Skip to main content
Log in

Double verifiable image encryption based on chaos and reversible watermarking algorithm

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The integrity of image is the premise for various applications. The existing image encryption algorithms rarely have the function of verifying the integrity for the decrypted image. To cope with this problem, a novel double verifiable image encryption algorithm based on chaos and reversible watermarking is proposed. In the proposed scheme, the 256-bit hash of original image is firstly calculated and embedded into the pixel-level permutated image by histogram shifting based reversible watermarking, then image diffusion is conducted based on hyper-chaos. Lastly, the hash values of diffused image and original image are embedded into the diffused image itself using difference expansion based reversible watermarking, thus the verifiable encrypted image (VEI) is generated. The secret key of the algorithm depends on the image itself; this makes the brute-force attacks impossible, and the application of reversible watermarking guarantees that the integrity of the VEI and decrypted image can be verified. Experiments and analysis are given to demonstrate that the proposed scheme has better performances, and it has good potential in the application of medical and military image.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Belazi A, Hermassi H, Rhouma R et al (2014) Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map. Nonlinear Dynamics 76:1989–2004

    Article  Google Scholar 

  2. Chai X, Gan Z, Yuan K et al (2017) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput & Applic. https://doi.org/10.1007/s00521-017-2993-9

    Article  Google Scholar 

  3. Chai X, Gan Z, Yang K et al (2017) An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process Image Commun 52:6–19

    Article  Google Scholar 

  4. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons and Fractals 21:749–761

    Article  MathSciNet  Google Scholar 

  5. Chen JX, Zhu ZL, Fu C (2015) An efficient image encryption scheme using lookup table based confusion and diffusion. Nonlinear Dyn 81:1151–1166

    Article  Google Scholar 

  6. Chen B, Yang Z, Huang S et al. (2017) Cyber-physical system enabled nearby traffic flow modelling for autonomous vehicles. In Proc. IEEE 36th International Performance Computing and Communications Conference (IPCCC), pp 1–6

  7. Ding M, Fan G (2015) Multilayer joint gait-pose manifolds for human gait motion modeling. IEEE Transactions on Cybernetics 45(11):2413–2424

    Article  Google Scholar 

  8. Ding M, Fan G (2016) Articulated and generalized gaussian kernel correlation for human pose estimation. IEEE Trans Image Process 25(2):776–789

    Article  MathSciNet  Google Scholar 

  9. Dong C'e (2014) Color image encryption using one-time keys and coupled chaotic systems. Signal Process Image Commun 29(5):628–640

    Article  Google Scholar 

  10. Federal Information Processing Standards Publication 180-2. (2002) Announcing the Secure Hash Standard, U.S. DoC/NIST, August

  11. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. International J. Bifur Chaos 8(6):125–984

    MathSciNet  MATH  Google Scholar 

  12. Gan Z, Chai X, Yuan K et al (2018) A novel image encryption algorithm based on LFT based S-boxes and chaos. Multimedia Tools Appl 77(7):8759–8783

    Article  Google Scholar 

  13. Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372(4):394–400

    Article  Google Scholar 

  14. Gao T, Chen Z (2008) Image encryption based on a new total shuffling algorithm. Chaos, Solitons Fractals 38(1):213–220

    Article  MathSciNet  Google Scholar 

  15. Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 4(21):394–400

    Article  Google Scholar 

  16. Gao T, Chen Z et al (2006) A hyper-chaos generated from Chen’s system. International Journal of Modern Physics C 17:471–478

    Article  Google Scholar 

  17. Gu Q, Gao T (2013) A novel reversible robust watermarking algorithm based on chaotic system. Digital Signal Processing 23(1):213–217

    Article  MathSciNet  Google Scholar 

  18. Hu Y, Lee H-K, Chen K et al (2008) Difference expansion based reversible data hiding using two embedding directions. IEEE Transactions on Multimedia 10(8):1500–1512

    Article  Google Scholar 

  19. Hu T, Liu Y, Gong L-H et al (2017) Chaotic image cryptosystem using DNA deletion and DNA insertion. Signal Process 134:234–243

