Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2023, Vol. 17 Issue (3) : 173804    https://doi.org/10.1007/s11704-022-1419-8
RESEARCH ARTICLE
Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform
Xiaoling HUANG1, Youxia DONG1, Guodong YE1(), Yang SHI2
1. Faculty of Mathematics and Computer Science, Guangdong Ocean University, Zhanjiang 524088, China
2. School of Software Engineering, Tongji University, Shanghai 200092, China
 Download: PDF(13152 KB)   HTML
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

A new meaningful image encryption algorithm based on compressive sensing (CS) and integer wavelet transformation (IWT) is proposed in this study. First of all, the initial values of chaotic system are encrypted by RSA algorithm, and then they are open as public keys. To make the chaotic sequence more random, a mathematical model is constructed to improve the random performance. Then, the plain image is compressed and encrypted to obtain the secret image. Secondly, the secret image is inserted with numbers zero to extend its size same to the plain image. After applying IWT to the carrier image and discrete wavelet transformation (DWT) to the inserted image, the secret image is embedded into the carrier image. Finally, a meaningful carrier image embedded with secret plain image can be obtained by inverse IWT. Here, the measurement matrix is built by both chaotic system and Hadamard matrix, which not only retains the characteristics of Hadamard matrix, but also has the property of control and synchronization of chaotic system. Especially, information entropy of the plain image is employed to produce the initial conditions of chaotic system. As a result, the proposed algorithm can resist known-plaintext attack (KPA) and chosen-plaintext attack (CPA). By the help of asymmetric cipher algorithm RSA, no extra transmission is needed in the communication. Experimental simulations show that the normalized correlation (NC) values between the host image and the cipher image are high. That is to say, the proposed encryption algorithm is imperceptible and has good hiding effect.

Keywords image encryption algorithm      compressive sensing      integer wavelet transform      Hadamard matrix     
Corresponding Author(s): Guodong YE   
About author:

Tongcan Cui and Yizhe Hou contributed equally to this work.

Just Accepted Date: 18 February 2022   Issue Date: 08 September 2022
 Cite this article:   
Xiaoling HUANG,Youxia DONG,Guodong YE, et al. Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform[J]. Front. Comput. Sci., 2023, 17(3): 173804.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-022-1419-8
https://academic.hep.com.cn/fcs/EN/Y2023/V17/I3/173804
Fig.1  The sequence values of 3D-LCM: (a) orbit of x, (b) orbit of y, (c) orbit of z
Sequence Cross-correlation coefficient before improvement Cross-correlation coefficient of different α-values after improvement
α=3 α=4 α=5 α=6 α=7
x?y 0.8766 ?0.0482 0.0031 ?0.0022 0.0529 ?0.0048
x?z ?0.8260 0.042 0.0008 0.0216 0.0475 ?0.0552
y?z ?0.8242 0.0445 0.0263 ?0.0105 0.0078 0.0283
Mean 0.8423 0.0449 0.0100 0.0114 0.0361 0.0294
Tab.1  Cross-correlation coefficients
Fig.2  The distribution for 3D-LCM after improvement: (a) orbit of x, (b) orbit of y, (c) orbit of z
Statistical test P-value Result
x y z
The frequency (monobit) test 3.31×10?19 4.46×10?17 1.19×10?13 Fail
Frequency test within a block 0.1523 0.2436 0.0129 Pass
The runs test 0.4364 0.8046 0.2016 Pass
Tests for the longest_run_of_ones in a block 0.2059 0.6670 0.6706 Pass
The discrete fourier transform (spectral) test 0.2457 0.2017 0.3531 Pass
The non-overlapping template matching test 0.2059 0.6670 0.6706 Pass
The overlapping template matching test 0.7897 0.0287 0.4033 Pass
Maurer’s “universal statistical” test 0.9169 0.9942 0.5831 Pass
The linear complexity test 0.1367 0.3747 0.6983 Pass
The serial test 1.97×10?34 1.24×10?29 1.17×10?23 Fail
The approximate entropy test 0.2181 0.9314 0.6657 Pass
Cusums-forward 1.0000 0.9538 0.7036 Pass
Cusums-reverse 0.9992 0.6848 0.6384 Pass
The random excursions test 0.7657 0.1377 0.5446 Pass
The random excursions variant test 0.2568 0.0496 0.3691 Pass
Tab.2  NIST tests for random sequence before improvement
Statistical test P-value Result
