: 480 article-title: Embedding cryptographic features in compressive sensing publication-title: Neurocomputing – volume: 72 start-page: 71 issue: 1 year: 2014 end-page: 93 article-title: A parallel image encryption method based on compressive sensing publication-title: Multimed Tools Appl – volume: 11 start-page: 313 issue: 2 year: 2016 end-page: 327 article-title: Analysis of one‐time random projections for privacy preserving compressed sensing publication-title: IEEE Trans Inf Forensics Secur – volume: 1 start-page: 143 year: 2008 end-page: 168 article-title: Bregman iterative algorithms for ‐minimization with applications to compressed sensing publication-title: SIAM J Imaging Sci – year: 2007 – volume: 125 start-page: 5075 issue: 18 year: 2014 end-page: 5080 article-title: Novel hybrid image compression‐encryption algorithm based on compressive sensing publication-title: Optik‐Int J Light Electron Opt – volume: 59 start-page: 1207 issue: 8 year: 2006 end-page: 1223 article-title: Stable signal recovery from incomplete and inaccurate measurements publication-title: Commun Pure Appl Math – volume: 47 issue: 1 year: 2014 article-title: Security and privacy protection in visual sensor networks: a survey publication-title: ACM Comput Surv – volume: 45 start-page: 44 issue: 1 year: 2008 end-page: 65 article-title: Scalable and efficient key management for heterogeneous sensor networks publication-title: J Supercomput – year: 2012 – volume: 23 start-page: 82 issue: 4 year: 2016 end-page: 89 article-title: Social vehicle swarms: a novel perspective on socially aware vehicular communication architecture publication-title: IEEE Wirel Commun – volume: 52 start-page: 489 issue: 2 year: 2006 end-page: 509 article-title: Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information publication-title: IEEE Trans Inf Theory – volume: 54 start-page: 1782 issue: 7 year: 2015 end-page: 1793 article-title: Compressive sensing based robust multispectral double‐image encryption publication-title: Appl Opt – volume: 284 start-page: 2789 issue: 12 year: 2011 end-page: 2796 article-title: Novel single‐channel color image encryption algorithm based on chaos and fractional fourier transform publication-title: Opt Commun – volume: 43 start-page: 1 issue: 1 year: 2014 end-page: 17 article-title: A novel approach for secure compressive sensing of images using multiple chaotic maps publication-title: J Opt – volume: 3 start-page: 1722 issue: 4 year: 2012 end-page: 1733 article-title: Aggregated‐proofs based privacy‐preserving authentication for V2G networks in the smart grid publication-title: IEEE Trans Smart Grid – volume: 37 start-page: 1248 issue: 5 year: 2015 end-page: 1254 article-title: Robust and separable watermarking algorithm in encrypted image based on compressive sensing publication-title: J Electron Inf Technol – volume: 54 start-page: 684 issue: 2‐3 year: 2013 end-page: 695 article-title: Error forgetting of Bregman iteration publication-title: J Sci Comput – volume: 2 start-page: 1149 year: 2014 end-page: 1176 article-title: Information security in big data: privacy and data mining publication-title: IEEE Access – volume: 5 year: 2015 article-title: Compressive optical image encryption publication-title: Sci Rep – volume: 3 start-page: 1433 year: 2006 end-page: 1452 – year: 2013 – ident: e_1_2_9_48_1 doi: 10.1137/070703983 – ident: e_1_2_9_18_1 doi: 10.1109/IWCIT.2013.6555751 – ident: e_1_2_9_14_1 doi: 10.1002/cpa.20124 – ident: e_1_2_9_31_1 doi: 10.1109/ICC.2005.1494554 – ident: e_1_2_9_20_1 doi: 10.1109/TIFS.2015.2450676 – ident: e_1_2_9_2_1 doi: 