Research Article  Open Access
Zhuo Liu, Yong Wang, Leo Yu Zhang, Jun Ma, "A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model", Security and Communication Networks, vol. 2021, Article ID 6625579, 21 pages, 2021. https://doi.org/10.1155/2021/6625579
A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model
Abstract
The digital image, as the critical component of information transmission and storage, has been widely used in the fields of big data, cloud and frog computing, Internet of things, and so on. Due to large amounts of private information in the digital image, the image protection is fairly essential, and the designing of the encryption image scheme has become a hot issue in recent years. In this paper, to resolve the shortcoming that the probability density distribution (PDD) of the chaotic sequences generated in the original twodimensional coupled map lattice (2D CML) model is uneven, we firstly proposed an improved 2D CML model according to adding the offsets for each node after every iteration of the original model, which possesses much better chaotic performance than the original one, and also its chaotic sequences become uniform. Based on the improved 2D CML model, we designed a compressive image encryption scheme. Under the condition of different keys, the uniform chaotic sequences generated by the improved 2D CML model are utilized for compressing, confusing, and diffusing, respectively. Meanwhile, the message authentication code (MAC) is employed for guaranteeing that the encryption image be integration. Finally, theoretical analysis and simulation tests both demonstrate that the proposed image encryption scheme owns outstanding statistical, well encryption performance, and high security. It has great potential for ensuring the digital image security in application.
1. Introduction
In the recent years, the digital image, as an important carrier tool of information transmission and storage, has been popularly used in the fields of big data, cloud and frog computing, Internet of things, and so on [1–5]. The digital image contains personal privacy, commercial, and important military information. Thus, the leaking of this important information leads to some serious consequences [6, 7]. In order to combat illegal access, revision, and other attacks of the digital image, it is considerably essential to design high level of encryption schemes. Moreover, due to the enormous amount of the digital image, compression in the digital image should be also taken into account to improve the efficiency of transmission and storage [8, 9].
There are two views on how to design the encryption image scheme; the first one is to consider the traditional encryption method for the digital image encryption [10], such as Data Encryption Standard (DES) and Advanced Encryption Standard (AES). Those traditional schemes can guarantee the digital image safety. However, those schemes are not highly efficient and do not consider the inherent characteristics of the digital image, which causes high pixel correlation and redundancy. That probably brings about some potential vulnerability to the safety image. In addition, the traditional image encryption scheme cannot be applied to compress the digital image. On the other hand, to solve the abovementioned security risks, considering the unique characteristics of randomness and initial sensitivity of the chaos, combining some special features of the digital image, it is quite clear that the chaotic sequences generated by the chaotic system are pretty suitable for compression and encryption [11, 12].
The chaotic system, firstly proposed in 1982, has been widely studied by many researchers [13, 14]. In particular, the higherdimensional chaotic system, which possesses a much larger Lyapunov exponent (LE) and more complex dynamic performance, is popularly utilized in the digital image encryption recently. The CML model, as one of the classic spatiotemporal models, has been used as key competent to construct the digital image compression and encryption scheme. Compared with the onedimensional CML (1D CML), the 2D CML model has much more complex chaotic dynamic characteristics, which is promising to the digital image encryption. Based on the 2D Nonadjacent CML model, the digital image encryption scheme was proposed [15], and theoretical analysis and numerical simulation demonstrate that the digital image encryption scheme is effective. He et al. proposed a new image encryption scheme according to the 2D CML model and bitlevel permutation [16], which owns more secure and effective performance. A novel image encryption scheme based on the nearestneighboring CML was proposed [17], and it has higher security level, higher sensitivity, and higher speed. Although the 2D CML model was considered for encryption in the aforementioned schemes [15–17], the application of the 2D CML model in compression is still in the infancy; because of the difficulty in verifying the Restricted Isometry Property (RIP), the existing compressive image schemes mainly focus on the lowcomplexity chaotic system [18, 19]. The logistic system is utilized to produce the measurement matrix for compression in [18]. A novel encrypted compressive sensing of images based on fractionalorder hyperchaotic Chen system and DNA operations is proposed in this paper [19]. The lowcomplexity chaotic system indicates the lowsecurity image encryption scheme and small key space. To improve the encryption scheme’s security and enlarge the key space, the highdimensional system such as the 2D CML model should be applied in the CS. Moreover, the key issue is how to verify the independence of the chaotic sequences generated by the 2D CML model. However, few scholars have discussed that problem. Meanwhile, the PDD of the core model in those schemes [15–19] is uneven, and the uneven sequences indicate that they are easier to be attacked, which brings about the security risks to the designing of the digital image encryption scheme.
