Generating visually coherent encrypted images with reversible data hiding in wavelet domain by fusing chaos and pairing function

Abstract For secure transmission of digital images, existing cryptographic algorithms transform coherent visual information into a noise-like appearance prompting an adversary of the presence of a possible cipher. This paper proposes an algorithm that produces a visually coherent and meaningful cipher image. The proposed algorithm consists of a permutation-substitution subroutine to obtain a partial cipher. The Arnold-3D map does the permutation, and a delayed logistic map performs the substitution in this subroutine. The hiding of this partial cipher is done in the reference image using an integer wavelet transform. The pixels of the partial cipher are embedded in the four sub-bands of the decomposed reference image as 4 to 1-pixel encoding using Cantor-like pairing function. In addition to the lossless encryption scheme, the integer nature of all the sub-bands in the wavelet decomposition and the invertible pairing function facilitates the perfect reconstruction of the reference image. One of the significant novelty of this work lies in the subtle use of simple pairing functions, which prohibits the unnecessary increase in the size of the cipher, thereby reducing the storage and transmission costs.

[1]  Vinod Patidar,et al.  A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption , 2011 .

[2]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[3]  Ali Kanso,et al.  An algorithm for encryption of secret images into meaningful images , 2017 .

[4]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[5]  Hong Sun,et al.  Compressive Sensing With Chaotic Sequence , 2010, IEEE Signal Processing Letters.

[6]  TanTieniu,et al.  An SVD-based watermarking scheme for protecting rightful ownership , 2002 .

[7]  Olcay Taner Yildiz,et al.  Cryptanalysis of Fridrich's Chaotic Image Encryption , 2010, Int. J. Bifurc. Chaos.

[8]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[9]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[10]  Musheng Chen,et al.  A novel image encryption method based on fractional Fourier transform and odd-even quantification , 2016, International Conference on Digital Image Processing.

[11]  Sanjeev Kumar,et al.  A novel fractional order chaos-based image encryption using Fisher Yates algorithm and 3-D cat map , 2018, Multimedia Tools and Applications.

[12]  Narendra Ahuja,et al.  A new wavelet-based scheme for watermarking images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[13]  Xuejia Lai,et al.  Markov Ciphers and Differential Cryptanalysis , 1991, EUROCRYPT.

[14]  L. Kocarev,et al.  Logistic map as a block encryption algorithm , 2001 .

[15]  Juliano B. Lima,et al.  Image encryption based on the fractional Fourier transform over finite fields , 2014, Signal Process..

[16]  W. Sweldens The Lifting Scheme: A Custom - Design Construction of Biorthogonal Wavelets "Industrial Mathematics , 1996 .

[17]  Pradeep K. Atrey,et al.  Analysis and extension of multiresolution singular value decomposition , 2014, Inf. Sci..

[18]  Rastislav Lukac,et al.  Efficient encryption of wavelet-based coded color images , 2005, Pattern Recognit..

[19]  Ali Broumandnia,et al.  The 3D modular chaotic map to digital color image encryption , 2019, Future Gener. Comput. Syst..

[20]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[21]  M. François,et al.  Image Encryption Algorithm Based on a Chaotic Iterative Process , 2012 .

[22]  Juliano B. Lima,et al.  A finite field cosine transform-based image processing scheme for color image encryption , 2015, 2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[23]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[24]  John T. Sheridan,et al.  Optical double image encryption employing a pseudo image technique in the Fourier domain , 2014 .

[25]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[26]  Xiao Liu,et al.  A novel chaos-based bit-level permutation scheme for digital image encryption , 2011 .

[27]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .

[28]  Yicong Zhou,et al.  2D Sine Logistic modulation map for image encryption , 2015, Inf. Sci..

[29]  Kwok-Wo Wong,et al.  An efficient chaotic image encryption algorithm based on a generalized Arnold map , 2012, Nonlinear Dynamics.

[30]  Abdul Hanan Abdullah,et al.  Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence , 2014 .

[31]  Shujun Li,et al.  Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[32]  Amit Kumar Singh,et al.  An improved DWT-SVD domain watermarking for medical information security , 2020, Comput. Commun..

[33]  Yicong Zhou,et al.  Image encryption: Generating visually meaningful encrypted images , 2015, Inf. Sci..

[34]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[35]  Wojciech Mazurczyk,et al.  Hiding information in a Stream Control Transmission Protocol , 2011, Comput. Commun..

[36]  Guanrong Chen,et al.  A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.

[37]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[38]  Hong Liu,et al.  Cryptanalyzing an image encryption scheme based on hybrid chaotic system and cyclic elliptic curve , 2014 .

[39]  Yushu Zhang,et al.  Image salient regions encryption for generating visually meaningful ciphertext image , 2016, Neural Computing and Applications.

[40]  Wim Sweldens,et al.  The lifting scheme: a construction of second generation wavelets , 1998 .

[41]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[42]  M. Baptista Cryptography with chaos , 1998 .

[43]  Ayman Ibaida,et al.  Wavelet-Based ECG Steganography for Protecting Patient Confidential Information in Point-of-Care Systems , 2013, IEEE Transactions on Biomedical Engineering.

[44]  J C Judge,et al.  Steganography: Past, Present, Future , 2001 .

[45]  Yiran Chen,et al.  A visually secure image encryption scheme based on compressive sensing , 2017, Signal Process..

[46]  Yicong Zhou,et al.  A new chaotic system for image encryption , 2012, 2012 International Conference on System Science and Engineering (ICSSE).

[47]  H. Cantor Ueber eine Eigenschaft des Inbegriffs aller reellen algebraischen Zahlen. , 1984 .