An improved visually meaningful encrypted image scheme

被引:36
作者
Armijo-Correa, J. O. [1 ]
Murguia, J. S. [2 ]
Mejia-Carlos, M. [3 ]
Arce-Guevara, V. E. [2 ]
Aboytes-Gonzalez, J. A. [3 ]
机构
[1] Univ Autonoma San Luis Potosi, Fac Ciencias, Alvaro Obregon 64, San Luis Potosi 78000, San Luis Potosi, Mexico
[2] Univ Autonoma San Luis Potosi, Fac Ciencias, Lab Nacl CI3M, Alvaro Obregon 64, San Luis Potosi 78000, San Luis Potosi, Mexico
[3] Univ Autonoma San Luis Potosi, Inst Invest Comunicac Opt, Alvaro Obregon 64, San Luis Potosi 78000, San Luis Potosi, Mexico
关键词
Image encryption; Visually meaningful encrypted image; S-box; Integer discrete wavelet transform; WAVELET TRANSFORMS; TIME-SERIES; MAP; ALGORITHM;
D O I
10.1016/j.optlastec.2020.106165
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
An encrypted image generally presents an appearance of texture-like or noise-like image, which exhibits an indication of encrypted data that may motivate a significantly large number of attacks. To address this problem several approaches have been carried out, where an encrypted image is transformed into a visually meaningful encrypted image (VMEI). We present an improved approach to encrypt a plain image into a visually meaningful cover image, where the preprocessing and embedding phases are modified to achieve a quite comparable performance. To make the assessment of this proposal, some standard metrics such as PSNR and SSIM are performed, and the obtained numerical results show that this proposal is comparable or superior to some VMEI schemes used as benchmark in this work. In most of the reference images considered in the dataset the values of PSNR are greater than 40 dB, and a value close to 1 for the SSIM metric, which means a great similarity and high quality, respectively, between the reference images and their obtained VMEI images. Also, the two-dimensional detrended fluctuation analysis is carried out to observe the scaling behavior of the images, which allows us to have a perceptual security parameter of encrypted images and visually meaningful cover images. For this metric, the scaling exponent values of the VMEI images are close to 2.1, which are very similar to the values obtained for the reference images, a situation that confirms that the hidden information may not be detected by the human visual system. Furthermore, for two reference images, this metric was able to detect how the pixel values are distributed, and how the pixel values are highly correlated, suggesting that this metric can be an objective measure of encrypted images.
引用
收藏
页数:17
相关论文
共 44 条
[1]   Image encryption by chaos mixing [J].
Abanda, Yannick ;
Tiedeu, Alain .
IET IMAGE PROCESSING, 2016, 10 (10) :742-750
[2]   Visual Meaningful Encryption Scheme Using Intertwinning Logistic Map [J].
Abbasi, Saadullah Farooq ;
Ahmad, Jawad ;
Khan, Jan Sher ;
Khan, Muazzam A. ;
Sheikh, Shehzad Amin .
INTELLIGENT COMPUTING, VOL 2, 2019, 857 :764-773
[3]   Design of a strong S-box based on a matrix approach [J].
Aboytes-Gonzalez, J. A. ;
Murguia, J. S. ;
Mejia-Carlos, M. ;
Gonzalez-Aguilar, H. ;
Ramirez-Torres, M. T. .
NONLINEAR DYNAMICS, 2018, 94 (03) :2003-2012
[4]  
Adi PW, 2015, 2015 INTERNATIONAL CONFERENCE ON SCIENCE IN INFORMATION TECHNOLOGY (ICSITECH), P79, DOI 10.1109/ICSITech.2015.7407781
[5]  
[Anonymous], SECUR COMMUN NETWORK
[6]  
[Anonymous], INT J VIDEO IMAGE PR
[7]  
[Anonymous], WORLD ACAD SCI ENG T
[8]   Image encryption: Generating visually meaningful encrypted images [J].
Bao, Long ;
Zhou, Yicong .
INFORMATION SCIENCES, 2015, 324 :197-207
[9]   Selective image encryption based on pixels of interest and singular value decomposition [J].
Bhatnagar, Gaurav ;
Wu, Q. M. Jonathan .
DIGITAL SIGNAL PROCESSING, 2012, 22 (04) :648-663
[10]   Secured cloud computing for medical data based on watermarking and encryption [J].
Boussif M. ;
Aloui N. ;
Cherif A. .
IET Networks, 2018, 7 (05) :294-298