Skip to main content
Log in

A two-stage chaotic encryption algorithm for color face image based on circular diffusion

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In information security, image encryption is widely used to protect private information. However, most encryption algorithms encrypt the whole image without considering the different importance of different regions in an image, which leads to inefficiency and waste of computational power. This paper proposes a novel two-stage chaotic encryption algorithm for color face image based on circular diffusion cryptosystem. First, CenterFace is used to extract the face region in the plain image. Then the face region is dislocated, diffused and permuted using chaotic sequences generated by a two-stage plaintext-related chaotic system. The encrypted face region and the non-face areas are then merged. Finally, the face position is embedded into the cipher image using digital watermarking technology. Selective encryption of face regions allows the method to have high efficiency and real-time performance. The experimental results show that the number of pixels change rate and the unified average changing intensity are 99.6084% and 33.4687% respectively, and the information entropy of the cipher image reaches 7.9972. Besides, security analyses indicate that our proposed encryption algorithm has strong resistance to various attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Algorithm 2
Fig. 4
Fig. 5
Algorithm 3
Algorithm 4
Algorithm 5
Algorithm 6
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data Availability

Data will be made avaiable on reasonable request.

Code Availability

Code will be made avaiable on reasonable request.

References

  1. Abd El-Latif A A, Abd-El-Atty B, Abou-Nassar E M, Venegas-Andraca S E (2020) Controlled alternate quantum walks based privacy preserving healthcare images in internet of things. Optics & Laser Technol 124:105942

    Google Scholar 

  2. Abd El-Latif A A, Abd-El-Atty B, Amin M, Iliyasu A M (2020) Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications. Sci Rep 10(1):1–16

    Google Scholar 

  3. Akhshani A, Akhavan A, Lim S-C, Hassan Z (2012) An image encryption scheme based on quantum logistic map. Commun Nonlinear Sci Numer Simul 17(12):4653–4661

    MathSciNet  MATH  Google Scholar 

  4. Amina S, Mohamed F K (2018) An efficient and secure chaotic cipher algorithm for image content preservation. Commun Nonlinear Sci Numer Simul 60:12–32

    MATH  Google Scholar 

  5. Asgari-Chenaghlu M, Balafar M-A, Feizi-Derakhshi M-R (2019) A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation. Signal Process 157:1–13

    Google Scholar 

  6. Asgari-Chenaghlu M, Feizi-Derakhshi M-R, Nikzad-Khasmakhi N, Feizi-Derakhshi A-R, Ramezani M, Jahanbakhsh-Nagadeh Z, Rahkar-Farshi T, Zafarani-Moattar E, Ranjbar-Khadivi M, Balafar M-A (2021) Cy: chaotic yolo for user intended image encryption and sharing in social media. Inf Sci 542:212–227

    Google Scholar 

  7. Barni M, Droandi G, Lazzeretti R (2015) Privacy protection in biometric-based recognition systems: a marriage between cryptography and signal processing. IEEE Signal Process Mag 32(5):66–76

    Google Scholar 

  8. Chai X, Zhi X, Gan Z, Zhang Y, Chen Y, Fu J (2021) Combining improved genetic algorithm and matrix semi-tensor product (stp) in color image encryption. Signal Process 183:108041

    Google Scholar 

  9. Chen X-D, Wang Y, Wang J, Wang Q-H (2019) Asymmetric color cryptosystem based on compressed sensing and equal modulus decomposition in discrete fractional random transform domain. Opt Lasers Eng 121:143–149

    Google Scholar 

  10. Dwivedi R, Dey S, Sharma M A, Goel A (2019) A fingerprint based crypto-biometric system for secure communication. J Ambient Intell Humaniz Comput, 1–15

  11. Gomez-Barrero M, Maiorana E, Galbally J, Campisi P, Fierrez J (2017) Multi-biometric template protection based on homomorphic encryption. Pattern Recogn 67:149–163

    Google Scholar 

  12. Gomez-Barrero M, Rathgeb C, Li G, Ramachandra R, Galbally J, Busch C (2018) Multi-biometric template protection based on bloom filters. Inform Fus 42:37–50

    Google Scholar 

  13. Huang G B, Mattar M, Berg T, Learned-Miller E (2008) Labeled faces in the wild: a database forstudying face recognition in unconstrained environments. In: Workshop on faces in’Real-Life’Images: detection, alignment, and recognition

  14. Jithin KC, Sankar S (2020) Colour image encryption algorithm combining arnold map, dna sequence operation, and a mandelbrot set. J Inform Secur Applic 50:102428