    Article  Google Scholar 

  20. Li C (2016) Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process 118:203–210

    Article  Google Scholar 

  21. Li C, Liu Y, Xie T et al (2013) Breaking a novel image encryption scheme based on improved hyper-chaotic sequences. Nonlinear Dyn 73(3):2083–2092

    Article  Google Scholar 

  22. Li X, Li B, Yang B et al (2013) General framework to histogram-shifting-based reversible data hiding. IEEE Trans Image Process 22(6):2181–2191

    Article  MathSciNet  Google Scholar 

  23. Li X, Zhang W, Gui X et al (2015) Efficient reversible data hiding based on multiple histograms modification. IEEE Transactions on Information Forensics and Security 10(9):2016–2027

    Article  Google Scholar 

  24. Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238–246

    Article  Google Scholar 

  25. Liu X, Meiling F (2015) Cuckoo search algorithm based on frog leaping local search and chaos theory. Appl Math Comput 266:1083–1092

    MathSciNet  MATH  Google Scholar 

  26. Liu Q, Li P, Zhang M et al (2015) A novel image encryption algorithm based on chaos maps with Markov properties. Commun Nonlinear Sci Numer Simulat 20:506–515

    Article  Google Scholar 

  27. Mohamad J, Abbas S, Saeid S (2017) A novel parallel image encryption with chaotic windows based on logistic map. Computers & Electrical Engineering. https://doi.org/10.1016/j.compeleceng.2017.04.004

    Article  Google Scholar 

  28. Sui L, Lu H, Wang Z (2014) Double-image encryption using discrete fractional random transform and logistic maps. Opt Lasers Eng 56:1–12

    Article  Google Scholar 

  29. Wang X, Zhang H (2015) A color image encryption with heterogeneous bit permutation and correlated chaos. Opt Commun 342:51–60

    Article  Google Scholar 

  30. Wang XY, Zhang HL (2016) A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dyn 83:333–346

    Article  MathSciNet  Google Scholar 

  31. Wang Y, Wong K, Liao X et al (2009) A chaos-based image encryption algorithm with variable control parameters. Chaos, Solitons Fractals 41(4):1773–1783

    Article  Google Scholar 

  32. Wu X, Wang D, Kurths J et al (2016) A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inf Sci 349-350:137–153

    Article  Google Scholar 

  33. Xie E, Li C, Yu S (2017) On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Signal Process 132:150–154

    Article  Google Scholar 

  34. Xu L, Li Z, Li J (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25

    Article  Google Scholar 

  35. Yanchuk S, Kapitaniak T (2001) Symmetry-increasing bifurcation as a predictor of a chaos-hyperchaos transition in coupled systems. Phys Rev E 64:056235

    Article  Google Scholar 

  36. Yuan X, Zhao J, Yang Y, Wang Y (2014) Hybrid parallel chaos optimization algorithm with harmony search algorithm. Appl Soft Comput 17:12–22

    Article  Google Scholar 

  37. Zhang S, Gao T (2016) A coding and substitution frame based on hyper-chaotic systems for secure communication. Nonlinear Dynamics 84(2):833–849

    Article  MathSciNet  Google Scholar 

  38. Zhang S, Gao T (2016) An image encryption scheme based on DNA coding and permutation of hyper-image. Multimedia Tools and Applications 75(24):17157–17170

    Article  Google Scholar 

  39. Zhu C (2012) A novel image encryption scheme based on improved hyper-chaotic sequences. Opt Communications 285(1):29–37

    Article  Google Scholar 

  40. Zhu H, Zhang X, Yu H (2017) An image encryption algorithm based on compound homogeneous hyper-chaotic system. Nonlinear Dynamics 89:61–79

    Article  Google Scholar 

Download references

Acknowledgements

The work was supported by the Program of Natural Science Fund of Tianjin, China (Grant NO. 16JCYBJC15700).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tiegang Gao.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gao, H., Gao, T. Double verifiable image encryption based on chaos and reversible watermarking algorithm. Multimed Tools Appl 78, 7267–7288 (2019). https://doi.org/10.1007/s11042-018-6461-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6461-z

Keywords

Navigation