Region of interest encryption algorithm for images based on lifting scheme and object detection

被引:1
作者
Wang, Lujie [1 ]
Chen, Zhong [1 ,2 ]
Sun, Xiyu [1 ]
He, Chenchen [1 ]
机构
[1] Hengyang Normal Univ, Coll Comp Sci & Technol, Hengyang 421002, Hunan, Peoples R China
[2] Hunan Prov Key Lab Intelligent Informat Proc & App, Hengyang 421002, Hunan, Peoples R China
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2025年 / 28卷 / 01期
关键词
Image encryption; Region of interest; Lifting scheme; Chaos; NMS; Object detection; STEGANOGRAPHY METHOD;
D O I
10.1007/s10586-024-04746-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securing image transmissions has become critical as the demand for image sharing and storage grows. In some commercial uses, in order to achieve a balance between encryption security and efficiency, some researchers have tried to encrypt only the region of interest of the user in the image. In order to accurately encrypt region of interest images, this paper proposed a region of interest image encryption algorithm based on lifting scheme and object detection. The algorithm automatically identifies the region of interest in the image and encrypts it securely and effectively. Firstly, the region of interest in the image is detected using the object detection model, and the non-maximum suppression algorithm is modified to solve the problem that the detection box outputted by the object detection model does not completely contain the region of interest. Then the existing pixel extraction method for region of interest images is improved to extract the pixels from the region of interest images at a faster speed, which improves the overall efficiency of the algorithm. Finally, based on the thought of wavelet lifting transform, combined with chaotic system, a two-layer hybrid lifting scheme encryption algorithm is proposed to encrypt the extracted pixels. Experimental results and security analysis show that the algorithm proposed in this paper can effectively protect all objects at once with high security.
引用
收藏
页数:20
相关论文
共 52 条
[1]  
Abdel Hameed M., 2024, Aswan Univ. J. Sci. Technol, V4, P1
[2]  
[Anonymous], 1999, A wavelet tour of signal processing
[3]   Cy: Chaotic yolo for user intended image encryption and sharing in social media [J].
Asgari-Chenaghlu, Meysam ;
Feizi-Derakhshi, Mohammad-Reza ;
Nikzad-Khasmakhi, Narjes ;
Feizi-Derakhshi, Ali-Reza ;
Ramezani, Majid ;
Jahanbakhsh-Nagadeh, Zoleikha ;
Rahkar-Farshi, Taymaz ;
Zafarani-Moattar, Elnaz ;
Ranjbar-Khadivi, Mehrdad ;
Balafar, Mohammad-Ali .
INFORMATION SCIENCES, 2021, 542 :212-227
[4]   A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation [J].
Ben Farah, M. A. ;
Guesmi, R. ;
Kachouri, A. ;
Samet, M. .
OPTICS AND LASER TECHNOLOGY, 2020, 121
[5]   Soft-NMS - Improving Object Detection With One Line of Code [J].
Bodla, Navaneeth ;
Singh, Bharat ;
Chellappa, Rama ;
Davis, Larry S. .
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2017, :5562-5570
[6]   An image encryption scheme based on a modified AES algorithm by using a variable S-box [J].
Brahim, A. Hadj ;
Pacha, A. Ali ;
Said, N. Hadj .
JOURNAL OF OPTICS-INDIA, 2024, 53 (02) :1170-1185
[7]   Region of Interest Encryption Based on Novel 2D Hyperchaotic Signal and Bagua Coding Algorithm [J].
Chen, Tze-Han ;
Yang, Cheng-Hsiung .
IEEE ACCESS, 2022, 10 :82751-82765
[8]  
Dai JF, 2016, ADV NEUR IN, V29
[9]  
Ge Z, 2021, Arxiv, DOI [arXiv:2107.08430, DOI 10.48550/ARXIV.2107.08430]
[10]  
Hameed M.A., 2023, 2023 3 INT C COMP IN, P465