Joint image compression and encryption based on sparse Bayesian learning and bit-level 3D Arnold cat maps
Authors:
Xinsheng Li aff001; Taiyong Li aff002; Jiang Wu aff002; Zhilong Xie aff002; Jiayi Shi aff002
Authors place of work:
College of Computer Science, Sichuan University, China
aff001; School of Economic Information Engineering, Southwestern University of Finance and Economics, China
aff002
Published in the journal:
PLoS ONE 14(11)
Category:
Research Article
doi:
https://doi.org/10.1371/journal.pone.0224382
Summary
Image compression and image encryption are two essential tasks in image processing. The former aims to reduce the cost for storage or transmission of images while the latter aims to change the positions or values of pixels to protect image content. Nowadays, an increasing number of researchers are focusing on the combination of these two tasks. In this paper, we propose a novel joint image compression and encryption approach that integrates a quantum chaotic system, sparse Bayesian learning (SBL) and a bit-level 3D Arnold cat map, so-called QSBLA, for such a purpose. Specifically, the QSBLA consists of 6 stages. First, a quantum chaotic system is employed to generate chaotic sequences for subsequent compression and encryption. Second, as one method of compressive sensing, SBL is used to compress images. Third, an operation of diffusion is performed on the compressed image. Fourth, the compressed and diffused image is transformed into several bit-level cubes. Fifth, 3D Arnold cat maps are used to permute each bit-level cube. Finally, all the bit-level cubes are integrated and transformed into a 2D pixel-level image, resulting in the compressed and encrypted image. Extensive experiments on 8 publicly-accessed images demonstrate that the proposed QSBLA is superior or comparable to some state-of-the-art approaches in terms of several measurement indices, indicating that the QSBLA is promising for joint image compression and encryption.
Keywords:
Algorithms – Imaging techniques – Permutation – Image processing – Cryptography – Baboons – Compressed sensing – Chaotic systems
1 Introduction
Images can provide rich information to human vision systems and have become one of the most important ways to transfer information. Currently, thousands of millions of images are produced every day, determining how to efficiently store and transmit such a large number of images is a very challenging task. Due to the bulky data capacity of images, the bytes occupied by images must be reduced to facilitate storage and transmission. The high redundancy and strong correlation that usually exist in an image afford possibilities for image compression. The discrete cosine transform (DCT), discrete Fourier transform (DFT), discrete wavelet transform (DWT), and so on, are widely-used image compression methods [1–3], and some of them have become parts of standards of image compression. Image compression is a trending topic in image processing, and so is image encryption.
Image encryption uses techniques to change the image contents in order to prevent unauthorized people from seeing particularly meaningful contents in the images. Much research has been devoted to image encryption in recent years [4, 5]. Due to the properties of chaotic systems, such as pseudorandomness, unpredictability, ergodicity, and extreme sensitivity to parameters and initial values, chaos-based image encryption has become very popular among image encryption approaches [6, 7]. Individual low-dimensional chaotic systems are easy to crack and hence decrease the security of image encryption. To cope with this issue, possible ways include combining two or more low-dimensional chaotic systems [8, 9], adopting high-dimensional chaotic systems [10], using fractional-order chaotic systems [11, 12], and so on. Recent research has shown that some quantum chaotic systems can achieve good encryption performance, partly because of the extremely sensitive dependence to the initial conditions and/or parameters of quantum chaos [13, 14]. With the chaotic sequences, some schemes such as Latin cubes, S-Box, Arnold cat maps, and so on, can be used to change the positions and/or values of image contents and hence encrypt images [4, 15–17].
Although image compression and image encryption are usually treated as two separate tasks, it is reasonable to combine these two tasks to reduce the image sizes and to prevent the privacy of images from leaking simultaneously. Therefore, it is necessary to study joint image compression and encryption, so-called JICE. In recent decades, JICE has been one of the most acclaimed topics in the field of image processing and information security. Li et al. used a tree structure for JICE in mobile wireless environments [18], while Ou et al. used FPGA to improve a JICE system [19]. To achieve good performance, Yuen et al. integrated a chaotic system, DCT, the Secure Hash Algorithm-1 (SHA-1) and Huffman encoding for JICE, and the experiments confirmed that the presented scheme was efficient for both image compression and encryption [20]. Tong et al. proposed a JICE approach with high security, a good compression effect and high encryption speed by combining DWT and a cross-chaotic map [21]. Li and Lo put forward a JICE scheme based on the JPEG standard, which generated a new orthogonal transform by embedding an additional rotation angle into the 8 × 8 DCT’s flow graph [22]. Zhang and Tong proposed a new joint lossless image encryption and compression approach by combining the integer wavelet transform and set partitioning in hierarchical trees (SPIHT), and the experiments demonstrated that the proposed scheme was able to achieve high security and ideal lossless compression performance [23]. Landir et al. put forward a robust JICE scheme using SPIHT and chaotic maps with noninteger order [24].
Compressive sensing (CS), also referred to as compressive sampling, compressed sensing, or sparse sampling, is an emerging technique in the signal processing community that addresses signal reconstruction by finding sparse solutions to an underdetermined linear system [25–27]. The sparsity of the solutions can be used for compression, so CS has been widely applied for JICE. For example, Zhou et al. used the partial Hadamard matrix controlled by chaotic maps as a measurement matrix for scrambling, and the experimental results demonstrated the validity and reliability of the proposed scheme [28]. The authors also used key-controlled measurement matrix in CS for JICE, and the simulation results demonstrated the scheme was effective and secure [29]. Liu et al. put forward a novel JICE algorithm with fusion for multi-modal images [30]. Zhang et al. proposed a JICE scheme for medical images by CS with a chaos-based Bernoulli measurement matrix and pixel-swapping permutation [31]. A secure and robust JICE algorithm was proposed by integrating DWT, memristive chaotic system, CS and elementary cellular automata (ECA) [32]. Chai et al. used wavelet transformation, zigzag operations, CS and chaos-based measurement matrices to compress and encrypt images [33]. Other JICE approaches with CS and chaotic systems are associated with the Fibonacci-Lucas transform [34], the optimized tensor CS and 3D Lorenz system [35], the 2D CS with a discrete fractional random transform [36], and so on [37–40].
As one type of CS, sparse Bayesian learning (SBL) has shown its superiority in physiological signal analysis [41–43], pattern recognition [44], visual tracking [45] and time series forecasting [46–50] since it was proposed [51, 52]. The existing study has shown that SBL has many advantages over some other compressive sensing models [44, 52, 53]. Regarding image encryption, diffusion and permutation are two typical types of operations that change the values and the positions of pixels in images, respectively [54, 55]. Image compression is naturally an operation of diffusion because it can encode the original images into images with fewer sizes. The Arnold cat map is a popular way to permute the pixels for image encryption [56–59]. As far as the processing unit is concerned, image encryption is usually performed on blocks of pixels, at the pixel level, DNA level (two bits) and bit level. Generally speaking, for a fixed processing power, encryption on lower-level data often involves more pixels to ensure better encryption results can be achieved [15, 60].