10.1109/TIFS.2016.2590944 – ident: e_1_2_9_23_1 doi: 10.1109/TIFS.2013.2295032 – ident: e_1_2_9_50_1 doi: 10.1007/s10915-012-9616-5 – ident: e_1_2_9_42_1 doi: 10.1016/j.optcom.2010.03.064 – ident: e_1_2_9_43_1 doi: 10.1016/j.optcom.2011.02.066 – ident: e_1_2_9_12_1 doi: 10.1109/TIT.2006.871582 – ident: e_1_2_9_22_1 doi: 10.1007/s11227-008-0184-2 – ident: e_1_2_9_38_1 doi: 10.1016/j.jss.2012.04.002 – ident: e_1_2_9_51_1 doi: 10.1016/j.jvcir.2013.08.007 – volume: 5 year: 2015 ident: e_1_2_9_8_1 article-title: Compressive optical image encryption publication-title: Sci Rep contributor: fullname: Li J – ident: e_1_2_9_53_1 doi: 10.1007/978-3-319-49583-5_50 – ident: e_1_2_9_25_1 doi: 10.1109/TSG.2012.2212730 – ident: e_1_2_9_39_1 doi: 10.1109/TCYB.2017.2682561 – ident: e_1_2_9_34_1 doi: 10.1364/AO.54.001782 – ident: e_1_2_9_16_1 doi: 10.1109/TIT.2006.885507 – ident: e_1_2_9_46_1 – ident: e_1_2_9_56_1 doi: 10.1007/978-1-4614-4544-9 – ident: e_1_2_9_45_1 doi: 10.1016/j.ijleo.2014.06.054 – volume: 2 start-page: 1477 issue: 5 year: 2014 ident: e_1_2_9_3_1 article-title: Multimedia security techniques publication-title: Int J Innov Res Electr Electron Instrum Control Eng contributor: fullname: Shah RJ – ident: e_1_2_9_15_1 doi: 10.1109/TMM.2016.2581593 – volume: 37 start-page: 1248 issue: 5 year: 2015 ident: e_1_2_9_33_1 article-title: Robust and separable watermarking algorithm in encrypted image based on compressive sensing publication-title: J Electron Inf Technol contributor: fullname: Xiao D – ident: e_1_2_9_19_1 doi: 10.1109/ITW.2011.6089519 – ident: e_1_2_9_27_1 doi: 10.1109/MILCOM.2008.4753187 – ident: e_1_2_9_21_1 doi: 10.1016/j.ins.2013.04.009 – ident: e_1_2_9_5_1 doi: 10.1145/2545883 – ident: e_1_2_9_29_1 doi: 10.1016/j.image.2015.09.001 – ident: e_1_2_9_44_1 doi: 10.1016/j.optlastec.2014.02.015 – ident: e_1_2_9_26_1 doi: 10.1109/TELFOR.2012.6419328 – ident: e_1_2_9_36_1 doi: 10.1109/TIFS.2015.2493982 – ident: e_1_2_9_35_1 doi: 10.1109/ICASSP.2014.6854351 – ident: e_1_2_9_9_1 doi: 10.1007/s12596-013-0147-8 – ident: e_1_2_9_49_1 doi: 10.1137/080725891 – ident: e_1_2_9_17_1 doi: 10.1109/ALLERTON.2008.4797641 – ident: e_1_2_9_52_1 doi: 10.1109/TMM.2016.2564100 – volume: 63 start-page: 2183 issue: 9 year: 2015 ident: e_1_2_9_47_1 article-title: Low‐complexity multiclass encryption by compressed sensing publication-title: IEEE Trans Signal Process contributor: fullname: Cambareri V – ident: e_1_2_9_57_1 doi: 10.1145/2903717 – ident: e_1_2_9_13_1 doi: 10.1109/MSP.2007.914731 – ident: e_1_2_9_7_1 doi: 10.1109/MWC.2016.7553030 – ident: e_1_2_9_32_1 doi: 10.1109/IIHMSP.2011.53 – ident: e_1_2_9_30_1 doi: 10.1007/978-3-642-11799-2_28 – ident: e_1_2_9_40_1 – ident: e_1_2_9_54_1 doi: 10.1016/j.chaos.2006.11.009 – ident: e_1_2_9_6_1 doi: 10.1109/TCSVT.2008.928225 – ident: e_1_2_9_10_1 doi: 10.1109/ACCESS.2016.2569421 – ident: e_1_2_9_55_1 doi: 10.1007/s11042-012-1337-0 – ident: e_1_2_9_28_1 doi: 10.1109/TIT.2005.862083 – ident: e_1_2_9_41_1 doi: 10.1016/j.neucom.2016.04.053 – ident: e_1_2_9_24_1 doi: 10.1109/JSYST.2014.2300535 – ident: e_1_2_9_4_1 doi: 10.1109/ACCESS.2014.2362522 – ident: e_1_2_9_37_1 doi: 10.1109/ISCAS.2015.7169254 – start-page: 1433 volume-title: Proceedings of the International Congress of Mathematicians: Madrid, August 22‐30, 2006 year: 2006 ident: e_1_2_9_11_1 contributor: fullname: Candes EJ |
SSID | ssj0011031 |
Score | 2.6120574 |
Snippet | Summary
