Computer Science ›› 2022, Vol. 49 ›› Issue (12): 368-373.doi: 10.11896/jsjkx.220600139

• Information Security • Previous Articles     Next Articles

Selective Shared Image Encryption Method Based on Chaotic System and YOLO v4

ZHANG Guo-mei1 MA Lin-juan2, ZHANG Fu-quan2, LI Qing-zhen3   

  1. 1 School of Computer Science and Engineering,Guangzhou Institute of Science and Technology,Guangzhou 510540,China
    2 School of Computer Science & Technology,Beijing Institute of Technology,Beijing 100081,China
    3 Institute of Data Rule of Law,China University of Political Science and Law,Beijing 102249,China
  • Received:2022-06-15 Revised:2022-07-25 Published:2022-12-14
  • About author:ZHANG Guo-mei,born in 1979,postgraduate,lecturer.Her main research interests include visual processing,graphics processing,virtual reality technology and application.
  • Supported by:
    National Natural Science Foundation of China(61601189) and Scientific Research Projects of Colleges in Guangdong Province(2019KTSCX243,2021ZDZX1070).

Abstract: Aiming at the information security problem of sharing images on social platforms,a selective region of interest(ROI) image encryption scheme based on YOLO v4 and hybrid chaotic map encryption is proposed.By utilizing YOLO v4,the uploaded image is automatically detected and the candidate bounding boxes to be encrypted are provided.Then the image areas selected by user are encrypted with the proposed hybrid encryption algorithm combining cosine and polynomial mapping,so that only legally authorized users can access the sensitive information of the shared image.Through the secret key issuing and authorization mecha-nism,the protection of sensitive information of the image forwarded by a third party is realized.Statistical and security analysis results prove that the proposed scheme can resist various attacks,and the processing speed can meet the real-time needs of online users.

Key words: Image encryption, Shared image, Chaotic map, YOLO v4, Region of interest

CLC Number: 

