Image Encryption Scheme Based on Mixed Chaotic Bernoulli Measurement Matrix Block Compressive Sensing
<p>Flowchart of the constructing the measurement matrix based on MCLB sequences.</p> "> Figure 2
<p>Reconstructed images with different measurement matrices at a compression ratio of 0.3. (<b>a</b>) Original image; (<b>b</b>) GM reconstructed image; (<b>c</b>) BM reconstructed image; (<b>d</b>) LBM reconstructed image; (<b>e</b>) CBM reconstructed image; (<b>f</b>) MCLBM reconstructed image.</p> "> Figure 3
<p>PSNR using different measurement matrices at different compression ratios.</p> "> Figure 4
<p>The proposed image encryption and decryption process.</p> "> Figure 5
<p>Simulation results. (<b>a1</b>–<b>a4</b>) Plaintext images; (<b>b1</b>–<b>b4</b>) ciphertext images; (<b>c1</b>–<b>c4</b>) decrypted images.</p> "> Figure 5 Cont.
<p>Simulation results. (<b>a1</b>–<b>a4</b>) Plaintext images; (<b>b1</b>–<b>b4</b>) ciphertext images; (<b>c1</b>–<b>c4</b>) decrypted images.</p> "> Figure 6
<p>PSNR of reconstructed images with different compression ratios.</p> "> Figure 7
<p>Results of wrong key encryption and decryption. (<b>a</b>) The plaintext image; (<b>b</b>–<b>e</b>) encrypted plaintext images using K, K<sub>0</sub>, K<sub>1</sub>, and K<sub>2</sub>, respectively; (<b>f</b>) Difference image of encrypted image ciphertext using K and K<sub>0</sub>; (<b>g</b>) Difference image of encrypted image ciphertext using K and K<sub>1</sub>; (<b>h</b>) Difference image of encrypted image ciphertext using K and K<sub>2</sub>; (<b>i</b>) Decrypt the (<b>b</b>) ciphertext image using K; (<b>j</b>–<b>l</b>) Decrypt the (b) ciphertext image using K<sub>0</sub>, K<sub>1</sub>, and K<sub>2</sub>, respectively.</p> "> Figure 7 Cont.
<p>Results of wrong key encryption and decryption. (<b>a</b>) The plaintext image; (<b>b</b>–<b>e</b>) encrypted plaintext images using K, K<sub>0</sub>, K<sub>1</sub>, and K<sub>2</sub>, respectively; (<b>f</b>) Difference image of encrypted image ciphertext using K and K<sub>0</sub>; (<b>g</b>) Difference image of encrypted image ciphertext using K and K<sub>1</sub>; (<b>h</b>) Difference image of encrypted image ciphertext using K and K<sub>2</sub>; (<b>i</b>) Decrypt the (<b>b</b>) ciphertext image using K; (<b>j</b>–<b>l</b>) Decrypt the (b) ciphertext image using K<sub>0</sub>, K<sub>1</sub>, and K<sub>2</sub>, respectively.</p> "> Figure 8
<p>Histograms of the original and encrypted images. (<b>a</b>) Plaintext histogram of Lena; (<b>b</b>) plaintext histogram of Peppers; (<b>c</b>) plaintext histogram of Cell; (<b>d</b>) plaintext histogram of X-ray; (<b>e</b>) ciphertext histogram of Lena; (<b>f</b>) ciphertext histogram of Peppers; (<b>g</b>) ciphertext histogram of Cell; (<b>h</b>) ciphertext histograms of X-ray.</p> "> Figure 9
<p>Distribution of adjacent pixels. (<b>a</b>) Plaintext horizontal adjacent pixels; (<b>b</b>) Plaintext vertical adjacent pixels; (<b>c</b>) Plaintext diagonal adjacent pixels; (<b>d</b>) Ciphertext horizontal adjacent pixels; (<b>e</b>) Ciphertext vertical adjacent pixels; (<b>f</b>) Ciphertext diagonal adjacent pixels.</p> ">
Abstract
:1. Introduction
- A hybrid chaotic sequence measurement matrix satisfying Bernoulli’s property based on Chebyshev map and a logistic map, which is easy to implement in hardware, is designed, and the performance of the resulting measurement matrix is analyzed and applied to BCS.
