A novel chaos-based approach in conjunction with MR-SVD and pairing function for generating visually meaningful cipher images

For secure transmission of digital images, existing cryptographic algorithms transform images into a noise-like appearance. One obvious inference that an adversary could draw is that the noise-like texture is a cipher, prompting to apply classical cryptanalysis. This article proposes an efficient algorithm that produces a visually coherent and meaningful cipher image to bypass the cryptanalysis. In the partial-encryption phase, the Arnold-3D map drives the permutation mechanism, whereas the implementation of the diffusion phase is done by harnessing the iterates of the chaotic Logistic map. The partial cipher is compressed using a Cantor-like pairing function that does a 4 to 1 pixel encoding to facilitate embedding. The embedding phase is implemented in the spatial domain by applying Multi-resolution singular value decomposition on the reference image and replacing the vertical, horizontal, diagonal sub-band with the encoded cipher. The encoding of pixels facilitates the transmission of the visually meaningful cipher image to be of the same size as the original image rather than four-times the original image as reported in earlier schemes. Simulation results confirm the security of the scheme.

[1]  Yiran Chen,et al.  A visually secure image encryption scheme based on compressive sensing , 2017, Signal Process..

[2]  Linda G. Shapiro,et al.  Computer and Robot Vision , 1991 .

[3]  H. Cantor Ueber eine Eigenschaft des Inbegriffs aller reellen algebraischen Zahlen. , 1984 .

[4]  Yehuda Lindell,et al.  Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .

[5]  Kavita Sharma,et al.  Introduction to the Special Issue on Secure Solutions for Network in Scalable Computing , 2017, Scalable Comput. Pract. Exp..

[6]  Yicong Zhou,et al.  2D Sine Logistic modulation map for image encryption , 2015, Inf. Sci..

[7]  Xingyuan Wang,et al.  Image encryption using DNA complementary rule and chaotic maps , 2012, Appl. Soft Comput..

[8]  Jonathan Katz,et al.  Introduction to Modern Cryptography: Principles and Protocols , 2007 .

[9]  M. François,et al.  Image Encryption Algorithm Based on a Chaotic Iterative Process , 2012 .

[10]  S. Ghaemmaghami,et al.  Watermarking of still images using multiresolution singular value decomposition , 2005, 2005 International Symposium on Intelligent Signal Processing and Communication Systems.

[11]  Vinod Patidar,et al.  A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption , 2011 .

[12]  Ali Kanso,et al.  An algorithm for encryption of secret images into meaningful images , 2017 .

[13]  Juliano B. Lima,et al.  A finite field cosine transform-based image processing scheme for color image encryption , 2015, 2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[14]  Kavita Sharma,et al.  Hybrid approach to enhance contrast of image for forensic investigation using segmented histogram , 2019 .

[15]  John T. Sheridan,et al.  Optical double image encryption employing a pseudo image technique in the Fourier domain , 2014 .

[16]  Shengqi Wang,et al.  Corrigendum: “Turn on” and label-free core−shell Ag@SiO2 nanoparticles-based metal-enhanced fluorescent (MEF) aptasensor for Hg2+ , 2015, Scientific Reports.

[17]  Xiao Liu,et al.  A novel chaos-based bit-level permutation scheme for digital image encryption , 2011 .

[18]  M. Baptista Cryptography with chaos , 1998 .

[19]  Juliano B. Lima,et al.  Image encryption based on the fractional Fourier transform over finite fields , 2014, Signal Process..

[20]  Swanirbhar Majumder,et al.  Multiresolution SVD and pixel-wise masking based image watermarking , 2016, 2016 2nd International Conference on Control, Instrumentation, Energy & Communication (CIEC).

[21]  Josef Scharinger Fast encryption of image data using chaotic Kolmogorov flows , 1998, J. Electronic Imaging.

[22]  Ryuichi Ashino,et al.  Comparing Multiresolution SVD with Other Methods for Image Compression , 2005 .

[23]  Khumanthem Manglem Singh,et al.  Visually Meaningful Multi-image Encryption Scheme , 2018 .

[24]  Guanrong Chen,et al.  A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.

[25]  Yu-Guang Yang,et al.  Novel Image Encryption based on Quantum Walks , 2015, Scientific Reports.

[26]  Phatak,et al.  Logistic map: A possible random-number generator. , 1995, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[27]  Philip Ogunbona,et al.  Signal analysis using a multiresolution form of the singular value decomposition , 2001, IEEE Trans. Image Process..

[28]  Kwok-Wo Wong,et al.  An efficient chaotic image encryption algorithm based on a generalized Arnold map , 2012, Nonlinear Dynamics.

[29]  Gene H. Golub,et al.  Singular value decomposition and least squares solutions , 1970, Milestones in Matrix Computation.

[30]  Rémi Vaillancourt,et al.  Image compression with multiresolution singular value decomposition and other methods , 2005, Math. Comput. Model..

[31]  R. S. Moni,et al.  Image Denoising Using Multiresolution Singular Value Decomposition Transform , 2015 .

[32]  Musheng Chen,et al.  A novel image encryption method based on fractional Fourier transform and odd-even quantification , 2016, International Conference on Digital Image Processing.

[33]  Sanjeev Kumar,et al.  A novel fractional order chaos-based image encryption using Fisher Yates algorithm and 3-D cat map , 2018, Multimedia Tools and Applications.

[34]  M. Feigenbaum Quantitative universality for a class of nonlinear transformations , 1978 .

[35]  Zhou Wang,et al.  Objective Quality Assessment of Tone-Mapped Images , 2013, IEEE Transactions on Image Processing.

[36]  Rached Tourki,et al.  A Modified AES Based Algorithm for Image Encryption , 2007 .

[37]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[38]  Rastislav Lukac,et al.  Efficient encryption of wavelet-based coded color images , 2005, Pattern Recognit..

[39]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .

[40]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[41]  Jawad Ahmad,et al.  DNA key based visual chaotic image encryption , 2019, J. Intell. Fuzzy Syst..

[42]  Xiubo Chen,et al.  Eliminating the texture features in visually meaningful cipher images , 2018, Inf. Sci..

[43]  Yushu Zhang,et al.  Image salient regions encryption for generating visually meaningful ciphertext image , 2016, Neural Computing and Applications.

[44]  Yicong Zhou,et al.  Image encryption: Generating visually meaningful encrypted images , 2015, Inf. Sci..