Next Article in Journal
A Systematic Literature Review on Cyber Security and Privacy Risks in MaaS (Mobility-as-a-Service) Systems
Previous Article in Journal
Intelligent Teaching Recommendation Model for Practical Discussion Course of Higher Education Based on Naive Bayes Machine Learning and Improved k-NN Data Mining Algorithm
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Joint Data Hiding and Partial Encryption of Compressive Sensed Streams

by
Cristina-Elena Popa
,
Constantin-Cristian Damian
* and
Daniela Coltuc
Research Center for Space Information CEOSpace Tech, National University for Science and Technology POLITEHNICA Bucharest, 060042 Bucharest, Romania
*
Author to whom correspondence should be addressed.
Information 2025, 16(7), 513; https://doi.org/10.3390/info16070513
Submission received: 18 March 2025 / Revised: 4 June 2025 / Accepted: 5 June 2025 / Published: 20 June 2025
(This article belongs to the Section Information Theory and Methodology)

Abstract

This paper proposes a method to secure Compressive Sensing (CS) streams. It involves protecting part of the measurements with a secret key and inserting code into the remaining measurements. The secret key is generated via a cryptographically secure pseudorandom number generator (CSPRNG) and XORed with the measurements to be inserted. For insertion, we use a reversible data hiding (RDH) scheme, which is a prediction error expansion algorithm modified to match the statistics of CS measurements. The reconstruction from the embedded stream results in a visibly distorted image. The image distortion is controlled by the number of embedded levels. In our tests, embedding on 10 levels results in ≈18 dB distortion for images of 256 × 256 pixels reconstructed with the Fast Iterative Shrinkage-Thresholding Algorithm (FISTA). A particularity of the presented method is on-the-fly insertion, which makes it appropriate for the sequential acquisition of measurements with a single-pixel camera. On-the-fly insertion avoids the buffering of CS measurements for the subsequent standard encryption and generation of a thumbnail image.

1. Introduction

The single-pixel camera (SPC) concept is an application of the Compressive Sensing (CS) paradigm in which signal compression is carried out at acquisition time by exposing a 2D scene to a sequence of masks and recording the light reflected by each of them using a single sensor. The captured scene can be reconstructed based on these SPC measurements with the use of various reconstruction algorithms. In order for the reconstruction to be possible, the original scene must be sparse in some domain, and the columns of the sensing matrix must be incoherent with the sparsity basis.
Such cameras are an alternative to widely used technologies such as charge-coupled devices (CCDs) or metal–oxide–semiconductor (CMOS) devices that are only available for a small section of the electromagnetic spectrum. Applications for SPC have been developed in multiple fields, such as fluorescence [1] and infrared [2] microscopy, methane gas leak detection [3], and three-dimensional imaging [4].
Today, most applications include communication via public channels, where data are exposed to theft or attacks. The common practice used to protect data is standard encryption after the compression stage. Another solution is partial encryption, where, in the case of the transform-based compression of images, only the sign or a part of significant coefficients is encrypted. One difference from standard encryption is the resulting image, which is noise-like in standard encryption and has discernible content in partial encryption. The main drawback of partial encryption is the weakness of error concealment attacks (ECAs). It was shown that the encrypted coefficients can be estimated using semantic or statistical rationales to obtain an image closer to the original [5].
Data hiding is the generic name for the set of techniques that aim to insert information into a multimedia carrier. Reversible data hiding (RDH) comprises a particular class of methods allowing perfect recovery of the carrier after information extraction. Data hiding is commonly used for data integrity, covert communication, non-repudiation, copyright protection, and authentication, among other applications [6].
We propose an RDH method specific to CS that involves protecting part of the CS measurements with a secret key and embedding them into the remaining measurements. The method can also be seen as an alternative to partial encryption due to the result consisting of reconstructed images with visible distortion.
The embedded measurements are protected by XOR operations with a single-use secret key generated via a cryptographically secure pseudorandom number generator (CSPRNG) that passes the NIST SP 800-22 tests [7]. The key is longer than the encrypted plaintext. This secret key must be transmitted using a secure communication protocol that follows the guidelines in NIST SP 800-57 [8], thus ensuring that only authorized parties can access it.
The embedding is performed on the fly with an RDH method, which is a prediction error expansion algorithm modified to fit CS measurement statistics.
Opposite to the common practice in RDH, where the concern is to embed data without visible distortion of the carrier, in our method, the embedding is performed on a great number of bits to cause strong visual distortion if an unauthorized user tries to reconstruct the image from the modified measurements.
The method is dedicated to the confidential information protection of CS measurements obtained sequentially from an SPC. Due to the on-the-fly insertion, it avoids the buffering of CS measurements for the subsequent standard encryption and generation of a thumbnail preview.
The novelties of our method are as follows:
  • Light encryption with a secret key for part of the CS measurements and using the remaining measurements as the carrier. No measurements have to be selected for embedding since, in CS, random projections are equipotent in image reconstruction. Image distortion is tuned by the percentage of embedded measurements.
  • On-the-fly embedding of the measurements. In an SPC scenario, the CS measurements are taken sequentially. To avoid measurement buffering before transmission, the embeddings are realized as they are obtained.
  • A modified version of the prediction error expansion algorithm. One particularity of CS measurements is their statistical independence. Since there is no correlation between neighboring measurements, the prediction error is uniformly distributed. For the prediction error to have a Gaussian distribution, we replaced the mean of the neighbors with the mean of all measurements.
The method is evaluated under the following aspects: the capacity of the data-hiding algorithm, the distortion introduced by embedding, and the impact on data volume. An equation is derived for the insertion capacity, and the experimental rate–distortion curve of the method is given.
The experiments were performed on synthetic and real data. A sky image was divided into 359 patches, and we calculated a series of random projections for each patch to simulate the acquisition. The idea behind this choice was the potential of SPC in sky exploration, where bands of the electromagnetic spectrum, like the far infrared, are of interest. For such bands, large areas of sensors are not available. In addition, the signal is very weak [9]. The real data is measured under white light using our setup from [10].
The rest of the paper is organized as follows: Section 2 presents the two related domains i.e., data protection with a secret key and partial or selective encryption. Section 3 describes the on-the-fly data hiding, explains the modified data-hiding algorithm, and discusses the impact on data representation. Section 4 is dedicated to the insertion capacity: an equation for capacity is derived, and the mechanism of distortion control is introduced. Section 5 analyzes the sources of distortion in order to better understand how to control them. Section 6 discusses method behavior against error concealment attacks. Section 7 is dedicated to experiments done with a sky image and real data. Examples of image reconstruction are depicted, and an experimental rate–distortion curve is plotted. Conclusions are drawn in the final section.