- The SHA-256 value of the plaintext image is used to calculate the initial value of the chaotic mapping for the encryption algorithm part, which increases the relevance of the algorithm to the plaintext image and improves the ability of the scheme to resist the selective plaintext attack.
- A “no repetition” scrambling algorithm and a Galois domain-based two-way diffusion algorithm are proposed to encrypt the measurement value matrix and improve the security of the BCS framework.
- In the reconstruction stage, the SPL reconstruction algorithm, based on DDWT, is used, which, combined with the hybrid chaotic sequence measurement matrix proposed in this paper, can achieve a much higher reconstruction quality of decrypted images with low compression ratio.
2. Preliminaries
2.1. Block Compressive Sensing
2.2. Measurement Matrix Generation Algorithm
2.2.1. Hybrid Chebyshev–Logistic Bernoulli Sequence
2.2.2. Construction of a Measurement Matrix Based on MCLB Sequence
- Set the parameters , of Equations (4) and (6), and given the initial values , , generate Chebyshev chaotic sequences and logistic chaotic sequences of the desired length iteratively from Equations (4) and (6).
- Binary quantization of the chaotic sequences and using Equations (9) and (10), respectively, to obtain the chaotic spread spectrum sequence and , and XOR operation to generate a hybrid chaotic sequence .
- The mixed chaotic sequence is cyclically shifted by columns to generate a measurement matrix of desired size, which is called the mixed Chebyshev and logistic Bernoulli matrix (MCLBM). Finally, the MCLBM is orthogonalized and normalized to obtain the final measurement matrix.
2.2.3. Simulation Test Based on MCLBM
3. The Proposed Algorithm
3.1. Block Compression Sampling and Quantification Process
- Generate the MCLB sequence , from the steps in Section 2.2.2, and , , .
- Generate a measurement matrix of size by cyclically shifting by columns:
- Express as a row vector as . Let and use Equations (16) and (17) to normalize the row vectors.
- Compress the plaintext image P after blocked and obtain the measurement value of each block.
3.2. Cipher Sequence Generation Algorithm
3.3. Image Encryption Algorithm
- First, keep only one of the recurring pseudo-random numbers in the pseudo-random sequence (i.e., the first occurrence), then add the values in that do not appear in to the end of in descending order, and note . is then used to displace without repetition. is then expanded column-wise into a one-dimensional vector, denoted . Finally, is swapped with to give the disordered matrix .
- Select the first values of the sequence to form the sequence . is obtained by forward diffusion of using as follows.
- Select the values from to of the sequence to form the sequence . Use to perform backward diffusion on to obtain , as follows.
3.4. Image Decryption and Reconstruction Process
- Use the key K to generate the chaotic mapping initial values , , , and , and generate and by Equation (23).
- The received ciphertext image is sequentially subjected to backward diffusion, forward diffusion, and scrambling algorithms to obtain the quantized measurement value matrix .
- The measurement matrix is recovered by inverse quantization of the quantized measurement matrix by the following equation:
- The parameters and the initial value of the MCLB transmitted by the sender are used to iterate and generate the MCLBM, that is, the measurement matrix .
- The DDWT-SPL algorithm is used to reconstruct the recovered measurement matrix to obtain a reconstructed original image of size .
