Skip to main content
Log in

Visual image encryption scheme based on inter-intra-block scrambling and weighted diffusion

  • Original article
  • Published:
The Visual Computer Aims and scope Submit manuscript

Abstract

This paper presents an image encryption scheme with data and appearance security, by adopting inter-intra-block scrambling and weighted diffusion. The 2D robust hyper-chaotic map with flexible geometric distribution and rich hyper-chaotic parameter space is employed to generate the key stream for encryption, by considering the characteristics of plaintext. The plain image is first preprocessed by Huffman coding for getting compressed image. Then, the compressed image is divided into four sub-blocks and is further permuted by the designed inter-intra-block scrambling scheme, which can improve the scrambling effect by making the pixel far away from the original adjacent pixels. After that, a weighted diffusion method strongly related to plaintext and key stream is introduced to diffuse the shuffled image to obtain the noise-like cipher image. And in pursuit of higher security, the meaningless noise-like image is embedded into host image to create the visually meaningful cipher image. A series of experiment tests and analyses are carried out to further demonstrate the excellent performances of the encryption scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Peng, F., Long, B., Long, M.: A general region nesting based semi-fragile reversible watermarking for authenticating 3D mesh models. IEEE Trans. Circuits Syst. Video Technol. 31, 4538–4553 (2021)

    Google Scholar 

  2. Fang, P., Liu, H., Wu, C., Liu, M.: A survey of image encryption algorithms based on chaotic system. Vis. Comput. (2022). https://doi.org/10.1007/s00371-022-02459-5

    Article  Google Scholar 

  3. Liao, Q., Liu, H.: Quantum secret sharing using discretely modulated coherent states. Phys. Rev. A 103, 032410 (2021)

    MathSciNet  Google Scholar 

  4. Liao, X., Yin, J.J., Chen, M.L., Qin, Z.: Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Trans. Depend Secure 19, 897–911 (2022)

    Google Scholar 

  5. Chen, S., Li, Z., Tang, Z.: Relation R-CNN: a graph based relation-aware network for object detection. IEEE Signal Process. Lett. 27, 1680–1684 (2020)

    Google Scholar 

  6. Kumar, R., Quan, C.: Asymmetric multi-user optical cryptosystem based on polar decomposition and shearlet transform. Opt. Lasers Eng. 120, 118–126 (2019)

    Google Scholar 

  7. Yao, H., Mao, F., Qin, C., Tang, Z.: Dual-JPEG-image reversible data hiding. Inf. Sci. 563, 130–149 (2021)

    MathSciNet  Google Scholar 

  8. Mou, J., Yang, F., Chu, R., Cao, Y.: Image compression and encryption algorithm based on hyper-chaotic map. Mobile Netw. Appl. 26, 1849–1861 (2021)

    Google Scholar 

  9. Hanis, S., Amutha, R.: Double image compression and encryption scheme using logistic mapped convolution and cellular automata. Multimed Tools Appl. 77, 6897–6912 (2018)

    Google Scholar 

  10. Ma, Y., Li, C., Ou, B.: Cryptanalysis of an image block encryption algorithm based on chaotic maps. J. Inf. Secur. Appl. 54, 102566 (2020)

    Google Scholar 

  11. Liu, H., Kadir, A., Xu, C.: Color image encryption with cipher feedback and coupling chaotic map. J. Inf. Secur. Appl. 30, 2050173 (2020)

    MathSciNet  Google Scholar 

  12. Tan, F., Xu, S., Li, Y., et al.: Adaptive quantitative control for robust H∞ synchronization between multiplex neural networks under stochastic cyber attacks. Neurocomputing. 493, 129–142 (2022)

    Google Scholar 

  13. Xu, J., Mou, J., Liu, J., Hao, J.: The image compression-encryption algorithm based on the compression sensing and fractional-order chaotic system. Vis. Comput. 38, 1509–1526 (2022)

    Google Scholar 

  14. Li, C.L., Zhou, Y., Li, H.M., Feng, W., Du, J.R.: Image encryption scheme with bit-level scrambling and multiplication diffusion. Multimed Tools Appl. 80, 18479–18501 (2021)

    Google Scholar 

  15. Bhanot, R., Hans, R.: A review and comparative analysis of various encryption algorithms. Int. J. Secur. Appl. 9(4), 289–306 (2015)

