High-quality visually secure image cryptosystem using improved Chebyshev map and 2D compressive sensing model

S Huang, D Jiang, Q Wang, M Guo, L Huang… - Chaos, Solitons & …, 2022 - Elsevier
In this paper, we propose an improved Chebyshev map and a visually meaningful image
encryption (VMIE) algorithm based on two-dimensional compressive sensing (2DCS). First …

[HTML][HTML] Encryption of 3D or Higher-Dimensional Images: A Review

R Nigro, G Ferreira, MAA Calazans, G Miguel… - Applied Sciences, 2024 - mdpi.com
This article aims to review encryption techniques for 3D or higher-dimensional images.
Precisely, the following classes of images are considered: light field images, point clouds …

Asymmetric image authentication algorithm using double random modulus decomposition and CGI

R Yadav, P Singh - Computational and Applied Mathematics, 2023 - Springer
In this paper, we have proposed asymmetric image encryption cum authentication
cryptosystem based on double random modulus decomposition using computational ghost …

Visually meaningful image encryption scheme using multi-parameter fractal theory and block synchronous sorting diffusion

Z Gan, M Sun, Y Song, X Chai, D Jiang, G Long… - Physica …, 2023 - iopscience.iop.org
Traditional visually meaningful image encryption (VMIE) works by embedding a secret
image (SI) into a visually meaningful carrier image (CAI), thus achieving the dual protection …

Light-field 3D image parallel encryption based on the state transition diagram of Maximum Length Cellular Automata

Y Cui, J Guo, C Shang, R Zheng, Q Wu, X Dai, C Li… - Optics …, 2024 - Elsevier
In our work, we proposed a parallel encryption scheme based on the state transition
diagram of Maximum Length Cellular Automata (MLCA) to protect 3D images. Compared …

Novel Duffing chaotic oscillator and its application to privacy data protection

Z Lu, NJ De Dieu, D Jiang, N Tsafack, J **ong… - Physica …, 2023 - iopscience.iop.org
Abstract Traditional Compressive Sensing (CS) achieves both compression and encryption
of digital data. However, most existing compressive sensing methods present some …

A new method for constructing discrete hyperchaotic systems with a controllable range of Lyapunov exponents and its application in information security

J Zeng, Y Wang, X Li, Y Guang, C Wang… - Physica Scripta, 2023 - iopscience.iop.org
Since people use chaos extensively for a wide range of applications in data encryption and
secure communications, a new method for designing practical high-dimensional discrete …

Light-field 3D encryption based on the monocular depth rendering

Z Ren, J Guo, H Liu, X Li - Optics Letters, 2022 - opg.optica.org
The real-time performance of light-field 3D encryption technology based on the integral
imaging principle is restricted by the acquisition speed and the data of the elemental image …

Color 3D display and security via monochrome scenes

J Guo, Y Kou, ST Kim, X Li - Optics Letters, 2023 - opg.optica.org
Color three-dimensional (3D) displays have always been the ideal display method because
of their strong sense of reality, whereas color 3D displays of monochrome scenes are still …

3D image steganography using cellular automata transform and depth estimation network

X Liu, Q Wu, Z Zuo, Z Yang, H Zhang, L Dai, Y Liao… - Optics …, 2024 - Elsevier
Traditional 3D image steganography is cumbersome and difficult owing to the special
structure of 3D image, imposing a practical limit for its applications. Herein, we propose a 3D …