{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:54:43Z","timestamp":1753890883881,"version":"3.41.2"},"reference-count":34,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:00:00Z","timestamp":1730246400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Comput. Sci."],"abstract":"<jats:p>The presented research introduces a new approach to simultaneously compressing and encrypting images using chaotic compressive sensing. This technique involves transforming the image into sparser data using the discrete cosine transform basis, which is then compressed through projection onto a lower dimensional space using a measurement matrix designed based on a new chaotic map. The proposed chaotic map produced a Lyapunov exponent value of 2.675 proving its chaotic behavior. The proposed map is also highly sensitive to initial values, making it a secure basis for encryption. The compressed data with the proposed map is then embedded onto a colorful image for transmission. This approach achieves both compression and visually meaningful encryption of images. Quantitative and Qualitative results on the proposed compression-encryption algorithm shows the effectiveness of the methodology against chosen plaintext attacks and cipher-only attacks.<\/jats:p>","DOI":"10.3389\/fcomp.2024.1274704","type":"journal-article","created":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:58:52Z","timestamp":1730300332000},"update-policy":"https:\/\/doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Concurrent compression and meaningful encryption of images using chaotic compressive sensing"],"prefix":"10.3389","volume":"6","author":[{"given":"K.","family":"Ashwini","sequence":"first","affiliation":[]},{"given":"S.","family":"Sutha","sequence":"additional","affiliation":[]},{"given":"Sountharrajan","family":"S.","sequence":"additional","affiliation":[]},{"given":"Durga Prasad","family":"Bavirisetti","sequence":"additional","affiliation":[]}],"member":"1965","published-online":{"date-parts":[[2024,10,30]]},"reference":[{"key":"B1","doi-asserted-by":"publisher","first-page":"31581","DOI":"10.1007\/s11042-018-6112-4","article-title":"Fast and secured cloud assisted recovery scheme for compressively sensed signals using new chaotic system","volume":"77","author":"Ashwini","year":"2018","journal-title":"Multimed. Tools Appl"},{"key":"B2","doi-asserted-by":"publisher","first-page":"10839","DOI":"10.1007\/s11042-020-10327-4","article-title":"Compressive sensing based recognition of human upper limb motions with kinect skeletal data","volume":"80","author":"Ashwini","year":"2021","journal-title":"Multimed. Tools Appl"},{"key":"B3","first-page":"1433","article-title":"\u201cCompressive sampling,\u201d","volume-title":"Proceedings of the International Congress of Mathematicians","author":"Cand\u00e8s","year":"2006"},{"key":"B4","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1016\/j.crma.2008.03.014","article-title":"The restricted isometry property and its implications for compressed sensing","volume":"346","author":"Candes","year":"2008","journal-title":"Comptes Rendus Mathematique"},{"key":"B5","doi-asserted-by":"publisher","first-page":"106448","DOI":"10.1016\/j.optlaseng.2020.106448","article-title":"A novel chaos based optical cryptosystem for multiple images using dna-blend and gyrator transform","volume":"138","author":"Chen","year":"2021","journal-title":"Opt. Lasers Eng"},{"key":"B6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-021-03187-w","article-title":"Quantum multi-image compression-encryption scheme based on quantum discrete cosine transform and 4d hyper-chaotic henon map","volume":"20","author":"Dai","year":"2021","journal-title":"Quantum Inform. Proc"},{"key":"B7","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","article-title":"Compressed sensing","volume":"52","author":"Donoho","year":"2006","journal-title":"IEEE Trans. Informat. Theory"},{"key":"B8","doi-asserted-by":"publisher","first-page":"17405","DOI":"10.1007\/s11042-016-3907-z","article-title":"A novel chaos optimization algorithm","volume":"76","author":"Feng","year":"2017","journal-title":"Multimed. Tools Appl"},{"key":"B9","doi-asserted-by":"publisher","first-page":"109665","DOI":"10.1016\/j.optlastec.2023.109665","article-title":"Dual color images watermarking scheme with geometric correction based on quaternion froofmms and LS-SVR","volume":"167","author":"Gong","year":"2023","journal-title":"Optics &Laser Technology"},{"key":"B10","doi-asserted-by":"publisher","first-page":"19487","DOI":"10.1007\/s11071-023-08545-0","article-title":"Novel 3-d hyperchaotic map with hidden attractor and its application in meaningful image encryption","volume":"111","author":"Hu","year":"2023","journal-title":"Nonlinear Dyn"},{"key":"B11","doi-asserted-by":"crossref","first-page":"3229","DOI":"10.1109\/SMC.2014.6974425","article-title":"\u201cImage encryption using 2d logistic-sine chaotic map,\u201d","volume-title":"2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","author":"Hua","year":"2014"},{"key":"B12","doi-asserted-by":"publisher","first-page":"173804","DOI":"10.1007\/s11704-022-1419-8","article-title":"Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform","volume":"17","author":"Huang","year":"2023","journal-title":"Front. Comp. Sci"},{"key":"B13","doi-asserted-by":"publisher","first-page":"14945","DOI":"10.1007\/s11042-022-14072-8","article-title":"Ecg steganography using base64 encoding and pixel swapping technique","volume":"82","author":"Mathivanan","year":"2023","journal-title":"Multimed. Tools Appl"},{"key":"B14","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1080\/13682199.2023.2182547","article-title":"A color image encryption scheme using customized map","volume":"71","author":"Mathivanan","year":"2023","journal-title":"Imag. Sci. J"},{"key":"B15","doi-asserted-by":"publisher","first-page":"102560","DOI":"10.1016\/j.jisa.2020.102560","article-title":"A novel image encryption algorithm using chaotic compressive sensing and nonlinear exponential