1
|
Wen H, Ma L, Liu L, Huang Y, Chen Z, Li R, Liu Z, Lin W, Wu J, Li Y, Zhang C. High-quality restoration image encryption using DCT frequency-domain compression coding and chaos. Sci Rep 2022; 12:16523. [PMID: 36192488 PMCID: PMC9530123 DOI: 10.1038/s41598-022-20145-3] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/03/2022] [Accepted: 09/09/2022] [Indexed: 11/09/2022] Open
Abstract
With the arrival of the age of big data, the amount and types of data in the process of information transmission have increased significantly, and the full-disk encryption mode used by traditional encryption algorithms has certain limitations of the times. In order to further improve the bandwidth efficiency of digital images in the transmission process and the information effectiveness of digital image transmission, this paper proposes an algorithm of high-quality restoration image encryption using DCT frequency-domain compression coding and chaos. Firstly, the image hash value is used for the generation of an encryption key with plaintext correlation, then lightweight chaos is generated based on the key to obtain a pseudo-random sequence. Secondly, the image is partitioned into subblock, and converted from time domain into frequency domain by employing Discrete Cosine Transform (DCT) on each block, then perform quantization operation based on frequency domain information to obtain DCT coefficient matrix. Thirdly, the direct current (DC) coefficients and alternating current (AC) coefficients are extracted in the DCT coefficient matrix and compressed by different encoding methods to obtain two sets of bitstream containing DC coefficient and AC coefficient information. Fourthly, permute the DC coefficient bit stream by the chaotic sequence, and reconstruct it with the AC coefficient bit stream to obtain the frequency domain ciphertext image. Finally, the chaotic sequence is used to diffuse ciphertext, and the processed hash value is hidden in the ciphertext to obtain the final ciphertext. The theoretical and experimental analysis showed that the key length reaches 341 bits, and the PSNR value of the restored image is close to 60, all of which satisfy the theoretical value. Therefore, the algorithm has the characteristics of high compression rate, high-quality image restoration large key space, strong plaintext sensitivity, strong key sensitivity and so on. Our method proposed in this paper is expected to provide a new idea for confidential and secure communication in the age of big data.
Collapse
Affiliation(s)
- Heping Wen
- Zhongshan Institute, School of electronic information, University of Electronic Science and Technology of China, Zhongshan, 528402, China.
- School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China.
- Guangdong Provincial Key Laboratory of Information Security Technology, Sun Yat-sen University, Guangzhou, 510006, China.
| | - Linchao Ma
- Zhongshan Institute, School of electronic information, University of Electronic Science and Technology of China, Zhongshan, 528402, China
| | - Linhao Liu
- Zhongshan Institute, School of electronic information, University of Electronic Science and Technology of China, Zhongshan, 528402, China
| | - Yiming Huang
- Zhongshan Institute, School of electronic information, University of Electronic Science and Technology of China, Zhongshan, 528402, China
| | - Zefeng Chen
- Zhongshan Institute, School of electronic information, University of Electronic Science and Technology of China, Zhongshan, 528402, China
| | - Rui Li
- Zhongshan Institute, School of electronic information, University of Electronic Science and Technology of China, Zhongshan, 528402, China
| | - Zhen Liu
- Zhongshan Institute, School of electronic information, University of Electronic Science and Technology of China, Zhongshan, 528402, China
| | - Wenxing Lin
- Zhongshan Institute, School of electronic information, University of Electronic Science and Technology of China, Zhongshan, 528402, China
| | - Jiahao Wu
- Zhongshan Institute, School of electronic information, University of Electronic Science and Technology of China, Zhongshan, 528402, China
| | - Yunqi Li
- Zhongshan Institute, School of electronic information, University of Electronic Science and Technology of China, Zhongshan, 528402, China
| | - Chongfu Zhang
- School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China.
| |
Collapse
|
2
|
Wen H, Chen Z, Zheng J, Huang Y, Li S, Ma L, Lin Y, Liu Z, Li R, Liu L, Lin W, Yang J, Zhang C, Yang H. Design and Embedded Implementation of Secure Image Encryption Scheme Using DWT and 2D-LASM. ENTROPY (BASEL, SWITZERLAND) 2022; 24:1332. [PMID: 37420352 DOI: 10.3390/e24101332] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/18/2022] [Revised: 09/17/2022] [Accepted: 09/19/2022] [Indexed: 07/09/2023]
Abstract
In order to further improve the information effectiveness of digital image transmission, an image-encryption algorithm based on 2D-Logistic-adjusted-Sine map (2D-LASM) and Discrete Wavelet Transform (DWT) is proposed. First, a dynamic key with plaintext correlation is generated using Message-Digest Algorithm 5 (MD5), and 2D-LASM chaos is generated based on the key to obtain a chaotic pseudo-random sequence. Secondly, we perform DWT on the plaintext image to map the image from the time domain to the frequency domain and decompose the low-frequency (LF) coefficient and high-frequency (HF) coefficient. Then, the chaotic sequence is used to encrypt the LF coefficient with the structure of "confusion-permutation". We perform the permutation operation on HF coefficient, and we reconstruct the image of the processed LF coefficient and HF coefficient to obtain the frequency-domain ciphertext image. Finally, the ciphertext is dynamically diffused using the chaotic sequence to obtain the final ciphertext. Theoretical analysis and simulation experiments show that the algorithm has a large key space and can effectively resist various attacks. Compared with the spatial-domain algorithms, this algorithm has great advantages in terms of computational complexity, security performance, and encryption efficiency. At the same time, it provides better concealment of the encrypted image while ensuring the encryption efficiency compared to existing frequency-domain methods. The successful implementation on the embedded device in the optical network environment verifies the experimental feasibility of this algorithm in the new network application.
Collapse
Affiliation(s)
- Heping Wen
- School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China
- School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
| | - Zefeng Chen
- School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China
| | - Jiehong Zheng
- School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China
| | - Yiming Huang
- School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China
| | - Shuwei Li
- School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China
| | - Linchao Ma
- School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China
| | - Yiting Lin
- School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China
| | - Zhen Liu
- School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China
| | - Rui Li
- School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China
| | - Linhao Liu
- School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China
| | - Wenxing Lin
- School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China
| | - Jieyi Yang
- School of Electronic Information, Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China
| | - Chongfu Zhang
- School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
| | - Huaide Yang
- School of Electronic Information, Dongguan Polytechnic, Dongguan 523808, China
| |
Collapse
|