Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing

+e rapid development of the Internet leads to a surge in the amount of information transmission and brings many security problems. For multimedia information transmission, especially digital images, it is necessary to compress and encrypt at the same time.+e emergence of compressive sensing solves this problem. Compressive sensing can compress and encrypt at the same time, which can not only reduce the transmission bandwidth of the network but also improve the security of the system. However, when using compressive sensing encryption, the whole measurement matrix needs to be stored, and the compressive sensing can be combined with a chaotic system, so only the generation parameters of the matrix need to be stored, and the security of the system can be further improved by using the sensitivity of the chaotic system. +is paper introduces a secure and efficient image compression-encryption scheme using a new chaotic structure and compressive sensing. +e chaotic map used in the scheme is generated by our new and universal chaotic structure, which not only expands the chaotic range of the chaotic system but also improves the performance of the chaotic system. After analyzing the performance comparison of traditional one-dimensional chaotic maps and some existing methods, the image compression-encryption scheme based on a new chaotic structure and compressive sensing has a good encryption effect and large keyspace, which can resist brute force attack and statistical attack.


Introduction
With the advent of the fifth-generation mobile networks (5G) era, the amount of information transmission is gradually increasing, and the requirements for transmission speed are also increased significantly, which requires more effective compression sampling methods to achieve higher sampling rates and signal processing speeds. Due to the security problems of the network itself, multimedia data are vulnerable to various attacks in the process of storage and secure transmission in the network, so it is particularly important to ensure the security of media information data [1,2]. In order to carry out multimedia communication more effectively, the original image must be compressed and encrypted at the same time, and the emergence of compressive sensing can solve this problem. In 2006, Donoho [3] and Candès et al. [4] formally proposed the theory of compressive sensing (CS). Compressive sensing is an improvement on the Nyquist sampling, which can sample sparse signals nonuniformly with the number of samples far less than Nyquist sampling law and recover the original data with the reconstruction performance lower than Nyquist sampling. It is widely used in wireless sensor networks, image encryption, image data hiding, etc.
Due to the use of compressive sensing for encryption, the whole measurement matrix needs to be stored, which requires a large amount of storage space. However, it is possible to use the chaotic system that only needs to store the generation parameters of the measurement matrix, instead of storing the characteristics of the whole measurement matrix to reduce the storage space. Because of their chaotic characteristics, such as sensitivity to initial values and parameters [5,6], ergodicity [7,8], and uncertainty [9,10], chaotic systems have been widely used in encryption fields [11][12][13]. erefore, researchers have designed many image encryption algorithms that combine compressive sensing with chaotic systems [14][15][16].
Peng et al. [14] proposed a security and energy-saving scheme in wireless body area networks, which can solve both energy-saving and data security problems. Compared with the traditional encryption scheme, which only used one matrix to encrypt, they use any one of Chebyshev map, Logistic map, and Tent map to generate two chaotic matrices to encrypt at the same time, which increased the security and solved the security problem in a wireless volume domain network. Wang et al. [15] proposed a visual security image encryption scheme with parallel compressive sensing and designed a visual security encryption scheme with parallel compressive sensing counter mode and embedding technology. In order to achieve a higher security level, the Logistic-Tent chaotic system and 3D Cat map are introduced to construct the measurement matrix, and Zigzag confusion is used for interference. Chai et al. [16] proposed an image encryption method based on the combination of a magnetically controlled memristive chaotic system and compressive sensing. is scheme uses the technologies of a magnetically controlled memristive chaotic system, Secure Hash Algorithm-(SHA-) 512, and cellular automata. In this scheme, cellular automata are used in the diffusion stage to enhance the security of the encryption system, and SHA-512 is used to calculate the initial value of the chaotic system and further generate a measurement matrix, which makes the measurement matrix used in encrypting different types of data.
is scheme can improve the correlation between the original image and the algorithm and resist known plaintext attacks and selected plaintext attacks. Chanil et al. [17] proposed a chaotic structure and applied a Logistic map and Sine map into their structure. In order to verify the performance of the proposed chaotic structure, they proposed a new bit-level color image encryption scheme.
rough simulation analyses of the bifurcation diagram and Lyapunov exponent, it was proved that their chaotic structure was correct and the range of chaotic parameters was expanded.
We propose a secure and effective image compressionencryption scheme using the new chaotic structure and compressive sensing. e chaotic map used in the compressionencryption scheme is to apply the commonly used traditional one-dimensional chaotic maps to the new and general chaotic structure proposed by us. In this encryption scheme, compressive sensing is used for sampling, which can reduce storage space and transmission bandwidth. e chaotic system only needs to store matrix generation parameters, which can further reduce transmission bandwidth. Arnold interference technology and the SHA-256 function are also used, and the SHA-256 function makes different original images have different keys. Firstly, the Discrete Wavelet Transform (DWT) is used to sparse the original image, and then Arnold interference is applied to the sparse image. e interference parameters of Arnold interference are generated by the SHA-256 function.
en, compressive sensing is used to compress and sample the interference images. Finally, a chaotic sequence is used to perform row and column cyclic shift interference on the compressed and sampled image. Simulation results show that the compression-encryption scheme has a large parameter space and keyspace, which can prevent the statistical attack and brute force attack. e rest of this paper is arranged as follows. Section 2 introduces the related basic knowledge. Section 3 describes the proposed chaotic structure and chaotic map under a new structure. Section 4 describes our encryption and decryption scheme. Section 5 simulates and evaluates our encryption scheme. Section 6 summarizes the research content carried out in this paper.

