Computer Science ›› 2023, Vol. 50 ›› Issue (6A): 220200121-6.doi: 10.11896/jsjkx.220200121

• Information Security • Previous Articles     Next Articles

Image Compression and Encryption Based on Compressive Sensing and Hyperchaotic System

PAN Tao1, TONG Xiaojun1, ZHANG Miao1, WANG Zhu2   

  1. 1 School of Computer Science and Technology,Harbin Institute of Technology,Weihai,Shandong 264209,China;
    2 School of information science and Engineering,Harbin Institute of Technology,Weihai,Shandong 264209,China
  • Online:2023-06-10 Published:2023-06-12
  • About author:PAN Tao,born in 2000,postgraduate.His main research interests include information security and so on. TONG Xiaojun,born in 1963,professor,Ph.D supervisor.Her main research interests include information security and so on.
  • Supported by:
    National Natural Science Foundation of China(61902091) and Natural Science Foundation of Shandong Province,China(ZR2019MF054).

Abstract: In medical,military,financial systems and other scenarios where important images need to be transmitted,image compression and encryption is a feasible and effective way to transmit images safely and efficiently.Image compression and transmission can reduce the transmission overhead.Compressed images can be encrypted to make images more secure,and ordinary people can not get key information from them.After encryption,it can also resist some attacks means to ensure the security of information.Based on the compression perception theory,sparse sampling can be completed,and images can be compressed to any scale.Hyperchaotic system can guarantee the security of the system.Chaotic characteristics such as Lyapunov exponents of hyperchao-tic system are also analyzed.It is proved that the system is chaotic and safe enough.Chaotic sequences generated by hyperchaotic system are also used to construct measurement matrix.This eliminates the need to transfer a matrix with large text during transmission,but only the key.On the basis of compression theory,scrambling diffusion operation is also used,and diffusion operation related to plain text is used,which greatly improves image security and ensures data security.Experiments show that the image is compressed and encrypted well,the key space is large,the key is sensitive enough,the cipher histogram is distributed evenly,the cipher information entropy is close to the theoretical value,and the correlation between cipher images is low,which shows that it can resist many common attacks such as violent attacks and statistical attacks.At the same time,the decrypted image restored under normal compression ratio has a small visual gap with the original image,even if the compression ratio is small,most of the information content of the image can be seen,which indicates that the algorithm has a good reconstruction quality and high security.

Key words: Chaotic system, Compressed sensing, Compression encryption, Visual safety, Image security

CLC Number: 