x y z
The frequency (monobit) test 0.8352 0.4295 0.9601 Pass
Frequency test within a block 0.1154 0.7081 0.4394 Pass
The runs test 0.0719 0.9262 0.0994 Pass
Tests for the longest_run_of_ones in a block 0.7870 0.9215 0.9556 Pass
The discrete fourier transform (spectral) test 0.2457 0.1636 0.0869 Pass
The non-overlapping template matching test 0.7870 0.9215 0.9556 Pass
The overlapping template matching test 0.0571 0.7732 0.1419 Pass
Maurer’s “universal statistical” test 0.4354 0.7122 0.7194 Pass
The linear complexity test 0.7053 0.9083 0.1147 Pass
The serial test 0.0347 0.1643 0.1904 Pass
The approximate entropy test 0.4150 0.4052 0.4304 Pass
Cusums-forward 0.9952 0.3870 0.9867 Pass
Cusums-reverse 0.8580 0.6020 0.6569 Pass
The random excursions test 0.5671 0.5517 0.2344 Pass
The random excursions variant test 0.6807 0.9479 0.4536 Pass
Tab.3  NIST tests for random sequence after improvement
Fig.3  Flowchart of the proposed image encryption algorithm
  
  
  
Parameter Value Parameter Value
q 1867 r2 0.016
p 1471 r3 0.010
d 613877 e 353
r1 3.597 n 2746357
Tab.4  Parameters used in the experiment
Fig.4  Grayscale image tests: (a) plain image of peppers (256×256), (b) cipher image of (a), (c) carrier image of house, (d) meaningful carrier image house containg image Peppers, (e) recovery image of peppers, (f) plain image of house (512×512), (g) cipher image of (f), (h) carrier image of landscape, (i) meaningful carrier image landscape containg image house, (j) recovery image of house; color image tests: (k) plain image of boat (256×256), (l) cipher image of (k), (m) carrier image of earth, (n) meaningful carrier image earth containg image boat, (o) recovery image of boat
Fig.5  Key sensitivity tests: (a) plain image peppers, (b) carrier image goldhill, (c) meaninful carrier image goldhill, (d) decrypted image with x0+10?14, (e) decrypted image with y0+10?14, (f) decrypted image with z0+10?14, (g) decrypted image with correct key
Fig.6  Histogram tests for carrier images: (a) carrier image Baboon, (b) histogram of (a), (c) meaningful carrier image baboon, (d) histogram of (c), (e) carrier image peppers (f) histogram of (e), (g) meaningful carrier image peppers, (h) histogram of (g), (i) carrier image Sun, (j) histogram of R component of (i), (k) histogram of G component of (i), (l) histogram of B component of (i), (m) meaningful carrier image sun, (n) histogram of R component of (m), (o) histogram of G component of (m) (p) histogram of B component of (m)
Fig.7  Histogram tests for secret images: (a) plain image House, (b) histogram of (a), (c) histogram of cipher image of (a), (d) histogram of recovery image of (a), (e) plain image Peppers, (f) histogram of (e), (g) histogram of cipher image of (e), (h) histogram of recovery image of (e)
Algorithm Plain images Carrier images θ(PR) θ(CM)
ours Lena Landscape 0.9637 0.9750
Peppers Art 0.9694 0.9754
Boat Landscape 0.9520 0.9747
Girl Art 0.9570 0.9756
Ref. [38] Lena Goldhill ? 0.9312
Girl Barbara ? 0.9305
Tab.5  The values of distance of histogram
Plain image Carrier image NC H
CI MCI
Cameraman ( 256×256) Goldhill 0.9997 7.4778 7.5065
Couple 0.9997 7.0581 7.4253
Lena 0.9997 7.4474 7.4711
Lena ( 512×512) Landscape 0.9998 7.4402 7.4514
Art 0.9998 7.4532 7.4575
Male 0.9995 7.5237 7.5377
House ( 512×512) Landscape 0.9998 7.4402 7.4510
Male 0.9995 7.5237 7.5376
Art 0.9998 7.4532 7.4574
Tab.6  Similarity test results
Carrier image MSSIM
Ref. [38] Ref. [42] Ours
Peppers 0.9257 0.6726 0.9829
Baboon 0.9833 0.6991 0.9915
Goldhill 0.9666 0.7021 0.9873
Bridge 0.9783 0.7337 0.9955
Average 0.9635 0.7018 0.9893
Tab.7  Comparisons of MSSIM
Plain-images Size Carrier images MSE PSNR
PS HC PS HC
Cameraman 256×256 Couple 9477.8 13.8922 8.3637 36.7031
Girl 9383.1 13.8365 8.4074 36.7205
Art 256×256 Couple 11387 13.8010 7.5667 36.7317
Girl 11304 13.9037 7.5989 36.6995
House 512×512 Art 7660.4 13.8520 9.2883 36.7157
Landscape 7671.0 13.7975 9.2823 36.7328
Lena 512×512 Male 7793.4 13.9133 9.2135 36.6965
Landscape 7791.8 13.8782 9.2144 36.7075
Boat 512×512 Pentagon 8290.8 13.8892 8.9448 36.7040
Landscape 8260.6 13.8528 8.9607 36.7154
Tab.8  Values of MSE and PSNR
Images Ours Ref. [11] Ref. [38] Ref. [43] Ref. [44]
Lena 36.6939 28.684 ? 36.142 ?
