Skip to main content
Log in

A secure image compression-encryption algorithm using DCT and hyperchaotic system

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Nowadays, thanks to the rapid development of communication network technology, the multimedia data with image and video as the carrier increases exponentially. Therefore, how to transmit data efficiently and securely has become an important research topic. In order to reduce the amount of data during image transmission and ensure the security of images, we propose a joint image compression and encryption method based on discrete cosine transform (DCT) and hyperchaotic system (HCS) in this paper. This scheme consists of two stages, i.e., compression and encryption. In the compression stage, plain-image is transformed by cosine transform in blocks, and then only a small number of DCT coefficients in the upper left corner of each block are retained to achieve the purpose of compression. In the encryption stage, the compressed image is first divided into blocks, and then each block is permutated by Arnold transformation to achieve a local scrambling effect. Next, the scrambled matrix generated by HCS is used to scramble the image after Arnold transformation. By local and global scrambling, the correlation between adjacent pixels can be destroyed effectively. Finally, the chaotic sequence generated by HCS is used to diffuse the scrambled image, and the cipher image is obtained. Moreover, our algorithm exhibits excellent compression performance compared with existing related algorithms. The result of experiment test indicate that our approach possesses excellent image compression ability and cryptographic properties.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Ahmed N, Natarajan T (1974) Discrete cosine transform. IEEE Trans Comput C-23(1):90–93

    Article  MathSciNet  MATH  Google Scholar 

  2. Boriga R, Dascalescu A, Diaconu A (2014) A new fast image encryption scheme based on 2D chaotic maps. Iaeng Int J Comput Sci 41(4):249–258

    Google Scholar 

  3. Chai X, Bi J, Gan Z, Liu X, Zhang Y, Chen Y (2020) Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process 176:107684

    Article  Google Scholar 

  4. Chai X, Fu X, Gan Z, Zhang Y, Lu Y, Chen Y (2020) An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata. Neural Comput Applic 32:4961–4988

    Article  Google Scholar 

  5. Chai Xiuli X, Zheng X, Gan Z, Han D, Chen Y (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124–144

    Article  Google Scholar 

  6. Chen Y, Tang C, Ye R (2020) Cryptanalysis and improvement of medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 167(Feb.):107286.1–107286.12

    Google Scholar 

  7. Chen G, Ueta T (1999) Yet another chaotic attractor. International Journal of Bifurcation and Chaos 9(07):1465–1466

    Article  MathSciNet  MATH  Google Scholar 

  8. Fang Z, Xiong N, Yang L, Sun X, Yan Y (2011) Interpolation-based direction-adaptive lifting DWT and modified SPIHT for image compression in multimedia communications. IEEE Syst J 5(4):584–593

    Article  Google Scholar 

  9. Feng W, He Y (2019) Cryptanalysis and improvement of the hyper-chaotic image encryption scheme based on DNA encoding and scrambling. IEEE Photonics Journal 10(6):1–15

    Article  MathSciNet  Google Scholar 

  10. Gan Z, Chai X, Zhang J, Zhang Y, Chen Y (2020) An effective image compression-encryption scheme based on compressive sensing (CS) and game of life (GOL). Neural Comput Applic 32(6):14113–14141

    Article  Google Scholar 

  11. Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372(4):394–400

    Article  MATH  Google Scholar 

  12. Gao T, Chen Z, Yuan Z, Chen G (2006) A hyperchaos generated from chen’s system. International Journal of Modern Physics C 17(04):471–478

    Article  MATH  Google Scholar 

  13. Ge X, Liu F, Lu B, Wang W, Chen J (2010) An image encryption algorithm based on spatiotemporal chaos in dct domain. In: 2010 2nd IEEE international conference on information management and engineering, pp 267–270

  14. Hamdi M, Rhouma R, Belghith S (2016) A selective compression-encryption of images based on spiht coding and chirikov standard map. Signal Process 131:514–526

    Article  Google Scholar 

  15. Haque A, Bhushan B, Dhiman G (2021) Conceptualizing smart city applications: requirements, architecture, security issues, and emerging trends. Expert Systems. https://doi.org/10.1111/exsy.12753

  16. Hassaballah M (2020) Digital Media Steganography: Principles, Algorithms, Advances. Academic Press

  17. Houssein E, Hussain K, Abualigah L, Elaziz M, Alomoush W, Dhiman G, Djenouri Y, Cuevas E (2021) An improved opposition-based marine predators algorithm for global optimization and multilevel thresholding image segmentation. Knowl-Based Syst 229:107348

    Article  Google Scholar 

  18. Hua Z, Fan J, Xu B (2018) H Huang. 2D logistic-sine-coupling map for image encryption. Signal Process 149:148–161

    Article  Google Scholar 

  19. Hua Z, Zhu Z, Chen Y, Li Y (2021) Color image encryption using orthogonal latin squares and a new 2d chaotic system. Nonlinear Dynamics 104:4505–4522

    Article  Google Scholar 

  20. Huang H, Yang S (2017) Color image encryption based on logistic mapping and double random phase encoding. IET Image Process 11(4):211–216

    Article  Google Scholar 

  21. Huang H, Yang S, Ye R (2019) Image encryption scheme combining a modified gerchberg-saxton algorithm with hyper-chaotic system. Soft Comput 23 (16):7045–7053

    Article  Google Scholar 

  22. Khan S, Khan K, Arif A, Hassaballah M, Ali J, Ta Q, Yu L (2020) A modulo Function-Based robust asymmetric variable data hiding using DCT. Symmetry 12(10):1659