Inspired by the extreme sensitivity of quantum chaos, compression ability of CS and permutation power of Arnold, this paper proposes a novel approach that integrates a quantum chaotic system, sparse Bayesian learning and a bit-level 3D Arnold cat map, namely, QSBLA, for joint image compression and encryption. Specifically, the proposed QSBLA consists of 6 stages: 1) a quantum chaotic system is employed to generate a chaotic sequence for subsequent different operations of compression and encryption; 2) SBL is used to compress the original image; 3) a diffusion operation called CDCP is performed on the compressed image; 4) the compressed and diffused image is transformed into a bit-level cuboid, and then, the cuboid is reshaped to one or more bit-level cubes; 5) for each bit-level cube, a 3D Arnold cat map is applied to permute the bits; and 6) all the bit-level cubes are integrated into a bit-level cuboid and then transformed into a pixel-level compressed and encrypted image. The QSBLA is applied to eight publicly accessed test images, and the results indicate that it can achieve good compression performance and has the ability to resist several types of attacks.
The remainder of this paper is structured as follows. Section 2 describes some concepts of the proposed approach. The QSBLA approach is proposed in detail in Section 3. Then, we report and analyze the experimental results in Section 4. Finally, we conclude the paper in Section 5.
2 Preliminaries
2.1 Quantum chaotic system
A quantum logistic map can be constructed with quantum corrections, as dissipative quantum systems are often coupled to a path of harmonic oscillators [13, 14]. It has been shown that a chaotic map can be created through the very lowest-order quantum corrections by Eq (1) [13]. where x′ = 〈α〉, y′ = 〈δα + δα〉, z′ = 〈δαδα〉. δα shows a quantum fluctuation about 〈α〉, and β is a dissipation parameter. Usually, x n ′, y n ′ and z n ′ are complex numbers with x n ′ * of the complex conjugate of x n ′, similarly for z n ′. After setting r and β, we can iterate Eq (1) with initial parameters x 0 , y 0 , z 0 , x 0 * and z 0 * to produce a chaos sequence. In the experiment, once x0, y0 and z0 are set to real numbers, x 0 * and z 0 * are the same as x0 and z0, and then they will be replaced by x0 and z0.
Iterating Eq (2) with real initial parameters x0, y0, z0 and the real constant ϵ, the chaos sequence of real numbers is produced.
2.2 Arnold cat map
Arnold’s cat map is one of the well-known chaotic maps, and the name was from the fact that Vladimir Arnold demonstrated its effects on an image of a cat in the 1960s [61, 62]. When applying the map to encrypt an image, the image appears to be randomly permuted. However, if the map is repeated a certain number of times, the original image will appear again. The 2D Arnold cat map, formulated as Eq (3), has been widely used in image encryption. where a and b are two specified positive integers, (x′, y′) is the new position of the original image position (x, y), and N is the size of the original square image. By adding two extra parameters c and d, we can obtain a 3D Arnold cat map, as defined by Eq (4): where a, b, c and d are four specified positive integers, N is the size of the cubic image, and x, y, and z represent the original positions in the direction of height, width and depth, respectively. Likewise, x′, y′ and z′ stand for the new positions in the direction of height, width and depth, respectively.
Accordingly, the inverse transformation of Eq (4) can be formulated as Eq (5).
3 QSBLA: The proposed joint image compression and encryption approach
3.1 Quantum chaotic sequence generation
The quantum chaotic sequence of QSBLA is generated from Eqs (1) and (2). When the parameters (ϵ, r, β) = (0.001, 8, 3.32) and initial values (x0, y0, z0) = (0.4239, 0.0239, 0.0239) for Eqs (1) and (2), the attractors of the quantum chaotic system are shown in Fig 1. r is a very important parameter that affects the attractors’ distribution area in the quantum chaotic system significantly, which can be lines or random points. Fig 1 shows that the map has good chaotic characteristics and randomness. In quantum chaotic theory, chaos cannot be measured in the same way as defined in classical dynamics (i.e., through Lyapunov exponents) because the evolution operator in quantum mechanics is coupled. Here, Fig 1 verifies the chaotic property of the quantum system by the random distribution of the points.
Then, sequence K is composed of x n ′, y n ′, z n ′, formulated as Eq (6).
The purposes of the sequence K for JICE are twofold: (1) sorting the subsequence of K to obtain the index of the original data for permutation and diffusion; and (2) using the subsequence of K to form the measurement matrix for SBL. In the proposed approach, the i-th point in K is mapped to the integral range of [0, 255] by Eq (7) for both purposes. where mod and |⋅| are the modulo and the absolute value operation respectively, and ⌊⋅⌋ denotes the flooring operation [12]. The discretization through Eq (7) can improve the randomness of K to enhance the encryption.
3.2 Sparse bayesian learning
Sparse Bayesian learning (SBL) was first proposed for regression and classification by Tipping in 2001, and its main idea is to obtain sufficiently sparse solutions from the data in a mapped high-dimensional space via kernel-tricks by a Bayesian framework [51]. Later, the nonkernel SBL was proposed and widely applied to signal recovery, compressive sensing and sparse representation [41, 52].
From the perspective of compressive sensing, if the sparsity exists in the original signal or in its corresponding transform domains, the high-dimensional signal has the potential to be projected into a low-dimensional space by a dictionary (also known as a measurement matrix) to achieve compression [32]. Moreover, the original signal can then be recovered as close as possible via the compressed signal.
Mathematically, sparse signal recovery can be defined by Eq (8): where Θ ∈ RP×Q is a measurement matrix with P samples and each has Q features, and y = [y1, y2, ⋯, yP]T is a target vector, ϵ is noise and x = [x1, x2, ⋯, xQ]T is the vector to be resolved to quantify the weights of the columns in Φ. SBL aims to seek a vector x that has as many zero entities as possible while it still approximates the targets y accurately [48, 52].
With an approximative zero-mean Gaussian noise (ϵ in Eq (8)) with unknown variance σ2, the framework of SBL assumes the Gaussian likelihood model as Eq (9):
Now, the task of seeking maximum likelihood estimates for x is transformed into the task of seeking the minimum ℓ2-norm solution to Eq (8). However, it can usually find nonsparse solutions. To cope with this issue, the SBL estimates a parameterized prior, instead of using a fixed prior as adopted in some other compressive sensing approaches, over weights from the data by Eq (10): where γ = [γ1, γ2, ⋯, γQ]T is a vector to control the prior variance of each weight, and Q hyperparameters need to be estimated in total. There are two key steps to estimate these hyperparameters, i.e., marginalizing over the weights as well as performing the maximum likelihood optimization algorithm.
When compared with other CS algorithms, SBL has the following advantages: 1) The recovery performance is robust to the characteristics of the measurement matrix; 2) SBL usually outperforms some other CS algorithm regarding local and global convergence; 3) The solutions of SBL are sparser than those of LASSO-type algorithms; and 4) Some robust learning rules can be used to automatically estimate the regularization term of SBL to achieve good results of compressive sensing. Therefore, SBL is suitable for image compression [44, 53]. For more details, interested readers can refer to [52].
3.3 SBL-based image compression
The traditional image lossy compression methods, such as FT, DCT, DWT and so on, have been successfully applied to some compression standards such as JPEG, MPEG, H.26X and so on. With ever-increasing applications of these methods, some of their disadvantages have emerged. For example, when the compression ratio (CR) is very high, the decompression image will have such extensive obvious rectangle block shapes that difficulties in introducing human visual characteristics arise. Therefore, improving the quality of decompression images, increasing the CR and speeding up the encoding and decoding procedure are consistent directions followed by researchers.