    Google Scholar 

  15. Kadir A, Hamdulla A, Guo W-Q (2014) Color image encryption using skew tent map and hyper chaotic system of 6th-order cnn. Optik 125(5):1671–1675

    Google Scholar 

  16. Kadir A, Aili M, Sattar M (2017) Color image encryption scheme using coupled hyper chaotic system with multiple impulse injections. Optik 129:231–238

    Google Scholar 

  17. Kang X, Ming A, Tao R (2018) Reality-preserving multiple parameter discrete fractional angular transform and its application to color image encryption. IEEE Trans Circuits Syst Video Technol 29(6):1595–1607

    Google Scholar 

  18. Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods Eng 27(1):15–43

    MathSciNet  Google Scholar 

  19. Kumar S, Singh S K, Singh A K, Tiwari S, Singh R S (2018) Privacy preserving security using biometrics in cloud computing. Multimed Tools Applic 77(9):11017–11039

    Google Scholar 

  20. Li Y, Tang WKS, Chen G (2005) Generating hyperchaos via state feedback control. Int J Bifur Chaos 15(10):3367–3375

    Google Scholar 

  21. Li H, Lin Z, Shen X, Brandt J, Hua G (2015) A convolutional neural network cascade for face detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), pp 5325–5334

  22. Li Q, Wang X, Ma B, Wang X, Wang C, Gao S, Shi Y (2021) Concealed attack for robust watermarking based on generative model and perceptual loss. IEEE Trans Circuits Syst Video Technol

  23. Liang Y, Zhang SW (2018) Image encryption algorithm based on bit-level synchronous permutation diffusion and pixel-level annular diffusion. J Image Graph 23(6):814–826

    Google Scholar 

  24. Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Applic 59(10):3320–3327

    MathSciNet  MATH  Google Scholar 

  25. Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16–17):3895–3903

    Google Scholar 

  26. Liu H, Wang X, et al. (2012) Image encryption using dna complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466

    Google Scholar 

  27. Liu H, Kadir A (2015) Asymmetric color image encryption scheme using 2d discrete-time map. Signal Process 113:104–112

    Google Scholar 

  28. Lorenz E (1963) Deterministic non-period flows. J Atmos Sci 20:130–141

    Google Scholar 

  29. Luo Y, Lin J, Liu J, Wei D, Cao L, Zhou R, Cao Y, Ding X (2019) A robust image encryption algorithm based on Chua’s circuit and compressive sensing. Signal Process 161:227–247

    Google Scholar 

  30. Merhav N (2018) Ensemble performance of biometric authentication systems based on secret key generation. IEEE Trans Inf Theory 65(4):2477–2491

    MathSciNet  MATH  Google Scholar 

  31. Morampudi M K, Prasad MVNK, Raju USN (2020) Privacy-preserving iris authentication using fully homomorphic encryption. Multimedia Tools and Applications, 1–23

  32. Naskar P K, Bhattacharyya S, Nandy D, Chaudhuri A (2020) A robust image encryption scheme using chaotic tent map and cellular automata. Nonlinear Dyn 100(3):2877–2898

    MATH  Google Scholar 

  33. Redmon J, Farhadi A (2018) Yolov3: an incremental improvement. arXiv:1804.02767

  34. Sambas A, Vaidyanathan S, Tlelo-Cuautle E, Abd-El-Atty B, Abd El-Latif A A, Guillén-Fernández O, Hidayat Y, Gundara G, et al. (2020) A 3-d multi-stable system with a peanut-shaped equilibrium curve: circuit design, fpga realization, and an application to image encryption. IEEE Access 8:137116–137132

    Google Scholar 

  35. Shah D, Shah T (2020) A novel discrete image encryption algorithm based on finite algebraic structures. Multimed Tools Applic 79(37):28023–28042

    Google Scholar 

  36. ur Rehman A, Liao X, Ashraf R, Ullah S, Wang H (2018) A color image encryption technique using exclusive-or with dna complementary rules based on chaos theory and sha-2. Optik 159:348–367

    Google Scholar 

  37. Valandar M Y, Barani M J, Ayubi P (2019) A fast color image encryption technique based on three dimensional chaotic map. Optik 193:162921

    Google Scholar 

  38. Viola P, Jones M (2001) Rapid object detection using a boosted cascade of simple features. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), vol 1. IEEE, pp I–I

  39. Wang X, Liu P (2021) A new full chaos coupled mapping lattice and its application in privacy image encryption. IEEE Trans Circuits Syst I Regul Pap