  • TP309
[1]RATHORE S,SHARMA P K,LOIA V,et al.Social network security:Issues,challenges,threats,and solutions[J].Information Sciences,2017,42(1):43-69.
[2]LI L,XIE Y,LIU Y,et al.Exploiting opticalchaos for colorimage encryption and secure resource sharing in cloud[J].IEEE Photonics Journal,2019,11(3):1-12.
[3]REN H,NIU S Z,WANG M S,et al.Homomorphic and commutative fragile zero-watermarking based on SVD[J].Computer Science,2022,49(3):70-76.
[4]YU F,GONG X H,WANG S H.Cryptanalysis of medical image encryption algorithm using high-speed scrambling and pixel adaptive diffusion[J].Computer Science,2020,47(2):276-280.
[5]LI J Q,ZHOU J,DI X Q.Learning optical image encryptionscheme based on CycleGAN[J].Journal of Jilin University(Engineering and Technology Edition),2021,51(3):1060-1066.
[6]LI F P,LIU J B,WANG G Y,et al.An image encryption algorithm based on chaos set[J].Journal of Electronics & Information Technology,2020,42(4):981-987.
[7]TANG J,YU Z,LIU L.A delay coupling method to reduce the dynamical degradation of digital chaotic maps and its application for image encryption[J].Multimedia Tools and Applications,2019,78(17):24765-24788.
[8]WEI L S,HU X C,CHEN Q Q,et al.A color image encryption algorithm based on new chaos and matrix convolution operation[J].Computer Engineering and Science,2020,42(1):80-88.
[9]LIU L,MIAO S.A new simple one-dimensional chaotic map and its application for image encryption[J].Multimedia Tools and Applications,2018,77(16):21445-21462.
[10]WANG X,FENG L,LI R,et al.A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model[J].Nonlinear Dynamics,2019,95(4):2797-2824.
[11]WEI C J,LI G D.Encryption algorithm of video images combining hyper-chaotic system and logistic mapping[J].Computer Engineering,2022,48(5):263-271.
[12]TRSOR L O,SUMBWANYAMBE M.A selective image en-cryption scheme based on 2d DWT,Henon map and 4d Qi hyper-chaos[J].IEEE Access,2019,7(1):103463-103472.
[13]XUE H,DU J,LI S,et al.Region of interest encryption for color images based on a hyperchaotic system with three positive Lyapunov exponets[J].Optics & Laser Technology,2018,106(1):506-516.
[14]KRISHNAMOORTHI R,MURALI P.A selective image en-cryption based on square-wave shuffling with orthogonal polynomials transformation suitable for mobile devices[J].Multimedia Tools and Applications,2017,76(1):1217-1246.
[15]ZHANG L D,DENG C.Multi-scale fusion of YOLOv3 crowd mask wearing detection method[J].Computer Engineering and Applications,2021,57(16):283-290.
[16]ZHU H,QI W,GE J,et al.Analyzing devaney chaos of a sine-cosine compound function system[J].International Journal of Bifurcation and Chaos,2018,28(14):176-188.
[17]GE J X,LAN L,QI W T,et al.Two-dimensional inverse-trigonometric hyperchaotic system and its application in image encryption[J].Journal of Computer Applications,2019,39(1):239-244.
[18]LIAO X,HAHSMI M A,HAIDER R.An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos[J].Optik-International Journal for Light and Electron Optics,2018,153(2):117-134.
[19]QAYYUM A,AHMAD J,BOULILA W,et al.Chaos-basedconfusion and diffusion of image pixels using dynamic substitution[J].IEEE Access,2020,8(1):140876-140895.
[1] ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349.
[2] ZHANG Sai-nan, LI Qian-mu. Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping [J]. Computer Science, 2022, 49(1): 353-358.
[3] LIU Qi, CHEN Hong-mei, LUO Chuan. Method for Prediction of Red Blood Cells Supply Based on Improved Grasshopper Optimization Algorithm [J]. Computer Science, 2021, 48(2): 224-230.
[4] JIN Yu-fang, WU Xiang, DONG Hui, YU Li, ZHANG Wen-an. Improved YOLO v4 Algorithm for Safety Helmet Wearing Detection [J]. Computer Science, 2021, 48(11): 268-275.
[5] BAN Duo-han, LV Xin, WANG Xin-yuan. Efficient Image Encryption Algorithm Based on 1D Chaotic Map [J]. Computer Science, 2020, 47(4): 278-284.
[6] YU Feng,GONG Xin-hui,WANG Shi-hong. Cryptanalysis of Medical Image Encryption Algorithm Using High-speed Scrambling and Pixel Adaptive Diffusion [J]. Computer Science, 2020, 47(2): 276-280.
[7] FAN Ying, ZHANG Da-min, CHEN Zhong-yun, WANG Yi-rou, XU Hang, WANG Li-qiao. Spectrum Allocation Scheme of Vehicular Ad Hoc Networks Based on Improved Crow Search Algorithm [J]. Computer Science, 2020, 47(12): 273-278.
[8] TIAN Jun-feng, PENG Jing-jing, ZUO Xian-yu, GE Qiang, FAN Ming-hu. Image Encryption Algorithm Based on Cyclic Shift and Multiple Chaotic Maps [J]. Computer Science, 2020, 47(10): 327-331.
[9] CHAI Rui, XUE Fan, ZENG Jian-chao, QIN Pin-le. Automatic Quantitative Evaluation Approach for Medical Renal Dynamic Imaging [J]. Computer Science, 2019, 46(8): 321-326.
[10] HE Xia, TANG Yi-ping, WANG Li-ran, CHEN Peng, YUAN Gong-ping. Multitask Hierarchical Image Retrieval Technology Based on Faster RCNNH [J]. Computer Science, 2019, 46(3): 303-313.
[11] WANG Li-juan, LI Guo-dong, LV Dong-mei. Chaotic System Image Encryption Algorithm Based on Dynamic Parameter Control [J]. Computer Science, 2019, 46(11A): 469-472.
[12] HAN Xue-juan, LI Guo-dong, WANG Si-xiu. Cryptographic Algorithm Based on Combination of Logistic and Hyperchaos [J]. Computer Science, 2019, 46(11A): 477-482.
[13] ZHAO Fang-zheng, LI Cheng-hai, LIU Chen, SONG Ya-fei. Security Analysis and Optimization of Hyper-chaotic Color Image Encryption Algorithm [J]. Computer Science, 2019, 46(11A): 483-487.
[14] WANG Song-wei, CHEN Jian-hua. Chaotic Mapping Asynchronous Authentication Key Agreement Scheme with Smart-cards [J]. Computer Science, 2019, 46(1): 175-181.
[15] LIU Gang, ZHANG Jing, LI Yue-long. Extraction of Palm Vein ROI Based on Maximal Inscribed Circle Algorithm [J]. Computer Science, 2018, 45(8): 264-267.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!