Skip to main content
Log in

A novel spectrogram visual security encryption algorithm based on block compressed sensing and five-dimensional chaotic system

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

Based on block compressed sensing theory, combined with a five-dimensional chaotic system, we propose and analyze a novel spectrogram visual security encryption algorithm. This research is devoted to solving the compression, encryption and steganography problems of spectrograms involving large data volumes and high complexity. First, the discrete wavelet transform is applied to the spectrogram to generate the coefficient matrix. Then, block compressed sensing is applied to compress and preencrypt the spectrogram. Second, we design a new five-dimensional chaotic system. Then, several typical evaluation methods, such as the phase diagram, Lyapunov exponent, bifurcation diagram and sample entropy, are applied to deeply analyze the chaotic behavior and dynamic performance of the system. Moreover, the corresponding Simulink model has been built, which proves the realizability of the chaotic system. Importantly, the measurement matrix required for compressed sensing is constructed by the chaotic sequence. Third, dynamic Josephus scrambling and annular diffusion are performed on the secret image to obtain the cipher image. Finally, an improved least significant bit embedding method and alpha channel synchronous embedding are designed to obtain a steganographic image with visual security properties. To make the initial keys of each image completely different from other images, the required keys are produced using the SHA-256 algorithm. The experimental results confirm that the visual security cryptosystem designed in this study has better compression performance, visual security and reconstruction quality. Furthermore, it is able to effectively defend against a variety of conventional attack methods, such as statistical attacks and entropy attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21

Similar content being viewed by others

References

  1. Wang, Y., Dong, Z., Lu, G., Wu, Z., Su, Y., Chen, Y., Yan, F.: Design of a high-resolution antenna array solar observing system for radio frequencies of 25–110 MHz. Publ. Astron. Soc. Aust. 39, e030 (2022)

    Article  Google Scholar 

  2. Shang, Z., Xu, K., Liu, Y., Wu, Z., Lu, G., Zhang, Y., Zhang, L., Su, Y., Chen, Y., Yan, F.: A broadband solar radio dynamic spectrometer working in the millimeter-wave band. Astrophys. J. Suppl. Ser. 258, 25 (2022)

    Article  Google Scholar 

  3. Kuznetsov, N.V., Nymmik, R.A., Sobolevsky, N.M.: Estimates of radiation effect for a spacecraft on the Earth–Mars–Earth route. Adv. Space Res. 30(4), 985–988 (2002)

    Article  Google Scholar 

  4. Xue, X., Zhou, D., Zhou, C.: New insights into the existing image encryption algorithms based on DNA coding. Plos One 15(10), e0241184 (2020)

    Article  Google Scholar 

  5. Chai, X., Gan, Z., Chen, Y., Zhang, Y.: A visually secure image encryption scheme based on compressive sensing. Signal Process. 134, 35–51 (2017)

    Article  Google Scholar 

  6. Hosny, K.M., Kamal, S.T., Darwish, M.M.: A color image encryption technique using block scrambling and chaos. Multimed. Tools Appl. 81(1), 505–525 (2022)

    Article  Google Scholar 

  7. Xian, Y., Wang, X.: Fractal sorting matrix and its application on chaotic image encryption. Inf. Sci. 547, 1154–1169 (2021)

    Article  MathSciNet  MATH  Google Scholar 

  8. Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: A novel image encryption algorithm based on chaotic maps and GF(2(8)) exponent transformation. Nonlinear Dyn. 72(1–2), 399–406 (2013)

    Article  MathSciNet  Google Scholar 

  9. Zhang, S., Liu, L.: A novel image encryption algorithm based on SPWLCM and DNA coding. Math. Comput. Simulat. 190, 723–744 (2021)

    Article  MathSciNet  MATH  Google Scholar 

  10. Liu, L., Zhang, L., Jiang, D., Guan, Y., Zhang, Z.: A simultaneous scrambling and diffusion color image encryption algorithm based on hopfield chaotic neural network. IEEE Access 7, 185796–185810 (2019)

    Article  Google Scholar 

  11. Ahmad, J., Hwang, S., Ali, A.: An experimental comparison of chaotic and non-chaotic image encryption schemes. Wirel. Pers. Commun. 84(2), 901–918 (2015)

    Article  Google Scholar 

  12. Mondal, B., Singh, S., Kumar, P.: A secure image encryption scheme based on cellular automata and chaotic skew tent map. J. Inf. Secur. Appl. 45, 117–130 (2019)

