Skip to main content
Erschienen in: Neural Computing and Applications 16/2020

18.01.2020 | Original Article

Subdata image encryption scheme based on compressive sensing and vector quantization

verfasst von: Haiju Fan, Kanglei Zhou, En Zhang, Wenying Wen, Ming Li

Erschienen in: Neural Computing and Applications | Ausgabe 16/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

An advanced image encryption scheme should equip the capability against malicious attacks, reduce the losses under attacks, and improve the compression rate tremendously due to the unsafe network environment and the limited bandwidth resources. Recently, compressive sensing (CS) has been introduced into image encryption schemes because of the merit of low sampling rate. However, these schemes still cannot address the above requirements well. In order to improve compression rate while providing higher security level, a novel subdata image cryptosystem is proposed by introducing vector quantization (VQ) into CS-based encryption scheme. The plaintext image is first divided into VQ index blocks and the error compensations that are sparse enough to be compressed by CS. Then, the index information and CS measurements are further scrambled and diffused by chaotic sequences to achieve enhanced security. It can be ensured that the primary index information is informative and occupies smaller proportion of cipher image such that it cannot be easily tampered if only a part of the image is attacked. In contrast, the secondary error information is a good supplement to the former and occupies larger proportion. Simulation results verify that our proposed scheme has overwhelming compression rate and security effect to resist malicious attacks when compared with the state-of-art schemes. In addition, even if the important information is damaged, the destroyed pixels can be located and the plaintext image can be reconstructed with VQ neighbor indexes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhang YS, Wen WY, Wu YF, Zhang R, Chen JX, He X (2017) Deciphering an RGB color image cryptosystem based on Choquet fuzzy integral. Neural Comput Appl 28(1):165–169CrossRef Zhang YS, Wen WY, Wu YF, Zhang R, Chen JX, He X (2017) Deciphering an RGB color image cryptosystem based on Choquet fuzzy integral. Neural Comput Appl 28(1):165–169CrossRef
2.
Zurück zum Zitat Liu X, Liu W, Ma H, Fu H (2016) Large-scale vehicle re-identification in urban surveillance videos. In: 2016 IEEE international conference on multimedia and expo (ICME), pp 1–6 Liu X, Liu W, Ma H, Fu H (2016) Large-scale vehicle re-identification in urban surveillance videos. In: 2016 IEEE international conference on multimedia and expo (ICME), pp 1–6
4.
Zurück zum Zitat Zhang YQ, He Y, Wang XY (2018) Spatiotemporal chaos in mixed linear-nonlinear two-dimensional coupled logistic map lattice. Phys A 490(2018):148–160MathSciNetCrossRef Zhang YQ, He Y, Wang XY (2018) Spatiotemporal chaos in mixed linear-nonlinear two-dimensional coupled logistic map lattice. Phys A 490(2018):148–160MathSciNetCrossRef
5.
Zurück zum Zitat Zhang YQ, Wang XY, Liu LY, He Y, Liu J (2017) Spatiotemporal chaos of fractional order logistic equation in nonlinear coupled lattices. Commun Nonlinear Sci Numer Simulat 52(2017):52–61MathSciNet Zhang YQ, Wang XY, Liu LY, He Y, Liu J (2017) Spatiotemporal chaos of fractional order logistic equation in nonlinear coupled lattices. Commun Nonlinear Sci Numer Simulat 52(2017):52–61MathSciNet
7.
Zurück zum Zitat Zhang YQ, Wang XY, Liu J, Chi ZL (2016) An image encryption scheme based on the MLNCML system using DNA sequences. Opt Lasers Eng 82(2016):95–103CrossRef Zhang YQ, Wang XY, Liu J, Chi ZL (2016) An image encryption scheme based on the MLNCML system using DNA sequences. Opt Lasers Eng 82(2016):95–103CrossRef
8.
Zurück zum Zitat Ping P, Xu F, Mao YC, Wang ZJ (2017) Designing permutation-substitution image encryption networks with Henon map. Neurocomputing 283:53–63CrossRef Ping P, Xu F, Mao YC, Wang ZJ (2017) Designing permutation-substitution image encryption networks with Henon map. Neurocomputing 283:53–63CrossRef
10.
Zurück zum Zitat Xing Y, Pesquet-Popescu B, Dufaux F (2013) Vector quantization for computer generated phase-shifting holograms. In: 2013 Asilomar conference on signals, systems & computers, pp 709–713 Xing Y, Pesquet-Popescu B, Dufaux F (2013) Vector quantization for computer generated phase-shifting holograms. In: 2013 Asilomar conference on signals, systems & computers, pp 709–713