Fundamental Knowledge
is section gives a brief introduction to the traditional onedimensional chaotic maps and compressive sensing.

Chaotic Maps.
e commonly used traditional onedimensional chaotic systems are the Sine map, Logistic map, Chebyshev map, and Tent map.
(1) Sine map Sine map is a very simple and commonly used chaotic system [18]. Sine map is denoted as where r s is the chaotic parameter of the Sine map, and s n ∈ [0, 1] is the Sine chaotic sequence.
e bifurcation diagram and Lyapunov exponent diagram of the traditional Sine map are shown in Figures 1(a) and 2(a). e Lyapunov exponent indicates that the chaotic system must have at least one positive Lyapunov exponent. When the Lyapunov exponent is positive, the chaotic characteristics of the system can be quantified; that is, a chaotic system is sensitive to initial conditions. e larger the Lyapunov exponent is, the more sensitive to initial values the chaotic system is. As can be seen from Figures 1(a) and 2(a), the Sine map has chaotic behaviors when the chaotic parameter r s is in the range r s ∈ [0.867, 1].
(2) Logistic map e logistic map is also a very simple but widely used chaotic system [19]. Its performance is similar to that of a Logistic map, and it is defined as where r l is the chaotic parameter of the Logistic map, and l n ∈ [0, 1] is the Logistic chaotic sequence.    Like the Logistic map and Sine map, the Chebyshev map is also a commonly used one-dimensional chaotic map [20], and it is defined as follows: where r c is the chaotic parameter of the Chebyshev map, and c n ∈ [− 1, 1] is the Chebyshev chaotic sequence. Tent map is defined as follows [21]: where r t is the chaotic parameter of the Tent map, and t n ∈ [0, 1] is the chaotic sequence of the Tent map. e bifurcation diagram and Lyapunov exponent diagram of the traditional Tent map are shown in Figures 1(g) and 2(g). Tent map has chaotic behaviors when the chaotic parameter r t is in the range r t ∈ (1, 2].

