Advertisement

Multimedia Tools and Applications

, Volume 74, Issue 24, pp 11255–11279 | Cite as

A new algorithm of image compression and encryption based on spatiotemporal cross chaotic system

  • Miao Zhang
  • Xiaojun Tong
Article

Abstract

This paper proposes a new image compression and encryption scheme based on the nearest-neighboring coupled-map lattices (NCML) and Non-uniform Discrete Cosine Transform (NDCT). A new cross chaotic map proposed based on Devaney’s theory is used as the local map of NCML, which is called spatiotemporal cross chaotic system. The algorithm adopts Huffman coding and NDCT which carries out transformation of image data to compress image data. In this system, there are two layers of encryption protection. The compression data are packed into blocks, and permutation between blocks and diffusion in blocks are done simultaneously. The parameters produced by spatiotemporal cross chaotic system are used to control the non-uniformity of the NDCT, which has also played a role in encryption. The security test results indicate the proposed methods have high speed, high security and good compression effect.

Keywords

Image compression and encryption Non-uniform Discrete Cosine Transform (NDCT) Nearest-neighboring coupled-map lattices (NCML) Permutation and diffusion simultaneously 

Notes

Acknowledgments

This research is supported by the National Natural Science Foundation of China (No.60973162), the Science and Technology of Shandong Province of China (No.2013GGX10129, No.2010GGX10132, No.2012GGX10110), the Soft Science of Shandong Province of China (No. 2012RKA10009) and the National Cryptology Development Foundation of China (No.MMJJ201301006), the Teaching Research Project of Harbin Institute of Technology at Weihai and college of computer (NO. HITWHCS201309), and the Engineering Technology and Research Center of Weihai Information Security.