CS can efficiently reconstruct a signal from very few samples by finding solutions to underdetermined linear systems.
This signal technique fully exploits the sparsity of a signal to compress information when receiving.
For a given sparse signal x of length N, it can be expressed as Eq (11): where s is a transform coefficient vector of length M (M ≪ N), and Ψ is an orthogonal transform matrix, also known as a sparse basis matrix.
Assuming ϵ = 0, Eq (8) is deduced to as follows where Φ is called the measurement matrix as in Section 3.2. In the scheme, sparse signals s represent the plain image I. The sparse representation of original signals s by Ψ is executed by DCT. The measurement matrix Φ is formed by the random integers from the quantum chaotic sequence K, and Φ is rescaled within [−0.5, 0.5] by the following Eq (13).
Thus, for a pixel-level image I with size of h × w and different compression ratios CR = r, 0 < r < 1, we choose the top r × h rows from the image after the sparse representation result to compress it. Then, the size of Ψ is h × h, and the size of Φ is rh × h.
After the transformation of I with ΦΨ, the data type of y is double. The y has to be stored as an unsigned 8-bit integer. Here, we need to map y within [0, 255] and record the rounded result as integers by Eq (14). By doing so, we can save 50% of the storage space for the encrypted image and one pixel only needs a one-byte space. Therefore, the maximum and minimum of y need to be stored as keys.
Finally, the steps of SBL compression are the following.
-
Step 1: Generate a sparse representation matrix Ψ.
-
Step 2: Generate a measurement matrix Φ and scale it by Eq (13).
-
Step 3: Generate a compressed image y by Eq (12) and map y to [0, 255] by Eq (14).
In contrast, the steps of SBL decompression are listed below:
-
Step 1: Rescale y to the real numbers within the original minimum and maximum.
-
Step 2: Generate the measurement matrix Φ in the same way from K and scale it within [−0.5, 0.5].
-
Step 3: Likewise, generate the sparse transformation matrix Ψ with DCT.
-
Step 4: Compose Θ = ΦΨ.
-
Step 5: Learn μ through y and Θ by SBL.
-
Step 6: Recover I ^ = s ^ = Ψ T μ. Here, I ^ is the reconstructed lossy image.
Moreover, the pseudo code of SBL compression and decompression is demonstrated in Algorithm 1 and Algorithm 2 which provide more details of SBL-based image compression.
3.4 Bit-level 3D Arnold cat map
Since the 3D Arnold cat map transformation can be conducted on cubes only, an image has to be reshaped to one or several cubes before encryption. For a pixel-level image with a size of h × w, where h and w indicate the height and width of the image, respectively, we first transform it into a bit-level cubic with a size of h × w × 8. Then, we transform the bit-level cubic into one or more cubes using a previously proposed I2C algorithm [15]. For example, a pixel-level image with size 512 × 512 can be transformed into a bit-level cubic with a size 512 × 512 × 8, and then it can be further transformed into a bit-level cube with size 128 × 128 × 128. Similarly, a 256 × 256 pixel-level image can be transformed into 2 64 × 64 × 64 bit-level cubes.
Once we obtain the cube(s), bit-level permutation can be conducted via the 3D Arnold cat map defined by Eq (4). For example, given a 3 × 3 × 3 input cube and parameters (a, b, c, d) = (1, 2, 3, 4), the original 27 positions are 000, 001, 002, ⋯, 222. With the 3D Arnold cat map permutation, we can obtain new values for the 27 positions by (0,0,0) → (0,0,0), (0,0,1) → (1,0,0), ⋯, (2,2,2) → (1,2,0), i.e., the value on the left side of the arrow is moved to the corresponding right side, as shown in Fig 2:
3.5 QSBLA: The proposed joint image compression and encryption approach
The flowchart of the QSBLA is shown in Fig 3. After generating the quantum chaotic sequence, the JICE procedure consists of five steps: 1) SBL compression, 2) ciphertext diffusion in the crisscross pattern (CDCP) diffusion [54], 3) transformation from a 2D pixel-level image to bit-level cubes [15], 4) 3D Arnold cat map permutation, and 5) transformation from bit-level cubes to a 2D pixel-level image. The diffusion aims to change the pixel values while the permutation aims to rearrange the positions of bits.
The procedure of the proposed QSBLA is described in detail as follows:
-
Step 1: Generating the quantum chaotic sequence: Generate the quantum chaotic sequence with initial keys by Eqs (1) and (2).
-
Step 2: SBL compression: Compress the plain image through Eq (8) detailed in Section 3.3. The DCT transformation is used for sparse representation. Measurement matrix Φ is composed of the chaotic sequence K.
-
Step 3: CDCP diffusion: Conduct CDCP operations on the compressed image following the steps in [54].
-
Step 4: Transformation from a 2D pixel-level image to bit-level cubes: Use the I2C algorithm proposed in [15] to transform the 2D pixel-level compressed and diffused image to several bit-level cubes for the convenience of the subsequent 3D Arnold cat map.
-
Step 5: 3D Arnold cat map permutation: For each bit-level cube, the 3D Arnold cat map is used to permute the bits as in Section 3.4. Since the permutation on bits can result in the change of corresponding pixel values, such an operation also has the effect of diffusion.
-
Step 6: Transformation from bit-level cubes to a 2D pixel-level image: All the bit-level cubes are first merged into a bit-level cuboid, and then the cuboid is transformed to a pixel-level 2D image, i.e., the compressed and encrypted image.
The decryption and decompression is the inverse procedure of the compression and encryption. In addition, the pseudo codes of the QSBLA and the corresponding decryption and decompression procedures are listed in detail in Algorithm 1 and Algorithm 2, respectively.
Algorithm 1 QSBLA Compression and Encryption
Input: K (Chaos sequence), I (Plain image), CR (Compression Rate)
Output: C (The compressed and encrypted image)
1: Begin:
2: //SBL Compression
3: [h, w] ← size(I)
4: N ← CR × h
5: ψ ← Generate the DCT transform matrix of size (w, h)
6: α ← ψ × I
7: ϕ ← K by Eq (13)
8: y1 ← ϕ × ψ × α by Eq (12)
9: y2 ← Scale y1 by Eq (14)
10: //Encryption
11: cd ← Conduct CDCP on y2 as in [54]
12: b ← Perform bit XOR on cd with K
13: bm ← Transform pixel b to a bit matrix as in [15]
14: cu ← Divide bit matrix bm to cubes as in [15]
15: mp ← Permutate cubes cu by 3D Arnold cat map with K as in Section 3.4
16: C ← Transform mp to a pixel image
17: return C
18: End
Algorithm 2 QSBLA Decryption and Decompression
Input: K (Chaos sequence), C (Compressed and encrypted image), CR (Compression Rate), ymax/ymin (Maximum/minimum of y1 in Algorithm 1)
OutPut: I ^ ( R e c o v e r e d i m a g e )
1: Begin:
2: //Decryption
3: bm ← Transform the compressed and encrypted pixel image C to a bit matrix as in [15]
4: cu← Divide the bit matrix bm to cubes as in [15]
5: mp← Reversely permutate cubes cu by 3D Arnold cat map with K as in Section 3.4
6: Ia ← Transform mp to a pixel image
7: b← Perform bit XOR on Ia with K
8: Ic ← Reversely conduct CDCP on b as in [54]
9: //SBL Decompression
10: [N, w] ← size(Ic)
11: h ← N/CR
12: ψ ← Generate the DCT transform matrix of size (w, h)
13: ϕ ← K by Eq (13)
14: y1 ← Reversely scale Ic, ymax, and ymin by the inverse function of Eq (14)
15: θ ← ϕ × ψ
16: μ← Recover signal from y1 and θ as in Section 3.4
17: I ^ ← ψ T × μ
18: return I ^
19: End
4 Experimental results
4.1 Experimental settings
To measure the performance of the QSBLA, some state-of-the-art image encryption approaches, such as CDCP [54], the hyperchaotic and DNA sequence-based method (HC-DNA) [63], a class hyperchaos-based scheme (CHC) [55], and an image cipher scheme with block-based scrambling and image filtering (IC-BSIF) [64], are tested with some popular evaluation indices. We also compare with some popular compression and encryption schemes for some specific images with some evaluation indices. The parameters for the above schemes are set as those in the corresponding papers. The parameters of the QSBLA are described as the following. The initial parameters for the quantum chaotic system are x0 = 0.4239, y0 = 0.0239 and z0 = 0.0239. Additionally, the other parameters are ϵ = 0.001, r = 3.99 and β = 6.
