A Secure and Efficient Optimized Image Encryption Using Block Compressive Sensing and Logistic Map Method

被引:0
作者
Abed, Qutaiba Kadhim [1 ]
Al-Jawher, Waleed Ameen Mahmoud [2 ]
机构
[1] Informatics Institute for Postgraduate Studies, Iraqi Commission for Computers and Informatics, Baghdad
[2] Uruk University, Baghdad
来源
Journal of Cyber Security and Mobility | 2024年 / 13卷 / 05期
关键词
BCS; Chen chaos system; COOT optimization algorithm; DWT; Logistic map;
D O I
10.13052/jcsm2245-1439.1358
中图分类号
学科分类号
摘要
Recently, multimedia has developed and become very important for transferring images securely through public networks. This paper uses the COOT optimization algorithm with compressive sensing (CS) for image encryption. A good method was proposed for encryption using compressive sensing with COOT optimization and chaos to encrypt images and obtain optimal encryption with the least correlation between pixels. This method will strengthen the encryption against various types of attacks. The natural image was sparsed using discreet wavelet transform (DWT) and the FAN transform. The image is divided into several blocks, and CS is applied to each block. The best measurement matrix was obtained using a COOT-optimized algorithm. All blocks are masked to get the compressed image, and the pixels are quantified. Next, the COOT optimization is used to Shuffle the image pixels to achieve the minimum correlation between the pixels. Then, a logistic map will be used to uniform the image pixel values by diffusion to get the final encrypted image. Chen’s chaotic and logistic map initial values are obtained from the input image after its division into four parts by taking a value from each part. The evaluation results obtained for this algorithm showed that it performs highly compared to other conventional methods. The average PSNR for the reconstructed images was 35.244, the average NPCR and UACI were 90.53 and 29.54, respectively, and the average correlation was (D = 0.0018, V = 0.0031, H = 0.0039). The results proved that the method is strong enough and very efficient to withstand attacks. © 2024 River Publishers.
引用
收藏
页码:983 / 1006
页数:23
相关论文
共 54 条
  • [1] Gao X., Image encryption algorithm based on 2D hyperchaotic map, Opt Laser Technol, 142, (2021)
  • [2] Li M., Lu D., Xiang Y., Zhang Y., Ren H., Cryptanalysis and improvement in a chaotic image cipher using two-round permutation and diffusion, Nonlinear Dyn, 96, pp. 31-47, (2019)
  • [3] Abed Q. K., Al-Jawher W. A. M., A Robust Image Encryption Scheme Based on Block Compressive Sensing and Wavelet Transform, International Journal of Innovative Computing, 13, 1–2, pp. 7-13, (2022)
  • [4] Chen J., Chen L., Zhou Y., Cryptanalysis of a DNA-based image encryption scheme, Inf Sci (N Y), 520, pp. 130-141, (2020)
  • [5] Song J., Lee Y. H., Optical image encryption using different twiddle factors in the butterfly algorithm of fast Fourier transform, Opt Commun, 485, (2021)
  • [6] Chen C., Sun K., He S., An improved image encryption algorithm with finite computing precision, Signal Processing, 168, (2020)
  • [7] Mahmoud W. A., Ibraheem I. K., Image denoising using stationary wavelet transform, Advances in Modelling and Analysis-B-, 46, 3, pp. 1b-18b, (2003)
  • [8] Al-Heladi A. H. M., Mahmmoud W. A., Hali H. A., Fadhel A. F., Multispectral Image Fusion using Walidlet Transform, Advances in Modelling and Analysis B, 52, 1–2, pp. 1-20, (2009)
  • [9] Mahmoud W. A., Rasheed A. L. M., 3D Image Denoising by Using 3D Multiwavelet, AL-Mustansiriya J. Sci, 21, 7, pp. 108-136, (2010)
  • [10] Mahmoud W. A., Shaker M. R., 3D Ear Print Authentication using 3D Radon Transform, 2006 2nd International Conference on Information & Communication Technologies, pp. 1052-1056, (2006)