References

  1. 1.
    Behnia S, Akshshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos Solitons Fractals 35(2):408–419MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Chen GR, Mao YB, Charles KC (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3):749–761MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Chung KL, Liu YW, Yan WM (2006) A hybrid gray image representation using spatial and DCT based approach with application to moment computation. J Vis Commun Image Represent 17(6):1209–1226CrossRefGoogle Scholar
  4. 4.
    Curtis KM, Neil G, Fotopoulos V (2002) A hybrid fractal DCT image compression method. 14th Int Conf Digit Signal Proc 2:1337–1340Google Scholar
  5. 5.
    Dai CL, Bao WY (2012) Logistic map controlled secure arithmetic coding and its application in image encryption. J Chongqing Univ 35(8):87–91Google Scholar
  6. 6.
    Deng Y, Zhao XF, Feng DG (2010) Quantization index modulation steganography based on the nonuniform DCT. J Electron Inf Technol 32(2):323–328CrossRefGoogle Scholar
  7. 7.
    Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(6):1259–1284MathSciNetCrossRefzbMATHGoogle Scholar
  8. 8.
    Ge X, Liu FL, Lu B, Wang W, Chen J (2010) An image encryption algorithm based on spatiotemporal chaos in DCT domain, The 2nd IEEE International Conference on Information Management and Engineering 267–270Google Scholar
  9. 9.
    Grangetto M, Magli E, Olmo G (2006) Multimedia selective encryption by means of randomized arithmetic coding. IEEE Trans Multimed 8(5):905–917CrossRefGoogle Scholar
  10. 10.
    Han FY, Zhu CX (2007) One kid based on double dimensional chaos system picture encryption algorithm. Comput Eng Appl 43:50–51Google Scholar
  11. 11.
    Huang X (2011) Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn 67:2411–2417CrossRefGoogle Scholar
  12. 12.
    Jakimoski G, Subbalakshmi K (2008) Cryptanalysis of some multimedia encryption schemes. IEEE Trans Multimed 10(3):330–338CrossRefGoogle Scholar
  13. 13.
    Kaneko K (1985) Spatiotemporal intermittency in coupled map lattices. Prog Theor Phys 74(5):1033CrossRefzbMATHGoogle Scholar
  14. 14.
    Kaneko K (1989) Pattern dynamics in spatiotemporal chaos: pattern selection, diffusion of defect and pattern competition intermittency. Phys D 34(1–2):1–41MathSciNetCrossRefzbMATHGoogle Scholar
  15. 15.
    Kanso A (2011) Self-shrinking chaotic stream ciphers. Commun Nonlinear Sci Numer Simul 16(2):822–836MathSciNetCrossRefzbMATHGoogle Scholar
  16. 16.
    Kim H, Wen J, Villasenor JD (2007) Secure arithmetic coding. IEEE Trans Signal Process 55(5):2263–2272MathSciNetCrossRefGoogle Scholar
  17. 17.
    Kingston A, Autrusseau F (2008) Lossless image compression via predictive coding of discrete Radon projections. Signal Process Image Commun 23(4):313–324CrossRefGoogle Scholar
  18. 18.
    Krikor L, Baba S, Arif T, Shaaban Z (2009) Image encryption using DCT and stream cipher. Eur J Sci Res 32(1):47–57Google Scholar
  19. 19.
    Lian SG (2009) Efficient image or video encryption based on spatiotemporal chaos system. Chaos Solitons Fractals 40(5):2509–2519CrossRefzbMATHGoogle Scholar
  20. 20.
    Liu X, Farrell P, Boyd C (1999) A unified code. Cryptogr Coding Lect Notes Comput Sci 1746:84–93MathSciNetCrossRefGoogle Scholar
  21. 21.
    Lu K, Sun JH, OuYang RB, Huan YL (1990) Chaotic dynamics. Shanghai Translation Press, ShanghaiGoogle Scholar
  22. 22.
    Matthews R (1989) On the derivation of a “chaotic” encryption algorithm. Cryptologia 13(1):29–42MathSciNetCrossRefGoogle Scholar
  23. 23.
    NIST (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications, Special Publication 800–22Google Scholar
  24. 24.
    Pincus S (1995) Approximate entropy (ApEn) as a complexity measure. Chaos 5(1):110–117MathSciNetCrossRefGoogle Scholar
  25. 25.
    Shi YQ, Sun HF (2008) Image and video compression for multimedia engineering: fundamentals, algorithms, and standards. CRC Press, Boca RatonCrossRefGoogle Scholar
  26. 26.
    Shnnon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715CrossRefGoogle Scholar
  27. 27.
    Sun FY, Lü ZW (2011) Digital image encryption with chaotic map lattices. Chin Phys B 20(4):040506CrossRefGoogle Scholar
  28. 28.
    Sun F, Lü Z, Liu S (2010) A new cryptosystem based on spatial chaotic system. Opt Commun 283:2066–2073CrossRefGoogle Scholar
  29. 29.
    Tang JN, Zhang XD, Zhao L, Zou C (2010) A novel arithmetic coding on data compression and encryption with asymptotic deterministic randomness, 2010 International Conference on Computer Application and System Modeling 2-10-2-14Google Scholar
  30. 30.
    Teng L, Wang XY (2012) A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive. Opt Commun 285:4048–4054CrossRefGoogle Scholar
  31. 31.
    Tong XJ (2012) The novel bilateral-Diffusion image encryption algorithm with dynamical compound chaos. J Syst Softw 85:850–858CrossRefGoogle Scholar
  32. 32.
    Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612CrossRefGoogle Scholar
  33. 33.
    Wang SH, Kuang JY, Li JH, Luo YL, Lu HP, Hu G (2002) Chaos-based secure communication in a large community. Phys Rev E 66(6):1–4zbMATHGoogle Scholar
  34. 34.
    Wang K, Pei LH, Zou, Song AG, He ZY (2005) On the security of 3D Cat map based symmetric image encryption scheme. Phys Lett A 343:432–439CrossRefzbMATHGoogle Scholar
  35. 35.
    Wang XY, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92:1101–1108CrossRefGoogle Scholar
  36. 36.
    Wang Y, Wong KW, Liao XF, Chen GR (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11:514–522CrossRefGoogle Scholar
  37. 37.
    Wen J, Kim H, Villasenor J (2006) Binary arithmetic coding with keybased interval splitting. IEEE Signal Process Lett 13(2):69–72CrossRefGoogle Scholar
  38. 38.
    Wong KW, Yuen CH (2008) Embedding compression in chaos-based cryptography. IEEE Trans Circ Syst II: Express Briefs 55(11):1193–1197CrossRefGoogle Scholar
  39. 39.
    Wu CP, Kuo CCJ (2005) Design of integrated multimedia compression and encryption systems. IEEE Trans Multimed 7(5):828–839CrossRefGoogle Scholar
  40. 40.
    Yang HQ, Liao XF, Wong K-W, Zhang W, Wei PC (2012) SPIHT-based joint image compression and encryption. Acta Phys Sin 61(4):040505-1–040505-8Google Scholar
  41. 41.
    Yuen CH, Wong KW (2011) A chaos-based joint image compression and encryption scheme using DCT and SHA-1. Appl Soft Comput 11:5092–5098CrossRefGoogle Scholar
  42. 42.
    Zhou J, Liang Z, Chen Y, Au OC (2007) Security analysis of multimedia encryption schemes based on multiple Huffman table. IEEE Signal Process Lett 14(3):201–204CrossRefGoogle Scholar
  43. 43.
    Zhou Q, Liao X (2012) Collision-based flexible image encryption algorithm. J Syst Softw 85:400–407CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  1. 1.School of Computer Science and TechnologyHarbin Institute of TechnologyWeihaiPeople’s Republic of China

Personalised recommendations