Baboon 36.7386 27.946 37.1058 36.617 ?
Earth 36.7245 28.933 ? 36.479 ?
Couple 36.7315 27.920 ? 35.598 ?
Bridge 36.7143 26.553 35.5629 36.132 ?
Boat 36.7405 27.251 ? 36.549 ?
Pepper 36.7453 28.845 32.3513 36.055 ?
Mean 36.7269 28.019 35.0067 36.225 32.98
Tab.9  Values of PSNR of HC
Fig.8  Secret plain images: (a) house, (b) chimney, (c) peppers, (d) bridge, (e) lgthouse
Fig.9  PSNR values for different compression ratio
Fig.10  Cropping attack tests: (a) meaningful carrier image cropped with 32×32, (b) recovery image from (a), (c) meaningful carrier image cropped with 64×64, (d) recovery image from (b), (e) meaningful carrier image cropped with 128×128, (f) recovery image from (e), (g) meaningful carrier image cropped with 172×172, (h) recovery image from (g)
Ref. [45] Ref. [9] Ours
Encryption time Decryption time Encryption time Decryption time Encryption time Decryption time
Bridge 0.0575 7.4189 0.1485 7.3479 0.0872 0.9911
Apartment 0.0583 7.4344 0.1504 7.3639 0.0931 0.9248
Lake 0.0517 7.4382 0.1519 7.3994 0.0869 0.9641
Building 0.0528 7.3567 0.1487 7.3750 0.0925 0.9376
Lena 0.0569 7.3942 0.1496 7.4436 0.0886 1.0911
Peppers 0.0533 7.3906 0.1490 7.4520 0.0903 1.1405
Tab.10  Comparisons of speed with CR=1 (unit: s)
Ref. [42] Ref. [9] Ours
Encryption time Decryption time Encryption time Decryption time Encryption time Decryption time
Bridge 0.7034 1.4306 0.1527 1.5041 0.0913 0.1928
Apartment 0.6940 1.4305 0.1511 1.4966 0.0860 0.1800
Lake 0.7052 1.4336 0.1549 1.5051 0.0905 0.1866
Building 0.7477 1.5607 0.1661 1.7117 0.0883 0.1847
Lena 0.6817 1.4152 0.1488 1.4935 0.0884 0.1807
Peppers 0.6738 1.4089 0.1485 1.5034 0.0875 0.1953
Tab.11  Comparison of speed with CR=0.25 (unit: s)
Host image H
Host image Cipher image
IWT DWT LWT
Goldhill 7.4778 7.5014 7.5529 7.5525
Baboon 7.3585 7.3716 7.4033 7.4038
Peppers 7.5937 7.6230 7.6640 7.6638
Boat 7.1238 7.1786 7.2657 7.2645
Lena 7.4474 7.4777 7.5316 7.5319
Tab.12  Comparisons by different wavelet transforms
Fig.11  Difference for different wavelet transforms
Image NPCR/% UACI/%
Boat 99.6235 33.4570
Lena 99.6174 33.4521
Peppers 99.6078 33.4755
Tab.13  Tests of NPCR and UACI
  
  
  
  
1 Z, Tang X Zhang . Secure image encryption without size limitation using Arnold transform and random strategies. Journal of Multimedia, 2011, 6( 2): 202– 206
2 G, Chen Y, Mao C K Chui . A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals, 2004, 21( 3): 749– 761
3 Y Q, Chen W J, Sun L Y, Li C C, Chang X Wang . An efficient general data hiding scheme based on image interpolation. Journal of Information Security and Applications, 2020, 54: 102584
4 Y, Zhang J, Zhou F, Chen L Y, Zhang K W, Wong X, He D Xiao . Embedding cryptographic features in compressive sensing. Neurocomputing, 2016, 205: 472– 480
5 G, Cheng C, Wang C Xu . A novel hyper-chaotic image encryption scheme based on quantum genetic algorithm and compressive sensing. Multimedia Tools and Applications, 2020, 79( 39−40): 29243– 29263
6 J, Song Y H Lee . Optical image encryption using different twiddle factors in the butterfly algorithm of fast Fourier transform. Optics Communications, 2021, 485: 126707
7 G, Ye K, Jiao X Huang . Quantum logistic image encryption algorithm based on SHA-3 and RSA. Nonlinear Dynamics, 2021, 104( 3): 2807– 2827