To remedy the abovementioned problems, we proposed an improved 2D CML model; compared with the original 2D CML model, it has more uniform PDD. Meanwhile, the chaotic sequences generated by the improved model are independent according to the independent testing. Based on the improved 2D CML model, a novel compressive image encryption scheme is designed. In our scheme, the independent sequences are firstly used for compressive sensing with the key. Then, according to another key of the improved 2D CML model, the chaotic sequences for confusing and diffusing are produced. In addition, the MAC algorithm is utilized to ensure integrity and authentication of digital image. Here, we choose the Hash function as the MAC algorithm. The main contributions of this paper are summarized as follows:(i)According to adding different offsets for each node, an improved 2D CML model is presented. The simulation analysis shows that the PDD of the chaotic sequences generated by the improved 2D CML mode is uniform. Meanwhile, the LE expression of the improved model is derived mathematically, which can guide the setting of the parameters to ensure the complex chaotic performance.(ii)Based on the improved 2D CML model, the proposed image encryption scheme is designed. With different keys, the chaotic sequences generated by the improved model are used for compressing, confusing, and diffusing, respectively.(iii)In the proposed image encryption scheme, we use the MAC algorithm to ensure the digital image integrity. Finally, theory analysis and simulation tests both prove that the proposed scheme possesses outstanding encryption performance.
The remaining part of this paper is organized as follows. Preliminaries are presented in Section 2, and an improved 2D CML model is proposed in Section 3. In Section 4, the proposed image encryption scheme based on the improved model and MAC algorithm is designed. In Section 5, the performances of the proposed encryption scheme are analysed. Finally, we draw the conclusion in Section 6.
2. Preliminaries
2.1. 2D CML Model
The CML model is firstly proposed by Kaneko in [20], which is a common spatiotemporal chaos model. To enhance the complexity of the CML model, it is extended into the 2D CML one, which is depicted as follows.
Definition 1. The 2D CML model is mathematically shown aswhere f(.) denotes the local chaotic map and and are the row and column indexes of the nodes, respectively. The periodic boundary conditions are and .
According to equation (1), we need to iterate f for five times to calculate the value of . For improving the computation efficiency of the model, the 2D CML model is simplified as
2.2. The Piecewise Logistic Map
Owing to much larger LE and more complex chaotic characteristics, the piecewise logistic map (PLM) was proposed [21], which is defined bywhere is the segment number of the PLM function, is the control parameter, is the state value, and . Moreover, when and in equation (3), the LE value of PLM is 4.574594, which is the maximum LE (MLE), and the PLM function owns the most complex chaotic performance.
2.3. Compressive Sensing
Compressive sensing (CS), as depicted in Figure 1, was proposed by Candes and Donoho in 2006 [22], which is shown bywhere x is the original signal of dimensions, is the measurement matrix with dimensions, y is the compressed measurement matrix with dimensions, and . In equation (4), the original signal is mostly not sparse, which is represented as
where is the orthogonal basis matrix and is the coefficient vector.
According to equations (4) and (5), the CS processing is as follows:where is the sensing matrix of dimensional and must satisfy the RIP defined in Definition 2. Due to the reconstruction of the signal, can be recovered by calculating.
Definition 2. Suppose that there exists a constant such thatholds for all .
3. The Improved 2D CML Model
3.1. The Model
In the original 2D CML model, set and in the local mapping PLM and and in model; we plot the PPD of sequences generated by the nodes in Figure 2. Clearly, the PPD of sequences is uneven, and the peak areas are covered in the intervals and .
From the perspective of the cryptography, the uneven PPD of chaotic sequences causes some security breaches for the attackers. To overcome the shortcoming, we add a different offset for each node after each iteration and propose an improved 2D CML model, which is described asand, in the proposed 2D CML model, is the iteration state value of the th and th nodes at time . For each , we add the offset value . is obtained and used for the state value in the next iteration. According to the abovementioned 2D CML model, using the same parameter as in the original 2D CML model, the PPD of the sequences generated by the improved model is shown in Figure 3. According to Figure 3, the PPD becomes uniform.