The original integral chaotic sequence generated by the quantum chaotic equations is adopted from the point at which it begins, that is to say, the start position of the chaotic sequence is 1.
The round of the Arnold transformation is also set to 1. If necessary, the start position of the sequence and the rounds of the Arnold cat map can be also used as the security keys.
To demonstrate the performance of the proposed QSBLA, we use 8 images for experiments. The names and sizes of the testing images are listed in Table 1. All the images are publicly-accessed and are very popular in the literature on image processing [65–67].
In the experiments, we use the structural similarity (SSIM) and the peak signal-to-noise ratio (PSNR) for compression effect analysis, the key space and sensitivity for security key analysis, histogram, information entropy and correlation for statistical analysis, the number of pixels change rate (NPCR) and the unified average changing intensity (UACI) for differential attack analysis, and noise and data loss for robustness analysis. Furthermore, we analyze known-plaintext and chosen-plaintext attacks, as well as computation time.
All the experiments were conducted with MATLAB 2016b on a 64-bit Windows 7 with 8 GB memory and an i3 CPU at 3.4 GHz.
4.2 Encrypted images and decrypted images
With the QSBLA, the encryption images of Finger, Cameraman and Barbara, and their corresponding recovered images are shown in Figs 4–6, respectively. From the first column to the third column, their CRs are 0.25, 0.5 and 0.75. The heights of compressed and encrypted images are 1/4, 1/2 and 3/4 of their corresponding original images, as shown in the first row. The second row shows the corresponding recovered images from the first row.
As can be seen from Figs 4–6, when the CR increases, the recovered images gradually achieve better quality. When CR = 0.75, it is hard to find out the difference between the plain images and the corresponding recovered images based on human vision.
When we compare the results of Cameraman by QSBLA and those by Ref. [29], we can find that the pixels in compressed and encrypted image by QSBLA distribute more uniformly than those by Ref. [29]. At the same time, the quality of the recovered Cameraman by QSBLA is better than that by Ref. [29]. Similar results can be found from the results of Barbara by QSBLA and those by Ref. [32].
4.3 The effect of the compression
4.3.1 Structural similarity (SSIM)
The structural similarity index (SSIM) defined with Eq (15) is used to measure the quality of the decompression and decryption image [60]. where x and y are two images, μx and μy are the average values of x and y, σ x 2 and σ y 2 are the variance of x and y, respectively, and σxy is the covariance of x and y. In addition, C1 = (0.01 × L)2, C2 = (0.03 × L)2, where L = 255 is the gray level of the pixel value. The smaller the SSIM is, the greater the difference of both images and the less the similarity.
The SSIM values of the testing images by the proposed QSBLA are shown in Table 2. From this table, with the compression ratio increasing, the variation of SSIM are consistent with the compression data storage, showing that lower CR results in lower quality of the recovered image. Although the values of SSIM in Table 2 are all less than 0.9, the decompression and decryption images in Figs 4 to 6 appear very similar to the results in Ref. [29] and Ref. [32], whose mean SSIM (MSSIM) is greater than 0.96.
4.3.2 Peak signal-to-noise ratio (PSNR)
The peak signal-to-noise ratio (PSNR) is a widely used index to quantify the similarity between the plain image and the recovered image after processing to judge the effectiveness of compression, which is computed by Eqs (16) and (17) [60]. where I(i, j) and E(i, j) are the pixel gray values of the plain image and the recovered image, respectively, the MSE is the mean variance of the plain image and the recovered image, N = w × h is the pixel number of the image, and w and h is the width and height of the image, respectively.
The PSNR of the QSBLA is compared with the methods of Ref. [29] and Ref. [32], and the results are listed in Table 3. From Table 3, it can be seen that the PSNR by the QSBLA with the image Cameraman increases steadily as the CR varies from 0.25 to 0.75. Although the PSNR values of Cameraman by QSBLA are not as good as those of Ref. [29] and Ref. [32], they are very close to the best results, showing that the proposed QSBLA is comparable to the competitive approaches in terms of the compression effect.
4.4 Security key analysis
An effective encryption scheme should be extremely sensitive to any small changes in its security key and has an enough large key space. Therefore, key space and sensitivity to the security key are two important factors in image encryption. Both a large key space and extreme sensitivity is very helpful to resist any brute-force attacks.
4.4.1 Key space
The security keys of the proposed QSBLA include 6 values to generate the chaotic sequence, i.e., ( x 0 0 , y 0 0 , z 0 0 , r , β , ∊ ), as well as the maximum and minimum of y1 in Algorithm 1, i.e., (ymax, ymin). That is to say, the security keys are composed of 8 values, i.e., ( x 0 0 , y 0 0 , z 0 0 , r , β , ∊ , y m a x , y m i n ). If each initial value has a precision of 10−15, the size of the key space is 1015 × 8 = 10120 ≈ 2399. From the view of cryptology, the key space whose size is larger than 2100 implies high-level security [68, 69]. Therefore, the key space of the proposed QSBLA is so large that it can resist all kinds of brute-force attacks. Moreover, the start position and rounds of the chaotic sequence to form the measurement matrix of CS or the Arnold transform matrix can also be used as security keys to further expand the key space of the QSBLA.
4.4.2 Sensitivity to the security key
An image encryption algorithm with an extreme sensitivity requires that any tiny changes in the keys will produce a completely different cipher image, that is to say, if the security key changes slightly, the recovered image will become totally different from the plain image.
To verify the sensitivity to the security key of the QSBLA, we decrypt the encrypted images twice but with slightly different keys to result in two encrypted images. First, the encryption keys (x 0 0 = 0 . 4239, y 0 0 = 0 . 0239, z 0 0 = 0 . 0239, r0 = 3.99, β0 = 6, ϵ0 = 0.001, ymax, ymin) are used to decrypt the encrypted images, where ymax and ymin are associated with the contents of the corresponding plaintext image. Then, the encrypted compression images are decrypted with slightly different keys ( x 0 1 = 0 . 4239 + 10 - 15, y 0 1 = 0 . 0239, z 0 1 = 0 . 0239, r1 = 3.99, β1 = 6, ϵ1 = 0.001, ymax, ymin). The experimental results of Finger, Cameraman, Barbara and Baboon are shown in Fig 7. As seen, even a very slight change of 10−15 with the correct keys results in completely different recovered images from the decrypted images. The wrong decrypted decompression images resemble a random number map and show no visual information about the plain images. It validates that the QSBLA is extremely sensitive to the security key.