11.
Zurück zum Zitat Yan B, Bai S (2017) Design of image confusion-diffusion cryptosystem based on vector quantization and cross chaotic map. In: 2nd international conference on image, vision and computing, pp 639–644 Yan B, Bai S (2017) Design of image confusion-diffusion cryptosystem based on vector quantization and cross chaotic map. In: 2nd international conference on image, vision and computing, pp 639–644
12.
Zurück zum Zitat Zhang Y, Zhang LY (2015) Exploiting random convolution and random subsampling for image encryption and compression. Electron Lett 51(20):1572–1574CrossRef Zhang Y, Zhang LY (2015) Exploiting random convolution and random subsampling for image encryption and compression. Electron Lett 51(20):1572–1574CrossRef
13.
Zurück zum Zitat Candès EJ, Tao T (2004) Near-optimal signal recovery from random projections: universal encoding strategies? IEEE Trans Inf Theory 52(12):5406–5425MathSciNetMATHCrossRef Candès EJ, Tao T (2004) Near-optimal signal recovery from random projections: universal encoding strategies? IEEE Trans Inf Theory 52(12):5406–5425MathSciNetMATHCrossRef
14.
Zurück zum Zitat Zhou NR, Zhang AD, Wu JH, Pei DJ, Yang YX (2014) Novel hybrid image compression–encryption algorithm based on compressive sensing. Optik 125(18):5075–5080CrossRef Zhou NR, Zhang AD, Wu JH, Pei DJ, Yang YX (2014) Novel hybrid image compression–encryption algorithm based on compressive sensing. Optik 125(18):5075–5080CrossRef
15.
Zurück zum Zitat George SN, Pattathil DP (2014) A secure LFSR based random measurement matrix for compressive sensing. Sens Imaging 15(1):1–29CrossRef George SN, Pattathil DP (2014) A secure LFSR based random measurement matrix for compressive sensing. Sens Imaging 15(1):1–29CrossRef
16.
Zurück zum Zitat George SN, Pattathil DP (2014) A novel approach for secure compressive sensing of images using multiple chaotic maps. J Optics-Uk 43(1):1–17CrossRef George SN, Pattathil DP (2014) A novel approach for secure compressive sensing of images using multiple chaotic maps. J Optics-Uk 43(1):1–17CrossRef
17.
Zurück zum Zitat Zhou NR, Pan SM, Cheng S, Zhou ZH (2016) Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121–133CrossRef Zhou NR, Pan SM, Cheng S, Zhou ZH (2016) Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121–133CrossRef
18.
Zurück zum Zitat Liu XB, Mei WB, Du HQ (2016) Simultaneous image compression, fusion and encryption algorithm based on compressive sensing and chaos. Opt Commun 366:22–32CrossRef Liu XB, Mei WB, Du HQ (2016) Simultaneous image compression, fusion and encryption algorithm based on compressive sensing and chaos. Opt Commun 366:22–32CrossRef
20.
Zurück zum Zitat Fan HJ, Li M, Mao WT (2017) VQ-based compressive sensing with high compression quality. Electron Lett 53(17):1196–1198CrossRef Fan HJ, Li M, Mao WT (2017) VQ-based compressive sensing with high compression quality. Electron Lett 53(17):1196–1198CrossRef
21.
Zurück zum Zitat Kasat NR, Thepade SD (2016) Novel content based image classification method using lbg vector quantization method with bayes and lazy family data mining classifiers. Procedia Comput Sci 79:483–489CrossRef Kasat NR, Thepade SD (2016) Novel content based image classification method using lbg vector quantization method with bayes and lazy family data mining classifiers. Procedia Comput Sci 79:483–489CrossRef
22.
Zurück zum Zitat Candès EJ, Romberg J, Tao T (2006) Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans Inf Theory 52(2):489–509MathSciNetMATHCrossRef Candès EJ, Romberg J, Tao T (2006) Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans Inf Theory 52(2):489–509MathSciNetMATHCrossRef
23.
Zurück zum Zitat Orsdemir A, Altun H, Sharma G, Bocko M (2008) On the security and robustness of encryption via compressed sensing. In: 2008 military communications conference, pp 1–7 Orsdemir A, Altun H, Sharma G, Bocko M (2008) On the security and robustness of encryption via compressed sensing. In: 2008 military communications conference, pp 1–7
24.
Zurück zum Zitat Huang R, Rhee K, Uchida S (2014) A parallel image encryption method based on compressive sensing. Multimed Tools Appl 72(1):71–93CrossRef Huang R, Rhee K, Uchida S (2014) A parallel image encryption method based on compressive sensing. Multimed Tools Appl 72(1):71–93CrossRef
