Visually meaningful image encryption for secure and authenticated data transmission using chaotic maps

被引:0
|
作者
Singh, Deep [1 ]
Kumar, Sandeep [1 ]
Verma, Chaman [2 ]
Illes, Zoltan [2 ]
Kumar, Neerendra [3 ]
机构
[1] Cent Univ Punjab, Dept Math & Stat, Bathinda 151401, Punjab, India
[2] Eotv Lorand Univ, Dept Media & Educ Informat, H-1053 Budapest, Hungary
[3] Cent Univ Jammu, Dept Comp Sci & IT, Jammu 181143, India
关键词
Image encryption; Digital signature; LWT embedding; Chaotic maps; VMEI; ALGORITHM; DNA; CRYPTOSYSTEM;
D O I
10.1016/j.jksuci.2024.102235
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image ciphering techniques usually transform a given plain image data into a cipher image data resembling noise, serving as an indicator of the presence of secret image data. However, the transmission of such noise-like images could draw attention, thereby attracting the attackers and may face several possible attacks. This paper presents an approach for generating a visually meaningful image encryption (VMIE) scheme that combines three layers of security protection: encryption, digital signature, and steganography. The present scheme is dedicated to achieving a balanced performance in robustness, security and operational efficiency. First, the original image is partially encrypted by using the RSA cryptosystem and modified H & eacute;non map (MHM). In the second stage, a digital signature is generated for the partially encrypted image by employing a hash function and the RSA cryptosystem. The obtained digital signature is appended to the partially encrypted image produced after implementing the zigzag confusion in the above partially encrypted image. Further, to achieve better confusion and diffusion, the partially encrypted image containing a digital signature undergoes through the application of 3D Arnold cat map ( AR no times), to produce the secret encrypted image ( S r 5 ) . To ensure the security and robustness of the proposed technique against various classical attacks, the hash value obtained from the SHA-256 hash function and carrier images is utilized to generate the initial conditions Mh10 and Mh20 for modified Henon map, and initial position Z ip = ( z row , z col ) for zigzag confusion. In the proposed algorithm, the digital signature is utilized for both purposes to verify the sender's authenticity and to enhance the encryption quality. The carrier image undergoes lifting wavelet transformation, and its high-frequency components are utilized in the embedding process through a permuted pattern of MHM, resulting in a visually meaningful encrypted image. The proposed scheme achieves efficient visual encryption with minimal distortion and ensures lossless image quality upon decryption (infinite PSNR), balancing high level of security along with a good computational efficiency.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Genetic Algorithm and Chaotic Maps based Visually Meaningful Image Encryption
    Vanamala, H. R.
    Nandur, Deeksha
    PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 892 - 896
  • [2] Visually meaningful image encryption using data hiding and chaotic compressive sensing
    Ponuma, R.
    Amutha, R.
    Aparna, S.
    Gopal, Gayatri
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (18) : 25707 - 25729
  • [3] Visually meaningful image encryption using data hiding and chaotic compressive sensing
    R. Ponuma
    R. Amutha
    S. Aparna
    Gayatri Gopal
    Multimedia Tools and Applications, 2019, 78 : 25707 - 25729
  • [4] A Meaningful Visually Secure Image Encryption Scheme
    Fu, Jie
    Ping, Ping
    Gao, Zeyu
    Mao, Yingchi
    2019 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2019), 2019, : 199 - 204
  • [5] A Novel Image Encryption Scheme Using Chaotic Maps and Fuzzy Numbers for Secure Transmission of Information
    Mfungo, Dani Elias
    Fu, Xianping
    Xian, Yongjin
    Wang, Xingyuan
    APPLIED SCIENCES-BASEL, 2023, 13 (12):
  • [6] Visually Meaningful Image Encryption
    Arunkumar, S.
    Senthilselvan, N.
    Jangiti, Saikishor
    RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2016, 7 (06): : 128 - 135
  • [7] An authenticated image encryption scheme based on chaotic maps and memory cellular automata
    Bakhshandeh, Atieh
    Eslami, Ziba
    OPTICS AND LASERS IN ENGINEERING, 2013, 51 (06) : 665 - 673
  • [8] Image Encryption Using Chaotic Maps: A Survey
    Sankpal, Priya R.
    Vijaya, P. A.
    2014 FIFTH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING (ICSIP 2014), 2014, : 102 - 107
  • [9] Image Encryption Using Camellia and Chaotic Maps
    Elpeltagy, Marwa S.
    Abdelwahab, Moataz M.
    Sayed, Mohammed S.
    2015 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT), 2015, : 209 - 214
  • [10] An Efficient Visually Meaningful Image Encryption Using Arnold Transform
    Manikandan, V. M.
    Masilamani, V.
    PROCEEDINGS OF THE 2016 IEEE STUDENTS' TECHNOLOGY SYMPOSIUM (TECHSYM), 2016, : 266 - 271