×

Chaotic image encryption of regions of interest. (English) Zbl 1349.94138

Summary: Since different regions of an image have different importance, therefore only the important information of the image regions, which the users are really interested in, needs to be encrypted and protected emphatically in some special multimedia applications. However, the regions of interest (ROI) are always some irregular parts, such as the face and the eyes. Assuming the bulk data in transmission without being damaged, we propose a chaotic image encryption algorithm for ROI. ROI with irregular shapes are chosen and detected arbitrarily. Then the chaos-based image encryption algorithm with scrambling, S-box and diffusion parts is used to encrypt the ROI. Further, the whole image is compressed with Huffman coding. At last, a message authentication code (MAC) of the compressed image is generated based on chaotic maps. The simulation results show that the encryption algorithm has a good security level and can resist various attacks. Moreover, the compression method improves the storage and transmission efficiency to some extent, and the MAC ensures the integrity of the transmission data.

MSC:

94A60 Cryptography
94A24 Coding theorems (Shannon theory)
94A08 Image processing (compression, reconstruction, etc.) in information and communication theory
Full Text: DOI

References:

[1] Anees, A., Siddiqui, A. M. & Ahmed, F. [2014] ” Chaotic substitution for highly autocorrelated data in encryption algorithm,” Commun. Nonlin. Sci. Numer. Simulat.19, 3106-3118. genRefLink(16, ’S0218127416501935BIB001’, ’10.1016
[2] Cheng, H. & Li, X. [2000] ” Partial encryption of compressed images and videos,” IEEE Trans. Sign. Process.48, 2439-2451. genRefLink(16, ’S0218127416501935BIB002’, ’10.1109
[3] Cui, L. & Cao, Y. [2007] ” A new S-box structure named affine-power-affine,” Int. J. Innov. Comput. Inform. Contr.3, 751-759.
[4] Daemen, J. & Rijmen, V. [2013] The Design of Rijndael: AES-the Advanced Encryption Standard (Springer Science & Business Media). · Zbl 1065.94005
[5] Deng, Y., Hu, H., Xiong, N., Xiong, W. & Liu, L. [2015a] ” A general hybrid model for chaos robust synchronization and degradation reduction,” Inform. Sci.305, 146-164. genRefLink(16, ’S0218127416501935BIB005’, ’10.1016 · Zbl 1360.93022
[6] Deng, Y., Hu, H., Xiong, W., Xiong, N. N. & Liu, L. [2015b] ” Analysis and design of digital chaotic systems with desirable performance via feedback control,” IEEE Trans. Syst. Man Cybern. Syst.45, 1187-1200. genRefLink(16, ’S0218127416501935BIB006’, ’10.1109
[7] Fridrich, J. [1998] ” Symmetric ciphers based on two-dimensional chaotic maps,” Int. J. Bifurcation and Chaos8, 1259-1284. [Abstract] genRefLink(128, ’S0218127416501935BIB007’, ’000077123200012’); · Zbl 0935.94019
[8] Li, C., Liu, Y., Zhang, L. Y. & Chen, M. Z. [2013] ” Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation,” Int. J. Bifurcation and Chaos23, 1350075-1-12. [Abstract] genRefLink(128, ’S0218127416501935BIB008’, ’000319129000020’); · Zbl 1270.94056
[9] Liu, H. & Wang, X. [2010] ” Color image encryption based on one-time keys and robust chaotic maps,” Comput. Math. Appl.59, 3320-3327. genRefLink(16, ’S0218127416501935BIB009’, ’10.1016 · Zbl 1198.94109
[10] Liu, H. & Wang, X. [2011] ” Color image encryption using spatial bit-level permutation and high-dimension chaotic system,” Opt. Commun.284, 3895-3903. genRefLink(16, ’S0218127416501935BIB010’, ’10.1016