4. Simulation and Performance Analysis
4.1. Image Encryption Algorithm
4.2. Impact of Important Parameters on Encryption and Decryption Performance
5. Statistical Analysis
5.1. Key Space
5.2. Key Sensitivity
5.3. Histogram
5.4. Information Entropy Analysis
5.5. Correlation Analysis
5.6. Choose Plaintext Attack
5.7. Ciphertext Sensitivity
5.8. Time Complexity Analysis
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Li, M.; Xu, M.; Luo, J.; Fan, H. Cryptanalysis of an Image Encryption Using 2D Henon-Sine Map and DNA Approach. IEEE Access 2019, 7, 63336–63345. [Google Scholar] [CrossRef]
- Chai, X.; Gan, Z.; Yuan, K.; Chen, Y.; Liu, X. A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput. Appl. 2019, 31, 219–237. [Google Scholar] [CrossRef]
- Niyat, A.Y.; Moattar, M.H.; Torshiz, M.N. Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt. Lasers Eng. 2017, 90, 225–237. [Google Scholar] [CrossRef]
- Hua, Z.; Yi, S.; Zhou, Y. Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process. 2018, 144, 134–144. [Google Scholar] [CrossRef]
- Wang, X.; Wang, Q. A novel image encryption algorithm based on dynamic S-boxes constructed by chaos. Nonlinear Dyn. 2013, 75, 567–576. [Google Scholar] [CrossRef]
- Liu, H.; Kadir, A. Asymmetric color image encryption scheme using 2D discrete-time map. Signal Process. 2015, 113, 104–112. [Google Scholar] [CrossRef]
- Hu, G.; Li, B. Coupling chaotic system based on unit transform and its applications in image encryption. Signal Process. 2021, 178, 107790. [Google Scholar] [CrossRef]
- Mansouri, A.; Wang, X. A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf. Sci. 2020, 520, 46–62. [Google Scholar] [CrossRef]
- Pak, C.; Huang, L. A new color image encryption using combination of the 1D chaotic map. Signal Process. 2017, 138, 129–137. [Google Scholar] [CrossRef]
- Zhu, C.; Sun, K. Cryptanalyzing and Improving a Novel Color Image Encryption Algorithm Using RT-Enhanced Chaotic Tent Maps. IEEE Access 2018, 6, 18759–18770. [Google Scholar] [CrossRef]
- Wang, X.Y.; Teng, L.; Qin, X. A novel colour image encryption algorithm based on chaos. Signal Process. 2012, 92, 1101–1108. [Google Scholar] [CrossRef]
- Tsafack, N.; Kengne, J.; Abd-El-Atty, B.; Iliyasu, A.M.; Hirota, K.; Abd EL-Latif, A.A. Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption. Inf. Sci. 2020, 515, 191–217. [Google Scholar] [CrossRef]
- Zhang, Z.; Wang, Y.; Zhang, L.Y. A novel chaotic map constructed by geometric operations and its application. Nonlinear Dyn. 2020, 102, 2843–2858. [Google Scholar] [CrossRef]
- Zhou, M.; Wang, C. A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks. Signal Process. 2020, 171, 107484. [Google Scholar] [CrossRef]
- Yu, J.; Li, C.; Song, X.; Guo, S.; Wang, E. Parallel Mixed Image Encryption and Extraction Algorithm Based on Compressed Sensing. Entropy 2021, 23, 278. [Google Scholar] [CrossRef] [PubMed]
- Sun, C.; Wang, E.; Zhao, B. Image Encryption Scheme with Compressed Sensing Based on a New Six-Dimensional Non-Degenerate Discrete Hyperchaotic System and Plaintext-Related Scrambling. Entropy 2021, 23, 291. [Google Scholar] [CrossRef] [PubMed]
- Masood, F.; Driss, M.; Boulila, W.; Ahmad, J.; Rehman, S.U.; Jan, S.U.; Qayyum, A.; Buchanan, W.J. A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations. Wirel. Pers. Commun. 2021, 1–28. [Google Scholar] [CrossRef]
- Liu, L.; Zhang, Q.; Wei, X. A RGB image encryption algorithm based on DNA encoding and chaos map. Comput. Electr. Eng. 2012, 38, 1240–1248. [Google Scholar] [CrossRef] [Green Version]