function","volume":"54","author":"Musanna","year":"2020","journal-title":"J. Inform. Security Appl"},{"key":"B16","doi-asserted-by":"publisher","first-page":"3670","DOI":"10.1103\/PhysRevE.51.3670","article-title":"Logistic map: a possible random-number generator","volume":"51","author":"Phatak","year":"1995","journal-title":"Phys. Rev. E"},{"key":"B17","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1063\/1.166092","article-title":"Approximate entropy (apen) as a complexity measure","volume":"5","author":"Pincus","year":"1995","journal-title":"Chaos: Interdisc. J. Nonlinear Sci"},{"key":"B18","doi-asserted-by":"publisher","first-page":"170168","DOI":"10.1109\/ACCESS.2019.2955570","article-title":"Meaningful encryption: generating visually meaningful encrypted images by compressive sensing and reversible color transformation","volume":"7","author":"Ping","year":"2019","journal-title":"IEEE Access"},{"key":"B19","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1109\/TCSII.2019.2897839","article-title":"Design and analysis of compressive sensing-based lightweight encryption scheme for multimedia iot","volume":"67","author":"Unde","year":"2019","journal-title":"IEEE Trans. Circuits Syst. II: Express Briefs"},{"key":"B20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JPHOT.2018.2831252","article-title":"Image encryption using compressive sensing and detour cylindrical diffraction","volume":"10","author":"Wang","year":"2018","journal-title":"IEEE Photonics J"},{"key":"B21","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/0167-2789(85)90011-9","article-title":"Determining lyapunov exponents from a time series","volume":"16","author":"Wolf","year":"1985","journal-title":"Physica D: Nonlin. Phenom"},{"key":"B22","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.optlaseng.2019.04.011","article-title":"A fast image encryption algorithm based on compressive sensing and hyperchaotic map","volume":"121","author":"Xu","year":"2019","journal-title":"Opt. Lasers Eng"},{"key":"B23","doi-asserted-by":"publisher","first-page":"106178","DOI":"10.1016\/j.optlaseng.2020.106178","article-title":"An effective image encryption algorithm based on compressive sensing and 2D-SLIM","volume":"134","author":"Xu","year":"2020","journal-title":"Opt. Lasers Eng"},{"key":"B24","doi-asserted-by":"publisher","first-page":"3049","DOI":"10.1109\/TMC.2020.2992737","article-title":"Towards a compressive-sensing-based lightweight encryption scheme for the internet of things","volume":"20","author":"Xue","year":"2020","journal-title":"IEEE Trans. Mobile Comp"},{"key":"B25","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.ins.2021.08.073","article-title":"Using m-ary decomposition and virtual bits for visually meaningful image encryption","volume":"580","author":"Yang","year":"2021","journal-title":"Inf. Sci"},{"key":"B26","doi-asserted-by":"publisher","first-page":"107563","DOI":"10.1016\/j.sigpro.2020.107563","article-title":"Image encryption and hiding algorithm based on compressive sensing and random numbers insertion","volume":"172","author":"Ye","year":"2020","journal-title":"Signal Proc"},{"key":"B27","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1109\/LSP.2010.2052243","article-title":"Compressive sensing with chaotic sequence","volume":"17","author":"Yu","year":"2010","journal-title":"IEEE Signal Process. Lett"},{"key":"B28","doi-asserted-by":"publisher","first-page":"40838","DOI":"10.1109\/ACCESS.2020.2976798","article-title":"Image compression and encryption scheme based on compressive sensing and fourier transform","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Access"},{"key":"B29","doi-asserted-by":"publisher","first-page":"107073","DOI":"10.1016\/j.optlastec.2021.107073","article-title":"Multiple-image encryption algorithm based on the 3d scrambling model and dynamic dna coding","volume":"141","author":"Zhang","year":"2021","journal-title":"Opt. Laser Technol"},{"key":"B30","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.optlastec.2016.02.018","article-title":"Image compression-encryption scheme based on hyper-chaotic system and 2d compressive sensing","volume":"82","author":"Zhou","year":"2016","journal-title":"Optics Laser Technol"},{"key":"B31","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.optlastec.2014.02.015","article-title":"Novel image compression-encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing","volume":"62","author":"Zhou","year":"2014","journal-title":"Optics Laser Technol"},{"key":"B32","doi-asserted-by":"publisher","first-page":"122052","DOI":"10.1016\/j.eswa.2023.122052","article-title":"Novel multiple color images encryption and decryption scheme based on a bit-level extension algorithm","volume":"238","author":"Zhou","year":"2024","journal-title":"Expert Syst. Appl"},{"key":"B33","doi-asserted-by":"publisher","first-page":"109107","DOI":"10.1016\/j.sigpro.2023.109107","article-title":"Multi-image encryption scheme with quaternion discrete fractional tchebyshev moment transform and cross-coupling operation","volume":"211","author":"Zhou","year":"2023","journal-title":"Signal Proc"},{"key":"B34","doi-asserted-by":"publisher","first-page":"107629","DOI":"10.1016\/j.sigpro.2020.107629","article-title":"A robust meaningful image encryption scheme based on block compressive sensing and svd embedding","volume":"175","author":"Zhu","year":"2020","journal-title":"Signal Proc"}],"container-title":["Frontiers in Computer Science"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fcomp.2024.1274704\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:58:55Z","timestamp":1730300335000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fcomp.2024.1274704\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,30]]},"references-count":34,"alternative-id":["10.3389\/fcomp.2024.1274704"],"URL":"https:\/\/doi.org\/10.3389\/fcomp.2024.1274704","relation":{},"ISSN":["2624-9898"],"issn-type":[{"type":"electronic","value":"2624-9898"}],"subject":[],"published":{"date-parts":[[2024,10,30]]},"article-number":"1274704"}}