Iterative learning control for image feature extraction with multiple-image blends

In this paper, a novel method of image extraction is proposed. Firstly, the image information is embedded into the parameters of the chaotic system, and then the image is overlapped and embedded to complete the image hiding. This process is equivalent to a dynamic system with unknown time-varying parameters. Secondly, the D-type iterative learning control algorithm is used to extract the information hidden in the image, because iterative learning can be used to estimate the time-varying parameter system completely in the time interval. Finally, the numerical simulation shows that the algorithm can effectively extract the hidden information under various attacks.

[1]  Amir Akhavan,et al.  A symmetric image encryption scheme based on combination of nonlinear chaotic maps , 2011, J. Frankl. Inst..

[2]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[3]  Amir Akhavan,et al.  A New Image Encryption Algorithm Based on One-Dimensional Polynomial Chaotic Maps , 2006, ISCIS.

[4]  Mohammed J. Islam,et al.  An Adaptive Digital Image Watermarking Technique for Copyright Protection , 2007 .

[5]  Jian Zhao,et al.  A generic digital watermarking model , 1998, Comput. Graph..

[6]  Shujun Li,et al.  Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[7]  Matthieu Urvoy,et al.  Perceptual DFT Watermarking With Improved Detection and Robustness to Geometrical Distortions , 2014, IEEE Transactions on Information Forensics and Security.

[8]  Hu Han A Method for Generating Chaotic Key Stream , 2004 .

[9]  Ali Kanso,et al.  An efficient and robust image encryption scheme for medical applications , 2015, Commun. Nonlinear Sci. Numer. Simul..

[10]  Guanrong Chen,et al.  Chaos-Based Image Encryption , 2005 .

[11]  Ali Kanso,et al.  A robust chaotic algorithm for digital image steganography , 2014, Commun. Nonlinear Sci. Numer. Simul..

[12]  Chengqing Li,et al.  Cracking a hierarchical chaotic image encryption algorithm based on permutation , 2015, Signal Process..

[13]  R. Z. Liu,et al.  Watermarking for digital images , 1998, ICSP '98. 1998 Fourth International Conference on Signal Processing (Cat. No.98TH8344).

[14]  A. Akhavan,et al.  A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps , 2007 .

[15]  Xiaofeng Liao,et al.  Cryptanalysis on a modified Baptista-type cryptosystem with chaotic masking algorithm , 2005 .

[16]  Jinhu Lu,et al.  On Cryptanalysis of Fridrich's chaotic image encryption scheme , 2016, ArXiv.

[17]  Olcay Taner Yildiz,et al.  Cryptanalysis of Fridrich's Chaotic Image Encryption , 2010, Int. J. Bifurc. Chaos.

[18]  Eduardo Bayro Corrochano,et al.  Handbook of Geometric Computing , 2005 .

[19]  Ioannis Pitas,et al.  Robust image watermarking in the spatial domain , 1998, Signal Process..

[20]  Ethem Alpaydin,et al.  Introduction to machine learning , 2004, Adaptive computation and machine learning.

[21]  Nikolaos G. Bourbakis,et al.  Picture data encryption using scan patterns , 1992, Pattern Recognit..

[22]  Oscar C. Au,et al.  Data hiding watermarking for halftone images , 2002, IEEE Trans. Image Process..

[23]  M. Baptista Cryptography with chaos , 1998 .

[24]  Y. Ishikawa,et al.  Optimization of Size of Pixel Blocks for Orthogonal Transform in Optical Watermarking Technique , 2012, Journal of Display Technology.

[25]  Amir Akhavan,et al.  Chaotic Cryptographic Scheme Based on Composition Maps , 2006, Int. J. Bifurc. Chaos.

[26]  Dong Shen,et al.  Zero-error convergence of iterative learning control using quantized error information , 2016, IMA J. Math. Control. Inf..

[27]  Amir Akhavan,et al.  A Novel Block Cipher Based on Hierarchy of One-Dimensional Composition Chaotic Maps , 2006, 2006 International Conference on Image Processing.

[28]  Azman Samsudin,et al.  Cryptanalysis of an image encryption algorithm based on DNA encoding , 2017 .

[29]  A. Akhavan,et al.  A novel algorithm for image encryption based on mixture of chaotic maps , 2008 .

[30]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[31]  Ljupco Kocarev,et al.  Public-key encryption with chaos. , 2004, Chaos.

[32]  Mohammad S. Obaidat,et al.  Digital watermarking-based DCT and JPEG model , 2003, IEEE Trans. Instrum. Meas..

[33]  Quan Liu,et al.  A novel image encryption algorithm based on chaos maps with Markov properties , 2015, Commun. Nonlinear Sci. Numer. Simul..

[34]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[35]  Amir Akhavan,et al.  Applications of tripled chaotic maps in cryptography , 2007, 0705.2633.

[36]  Amir Akhavan,et al.  Cryptanalysis of “an improvement over an image encryption method based on total shuffling” , 2015 .

[37]  W. Tang,et al.  A fast image encryption system based on chaotic maps with finite precision representation , 2007 .

[38]  Ljupco Kocarev,et al.  Public-Key Encryption Based on Chebyshev Polynomials , 2005 .