    Article  Google Scholar 

  23. Krikor L, Baba S, Arif T, Shaaban Z (2009) Image encryption using dct and stream cipher. Eur J Sci Res 32(1):48–58

    Google Scholar 

  24. Kumar V, Malik N, Dhiman G, Lohani T (2021) Scalable and storage efficient dynamic key management scheme for wireless sensor network. Wirel Commun Mob Comput 2021(3):1–11. https://doi.org/10.1155/2021/5512879

    Google Scholar 

  25. Li P, Lo K (2019) Joint image encryption and compression schemes based on 16×16 DCT. J Vis Commun Image Represent 58:12–24

    Article  Google Scholar 

  26. Li C, Zhang Y, Xie E (2019) When an attacker meets a cipher-image in 2018: a year in review. Inf Secur Tech Rep 48(Oct.):102361.1–102361.9

    Google Scholar 

  27. Matthews R (1989) On the derivation of a “chaotic” encryption algorithm. Cryptologia 13(1):29–42

    Article  MathSciNet  Google Scholar 

  28. Mazloom S, Eftekhari-Moghadam A (2009) Color image encryption based on coupled nonlinear chaotic map. Chaos Solitons and Fractals 42(3):1745–1754

    Article  MATH  Google Scholar 

  29. Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dynamics 67 (1):557–566

    Article  MathSciNet  Google Scholar 

  30. Murillo-Escobar M, Cruz-Hernández C, Abundiz-Pérez F, López-Gutiérrez R, Del Campo O (2015) A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process 109:119–131

    Article  Google Scholar 

  31. Oliva D, Esquivel-Torres S, Hinojosa S, Peŕez-Cisneros M, Osuna-Enciso V, Ortega-Sańchez N, Dhiman G, Heidari A (2021) Opposition-based moth swarm algorithm. Expert Syst Appl 184:115481

    Article  Google Scholar 

  32. Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129–137

    Article  Google Scholar 

  33. Rhouma R, Belghith S (2008) Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys Lett A 372(38):5973–5978

    Article  MATH  Google Scholar 

  34. Sateesh S, Sakthivel R, Nirosha K, Kittur H (2011) An optimized architecture to perform image compression and encryption simultaneously using modified DCT algorithm. In: 2011 international conference on signal processing, communication, computing and networking technologies, pp 442–447,

  35. Sen J (2009) A survey on wireless sensor network security. Int J Commun Netw Inform Secur 1(2):59–82

    Google Scholar 

  36. Seyedzadeh S, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92(5):1202–1215

    Article  Google Scholar 

  37. Socek D, Li S, Magliveras S, Furht B (2005) Short paper: Enhanced 1-D chaotic key-based algorithm for image encryption. In: International conference on security and privacy for emerging areas in communications networks

  38. Wang R, Deng G, Duan X (2021) An image encryption scheme based on double chaotic cyclic shift and josephus problem. Journal of Information Security and Applications 58(2):102699

    Article  Google Scholar 

  39. Wang X, Liu C, Xu D, Liu C (2016) Image encryption scheme using chaos and simulated annealing algorithm. Nonlinear Dynamics 84(3):1417–1429

    Article  MathSciNet  Google Scholar 

  40. Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108

    Article  MathSciNet  Google Scholar 

  41. Yanchuk S, Kapitaniak T (2001) Symmetry-increasing bifurcation as a predictor of a chaos-hyperchaos transition in coupled systems. Physical Review E Statistical Nonlinear and Soft Matter Physics 64(5):056235

    Article  Google Scholar 

  42. Ye G, Huang X (2017) An efficient symmetric image encryption algorithm based on an intertwining logistic map. Neurocomputing 251:45–53

    Article  Google Scholar 

  43. Yen W, Tai S (2005) DCT-based image compression using wavelet-based algorithm with efficient deblocking filter. In: Acis international conference on computer and information science, Los Alamitos, CA, USA, IEEE Computer Society, pp 489–494

  44. Yuen C, Wong K (2011) A chaos-based joint image compression and encryption scheme using DCT and SHA-1. Appl Soft Comput 11(8):5092–5098

    Article  Google Scholar 

  45. Zhang L, Li C, Wong K, Shu S, Chen G (2012) Cryptanalyzing a chaos-based image encryption algorithm using alternate structure. J Syst Softw 85(9):2077–2085

    Article  Google Scholar 

  46. Zhang M, Tong X (2017) Joint image encryption and compression scheme based on a new hyperchaotic system and curvelet transform. Journal of Electronic Imaging 26(4):043008

    Article  Google Scholar 

  47. Zhang X, Wang X (2013) Chaos-based partial encryption of SPIHT coded color images. Signal Process 93(9):2422–2431

    Article  Google Scholar 

  48. Zhou N, Pan S, Cheng S, Zhou Z (2016) Image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121–133

    Article  Google Scholar 

  49. Zhou N, Zhang A, Zheng F, Gong L (2014) Novel image compression-encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt Laser Technol 62(10):152–160

    Article  Google Scholar 

Download references

Acknowledgements

All the authors are deeply grateful to the editors for smooth and fast handling of the manuscript. The authors would also like to thank the anonymous referees for their valuable suggestions to improve the quality of this paper. This work is supported by the Characteristic Innovation Project from the Educational Department of Guangdong Province (Grant No. 2018GKTSCX043, 2019KTSCX168).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huiqing Huang.

Ethics declarations

Conflict of Interests

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, H., Cheng, D. A secure image compression-encryption algorithm using DCT and hyperchaotic system. Multimed Tools Appl 81, 31329–31347 (2022). https://doi.org/10.1007/s11042-021-11796-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11796-x

Keywords

Navigation