A joint image lossless compression and encryption method based on chaotic map

Nowadays poor security, low transmission and storage efficiency of images have become serious concerns. In order to improve the situation, this paper put forward a new image lossless compression joint encryption algorithm based on chaotic map with all original information intact. The lossless compression uses SPIHT(Set Partitioning in Hierarchical Trees) encoding method based on integer wavelet transform, and encrypt multiple rounds in the process of wavelet coefficients and SPIHT coding applying many kinds of chaotic maps. Experimental results show that the compressed file size is about 50 % of the original file size, which achieves relatively good lossless compression ratio. Besides, the encryption method passes many security tests, such as sensitivity test, entropy test, autocorrelation test, NIST SP800–22 test. There is a high application value in the medical field and the national security department whose image files require a relatively high quality.

[1]  Xiaobo Li,et al.  Image compression and encryption using tree structures , 1997, Pattern Recognit. Lett..

[2]  Chin-Chen Chang,et al.  A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting , 2014, IEEE Transactions on Image Processing.

[3]  Shiguo Lian,et al.  Perceptual cryptography on SPIHT compressed images or videos , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[4]  R. Povinelli,et al.  Analyzing Logistic Map Pseudorandom Number Generators for Periodicity Induced by Finite Precision Floating-Point Representation , 2012 .

[5]  Xinpeng Zhang,et al.  Compression of encrypted images with multi-layer decomposition , 2013, Multimedia Tools and Applications.

[6]  Chin-Chen Chang,et al.  Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism , 2013, Signal Process..

[7]  邓家先 Deng Jia-xian,et al.  Image Joint Compression-encryption Algorithm Based on Improved Zero-tree Coding , 2013 .

[8]  M. Hénon,et al.  A two-dimensional mapping with a strange attractor , 1976 .

[9]  Wen-Wei Lin,et al.  Randomness Enhancement Using Digitalized Modified Logistic Map , 2010, IEEE Transactions on Circuits and Systems II: Express Briefs.

[10]  William J. Leighton,et al.  Information security: An overview , 1988, AT&T Technical Journal.

[11]  I. Daubechies Orthonormal bases of compactly supported wavelets , 1988 .

[12]  Du Wei-na New Generation of Still Image Coding System -JPEG2000 , 2002 .

[13]  I. Daubechies,et al.  Wavelet Transforms That Map Integers to Integers , 1998 .

[14]  I. Daubechies,et al.  Biorthogonal bases of compactly supported wavelets , 1992 .

[15]  Xinpeng Zhang,et al.  Effective reversible data hiding in encrypted image with privacy protection for image content , 2015, J. Vis. Commun. Image Represent..

[16]  Camel Tanougast,et al.  A new image crypto-compression system SPIHT-PSCS , 2014, 2014 International Conference on Control, Decision and Information Technologies (CoDIT).

[17]  Malla Reddy,et al.  A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image in painting , 2015 .

[18]  Zhiquan Wang,et al.  Chaotic secure image coding based on SPIHT , 2008, ICC 2008.

[19]  Byunghoo Jung,et al.  Phase Frequency Detector With Minimal Blind Zone for Fast Frequency Acquisition , 2010, IEEE Transactions on Circuits and Systems II: Express Briefs.

[20]  William A. Pearlman,et al.  A new, fast, and efficient image codec based on set partitioning in hierarchical trees , 1996, IEEE Trans. Circuits Syst. Video Technol..

[21]  John J. Trinckes Information Security Overview , 2009 .

[22]  Qiang Zhang,et al.  Encrypting the compressed image by chaotic map and arithmetic coding , 2014 .

[23]  Yaobin Mao,et al.  Chaotic secure image coding based on SPIHT , 2008, 2008 Third International Conference on Communications and Networking in China.

[24]  Jia ZhiGang,et al.  A fast image compression algorithm based on SPIHT , 2009, 2009 4th IEEE Conference on Industrial Electronics and Applications.