A compression-diffusion-permutation strategy for securing image

被引:40
作者
Huang, Hui [1 ]
He, Xing [1 ]
Xiang, Yong [2 ]
Wen, Wenying [3 ]
Zhang, Yushu [2 ]
机构
[1] Southwest Univ, Natl & Local Joint Engn Lab Intelligent Transmiss, Sch Elect & Informat Engn, Chongqing 400715, Peoples R China
[2] Deakin Univ, Sch Informat, Melbourne, Vic 3125, Australia
[3] Jiangxi Univ Finance & Econ, Sch Informat Technol, Nanchang 330013, Jiangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Image encryption; Compressive sensing; Diffusion; Permutation; CHAOTIC SYSTEM; SALIENCY DETECTION; QUALITY ASSESSMENT; ENCRYPTION; MAP; TRANSFORM; CIPHER; MODEL;
D O I
10.1016/j.sigpro.2018.04.014
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the background of big data, it is of great significance to protect image data's confidentiality. In this paper, a compression-diffusion-permutation strategy for securing big image data is proposed. Firstly, an image is compressed by use of compressive sensing technique, in which the Hadamard matrix used as the measurement matrix is constructed through iterating two-dimensional Sine-Logistic modulation map(2D-SLMM) instead of using the entire Gaussian matrix as a key. Thus, only the utilization of a few keys in the 2D-SLMM avoids the transmission of the Gaussian matrix. Secondly, XOR is used to further diffuse the compressed image to enhance the security. Thirdly, an index sequence produced by 2D-SLMM with initial values is utilized to rearrange the positions of the diffused image. Experimental results indicate that the proposed algorithm makes some potential attacks impracticable, such as known plaintext attack and chosen ciphertext attack. Security analysis demonstrates the effectiveness and the security of the proposed algorithm. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:183 / 190
页数:8
相关论文
共 45 条
[1]  
[Anonymous], CLOUDSENSE CONTINUOU
[2]  
[Anonymous], 1993, SIGN SYST COMP 1993
[3]   A visually secure image encryption scheme based on compressive sensing [J].
Chai, Xiuli ;
Gan, Zhihua ;
Chen, Yiran ;
Zhang, Yushu .
SIGNAL PROCESSING, 2017, 134 :35-51
[4]   Data-intensive applications, challenges, techniques and technologies: A survey on Big Data [J].
Chen, C. L. Philip ;
Zhang, Chun-Yang .
INFORMATION SCIENCES, 2014, 275 :314-347
[5]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[6]   Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption [J].
Chen, Junxin ;
Zhu, Zhi-liang ;
Zhang, Li-bo ;
Zhang, Yushu ;
Yang, Ben-Qiang .
SIGNAL PROCESSING, 2018, 142 :340-353
[7]   Multiple-image encryption by compressive holography [J].
Di, Hong ;
Zheng, Kangfeng ;
Zhang, Xin ;
Lam, Edmund Y. ;
Kim, Taegeun ;
Kim, You Seok ;
Poon, Ting-Chung ;
Zhou, Changhe .
APPLIED OPTICS, 2012, 51 (07) :1000-1009
[8]   Image encryption using a synchronous permutation-diffusion technique [J].
Enayatifar, Rasul ;
Abdullah, Abdul Hanan ;
Isnin, Ismail Fauzi ;
Altameem, Ayman ;
Lee, Malrey .
OPTICS AND LASERS IN ENGINEERING, 2017, 90 :146-154
[9]   Visual Attention Modeling for Stereoscopic Video: A Benchmark and Computational Model [J].
Fang, Yuming ;
Zhang, Chi ;
Li, Jing ;
Lei, Jianjun ;
Da Silva, Matthieu Perreira ;
Le Callet, Patrick .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2017, 26 (10) :4684-4696
[10]   Objective Quality Assessment of Screen Content Images by Uncertainty Weighting [J].
Fang, Yuming ;
Yan, Jiebin ;
Liu, Jiaying ;
Wang, Shiqi ;
Li, Qiaohong ;
Guo, Zongming .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2017, 26 (04) :2016-2027