4.5 Statistical analysis
For the purpose of performance evaluation of the QSBLA, some typical statistical analysis, such as histogram analysis, information entropy and correlation analysis are adopted in the experiments.
4.5.1 Histogram analysis
Histograms are popular and effective ways to measure the distribution of all the pixel values in an image. In general, the histogram of a plain image is unevenly distributed, while that of an encrypted image produced by a good encryption method should have a uniform distribution. A uniform distribution of a histogram always represents a totally random-like image with relatively low correlations among neighborhood pixels and has the least probability of hacking the encrypted image to recover the corresponding plain image. In other words, the more even the histogram of the encrypted image is, the better the encryption scheme is in resisting histogram attacks.
The plain images, encrypted images and recovered images, and their corresponding histograms are shown in Fig 8. The histograms in the second column are from the plain images in the first column. These histograms have shapes that resemble some peaks or valleys, while all the histograms in the fourth column of encrypted images distribute very evenly and almost uniformly. The third column shows the encrypted images, of which the CR is 0.25 and the height is 1/4 of the original image. The recovered images are listed in the fifth column, while the corresponding histograms are listed in the sixth column. Because we use lossy SBL to compress the image with CR = 0.25, the recovered image in the fifth column is slightly blurred, and the histograms have lost some details with the peaks or valleys.
Nevertheless, these almost even histograms of encrypted images indicate that the QSBLA has a strong ability to resist histogram attacks. Moreover, the proposed approach can encrypt any images to flat and even histograms without exception. These results confirm that the QSBLA works very well for any types of image.
The results in this section verify that it is impossible to recover the plain image after encryption through the cryptosystem by analyzing its histogram and to make the statistical analysis attack successful when hackers try to attack the compressed and encrypted images with a very even histogram in the fourth row of Fig 8.
4.5.2 Information entropy
Information entropy (IE) is the average rate at which information is produced by a stochastic source of data. Here, it is used to reflect the complexity or orderliness of the encryption system. The intensity of an 8-bit grayscale image has 28 possible values ([0, 255]). The IE is defined as Eq (18) [70]: where p(Qi) is the probability that the pixel gray value Qi exists in an image [63]. The maximum of IE is 8 when Qi of an encrypted image has the same probability, i.e., 1 256. The perfect uniform distribution of the encrypted image has the maximal IE, 8.
The IEs of plain images and corresponding compressed and encrypted images produced by different encryption schemes are listed in Table 4. The third column under QSBLA shows the entropies of the final encrypted compression images. It can be seen from this table that the IEs of the plain images are far below 8, while those of compressed and encrypted images are very close to the theoretical optimal value of 8. The IEs of QSBLA are within [7.9878, 7.9977]. Although the QSBLA achieves none of the 8 optimal values while both CHC and IC-BSIF obtain the optimal values 4 times, the IE range of [7.9878, 7.9977] by the QSBLA is very close to the theoretical optimal value, 8. It can be seen that, as a compression and encryption approach, the QSBLA is very comparable to the state-of-the-art encryption models regarding IE.
We further use Peppers to compare the QSBLA with a compression and encryption scheme, Ref. [71], and the results are listed in Table 5, where LCR and HCR are the compression ratio of the low-frequency component and the high-frequency component respectively. The IEs of Peppers by QSBLA are much higher than those by Ref. [71]. All the IEs of Pepper under different CRs is greater than 7.997 and the maximum of Ref. [71] is only 5.5981. Although the comparison is under different CR, LCR and HCR, their encrypted images of QSBLA and Ref. [71] are still comparable for entropy performance. The possible reason is that the QSBLA conducts compression and then encryption while Ref. [71] performs encryption and then compression, and the latter will discard some less important information (zeros and values close to zero) in compression, losing the diversity of the information and decreasing the IE values.
4.5.3 Correlation analysis
The grayscale levels of two neighboring pixels in a natural image are always similar and thus are highly correlated. The correlation of two neighboring pixels in a natural image is usually close to 1. A good image encryption algorithm should produce an encrypted image with very low correlation to make sure it is impossible to deduce information from its neighbors.
The correlation coefficient γ is the most-widely used index to quantify the correlation, which can be formulated as Eq (19) [72]. where x and y are the grayscale values of two neighboring pixels among the total N pixels in an image.
As shown in Table 6, we compute the correlation coefficients γ for all plain images and compressed and encrypted images at three directions, i.e., horizontal γh, vertical γv, and diagonal γd [63]. This table shows that the correlation coefficients of all the plain images are close to 1 in all directions, meaning high correlation, whereas those of all the compressed and encrypted images are slightly greater than 0, showing very low correlation. This result indicates that the QSBLA is able to effectively reduce the correlation to a very low degree, even with compression. The QSBLA outperforms the rest of the schemes on 3 out of 24 correlation coefficients, however, the other algorithms, HC-DNA, CDCP, CHC and IC-BSIF, achieve the optimal value 5, 3, 6 and 7 times. By comparing the results, it is obvious that the QSBLA has the same good performance in terms of correlation of the compressed and encrypted images.
To conduct a correlation analysis further, we also select 2500 pairs of neighboring pixels randomly in the horizontal direction from the plain images and the corresponding compressed and encrypted images by the QSBLA to show their distribution maps of neighboring pixels in Fig 9. The correlation values of plain images distribute near the diagonal area of a coordinate plane, showing strong correlation of the input plain images. In particular, the more the correlation points are close to the diagonal line that neighboring pixel distribution maps have, the higher the correlation of an image. For example, for plain images Peppers and Boats, their maps in Fig 9(j) and 9(l) show that these two images have higher correlation than the other 6 images. However, the gray values of compressed and encrypted images distribute randomly and evenly on the whole plane, showing very weak correlation of the compressed and encrypted images. The experimental results demonstrates that most of the correlation is eliminated by the QSBLA.
4.6 Analysis of resisting differential attacks
Based on the theory of cryptography, differential attack should be well defended by any image encryption schemes. Hence, any trivial change like a bit or a pixel change in a plain image should result in a totally different encrypted image.
For differential attack analysis, the number of pixels change rate (NPCR) and the unified average changing intensity (UACI) are two widely used performance indexes. The NPCR stands for the variation ratio of two encrypted images when their plain images are slightly changed on one bit or one pixel. The UACI defines the average intensity of the differences between the encrypted images from the plain image and the one bit or one pixel changed plain images. Theoretically, NPCR and UACI between two encrypted images, Q1 and Q2, can be defined as Eqs (20) and (21), respectively [73]. where w and h are still the width and the height of the image, and dij is defined as Eq (22):
The NPCR focuses on the number of pixels changing their values in the differential attack. The UACI concentrates on the average difference between the correct encrypted image and the encrypted image from differential attack. The expectations of NPCR and UACI of an encrypted image with 256 grayscale levels are 99.6094% and 33.4635% [73]. Generally, the more that NPCR becomes close to 100% and the larger that UACI is, the more effectively the encryption scheme can resist differential attacks.
