Advertisement

Compressive Sensing and Chaos-Based Image Compression Encryption

  • R. Ponuma
  • R. Amutha
Chapter
Part of the Studies in Computational Intelligence book series (SCI, volume 730)

Abstract

Compressive sensing and chaos-based image compression-encryption scheme is proposed. A two-dimensional chaotic map, the sine logistic modulation map is used to generate a chaotic sequence. The chaotic sequence is used to construct two circulant measurement matrices. The sparse representation of the plain image is obtained by employing discrete cosine transform. The transform coefficients are then measured using the two measurement matrices. Two levels of encryption are achieved. The parameters of the chaotic map acts as the key in the first level of encryption. Further, Arnold chaotic map-based scrambling is used to enhance the security of the cipher. Simulation results verify the effectiveness of the algorithm and its robustness against various attacks.

Keywords

Chaotic maps Compressive sensing Image compression Image encryption 

References

  1. 1.
    Phamila, A.V.Y., Amutha, R.: Low complexity energy efficient very low bit-rate image compression scheme for wireless sensor network. Inf. Process. Lett. 113(18), 672–676 (2013)MathSciNetCrossRefMATHGoogle Scholar
  2. 2.
    Phamila, A.V.Y., Amutha, R.: Energy-efficient low bit rate image compression in wavelet domain for wireless image sensor networks. Electron. Lett. 51(11), 824–826 (2015)CrossRefGoogle Scholar
  3. 3.
    Zhou, Y., Bao, L., Chen, C.P.: A new 1D chaotic system for image encryption. Sig. Process. 97, 172–182 (2014)CrossRefGoogle Scholar
  4. 4.
    Belazi, A., El-Latif, A.A.A., Belghith, S.: A novel image encryption scheme based on substitution-permutation network and chaos. Sig. Process. 128, 155–170 (2016)CrossRefGoogle Scholar
  5. 5.
    Hanis, S., Amutha, R.: Double image compression and encryption scheme using logistic mapped convolution and cellular automata. Multimedia Tools Appl. (2017). doi: 10.1007/s11042-017-4606-0 Google Scholar
  6. 6.
    Deepak, M., Ashwin, V. and Amutha, R.: A new multistage multiple image encryption using a combination of Chaotic Block Cipher and Iterative Fractional Fourier Transform. In: First International Conference on Networks and Soft Computing (ICNSC2014), pp. 360–364 (2014)Google Scholar
  7. 7.
    Zhang, W., Yu, H., Zhao, Y.L., Zhu, Z.L.: Image encryption based on three-dimensional bit matrix permutation. Sig. Process. 118, 36–50 (2016)CrossRefGoogle Scholar
  8. 8.
    Zhu, H., Zhao, C., Zhang, X.: A novel image encryption–compression scheme using hyper-chaos and Chinese remainder theorem. Sig. Process. Image Commun. 28(6), 670–680 (2013)CrossRefGoogle Scholar
  9. 9.
    Guesmi, R., Farah, M.A.B., Kachouri, A., Samet, M.: A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2. Nonlinear Dyn. 83(3), 1123–1136 (2016)Google Scholar
  10. 10.
    Chen, J.X., Zhu, Z.L., Fu, C., Yu, H.: Optical image encryption scheme using 3-D chaotic map based joint image scrambling and random encoding in gyrator domains. Opt. Commun. 341, 263–270 (2015)CrossRefGoogle Scholar
  11. 11.
    Mahesh, M., Srinivasan, D., Kankanala, M., Amutha, R.: Image cryptography using discrete Haar Wavelet transform and Arnold Cat Map. In Communications and Signal Processing (ICCSP), 2015 International Conference, pp. 1849–1855 (2015)Google Scholar