    Google Scholar 

  16. Hanis, S., Amutha, R.: A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure. Nonlinear Dyn. 95, 421–432 (2019)

    Google Scholar 

  17. Levins, R.: The strategy of model building in population biology. Am. Sci. 54(4), 421–431 (1966)

    Google Scholar 

  18. Borges, E.P., Tsallis, C., Añaños, G.F.J., et al.: Nonequilibrium probabilistic dynamics of the logistic map at the edge of chaos. Phys. Rev. Lett. 89(25), 254103 (2002)

    Google Scholar 

  19. Wang, X., Yu, J., Jin, C., Iu, H., Yu, S.: Chaotic oscillator based on memcapacitor and meminductor. Nonlinear Dyn. 96, 161–173 (2019)

    Google Scholar 

  20. Li, H.D., Li, C.L., Du, J.R.: Discretized locally active memristor and application in logarithmic map. Nonlinear Dyn. (2022). https://doi.org/10.1007/s11071-022-07955-w

    Article  Google Scholar 

  21. Li, C.Q., Tan, K., Feng, B.B., Lü, J.H.: The graph structure of the generalized discrete Arnold’s Cat map. IEEE Trans. Comput. 71(2), 364–377 (2022)

    Google Scholar 

  22. Annaby, M.H., Rushdi, M.A., Nehary, E.A.: Color image encryption using random transforms, phase retrieval, chaotic maps, and diffusion. Opt. Lasers Eng. 103, 9–23 (2017)

    Google Scholar 

  23. Yang, F., Mou, J., Ma, C.: Dynamic analysis of an improper fractional-order laser chaotic system and its image encryption application. Opt. Lasers Eng. 129, 106031 (2020)

    Google Scholar 

  24. Zhou, M., Wang, C.H.: A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks. Signal Process. 171, 107484 (2020)

    Google Scholar 

  25. Cao, C., Sun, K., Liu, W.: A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process. 143, 122–133 (2018)

    Google Scholar 

  26. Pak, C., An, K., Jang, P.: A novel bit-level color image encryption using improved 1D chaotic map. Multimed Tools Appl. 78, 12027–12042 (2019)

    Google Scholar 

  27. Zhou, Y., Li, C.L., Li, W., Li, H.M., Feng, W., Qian, K.: Image encryption algorithm with circle index table scrambling and partition diffusion. Nonlinear Dyn. 103, 2043–2061 (2021)

    Google Scholar 

  28. Hu, J., Liao, X., Wang, W., Qin, Z.: Detecting compressed Deepfake video in social networks using frame-temporality two-stream convolutional network. IEEE Trans. Circuits Syst. Video Technol. (2021). https://doi.org/10.1109/TCSVT.2021.3074259

    Article  Google Scholar 

  29. Li, C.L., Li, Z.Y., Feng, W., Tong, Y.N., Du, J.R., Wei, D.Q.: Dynamical behavior and image encryption application of a memristor-based circuit system. Int. J. Electron Commun. 110, 152861 (2019)

    Google Scholar 

  30. Luo, Y., Tang, S., Liu, J., Cao, L., Qiu, S.: Image encryption scheme by combining the hyper-chaotic system with quantum coding. Opt. Lasers Eng. 124, 105836 (2020)

    Google Scholar 

  31. Huo, D., Zhu, Z., Wei, L., Han, C., Zhou, X.: A visually secure image encryption scheme based on 2d compressive sensing and integer wavelet transform embedding. Opt. Commun. 492, 126976 (2021)

    Google Scholar 

  32. Long, B., Zhou, Y.C.: Image encryption: Generating visually meaningful encrypted images. Inf. Sci. 324, 197–207 (2015)

    MathSciNet  Google Scholar 

  33. Yang, Y.G., Wang, B.P., Yang, Y.L.: Visually meaningful image encryption based on universal embedding model. Inf. Sci. 256, 304–324 (2021)

    MathSciNet  Google Scholar 

  34. Kanso, A., Ghebleh, M.: An algorithm for encryption of secret images into meaningful images. Opt. Lasers Eng. 90, 196–208 (2017)

    Google Scholar 

  35. Ye, G.D.: Visually meaningful image encryption scheme based on DWT and Schur decomposition. Secur. Commun. Netw. 2021, 1–16 (2021)

    Google Scholar 

  36. Chai, X.L., Gan, Z.H., Chen, Y.R.: A visually secure image encryption scheme based on compressive sensing. Signal Process. 134, 35–51 (2016)

    Google Scholar 

  37. Zhu, L., Song, H., Zhang, X., Yan, M., Xu, J.: A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding. Signal Process. 175, 107629 (2020)