Compressive Sensing.
Candès et al. [22] proposed that if x ∈ R N is an unknown vector, which is sparse or compressible on a set of orthogonal bases, the unknown vector x can be accurately recovered by fewer random measured values y. And this sampling process can be described by a mathematical model as follows: where Φ is the matrix is of size M × N, M < N, and y ∈ R M is the sampling value. is mathematical representation is also a description of the standard framework of compressed perception which is a special case of underdetermined linear equations. Since there are infinitely many solutions in equation (5), the original signal x cannot be recovered directly from the sampled value y. However, if x reflects sparsity in the sparse dictionary Ψ [23], that is, where a is K-sparse and is denoted as a ∈ Σ K , so we have where θ � ΦΨ is the measurement matrix in compressive sensing. So we can recover x from y. a is recovered by Equation (8) is a l 0 optimization problem. Under certain conditions, the l 0 optimization problem can be transformed into a l 1 optimization problem. e typical conditions include Null Space Property (NSP) and Restricted Isometry Property (RIP). And the equivalent solution can be obtained by [24] min a ‖a‖ l 1 , where, y � θa. (9) For the measurement matrix, spark property should be satisfied, that is, the minimum number of linear correlation of the columns of the measurement matrix, and the formula is Donoho [25] pointed out that if spark(θ) > 2K, for any vector y ∈ R M , there is at most one signal a ∈ Σ K that makes y � θa.
Because solving a sparse solution is an NP-hard problem, it is impractical to solve the measurement matrix θ that satisfies this condition from the perspective of computation [26]. In order to recover sparse signals in reality, Candès et al. [4] introduced the RIP that there is a constant δ K ∈ (0, 1). Equation (11) holds true for all a ∈ Σ K .
Although RIP provides a theoretical guarantee for recovering K-sparse signals, it is relatively complex to verify that a measurement matrix θ meets RIP characteristics. erefore, in many cases, it is necessary to use the correlation μ(θ) of the measurement matrix θ to provide a more specific recovery guarantee. Correlation μ(θ) refers to the maximum value of the normalized inner product of two columns randomly selected in θ [27], namely, where θ i is the i-th column of θ. For any vector y, if μ(θ) ≤ 1(2K − 1), there is at most one signal a ∈ Σ K , making y � θa.

New Chaotic Structure
In this section, we firstly describe a new chaotic structure in detail, and secondly, we describe the new chaotic maps generated by applying the Sine map, Logistic map, Chebyshev map, and Tent map to the new chaotic structure.

New Chaotic Structure.
e new chaotic structure is given as follows: where F chaos (b, y n ) is the traditional one-dimensional chaotic map mentioned in Section 2, F(b, y n , k) is a new chaotic map generated under our new chaotic structure, y n ∈ [0, 1] is the chaotic sequence, b is the chaotic parameter of the proposed chaotic structure, and b can take any value. mod is a modulus function, which ensures that the values of the generated chaotic sequence are in the range [0, 1]. 2 k is an adjustment function about the iteration parameter k, which is iterated through adjustments to eliminate the transient effect. e values of b, k in this chaotic structure should be specifically analyzed according to the embedded map; that is to say, when different chaotic maps are applied to the proposed chaotic structure, the values of b, k will have different value ranges.

Application and Analysis of Our New Chaotic Structure.
In this subsection, we give the detailed analyses of new chaotic maps generated by our new chaotic structure.
(1) New Sine map under our new chaotic structure e new Sine map under our new structure is defined as follows: where S n ∈ [0, 1] is the new Sine chaotic sequence which is generated by our new chaotic structure, and (2) New Logistic map under our new chaotic structure e new Logistic map generated by our new chaotic structure is presented as follows: where L n ∈ [0, 1] is the new Logistic chaotic sequence which is generated by our new chaotic structure, and L 0 is the initial where C n ∈ [0, 1] is the new Chebyshev chaotic sequence which is generated by our new chaotic structure, and C 0 is the initial value of the new Chebyshev chaotic sequence. b C is the chaotic pa- where T n ∈ [0, 1] is the new Tent chaotic sequence which is generated by our new chaotic structure, and T 0 is the initial value of the new Tent chaotic sequence. b T is the chaotic parameter of the new Tent map, and k T is the iterations parameter of the new Tent map. e bifurcation diagram and Lyapunov exponent diagram of the new Tent map under our new structure are shown in Figures 1(h) and 2(h). e Tent map under our new chaotic structure is fully chaotic when k T ∈ [5,21], b T ∈ [0, 30].

The Proposed Compression-Encryption Scheme
In this section, a secure and effective image compressionencryption scheme is proposed by using the new chaotic map under a new structure and compressive sensing.