2. Related Work

CS theory naturally encounters the domain of cryptography. Many CS-based cryptosystems are built on the randomness of the measurement matrix, a sine qua noncondition to obtain compressed samples by signal projection. As randomness means secrecy, the measuring matrix can be used as a secret key, making compression and encryption a single-step operation. This considerably improves efficiency compared with the common approach, where images are first compressed and then encrypted. Many solutions in this direction were proposed [11,12,13].
A criticism of these methods has been the secret key size that hindered the distribution and transmission. This stimulated the development of new measuring matrices generated with chaotic sequences [14,15].
Another limitation of this class of methods is the one-time usage of the measurement matrix in order to preserve the secrecy property. Generating a new measuring matrix for each fresh signal is costly and impractical in a series of applications. This drawback has boosted a second category of methods, where the encryption is applied to measurements, and the matrix is public. Techniques inspired by encryption of Shannon/Nyquist samples [16,17,18,19], such as permutation or substitution of measurements and sign encoding, were such solutions, to enumerate a few.
The encryption of the measurements results in noise-like reconstructions that draw the attention of attackers. To avoid this problem, a class of methods called visually meaningful image encryption (VMIE) has been developed. By these methods, a plain image is pre-encrypted and then embedded in a host image, making the secret less perceptible [20,21,22,23]. Here, encryption meets the field of data hiding that encompasses methods to hide information by embedding it into the less significant bits of an image. An example of VMIE is in [24], where the authors first encrypt one or several images and then embed the code into a host image. The encryption is done by scrambling image pixels, and the result is compressed by CS. The code is embedded into the wavelet coefficients of the host image on multiple-bit planes. Another example is [25], where the plain image is compressed and encrypted to obtain the secret image, and then zeros are inserted to extend it to the initial size. The result is a wavelet transformed and embedded into the wavelet coefficients of a carrier image. The encryption is done by a public key generated by a chaotic system and reinforced by an RSA algorithm.
There is a plethora of data-hiding algorithms. A comprehensive survey can be found in [26]. The emergent techniques of deep learning have also been adopted by the data-hiding domain. Recent applications of deep learning for data hiding in digital signals are especially oriented towards image-based data hiding [27]. Also, deep learning can augment CS with faster reconstruction algorithms or a better quality of reconstruction [28]. However, when it comes to RDH to CS samples, to our best knowledge, deep learning is currently not integrated.
The partial or selective encryption of CS measurements is another related category of methods. It has roots in the partial encryption of transform-based compressed images, where only a part of the coefficients are encrypted [29,30,31,32]. Unlike visually meaningful encryption, the distortion introduced by partial encryption is visible, but the image content does not fade out. An example of partial encryption of compressed sensing measurements is [33], where only the measurement sign is encrypted by XOR with a secret binary sequence. The method is completed by embedding side information in the encrypted measurements. The side information could include sensor ID, sensor location, time of measuring, etc. The embedding is done using a reversible histogram-shifting-based hiding scheme.

3. The Embedding of CS Measurements

The algorithm we use is a reversible data-hiding method that was proposed in [34] and further discussed in [35]. It is a prediction error expansion schema, as was presented in [36], where the authors innovate at the level of predictor and insert data bit by bit into a 2D image. If the prediction error sits between two thresholds [ T n , T p ] , it is expanded, and information is inserted. Otherwise, the value is shifted so that no overlapping occurs, and extraction is lossless.
Considering that the image to be acquired x R S × 1 is sparse and given the set of patterns ϕ R L × S for projection, the measurements obtained based on the CS are as follows:
y = ϕ · x
The prediction error expansion algorithm has been updated to better fit this scenario: inserting the data on the fly in the measurements acquired sequentially by an SPC.
Firstly, the predicted value is a constant equal to the mean value of the measurements. This is done because, as opposed to a natural image where neighboring pixels have correlated values and allow for a reliable prediction, consecutive SPC measurements are statistically independent of each other. This also allows us to try to insert data in all the positions in the stream, as none of them must remain unchanged in order to compute prediction errors.
Secondly, the original algorithm uses two thresholds for data insertion and extraction, as information is embedded only when predicted errors fall between the thresholds. This directly impacts capacity and distortion. In the proposed schema, the two thresholds can be used for the fine control of the image distortion or simply ignored.
Lastly, our method allows multiple bits to be inserted as opposed to only one, leading to a higher possible distortion. This aspect is discussed in more detail in the following subsections.
Another important aspect is that the embedded data is composed of measurements that are processed and inserted on the fly at acquisition time (the flowchart is illustrated in Figure 1). This directly impacts the embedding capacity of the schema compared with the original one. When selecting measurements to serve as embedded data, there is no extra check done; the criteria used to decide if a value is eligible or not do not apply.
The CS measurement matrix type is Hadamard with randomly permuted columns, a binary matrix that is easy to implement and use in CS scenarios [37]. The construction of a Hadamard matrix leads to a first row providing a measurement with a double maximum value compared with the others. This is why the first row is not used in the proposed scenario, being excluded altogether.
The columns are permuted using a random number generator with a known seed, so the results are reproducible by an end user. This seed is generated at acquisition time and is then transmitted with the measurements in order to make the reconstruction possible.
Two types of users can receive and use the modified measurements: an authorized user who can compute the original measurements and reconstruct the original image or an unauthorised user who is only able to reconstruct a lower-quality version of the image using the modified measurements.
In the case of an authorized user, the information received is the modified measurements, the seed used to scramble the Hadamard matrix, the position map of embedded measurements, and the secret key used for data protection. An unauthorized user only receives the modified measurements and a reduced measurements matrix that can be used to reconstruct the distorted image. It is built by removing from the original matrix the columns corresponding to the indexes in the position map.