3.2. The Characteristics of the Proposed Model
3.2.1. Lyapunov Exponent
LE is usually used to judge whether a system is chaotic, and a positive LE indicates the system is in chaos. Otherwise, it is not chaotic. Meanwhile, according to the LE formula of the chaotic system, we can set the parameters to make the chaotic system remain in the fully chaotic state. Using the method in [23], the LE formula of the improved 2D CML model is derived as follows.
Firstly, the improved 2D CML model is converted to a onedimensional CML. Therefore, equation (2) is converted to
In equation (9), the periodic boundary is and .
We can get the derivatives of as follows:
Then, the differential of equation (9) is
Based on equations (10) and (11), we have
From equation (13), we can getwhere is the Jacobin matrix and .
Moreover, set , and the eigenvalue of is and the eigenvalue of is . It is easy to verify the formula of LEs:
is a block circulant matrix; its eigenvalue values are . Substituting into equation (15), we have
According to equation (16), we can get the following significant theoretical results. The MLE is solely decided by the local chaotic map. Consequently, in the proposed 2D CML model, when choosing PLM with and, the LE of the proposed 2D CML model is maximum, and it has the most complex chaotic performance.
3.2.2. Bifurcation
The bifurcations of the original 2D CML model and the improved 2D CML model are shown in Figures 4 and 5 , respectively. In the original 2D CML model, the bifurcations of all the nodes are almost the same. Here, select the 1^{st} node as delegate. In the improved 2D CML model, we choose the 1^{st}, 4^{th}, 8^{th}, 12^{th}, and 16^{th} nodes to depict the bifurcation. According to Figures 4 and 5, compared with those two modes, the improved 2D CML model has bigger improvement than the original 2D CML one.
(a)
(b)
(c)
(d)
(e)
3.2.3. Ergodicity
In statistics, ergodicity describes the randomness of statistical results at time and space. In a chaotic system, the iteration values of a system cover the entire interval, and it indicates that the chaotic system is more complex. Here, fix , , and , and change the value of with ; we plot the ergodicity of the original 2D CML model and the improved 2D CML modelcause, in the improved 2D CML mod in Figures 6 and 7 , respectively. It is clear that the improved model has much better chaotic performance than in the original model, and this is because, in the improved 2D CML model, the values of are covered fully the interval when and when in the original one.
4. Construction of the ChaoticBased Measurement Matrix
4.1. The Independence Testing of Chaotic Sequences
The chaotic sequences utilized for constructing the measurement matrix must satisfy the RIP, and the chaotic sequences are requested to be independently identically distributed. To authenticate that the chaotic sequences generated by the improved 2D CML model are independent, only the independent sequences can be used as the chaoticbased measurement matrix for compressing the digital image. Moreover, the PPD expression of the model cannot be derived at present; it indicates that we only apply the wellknown simulation method to verify the independent; according to the test for independence, we make use of that method to judge whether the chaotic sequences are independent. The stepbystep details of the independence testing method are summarized as follows. Step 1. Let and Y be two sequences; the variances of and Y are and , respectively. The covariance of and Y is , and the relation among them is as follows: Step 2. Supposing that and Y are independent, we use equation (18) to calculate the values of . When satisfies equation (19), the hypothesis testing is reasonable. Otherwise, it is unreasonable. where , , and is the length of the sequence. Step 3. Based on the primary steps, in the improved 2D CML model, select and , the interval of time series is 40, set different initial values for the two improved 2D CML models, and iterate those two models for 2,000 times to eliminate the influence of initial value. Step 4. Perform the two improved 2D CML models, choose the chaotic sequences generated by the node of the 4^{th} row and the 4^{th} column for each iteration, and combine the chaotic sequences with the length 1,000. Step 5. Repeat the above testing for 100 times and plot the testing results in Figure 8. According to Figure 8, it is clear that the chaotic sequences generated by the above steps are independent.
4.2. The ChaoticBased Measurement Matrix
The CS plays an important part in the proposed image encryption scheme. According to equation (6), it is essential to design enough complex chaoticbased matrix . The chaotic sequences have complex chaotic performance and also those sequences are independent by the independence testing. We unitize those chaotic sequences to design the chaoticbased measurement matrix ; the detailed processing is described in Algorithm 1.