26.
Zurück zum Zitat Khade PN, Narnaware M (2012) 3D chaotic functions for image encryption. Int J Comput Sci Issues (IJCSI) 9(3):323–328 Khade PN, Narnaware M (2012) 3D chaotic functions for image encryption. Int J Comput Sci Issues (IJCSI) 9(3):323–328
27.
Zurück zum Zitat Zhang YQ, Wang XY (2014) Spatiotemporal chaos in mixed linear–nonlinear coupled logistic map lattice. Phys A 402(2014):104–118MathSciNetMATH Zhang YQ, Wang XY (2014) Spatiotemporal chaos in mixed linear–nonlinear coupled logistic map lattice. Phys A 402(2014):104–118MathSciNetMATH
28.
Zurück zum Zitat Liu H, Wen F, Kadir A (2019) Construction of a new 2D Chebyshev-Sine map and its application to color image encryption. Multimed Tools Appl 78(12):15997–16010CrossRef Liu H, Wen F, Kadir A (2019) Construction of a new 2D Chebyshev-Sine map and its application to color image encryption. Multimed Tools Appl 78(12):15997–16010CrossRef
29.
Zurück zum Zitat Liu H, Kadir A, Sun X (2017) Chaos-based fast colour image encryption scheme with true random number keys from environmental noise. IET Image Process 11(5):324–332CrossRef Liu H, Kadir A, Sun X (2017) Chaos-based fast colour image encryption scheme with true random number keys from environmental noise. IET Image Process 11(5):324–332CrossRef
30.
Zurück zum Zitat Parvin Z, Seyedarabi H, Shamsi M (2016) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed Tools Appl 75(17):10631–10648CrossRef Parvin Z, Seyedarabi H, Shamsi M (2016) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed Tools Appl 75(17):10631–10648CrossRef
33.
Zurück zum Zitat Wang Q, Li D, Shen Y (2016) Intelligent nonconvex compressive sensing using prior information for image reconstruction by sparse representation. Neurocomputing 224:71–81CrossRef Wang Q, Li D, Shen Y (2016) Intelligent nonconvex compressive sensing using prior information for image reconstruction by sparse representation. Neurocomputing 224:71–81CrossRef
34.
Zurück zum Zitat Zhang LY, Wong KW, Zhang Y, Zhou J (2016) Bi-level protected compressive sampling. IEEE Trans Multimedia 18(9):1720–1732CrossRef Zhang LY, Wong KW, Zhang Y, Zhou J (2016) Bi-level protected compressive sampling. IEEE Trans Multimedia 18(9):1720–1732CrossRef
35.
Zurück zum Zitat Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci 273(2014):329–351CrossRef Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci 273(2014):329–351CrossRef
36.
Zurück zum Zitat Wang XY, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108MathSciNetCrossRef Wang XY, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108MathSciNetCrossRef
37.
Zurück zum Zitat Wang XY, Liu LT, Zhang YQ (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18CrossRef Wang XY, Liu LT, Zhang YQ (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18CrossRef
38.
Zurück zum Zitat Hua ZY, Zhou YC, Pun CM, Chen CLP (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94CrossRef Hua ZY, Zhou YC, Pun CM, Chen CLP (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94CrossRef
39.
Zurück zum Zitat Li C, Lin D, Feng B, Lü J (2018) Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6:75834–75842CrossRef Li C, Lin D, Feng B, Lü J (2018) Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6:75834–75842CrossRef
40.
Zurück zum Zitat Zhang YQ, Wang XY (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlin Dyn 77(3):687–698CrossRef Zhang YQ, Wang XY (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlin Dyn 77(3):687–698CrossRef
41.
Zurück zum Zitat Zhang Y, Zhou J, Chen F, Zhang LY, Xiao D, Chen B, Liao X (2016) A block compressive sensing based scalable encryption framework for protecting significant image regions. Int J Bifurcat Chaos 26(11):1234–1247MATH Zhang Y, Zhou J, Chen F, Zhang LY, Xiao D, Chen B, Liao X (2016) A block compressive sensing based scalable encryption framework for protecting significant image regions. Int J Bifurcat Chaos 26(11):1234–1247MATH
Metadaten
Titel
Subdata image encryption scheme based on compressive sensing and vector quantization
verfasst von
Haiju Fan
Kanglei Zhou
En Zhang
Wenying Wen
Ming Li
Publikationsdatum
18.01.2020
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 16/2020
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-020-04724-x

Weitere Artikel der Ausgabe 16/2020

Neural Computing and Applications 16/2020 Zur Ausgabe

Premium Partner