A compression-diffusion-permutation strategy for securing image

Abstract In the background of big data, it is of great significance to protect image data’s confidentiality. In this paper, a compression-diffusion-permutation strategy for securing big image data is proposed. Firstly, an image is compressed by use of compressive sensing technique, in which the Hadamard matrix used as the measurement matrix is constructed through iterating two-dimensional Sine-Logistic modulation map(2D-SLMM) instead of using the entire Gaussian matrix as a key. Thus, only the utilization of a few keys in the 2D-SLMM avoids the transmission of the Gaussian matrix. Secondly, XOR is used to further diffuse the compressed image to enhance the security. Thirdly, an index sequence produced by 2D-SLMM with initial values is utilized to rearrange the positions of the diffused image. Experimental results indicate that the proposed algorithm makes some potential attacks impracticable, such as known plaintext attack and chosen ciphertext attack. Security analysis demonstrates the effectiveness and the security of the proposed algorithm.

[1]  Yiran Chen,et al.  A visually secure image encryption scheme based on compressive sensing , 2017, Signal Process..

[2]  Di Xiao,et al.  Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform , 2013 .

[3]  Y. C. Pati,et al.  Orthogonal matching pursuit: recursive function approximation with applications to wavelet decomposition , 1993, Proceedings of 27th Asilomar Conference on Signals, Systems and Computers.

[4]  Jiaying Liu,et al.  Objective Quality Assessment of Screen Content Images by Uncertainty Weighting , 2017, IEEE Transactions on Image Processing.

[5]  Jiantao Zhou,et al.  A Review of Compressive Sensing in Information Security Field , 2016, IEEE Access.

[6]  Wei Zhang,et al.  Image encryption based on three-dimensional bit matrix permutation , 2016, Signal Process..

[7]  Yicong Zhou,et al.  2D Sine Logistic modulation map for image encryption , 2015, Inf. Sci..

[8]  Hongyu Li,et al.  VSI: A Visual Saliency-Induced Index for Perceptual Image Quality Assessment , 2014, IEEE Transactions on Image Processing.

[9]  Yicong Zhou,et al.  Cascade Chaotic System With Applications , 2015, IEEE Transactions on Cybernetics.

[10]  Yixian Yang,et al.  An improved chaotic cryptosystem based on circular bit shift and XOR operations , 2012 .

[11]  Zhou Wang,et al.  No-Reference Quality Assessment of Contrast-Distorted Images Based on Natural Scene Statistics , 2015, IEEE Signal Processing Letters.

[12]  Kwok-Wo Wong,et al.  Bi-level Protected Compressive Sampling , 2016, IEEE Transactions on Multimedia.

[13]  Huiqian Du,et al.  Simultaneous image compression, fusion and encryption algorithm based on compressive sensing and chaos , 2016 .

[14]  Michael W. Marcellin,et al.  JPEG2000 - image compression fundamentals, standards and practice , 2013, The Kluwer international series in engineering and computer science.

[15]  Zhihong Zhou,et al.  Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing , 2016 .

[16]  Abdul Hanan Abdullah,et al.  Image encryption using a synchronous permutation-diffusion technique , 2017 .

[17]  C. L. Philip Chen,et al.  Data-intensive applications, challenges, techniques and technologies: A survey on Big Data , 2014, Inf. Sci..

[18]  Yicong Zhou,et al.  Design of image cipher using block-based scrambling and image filtering , 2017, Inf. Sci..

[19]  Balas K. Natarajan,et al.  Sparse Approximate Solutions to Linear Systems , 1995, SIAM J. Comput..

[20]  Bin Chen,et al.  A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions , 2016, Int. J. Bifurc. Chaos.

[21]  Tao Xiang,et al.  An efficient chaotic image cipher with dynamic lookup table driven bit-level permutation strategy , 2016, Nonlinear Dynamics.

[22]  Jianhua Wu,et al.  Novel hybrid image compression–encryption algorithm based on compressive sensing , 2014 .

[23]  Weisi Lin,et al.  Saliency Detection in the Compressed Domain for Adaptive Image Retargeting , 2012, IEEE Transactions on Image Processing.

[24]  Xiaofeng Liao,et al.  A fast and efficient approach to color-image encryption based on compressive sensing and fractional Fourier transform , 2017, Multimedia Tools and Applications.

[25]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[26]  Leo Yu Zhang,et al.  On the Security of Optical Ciphers Under the Architecture of Compressed Sensing Combining With Double Random Phase Encoding , 2017, IEEE Photonics Journal.

[27]  Kwok-Wo Wong,et al.  Embedding cryptographic features in compressive sensing , 2014, Neurocomputing.

[28]  Yue Zhang,et al.  Image Encryption Based on Compressive Sensing and Scrambled Index for Secure Multimedia Transmission , 2016, ACM Trans. Multim. Comput. Commun. Appl..

[29]  Stéphane Mallat,et al.  Matching pursuits with time-frequency dictionaries , 1993, IEEE Trans. Signal Process..

[30]  Yicong Zhou,et al.  Image encryption using 2D Logistic-adjusted-Sine map , 2016, Inf. Sci..

[31]  Kwok-Wo Wong,et al.  A chaotic image encryption scheme owning temp-value feedback , 2013, Commun. Nonlinear Sci. Numer. Simul..

[32]  Di Xiao,et al.  An image encryption scheme based on rotation matrix bit-level permutation and block diffusion , 2014, Commun. Nonlinear Sci. Numer. Simul..

[33]  Christian Jutten,et al.  Fast Block-Sparse Decomposition Based on SL0 , 2010, LVA/ICA.

[34]  Zhiliang Zhu,et al.  Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption , 2018, Signal Process..

[35]  Di Wang,et al.  Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform , 2015 .

[36]  H. T. Kung,et al.  CloudSense: Continuous Fine-Grain Cloud Monitoring with Compressive Sensing , 2011, HotCloud.

[37]  Jing Li,et al.  Visual Attention Modeling for Stereoscopic Video: A Benchmark and Computational Model , 2017, IEEE Transactions on Image Processing.

[38]  Jing Li,et al.  A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations , 2013, Signal Process. Image Commun..

[39]  Bu-Sung Lee,et al.  Bottom-Up Saliency Detection Model Based on Human Visual Sensitivity and Amplitude Spectrum , 2012, IEEE Transactions on Multimedia.

[40]  Bryan Usevitch,et al.  A tutorial on modern lossy wavelet image compression: foundations of JPEG 2000 , 2001, IEEE Signal Process. Mag..

[41]  Feng Xia,et al.  Big Scholarly Data: A Survey , 2017, IEEE Transactions on Big Data.

[42]  Samrat L. Sabat,et al.  A fast chaotic block cipher for image encryption , 2014, Commun. Nonlinear Sci. Numer. Simul..

[43]  Ting-Chung Poon,et al.  Multiple-image encryption by compressive holography. , 2012, Applied optics.