A secure image encryption scheme with compression-confusion-diffusion structure

被引:12
作者
Zhu, Shuqin [1 ]
Zhu, Congxu [2 ,3 ]
Fu, Yu [1 ]
Zhang, Weimeng [1 ]
Wu, Xiaoting [1 ]
机构
[1] Liaocheng Univ, Sch Comp Sci, Liaocheng 252059, Shandong, Peoples R China
[2] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Peoples R China
[3] Hunan Police Acad, Key Lab Network Crime Invest Hunan Prov Coll, Changsha 410138, Peoples R China
关键词
Chaos; Image encryption; Compressive sensing; Discrete hyper-chaotic map; ALGORITHM;
D O I
10.1007/s11042-020-09699-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a novel image compression-encryption scheme, which has the compression-confusion-diffusion Structure. Firstly, based on Chebyshev chaotic map, a Gauss measurement matrix is constructed and optimized, which is applied to compressive sensing. Then, an image compression-encryption algorithm is proposed by using a six-dimensional discrete chaotic map. In the proposed scheme, the original image is transformed into a sparse coefficient matrix by discrete wavelet transform, and the sparse coefficients are measured by using the optimized Gauss measurement matrix to get the measured values. Then, the measured values are quantized into integer values and the compressed image is obtained. Furtherly, the compressed image is encrypted by using a six-dimensional chaotic map. In the process of encryption, the plaintext image is divided into two parts, when encrypting the second part, the first part is used as part of the key. While encrypting the first part, the ciphertext of the second part is used as part of the key. Thus, the algorithm has strong confusion and diffusion effect and makes ciphertext sensitive to plaintext. Experimental results such as effects of compression-encryption, key space analysis, key sensitivity analysis, differential analysis, histograms analysis, information entropy analysis, and correlation coefficients analysis show that the proposed scheme is secure and has high application potential.
引用
收藏
页码:31957 / 31980
页数:24
相关论文
共 41 条
  • [11] An image compression and encryption algorithm based on chaotic system and compressive sensing
    Gong, Lihua
    Qiu, Kaide
    Deng, Chengzhi
    Zhou, Nanrun
    [J]. OPTICS AND LASER TECHNOLOGY, 2019, 115 : 257 - 267
  • [12] One-Dimensional Nonlinear Model for Producing Chaos
    Hua, Zhongyun
    Zhou, Yicong
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2018, 65 (01) : 235 - 246
  • [13] When an attacker meets a cipher-image in 2018: A year in review
    Li, Chengqing
    Zhang, Yun
    Xie, Eric Yong
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 48
  • [14] A Hybrid Cloud Approach for Secure Authorized Deduplication
    Li, Jin
    Li, Yan Kit
    Chen, Xiaofeng
    Lee, Patrick P. C.
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (05) : 1206 - 1216
  • [15] Securely Outsourcing Attribute-Based Encryption with Checkability
    Li, Jin
    Huang, Xinyi
    Li, Jingwei
    Chen, Xiaofeng
    Xiang, Yang
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (08) : 2201 - 2210
  • [16] A block cipher based on a suitable use of the chaotic standard map
    Lian, SG
    Sun, JS
    Wang, ZQ
    [J]. CHAOS SOLITONS & FRACTALS, 2005, 26 (01) : 117 - 129
  • [17] An Efficient Image Encryption Scheme Based on the LSS Chaotic Map and Single S-Box
    Lu, Qing
    Zhu, Congxu
    Deng, Xiaoheng
    [J]. IEEE ACCESS, 2020, 8 : 25664 - 25678
  • [18] A Novel S-Box Design Algorithm Based on a New Compound Chaotic System
    Lu, Qing
    Zhu, Congxu
    Wang, Guojun
    [J]. ENTROPY, 2019, 21 (10)
  • [19] Orsdemir A, 2008, IEEE MILIT COMMUN C, P1040
  • [20] Peng Y., 2012, J. Comput. Inf. Syst, V8, P6025