Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 14, pp 19229–19252 | Cite as

A modified image selective encryption-compression technique based on 3D chaotic maps and arithmetic coding

  • Saad Mohamed DarwishEmail author
Article
  • 113 Downloads

Abstract

The advances in digital image processing and communications have created a great demand for real–time secure image transmission over the networks. However, the development of effective, fast and secure dependent image compression encryption systems are still a research problem as the intrinsic features of images such as bulk data capacity and high correlation among pixels hinds the use of the traditional joint encryption compression methods. A new approach is suggested in this paper for partial image encryption compression that adopts chaotic 3D cat map to de-correlate relations among pixels in conjunction with an adaptive thresholding technique that is utilized as a lossy compression technique instead of using complex quantization techniques and also as a substitution technique to increase the security of the cipher image. The proposed scheme is based on employing both of lossless compression with encryption on the most significant part of the image after contourlet transform. However the least significant parts are lossy compressed by employing a simple thresholding rule and arithmetic coding to render the image totally unrecognizable. Due to the weakness of 3D cat map to chosen plain text attack, the suggested scheme incorporates a mechanism to generate random key depending on the contents of the image (context key). Several experiments were done on benchmark images to insure the validity of the proposed technique. The compression analysis and security outcomes indicate that the suggested technique is an efficacious and safe for real time image’s applications.

Keywords

Cryptography Joint compression encryption Chaotic maps Contourlet transform Thresholding Arithmetic coding 