8 X Y, Wang Y Q, Zhang X M Bao . A novel chaotic image encryption scheme using DNA sequence operations. Optics and Lasers in Engineering, 2015, 73: 53– 61
9 G, Ye C, Pan Y, Dong Y, Shi X Huang . Image encryption and hiding algorithm based on compressive sensing and random numbers insertion. Signal Processing, 2020, 172: 107563
10 X, Liao K, Li X, Zhu K J R Liu . Robust detection of image operator chain with two-stream convolutional neural network. IEEE Journal of Selected Topics in Signal Processing, 2020, 14( 5): 955– 968
11 L, Bao Y Zhou . Image encryption: generating visually meaningful encrypted images. Information Sciences, 2015, 324: 197– 207
12 G, Ye C, Pan Y, Dong K, Jiao X Huang . A novel multi-image visually meaningful encryption algorithm based on compressive sensing and Schur decomposition. Transactions on Emerging Telecommunications Technologies, 2021, 32( 2): e4071
13 Z, Hua K, Zhang Y, Li Y Zhou . Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing. Signal Processing, 2021, 183: 107998
14 Y G, Yang B P, Wang Y L, Yang Y H, Zhou W M, Shi X Liao . Visually meaningful image encryption based on universal embedding model. Information Sciences, 2021, 562: 304– 324
15 W, Wen Y, Hong Y, Fang M, Li M Li . A visually secure image encryption scheme based on semi-tensor product compressed sensing. Signal Processing, 2020, 173: 107580
16 Y G, Yang B P, Wang Y L, Yang Y H, Zhou W M Shi . Dual embedding model: a new framework for visually meaningful image encryption. Multimedia Tools and Applications, 2021, 80( 6): 9055– 9074
17 X, Liao J, Yin M, Chen Z Qin . Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Transactions on Dependable and Secure Computing, 2020,
https://doi.org/10.1109/TDSC.2020.3004708
18 X, Liao Y, Yu B, Li Z, Li Z Qin . A new payload partition strategy in color image steganography. IEEE Transactions on Circuits and Systems for Video Technology, 2020, 30( 3): 685– 696
19 R, Kumar S, Chand S Singh . A reversible data hiding scheme using pixel location. International Arab Journal of Information Technology, 2018, 15( 4): 763– 768
20 R, Kumar S, Chand S Singh . A reversible high capacity data hiding scheme using combinatorial strategy. International Journal of Multimedia Intelligence and Security, 2018, 3( 2): 146– 161
21 A, Malik S, Singh R Kumar . Recovery based high capacity reversible data hiding scheme using even-odd embedding. Multimedia Tools and Applications, 2018, 77( 12): 15803– 15827
22 G, Kaur S, Singh R, Rani R, Kumar A Malik . High-quality reversible data hiding scheme using sorting and enhanced pairwise PEE. IET Image Processing, 2021,
https://doi.org/10.1049/ipr2.12212
23 R, Kumar S, Chand S Singh . An improved Histogram-Shifting-Imitated reversible data hiding based on HVS characteristics. Multimedia Tools and Applications, 2018, 77( 11): 13445– 12457
24 Q, Cun X, Tong Z, Wang M Zhang . Selective image encryption method based on dynamic DNA coding and new chaotic map. Optik, 2021, 243: 167286
25 X Gao . Image encryption algorithm based on 2D hyperchaotic map. Optics & Laser Technology, 2021, 142: 107252
26 J, Zheng H Hu . A symmetric image encryption scheme based on hybrid analog-digital chaotic system and parameter selection mechanism. Multimedia Tools and Applications, 2021, 80( 14): 20883– 20905
27 X, Wang X Chen . An image encryption algorithm based on dynamic row scrambling and Zigzag transformation. Chaos, Solitons & Fractals, 2021, 147: 110962
