Image encryption and compression based on the generalized knight’s tour, discrete cosine transform and chaotic maps

An efficient and simple encryption and compression scheme for digital image is reported in this paper. This scheme is based on the algorithm of the generalized knight’s tour, discrete cosine transform and non-linear chaotic maps. In this scheme, according to the structure of compression, confusion and diffusion are attained by methods of the generalized knight’s tour and chaotic maps. Firstly, the generalized knight’s tour algorithm is utilized to scramble the pixels while the data correlation preserved. Then, the chaotic system is used to generate a pseudorandom permutation to encrypt the part of coefficients from discrete cosine transform for diffusion. Experimental results show that the proposed scheme can gain robust security and a high compression ratio, which indicates that the proposed scheme is practicable.

[1]  C.-C. Jay Kuo,et al.  On the security of a secure Lempel-Ziv-Welch (LZW) algorithm , 2011, 2011 IEEE International Conference on Multimedia and Expo.

[2]  Guanrong Chen,et al.  Cryptanalysis of an image encryption scheme , 2006, J. Electronic Imaging.

[3]  Sen Bai,et al.  Generalized knight's tour on 3D chessboards , 2010, Discret. Appl. Math..

[4]  Di Xiao,et al.  GLS coding based security solution to JPEG with the structure of aggregated compression and encryption , 2014, Commun. Nonlinear Sci. Numer. Simul..

[5]  Rengarajan Amirtharajan,et al.  Horse Riding & Hiding in Image for Data Guarding , 2012 .

[6]  Enrico Magli,et al.  Multimedia Selective Encryption by Means of Randomized Arithmetic Coding , 2006, IEEE Transactions on Multimedia.

[7]  Zhi-liang Zhu,et al.  A New Hyper-Chaos Generated from Chen's System via an External Periodic Perturbation , 2009, 2009 International Workshop on Chaos-Fractals Theories and Applications.

[8]  Kwok-Wo Wong,et al.  A chaos-based joint image compression and encryption scheme using DCT and SHA-1 , 2011, Appl. Soft Comput..

[9]  Kamlesh Gupta,et al.  Novel Approach for fast Compressed Hybrid color image Cryptosystem , 2012, Adv. Eng. Softw..

[10]  Shiguo Lian,et al.  A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system , 2012, J. Syst. Softw..

[11]  K. P. Subbalakshmi,et al.  Cryptanalysis of Some Multimedia Encryption Schemes , 2008, IEEE Transactions on Multimedia.

[12]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[13]  C.-C. Jay Kuo,et al.  Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.

[14]  Anish Philip A Generalized Pseudo-Knight?s Tour Algorithm for Encryption of an Image , 2013, IEEE Potentials.

[15]  Gabriel Nivasch Experimental Results on Hamiltonian-Cycle-Finding Algorithms , 2003 .

[16]  Oscar C. Au,et al.  Comments on "A Novel Compression and Encryption Scheme Using Variable Model Arithmetic Coding and Coupled Chaotic System" , 2008, IEEE Trans. Circuits Syst. I Regul. Pap..

[17]  V. Scott Gordon,et al.  The knight's tour - evolutionary vs. depth-first search , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[18]  Bai Sen,et al.  A novel algorithm for scrambling the details of digital image , 2002, Proceedings of the 4th World Congress on Intelligent Control and Automation (Cat. No.02EX527).

[19]  Kwok-Wo Wong,et al.  Breaking an image compression and encryption scheme based on Chinese Remainder Theorem , 2013, ArXiv.

[20]  Kwok-Wo Wong,et al.  Embedding Compression in Chaos-Based Cryptography , 2008, IEEE Transactions on Circuits and Systems II: Express Briefs.

[21]  Yuan Yan Tang,et al.  Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation , 2014, IEEE Transactions on Information Forensics and Security.

[22]  Hyungjin Kim,et al.  Binary arithmetic coding with key-based interval splitting , 2006, IEEE Signal Processing Letters.

[23]  Sen Bai,et al.  Generalized Knight's Tour Problem and Its Solutions Algorithm , 2006, 2006 International Conference on Computational Intelligence and Security.

[24]  Oscar C. Au,et al.  Adaptive Chosen-Ciphertext Attack on Secure Arithmetic Coding , 2009, IEEE Transactions on Signal Processing.

[25]  Oscar C. Au,et al.  Security Analysis of Multimedia Encryption Schemes Based on Multiple Huffman Table , 2007, IEEE Signal Processing Letters.

[26]  Kwok-Wo Wong,et al.  A Modified Chaos-Based Joint Compression and Encryption Scheme , 2011, IEEE Transactions on Circuits and Systems II: Express Briefs.