Openly accessible

A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model

Liu, Z, Wang, Y, Zhang, Leo Yu and Ma, J 2021, A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model, Security and Communication Networks, pp. 1-21, doi: 10.1155/2021/6625579.

Attached Files
Name Description MIMEType Size Downloads

Title A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model
Author(s) Liu, Z
Wang, Y
Zhang, Leo YuORCID iD for Zhang, Leo Yu orcid.org/0000-0001-9330-2662
Ma, J
Journal name Security and Communication Networks
Article ID 6625579
Start page 1
End page 21
Total pages 21
Publisher Hindawi
Place of publication London, Eng.
Publication date 2021
ISSN 1939-0114
1939-0122
Summary The digital image, as the critical component of information transmission and storage, has been widely used in the fields of big data, cloud and frog computing, Internet of things, and so on. Due to large amounts of private information in the digital image, the image protection is fairly essential, and the designing of the encryption image scheme has become a hot issue in recent years. In this paper, to resolve the shortcoming that the probability density distribution (PDD) of the chaotic sequences generated in the original two-dimensional coupled map lattice (2D CML) model is uneven, we firstly proposed an improved 2D CML model according to adding the offsets for each node after every iteration of the original model, which possesses much better chaotic performance than the original one, and also its chaotic sequences become uniform. Based on the improved 2D CML model, we designed a compressive image encryption scheme. Under the condition of different keys, the uniform chaotic sequences generated by the improved 2D CML model are utilized for compressing, confusing, and diffusing, respectively. Meanwhile, the message authentication code (MAC) is employed for guaranteeing that the encryption image be integration. Finally, theoretical analysis and simulation tests both demonstrate that the proposed image encryption scheme owns outstanding statistical, well encryption performance, and high security. It has great potential for ensuring the digital image security in application.
Language eng
DOI 10.1155/2021/6625579
Indigenous content off
Field of Research 0802 Computation Theory and Mathematics
0805 Distributed Computing
0899 Other Information and Computing Sciences
HERDC Research category C1 Refereed article in a scholarly journal
Free to Read? Yes
Persistent URL http://hdl.handle.net/10536/DRO/DU:30150184

Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 22 Abstract Views, 0 File Downloads  -  Detailed Statistics
Created: Tue, 20 Apr 2021, 07:34:37 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.