- Liu, H.; Wang, X.; Kadir, A. Image encryption using DNA complementary rule and chaotic maps. Appl. Soft Comput. J. 2012, 12, 1457–1466. [Google Scholar] [CrossRef]
- Wang, S.; Peng, Q.; Du, B. Chaotic color image encryption based on 4D chaotic maps and DNA sequence. Opt. Laser Technol. 2022, 148, 107753. [Google Scholar] [CrossRef]
- Wei, X.; Guo, L.; Zhang, Q.; Zhang, J.; Lian, S. A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J. Syst. Softw. 2014, 85, 290–299. [Google Scholar] [CrossRef]
- Farah, M.; Farah, A.; Farah, T. An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn. 2020, 99, 3041–3064. [Google Scholar] [CrossRef]
- Zhang, Y. The fast image encryption algorithm based on lifting scheme and chaos. Inf. Sci. 2020, 520, 177–194. [Google Scholar] [CrossRef]
- Naveed, A.A.; Umar, H.; Maria, A.; Hayat, U.; Ayub, M. A Substitution Box Generator, its Analysis, and Applications in Image Encryption. Signal Process. 2021, 187, 108144. [Google Scholar]
- Zhang, W.; Zhu, Z.; Yu, H. A symmetric image encryption algorithm based on a coupled logistic-bernoulli map and cellular automata diffusion strategy. Entropy 2019, 21, 504. [Google Scholar] [CrossRef] [Green Version]
- Ping, P.; Xu, F.; Wang, Z.J. Image encryption based on non-affine and balanced cellular automata. Signal Process. 2014, 105, 419–429. [Google Scholar] [CrossRef]
- Wang, Y.; Zhao, Y.; Zhou, Q.; Lin, Z. Image encryption using partitioned cellular automata. Neurocomputing 2018, 275, 1318–1332. [Google Scholar] [CrossRef]
- Su, Y.; Wo, Y.; Han, G. Reversible cellular automata image encryption for similarity search. Signal Process. Image Commun. 2019, 72, 134–147. [Google Scholar] [CrossRef]
- Fan, C.L.; Ding, Q.; Tse, C.K. Counteracting the dynamical degradation of digital chaos by applying stochastic jump of chaotic orbits. Int. J. Bifurc. Chaos 2019, 29, 1930023. [Google Scholar] [CrossRef]
- Fan, C.L.; Ding, Q. Analysing the dynamics of digital chaotic maps via a new period search algorithm. Nonlinear Dyn. 2019, 97, 831–841. [Google Scholar] [CrossRef]
- Matthews, R. On the derivation of a “Chaotic” encryption algorithm. Cryptologia 1989, 8, 29–41. [Google Scholar] [CrossRef]
- Candes, E.J.; Romberg, J.; Tao, T. Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inf. Theory 2006, 52, 489–509. [Google Scholar] [CrossRef] [Green Version]
- Donoho, D.L. Compressed sensing. IEEE Trans. Inf. Theory 2006, 52, 1289–1306. [Google Scholar] [CrossRef]
- Rachlin, Y.; Baron, D. The Secrecy of Compressed Sensing Measurements. In Proceedings of the 2008 46th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, 23–26 September 2008. [Google Scholar]
- George, S.N.; Pattathil, D.P. A Secure LFSR Based Random Measurement Matrix for Compressive Sensing. Sens. Imaging 2014, 15, 85.1–85.29. [Google Scholar] [CrossRef]
- Gan, H.; Li, Z.; Li, J.; Wang, X.; Cheng, Z. Compressive sensing using chaotic sequence based on Chebyshev map. Nonlinear Dyn. 2014, 78, 2429–2438. [Google Scholar] [CrossRef]
- Cambareri, V.; Mangia, M.; Pareschi, F.; Rovatti, R.; Setti, G. Low-Complexity Multiclass Encryption by Compressed Sensing. IEEE Trans. Signal Process. 2015, 63, 2183–2195. [Google Scholar] [CrossRef]
- Ahmad, J.; Khan, M.A.; Hwang, S.O.; Khan, J.S. A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural Comput. Appl. 2017, 28, 953–967. [Google Scholar] [CrossRef]