5. The Proposed Image Encryption Scheme
Based on the proposed 2D CML model, unitizing the most complexity of the improved model and the high efficiency of the CS to enhance the security and efficiency of the encryption scheme, we design a novel safe image encryption scheme in this section. The key components of the scheme are depicted in Figure 9, and the main flow flat contains the processing of DCT, CS, diffusion, and confusion.
5.1. The Proposed Image Encryption Algorithm
In the proposed image encryption scheme, the processing of the scheme is described in Figure 10, and the detailed steps are elaborated in the following steps. Step 1. Choose the plain image with size , and separate into , , and . Then, produce the discrete cosine transform (DCT) basis and sparse , , and with equation (20); we have , , and with size. Step 2. Utilize Algorithm 1 to generate the chaotic measurement matrix , respectively. According to equation (21), use the chaotic measurement matrix to compress , and and obtain the compressive matrix . Step 3. For the compressive matrix , we do the normalization to transform the values of into the interval by equation (22), respectively. We have the new compressive matrix , , . where is the rounding function and , , , , and are the maximum and minimum of , respectively. , and . Step 4. Utilize the plain image and generate the MAC value by the following equation: where where , , and are the Hash encryption function, the function of transforming Hexadecimal to Decima, and the average function, respectively. is the sum function, is the maximum function, and is the minimum function. is partitioned into 8bit subblocks. Then, each block with binary format is transformed into the integer with decimal format, and the number of all the integers is 32. Then, we do the following:(і)Apply the 2DWT to , , and . We obtain , and .(ii)Substitute the corresponding Hash values into with the first 32 values.(iii)According to the IDWT, we obtain new , , and . Step 5. The step includes the two following parts:(і)Utilize the plain image and the parameter is generated by the following equation: (ii)In the proposed 2D CML model, set , , and and , and iterate the two models for 2,000 times to eliminate the influence of initial values. Then, generate the chaotic sequences . According to equation (26), use the sequences to diffuse the compressive matrix , , and get the diffusion matrix , . where . Step 6. Utilize the sequences to change the pixel values of , according to the following operations:(і)For some points , and in the row and the column, compute .(ii)Denote the element of as and change the value as follows:(iii)Repeat 12 by setting and . Finally, output the confused components , , and . Step 7. For each ,, we do the following operation: get , , and , and combine them into the encryption image C.
5.2. Recovering the Plain Image
According to the proposed image encryption scheme in Section 5.1, we can obtain the encryption image C. The recovering encryption image is the reverse processing of the proposed scheme, and the specific details are as follows: for the encryption image C, we use equation (29) to get ,. Then, utilize the sequences to change the pixel values of , and diffuse the sequences , according to equations (30) and (31), respectively. Finally, we can get the plain image by equations (32) and (33).where and .
6. Experimental Analysis
To verify that the proposed image encryption scheme in Section 5 is effective, we perform the following experiments and analyse the corresponding statistical results of the plain image and encrypted image; all the experimental results and analyses are to demonstrate that the proposed image encryption scheme is suitable for compressing and encrypting the plain image.
6.1. The Encryption Image
Choose the plain images of Lena (), Peppers (), Women (), and Tree (); based on the improved 2D CML model in Section 3 and the proposed image encryption scheme in Section 5, set in the improved 2D CML model and the compressive rate is 0.5; we show the encryption image and the recovering image in Figure 11. According to Figure 11, the encryption images are chaos, irregular and hiding the information of the plain image well. Meanwhile, the recovering images are almost the same as the plain images. All abovementioned results prove that the encryption image scheme is practicable and feasible.
(a)
(b)
(c)
6.2. The Statistical Results
The histogram of the plain image reflects the statistics distributed state of the image grayscale value; the more the even statistics are distributed, the less information is exposed. The histograms of the plain image and the encryption image are listed in Figures 12–15 . For example, Figures 12(a)–12(c) present the histogram of the plain image of Lena in Red, Green, and Blue, respectively. It can be seen from the histogram that the results of Lena are quite not uniform; the image grayscale values concentrate in the certain interval. Meanwhile, Figures 12(d)–12(f) show the distributed state of the encryption image of Lena in Red, Green, and Blue, respectively. It is clear that the histogram results of the encryption image of Lena are pretty uniform, which means that the encryption scheme can realize hiding the grayscale value information of the plain image. Similarly, Figures 12–15 demonstrate that the encryption image scheme possesses outstanding encryption performance.