    Google Scholar 

  13. Hussain, M., Wahab, A.W.A., Bin Idris, Y.I., Ho, A.T.S., Jung, K.H.: Image steganography in spatial domain: a survey. Signal Process. Image 65, 46–66 (2018)

    Article  Google Scholar 

  14. Alhomoud, A.M.: Image steganography in spatial domain: current status, techniques, and trends. Intell. Autom. Soft Comput. 27(1), 69–88 (2021)

    Article  Google Scholar 

  15. Jiang, N., Zhao, N., Wang, L.: LSB based quantum image steganography algorithm. Int. J. Theor. Phys. 55(1), 107–123 (2016)

    Article  MATH  Google Scholar 

  16. Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: IEEE International Workshop on Information Forensics and Security (WIFS), pp. 234–239 (2012)

  17. Hu, J., Li, T.: Reversible steganography using extended image interpolation technique. Comput. Electr. Eng. 46, 447–455 (2015)

    Article  Google Scholar 

  18. Ghebleh, M., Kanso, A.: A robust chaotic algorithm for digital image steganography. Commun. Nonlinear Sci. 19(6), 1898–1907 (2014)

    Article  MATH  Google Scholar 

  19. Zheng, S., Liu, C., Feng, Z., Chen, R., Liu, X.: Visual image encryption scheme based on vector quantization and content transform. Multimed. Tools Appl. 81(9), 12815–12832 (2022)

    Article  Google Scholar 

  20. Shi, M., Guo, S., Song, X., Zhou, Y., Wang, E.: Visual secure image encryption scheme based on compressed sensing and regional energy. Entropy 23(5), 570 (2021)

    Article  MathSciNet  Google Scholar 

  21. Zhou, N., Li, H., Wang, D., Pan, S., Zhou, Z.: Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt. Commun. 343, 10–21 (2015)

    Article  Google Scholar 

  22. Gong, L., Qiu, K., Deng, C., Zhou, N.: An optical image compression and encryption scheme based on compressive sensing and RSA algorithm. Opt. Laser Eng. 121, 169–180 (2019)

    Article  Google Scholar 

  23. Gong, L., Qiu, K., Deng, C., Zhou, N.: An image compression and encryption algorithm based on chaotic system and compressive sensing. Opt. Laser Technol. 115, 257–267 (2019)

    Article  Google Scholar 

  24. Wang, X., Ren, Q., Jiang, D.: An adjustable visual image cryptosystem based on 6D hyperchaotic system and compressive sensing. Nonlinear Dyn. 104(4), 4543–4567 (2021)

    Article  Google Scholar 

  25. Tegue, G.A.G., Nkapkop, J.D.D., Tsafack, N., Abdel, M.A., Kengne, J., Ahmad, M., Jiang, D., Effa, J.Y., Tamba, J.G.: A novel image encryption scheme based on compressive sensing, elliptic curves and a new jerk oscillator with multistability. Phys. Scripta 97(12), 125215 (2022)

    Article  Google Scholar 

  26. Zhang, W., Yan, F., Han, F., He, R., Li, E., Wu, Z., Chen, Y.: Auto recognition of solar radio bursts using the C-DCGAN method. Front. Phys. 9, 646556 (2021)

    Article  Google Scholar 

  27. Aqeel, M., Ahmad, S.: Analytical and numerical study of Hopf bifurcation scenario for a three-dimensional chaotic system. Nonlinear Dyn. 84(2), 755–765 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  28. Wang, C., Fan, C., Ding, Q.: Constructing discrete chaotic systems with positive Lyapunov exponents. Int. J. Bifurcat. Chaos 28(7), 1850084 (2018)

    Article  MathSciNet  MATH  Google Scholar 

  29. Wang, X., Min, X., Yu, J., Shen, Y., Wang, G., Iu, H.H.C.: Realization of a novel logarithmic chaotic system and its characteristic analysis. Int. J. Bifurcat. Chaos 29(2), 1930004 (2019)

    Article  MathSciNet  MATH  Google Scholar 

  30. Bhatia, M., Makhija, D.: Sensitivity analysis of time-averaged quantities of chaotic systems. AIAA J. 57(5), 2088–2099 (2019)

    Article  Google Scholar 

  31. Xiong, L., Liu, Z., Zhang, X.: Analysis, circuit implementation and applications of a novel chaotic system. Circuit World 43(3), 118–130 (2017)