3.1. On-the-Fly Insertion

Suppose that the SPC collects sensor measurements y R L × 1 one by one, and insertion is done on n bits. In order to embed data in the acquired values, some of them are processed and used to mark the next measurements as follows:
  • The measurement is first converted to binary (represented on 16 bits), and an XOR with the secret key is applied.
  • The resulting 16 bits are split into chunks of length n.
  • Each chunk is converted back to decimal, resulting in the values that will be inserted. If the division of the total number of bits by n provides a remainder, the last bits are stored and appended to the next binary representation.
  • Each of the decimal values is inserted in the following measurement values based on the algorithm described in Section 3.2.
The maximum for the inserted values is as follows:
b n m a x = 2 n 1
The insertion process is depicted in Figure 1. The SPC generates measurements y i one by one, and each of them is processed at acquisition time. The very first collected measurement is processed, and the resulting b n i values are inserted in the next available measurements. For the following acquired measurements, if data is available for insertion and the measurement is eligible for marking, the data is embedded, and the modified measurement value is transmitted. If insertion is not possible, the measurement is shifted and transmitted. If no data is available for insertion, the acquired measurement is processed to be embedded in the next coming ones.
A numerical example is depicted in Figure 2. The insertion is done on seven bits, the threshold T = 10 , and the measurement to be inserted is 8 . It is first converted in binary to [ 1 , 1 , 1 , 1 , 1 , 1 , 1 , 1 , 1 , 1 , 1 , 1 , 1 , 0 , 0 , 0 ] . The seven-bit chunks are [ 1 , 1 , 1 , 1 , 1 , 1 , 1 ] and [ 1 , 1 , 1 , 1 , 1 , 1 , 0 ] , while the two-bit remainder [ 0 , 0 ] will serve to build up the next chunk. The carrying sequence consists of the following measurements [−4, 2, 22, 23]. The two chunks are inserted in the first and second measurements that correspond to prediction errors less than T and larger than −T. The rest of the measurements are only shifted by seven bits.
With these steps, the following data is transmitted: the marked measurements y w m , the seed value used to construct the measurement matrix, and a location map representing the positions in y that were extracted and then embedded into eligible measurements that follow.
An authorized user has access to extra information that allows the original measurements to be computed: the threshold value T (with [ T , T ] defining the expandable set of prediction errors), as well as the secret key used to perform the XOR operation.
Because a part of the measurements are used for embedding , the resulting y w m has a length of L w m that is less than L. This means that in order to be able to reconstruct a lower quality of the original image based on y w m , an unauthorized user must use a truncated version of the measurement matrix. It can be constructed based on the random seed and location map as follows: generate a Hadamard matrix, permute the columns using the same random number generator algorithm and seed initially used, and then remove the lines corresponding to the positions in the location map.
Considering this, the extraction steps an authorized user would perform are as follows:
  • Go through the elements of y w m one by one to extract the embedded data and recover the set of original measurement values. This is possible since we use an RDH algorithm [35].
  • For each extracted value b n i , convert it to binary, represent it on n bits, and perform an XOR operation to obtain the original data.
  • Concatenate the resulting values and slice chunks of 16 bits. Each 16-bit value is then converted back to decimal, resulting in the set of measurement values embedded in the data insertion stage.
  • Use the position map to insert these in the correct locations, finally obtaining the original values of y.
As the deployed RDH algorithm is reversible, the recovered values are the same as the original ones except for the final one that could be truncated [35].

3.2. Impact of Data Insertion on Measurements Dynamic Range

As mentioned, given the particularities of CS measurements, we calculate the prediction error d i by considering the measurement mean y ¯ . Moreover, due to the construction of the Hadamard matrix, the mean estimate is always zero:
d i = y i y ¯ = y i
It follows that the prediction error is the measurement itself and that the insertion is done directly into the measurements.
According to the algorithm in [36], the prediction error is expanded to D i in order to insert b n i . By supposing the threshold T > 0 that defines the set of expandable measurements and the maximum possible inserted value b n m a x defined in Equation (2):
D i = 2 n · d i + b n i if d i [ T , T ] d i + b n m a x T + b n m a x if d i > T d i b n m a x T d i < T
In the insertion stage, the original y i value is replaced with the marked y w m i :
y w m i = D i + y ¯ = D i
Based on (4) and (5), y w m i can be expressed as
y w m i = 2 n · y i + b n i if y i [ T , T ] y i + b n m a x T + b n m a x if y i > T y i b n m a x T y i < T
It should be noted that the carrying measurements occupy the upper bits in y w m i , and encrypted chunks occupy the lower bits. It is a consequence of modifying the original algorithm by taking the average of all measurements instead of that of neighbors.
By choosing a large enough threshold T, all measurements become eligible for insertion. This leads to authorized users not needing a position map in order to perform the extraction.
Since the algorithm shifts the measurement values in order to expand the prediction error, the dynamic range will expand based on the thresholds and the inserted number of levels.
For a set of patterns ϕ R L × S of type scrambled Hadamard and a scene to be acquired x R S × 1 with values x i [ 0 , 1 ] , according to Equation (1), the theoretical maximum measurement value occurs when all the elements of 1 in ϕ correspond to areas of maximum light in the scene ( x i = 1 ):
y m a x = 2 1 · S
Similarly, the theoretical minimum would be
y m i n = y m a x = 2 1 · S
For an image of 256 × 256 bits, the range is theoretically [ 2 15 , 2 15 ] , which requires a 16-bit representation. By embedding data, even if only using a single insertion level, an overflow appears, forcing the representation to 32 bits.