  12. 12.
    Wu, X., Wang, D., Kurths, J., Kan, H.: A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inf. Sci. 349, 137–153 (2016)CrossRefGoogle Scholar
  13. 13.
    Niyat, A.Y., Moattar, M.H., Torshiz, M.N.: Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt. Lasers Eng. 90, 225–237 (2017)CrossRefGoogle Scholar
  14. 14.
    Chandrasekaran, J. and Thiruvengadam, S.J.: A hybrid chaotic and number theoretic approach for securing DICOM images. Secur. Commun. Netw. (2017)Google Scholar
  15. 15.
    Donoho, D.L.: Compressed sensing. IEEE Trans. Inf. Theory 52(4), 1289–1306 (2006)MathSciNetCrossRefMATHGoogle Scholar
  16. 16.
    Baraniuk, R.G.: Compressive sensing [lecture notes]. IEEE Signal Process. Mag. 24(4), 118–121 (2007)CrossRefGoogle Scholar
  17. 17.
    Rachlin, Y., Baron, D.: The secrecy of compressed sensing measurements. In: Communication, Control, and Computing, 2008 46th Annual Allerton Conference, pp. 813–817 (2008)Google Scholar
  18. 18.
    Zhang, Y., Zhou, J., Chen, F., Zhang, L.Y., Wong, K.W., He, X., Xiao, D.: Embedding cryptographic features in compressive sensing. Neurocomputing 205, 472–480 (2016)CrossRefGoogle Scholar
  19. 19.
    Zhou, N., Zhang, A., Zheng, F., Gong, L.: Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt. Laser Technol. 62, 152–160 (2014)CrossRefGoogle Scholar
  20. 20.
    Ponuma, R., Aarthi, V., Amutha, R.: Cosine Number Transform based hybrid image compression-encryption. In: Wireless Communications, Signal Processing and Networking (WiSPNET), International Conference, pp. 172–176 (2016)Google Scholar
  21. 21.
    Zhang, A., Zhou, N., Gong, L.: Color image encryption algorithm combining compressive sensing with Arnold transform. J. Comput. 8(11), 2857–2863 (2013)Google Scholar
  22. 22.
    Zhou, N., Li, H., Wang, D., Pan, S., Zhou, Z.: Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt. Commun. 343, 10–21 (2015)CrossRefGoogle Scholar
  23. 23.
    Zhou, N., Pan, S., Cheng, S., Zhou, Z.: Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt. Laser Technol. 82, 121–133 (2016)CrossRefGoogle Scholar
  24. 24.
    Candes, E.J.: The restricted isometry property and its implications for compressed sensing. C.R. Math. 346(9–10), 589–592 (2008)MathSciNetCrossRefMATHGoogle Scholar
  25. 25.
    Bandeira, A.S., Dobriban, E., Mixon, D.G., Sawin, W.F.: Certifying the restricted isometry property is hard. IEEE Trans. Inf. Theory 59(6), 3448–3450 (2013)MathSciNetCrossRefMATHGoogle Scholar
  26. 26.
    Mallat, S.G., Zhang, Z.: Matching pursuits with time-frequency dictionaries. IEEE Trans. Signal Process. 41(12), 3397–3415 (1993)CrossRefMATHGoogle Scholar
  27. 27.
    Liu, E., Temlyakov, V.N.: The orthogonal super greedy algorithm and applications in compressed sensing. IEEE Trans. Inf. Theory 58(4), 2040–2047 (2012)MathSciNetCrossRefMATHGoogle Scholar
  28. 28.
    Mohimani, H., Babaie-Zadeh, M., Jutten, C.: A fast approach for overcomplete sparse decomposition based on smoothed l 0 norm. IEEE Trans. Signal Process. 57(1), 289–301 (2009)MathSciNetCrossRefMATHGoogle Scholar
  29. 29.
    Hua, Z., Zhou, Y., Pun, C.M., Chen, C.P.: 2D sine logistic modulation map for image encryption. Inf. Sci. 297, 80–94 (2015)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.Department of Electronics and Communication EngineeringSSN College of EngineeringChennaiIndia

Personalised recommendations