Image Encryption Technology Based on Fractal Image Compression Algorithm

被引:0
作者
Yu J. [1 ]
机构
[1] School of Computer Engineering, Shangqiu Polytechnic, Shangqiu
来源
Journal of Cyber Security and Mobility | 2024年 / 13卷 / 02期
关键词
Arnold transformation; fractal; fractal image compression; Frobenius canonical form; Knight’s tour;
D O I
10.13052/jcsm2245-1439.1325
中图分类号
学科分类号
摘要
As the most commonly used information transmission method, digital images often store a large amount of personal information. To prevent information leakage, encrypting images is essential. Common image encryption techniques suffer from certain limitations, such as overly simple encryption methods and long encryption times. In response to the above issues, this study proposes the Frobenius canonical form image encryption scheme. It calculates the fractal code through the fractal compression algorithm and to encrypt the image, it adjusts the brightness coefficient in the fractal code. To address unsatisfactory correlation coefficients in encrypted images, the Frobenius canonical form image encryption is improved by introducing the Arnold transformation encryption, which combines the two methods to reduce correlation coefficients. Finally, the knight tour algorithm is put forward. In response to the long image scrambling time in the knight tour algorithm, the Tetragonal theorem is combined with the scheme to encrypt the image. It is then re-encrypted using the Frobenius canonical form. The experimental findings illustrate that when using Frobenius canonical form, Arnold transformation combined with Frobenius canonical form, and the tetragonal algorithm combined with knight tour algorithm to encrypt Lena images, the three decryption methods correspond to image similarity of over 70%, over 80%, and over 90%, respectively. Combining the tetragonal algorithm and the knight tour algorithm can significantly increase the security of image encryption. © 2024 River Publishers.
引用
收藏
页码:283 / 304
页数:21
相关论文
共 20 条
[1]  
Kaur G, Agarwal R, Patidar V., Color image encryption scheme based on fractional Hartley transform and chaotic substitution-permutation, The visual computer, 38, 3, pp. 1027-1050, (2022)
[2]  
Guo L, Du H, Huang D., A quantum image encryption algorithm based on the Feistel structure, Quantum Information Processing, 21, 1, pp. 20-37, (2021)
[3]  
Peng X, Zeng Y., Image encryption application in a system for compounding self-excited and hidden attractors, Chaos Solitons & Fractals, 139, 6, pp. 1144-1159, (2020)
[4]  
Boussif Mohamed, Aloui Noureddine, Cherif Adnene, Boussif M, Aloui N, Chrif A., Securing DICOM Images by a New Encryption Algorithm Using Arnold Transform and Vigenère Cipher, IET Image Processing, 14, 6, pp. 1209-1216, (2020)
[5]  
Wang X, Gao S., Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network, Information Sciences, 539, 9, pp. 195-214, (2020)
[6]  
Jain K, Aji A, Krishnan P., Medical Image Encryption Scheme Using Multiple Chaotic Maps, Pattern recognition letters, 152, 12, pp. 356-364, (2021)
[7]  
Zarebnia M, Pakmanesh H, Parvaz R., A fast multiple-image encryption algorithm based on hybrid chaotic systems for gray scale images – ScienceDirect, Optik, 179, 3, pp. 761-773, (2019)
[8]  
Hu W, Dong Y., Quantum color image encryption based on a novel 3D chaotic system, Journal of Applied Physics, 11, 131, pp. 1142-1155, (2022)
[9]  
Huang H, Yang S, Ye R., An efficient symmetric image encryption by using a novel 2D chaotic system, IET Image Processing, 14, 6, pp. 1157-1163, (2020)
[10]  
Nie Z, Liu Z X, He X T, Gong L H., Image compression and encryption algorithm based on advanced encryption standard and hyper-chaotic system, Optica Applicata, 49, 4, pp. 545-558, (2019)