- Liu, H.; Liu, Y.B.; Xu, G.X. Securely Compressive Sensing Using Double Random Phase Encoding. Adv. Mater. Res. 2014, 926–930, 3554–3558. [Google Scholar] [CrossRef]
- Gilbert, A.; Indyk, P. Sparse Recovery Using Sparse Matrices. Proc. IEEE 2010, 98, 937–947. [Google Scholar] [CrossRef]
- Lei, Y.; Barbot, J.P.; Gang, Z. Compressive Sensing with Chaotic Sequence. IEEE Signal Process. Lett. 2010, 17, 731–734. [Google Scholar] [CrossRef] [Green Version]
- Ke-Hui, S.; Shao-Bo, H.; Lin-Zi, Y.; Li-Kun, A.; Duo, D.L. Application of FuzzyEn algorithm to the analysis of complexity of chaotic sequence. Acta Phys. Sin. 2012, 61, 130507-379. [Google Scholar] [CrossRef]
- Zhou, W.; Jing, B.; Zhang, H.; Huang, Y.F.; Li, J. Construction of measurement matrix in compressive sensing based on composite chaotic mapping. Acta Electron. Sin. 2017, 45, 2177–2183. [Google Scholar]
- Luo, Y.; Dang, J.J.; Song, Z.X.; Wang, B.P. Construction and performance research of discrete chaotic measurement matrix. Syst. Eng. Electron. 2020, 42, 749–755. [Google Scholar]
- Huang, R.; Rhee, K.H.; Uchida, S. A parallel image encryption method based on compressive sensing. Multimed. Tools Appl. 2014, 72, 71–93. [Google Scholar] [CrossRef]
- Zhu, L.; Song, H.; Zhang, X.; Yan, M.; Zhang, L.; Yan, T. A Novel Image Encryption Scheme Based on Nonuniform Sampling in Block Compressive Sensing. IEEE Access 2019, 7, 22161–22174. [Google Scholar] [CrossRef]
- Sun, L.; Wen, X.; Lei, M.; Xu, H.; Zhu, J.; Wei, Y. Signal Reconstruction Based on Block Compressed Sensing. In International Conference on Artificial Intelligence and Computational Intelligence; Springer: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
- Gan, L. Block Compressed Sensing of Natural Images. In Proceedings of the International Conference on Digital Signal Processing, Cardiff, UK, 1–4 July 2007. [Google Scholar]
- Rezaiifar, Y.C.P.R.; Krishnaprasad, P.S. Orthogonal Matching Pursuit: Recursive Function Approximation with Applications to Wavelet Decomposition. In Proceedings of the 27th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, 1–3 November 1993. [Google Scholar]
- Dai, W.; Milenkovic, O. Subspace Pursuit for Compressive Sensing Signal Reconstruction. IEEE Trans. Inf. Theory 2009, 55, 2230–2249. [Google Scholar] [CrossRef] [Green Version]
- Chen, S.S.; Saunders, D. Atomic Decomposition by Basis Pursuit. Siam Rev. 2001, 43, 129–159. [Google Scholar] [CrossRef] [Green Version]
- Mun, S.; Fowler, J.E. Block compressed sensing of images using directional transforms. In Proceedings of the IEEE International Conference on Image Processing, Cairo, Egypt, 7–10 November 2009. [Google Scholar]
- Zhang, Y.; Zhang, G.; Zhu, Z. A Fast Algorithm of Compressed Sensing for 2D Signals. IETE Tech. Rev. 2016, 33, 455–465. [Google Scholar] [CrossRef]
- Alain, H.; Ziou, D. Image quality metrics: PSNR vs. SSIM. In Proceedings of the 20th International Conference on Pattern Recognition, ICPR 2010, Istanbul, Turkey, 23–26 August 2010. [Google Scholar]
- Gan, Z.; Chai, X.; Zhang, J.; Zhang, Y.; Chen, Y. An effective image compression–encryption scheme based on compressive sensing (CS) and game of life (GOL). Neural Comput. Appl. 2020, 32, 14113–14141. [Google Scholar] [CrossRef]
- Wang, X.; Su, Y. Image encryption based on compressed sensing and DNA encoding. Signal Process. Image Commun. 2021, 12, 116246. [Google Scholar] [CrossRef]