With the increasing popularity of multimedia technology and the prevalence of various smart electronic devices, severe security problems have recently... Summary With the increasing popularity of multimedia technology and the prevalence of various smart electronic devices, severe security problems have recently... With the increasing popularity of multimedia technology and the prevalence of various smart electronic devices, severe security problems have recently arisen... |
SourceID | proquest crossref wiley |
SourceType | Aggregation Database Publisher |
StartPage | 1 |
SubjectTerms | chaotic sequence Cloud computing Communications systems Compressibility compressive sampling Data storage Dictionaries dictionary Electronic devices Encryption Image acquisition Image compression image encryption Image quality Image reconstruction Information storage Multimedia random permutation Security Theft |
Title | Image encryption based on a single‐round dictionary and chaotic sequences in cloud computing |
URI | https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fcpe.5182 https://www.proquest.com/docview/2509242056 |
Volume | 33 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV29TsMwED5BJxbKrygUZCTEZmo7bdqwodKqLKgSIDER-VdUKmnV0oGNR-AZeRLOTtLCgITElESJHeviu_vO8X0HcCbjhEv0C5Qro2hTME1l0vF0d4kwnn_PBbqmwV379rFz3fM0OZdlLkzOD7FccPOaEey1V3Cp5o0Vaaie2osWomM0vxgkhOyNaLj8geCrF-RUqYIyBO0l7ywTjbLhT0-0gpffQWrwMv3qf8a3BZsFtiRX-WTYhjWb7UC1rNtACjXehaebF7QiBC9mb8FiEO_LDMETSfzawdh-vn_MfMElYkYh8QGHQSRe6mc5wd7Jcgc2GWVEjycLvBXeg6334KHfu-8OaFFngWp09oI2McSQ1moXOyOZ0FZiHMiiyCSKq9i1MIjghjshuIp4LKUyPnu13dFR2xqNGGcfKtkkswdAUNIW-2y2ZITukQuFcMRxbSKpYuaYrsFpKfN0mtNppDlxskhRYKkXWA3q5cdIC4Wap4jUMFIUCNdqcB7E_mv7tDvs-ePhXx88gg3hd6p4BkdWh8rrbGGPYX1uFidhUn0BPo3PBA |
link.rule.ids | 315,782,786,1408,27935,27936,46066,46490 |
linkProvider | Wiley-Blackwell |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT8JAEJ4oHvQiPiOKuibGW6W7LYXGk0EIRCQkYuLJzb4aSbAQkIM3f4K_0V_ibB-gBxMTT-2m3UemOzvfbHe-ATgXQUgF2gWHSi0dn7nKEWHd0t2FTFv-vSiha2rf13qP9Zumpcm5ymNhUn6IxYab1YxkvbYKbjekK0vWUDUxl1WEx6uw5gd-aPM2eF5_8QvB5i9IyVKZ4yJsz5lnXVbJa_60RUuA-R2mJnamVfzXCLdgM4OX5DqdD9uwYuIdKOapG0imybvw1HnBhYRgYfqWLBrEmjNN8EYQu30wMp_vH1Obc4noYRL7gOMgAovqWYyxdbI4hE2GMVGj8RwfJf1g7T14aDUHjbaTpVpwFNp75vjoZQhjVBREWrhMGYGuoOt5OpRUBlEV_QiqacQYlR4NhJDaBrDW6sqrGa0Q5uxDIR7H5gAIitpgm35VeGghKZOISCKqtCdk4EauKsFZLnQ-SRk1eMqdzDgKjFuBlaCcfw2e6dSMI1hDZ5EhYivBRSL3X-vzRr9pr4d_ffEU1tuDuy7vdnq3R7DB7MEVS-jolqHwOp2bY1id6flJMsO-AEya0yU |
linkToPdf | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8NAEB60gnixPrFadQXxFru7SdPGm_RBi1IKKngy7CtYqGlp7cGbP8Hf6C9xdtO0ehAET8mS7IPJzs43m51vAM5FGDGBdsFjUksv4FR5IqpburuIa8u_lzi6ps5drfdYb7YsTc5VHguT8UMsNtysZrj12ir4WCeVJWmoGpvLKqLjVVgLLAq34Rt-f_EHwaYvyLhSuUcRtefEs5RX8po_TdESX35Hqc7MtIv_GeAWbM7BJbnOZsM2rJh0B4p54gYy1-NdeOq-4DJCsDB5c0sGscZME7wRxG4eDM3n-8fEZlwieuAiH3AYRGBRPYsRtk4WR7DJICVqOJrhI9cP1t6Dh3brvtHx5okWPIXWnnsB-hjCGJWEiRaUKyPQEaS-ryPJZJhU0YtgmiWcM-mzUAipbfhqra78mtEKQc4-FNJRag6AoKQNthlUhY_2kXGJeCRhSvtChjShqgRnuczjccanEWfMyTxGgcVWYCUo5x8jnmvUNEaohq4iR7xWggsn9l_rx41-y14P__riKaz3m-34ttu7OYINbk-tWDZHWobC62RmjmF1qmcnbn59Afuz0dQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Image+encryption+based+on+a+single%E2%80%90round+dictionary+and+chaotic+sequences+in+cloud+computing&rft.jtitle=Concurrency+and+computation&rft.au=Li%2C+Yinghua&rft.au=Yu%2C+He&rft.au=Song%2C+Bin&rft.au=Chen%2C+Jinjun&rft.date=2021-04-10&rft.issn=1532-0626&rft.eissn=1532-0634&rft.volume=33&rft.issue=7&rft.spage=1&rft.epage=1&rft_id=info:doi/10.1002%2Fcpe.5182&rft.externalDBID=10.1002%252Fcpe.5182&rft.externalDocID=CPE5182 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1532-0626&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1532-0626&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1532-0626&client=summon |