4. The Insertion Capacity

The scrambled Hadamard matrix usually behaves like a random Gaussian matrix [37]. The obtained measurements have a Gaussian distribution with zero mean (Figure 3). The standard deviation depends on scene sparsity: the more sparse the scene, the lower the standard deviation.
Knowing the distribution and the thresholds [ T , T ] , the number of insertable measurements M can be estimated by multiplying the total number of measurements L by the probability P to be between thresholds:
M = L · P T , σ = L · T T 1 σ 2 π e x 2 x 2 2 σ 2 2 σ 2 d x
If the insertion is done on n levels, then the maximum number of bits that could be inserted is L · P T , σ · n . In fact, this is only an upper limit since there is always a nonzero probability of using such measurements as data.
Suppose that x is the true number of measurements that, at the end of the on-the-fly insertion process, are carrying data. Then the following equation holds
x + q · x · n 16 = L · P T , σ
where x · n / 16 is the total number of measurements—insertable or not—sacrificed in view of insertion (the rounding was neglected), and q is the probability of having insertable measurements among them. The true number of measurements that carry data, derived from Equation (10) is
x = P T , σ · L 1 + q · n / 16
Hereinafter, we calculate q in the hypothesis that we need two carrying measurements for inserting one, meaning a number of insertion levels n between 8 and 16. Such a situation occurs when we have a string of 3 insertable measurements with, eventually, one or more non-insertable measurements between the first and second ones:
q = P 3 + P 3 · ( 1 P ) + P 3 · ( 1 P ) 2 + . . . = P 2 · [ 1 ( 1 P ) m ] P 2
where m is the number of terms. The term ( 1 P ) m becomes quickly negligible, being a probability. For loose thresholds, P = 1 and likewise q = 1 . As the thresholds stretch around zero, the probability P reduces, the terms ( 1 P ) m start to count, and the approximation becomes coarser. For T = 3 · σ , the error in approximating q is 1 % , and for T = 2 · σ , it is 5 % . The error estimation was done for m = 1 . For higher m, ( 1 P ) m is lower than 10 2 . We do not encourage the use of small thresholds because it reduces the insertion capacity and fragilizes the method, as explained in Section 6.
With this approximation, the true number of measurements carrying data is
x P T , σ · L 1 + P T , σ 2 · n / 16
The capacity in number of inserted bits is C = x · n , and the relative capacity C r is
C r = C L P T , σ · n 1 + P T , σ 2 · n / 16
There are two mechanisms to control the capacity and, finally, the distortion: the threshold T through P T , σ , and the number of insertion levels n. The former can provide a fine tuning, the latter a coarse one.
If we give up the fine tuning by working with large enough thresholds such that we have P T , σ = 1 , the relative capacity simplifies to
C r n 1 + n / 16
which has the advantage of being independent of image sparsity.
The fine-tuning by controlling T is limited by the constraint of having a representation of 32 bits after data embedding. In this case, the range of y w m should be [ 2 16 , 2 16 ] , meaning
y i + b n m a x T + b n m a x < 2 16
y i b n m a x T > 2 16
From Equation (16), it follows that the threshold can be at maximum:
T m a x = 2 15 2 n 1
For 13 levels, for instance, T m a x is 3, meaning a very low capacity of insertion and a low distortion of the recovered image. It is a mechanism that can be effective only at lower n.
Figure 4 depicts C r as a function of the standard deviation of the measurements, parametrized for 8 to 13 insertion levels and the corresponding T m a x . The plots follow a similar trend. The capacity is constant up to a certain standard deviation, then decreases because of insufficient measurements available for carrying data (Equation (14)). The capacity controlled only by the number of insertion levels is represented by the dashed lines (Equation (15)).
The number of remaining measurements after insertion and available for a low-quality reconstruction is
R p L C 16 = L ( 1 C r 16 )
In Figure 5, R p is plotted vs. the number of insertion levels for three initial numbers of measurements given as percentages.

5. The Distortion of the Reconstructed Image

In partial encryption, the image reconstructed from the encrypted samples is visibly distorted. In our method, the source of distortion is twofold: fewer measurements are available for the reconstruction since part of them are removed in view of embedding, and the remaining ones are distorted by embedding or shifting. These two effects compete for the same goal, which is image-controlled distortion.
To evaluate the contribution of the two sources, we have reconstructed images in two instances: by inserting data and meanwhile keeping all the measurements and by removing M e m b e d measurements without any embedding. Figure 6 depicts the image distortion given as Peak Signal to Noise Ratio (PSNR) versus the number of embedded levels in these two instances.
The plots are obtained experimentally by averaging the PSNR over 359 patches from the sky image in Section 7. Loose thresholds were used so that all measurements were considered eligible for embedding.
For this kind of image that is rather sparse, at 40% initial measurements, the main source of distortion is the data insertion or shifting, which alters the values in y w m . In comparison, the reconstruction quality when truncating the measurement sequence does not present major variations when depicted as a function of insertion levels. To be sensitive to truncation, L should have been lower.
If tight thresholds are used, the number of measurements selected for embedding is reduced. To have a good execution of the truncation mechanism, thresholds loose enough to not matter should be used. In this case, the distortion can be controlled only through the number of insertion levels.

6. Data Integrity Aspects

The partial encryption is prone to ECA attacks that consist of estimating the encrypted coefficients based on some a priori knowledge, like, for instance, the position of low-frequency coefficients in DCT-based image compression.
In CS, due to the random projection, there are no privileged measurements. In our method, the weakness is given by the fact that the encrypted measurements are placed at insertion on the less significant bits of the carriers.
If loose thresholds are used by several trials, the encrypted chunks can be discarded, and a better-quality image can be reconstructed with the reduced Hadamard matrix. An example is given in Figure 7. After ECA, the PSNR is improved by 16.36 dB when the initial percentage of measurements is 40 % and by 16.82 dB for 18% initial measurements. In this second case, the truncation mechanism becomes effective. The PSNRs are calculated with respect to the reconstruction using the full number of measurements.
Even with this remarkable improvement in PSNR, the recovered measurements are not complete. The embedded measurements that were discarded by ECA are missing. According to Figure 5, after ECA, the reconstruction is done with less than 25% of measurements instead of 40% in the first case and less than 12.5% instead of 18% in the second one. The embedded measurements can be recovered only if the user has access to the secret key used to protect them. The PSNR, which is 32.03 dB and 30.12 dB, respectively, confirms missing data.
Data integrity protection is obtained at the expense of volume increase. The number of measurements sacrificed for embedding does not compensate for extending data representation from 16 to 32 bits. The compression rate calculated in Section VII shows how this overflow depends on the number of insertion levels.
If tight thresholds are used, it is more difficult to recover clean measurements because of b n m a x T in Equation (6), which needs the knowledge of T in order to be calculated.