Key Generation
(1) e generation of the Arnold interference parameters k 1 , k 2 and the interference number (2) e generation of two improved chaotic sequences z 0 , z 1 : we use the new chaotic maps proposed in this paper to generate chaotic sequences. Two improved chaotic sequences are generated according to the initial values z 0 ′ , z 1 ′ and control parameters u 0 , u 1 . Take a new Tent map and new Chebyshev map as examples: (3) Calculate the cyclic sequence bitRow in the row direction. Randomly select the cycle number keyRow of the cyclic shift in the row direction, and generate LogisticRow according to the initial value Security and Communication Networks 7 LogisticRow ′ and control parameter ω 0 . e steps can be expressed as follows: LogisticRow � zero(keyRow, Rows), bitRow � zero(keyRow, Rows), for i � 2: keyRow: Rows, where LogisticRow is the traditional Logistic map which is used to interfere with the sequence in the row direction, Rows is the numbers of rows, and Columns is the numbers of columns. e number of cycles on the row is once per row, so it needs Rows time. e interference in the row direction is performed according to the cycle number keyRow of the cyclic shift in the row direction. Since the number of interference in the row direction will not be greater than the number of Columns, the number of cycles can be set to Columns. (4) Calculate the cyclic sequence bitColumn in the column direction. Randomly select the cycle number keyColumn of the cyclic shift in the column direction, and generate LogisticColumn according to the initial value LogisticColumn ′ and control parameter ω 1 . e steps can be expressed as follows: LogisticColumn � zero(keyColumn, Columns), bitColumn � zero(keyColumn, Columns), for i � 2: keyColumn: Columns, LogisticColumn(i) � ω 1 × LogisticColumn(i − 1) ×(1 − LogisticColumn(i − 1)), bitColumn(i) � rem(round(LogisticColumn(i) * 100, 000), Rows), end, where LogisticColumn is the traditional Logistic map which is used to interfere with the sequence in the column direction. Similarly, the number of cycles on the column is one for each column, so it takes Columns time. Interference in the column direction is performed according to the number of cycles keyColumn of cyclic shift in the column direction. Since the number of interference in the column direction will not be greater than the number of Rows, the number of cycles can be set to Rows.

Compression-Encryption Scheme.
e chaotic map proposed in this paper is used to construct the measurement matrix for compression and encryption. Specific encryption steps can be described as follows: Step 1: firstly, an original image X with the size of m × n is obtained.
Step 2: the original image X is sparse by Discrete Wavelet Transform (DWT), and the sparse image X 1 with the size m × n is obtained.
Step 3: Arnold interference is carried out on a sparse image X 1 according to Arnold interference parameters k 1 , k 2 and interference number k 3 . e interference image is represented by X 2 with size m × n.
Step 4: according to the z 0 , z 1 chaotic sequences, two measurement matrices are obtained. One measurement matrix is represented by Φ 1 and the size is p × q. p is a random number as the number of rows of the measurement matrix. e number of columns of the measurement matrix is the same as the number of rows of the measured image, that is q � m, which is used for compression and sampling, and the other measurement matrix is represented by Φ 2 , whose size is p × q. e compression and sampling process using compressive sensing is expressed as follows: where X 3 is the image after compressed sampling, and its size is p × n.
Step 5: then perform cyclic shift encryption in the row direction to obtain the encrypted image X 4 in the row direction, wherein the size is p × n, and the encryption steps in the row direction are expressed as follows: for r times � 1: keyRow, for i � 1: p, where r times is the number of bit cycles to be performed in all row directions for the control as a whole. circshif function has two parameters, one to control the row and the other to control the column. Now, as long as the column is operated, circshif function is set to [0 bitRow − (r times, i)].
Step 6: then, perform cyclic shift encryption in the column direction to obtain the encrypted image Y in the column direction with size p × n, and the encryption steps in the column direction are expressed as follows: for c times � 1: keyColumn, where c times is the number of bit cycles to be performed in all column directions for the control as a whole. Now, as long as the row is operated, so the circshif function is set to [bitColumn− (c times, i) 0].