Notes

References

  1. 1.
    Al-ghaib H (2012) Lossy Image Compression using Wavelet Transform, Master Thesis, Department of Electrical and Computer Engineering, University of Alabama in HuntsvilleGoogle Scholar
  2. 2.
    Al-Maadeed S, Al-Ali A, Abdalla T (2012) A new chaos-based image encryption and compression algorithm. Can J Electr Comput Eng 15:1–11zbMATHGoogle Scholar
  3. 3.
    Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 16(08):2129–2151MathSciNetCrossRefzbMATHGoogle Scholar
  4. 4.
    Bhatnagar G, Wu Q (2012) Selective image encryption based on pixels of interest and singular value decomposition. J Digit Signal Process 22:648–663MathSciNetCrossRefGoogle Scholar
  5. 5.
    Brindha M, Gounden N (2016) A Chaos based image encryption and lossless compression algorithm using hash table and Chinese remainder theorem. J Appl Soft Comput 40:379–390CrossRefGoogle Scholar
  6. 6.
    Chen G, Mao Y, Chui C (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761MathSciNetCrossRefzbMATHGoogle Scholar
  7. 7.
    Decanniere C, Biryukov A, Preneel B (2006) An introduction to block cipher cryptanalysis. Proc IEEE 94(2):346–356CrossRefGoogle Scholar
  8. 8.
    Do MN, Vetterli M (2002) Contourlets a directional multiresolution image representation. Proceeding of IEEE International Conference on Image Processing, USA, p 357-360Google Scholar
  9. 9.
    Do MN, Vetterli M (2005) The Contourlet transform: an efficient directional multiresolution image representation. IEEE Trans Image Process 14(12):2091–2106CrossRefGoogle Scholar
  10. 10.
    Durdi V, Kulkarni P, Su K (2017) Selective Encryption Framework for Secure Multimedia Transmission over Wireless Multimedia Sensor Networks, International Conference on Data Engineering and Communication Technology, p 469-480Google Scholar
  11. 11.
    Enayatifar R, Abdullah A, Isnin I, Altameem A, Lee M (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146–154CrossRefGoogle Scholar
  12. 12.
    Eslami R, Radha H (2005) Image denoising using translation-invariant contourlet transform. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 4, p 557–560Google Scholar
  13. 13.
    Gu G, Ling J (2014) A fast image encryption method by using chaotic 3D cat maps. I J Optik 125(17):4700–4705CrossRefGoogle Scholar
  14. 14.
    Hamdi M, Rhouma R, Belghith S (2017) A selective compression-encryption of images based on SPIHT coding and Chirikov standard map. Signal Process 131:514–526CrossRefGoogle Scholar
  15. 15.
    Hore A, Ziou D (2010) Image quality metrics: PSNR vs. SSIM, 20th International Conference on Pattern Recognition, Istanbul, p 2366-2369Google Scholar
  16. 16.
    Katsigiannis S, Papaioannou G, Maroulis D (2012) A contourlet transform based algorithm for real-time video encoding. J Real Time Image Process 8437:1–12Google Scholar
  17. 17.
    Martin K, Lukac R, Plataniotis K (2005) Efficient encryption of wavelet-based coded color images. J Pattern Recognit 38(7):1111–1115CrossRefzbMATHGoogle Scholar
  18. 18.
    Masmoudi A, Puech W, Masmoudi A (2015) An improved lossless image compression based arithmetic coding using mixture of non-parametric distributions. Multimed Tools Appl 74(23):10605–10619CrossRefGoogle Scholar
  19. 19.
    Mohamed N, El-Azeim M, Zaghloul A, El-Latif A (2015) Image encryption scheme for secure digital images based on 3D cat map and turing machine. International Conference of Soft Computing and Pattern Recognition (SoCPaR), Japan, p 230–234Google Scholar
  20. 20.
    Pande A, Mohapatra P, Zambreno J (2011) Using chaotic maps for encrypting image and video content, IEEE International Symposium on Multimedia (ISM), CA, p 171-178Google Scholar
  21. 21.
    Rekha H, Samundiswary P (2016) Image compression using multilevel thresholding based absolute moment block truncation coding for WSN. Proceedings of the International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), India, p 396-400Google Scholar
  22. 22.
    Seo Y, Kim D, Yoo J, Dey S, Agrawal A (2003) Wavelet domain image encryption by subband selection and data bit selection, Proceeding of World Wireless Congress (WCC’03/3Gwireless’), p 1–6Google Scholar
  23. 23.
    Song H, Yu S, Song L, Xiong H (2005) Contourlet image coding based on adjusted SPIHT. Adv Multimed Inf Process 3767:629–640Google Scholar
  24. 24.
    Tan P, Zhao W (2012) Image coding based on Sparsified Contourlet and Adjusted SPIHT’, Proceedings of IEEE 11th International Conference on Signal Processing (ICSP), China, p 922–925Google Scholar
  25. 25.
    Taneja N, Raman B, Gupta I (2009) ‘Partial Encryption on SPIHT Compressed Images’, International Conference on Pattern Recognition and Machine Intelligence (PReMI), India, p 426-431Google Scholar
  26. 26.
    Taneja N, Raman B, Gupta I (2009) Partial encryption on SPIHT compressed images. Proceedings of the Third International Conference on Pattern Recognition and Machine Intelligence, India, p 426-431Google Scholar
  27. 27.
    Tong X, Zhang M, Wang Z, Ma J (2013) A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. J Nonlinear Dyn 72:229–241MathSciNetCrossRefGoogle Scholar
  28. 28.
    Tong A, Zhang M, Wang Z, Ma J (2016) A joint color image encryption and compression scheme based on hyper-chaotic system. J Nonlinear Dyn 84(4):2333–2356CrossRefGoogle Scholar
  29. 29.
    Weia X, Guoa L, Zhanga Q, Zhanga J, Shiguo L (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299Google Scholar
  30. 30.
    Veeraswamy K, Mohan B, Reddy Y, Kumar S (2009) Energy based quantization for image compression using contourlet transform. Proceeding of the First International Conference on Networks and Communication (NETCOM), India, p 230–234Google Scholar
  31. 31.
    Xi Z, Xiao Y (2009) An image compression scheme adopted for contourlet transform. Proceedings of the 2nd International Congress on Image and Signal Processing, China, p 1–4Google Scholar
  32. 32.
    Xiang T, Qu J, Xiao D (2014) Joint SPIHT compression and selective encryption. Appl Soft Comput 21:159–170Google Scholar
  33. 33.
    Ye R (2011) An image encryption scheme with efficient permutation and diffusion processes. Communications in Computer and Information Science, Vol. 202. Springer, p 32–39Google Scholar
  34. 34.
    Zhang M, Tong X (2017) Joint image encryption and compression scheme based on IWT and SPIHT. Opt Lasers Eng 90:254–274CrossRefGoogle Scholar
  35. 35.
    Zhang L, Liao X, Wang X (2005) An image encryption approach based on chaotic maps. Chaos, Solitons Fractals 24(3):759–765MathSciNetCrossRefzbMATHGoogle Scholar
  36. 36.
    Zhang S, Xue X, Shi J (2010) Image compression based on contourlet and no lists SPIHT. Proceedings of the International Conference on Computer, Mechatronics, Control and Electronic Engineering, China, p 211-214Google Scholar
  37. 37.
    Zhanga X, Wanga X (2013) Chaos-based partial encryption of SPIHT coded color images. J Signal Process 93(9):2422–2431Google Scholar
  38. 38.
    Belazi A, El-Latif AAA, Diaconu AV, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37–50Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Information Technology, Institute of Graduate Studies and ResearchAlexandria UniversityEl ShatbyEgypt

Personalised recommendations