(a)
(b)
(c)
(d)
(e)
(f)
(a)
(b)
(c)
(d)
(e)
(f)
(a)
(b)
(c)
(d)
(e)
(f)
(a)
(b)
(c)
(d)
(e)
(f)
In addition, the correlation coefficients of horizontal (H), vertical (V), and diagonal (D) adjacent in the plain image and encryption image are utilized to measure the correlation among those grayscale values. Choose 2,000 pairs of H, V, and D adjacent grayscale, respectively, and plot them in Figures 16–19 . According to Figure 16, the results of Lena are shown in Figures 16(a)–16(c), and it can be seen that the grayscale values are concentrated. However, the results of the encryption of Lena are uniform. Moreover, according to equations (34) and (35), we calculate the correlation coefficients of level, vertical, and diagonal adjacent and list them in Table 1. It is clear that the correlation coefficients are all quite close to 0 from Table 1. Thus, there is no relation among the pixel in the encryption image, which suggests that the proposed encryption image scheme holds well encryption characteristic.where and are the adjacent grayscale values, respectively. , and is the number of the grayscale pixel pairs.
(a)
(b)
(c)
(d)
(e)
(f)
(a)
(b)
(c)
(d)
(e)
(f)
(a)
(b)
(c)
(d)
(e)
(f)
(a)
(b)
(c)
(d)
(e)
(f)

6.3. Information Entropy Analysis
The information entropy describes the average information in the image; its ideal value can be calculated by equation (36) and the value is 8.0.where is the grayscale value of the plain image and is the rate of the grayscale value .
According to equation (36), we list the information entropy values in Table 2.

6.4. Differential Attack Analysis
Considering the differential attack, the attacker usually adjusts to the plaintext and compares differences with the ciphertexts generated before and after the adjustment to attack. For the differential attacks on the image encryption, the two indicators, the number of pixels change rate (NPCR) and the unified average changing intensity (UACI), are evaluated according to equations (37) and (38), and the corresponding calculation formulas are as follows:where and are two encryption images; then, . is as follows:
The results of NPCR and UACI are calculated in Table 3; the ideal values are 0.996094 and 0.334635, respectively. According to Table 3, it can be seen that all the test results are quite close to the ideal values. Therefore, the proposed encryption images scheme has good ability to resist the differential attacks effectively.

6.5. Key Security Analysis
6.5.1. Key Space Analysis
For the image encryption scheme, a larger size of key indicates the larger key space. From the perspective of security, it is infeasible to make brute force when the key space is enough large. The general requirement value of resisting the attack is . In the proposed image encryption scheme, the initial values of all 16 nodes are used as the key for two times. According to the IEEE 754 floatingpoint standard, the precision of the floating number for each node is , and there are totally , which is much larger than . Thus, it is clear that the image encryption scheme can greatly satisfy the need of resisting the bruteforce attacks.
6.5.2. Key Sensitivity Analysis
The key sensitivity denotes that great changes are caused due to a tiny change of the key. According to the following cases, we do the tests of key sensitivity in the proposed image encryption scheme. Case 1: keep the original parameter unchanged Case 2: the parameter is changed from to
Considering the above cases, under the condition of the different parameters as the key, we use the proposed image encryption scheme to compare the differences of the ciphertext, and the differences of the ciphertext are shown in Table 4. According to Table 4, a tiny change of the key would lead to the huge change of the ciphertext. The differences are all larger than 99.5%, which indicates that the image encryption scheme has well key sensitivity.

6.6. Comparison Analysis
In this section, to further verify that the proposed image encryption scheme has good encryption characteristic, we compare those schemes with the proposed scheme, and, according to the existing image encryption schemes in [24–30], we present the comparison results for correlation coefficient, NPCR, UACI, and information entropy in Tables 5–7 . According to the correlation coefficients results of the proposed scheme and other schemes from Table 5, it can be seen that the correlation coefficients results in the proposed scheme are almost 0, which are smaller than the schemes in [25–29]. In Table 6, The NPCR and UACI results of the proposed scheme and other schemes are shown, and the values in the proposed scheme are closer to the ideal values (NPCR = 0.996094, UACI = 0.334635) than the schemes in [25, 27, 29, 30]. Meanwhile, the information entropy results of the proposed scheme and other schemes are listed in Table 7, and the information entropy values of R, G, and B in our scheme are 7.9986, 7.9985, and 7.9985, respectively. Above all, the comparison analysis fully proves that the proposed scheme has outstanding chaotic characteristic.