28 J, Zheng L Liu . Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map. IET Image Processing, 2020, 14( 11): 2310– 2320
29 K A K, Patro A, Soni P K, Netam B Acharya . Multiple grayscale image encryption using cross-coupled chaotic maps. Journal of Information Security and Applications, 2020, 52: 102470
30 C, Wu K Y, Hu Y, Wang J, Wang Q H Wang . Scalable asymmetric image encryption based on phase-truncation in cylindrical diffraction domain. Optics Communications, 2019, 448: 26– 32
31 V, Guleria S, Sabir D C Mishra . Security of multiple RGB images by RSA cryptosystem combined with FrDCT and Arnold transform. Journal of Information Security and Applications, 2020, 54: 102524
32 M, Benssalah Y, Rhaskali K Drouiche . An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography. Multimedia Tools and Applications, 2021, 80( 2): 2081– 2107
33 P, Rakheja P, Singh R Vig . An asymmetric image encryption mechanism using QR decomposition in hybrid multi-resolution wavelet domain. Optics and Lasers in Engineering, 2020, 134: 106177
34 H, Wu H, Zhu G Ye . Public key image encryption algorithm based on pixel information and random number insertion. Physica Scripta, 2021, 96( 10): 105202
35 E, Kumari S, Mukherjee P, Singh R Kumar . Asymmetric color image encryption and compression based on discrete cosine transform in Fresnel domain. Results in Optics, 2020, 1: 100005
36 Q, Xu K, Sun C, Cao C Zhu . A fast image encryption algorithm based on compressive sensing and hyperchaotic map. Optics and Lasers in Engineering, 2019, 121: 203– 214
37 X, Chai J, Bi Z, Gan X, Liu Y, Zhang Y Chen . Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Processing, 2020, 176: 107684
38 H, Wang D, Xiao M, Li Y, Xiang X Li . A visually secure image encryption scheme based on parallel compressive sensing. Signal Processing, 2019, 155: 218– 232
39 X, Wang Y Su . Image encryption based on compressed sensing and DNA encoding. Signal Processing: Image Communication, 2021, 95: 116246
40 Y R, Liang Z Y Xiao . Image encryption algorithm based on compressive sensing and fractional DCT via polynomial interpolation. International Journal of Automation and Computing, 2020, 17( 2): 292– 304
41 D, Kumar A B, Joshi V N Mishra . Optical and digital double color-image encryption algorithm using 3D chaotic map and 2D-multiple parameter fractional discrete cosine transform. Results in Optics, 2020, 1: 100031
42 A, Kanso M Ghebleh . An algorithm for encryption of secret images into meaningful images. Optics and Lasers in Engineering, 2017, 90: 196– 208
43 X, Chai H, Wu Z, Gan Y, Zhang Y, Chen K W Nixon . An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding. Optics and Lasers in Engineering, 2020, 124: 105837
44 R, Thanki S, Borra V, Dwivedi K Borisagar . A steganographic approach for secure communication of medical images based on the DCT-SVD and the compressed sensing (CS) theory. The Imaging Science Journal, 2017, 65( 8): 457– 467
45 X, Chai Z, Gan Y, Chen Y Zhang . A visually secure image encryption scheme based on compressive sensing. Signal Processing, 2017, 134: 35– 51
[1] FCS-21419-OF-XH_suppl_1 Download
[1] Kang LI,Fazhi HE,Xiao CHEN. Real-time object tracking via compressive feature selection[J]. Front. Comput. Sci., 2016, 10(4): 689-701.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed