×

Privacy-aware image encryption based on logistic map and data hiding. (English) Zbl 1367.94348

Summary: The increasing need for image communication and storage has created a great necessity for securely transforming and storing images over a network. Whereas traditional image encryption algorithms usually consider the security of the whole plain image, region of interest (ROI) encryption schemes, which are of great importance in practical applications, protect the privacy regions of plain images. Existing ROI encryption schemes usually adopt approximate techniques to detect the privacy region and measure the quality of encrypted images; however, their performance is usually inconsistent with a human visual system (HVS) and is sensitive to statistical attacks. In this paper, we propose a novel privacy-aware ROI image encryption (PRIE) scheme based on logistical mapping and data hiding. The proposed scheme utilizes salient object detection to automatically, adaptively and accurately detect the privacy region of a given plain image. After private pixels have been encrypted using chaotic cryptography, the significant bits are embedded into the nonprivacy region of the plain image using data hiding. Extensive experiments are conducted to illustrate the consistency between our automatic ROI detection and HVS. Our experimental results also demonstrate that the proposed scheme exhibits satisfactory security performance.

MSC:

94A60 Cryptography
68P25 Data encryption (aspects in computer science)
37E05 Dynamical systems involving maps of the interval
Full Text: DOI

References:

[1] Arroyo, D., Hernandez, F. & Orue, A. B. [2017] “ Cryptanalysis of a classical chaos-based cryptosystem with some quantum cryptography features,” Int. J. Bifurcation and Chaos27, 1750004-1-12. · Zbl 1358.94055
[2] Borji, A., Cheng, M.-M., Jiang, H. & Li, J. [2015] “ Salient object detection: A benchmark,” IEEE Trans. Imag. Process.24, 5706-5722. · Zbl 1408.94882
[3] Cheddad, A., Condell, J., Curran, K. & Kevitt, P. M. [2010] “ Digital image steganography: Survey and analysis of current methods,” Sign. Process.90, 727-752. · Zbl 1177.94138
[4] Chen, G., Mao, Y. & Chui, C. K. [2004] “ A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos Solit. Fract.21, 749-761. · Zbl 1049.94009
[5] Ge, X., Lu, B., Liu, F. & Gong, D. [2016] “ An image encryption algorithm based on information hiding,” Int. J. Bifurcation and Chaos26, 1650192-1-14. · Zbl 1349.94123
[6] Hao, F., Clarke, D. & Zorzo, A. F. [2016] “ Deleting secret data with public verifiability,” IEEE Trans. Depend. Secure Comput.13, 617-629.
[7] Hirsch, M. W., Smale, S. & Devaney, R. L. [2012] Differential Equations, Dynamical Systems, and an Introduction to Chaos (Academic Press). · Zbl 1239.37001
[8] Itti, L., Koch, C. & Niebur, E. [1998] “ A model of saliency-based visual attention for rapid scene analysis,” IEEE Trans. Patt. Anal. Mach. Intell.20, 1254-1259.
[9] Itti, L. & Koch, C. [2001] “ Computational modeling of visual attention,” Nat. Rev. Neurosci.2, 194-203.
[10] Ji, W. Y. & Kim, H. [2010] “ An image encryption scheme with a pseudorandom permutation based on chaotic maps,” Commun. Nonlin. Sci. Numer. Simul.15, 3998-4006. · Zbl 1222.94041
[11] Jiang, H., Wang, J., Yuan, Z., Wu, Y., Zheng, N. & Li, S. [2013] “ Salient object detection: A discriminative regional feature integration approach, IEEE Conf. Computer Vision and Pattern Recognition (CPVR), pp. 2083-2090.
[12] Khashan, O. A., Zin, A. M. & Sundararajan, E. A. [2014] “ Performance study of selective encryption in comparison to full encryption for still visual images,” J. Zhejiang Univ. Sci. C15, 435-444.
[13] Kocarev, L. [2001] “Chaos-based cryptography: A brief overview,” IEEE Circuits Syst. Mag.1, 6-21.
[14] Li, S., Li, C., Lo, K.-T. & Chen, G. [2008] “ Cryptanalysis of an image scrambling scheme without bandwidth expansion,” IEEE Trans. Circuits Syst. Vid. Technol.18, 338-349.
[15] Li, C., Liu, Y., Zhang, L. Y. & Chen, M. Z. Q. [2013] “ Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation,” Int. J. Bifurcation and Chaos23, 1350075-1-12. · Zbl 1270.94056
[16] Li, C., Liu, Y., Zhang, L. Y. & Wong, K.-W. [2014a] “ Cryptanalyzing a class of image encryption schemes based on Chinese Remainder Theorem,” Sign. Process.: Imag. Commun.29, 914-920.
[17] Li, C., Xie, T., Liu, Q. & Cheng, G. [2014b] “ Cryptanalyzing image encryption using chaotic logistic map,” Nonlin. Dyn.78, 1545-1551.
[18] Li, X., Wang, L., Yan, Y. & Liu, P. [2015] “ An improvement color image encryption algorithm based on DNA operations and real and complex chaotic systems,” Optik — Int. J. Light and Electron Opt.127, 2558-2565.
[19] Li, C. [2016] “ Cracking a hierarchical chaotic image encryption algorithm based on permutation,” Sign. Process.118, 203-210.
[20] Liao, X., Wen, Q.-Y. & Zhang, J. [2011] “ A steganographic method for digital images with four-pixel differencing and modified LSB substitution,” J. Vis. Commun. Image Represent.22, 1-8.
[21] Liu, J.-L. [2006] “ Efficient selective encryption for JPEG 2000 images using private initial table,” Patt. Recogn.39, 1509-1517. · Zbl 1095.68728
[22] Liu, Z., Zou, W. & Meur, O. L. [2014] “ Saliency tree: A novel saliency detection framework,” IEEE Trans. Imag. Process.23, 1937-1952. · Zbl 1374.94669
[23] Mahmood, A. B. & Dony, R. D. [2011] “ Segmentation based encryption method for medical images, Int. Conf. Internet Technology and Secured Transactions (ICITST), pp. 596-601.
[24] Mahmood, A., Dony, R. & Areibi, S. [2013] “ An adaptive encryption based genetic algorithms for medical images, IEEE Int. Workshop on Machine Learning for Signal Processing, pp. 1-6.
[25] Massoudi, A., Lefebvre, F., Vleeschouwer, C. D., Macq, B. & Quisquater, J. J. [2008] “ Overview on selective encryption of image and video: Challenges and perspectives,” EURASIP J. Inform. Secur.2008, 1-18.
[26] Mehta, G., Dutta, M. K., Travieso-González, C. M. & Kim, P. S. [2014] “ Edge based selective encryption scheme for biometric data using chaotic theory, Int. Conf. Contemporary Computing and Informatics (IC3I), pp. 383-386.
[27] Ou, Y., Sur, C. & Rhee, K. H. [2007] “ Region-based selective encryption for medical imaging, Int. Workshop on Frontiers in Algorithmics (FAW), pp. 62-73.
[28] Peng, F., Zhu, X.-W. & Long, M. [2013] “ An ROI privacy protection scheme for H.264 video based on FMO and chaos,” IEEE Trans. Inform. Forens. Secur.8, 1688-1699.
[29] Persohn, K. & Povinelli, R. J. [2012] “ Analyzing logistic map pseudorandom number generators for periodicity induced by finite precision floating-point representation,” Chaos Solit. Fract.45, 238-245.
[30] Sanchez, V., Basu, A. & Mandal, M. K. [2004] “ Prioritized region of interest coding in JPEG2000,” IEEE Trans. Circuits Syst. Vid. Technol.14, 1149-1155.
[31] Shahid, Z., Chaumont, M. & Puech, W. [2011] “ Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for I and P frames,” IEEE Trans. Circuits Syst. Vid. Technol.21, 565-576.
[32] Shakiba, A., Hooshmandas, M. R. & Meybodi, M. A. [2016] “ Cryptanalysis of multiplicative coupled cryptosystems based on the Chebyshev polynomials,” Int. J. Bifurcation and Chaos26, 1650112-1-11. · Zbl 1343.94081
[33] Sheikh, H. R., Wang, Z., Cormack, L. & Bovik, A. C. [2005] “LIVE image quality assessment database, http://live.ece.utexas.edu/research/quality/subjective.htm.
[34] Sheikh, H. R., Sabir, M. F. & Bovik, A. C. [2006] “ A statistical evaluation of recent full reference image quality assessment algorithms,” IEEE Trans. Imag. Process.15, 3441-3452.
[35] Subhedar, M. S. & Mankar, V. H. [2014] “ Current status and key issues in image steganography: A survey,” Comput. Sci. Rev.13, 95-113. · Zbl 1301.94130
[36] VanSchyndel, R. G., Tirkel, A. Z. & Osborne, C. F. [1994] “ A digital watermark,” IEEE Int. Conf. Image Processing (ICIP), pp. 86-90.
[37] Walton, S. [1995] “ Image authentication for a slippery new age,” Dr Dobb’s J. Software Tools for the Professional Programmer20, 18-27.
[38] Wang, Q., Yu, S., Li, C., Lü, J., Fang, X., Guyeux, C. & Bahi, J. M. [2016a] “Theoretical design and FPGA-based implementation of higher-dimensional digital chaotic systems,” IEEE Trans. Circuits Syst.-I: Reg. Papers63, 401-412. · Zbl 1469.94118
[39] Wang, X., Liu, C. & Zhang, H. [2016b] “ An effective and fast image encryption algorithm based on chaos and interweaving of ranks,” Nonlin. Dyn.84, 1595-1607. · Zbl 1354.94049
[40] Wen, W., Zhang, Y., Fang, Z. & Chen, J. -X. [2015] “ Infrared target-based selective encryption by chaotic maps,” Opt. Commun.341, 131-139.
[41] Wen, W., Zhang, Y., Fang, Y. & Fang, Z. [2016] “ Image salient regions encryption for generating visually meaningful ciphertext image,” Neur. Comput. Appl.1-11.
[42] Wong, A. & Bishop, W. [2007] “ Backwards compatible, multi-level regions-of-interest (ROI) image encryption architecture with biometric authentication, Int. Conf. Signal Processing and Multimedia Applications (SIGMAP), pp. 324-329.
[43] Xiang, T., Guo, S. & Li, X. [2016] “ Perceptual visual security index based on edge and texture similarities,” IEEE Trans. Inform. Forens. Secur.11, 951-963.
[44] Xiao, D., Fu, Q., Xiang, T. & Zhang, Y. [2016] “ Chaotic image encryption of regions of interest,” Int. J. Bifurcation and Chaos26, 1650193-1-15. · Zbl 1349.94138
[45] Xie, E. Y., Li, C., Yu, S. & Lü, J. [2017] “ On the cryptanalysis of Fridrich’s chaotic image encryption scheme,” Sign. Process.132, 150-154.
[46] Zhang, L., Liao, X. & Wang, X. [2005] “ An image encryption approach based on chaotic maps,” Chaos Solit. Fract.24, 759-765. · Zbl 1083.94011
[47] Zhang, L. Y., Li, C., Wong, K. -W., Shu, S. & Chen, G. [2012a] “ Cryptanalyzing a chaos-based image encryption algorithm using alternate structure,” J. Syst. Softw.85, 2077-2085.
[48] Zhang, W., Wong, K.-W., Yu, H. & Zhu, Z.-L. [2012b] “ An image encryption scheme using lightweight bit-level confusion and cascade cross circular diffusion,” Opt. Commun.285, 2343-2354.
[49] Zhu, W., Liang, S., Wei, Y. & Sun, J. [2014] “ Saliency optimization from robust background detection, IEEE Conf. Computer Vision and Pattern Recognition (CVPR), pp. 2814-2821.
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.