  • TP309.7
[1]ZHANG B,XIAO D,XIANG Y.Robust Coding of EncryptedImages via 2D Compressed Sensing[J].IEEE Transactions on Multimedia,2020,23:2656-2671.
[2]CHAI X,BI J,GAN Z,et al.Color image compression and encryption scheme based on compressive sensing and double random encryption strategy[J].Signal Processing,2020,176:107684.
[3]WANG X,CHANG C,LIN C.Adaptive reversible data hidingscheme for AMBTC compressed images[J].Multimedia Tools and Applications,2020,79:6547-6568.
[4]LIU X,MEI W,DU H.Optical image encryption based on compressive sensing and chaos in the fractional Fourier domain[J].Journal of Modern Optics,2014,61:1570-1577.
[5]LU P,XU Z,LU X,et al.Digital image information encryption based on Compressive Sensing and double random-phase encoding technique[J].Optik,2013,124(16):2514-2518.
[6]HUANG R,RHEE K H,UCHIDA S.A parallel image encryption method based on compressive sensing[J].Multimed Tools Application,2014,72:71-93.
[7]CHEN G,UETA T.Yet Another Chaotic Attractor[J].International Journal of Bifurcation and Chaos,1999,9(7):1465-1466.
[8]DONOHO D L.Compressive sensing[J].IEEE Trans.Inform.Theory,2006,52(4):1289-1306.
[9]CANDÈS E J,TAO T.Near optimal signal recovery from random projections:universal encoding strategies[J].IEEE Trans.Inform.Theory,2006(52):5406-5425.
[10]CANDÈS E J.Compressive sampling[C]//Proceedings of the International Congress of Mathematicians Madrid.Spain,2006:1433-1452.
[11]CHAI X,WU H,GAN Z,et al.Nixon.An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding[J].Optics and Lasers in Engineering,2020,124:105837.
[12]CHAI X,ZHENG X,GAN Z,et al.An image encryption algorithm based on chaotic system and compressive sensing[J].Signal Processing,2020,124:105837.
[13]XU Q,SUN K,CAO C,et al.A fast image encryption algorithm based on compressive sensing and hyperchaotic map[J].Optics and Lasers in Engineering,2019,121:203-214.
[14]CHAI X,ZHENG X,GAN Z,et al.An image encryption algorithm based on chaotic system and compressive sensing[J].Signal Processing,2018,148:124-144.
[15]ZHOU N,ZHANG A,WU J,et al.Novel hybrid image compression-encryption algorithm based on compressive sensing[J].Optik,2014,125(18):5075-5080.
[16]LIU H,WANG X,KADIR A,et al.Color image encryption using Choquet fuzzy integral and hyper chaotic system[J].Optik,2013,124(18):3527-3533.
[1] REN Bing, GUO Yan, LI Ning, LIU Cuntao. Method for Correlation Data Imputation Based on Compressed Sensing [J]. Computer Science, 2023, 50(7): 82-88.
[2] WANG Zhenbiao, QIN Yali, WANG Rongfang, ZHENG Huan. Image Compressed Sensing Attention Neural Network Based on Residual Feature Aggregation [J]. Computer Science, 2023, 50(4): 117-124.
[3] ZHAO Geng, LI Wen-jian, MA Ying-jie. Chaotic Sequence Cipher Algorithm Based on Discrete Anti-control [J]. Computer Science, 2022, 49(4): 376-384.
[4] PAN Ze-min, QIN Ya-li, ZHENG Huan, WANG Rong-fang, REN Hong-liang. Block-based Compressed Sensing of Image Reconstruction Based on Deep Neural Network [J]. Computer Science, 2022, 49(11A): 210900118-9.
[5] LIU Yu-hong,LIU Shu-ying,FU Fu-xiang. Optimization of Compressed Sensing Reconstruction Algorithms Based on Convolutional Neural Network [J]. Computer Science, 2020, 47(3): 143-148.
[6] WU Xue-lin, ZHU Rong, GUO Ying. Ghost Imaging Reconstruction Algorithm Based on Block Sparse Bayesian Model [J]. Computer Science, 2020, 47(11A): 188-191.
[7] HOU Ming-xing,QI Hui,HUANG Bin-ke. Data Abnormality Processing in Wireless Sensor Networks Based on Distributed Compressed Sensing [J]. Computer Science, 2020, 47(1): 276-280.
[8] LI Xiu-qin, WANG Tian-jing, BAI Guang-wei, SHEN Hang. Two-phase Multi-target Localization Algorithm Based on Compressed Sensing [J]. Computer Science, 2019, 46(5): 50-56.
[9] YAN Bo, HE Shao-bo. Dynamics and Complexity Analysis of Fractional-order Unified Chaotic System [J]. Computer Science, 2019, 46(11A): 539-543.
[10] HOU Pei-guo, WANG Zhi-xuan, YAN Chen. Improvement of Anti-collision Algorithm Based on RFID Tag [J]. Computer Science, 2019, 46(11A): 359-362.
[11] WANG Li-juan, LI Guo-dong, LV Dong-mei. Chaotic System Image Encryption Algorithm Based on Dynamic Parameter Control [J]. Computer Science, 2019, 46(11A): 469-472.
[12] ZHAO Fang-zheng, LI Cheng-hai, LIU Chen, SONG Ya-fei. Security Analysis and Optimization of Hyper-chaotic Color Image Encryption Algorithm [J]. Computer Science, 2019, 46(11A): 483-487.
[13] WANG Peng-fei, ZHANG Hang. Sub-sampling Signal Reconstruction Based on Principal Component Under Underdetermined Conditions [J]. Computer Science, 2019, 46(10): 103-108.
[14] DU Xiu-li, HU Xing, CHEN Bo, QIU Shao-ming. Multi-hypothesis Reconstruction Algorithm of DCVS Based on Weighted Non-local Similarity [J]. Computer Science, 2019, 46(1): 291-296.
[15] HENG Yang, CHEN Feng, XU Jian-feng, TANG Min. Application Status and Development Trends of Cardiac Magnetic Resonance Fast Imaging Based on Compressed Sensing Theory [J]. Computer Science, 2019, 46(1): 36-44.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!