7. Experimental Results

We experimentally test our method under the following aspects: embedding capacity, distortion, and impact on data volume.
The experiments are carried out on simulated and real data. The simulated data are obtained from an image of the W51 nebula (Figure 8) converted to grayscale using the weighted method, normalized to have values between 0 and 1, and split into 359 patches of 256 × 256 each. Figure 9 shows two patches with different sparsities. We simulated the acquisition by calculating random projections on a Hadamard matrix generated using Sylvester’s construction. The matrix only contains 1 and −1 elements. The elements in the first row are all positive, while all the other rows have an equal number of positive and negative elements. The first row was excluded since it leads to a first measurement with a double maximum value compared to the others. The matrix columns are randomly scrambled prior to image projection [37]. We use 40% measurements, meaning that 60% of the matrix rows are discarded. To reconstruct the images from the embedded measurements, the matrix size is reduced accordingly.
The real data consists of a set of measurements acquired with our setup in [10]. The imaged object is a 0.5 mm thick sheet of metal with machined patterns in it and with a total dimension of 13 mm × 13 mm (Figure 10). The object was exposed to homogenized light from a halogen lamp. Since the construction of the SLM in Single Pixel camera only allows the use of sensing matrices composed of 0 or 1, the real data were measured with an S-matrix having randomly scrambled columns. This matrix can be obtained from the Hadamard matrix by removing its first row and column and turning all negative values to 0 [39], followed by randomly permuting its columns.
For image reconstruction, either from simulated or real data, we use an implementation of the fast iterative shrinkage-thresholding algorithm (FISTA) presented in [40].
For embedding data, we considered a loose threshold of T = 500 , which ensures that all measurements are eligible for insertion.
When analyzing the results, we must take into account that an unauthorized user should still be able to reconstruct a lower-quality version of the original image using the modified measurements.
Since, in our experiment, all measurements are eligible for insertion, the capacity can be calculated directly using Equation (15). In Figure 11, the relative capacity C r is plotted against the number of insertion levels n. The curve has an ascending trend, with capacity values ranging from 0.9 bits/measurement for 1 level to 7.5 bits/measurement for 14 levels.
To evaluate the image distortion obtained by embedding, we calculate the PSNR, taking as a reference the image reconstructed from the original measurements. Figure 12 plots the median of the PSNR of all 359 patches for a loose threshold ( T = 500 ) and a more restrictive one ( T = 50 ). A drop in the reconstruction quality can be noticed after six levels. Up to 7 insertion levels, the distortion is not visible. For this reason, we restrict our analysis to n [ 7 , 14 ] . We repeated the experiments for a tight threshold T = 50 . The plot in Figure 12 shows a significantly higher distortion for small n but results close to loose thresholds for n > 8 .
We deepened the analysis, and we split the image set into three subsets corresponding to the following three ranges of pixel standard deviation: [13, 19], [19, 24], and [24, 67]. The ranges were chosen to cover the standard deviations of all images and to have approximately the same number of images in each subset. In natural images, the standard deviation gives an indication of the image sparsity, which is the main parameter in the CS reconstruction from a fixed percentage of measurements. The plots of PSNR vs. n are quite similar for the three ranges (Figure 13).
Examples of image degradation are shown in Figure 14. For seven insertion levels, the quality of the two patches is rather good. At 10 insertion levels, the distortion is quite strong, especially for the dense patch that has a PSNR of 14.67 dB. Its content becomes almost indiscernible at 14 levels.
The PSNR median at 10 levels is 18.21 dB for the whole set (Figure 12). On the three ranges considered for the standard deviation, it is 19.05 dB, 18.35 dB, and 16.45 dB, respectively. Given the visual quality of the images and the small variations of the PSNR with the standard deviation range, we adopted 10 as the appropriate number of insertion levels.
The distortion and the capacity are closely related. Figure 15 shows the correlation between the relative capacity C r and the PSNR. As expected, both capacity and distortion increase with the number of insertion levels.
The data insertion by our algorithm modifies the data volume. There are two opposite effects that compete: sacrificing measurements for insertion reduces the data volume, and data embedding extends the data representation from 16 to 32 bits. These effects are summarized in the compression rate equation below:
r = 2 · x / L
For loose thresholds, the number of measurements x in Equation (13) becomes
x L 1 + n / 16
which leads to the following equation for the compression rate:
r 2 1 + n / 16
The compression rate shows that the algorithm always expands the data volume for a number of insertion levels less than 16. Also, it should be noted that, given the loose thresholds, the data volume is not influenced by either the image size or the content. Only the number of insertion levels matters. Figure 16 shows the evolution of r for the analyzed range of insertion levels. The compression rate is always higher than 1, showing a data overflow varying from 39% for n = 7 to 7% for n = 14 .
The data throughput of SPCs is limited by the Digital Micromirror Device (DMD). Texas Instruments DMD (Dallas, TX, USA) products have binary pattern rates ranging from 2500 Hz to 32,000 Hz [41]. By multiplying these rates by 32 bits, which is the measurement binary representation after data hiding, a maximum throughput of about 1 MHz is to be expected. The volume expansion of only 7–39% takes into account the reduction in the number of measurements to be transmitted. This means a shorter transmission time, but here, we must also take into consideration the processing time necessary for data hiding.
To jointly evaluate the data expansion and image distortion, we plotted in Figure 17 the rate–distortion curve. As the number of insertion levels increases, the distortion becomes more evident and the data expansion less important.
For 10 levels, a number that we considered appropriate for our application, the measurement volume increases by 23 % . With respect to image size and taking into account that the sampling rate is 40 % , it follows that the data volume after insertion represents 2 0.4 1.23 from the image size, which means an image compression rate of 98 % . CS expands data representation by 2, from 8 bits/pixel to 16 bits/measurement.
We measured the time of execution and the necessary memory for both data hiding and data extraction for 256 × 256 -pixel images, 40% measurements, and loose thresholds (Table 1). The simulations were performed on macOS 13.4 with a 3.5 GHz CPU and 8 GB RAM, using the software Python 3.9.6. It is to be noted that the time and memory increase with n and that they are higher for data extraction. Table 1 also includes the values obtained when inserting 10 bits and using L = 20 % and L = 30 % , respectively. As expected, they are lower for both execution time and memory requirements when compared with the L = 40 % and n = 10 values.
The experiments on smaller patches of 128 × 128 pixels have shown, on average, a higher PSNR. If the user chooses to work with patch sizes other than 256 × 256 pixels, the distortion can be tuned from the number of insertion levels.
We compare our method with [33], which is close to ours in terms of goal and approach. Similar to us, the authors of [33] perform partial encryption of CS measurements and hide information. Unlike our method, the encryption concerns the sign of part of the measurements, while the hidden data is side information. The tuning of distortion is obtained via the percentage of encrypted measurements. For 256 × 256 images and 50% measurements, at an encryption percentage of 0.62 % , the distortion of the reconstructed image is 16.7 dB, similar to our result. The data hiding in [33] is done by histogram shifting, which supposes an estimation of the measurement distribution. Our method has the advantage of being blind and that of an on-the-fly insertion.
The simulation results included in the article are focused on the nebula patches, as these have similar characteristics to what would be expected in a single-pixel camera scenario. We also tested the algorithm against natural images commonly used in data-hiding articles. The results are rather similar to those obtained for nebula patches. For a loose threshold of T = 500, which ensures that all measurements are eligible for insertion, visible distortion appears starting with insertion on 7 bits.
Two other methods related to our work are [42,43]. Although the CS is not concerned with the scene acquisition, it is used to pre-process the cover or watermark images. In [42], for pre-processing, the authors use prediction coding based on CS progressive recovery and encryption by XOR with a random stream generated with a secret key. Side information is inserted into the encrypted data. The resulting insertion capacity is up to 4 bpp for a recovered image quality higher than 39 dB. In [43], the CS is applied on the Principal Components (PCs) of the watermark image to get CS measurements that are further embedded into the HL subband of the wavelet-transformed cover image. The method has three security layers, one from PCs and two from CS. The method reaches insertion rates of around 2 bpp and a PSNR above 30 dB for both the watermark and the cover image.
The insertion in real data with our method led to lower PSNRs compared with simulated measurements. At 10 insertion levels, the PSNR is 10.48 dB for the real image and about 14 dB for the images reconstructed from simulated measurements. The real images are shown in Figure 10. In all three cases, i.e., 7, 10, and 14 insertion levels, the PSNRs are under those obtained for synthetic data.

