Pixel Level Image Encryption Based on Semantic Segmentation

Nowadays, a large amount of image information is transmitting on the internet, and people are focusing more on image security. These years, encryption algorithm based on “scrambling-diffusion” architecture has made great achievement in security performance. Nevertheless, there is no need to encrypt the full image. Only part of it matters, which is defined as Region of Interested (ROI). In this paper, we propose a pixel-level image encryption method based on semantic segmentation. We use a PSPNet model trained on Cityscapes dataset to gain the coordinate of each pixels in ROI, then we encrypt these coordinates with a novel chaotic encryption system we proposed. In this system, we improved the scrambling-diffusion architecture. Scrambling and diffusion share the chaotic sequence iterated by the four-dimensional hyperchaotic Chen system, and generate the required key flows independently. Our encryption system acts well in the test, almost all the coordinates of ROI are covered. Cryptanalysis shows its superior security.

[1]  O. Rössler An equation for hyperchaos , 1979 .

[2]  Feng Hao,et al.  Deleting Secret Data with Public Verifiability , 2016, IEEE Transactions on Dependable and Secure Computing.

[3]  Guanrong Chen,et al.  Generating Hyperchaos via State Feedback Control , 2005, Int. J. Bifurc. Chaos.

[4]  Leilei Zhou,et al.  Local bifurcation analysis and topological horseshoe of a 4D hyper-chaotic system , 2016 .

[5]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[6]  Jinhu Lu,et al.  On Cryptanalysis of Fridrich's chaotic image encryption scheme , 2016, ArXiv.

[7]  Xiaogang Wang,et al.  Pyramid Scene Parsing Network , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[8]  Chul Sur,et al.  Region-Based Selective Encryption for Medical Imaging , 2007, FAW.

[9]  Kaiming He,et al.  Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[10]  Elankovan A. Sundararajan,et al.  Performance study of selective encryption in comparison to full encryption for still visual images , 2014, Journal of Zhejiang University SCIENCE C.