Decryption Scheme.
e decryption scheme is actually the reverse operation of the encryption scheme, and its principle is the same as that of the encryption scheme. e specific decryption steps can be described as follows: Step 1: first obtain the encrypted image, which is represented by Y ′ and size is p × n.
Step 2: according to the cycle number keyColumn of the cyclic shift in the column direction sent by the encryption party, a bit cyclic sequence bitColumn for decryption in the column direction is constructed.
Step 3: decrypt the encrypted image with a cyclic shift in column direction according to keyColumn and bitColumn and obtain the cyclic shift in the column direction to decrypt image X 4′ , with size p × n. e steps are as follows: for c times � 1: keyColumn, Step 4: according to the cycle number keyRow of the cyclic shift in the row direction sent by the encryption party, construct the bit cyclic sequence bitRow used for encryption in the row direction.
Step 5: perform cyclic shift decryption on the cyclic shift decrypted image X 4′ in the column direction according to the cycle number c 0 of cyclic shift encryption in the row direction sent by the encrypting party to obtain the cyclic shift decrypted image X 3′ in the row direction with size p × n. e steps are as follows: for r times � 1: keyRow, end, end.

(26)
Step 6: generate the improved chaotic sequence according to the improved chaotic sequence initial values u 0 , ω 0 sent by the encryption party to construct the random measurement matrix, which is used for decompression sampling. And X 3′ is recovered by the OMP algorithm to obtain a decompressed image, which is represented as X 2′ with size m × n.
Step 7: Arnold inverse interference is performed on X 2′ according to Arnold interference parameters k 1 , k 2 and interference number k 3 sent by the encryption party, and the image after inverse Arnold interference is represented as X 1′ with size m × n.
Step 8: image X 1′ is subjected to inverse sparsity processing by Inverse Discrete Wavelet Transform (IDWT), and the final decrypted image X ′ with size m × n is obtained.
is allows the receiver to decrypt the encrypted image and retrieve the original message. e flow chart of encryption and decryption is shown in Figure 3.

Simulation Result and Discussion
In this section, we simulate and evaluate the safe and effective image compression-encryption scheme, using MATLAB R2018a to simulate. e size of the selected image is 256 × 256, and the size of the constructed random measurement matrix is 230 × 256. And n 0 � 4, a 0 � 3, b 0 � 2, the initial values of all chaotic sequences are set to 0.3, and u 0 � 0.3, u 1 � 0.4, ω 0 � 3.87, ω 1 � 3.95. e cycle number of row cyclic shift encryption is keyRow � 6, and the cycle number of column cyclic shift is keyColumn � 5. DWT is used to perform the sparse operation, and the OMP algorithm is used for recovery.

Encryption Effect.
We select "Lena," "Boom," "Moon," and "Rice" images for encryption to analyze the encryption and decryption effect. We use four new chaotic maps proposed in this paper to perform chaotic encryption. e encryption effect is shown in Figure 4.
It can be seen from Figures 4(a) and 4(c) that the original image becomes disorganized and irregular after encryption, and the data of the original image cannot be identified, which proves that the encryption scheme proposed in this paper has a good encryption effect.

Histogram Analysis.
e histogram represents the distribution of the pixel intensity of digital images in a graphical way, which can intuitively show the pixel distribution states of the original image and the encrypted image. When the pixel distribution is not uniform, it may cause the loss of image details. e histogram of the original image is unique and vulnerable to statistical attack. To prevent this attack, the histogram of the encrypted image must be relatively uniform and different from that of the original image.
From Figures 4(b) and 4(d), the histograms of the original images are not uniformly distributed, while the encrypted histograms are uniformly distributed. It can be seen that the proposed chaotic maps applied to the encryption field have a strong resistance to statistical attack.

Key Sensitivity Analysis.
We use the proposed Logistic map under our new structure for testing. Firstly, we give a set of encryption keys to encrypt the original image and then decrypt it with the same key. We randomly use a set of keys to decrypt, we could not get the decrypted image. As shown in Figure 5, even if the decryption keys differ by 0.0000000000000001, the decrypted image cannot be obtained; thus, the useful information cannot be obtained, which shows that new chaotic maps have high sensitivity.

Keyspace Analysis.
A good encryption scheme should make the keyspace greater than 10 30 in order to resist a brute force attack. ere are 14 keys in our encryption scheme, which are k, n 0 , a 0 , b 0 , u 0 , u 1 , z 0 ′ , z 1 ′ , ω 0 , ω 1 , keyRow, LogisticRow ′ , keyColumn, and LogisticColumn ′ . If the accuracy is set to 10 − 14 , then the keyspace of our encryption scheme is 10 196 . is shows that the keyspace of our encryption scheme is large enough to resist a brute force attack.

PSNR and SSIM Analysis.
In order to further verify whether the encryption algorithm is safe and reliable, the quality of the images before and after encryption is analyzed. e quality of the restored images can be evaluated using the Peak Signal-to-Noise Ratio (PSNR) and the Structural Similarity Index (SSIM). PSNR can be expressed as PSNR � 10 log 255 2 where P(i, j) is the pixel value at the (i, j) position of the original image, P ′ (i, j) is the pixel value at the (i, j) position of the restored image, N is the size of the image selected for the experiment, and 255 is the maximum value of the 8-bit representation. Generally, when the value of PSNR is lower than 28, the difference in image quality is greater. e smaller the PSNR, the greater the difference in image quality. e greater the PSNR, the less distortion the original image. SSIM is used to measure the similarity between the original image and the restored image, which can be expressed as where C 1 � 0.01 × (2 8 − 1), C 2 � 0.01 × (2 8 − 1), μ X is the mean value of the original image, and μ Y is the mean value of the restored image. σ 2 X is the variance of the original image, σ 2 Y is the variance of the restored image, and σ XY is the covariance of the original image and the restored image.
e range of structural similarity is [− 1, 1]. In general, the larger the SSIM values, the better the overall quality of the reconstructed images. When the original image and the restored image are identical, the value of SSIM is 1. Table 1 lists the analysis results of PSNR and SSIM. It can be seen from Table 1 that the PSNR and SSIM of our encryption scheme are the largest, indicating that the encryption and decryption effect proposed in this paper is good.

Information Entropy Analysis.
Information entropy is used to measure the confusion of the image and the distribution of gray values. e larger the entropy of the images is, the more consistent the gray distribution of the images is.  For a gray image of size 256 × 256, the theoretical value of information entropy is 8. An effective encryption algorithm should make the information entropy of the encrypted image close to the theoretical value. e information entropy can be expressed as where P(m i ) is the probability of the gray value m i , and L is the gray level.  Table 2 lists the results of information entropy analysis. As can be seen from Table 2, the information entropy of the encrypted image is higher than that of the original image, which proves that the gray distribution of the encrypted image is more uniform than that of the original image.

Correlation Analysis.
Correlation analysis mainly analyzes the correlation between pixels in adjacent locations. e correlation between adjacent pixels of the original image is very high, while the correlation between encrypted cryptographic images after an effective secure encryption system should be where x and y represent the gray values of two adjacent pixels. Table 3 lists the correlation coefficient analysis results of the safe and effective image encryption scheme. It can be seen from Table 3 that, compared with the correlation coefficient of the original image, the correlation coefficient of the encrypted image is greatly reduced and close to 0, which indicates that the abovementioned security theoretical scheme has a good encryption effect.

Conclusion
We propose a safe and effective image compression-encryption scheme based on a new chaotic structure and compressive sensing. is scheme uses a new chaotic structure proposed by ourselves and applies the commonly used traditional one-dimensional chaotic maps to the proposed chaotic structure to generate corresponding new one-dimensional chaotic maps. e proposed new chaotic maps not only keep the advantages of simple structure and easy implementation of a traditional onedimensional chaotic map but also expands the parameter range space of traditional one-dimensional chaotic maps. It is useful whenever chaotic digital sequences are needed. In addition, compressive sensing is used for sampling in this encryption scheme, which can reduce the storage space and transmission bandwidth.
e chaotic system only needs to store matrix generation parameters, which can further reduce the bandwidth. Simulation results show that the proposed chaotic structure and chaotic maps have a good chaotic effect and high chaotic intensity, and the output sequence has strong chaos in a very large area of parameter space and can prevent phase space reconstruction. It can be applied to the image encryption scheme in this paper and has a large parameter space and

Data Availability
e data used to support the findings of this study are available from the first or corresponding author upon request.

Conflicts of Interest
e authors declare there are no conflicts of interest regarding the publication of this paper.