Computer Science ›› 2022, Vol. 49 ›› Issue (8): 344-349.doi: 10.11896/jsjkx.210700235

• Information Security • Previous Articles    

Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map

ZHOU Lian-bing1, ZHOU Xiang-zhen2, CUI Xue-rong3   

  1. 1 School of Artificial Intelligence,Dongying Vocational Institute,Dongying,Shandong 257091,China
    2 School of Computer Science and Engineering,Beihang University,Beijing 100191,China
    3 College of Oceanography and Space Informatics,China University of Petroleum(East China),Qingdao,Shandong 266580,China
  • Received:2021-07-23 Revised:2021-10-15 Published:2022-08-02
  • About author:ZHOU Lian-bing,born in 1978,master,professor.His main research interests include computer network and so on.
  • Supported by:
    National Natural Science Foundation of China(61902431) and Study on the Key Technologies of IndoorLocatization in Complex Environment Based on the Automatic Learning Deep Belief Nets and Multi-source Information Fusion.

Abstract: In order to improve the security and encryption speed of chaotic encryption system,a lightweight compression image encryption scheme based on chaotic mapping is proposed.Firstly,in order to speed up the encryption process and destroy the correlation between pixels,the digital image is divided into image blocks and compressed by processing in the frequency domain.Then,2D Logistic chaotic mapping is implemented to rearrange and transpose image pixels in the key generation,scrambling and replacement stages.In addition,to further improve the security level,in the diffusion stage,another chaotic map 2D Henon map is used to change the pixel value of the scrambled image.Performance evaluation results show that the proposed scheme can meet the security requirements of image encryption,and the key space is large.Compared with other excellent schemes,this scheme can better resist statistical and differential attacks,and it is highly sensitive to the change of the generated key space.Its key space size is 256bits,the NPCR value is about 99%,and UACI value is more than 15%.

Key words: Chaotic encryption system, Compression image, Encryption speed, Image encryption, Key, Security

CLC Number: 