We randomly choose one pixel in the plain images and only change one bit of the chosen gray value to compute the NPCR and UACI for one time. This process is repeated 10 times. And then the averaged NPCR and UACI of QSBLA, HC-DNA, CDCP, CHC and IC-BSIF are reported in Tables 7 and 8 as the final results.
We can see from Table 7 that regarding NPCR, the QSBLA outperforms HC-DNA, CHC and IC-BSIF, and it also achieves comparable results with CDCP. QSBLA, CDCP and CHC achieve 3, 4 and 1 optimal NPCR values respectively. In Table 8, regarding UACI, QSBLA has one of the best records compared with all the other schemes, whereas HC-DNA still has the poorest results in all cases and IC-BSIF has 4 of the best records. The values of NPCR and UACI indicate that the QSBLA is able to resist differential attacks very well. It is worth noting that the proposed scheme includes compression while the other 4 methods do nothing about image compression.
4.7 Robustness analysis
Noise and data loss are inevitable for images during storage and transmission. A good JICE scheme should be able to resist noise or data loss. Theoretically, the compressed image is more difficult to be robust because the compression image converges more information into a smaller storage space. Compared with the encrypted lossless compression algorithms, any noise or data loss in lossy encryption algorithms should have more effects on the recovered image and thus lead to less robustness.
The results of robustness analysis by the QSBLA are shown in Figs 10 and 11. We first add 0.5%, 1% and 2% salt & pepper noise into the compressed and encrypted Cameraman with CR = 0.25, and the corresponding recovered images are shown in the first to the third column of Fig 10, respectively. It can be seen that, as far as 0.5% and 1% salt & pepper noise is concerned, although the recovered image contains much noise, it can recover the plain image to some extent. However, when the noise increases to 2%, we can only see some of the outline of Cameraman. When the encrypted compression image (CR = 0.25) has 0.4%, 1.56%, 6.25% and 25% data loss, the proposed QSBLA can recover Cameraman until data loss reaches 6.25% even though CR = 0.25 is a comparably high CR for CS, as shown in Fig 11. For 6.25% data loss, the decrypted image retains some information for us to recognize Cameraman, as shown in the third column of Fig 11. For 25% data loss, the main information of Cameraman about its contour is lost and the left information in the Fig 11 is random values. From the analysis, conclusively, the proposed QSBLA is robust to a certain extent.
4.8 Known-plaintext and chosen-plaintext attack analysis
As analyzed previously, any tiny changes in the plain image can result in a totally different cipher image, so the proposed QSBLA can resist differential attacks, a typical chosen-plaintext attack. In addition, the security keys include y max and y min which are associated with the contents of the corresponding plain image. So different plain images will produce different security keys. Hackers usually use images of all black and all white to crack image encryption algorithms. The compressed and encrypted images of all black and all white with a size of 256 × 256 with different CRs are shown in Fig 12. It can be seen that all the compressed and encrypted images are all noise-like and all the corresponding histograms are very close to uniform distributions, showing that the proposed QSBLA has good encryption effect for both images of all black and all white. From the above analysis, we can see that the QSBLA is capable of resisting known-plaintext and chosen-plaintext attacks.
4.9 Computing time analysis
Different JICE algorithms have different performance on computing complexity. So the encryption and decryption time of different size images at different CRs is tested, and their results are listed in Tables 9 and 10. As we can see from the tables, like other JICE algorithms, generally speaking, the smaller CR or the smaller image size, the less computational time is. But there is an exception for CR = 0.75 regarding decryption, the decryption time drop significantly especially for images Cameraman, Barbara, Peppers. The reason is that SBL converges to the final solution in a shorter time compared with CR = 0.65 although it needs to compute more variables when CR = 0.75.
The comparison between QSBLA and Ref. [32] is listed in Tables 11 and 12. When CR = 0.75, the decryption time of QSBLA is less for Peppers. In other cases, the time is longer than Ref. [32]. We further compare the compression and encryption time with CR = 0.55 for Cameraman and Peppers, and the results are shown in Table 13. It can be seen that outperforms Ref. [39] but underperforms the other compared schemes. The computing time is possible improved by using parallel computing to optimize SBL and run it on GPU. This is our future work.
5 Conclusions
Image compression and image encryption are two important tasks in image processing. In this paper, we propose a novel approach that integrates a quantum chaotic system, sparse Bayesian learning and a 3D Arnold cat map, namely, QSBLA, for joint image compression and encryption. The novelty of the QSBLA is introducing SBL to compress images and using a 3D Arnold cat map to permute bit-level cubes. The extensive experiments demonstrate that the QSBLA has the ability to achieve good compression performance and is capable of resisting several types of attacks, showing that the QSBLA is promising for joint image compression and encryption. In the future, we will study the permutation on DNA-level data and extend the proposed QSBLA to joint image compression and encryption for color images.
Supporting information
S1 File [zip]
Data.
Zdroje
1. Villasenor J. Alternatives to the Discrete Cosine Transform for Irreversible Tomographic Image Compression. IEEE Transactions on Medical Imaging. 1993;12(4):803–811. doi: 10.1109/42.251132 18218476
2. Grgic S, Grgic M, Zovko-Cihlar B. Performance analysis of image compression using wavelets. IEEE Transactions on Industrial Electronics. 2001;48(3):682–695. doi: 10.1109/41.925596
3. Skodras A, Christopoulos C, Ebrahimi T. The JPEG 2000 still image compression standard. IEEE Signal Processing Magazine. 2001;18(5):36–58. doi: 10.1109/79.952804
4. Chen G, Mao Y, Chui CK. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals. 2004;21(3):749–761. doi: 10.1016/j.chaos.2003.12.022
5. Abd El-Latif AA, Abd-El-Atty B, Talha M. Robust Encryption of Quantum Medical Images. IEEE Access. 2018;6:1073–1081. doi: 10.1109/ACCESS.2017.2777869
6. Chai X, Gan Z, Yuan K, Chen Y, Liu X. A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Computing & Applications. 2019;31(1):219–237. doi: 10.1007/s00521-017-2993-9
7. Li X, Xie Z, Wu J, Li T. Image Encryption Based on Dynamic Filtering and Bit Cuboid Operations. Complexity. 2019;2019:7485621.