[11] Lui, O.-Y., Wong, K.-W., Chen, J. & Zhou, J. [2012] ” Chaos-based joint compression and encryption algorithm for generating variable length ciphertext,” Appl. Soft Comput.12, 125-132. genRefLink(16, ’S0218127416501935BIB011’, ’10.1016
[12] Ntalianis, K. S. & Kollias, S. D. [2005] ” Chaotic video objects encryption based on mixed feedback, multiresolution decomposition and time-variant S-boxes,” Proc. IEEE Int. Conf. Image Process. (ICIP) (IEEE), pp. II-1110.
[13] Paraskevi, T., Klimis, N. & Stefanos, K. [2004] ” Security of human video objects by incorporating a chaos-based feedback cryptographic scheme,” Proc. 12th Ann. ACM Int. Conf. Multimed. (ACM), pp. 352-355.
[14] Taneja, N., Raman, B. & Gupta, I. [2012] ” Combinational domain encryption for still visual data,” Multimed. Tools Appl.59, 775-793. genRefLink(16, ’S0218127416501935BIB014’, ’10.1007
[15] Tran, M. T., Bui, D. K. & Duong, A. D. [2008] ” Gray S-box for advanced encryption standard,” Proc. Int. Conf. Comput. Intell. Security (CIS) (IEEE), pp. 253-258.
[16] Wang, X.-Y., Yang, L., Liu, R. & Kadir, A. [2010] ” A chaotic image encryption algorithm based on perceptron model,” Nonlin. Dyn.62, 615-621. genRefLink(16, ’S0218127416501935BIB016’, ’10.1007
[17] Wang, X., Zhang, W., Guo, W. & Zhang, J. [2013] ” Secure chaotic system with application to chaotic ciphers,” Inform. Sci.221, 555-570. genRefLink(16, ’S0218127416501935BIB017’, ’10.1016 · Zbl 1293.94098
[18] Wang, Y., Lei, P. & Wong, K.-W. [2015] ” A method for constructing bijective S-box with high nonlinearity based on chaos and optimization,” Int. J. Bifurcation and Chaos25, 1550127-1-15. [Abstract] genRefLink(128, ’S0218127416501935BIB018’, ’000361916800006’); · Zbl 1326.94119
[19] Xiao, D. & Xie, Y. J. [2013] ” A joint compression and encryption scheme for color JPEG image,” Acta Phys. Sin.-Chin. Ed.62, 1706-1721. genRefLink(128, ’S0218127416501935BIB019’, ’000329040100009’);
[20] Zhang, Y., Xiao, D., Shu, Y. & Li, J. [2013a] ” A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations,” Sign. Process.-Imag.28, 292-300. genRefLink(16, ’S0218127416501935BIB020’, ’10.1016
[21] Zhang, Y., Xiao, D., Wen, W. & Tian, Y. [2013b] ” Edge-based lightweight image encryption using chaos-based reversible hidden transform and multiple-order discrete fractional cosine transform,” Opt. Laser Technol.54, 1-6. genRefLink(16, ’S0218127416501935BIB021’, ’10.1016
[22] Zhang, Y.-Q. & Wang, X.-Y. [2014] ” A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice,” Inform. Sci.273, 329-351. genRefLink(16, ’S0218127416501935BIB022’, ’10.1016
[23] Zhang, Y., Xiao, D., Liu, H. & Nan, H. [2014] ” GLS coding based security solution to JPEG with the structure of aggregated compression and encryption,” Commun. Nonlin. Sci. Numer. Simulat.19, 1366-1374. genRefLink(16, ’S0218127416501935BIB023’, ’10.1016
[24] Zhou, Y., Bao, L. & Chen, C. P. [2014a] ” A new 1D chaotic system for image encryption,” Sign. Process.97, 172-182. genRefLink(16, ’S0218127416501935BIB024’, ’10.1016
[25] Zhou, Y., Hua, Z., Pun, C. M. & Philip Chen, C. L. [2014b] ” Cascade chaotic system with applications,” IEEE Trans. Cybern.45, 2001-2012. genRefLink(16, ’S0218127416501935BIB025’, ’10.1109
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.