  • TN918
[1]ZHANG S,GAO T G.An image encryption scheme based on DNA coding and permutation of hyper-image [J].Multimedia Tools and Applications,2016,75(24):17157-17170.
[2]RAMANATHAN T,HOSSEN M J,SAYEED M S,et al.Survey on computational intelligence based image encryption techniques[J].Indonesian Journal of Electrical Engineering and Computer Science,2020,19(3):1428-1435.
[3]FATMA Y,HAFID A,DANI H O.Peningkatan keamanan pengiriman pesan teks:kombinasi advanced encryption standard(AES) 128 dan least significant bit(LSB)[J].JUSIFO (Jurnal Sistem Informasi),2020,6(2):111-120.
[4]IKHWAN A,RAOF R,EHKAN P,et al.Data security implementation using data encryption standard method for student values at the faculty of medicine,University of North Sumatra[J].Journal of Physics:Conference Series,2021,1755(1):22-33.
[5]YE G D,HUANG X L.An efficient symmetric image encryption algorithm based on an intertwining logistic map [J].Neurocomputing,2017,251(19):45-53.
[6]MAO J,WANG H Y,CHEN Y.Image encryption algorithmbased on dynamic key selection and multi-direction diffusion[J].Optical Technique,2018,44(3):278-286.
[7]ELAMIR M M,TABANY W I,MAI S M.Hybrid image en-cryption scheme for secure E-health systems[J].Network Mo-deling Analysis in Health Informatics and Bioinformatics,2021,10(1):1727-1744.
[8]DING L N,DING Q.A novel image encryption scheme based on 2D fractional chaotic map,DWT and 4D hyper-chaos[J].Electronics,2020,9(8):1280-1299.
[9]LI C,LUO G,LI C.An image encryption scheme based on the three-dimensional chaotic logistic map[J].International Journal of Network Security,2019,21(1):22-29.
[10]HAN S M,ZHANG W,ZHANG X,et al.Multiple image encryption method based on light field imaging theory and chaotic system[J].Acta Photonica Sinica,2020,49(3):193-202.
[11]SAMAR M I,LOBNA A,AHMED A R,et al.Biomedical image encryption based on double-humped and fractional logistic maps[C]//2017 6th International Conference on Modern Circuits and Systems Technologies(MOCAST).IEEE press,2017:112-123.
[12]LI M,ZHOU K,REN H,et al.Cryptanalysis of permutation-diffusion-based lightweight chaotic image encryption scheme using CPA[J].Applied Sciences,2019,9(3):95-104.
[13]XIAN Y J,XIE S J,TU Y L.Multi-image encryption algorithm based on hyper-chaotic system [J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2020,32(6):1065-1074.
[14]LIU Z,WANG Y.Image compression and encryption schemebased on the two-dimensional coupled map lattice model [J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2020,32(6):1048-1057.
[15]YAN X X,ZHANG Q C YANG C C.Weighted attribute-based encryption scheme with traitor tracing [J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2020,32(6):1058-1064.
[16]LI M,XU M,LUO J,et al.Cryptanalysis of an image encryption using 2D Henon-sine map and DNA approach[J].IEEE Access,2019,52(7):63336-63345.
[17]JRIDI M,MEHER P K.Scalable approximate DCT architec-tures for effcient HEVC-compliant video coding[J].IEEE Trans. Circuits. Syst. Video Technol.,2017,27(8):1815-1825.
[18]SHIHABH S,SUHAIDI S,ABDUL R R,et al.Enhancement of satellite image compression using a hybrid(DWT-DCT) algorithm[J].Sensing & Imaging,2017,18(1):30-41.
[19]EEAYATIFARA R,ABDULLAHB A,ISMAIL F I.Image encryption using a synchronous permutation diffusion technique[J].Optics and Lasers in Engineering,2017,90(6):146-154.
[20]WU Y,ZHOU Y,SAVERIADES G,et al.Local shannon entropy measure with statistical tests for image randomness[J].Information Science,2013,222(12):323-342.
[21]ZHANG Y.A Chaotic system based image encryption schemewith identical encryption and decryption algorithm[J].Chinese Journal of Electronics,2017,26(5):1022-1031.
[22]MOAFIMADANI S S, CHEN Y,TANG C.A new algorithm for medical color images encryption using chaotic systems[J].Entropy,2019,21(6):577-186.
[1] LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311.
[2] WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354.
[3] JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313.
[4] CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323.
[5] LI Tang, QIN Xiao-lin, CHI He-yu, FEI Ke. Secure Coordination Model for Multiple Unmanned Systems [J]. Computer Science, 2022, 49(7): 332-339.
[6] ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362.
[7] DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284.
[8] JIANG Cheng-man, HUA Bao-jian, FAN Qi-liang, ZHU Hong-jun, XU Bo, PAN Zhi-zhong. Empirical Security Study of Native Code in Python Virtual Machines [J]. Computer Science, 2022, 49(6A): 474-479.
[9] TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484.
[10] YUAN Hao-nan, WANG Rui-jin, ZHENG Bo-wen, WU Bang-yan. Design and Implementation of Cross-chain Trusted EMR Sharing System Based on Fabric [J]. Computer Science, 2022, 49(6A): 490-495.
[11] HUANG Hua-wei, LI Chun-hua. Security Analysis of A Key Exchange Protocol Based on Tropical Semi-ring [J]. Computer Science, 2022, 49(6A): 571-574.
[12] LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593.
[13] Renata WONG. Application of Early Quantum Algorithms in Quantum Communication,Error Correction and Other Fields [J]. Computer Science, 2022, 49(6A): 645-648.
[14] YU Jia-qi, KANG Xiao-dong, BAI Cheng-cheng, LIU Han-qing. New Text Retrieval Model of Chinese Electronic Medical Records [J]. Computer Science, 2022, 49(6A): 32-38.
[15] DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108.
Full text



No Suggested Reading articles found!