Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A Compressed Sensing and Image Encryption based on Adaptive Rossler Hyper Chaotic Encryption for Tamper Localization and Recovery Model

View through CrossRef
Objectives: A novel image encryption with a tamper localization model is suggested in this paper. Focusing on tamper localization has the efficiency to accurately protect the integrity and authenticity of images. In order to improve the quality of the image, the tampering localization plays a crucial role in locating the unauthorized changes in the images. Methods: Initially, the raw images are collected from the standard dataset. Further, the collected images are given to the Adaptive Dual-Tree Complex Wavelet Transforms (ADTCWT), which divides the input image into low and high-frequency images. Here, the attributes in the ADTCWT are optimized by the Improved Social Engineering Optimizer (ISEO). The obtained high-frequency images are encrypted using the Arnold Scrambling. Here, the sparse representation is employed to do the Compressive Sensing (CS) in the high-frequency images. Similarly, the low-frequency images are encrypted by the Arnold Scrambling, and also, the watermarking process is carried out on the low-frequency image. The processed low and high-frequency images are fed into the Adaptive Rossler Hyper Chaotic Encryption (ARHCE) model for the encryption process. Moreover, the same ISEO is employed for tuning the attributes in the structure. After that, the inverse ADTCWT is used to perform the inverse decomposition to get the original images in encrypted form. Also, the encrypted images are provided to ARHCE for image decryption. Then, the decrypted images are given to the ADTCWT for decomposition to generate low and high-frequency images. The watermark extraction is carried out on the low-frequency image. Hence, the tamper localization and the recovery process are carried out on the low-frequency image. Afterward, the high-frequency image is subjected to the inverse CS, and it is decrypted by the Arnold Scrambling. The decrypted low-frequency and high-frequency images are fed into the inverse ADTCWT to get the original image. Results: Finally, the performance of the developed model is evaluated by comparing it with the existing techniques in terms of various measures. Comparing PSNR measures in the developed framework, the performance shows 29.2%, 20.4%, 10.4% and 35.8% over DWT, Chaotic map, NSCT, and RHCE at varying image sizes of [Formula: see text], respectively. Conclusion: By validating these performance measures, the developed model is widely applicable in large scale analysis and also it provides improved tamper localization performance. This extensive experiments shows the developed model provides robust performance than the state-of-the-art-methods.
Title: A Compressed Sensing and Image Encryption based on Adaptive Rossler Hyper Chaotic Encryption for Tamper Localization and Recovery Model
Description:
Objectives: A novel image encryption with a tamper localization model is suggested in this paper.
Focusing on tamper localization has the efficiency to accurately protect the integrity and authenticity of images.
In order to improve the quality of the image, the tampering localization plays a crucial role in locating the unauthorized changes in the images.
Methods: Initially, the raw images are collected from the standard dataset.
Further, the collected images are given to the Adaptive Dual-Tree Complex Wavelet Transforms (ADTCWT), which divides the input image into low and high-frequency images.
Here, the attributes in the ADTCWT are optimized by the Improved Social Engineering Optimizer (ISEO).
The obtained high-frequency images are encrypted using the Arnold Scrambling.
Here, the sparse representation is employed to do the Compressive Sensing (CS) in the high-frequency images.
Similarly, the low-frequency images are encrypted by the Arnold Scrambling, and also, the watermarking process is carried out on the low-frequency image.
The processed low and high-frequency images are fed into the Adaptive Rossler Hyper Chaotic Encryption (ARHCE) model for the encryption process.
Moreover, the same ISEO is employed for tuning the attributes in the structure.
After that, the inverse ADTCWT is used to perform the inverse decomposition to get the original images in encrypted form.
Also, the encrypted images are provided to ARHCE for image decryption.
Then, the decrypted images are given to the ADTCWT for decomposition to generate low and high-frequency images.
The watermark extraction is carried out on the low-frequency image.
Hence, the tamper localization and the recovery process are carried out on the low-frequency image.
Afterward, the high-frequency image is subjected to the inverse CS, and it is decrypted by the Arnold Scrambling.
The decrypted low-frequency and high-frequency images are fed into the inverse ADTCWT to get the original image.
Results: Finally, the performance of the developed model is evaluated by comparing it with the existing techniques in terms of various measures.
Comparing PSNR measures in the developed framework, the performance shows 29.
2%, 20.
4%, 10.
4% and 35.
8% over DWT, Chaotic map, NSCT, and RHCE at varying image sizes of [Formula: see text], respectively.
Conclusion: By validating these performance measures, the developed model is widely applicable in large scale analysis and also it provides improved tamper localization performance.
This extensive experiments shows the developed model provides robust performance than the state-of-the-art-methods.

Related Results

Extractraction of non-stationary harmonic from chaotic background based on synchrosqueezed wavelet transform
Extractraction of non-stationary harmonic from chaotic background based on synchrosqueezed wavelet transform
The signal detection in chaotic background has gradually become one of the research focuses in recent years. Previous research showed that the measured signals were often unavoidab...
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map. The mathem...
Current therapeutic strategies for erectile function recovery after radical prostatectomy – literature review and meta-analysis
Current therapeutic strategies for erectile function recovery after radical prostatectomy – literature review and meta-analysis
Radical prostatectomy is the most commonly performed treatment option for localised prostate cancer. In the last decades the surgical technique has been improved and modified in or...
Indoor Localization System Based on RSSI-APIT Algorithm
Indoor Localization System Based on RSSI-APIT Algorithm
An indoor localization system based on the RSSI-APIT algorithm is designed in this study. Integrated RSSI (received signal strength indication) and non-ranging APIT (approximate pe...
Fuzzy Chaotic Neural Networks
Fuzzy Chaotic Neural Networks
An understanding of the human brain’s local function has improved in recent years. But the cognition of human brain’s working process as a whole is still obscure. Both fuzzy logic ...
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Abstract This study examines the use of chaos theory to image encryption by proposing a unique algorithm for image encryption based on two chaotic maps: Arnold’s CatMap and...
Medical image encryption algorithm based on hyper‐chaotic system and DNA coding
Medical image encryption algorithm based on hyper‐chaotic system and DNA coding
AbstractWith the international development of the medical service informatisation, medical information sharing has become the key standard to measure the degree of medical informat...
Reversible Watermarking Authentication Algorithm For Color Images Based On Compressed Sensing
Reversible Watermarking Authentication Algorithm For Color Images Based On Compressed Sensing
Abstract Aiming at the shortcomings of existing reversible watermarking for image authentication, such as poor ability of tamper detection and localization, and low ...

Back to Top