8. Conclusions

The method we propose for securing CS streams is effective for multiple insertion levels. For the synthetic data used in our experiments, the appropriate number of levels has been 10, with an average distortion of 18 dB, which lets the image content still be discernible for an unauthorized user. For the real data and smaller images, the distortion was higher, suggesting that a smaller number of insertions could be used. However, since the insertion capacity and the compression rate are directly impacted, we recommend using, as much as possible, a high number of insertion levels.
The control of image distortion is done mainly through the number of insertion levels. If an extension beyond 32 bits is tolerated for the modified measurements, a second mechanism of control, i.e., the insertion threshold T, can be used. It adds a supplementary security layer.
The method expands the measurement volume by 40 % to 6 % for n [ 7 , 14 ] . At 10 levels, the volume increases by 23 % .
The method is sensitive to ECA attacks, especially when the images are very sparse and good reconstructions can be obtained from fewer measurements. However, the number of recovered measurements remains incomplete, and the original image cannot be obtained without the secret key used for encryption.

Author Contributions

C.-E.P.: conceptualization, methodology, writing (Section 1, Section 3, Section 4, Section 5, Section 6 and Section 7). C.-C.D.: methodology, review. D.C.: conceptualization, writing (Section 2 and Section 8), review, and editing. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Liu, Y.; Suo, J.; Zhang, Y.; Dai, Q. Single-pixel phase and fluorescence microscope. Opt. Express 2018, 26, 32451–32462. [Google Scholar] [CrossRef]
  2. Radwell, N.; Mitchell, K.J.; Gibson, G.M.; Edgar, M.P.; Bowman, R.; Padgett, M.J. Single-pixel infrared and visible microscope. Optica 2014, 1, 285–289. [Google Scholar] [CrossRef]
  3. Gibson, G.M.; Sun, B.; Edgar, M.P.; Phillips, D.B.; Hempler, N.; Maker, G.T.; Malcolm, G.P.; Padgett, M.J. Real-time imaging of methane gas leaks using a single-pixel camera. Opt. Express 2017, 25, 2998–3005. [Google Scholar] [CrossRef]
  4. Zhang, Z.; Zhong, J. Three-dimensional single-pixel imaging with far fewer measurements than effective image pixels. Opt. Lett. 2016, 41, 2497. [Google Scholar] [CrossRef]
  5. Stütz, T.; Uhl, A. On JPEG2000 Error Concealment Attacks. In Advances in Image and Video Technology; Wada, T., Huang, F., Lin, S., Eds.; PSIVT 2009; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2009; Volume 5414. [Google Scholar]
  6. Megías, D.; Mazurczyk, W.; Kuribayashi, M. Data hiding and its applications: Digital watermarking and steganography. Appl. Sci. 2021, 11, 10928. [Google Scholar] [CrossRef]
  7. Almaraz Luengo, E.; Román Villaizán, J. Cryptographically Secured Pseudo-Random Number Generators: Analysis and Testing with NIST Statistical Test Suite. Mathematics 2023, 11, 4812. [Google Scholar] [CrossRef]
  8. NIST. NIST Special Publication 800-57 Part 1 Revision 5. In Recommendation for Key Management: Part 1—Genera; NIST: Gaithersburg, MD, USA, 2020. [Google Scholar] [CrossRef]
  9. Coluccia, G.; Lastri, C.; Guzzi, D.; Magli, E.; Nardino, V.; Palombi, L.; Pippi, I.; Raimondi, V.; Ravazzi, C.; Garoi, F.; et al. Optical compressive imaging technologies for space big data. IEEE Trans. Big Data 2019, 6, 430–442. [Google Scholar] [CrossRef]
  10. Petrovici, M.A.; Damian, C.; Udrea, C.; Garoi, F.; Coltuc, D. Single pixel camera with compressive sensing by non-uniform sampling. In Proceedings of the 11th International Conference on Communications (COMM2016), Bucharest, Romania, 9–11 June 2016; IEEE: New York, NY, USA, 2016. [Google Scholar]
  11. Escamilla-Ambrosio, P.J.; Salinas-Rosales, M.; Aguirre-Anaya, E.; Acosta-Bermejo, R. Image Compressive Sensing Cryptographic Analysis. In Proceedings of the 2016 International Conference on Electronics, Communications and Computers (CONIELECOMP), Cholula, Mexico, 24–26 February 2016; IEEE: New York, NY, USA, 2016; pp. 81–86. [Google Scholar] [CrossRef]
  12. Zhou, N.; Zhang, A.; Zheng, F.; Gong, L. Novel Image Compression–Encryption Hybrid Algorithm Based on Key-Controlled Measurement Matrix in Compressive Sensing. Opt. Laser Technol. 2014, 62, 152–160. [Google Scholar] [CrossRef]
  13. Ponuma, R.; Aarthi, V.; Amutha, R. Cosine Number Transform Based Hybrid Image Compression-Encryption. In Proceedings of the 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 23–25 March 2016; IEEE: New York, NY, USA, 2016; pp. 172–176. [Google Scholar] [CrossRef]
  14. Yu, L.; Barbot, J.P.; Zheng, G.; Sun, H. Compressive Sensing With Chaotic Sequence. IEEE Signal Process. Lett. 2010, 17, 731–734. [Google Scholar] [CrossRef]
  15. Gilbert, A.; Indyk, P. Sparse Recovery Using Sparse Matrices. Proc. IEEE 2010, 98, 937–947. [Google Scholar] [CrossRef]
  16. Dufaux, F.; Ebrahimi, T. Scrambling for Privacy Protection in Video Surveillance Systems. IEEE Trans. Circuits Syst. Video Technol. 2008, 18, 1168–1174. [Google Scholar] [CrossRef]
  17. Shi, C.; Bhargava, B. A fast MPEG video encryption algorithm. In Proceedings of the Sixth ACM international Conference on Multimedia, Bristol, UK, 12–16 September 1998. [Google Scholar]
  18. Wang, H.; Hempel, M.; Peng, D.; Wang, W.; Sharif, H.; Chen, H.H. Index-Based Selective Audio Encryption for Wireless Multimedia Sensor Networks. IEEE Trans. Multimed. 2010, 12, 215–223. [Google Scholar] [CrossRef]
  19. Wen, J.; Severa, M.; Zeng, W.; Luttrell, M.H.; Jin, W. A Format-Compliant Configurable Encryption Framework for Access Control of Video. IEEE Trans. Circuits Syst. Video Technol. 2002, 12, 545–557. [Google Scholar] [CrossRef]
  20. Kanso, A.; Ghebleh, M. An Algorithm for Encryption of Secret Images into Meaningful Images. Opt. Lasers Eng. 2017, 90, 196–208. [Google Scholar] [CrossRef]
  21. Dolendro Singh, L.; Manglem Singh, K. Visually Meaningful Multi-Image Encryption Scheme. Arab. J. Sci. Eng. 2018, 43, 7397–7407. [Google Scholar] [CrossRef]