    Article  Google Scholar 

  32. Dhivakaran, P.B., Vinodkumar, A., Vijay, S., Lakshmanan, S., Alzabut, J., El-Nabulsi, R.A., Anukool, W.: Bipartite synchronization of fractional-order memristor-based coupled delayed neural networks with pinning control. Math. Basel 10(19), 3699 (2022)

    Google Scholar 

  33. Shen, Y., Zou, T., Zhang, L., Wu, Z., Su, Y., Yan, F.: A novel solar radio spectrogram encryption algorithm based on parameter variable chaotic systems and DNA dynamic encoding. Phys. Scripta 97, 055210 (2022)

    Article  Google Scholar 

  34. Wang, X., Feng, L., Zhao, H.: Fast image encryption algorithm based on parallel computing system. Inf. Sci. 486, 340–358 (2019)

    Article  MATH  Google Scholar 

  35. Niyat, A., Moattar, M., Torshiz, M.: Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt. Laser Eng. 90, 225–237 (2017)

    Article  Google Scholar 

  36. Wang, X., Gao, S., Yu, L., Sun, Y., Sun, H.: Chaotic image encryption algorithm based on bit-combination scrambling in decimal system and dynamic diffusion. IEEE Access 7, 103662–103677 (2019)

  37. Guesmi, R., Farah, M., Kachouri, A., Samet, M.: A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2. Nonlinear Dyn. 83, 1123–1136 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  38. Khan, M., Alanazi, A.S., Khan, L.S., Hussain, I.: An efficient image encryption scheme based on fractal Tromino and Chebyshev polynomial. Complex Intell. Syst. 7(5), 2751–2764 (2021)

    Article  Google Scholar 

  39. Mathivanan, P., Balaji, G.A.: QR code based color image cryptography for the secured transmission of ECG signal. Multimed. Tools Appl. 78, 6763–6786 (2019)

    Article  Google Scholar 

  40. Pak, C., Huang, L.: A new color image encryption using combination of the 1D chaotic map. Signal Process. 138, 129–137 (2017)

    Article  Google Scholar 

  41. Liu, C., Liu, T., Liu, L., Kai, L.: A new chaotic attractor. Chaos Soliton Fract. 22, 1031–1038 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  42. Ren, H., Niu, S., Chen, J., Li, M., Yue, Y.: A visually secure image encryption based on the fractional Lorenz system and compressive sensing. Fractal Fract. 6(6), 302 (2022)

    Article  Google Scholar 

  43. Zhu, L., Song, H., Zhang, X., Yan, M., Zhang, T., Wang, X., Xu, J.: A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding. Signal Process. 175, 107629 (2020)

    Article  Google Scholar 

  44. Jiang, D., Liu, L., Wang, X., Rong, X.: Image encryption algorithm for crowd data based on a new hyperchaotic system and Bernstein polynomial. IET Image Process. 14, 3698–3717 (2021)

    Article  Google Scholar 

  45. El-Nabulsi, R.A.: Quantization of Foster mesoscopic circuit and DC-pumped Josephson parametric amplifier from fractal measure arguments. Physica E 133, 114845 (2021)

    Article  Google Scholar 

Download references

Acknowledgements

All the authors contributed to the thinking, programming and writing of this research. The overall idea of the article was proposed by Fabao Yan. Preliminary work, implementation process, data management were completed by Yupeng Shen, Tao Zou and Lei Zhang. The first manuscript was completed by Yupeng Shen. This article was revised and improved by Zhao Wu and Yanrui Su. All the authors offered suggestions for improvements to the manuscript. Each co-author had reviewed and accepted this version of the paper. In addition, Yupeng Shen would especially like to thank Zhen Li, who has always supported and cared about me. Would you like to marry me and accompany me all my life? At the same time, thank National Aeronautics and Space Administration (NASA) for a picture that includes solar radio bursts.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fabao Yan.

Ethics declarations

Funding

The National Natural Science Foundation of China (Grant No. 41904158) and the Young Scholars Program of Shandong University, Weihai (Grant No. 20820201005).

Data availability

Data sharing is not applicable to this article.

Conflict of interest

This work was published without conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yan, F., Shen, Y., Zou, T. et al. A novel spectrogram visual security encryption algorithm based on block compressed sensing and five-dimensional chaotic system. Nonlinear Dyn 111, 9607–9628 (2023). https://doi.org/10.1007/s11071-023-08317-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-023-08317-w

Keywords

Navigation