7. Conclusion
In our paper, based on the 2D CML model, to overcome the problem of the uneven PDD in the sequences generated in the original 2D CML model, we add the offset for the model after each iteration. The improved 2D CML model has much better chaotic performance than the original 2D CML model. According to the proposed 2D CML model, we proposed a new compressive image encryption scheme, and we unitized the improved 2D CML model for compression. The analysis and simulation demonstrate that the improved image encryption scheme possesses perfect encryption characteristics and application prospects.
Data Availability
The data used to support the findings of this study are available within the article.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
Acknowledgments
This work was supported by grants from the National Natural Science Foundation of China (no. 61572089), the Doctoral Talent Training Project of Chongqing University of Posts and Telecommunications (no. BYJS202003), the Science and Technology Foundation Project of Guizhou Province (QianKeHeJiChu[2020]1Y422), and the Key Project Research Achievements of Guizhou Education University in 2020 (no. 2020ZD006).
References
 A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Advances in Optics and Photonics, vol. 1, no. 3, pp. 589–636, 2009. View at: Publisher Site  Google Scholar
 Y. Zhang, Y. Xiang, L. Y. Zhang, L.X. Yang, and J. Zhou, “Efficiently and securely outsourcing compressed sensing reconstruction to a cloud,” Information Sciences, vol. 496, pp. 150–160, 2019. View at: Publisher Site  Google Scholar
 R. Hamza, Z. Yan, K. Muhammad, P. Bellavista, and F. Titouna, “A privacypreserving cryptosystem for IOT Ehealthcare,” Information Sciences, vol. 527, pp. 493–510, 2020. View at: Publisher Site  Google Scholar
 G. Ye, K. Jiao, H. Wu, C. Pan, and X. Huang, “An asymmetric image encryption algorithm based on a fractionalorder chaotic system and the RSA publickey cryptosystem,” International Journal of Bifurcation and Chaos, vol. 30, no. 15, Article ID 2050233, 2020. View at: Publisher Site  Google Scholar
 Y. J. Xian, S. J. Xie, and Y. L. Tu, “Multiimage encryption algorithm based on hyperchaotic system,” Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), vol. 32, no. 6, 2020. View at: Google Scholar
 S. Arabnejad, B. Johnston, M. Tanzer, and D. Pasini, “Fully porous 3D printed titanium femoral stem to reduce stressshielding following total hip arthroplasty,” Journal of Orthopaedic Research, vol. 35, no. 8, pp. 1774–1783, 2017. View at: Publisher Site  Google Scholar
 C. G. Reile, M. S. Rodriguez, D. D. D. Fernandes et al., “Qualitative and quantitative analysis based on digital images to determine the adulteration of ketchup samples with Sudan I dye,” Food Chemistry, vol. 328, 127101 pages, 2020. View at: Publisher Site  Google Scholar
 M. Abedi, B. Sun, and Z. Zheng, “Singlepixel compressive imaging based on random DoG filtering,” Signal Process., vol. 178, Article ID 107746, 2021. View at: Google Scholar
 G. D. Ye, P. Chen, and D. Y. Xia, “Image encryption and hiding algorithm based on compressive sensing and random numbers insertion,” Signal Process., vol. 172, Article ID 107563, 2020. View at: Google Scholar
 C. L. Chowdhary, P. V. Patel, K. J. Kathrotia, M. Attique, K. Perumal, and M. F. Ijaz, “Analytical study of hybrid techniques for image encryption and decryption,” Sensors, vol. 20, no. 18, p. 5162, 2020. View at: Publisher Site  Google Scholar
 G. Ye, C. Pan, Y. Dong, K. Jiao, and X. Huang, “A novel multi‐image visually meaningful encryption algorithm based on compressive sensing and Schur decomposition,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 2, 2021. View at: Publisher Site  Google Scholar
 S. Zhu and C. Zhu, “A new image compressionencryption scheme based on Compressive sensing and cyclic shift,” Multimedia Tools and Applications, vol. 78, no. 15, pp. 20855–20875, 2019. View at: Publisher Site  Google Scholar