  22. Chai, X.; Gan, Z.; Chen, Y.; Zhang, Y. A Visually Secure Image Encryption Scheme Based on Compressive Sensing. Signal Process. 2017, 134, 35–51. [Google Scholar] [CrossRef]
  23. Wang, H.; Xiao, D.; Li, M.; Xiang, Y.; Li, X. A Visually Secure Image Encryption Scheme Based on Parallel Compressive Sensing. Signal Process. 2019, 155, 218–232. [Google Scholar] [CrossRef]
  24. Huo, D.; Zhu, Z.; Zhou, X.; Wei, L.; Bai, X.; Bai, Y.; Han, C. A flexible and visually meaningful multi-image compression, encryption and hiding scheme based on 2D compressive sensing. Heliyon 2023, 9, e14072. [Google Scholar] [CrossRef]
  25. Huang, X.; Dong, Y.; Ye, G.; Shi, Y. Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform. Front. Comput. Sci. 2023, 17, 173804. [Google Scholar] [CrossRef]
  26. Shi, Y.Q.; Li, X.; Zhang, X.; Wu, H.T.; Ma, B. Reversible Data Hiding: Advances in the Past Two Decades. IEEE Access 2016, 4, 3210–3237. [Google Scholar] [CrossRef]
  27. Wang, Z.; Byrnes, O.; Wang, H.; Sun, R.; Ma, C.; Chen, H.; Wu, Q.; Xue, M. Data hiding with deep learning: A survey unifying digital watermarking and steganography. IEEE Trans. Comput. Soc. Syst. 2023, 10, 2985–2999. [Google Scholar] [CrossRef]
  28. Machidon, A.L.; Pejović, V. Deep learning for compressive sensing: A ubiquitous systems perspective. Artif. Intell. Rev. 2023, 56, 3619–3658. [Google Scholar] [CrossRef]
  29. Cheng, H.; Li, X. Partial Encryption of Compressed Images and Videos. IEEE Trans. Signal Process. 2000, 48, 2439–2451. [Google Scholar] [CrossRef]
  30. Van Droogenbroeck, M. Partial encryption of images for real-time applications. In Proceedings of the Fourth IEEE Signal Processing Symposium, Hilvarenbeek, The Netherlands, 15–16 April 2004; pp. 11–15. [Google Scholar]
  31. Said, A. Measuring the strength of partial encryption schemes. IEEE Int. Conf. Image Process. 2005, 2, II-1126. [Google Scholar]
  32. Taneja, N.; Raman, B.; Gupta, I. Chaos based partial encryption of spiht compressed images. Int. J. Wavelets Multiresolution Inf. Process. 2011, 9, 317–331. [Google Scholar] [CrossRef]
  33. Wang, J.; Zhang, L.Y.; Chen, J.; Hua, G.; Zhang, Y.; Xiang, Y. Compressed Sensing Based Selective Encryption With Data Hiding Capability. IEEE Trans. Ind. Inform. 2019, 15, 6560–6571. [Google Scholar] [CrossRef]
  34. Popa, C.; Coltuc, D. Compressive Sensing Based Watermarking as a Security Layer for Computational Imaging Applications. In Proceedings of the 2020 International Symposium on Electronics and Telecommunications (ISETC), Timisoara, Romania, 5–6 November 2020; IEEE: New York, NY, USA, 2020; pp. 1–4. [Google Scholar] [CrossRef]
  35. Popa, C.; Coltuc, D. Multi-Bit Watermark Insertion for Single Pixel Camera Measurements. In Proceedings of the 2021 International Symposium on Signals, Circuits and Systems (ISSCS), Iasi, Romania, 15–16 July 2021; IEEE: New York, NY, USA, 2021; pp. 1–4. [Google Scholar] [CrossRef]
  36. Sachnev, V.; Kim, H.J.; Nam, J.; Suresh, S.; Shi, Y.Q. Reversible Watermarking Algorithm Using Sorting and Prediction. IEEE Trans. Circuits Syst. Video Technol. 2009, 19, 989–999. [Google Scholar] [CrossRef]
  37. Gan, L.; Do, T.T.; Tran, T.D. Fast compressive imaging using scrambled block Hadamard ensemble. In Proceedings of the 16th European Signal Processing Conference, Lausanne, Switzerland, 25–29 August 2008; pp. 1–5. [Google Scholar]
  38. Available online: https://www.spitzer.caltech.edu/image/ssc2020-14a-w51 (accessed on 1 March 2021).
  39. Sloane, N.J. Multiplexing methods in spectroscopy. Math. Mag. 1979, 52, 71–80. [Google Scholar] [CrossRef]
  40. Beck, A.; Teboulle, M. A fast iterative shrinkage-thresholding algorithm for linear inverse problems. Siam J. Imaging Sci. 2009, 2, 183–202. [Google Scholar] [CrossRef]
  41. Available online: https://www.ti.com/dlp-chip/3d-scan-machine-vision/products.html (accessed on 15 April 2025).
  42. Xiao, D.; Li, F.; Wang, M.; Zheng, H. A novel high-capacity data hiding in encrypted images based on compressive sensing progressive recovery. IEEE Signal Process. Lett. 2020, 27, 296–300. [Google Scholar] [CrossRef]
  43. Thakkar, F.N.; Srivastava, V.K. A fast watermarking algorithm with enhanced security using compressive sensing and principle components and its performance analysis against a set of standard attacks. Multimed. Tools Appl. 2017, 76, 15191–15219. [Google Scholar] [CrossRef]
Figure 1. Schema of the proposed scenario. (up) Data insertion: if information is available for embedding and the measurement is eligible, the modified measurement is computed and transmitted. If not, the measurement is shifted and transmitted. If information is no longer available for embedding, the current measurement is processed to be used for insertion. (down) Data extraction: if the user is authorized, the embedded information will be extracted and the original measurements recovered. If unauthorized, the user is obliged to reconstruct the image using the reduced set of modified measurements.
Figure 1. Schema of the proposed scenario. (up) Data insertion: if information is available for embedding and the measurement is eligible, the modified measurement is computed and transmitted. If not, the measurement is shifted and transmitted. If information is no longer available for embedding, the current measurement is processed to be used for insertion. (down) Data extraction: if the user is authorized, the embedded information will be extracted and the original measurements recovered. If unauthorized, the user is obliged to reconstruct the image using the reduced set of modified measurements.
Information 16 00513 g001
Figure 2. Embedding process example on 7 bits.
Figure 2. Embedding process example on 7 bits.
Information 16 00513 g002
Figure 3. An example of measurement distribution for scrambled Hadamard matrix. The blue area delimited by the thresholds T and T is the probability of insertable measurements.
Figure 3. An example of measurement distribution for scrambled Hadamard matrix. The blue area delimited by the thresholds T and T is the probability of insertable measurements.
Information 16 00513 g003