- Wen, W.; Hong, Y.; Fang, Y.; Li, M.; Li, M. A Visually Secure Image Encryption Scheme based on Semi-Tensor Product Compressed Sensing. Signal Process. 2020, 173, 107580. [Google Scholar] [CrossRef]
- Wang, H.; Xiao, D.; Li, M.; Xiang, Y.; Li, X. A visually secure image encryption scheme based on parallel compressive sensing. Signal Process. 2019, 155, 218–232. [Google Scholar] [CrossRef]
- Mirzaei, O.; Yaghoobi, M.; Irani, H. A new image encryption method: Parallel sub-image encryption with hyper chaos. Nonlinear Dyn. 2012, 67, 557–566. [Google Scholar] [CrossRef]
- Zhu, C.; Wang, G.; Sun, K. Cryptanalysis and Improvement on an Image Encryption Algorithm Design Using a Novel Chaos Based S-Box. Symmetry 2018, 10, 9. [Google Scholar] [CrossRef] [Green Version]
- Shi, Y.; Hu, Y.; Wang, B. Image Encryption Scheme Based on Multiscale Block Compressed Sensing and Markov Model. Entropy 2021, 23, 1297. [Google Scholar] [CrossRef]
Measurement Matrix | PSNR/dB | Time/s |
---|---|---|
GM | 32.82 | 3.50 |
BM | 32.25 | 3.70 |
LBM | 32.45 | 3.21 |
CBM | 32.57 | 3.56 |
MCLBM | 33.82 | 3.18 |
Block Size | PSNR/dB | Time/s |
---|---|---|
32 × 32 | 32.7265 | 8.955823 |
64 × 64 | 32.9089 | 12.1209232 |
128 × 128 | 33.1612 | 153.747594 |
Image | CR | Ours | Reference [55] | Reference [56] |
---|---|---|---|---|
Lena | 0.25 | 32.7265 | 31.4240 | \ |
Peppers | 32.9463 | 30.6809 | \ | |
Lena | 0.5 | 36.7805 | 33.2299 | 23.3608 |
Peppers | 36.4142 | 32.1889 | 27.3366 | |
Lena | 0.75 | 41.0781 | 34.1313 | 34.7149 |
Peppers | 40.1133 | 33.1721 | 35.8463 |
Secret Keys | K and K0 | K and K1 | K and K2 |
---|---|---|---|
NPCR (%) | 99.6223 | 99.6074 | 99.6013 |
UACI (%) | 33.4190 | 33.4347 | 33.3847 |
Secret Keys | K and K0 | K and K1 | K and K2 |
---|---|---|---|
NPCR (%) | 99.5671 | 99.5725 | 99.6372 |
CR | Lena | Peppers | Cell | X-ray |
---|---|---|---|---|
0.25 | 7.9972 | 7.9971 | 7.9975 | 7.9975 |
0.5 | 7.9986 | 7.9988 | 7.9986 | 7.9983 |
0.75 | 7.9990 | 7.9990 | 7.9991 | 7.9989 |
Direction | Lenna | Peppers | Cell | X-ray | ||||
---|---|---|---|---|---|---|---|---|
Plaintext | Ciphertext | Plaintext | Ciphertext | Plaintext | Ciphertext | Plaintext | Ciphertext | |
Horizontal | 0.9845 | −0.0032 | 0.9751 | 0.0075 | 0.9893 | 0.0163 | 0.9985 | 0.0410 |
Vertical | 0.9746 | 0.0123 | 0.9763 | 0.0129 | 0.9904 | −0.0059 | 0.9976 | −0.0148 |
Diagonal | 0.9703 | −0.0071 | 0.9649 | −0.0051 | 0.9792 | 0.0215 | 0.9964 | −0.0082 |
Images | NPCR (%) | UACI (%) |
---|---|---|
Lena | 99.6246 | 33.5234 |
Peppers | 99.6109 | 33.4788 |
Cell | 99.6265 | 33.4929 |
X-ray | 99.6147 | 33.4934 |
Images | Lena | Peppers | ||
---|---|---|---|---|
Process | Encryption | Decryption | Encryption | Decryption |
CR = 0.25 | 1.007266 | 7.948557 | 0.903141 | 7.736676 |
CR = 0.5 | 1.344250 | 5.933346 | 1.190280 | 6.051189 |
CR = 0.75 | 1.640416 | 3.167031 | 1.956602 | 3.195703 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yang, C.; Pan, P.; Ding, Q. Image Encryption Scheme Based on Mixed Chaotic Bernoulli Measurement Matrix Block Compressive Sensing. Entropy 2022, 24, 273. https://doi.org/10.3390/e24020273
Yang C, Pan P, Ding Q. Image Encryption Scheme Based on Mixed Chaotic Bernoulli Measurement Matrix Block Compressive Sensing. Entropy. 2022; 24(2):273. https://doi.org/10.3390/e24020273
Chicago/Turabian StyleYang, Chen, Ping Pan, and Qun Ding. 2022. "Image Encryption Scheme Based on Mixed Chaotic Bernoulli Measurement Matrix Block Compressive Sensing" Entropy 24, no. 2: 273. https://doi.org/10.3390/e24020273