    Google Scholar 

  38. Ponuma, R., Amutha, R., Aparna, S., Gopal, G.: Visually meaningful image encryption using data hiding and chaotic compressive sensing. Multimed. Tools Appl. 78, 25707–25729 (2019)

    Google Scholar 

  39. Li, C.L., Chen, Z., Yang, X.B., He, S.B., Yang, Y.Y., Du, J.R.: Self-reproducing dynamics in a two-dimensional discrete map. Eur. Phys. J-Spec. Top. 230, 1959–1970 (2021)

    Google Scholar 

  40. Kerckhoffs A.: La cryptographie militaire. University Microfilms (1978)

  41. Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. J. Select Areas Telecommun. 1, 31–38 (2011)

    Google Scholar 

  42. Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos. Soliton Fract. 21, 749–761 (2004)

    MathSciNet  Google Scholar 

  43. Arroyo, D., Rhouma, R., Alvarez, G., Li, S., Fernandez, V.: On the security of a new image encryption scheme based on chaotic map lattices. Chaos. 18, 033112 (2008)

    Google Scholar 

  44. Yue, W., Yang, G., Jin, H.: Image encryption using the two-dimensional Logistic chaotic map. J. Electron Imaging. 21, 3014 (2012)

    Google Scholar 

  45. Chong, F., Lin, B.B., Miao, Y.S.: A novel chaos-based bit-level permutation scheme for digital image encryption. Opt. Commun. 284, 5415–5423 (2011)

    Google Scholar 

  46. Ye, G.D.: Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recognit. Lett. 31, 347–354 (2010)

    Google Scholar 

  47. Zhou, Y., Bao, L., Chen, C.L.: Image encryption using a new parametric switching chaotic system. Signal Process-Amsterdam. 93, 3039–3052 (2013)

    Google Scholar 

  48. Feng, W., He, Y.G., Li, H.M., Li, C.L.: Image encryption algorithm based on discrete logarithm and memristive chaotic system. Eur. Phys. J-Spec. Top. 228, 1951–1967 (2019)

    Google Scholar 

  49. Liu, W., Sun, K., Zhu, C.: A fast image encryption algorithm based on chaotic map. Opt. Lasers Eng. 84, 26–36 (2016)

    Google Scholar 

  50. Zhou, Y., Bao, L., Chen, C.L.: A new 1D chaotic system for image encryption. Signal Process. 97, 172–182 (2014)

    Google Scholar 

  51. Wu, Y., Zhou, Y., Noonan, J.P.: Design of image cipher using Latin squares. Inf. Sci. 264, 317–339 (2014)

    MathSciNet  Google Scholar 

  52. Wang, X., Zhu, X., Zhang, Y.: An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access. 6, 23733–23746 (2018)

    Google Scholar 

  53. Brindha, M., Gounden, N.A.: A chaos based image encryption and lossless compression algorithm using hash table and Chinese Remainder Theorem. Appl. Soft. Comput. 40, 379–390 (2016)

    Google Scholar 

  54. Li, C.L., Li, H.M.: Multiple-image encryption by using robust chaotic map in wavelet transform domain. Optik. 171, 277–286 (2018)

    Google Scholar 

  55. Fy, A., Jm, A., Jian, L.B.: Characteristic analysis of the fractional-order hyperchaotic complex system and its image encryption application. Signal Process. 169, 107373 (2020)

    Google Scholar 

  56. Zhu, H., Zhao, Y., Song, Y.: 2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption. IEEE Access 7, 14081–14098 (2019)

    Google Scholar 

Download references

Funding

This study was funded by Science and Technology Program of Hunan Province (Grant No. 2019TP1014); Science and Research Creative Team of Hunan Institute of Science and Technology (Grant Number 2019-TD-10).

Author information

Authors and Affiliations

Authors

Contributions

CL made the theoretical guidance and writing for this paper. YZ carried out experiments and data analyzed. HL made a technical support for this paper. YZ designed and carried out experiments and data analyzed. Every author went over this manuscript carefully.

Corresponding author

Correspondence to Chunlai Li.

Ethics declarations

Conflict of interest

All authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, C., Zhang, Y., Li, H. et al. Visual image encryption scheme based on inter-intra-block scrambling and weighted diffusion. Vis Comput 40, 731–746 (2024). https://doi.org/10.1007/s00371-023-02812-2

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00371-023-02812-2

Keywords

Navigation