Figure 4. The theoretical relative capacity as a function of measurement standard deviation for T m a x and parametrized by n. The dashed lines represent the capacity calculated for no restrictive thresholds.
Figure 4. The theoretical relative capacity as a function of measurement standard deviation for T m a x and parametrized by n. The dashed lines represent the capacity calculated for no restrictive thresholds.
Information 16 00513 g004
Figure 5. The percentage of measurements after embedding for three initial numbers of measurements: 40%, 30%, and 20%.
Figure 5. The percentage of measurements after embedding for three initial numbers of measurements: 40%, 30%, and 20%.
Information 16 00513 g005
Figure 6. The distortion as a function of insertion levels in three instances: reconstruction from truncated measurements with no embedding (blue), marked measurements extended to contain the measurements to be embedded too (red), and including both embedding and truncation (black).
Figure 6. The distortion as a function of insertion levels in three instances: reconstruction from truncated measurements with no embedding (blue), marked measurements extended to contain the measurements to be embedded too (red), and including both embedding and truncation (black).
Information 16 00513 g006
Figure 7. Example of ECA attack: (a,c) Patch reconstructed with insertion on 10 levels. (b,d) The same patch reconstructed with clean measurements and reduced Hadamard matrix (after EDA attack).
Figure 7. Example of ECA attack: (a,c) Patch reconstructed with insertion on 10 levels. (b,d) The same patch reconstructed with clean measurements and reduced Hadamard matrix (after EDA attack).
Information 16 00513 g007
Figure 8. The image of the W51 nebula obtained by NASA’s Spitzer Space Telescope. The image was used to generate the simulated data [38].
Figure 8. The image of the W51 nebula obtained by NASA’s Spitzer Space Telescope. The image was used to generate the simulated data [38].
Information 16 00513 g008
Figure 9. Two examples of patches used for tests: a dense one (left) and a sparse one (right).
Figure 9. Two examples of patches used for tests: a dense one (left) and a sparse one (right).
Information 16 00513 g009
Figure 10. Images reconstructed from real measurements: (a) Original obtained with 40% measurements; (b) image after data insertion on seven levels; (c) image after insertion on 10 levels; (d) image after insertion on 14 levels. The PSNR is calculated with respect to the original.
Figure 10. Images reconstructed from real measurements: (a) Original obtained with 40% measurements; (b) image after data insertion on seven levels; (c) image after insertion on 10 levels; (d) image after insertion on 14 levels. The PSNR is calculated with respect to the original.
Information 16 00513 g010
Figure 11. The relative capacity C r vs. the number of insertion levels n for loose thresholds ( T = 500 ).
Figure 11. The relative capacity C r vs. the number of insertion levels n for loose thresholds ( T = 500 ).
Information 16 00513 g011
Figure 12. The median of PSNR experimental values against n for T = 500 and T = 50 . The vertical dotted lines mark the range of interest for the application.
Figure 12. The median of PSNR experimental values against n for T = 500 and T = 50 . The vertical dotted lines mark the range of interest for the application.
Information 16 00513 g012
Figure 13. The median of PSNR experimental values for three ranges of image standard deviation and loose thresholds.
Figure 13. The median of PSNR experimental values for three ranges of image standard deviation and loose thresholds.
Information 16 00513 g013
Figure 14. Reconstruction examples for a sparse and a dense patch: (a,e) originals obtained with the 40% genuine measurements; (b,f) images after performing insertion on seven levels; (c,g) images after insertion on 10 levels; (d,h) images after insertion on 14 levels.
Figure 14. Reconstruction examples for a sparse and a dense patch: (a,e) originals obtained with the 40% genuine measurements; (b,f) images after performing insertion on seven levels; (c,g) images after insertion on 10 levels; (d,h) images after insertion on 14 levels.
Information 16 00513 g014
Figure 15. Relative capacity C r as a function of PSNRs median.
Figure 15. Relative capacity C r as a function of PSNRs median.
Information 16 00513 g015
Figure 16. The compression rate vs. n for insertion with loose thresholds.
Figure 16. The compression rate vs. n for insertion with loose thresholds.
Information 16 00513 g016
Figure 17. The rate–distortion curve for insertion with loose thresholds.
Figure 17. The rate–distortion curve for insertion with loose thresholds.
Information 16 00513 g017
Table 1. Execution time and required memory for L = 40 % and loose thresholds.
Table 1. Execution time and required memory for L = 40 % and loose thresholds.
Insertion Levels
n
Insertion Time
[ms]
Extraction Time
[ms]
Insertion
Memory [MB]
Extraction
Memory [MB]
7179.061159.121.392.85
8186.241259.101.453.01
9213.021359.291.483.20
10231.151447.981.543.39
11247.341537.391.593.51
12256.721621.281.623.64
13273.281679.531.653.82
14281.571748.071.703.89
n = 10 , L = 20 % 121.25778.050.781.71
n = 10 , L = 30 % 186.711181.711.202.51
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Popa, C.-E.; Damian, C.-C.; Coltuc, D. Joint Data Hiding and Partial Encryption of Compressive Sensed Streams. Information 2025, 16, 513. https://doi.org/10.3390/info16070513

AMA Style

Popa C-E, Damian C-C, Coltuc D. Joint Data Hiding and Partial Encryption of Compressive Sensed Streams. Information. 2025; 16(7):513. https://doi.org/10.3390/info16070513

Chicago/Turabian Style

Popa, Cristina-Elena, Constantin-Cristian Damian, and Daniela Coltuc. 2025. "Joint Data Hiding and Partial Encryption of Compressive Sensed Streams" Information 16, no. 7: 513. https://doi.org/10.3390/info16070513

APA Style

Popa, C.-E., Damian, C.-C., & Coltuc, D. (2025). Joint Data Hiding and Partial Encryption of Compressive Sensed Streams. Information, 16(7), 513. https://doi.org/10.3390/info16070513

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop