• Acta Photonica Sinica
  • Vol. 43, Issue 9, 910002 (2014)
LU Pei1、*, LIU Xiao-yong2, LU Xi3, TIAN Min1, and CAO Hai-bin2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • 3[in Chinese]
  • show less
    DOI: 10.3788/gzxb20144309.0910002 Cite this Article
    LU Pei, LIU Xiao-yong, LU Xi, TIAN Min, CAO Hai-bin. Image Information Encryption by Compressed Sensing and Optical Theory[J]. Acta Photonica Sinica, 2014, 43(9): 910002 Copy Citation Text show less
    References

    [1] WEI Zhi-qiang, YANG Guang, CONG Yan-ping. Security of underwater sensor networks[J]. Chinese Journal of Computer, 2012, 35(8): 1594-1606.

    [2] CHEN Lai-jun, MEI Sheng-wei, CHEN Ying. Smart grid information security and its influence on power system survivability[J]. Control Theory & Applications, 2012, 29(2): 240-244.

    [3] PAN Jing, QI Na, XUE Bing-bing, et al. Field programmable gate array-based chaotic encryption system design and hardware realization of cell phone short message[J]. Acta Physica Sinica, 2012, 61(18): 72-83.

    [4] DIFFIE W, HELLMAN M F. New directions in cryptography[J]. IEEE Transaction on Information Theory, 1976, 22(6): 644-654.

    [5] SHANNON C E. Communication theory of secrecy systems[J]. Bell System Technology Journal, 1949, 28(4): 656-715.

    [6] QIN Yi, ZHENG Chang-bo. Color image encryption based on double random phase encoding[J]. Acta Photonica Sinica, 2012, 41(3): 326-239.

    [7] YUAN S, ZHOU X, ALAM M S, et al. Information hiding based on double random-phase encoding technology and public-key cryptography[J]. Optics Express, 2009, 17(5): 3270-3284.

    [8] LU X, ZHOU X, LU P, et al. Determination of optimal parameters for detecting the existence of secret information hidden by the double random-phase encoding technique[J]. Optics & Laser Technology, 2009, 41(6): 751-754.

    [9] CAND′ES E J, ROMBERG J, TAO T, Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information[J]. IEEE Transactions on Information Theory, 2006, 52(2): 489-509.

    [10] JIAO Li-cheng, YANG Shu-yuan, LIU Fang, et al. Development and prospect of compressive sensing[J]. Acta Electronica Sinica, 2011, 39(7): 1651-1662.

    [11] XU Zhi-qiang. Compressed sensing[J]. Scientia Sinica Mathematica, 2012, 42(9): 865-877.

    [12] SHI Guang-ming, LIU Dan-hua, GAO Da-hua, et al. Advances in theory and applicaiton of compressed sensing[J]. Acta Electronica Sinica, 2009, 37(5): 1071-1081.

    [13] VENKATRAMAN D, MAKUR A. A compressive sensing approach to object-based surveillance video coding[J]. IEEE Acoustics, Speech and Signal Processing, 2009: 3513-3516.

    [14] SHI Guang-ming, LIU Dan-hua, ZHOU Jia-she, et al. New method of multiple description coding for image based on compressed sensing[J]. Journal of Infrared Millimeter Waves, 2009, 28(4): 298-302.

    [15] ORSDEMIR A, ALTUN H O, SHARMA G, et al. On the security and robustness of encryption via compressed sensing[C].IEEE Military Communications Conference, 2008: 1-7.

    [16] LIANG Jing-sai. Image secret sharing based on compressed sensing[C]. Advances in Mathematics and Its Applications, 2011:149-162.

    [18] HUANG R, SAKURAI K. A robust and compression-combined digital image encryption method based on compressive sensing[C]. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2011 Seventh International Conference on. IEEE, 2011: 105-108.

    [20] ATHIRA V, GEORGE S N, DEEPTHI P P. A novel encryption method based on compressive sensing[C]. Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 2013 International Multi-Conference on. IEEE, 2013: 271-275.

    [21] ZHANG A, ZHOU N, GONG L. Color image encryption algorithm combining compressive sensing with arnold transform[J]. Journal of Computers, 2013, 8(11): 2857-2863.

    [22] RACHLIN Y, BARON D. The secrecy of compressed sensing measurements[C]. 46th Annual Allerton Conference on Communication, Control and Computing, 2008, 813-817.

    [23] REFREGIER P, JAVIDI B. Optical image encryption based on input plane and Fourier plane random encoding[J]. Optics Letters, 1995, 20(7): 767-769.

    [24] JAVIDI B, SERGENT A, AHOUZI E. Performance of double phase encoding encryption technique using binarized encrypted images[J]. Optical Engineering, 1998, 37(2): 565-569.

    [25] CANDS E J, WAKIN M, An introduction to compressive sampling[J]. IEEE Signal Processing Magazine, 2008, 25(2): 21-30.

    [26] DONOHO D L, Compressive sensing[J]. IEEE Transaction on Information Theory, 2006, 52 (4): 1289-1306.

    [27] BARANIUK R G. Compressive sensing[J]. IEEE Signal Processing Magazine, 2007, 24(4): 118-120, 124.

    [28] BAILEY D H, CRANDALL R E. On the random character of fundamental constant expansions[J]. Experimental Mathematics, 2001, 10(2): 175-190.

    [29] PRASAD M, SUDHA K L. Chaos image encryption using pixel shuffling[J]. Computer Science & Information Technology, 2011, 4(1): 169-179.

    [30] YE G. Image scrambling encryption algorithm of pixel bit based on chaos map[J]. Pattern Recognition Letters, 2010, 31(5): 347-354.

    CLP Journals

    [1] ZHUANG Jia-yan, HE Wei-ji, CHEN Qian, FENG Wei-yi. Reducing the Error Caused by Dynamic Background in the Imaging System Based on Compressed Sensing[J]. Acta Photonica Sinica, 2015, 44(12): 1211003

    [2] LI Hong-xiao, CHEN Xiao-dong, LI Jun-wei, WANG Yi, YU Dao-yin. Analysis of Iterative Denoising Method in Sparse Computed Tomography Reconstruction[J]. Acta Photonica Sinica, 2015, 44(5): 517002

    LU Pei, LIU Xiao-yong, LU Xi, TIAN Min, CAO Hai-bin. Image Information Encryption by Compressed Sensing and Optical Theory[J]. Acta Photonica Sinica, 2014, 43(9): 910002
    Download Citation