CIE-LSCP: color image encryption scheme based on the lifting scheme and cross-component permutation

被引:14
作者
Chen, Xiuhui [1 ]
Gong, Mengxin [1 ]
Gan, Zhihua [2 ]
Lu, Yang [1 ]
Chai, Xiuli [1 ]
He, Xin [2 ]
机构
[1] Henan Univ, Sch Artificial Intelligence, Henan Key Lab Big Data Anal & Proc, Kaifeng 475004, Peoples R China
[2] Henan Univ, Inst Intelligent Network Syst, Sch Software, Intelligent Data Proc Engn Res Ctr Henan Prov, Kaifeng 475004, Peoples R China
基金
中国国家自然科学基金;
关键词
Color image encryption; Chaotic system; The lifting scheme; Cross-component permutation; Multi stochastic diffusion; SEMI-TENSOR PRODUCT; COUPLED MAP LATTICE; ALGORITHM; CHAOS; DNA; MATRIX;
D O I
10.1007/s40747-022-00835-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Encryption of meaningful images into unidentifiable noise-like images can improve the security of images during storage and transmission. In this paper, a novel color image encryption method based on the lifting scheme and cross-component permutation (CIE-LSCP) is introduced. First, original image is divided into red, green and blue components, and then the three components are processed by a preprocessing strategy based on the lifting scheme (PSLS) to change the statistical distribution of the pixels. Second, a block-based cross-component permutation based on index vectors (BCPIV) is presented to divide three preprocessed components into blocks and perform the cross-component permutation operation on them, and three random matrices are utilized to determine the target component, target block and target pixel position of the current pixel to be moved, respectively. Subsequently, a multi stochastic diffusion based on random sequences (MSDRS) is developed to alter the pixel values of the permutated components, and finally a ciphertext image is gotten by merging the three components. Moreover, the SHA256 hash values of the plaintext image are used to obtain the initial parameters of the chaotic system, and the obtained chaotic sequences are applied in the image encryption process. Wherein the generated random sequences are highly reliant on the plaintext image, making the encryption scheme resistant to both known-plaintext attacks and chosen-plaintext attacks. Experimental results demonstrate that the proposed scheme has good security and effectiveness and can be applied for secure transmission of digital images over the Internet.
引用
收藏
页码:927 / 950
页数:24
相关论文
共 44 条
[1]   Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption [J].
Abd EL-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Venegas-Andraca, Salvador E. .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2020, 547
[2]   A Color Image Encryption Technique Based on Bit-Level Permutation and Alternate Logistic Maps [J].
Bisht, Ankita ;
Dua, Mohit ;
Dua, Shelza ;
Jaroli, Priyanka .
JOURNAL OF INTELLIGENT SYSTEMS, 2020, 29 (01) :1246-1260
[3]   An image encryption scheme based on multi-objective optimization and block compressed sensing [J].
Chai, Xiuli ;
Fu, Jiangyu ;
Gan, Zhihua ;
Lu, Yang ;
Zhang, Yushu .
NONLINEAR DYNAMICS, 2022, 108 (03) :2671-2704
[4]   Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption [J].
Chai, Xiuli ;
Zhi, Xiangcheng ;
Gan, Zhihua ;
Zhang, Yushu ;
Chen, Yiran ;
Fu, Jiangyu .
SIGNAL PROCESSING, 2021, 183
[5]   An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing [J].
Chai, Xiuli ;
Wu, Haiyang ;
Gan, Zhihua ;
Han, Daojun ;
Zhang, Yushu ;
Chen, Yiran .
INFORMATION SCIENCES, 2021, 556 :305-340
[6]   Color image compression and encryption scheme based on compressive sensing and double random encryption strategy [J].
Chai, Xiuli ;
Bi, Jianqiang ;
Gan, Zhihua ;
Liu, Xianxing ;
Zhang, Yushu ;
Chen, Yiran .
SIGNAL PROCESSING, 2020, 176
[7]   Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption [J].
Chen, Junxin ;
Zhu, Zhi-liang ;
Zhang, Li-bo ;
Zhang, Yushu ;
Yang, Ben-Qiang .
SIGNAL PROCESSING, 2018, 142 :340-353
[8]   An ILM-cosine transform-based improved approach to image encryption [J].
Dua, Mohit ;
Suthar, Arun ;
Garg, Arpit ;
Garg, Vaibhav .
COMPLEX & INTELLIGENT SYSTEMS, 2021, 7 (01) :327-343
[9]   Symmetric ciphers based on two-dimensional chaotic maps [J].
Fridrich, J .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06) :1259-1284
[10]   An efficient image encryption scheme based on fractal Tromino and Chebyshev polynomial [J].
Khan, Majid ;
Alanazi, Ammar S. ;
Khan, Lal Said ;
Hussain, Iqtadar .
COMPLEX & INTELLIGENT SYSTEMS, 2021, 7 (05) :2751-2764