 S. Oishi and H. Inoue, “Pseudorandom number generators and chaos,” IEICE Transactions (1976–1990), vol. 65, no. 9, pp. 534–541, 1982. View at: Google Scholar
 Z. Liu, Y. Wang, Y. Zhao, and L. Y. Zhang, “A stream cipher algorithm based on 2D coupled map lattice and partitioned cellular automata,” Nonlinear Dynamics, vol. 101, no. 2, pp. 1383–1396, 2020. View at: Publisher Site  Google Scholar
 Y. J. Sun, H. Zhang, X. Y. Wang et al., “2D Nonadjacent coupled map lattice with q and its applications in image encryption,” Advances in Optics and Photonics, vol. 373, 125039 pages, 2020. View at: Publisher Site  Google Scholar
 Y. He, Y.Q. Zhang, and X.Y. Wang, “A new image encryption algorithm based on twodimensional spatiotemporal chaotic system,” Neural Computing and Applications, vol. 32, no. 1, pp. 247–260, 2020. View at: Publisher Site  Google Scholar
 S. M. Seyedzadeh, B. Norouzi, M. R. Mosavi et al., “A novel color image encryption algorithm based on spatial permutation and quantum chaotic map,” Nonlinear Dynamics, vol. 81, no. 12, pp. 511–529, 2015. View at: Publisher Site  Google Scholar
 X. L. Chai, J. Q. Bi, Z. H. Gan et al., “Color image compression and encryption scheme based on compressive sensing and double random encryption strategy,” Signal Process, vol. 176, Article ID 107684, 2020. View at: Google Scholar
 S. Kayalvizhi and S. Malarvizhi, “A novel encrypted compressive sensing of images based on fractional order hyper chaotic Chen system and DNA operations,” Multimedia Tools and Applications, vol. 79, no. 56, pp. 3957–3974, 2020. View at: Publisher Site  Google Scholar
 K. Kaneko, “Pattern dynamics in spatiotemporal chaos: pattern selection, diffusion of defect and pattern competition intermittency,” Journal of Physics D, vol. 34, no. 12, pp. 1–41, 1989. View at: Publisher Site  Google Scholar
 Y. Wang, Z. Liu, J. Ma, and H. He, “A pseudorandom number generator based on piecewise logistic map,” Nonlinear Dynamics, vol. 83, no. 4, pp. 2373–2391, 2016. View at: Publisher Site  Google Scholar
 E. J. Candes and T. Tao, “Nearoptimal signal recovery from random projections: universal encoding strategies?” IEEE Transactions on Information Theory, vol. 52, no. 12, pp. 5406–5425, 2006. View at: Publisher Site  Google Scholar
 M. Ding and W. Yang, “Stability of synchronous chaos and onoff intermittency in coupled map lattices,” Physical Review E, vol. 56, no. 4, pp. 4009–4016, 1997. View at: Publisher Site  Google Scholar
 L. Huang, S. Cai, M. Xiao, and X. Xiong, “A simple chaotic mapbased image encryption system using both plaintext related permutation and diffusion,” Entropy, vol. 20, no. 535, 2018. View at: Publisher Site  Google Scholar
 X.J. Tong, M. Zhang, Z. Wang, Y. Liu, H. Xu, and J. Ma, “A fast encryption algorithm of color image based on fourdimensional chaotic system,” Journal of Visual Communication and Image Representation, vol. 33, pp. 219–234, 2015. View at: Publisher Site  Google Scholar
 C. Pak and L. Huang, “A new color image encryption using combination of the 1D chaotic map,” Signal Processing, vol. 138, pp. 129–137, 2017. View at: Publisher Site  Google Scholar
 M. Mollaeefar, A. Sharif, and M. Nazari, “A novel encryption scheme for colored image based on high level chaotic maps,” Multimedia Tools and Applications, vol. 76, no. 1, pp. 607–629, 2017. View at: Publisher Site  Google Scholar
 S. Cai, L. Huang, X. Chen et al., “A symmetric plaintextrelated color image encryption system based on bit permutation,” Entropy, vol. 20, no. 282, 2018. View at: Publisher Site  Google Scholar
 X. Wu, B. Zhu, Y. Hu et al., “A novel color image encryption scheme using rectangular transformenhanced chaotic tent maps,” IEEE Access, vol. 5, pp. 6429–6436, 2017. View at: Google Scholar
 A. U. Rehman and X. Liao, “A novel robust dual diffusion/confusion encryption technique for color image based on Chaos, DNA and SHA2,” Multimedia Tools and Applications, vol. 78, no. 2, pp. 2105–2133, 2019. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2021 Zhuo Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.