Dynamic feedback bit-level image privacy protection based on chaos and information hiding

被引:2
作者
Zhang, Jinlong [1 ]
Wen, Heping [2 ,3 ]
机构
[1] Hunan Univ Finance & Econ, Sch Informat Technol & Management, Changsha 410205, Peoples R China
[2] Univ Elect Sci & Technol China, Zhongshan Inst, Zhongshan 528402, Peoples R China
[3] Univ Elect Sci & Technol China, Chengdu 611731, Peoples R China
关键词
ENCRYPTION; DEGRADATION; SYNCHRONIZATION; WATERMARKING; DWT;
D O I
10.1038/s41598-024-53325-4
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Bit is the most basic unit of a digital image in the spatial domain, and bit-level encryption is regarded as an important technical means for digital image privacy protection. To address the vulnerability of image privacy protection to cryptographic attacks, in this paper, a bit-level image privacy protection scheme using Zigzag and chain-diffusion is proposed. The scheme uses a combination of Zigzag interleaving scrambling with chaotic sequences and chain-diffusion method images are encrypted at each bit level, while using non-sequential encryption to achieve efficient and secure encryption. To balance security and efficiency, the encryption strategy for each bit layer is weighted. The chaos-based sequences used for encryption depend on the previous hash value, thus the effect of chain-diffusion is achieved. To further enhance the encryption effect, a non-sequential encryption technique by non-linearly rearranging the bit cipher image is employed, so that the attacker cannot crack the protection scheme by analyzing the encrypted image. The ciphertext image hidden by discrete wavelet transform (DWT) also provides efficient encryption, higher level of security and robustness to attacks. This technology provides indistinguishable secret data embedding, making it difficult for attackers to detect or extract hidden information. Experimental results show that this scheme can effectively protect the confidentiality of the image and can resist various common cryptographic attacks. The scheme proposed in this paper is a preferred digital image privacy protection technology, so it has broad application prospects in image secure transmission occasions.
引用
收藏
页数:19
相关论文
共 81 条
[1]   Hyperchaotic Maps and the Single Neuron Model: A Novel Framework for Chaos-Based Image Encryption [J].
Alexan, Wassim ;
Chen, Yen-Lin ;
Por, Lip Yee ;
Gabr, Mohamed .
SYMMETRY-BASEL, 2023, 15 (05)
[2]   An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD [J].
Araghi, Tanya Koohpayeh ;
Abd Manaf, Azizah .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 :1223-1246
[3]   Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking [J].
Ariatmanto, Dhani ;
Ernawan, Ferda .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (03) :605-614
[4]   Regime transition and multi-scroll hyperchaos in a discrete neuron model [J].
Bao, Bocheng ;
Wang, Zhuowu ;
Hua, Zhongyun ;
Chen, Mo ;
Bao, Han .
NONLINEAR DYNAMICS, 2023, 111 (14) :13499-13512
[5]   A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation [J].
Ben Farah, M. A. ;
Guesmi, R. ;
Kachouri, A. ;
Samet, M. .
OPTICS AND LASER TECHNOLOGY, 2020, 121
[6]   Straightforward Guess and Determine Analysis Based on Genetic Algorithm [J].
Cao Chunping ;
Cen Zhe ;
Feng Xiutao ;
Wang Zhangyi ;
Zhu Yamin .
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2022, 35 (05) :1988-2003
[7]   Exploiting Semi-Tensor Product Compressed Sensing and Hybrid Cloud for Secure Medical Image Transmission [J].
Chai, Xiuli ;
Fu, Jiangyu ;
Gan, Zhihua ;
Lu, Yang ;
Zhang, Yushu ;
Han, Daojun .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (08) :7380-7392
[8]   Preserving privacy while revealing thumbnail for content-based encrypted image retrieval in the cloud [J].
Chai, Xiuli ;
Wang, Yinjing ;
Gan, Zhihua ;
Chen, Xiuhui ;
Zhang, Yushu .
INFORMATION SCIENCES, 2022, 604 :115-141
[9]   TPE-GAN: Thumbnail Preserving Encryption Based on GAN With Key [J].
Chai, Xiuli ;
Wang, Yinjing ;
Chen, Xiuhui ;
Gan, Zhihua ;
Zhang, Yushu .
IEEE SIGNAL PROCESSING LETTERS, 2022, 29 :972-976
[10]   An image encryption scheme based on multi-objective optimization and block compressed sensing [J].
Chai, Xiuli ;
Fu, Jiangyu ;
Gan, Zhihua ;
Lu, Yang ;
Zhang, Yushu .
NONLINEAR DYNAMICS, 2022, 108 (03) :2671-2704