8. Pak C, Huang L. A new color image encryption using combination of the 1D chaotic map. Signal Processing. 2017;138:129–137. doi: 10.1016/j.sigpro.2017.03.011
9. Zhu C, Wang G, Sun K. Improved cryptanalysis and enhancements of an image encryption scheme using combined 1D chaotic maps. Entropy. 2018;20(11):843. doi: 10.3390/e20110843
10. Zhu S, Zhu C. Image encryption algorithm with an avalanche effect based on a six-dimensional discrete chaotic system. Multimedia Tools and Applications. 2018;77(21):29119–29142. doi: 10.1007/s11042-018-6078-2
11. Wu X, Li Y, Kurths J. A new color image encryption scheme using CML and a fractional-order chaotic system. PloS one. 2015;10(3):e0119660. doi: 10.1371/journal.pone.0119660 25826602
12. Li T, Yang M, Wu J, Jing X. A Novel Image Encryption Algorithm Based on a Fractional-Order Hyperchaotic System and DNA Computing. Complexity. 2017;2017:9010251. doi: 10.1155/2017/9010251
13. Akhshani A, Akhavan A, Lim SC, Hassan Z. An image encryption scheme based on quantum logistic map. Communications in Nonlinear Science and Numerical Simulation. 2012;17(12):4653–4661. doi: 10.1016/j.cnsns.2012.05.033
14. Seyedzadeh SM, Norouzi B, Mosavi MR, Mirzakuchaki S. A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dynamics. 2015;81(1-2):511–529. doi: 10.1007/s11071-015-2008-2
15. Li T, Shi J, Wu J, Li X, Pan F. Image Encryption Based on Pixel-level Diffusion with Dynamic Filtering and DNA-level Permutation with 3D Latin Cubes. Entropy. 2019;21(3):319. doi: 10.3390/e21030319
16. Çavuşoğlu Ü, Kaçar S, Pehlivan I, Zengin A. Secure image encryption algorithm design using a novel chaos based S-Box. Chaos, Solitons & Fractals. 2017;95:92–101. doi: 10.1016/j.chaos.2016.12.018
17. Zhu C, Wang G, Sun K. Cryptanalysis and improvement on an image encryption algorithm design using a novel chaos based S-box. Symmetry. 2018;10(9):399. doi: 10.3390/sym10090399
18. Li X, Knipe J, Cheng H. Image compression and encryption using tree structures. Pattern Recognition Letters. 1997;18(11-13):1253–1259. doi: 10.1016/S0167-8655(97)00099-8
19. Ou SC, Chung HY, Sung WT. Improving the compression and encryption of images using FPGA-based cryptosystems. Multimedia Tools and Applications. 2006;28(1):5–22. doi: 10.1007/s11042-006-5117-6
20. Yuen CH, Wong KW. A chaos-based joint image compression and encryption scheme using DCT and SHA-1. Applied Soft Computing. 2011;11(8):5092–5098. doi: 10.1016/j.asoc.2011.05.050
21. Tong X, Wang Z, Zhang M, Liu Y. A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. Nonlinear Dynamics. 2013;72(1-2):229–241. doi: 10.1007/s11071-012-0707-5
22. Li P, Lo KT. Joint image compression and encryption based on order-8 alternating transforms. Journal of Visual Communication and Image Representation. 2017;44:61–71. doi: 10.1016/j.jvcir.2017.01.021
23. Zhang X, Wang X. Multiple-image encryption algorithm based on mixed image element and permutation. Optics and Lasers in Engineering. 2017;92:6–16. doi: 10.1016/j.optlaseng.2016.12.005
24. Landir M, Hamiche H, Kassim S, Tahanout M, Kemih K, Addouche SA. A novel robust compression-encryption of images based on SPIHT coding and fractional-order discrete-time chaotic system. Optics and Laser Technology. 2019;109:534–546. doi: 10.1016/j.optlastec.2018.08.040
25. Candes EJ, Romberg J, Tao T. Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Transactions on Information Theory. 2006;52(2):489–509. doi: 10.1109/TIT.2005.862083
26. Donoho DL, et al. Compressed sensing. IEEE Transactions on information theory. 2006;52(4):1289–1306. doi: 10.1109/TIT.2006.871582
27. Candes EJ, Tao T. Near-Optimal Signal Recovery From Random Projections: Universal Encoding Strategies? IEEE Transactions on Information Theory. 2006;52(12):5406–5425. doi: 10.1109/TIT.2006.885507
28. Zhou N, Zhang A, Wu J, Pei D, Yang Y. Novel hybrid image compression-encryption algorithm based on compressive sensing. OPTIK. 2014;125(18):5075–5080. doi: 10.1016/j.ijleo.2014.06.054
29. Zhou N, Zhang A, Zheng F, Gong L. Novel image compression-encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Optics and Laser Technology. 2014;62:152–160. doi: 10.1016/j.optlastec.2014.02.015
30. Liu X, Mei W, Du H. Simultaneous image compression, fusion and encryption algorithm based on compressive sensing and chaos. Optics Communications. 2016;366:22–32. doi: 10.1016/j.optcom.2015.12.024
31. Zhang K, Fang Jb. Color Image Encryption Algorithm Based on TD-ERCS System and Wavelet Neural Network. Mathematical Problems in Engineering. 2015; 2015:501054.
32. Chai X, Zheng X, Gan Z, Han D, Chen Y. An image encryption algorithm based on chaotic system and compressive sensing. Signal Processing. 2018;148:124–144. doi: 10.1016/j.sigpro.2018.02.007
33. Chai X, Gan Z, Chen Y, Zhang Y. A visually secure image encryption scheme based on compressive sensing. Signal Processing. 2017;134:35–51. doi: 10.1016/j.sigpro.2016.11.016
34. Zhang T, Li S, Ge R, Yuan M, Ma Y. A Novel 1D Hybrid Chaotic Map-Based Image Compression and Encryption Using Compressed Sensing and Fibonacci-Lucas Transform. Mathematical Problems in Engineering. 2016;2016:7683687.
35. Wang Q, Chen X, Wei M, Miao Z. Simultaneous encryption and compression of medical images based on optimized tensor compressed sensing with 3D Lorenz. Biomedical Engineering Online. 2016;15:118. doi: 10.1186/s12938-016-0239-1 27814721
36. Deng J, Zhao S, Wang Y, Wang L, Wang H, Sha H. Image compression-encryption scheme combining 2D compressive sensing with discrete fractional random transform. Multimedia Tools and Applications. 2017;76(7):10097–10117. doi: 10.1007/s11042-016-3600-2
37. Hu G, Xiao D, Wang Y, Xiang T. An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications. Journal of Visual Communication and Image Representation. 2017;44:116–127. doi: 10.1016/j.jvcir.2017.01.022
38. Zhang Y, Xu B, Zhou N. A novel image compression-encryption hybrid algorithm based on the analysis sparse representation. Optics Communications. 2017;392:223–233. doi: 10.1016/j.optcom.2017.01.061
39. Chen J, Zhang Y, Qi L, Fu C, Xu L. Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression. Optics and Laser Technology. 2018;99:238–248. doi: 10.1016/j.optlastec.2017.09.008
40. Zhu S, Zhu C, Wang W. A Novel Image Compression-Encryption Scheme Based on Chaos and Compression Sensing. IEEE Access. 2018;6:67095–67107. doi: 10.1109/ACCESS.2018.2874336
41. Zhang Z, Jung TP, Makeig S, Rao BD. Compressed sensing for energy-efficient wireless telemonitoring of noninvasive fetal ECG via block sparse Bayesian learning. IEEE Transactions on Biomedical Engineering. 2013;60(2):300–309. doi: 10.1109/TBME.2012.2226175 23144028
42. Sun B, Zhang Z. Photoplethysmography-Based Heart Rate Monitoring Using Asymmetric Least Squares Spectrum Subtraction and Bayesian Decision Theory. IEEE Sensors Journal. 2015;15(12):7161–7168. doi: 10.1109/JSEN.2015.2473697
43. Zhang Z, Jung TP, Makeig S, Pi Z, Rao BD. Spatiotemporal Sparse Bayesian Learning With Applications to Compressed Sensing of Multichannel Physiological Signals. IEEE Transactions on Neural Systems and Rehabilitation Engineering. 2014;22(6):1186–1197. doi: 10.1109/TNSRE.2014.2319334 24801887
44. Li T, Zhang Z. Robust Face Recognition via Block Sparse Bayesian Learning. Mathematical Problems in Engineering. 2013;2013:695976.