  40. Wang X, Yang J (2021) A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Inf Sci 569:217–240

    MathSciNet  Google Scholar 

  41. Wang X, Zhang M (2021) An image encryption algorithm based on new chaos and diffusion values of a truth table. Inf Sci 579:128–149

    MathSciNet  Google Scholar 

  42. Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108

    MathSciNet  Google Scholar 

  43. Wang X, Zhang Y-Q, Bao X-M (2015) A novel chaotic image encryption scheme using dna sequence operations. Opt Lasers Eng 73:53–61

    Google Scholar 

  44. Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18

    Google Scholar 

  45. Wang H, Xiao D, Chen X, Huang H (2018) Cryptanalysis and enhancements of image encryption using combination of the 1d chaotic map. Signal Process 144:444–452

    Google Scholar 

  46. Wang K, Wu X, Wang H, Kan H, Kurths J (2021) New color image cryptosystem via sha-512 and hybrid domain. Multimed Tools Applic 80 (12):18875–18899

    Google Scholar 

  47. Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on dna sequences and multiple improved 1d chaotic maps. Appl Soft Comput 37:24–39

    Google Scholar 

  48. Wu X, Wang K, Wang X, Kan H, Kurths J (2018) Color image dna encryption using nca map-based cml and one-time keys. Signal Process 148:272–287

    Google Scholar 

  49. Xian Y, Wang X, Teng L (2021) Double parameters fractal sorting matrix and its application in image encryption. IEEE Trans Circuits Syst Video Technol

  50. Xu Q, Sun K, Cao C, Zhu C (2019) A fast image encryption algorithm based on compressive sensing and hyperchaotic map. Opt Lasers Eng 121:203–214

    Google Scholar 

  51. Xu Y, Yan W, Yang G, Luo J, Li T, He J (2019) Centerface: joint face detection and alignment using face as point. Sci Program, 2020

  52. Xue H-, Du J, Li S-, Ma W- (2018) Region of interest encryption for color images based on a hyperchaotic system with three positive Lyapunov exponets. Opt Laser Technol 106:506–516

    Google Scholar 

  53. Yao L, Yuan C, Qiang J, Feng S, Nie S (2017) An asymmetric color image encryption method by using deduced gyrator transform. Opt Lasers Eng 89:72–79

    Google Scholar 

  54. Yu C, Li J, Li X, Ren X, Gupta B B (2018) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Applic 77(4):4585–4608

    Google Scholar 

  55. Zhang K, Zhang Z, Li Z, Qiao Y (2016) Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process Lett 23(10):1499–1503

    Google Scholar 

  56. Zhang D, Liao X, Yang B, Zhang Y (2018) A fast and efficient approach to color-image encryption based on compressive sensing and fractional fourier transform. Multimed Tools Applic 77(2):2191–2208

    Google Scholar 

  57. Zhou K, Fan J, Fan H, Li M (2020) Secure image encryption scheme using double random-phase encoding and compressed sensing. Opt Laser Technol 121:105769

    Google Scholar 

  58. Zhu C, Gan Z, Lu Y, Chai X (2020) An image encryption algorithm based on 3-d dna level permutation and substitution scheme. Multimed Tools Applic 79(11):7227–7258

    Google Scholar 

Download references

Acknowledgements

This work is supported by Key-Area Research and Development Program of Guangdong Province under the grant (2018B010108001), GuangDong Basic and Applied Basic Research Foundation under grant (2022A1515110119) and Science and Technology Plan Project of Jiangmen (2020030103080008999).

Funding

This study was funded by Key-Area Research and Development Program of Guangdong Province under the grant (2018B010108001), GuangDong Basic and Applied Basic Research Foundation under grant (2022A1515110119) and Science and Technology Plan Project of Jiangmen (2020030103080008999).

Author information

Authors and Affiliations

Authors

Contributions

Formal analysis, Jinwei Yu and Wei Xie; investigation, Jinwei Yu and Xiaoyuan Yu; methodology, Jinwei Yu; software, Jinwei Yu and Xiaoyuan Yu; writing, Jinwei Yu; review and editing, Jinwei Yu, Langwen Zhang and Xiaoyuan Yu.

Corresponding author

Correspondence to Wei Xie.

Ethics declarations

Ethics approval and consent to participate

Not applicable.

Consent for Publication

Not applicable.

Conflict of Interests

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yu, J., Yu, X., Zhang, L. et al. A two-stage chaotic encryption algorithm for color face image based on circular diffusion. Multimed Tools Appl 82, 40009–40038 (2023). https://doi.org/10.1007/s11042-023-14804-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14804-4

Keywords

Navigation