45. Williams O, Blake A, Cipolla R. Sparse Bayesian learning for efficient visual tracking. IEEE Transactions on Pattern Analysis and Machine Intelligence. 2005;27(8):1292–1304. doi: 10.1109/TPAMI.2005.167 16119267
46. Yang M, Fan S, Lee WJ. Probabilistic Short-Term Wind Power Forecast Using Componential Sparse Bayesian Learning. IEEE Transactions on Industry Applications. 2013;49(6):2783–2792. doi: 10.1109/TIA.2013.2265292
47. Li T, Zhou M, Guo C, Luo M, Wu J, Pan F, et al. Forecasting Crude Oil Price Using EEMD and RVM with Adaptive PSO-Based Kernels. Energies. 2016;9(12):1014. doi: 10.3390/en9121014
48. Li T, Hu Z, Jia Y, Wu J, Zhou Y. Forecasting Crude Oil Prices Using Ensemble Empirical Mode Decomposition and Sparse Bayesian Learning. Energies. 2018;11(7):1882. doi: 10.3390/en11071882
49. Zhou Y, Li T, Shi J, Qian Z. A CEEMDAN and XGBOOST-Based Approach to Forecast Crude Oil Prices. Complexity. 2019;2019:4392785. doi: 10.1155/2019/4392785
50. Wu J, Chen Y, Zhou T, Li T. An Adaptive Hybrid Learning Paradigm Integrating CEEMD, ARIMA and SBL for Crude Oil Price Forecasting. Energies. 2019;12(7):1239. doi: 10.3390/en12071239
51. Tipping ME. Sparse Bayesian learning and the relevance vector machine. Journal of Machine Learning Research. 2001;1(3):211–244.
52. Wipf DP, Rao BD. Sparse Bayesian learning for basis selection. IEEE Transactions on Signal processing. 2004;52(8):2153–2164. doi: 10.1109/TSP.2004.831016
53. Zhang Z, Rao BD. Sparse signal recovery with temporally correlated source vectors using sparse Bayesian learning. IEEE Journal of Selected Topics in Signal Processing. 2011;5(5):912–926. doi: 10.1109/JSTSP.2011.2159773
54. Zhu C, Hu Y, Sun K. New image encryption algorithm based on hyperchaotic system and ciphertext diffusion in crisscross pattern. Journal of Electronics and Information Technology. 2012;34(7):1735–1743. doi: 10.3724/SP.J.1146.2011.01004
55. Zhu C, Kehui S. Cryptanalysis and improvement of a class of hyperchaos based image encryption algorithms. Acta Physica Sinica. 2012;61(12):120503.
56. Liu L, Zhang Q, Wei X, Zhou C. Image Encryption Algorithm Based on Chaotic Modulation of Arnold Dual Scrambling and DNA Computing. Advanced Science Letters. 2011;4(11-12):3537–3542. doi: 10.1166/asl.2011.1910
57. Hu Y, Xie X, Liu X, Zhou N. Quantum Multi-Image Encryption Based on Iteration Arnold Transform with Parameters and Image Correlation Decomposition. International Journal of Theoretical Physics. 2017;56(7):2192–2205. doi: 10.1007/s10773-017-3365-z
58. Kumar S, Sharma RK. Securing color images using Two-square cipher associated with Arnold map. Multimedia Tools and Applications. 2017;76(6):8757–8779. doi: 10.1007/s11042-016-3504-1
59. Zhou N, Hu Y, Gong L, Li G. Quantum image encryption scheme with iterative generalized Arnold transforms and quantum image cycle shift operations. Quantum Information Processing. 2017;16(6):164. doi: 10.1007/s11128-017-1612-0
60. Chai X, Fu X, Gan Z, Zhang Y, Lu Y, Chen Y. A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Processing. 2019;155:44–62. doi: 10.1016/j.sigpro.2018.09.029
61. Arnol’d VI, Avez A. Problèmes ergodiques de la mécanique classique. 1967;.
62. Guan ZH, Huang F, Guan W. Chaos-based image encryption algorithm. Physics Letters A. 2005;346(1):153–157. doi: 10.1016/j.physleta.2005.08.006
63. Zhan K, Wei D, Shi J, Yu J. Cross-utilizing hyperchaotic and DNA sequences for image encryption. Journal of Electronic Imaging. 2017;26(1):013021. doi: 10.1117/1.JEI.26.1.013021
64. Hua Z, Zhou Y. Design of image cipher using block-based scrambling and image filtering. Information Sciences. 2017;396:97–113. doi: 10.1016/j.ins.2017.02.036
65. Gu S, Zhang L, Zuo W, Feng X. Weighted nuclear norm minimization with application to image denoising. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition; 2014. p. 2862–2869.
66. Cai S, Liu K, Yang M, Tang J, Xiong X, Xiao M. A new development of non-local image denoising using fixed-point iteration for non-convex ℓp sparse optimization. PloS one. 2018;13(12):e0208503. doi: 10.1371/journal.pone.0208503 30540797
67. Chen J, Zhu Z, Fu C, Yu H, Zhang Y. Reusing the permutation matrix dynamically for efficient image cryptographic algorithm. Signal Processing. 2015;111:294–307. doi: 10.1016/j.sigpro.2015.01.003
68. Schneier B. Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons; 2007.
69. Stinson DR. Cryptography: theory and practice. CRC press; 2005.
70. Chai X, Zheng X, Gan Z, Zhang Y, Chen Y. Exploiting plaintext-related mechanism for secure color image encryption. Neural Computing and Applications. 2019;2019:1–24.
71. Chai X, Fu X, Gan Z, Zhang Y, Lu Y, Chen Y. An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata. Neural Computing and Applications. 2018;2018:1–28.
72. Wang Z, Huang X, Li Y, Song X. A new image encryption algorithm based on the fractional-order hyperchaotic Lorenz system. Chinese Physics B. 2013;22(1):010504. doi: 10.1088/1674-1056/22/1/010504
73. Wu Y, Noonan JP, Agaian S. NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT). 2011;1(2):31–38.
Článok vyšiel v časopise
PLOS One
2019 Číslo 11
- Metamizol jako analgetikum první volby: kdy, pro koho, jak a proč?
- Nejasný stín na plicích – kazuistika
- Masturbační chování žen v ČR − dotazníková studie
- Úspěšná resuscitativní thorakotomie v přednemocniční neodkladné péči
- Dlouhodobá recidiva a komplikace spojené s elektivní operací břišní kýly
Najčítanejšie v tomto čísle
- A daily diary study on maladaptive daydreaming, mind wandering, and sleep disturbances: Examining within-person and between-persons relations
- A 3’ UTR SNP rs885863, a cis-eQTL for the circadian gene VIPR2 and lincRNA 689, is associated with opioid addiction
- A substitution mutation in a conserved domain of mammalian acetate-dependent acetyl CoA synthetase 2 results in destabilized protein and impaired HIF-2 signaling
- Molecular validation of clinical Pantoea isolates identified by MALDI-TOF