Abstract

With the evolution of smart cities, images are used in a wide range of services such as smart healthcare and surveillance. How to ensure that images are transmitted and shared securely is of paramount importance for smart cities. To this end, a secure and efficient scheme for image transmission is proposed in this paper, which uses sparse signal transformation (SST) and parallel compressive sensing (CS). The primary employed techniques are sparse signal transformation (SST), parallel CS, and diffusion-permutation operation. The compression performance is achieved by parallel CS, whereas the encryption performance is derived from SST, parallel CS, and diffusion-permutation procedure. SST is exploited to change energy information before CS sampling and incorporated into diffusion-permutation framework, which not only balances the security and the efficiency of the algorithm, but also improves the transmission efficiency of the cipher image. We introduce chaotic system to generate the measurement matrix, SST matrix, and diffusion matrix to improve security. Furthermore, numerical simulation results and theoretical analyses confirm the security performances and effectiveness of the proposed scheme.

1. Introduction

For the residents of smart cities, images play an important role in their information exchange. In order to improve the quality of life of residents, various optimization algorithms for image application need to be further proposed [16]. If there is no suitable method to share the image, the resident interests may be threatened. How to ensure that the image can be transmitted securely and efficiently is crucial for smart cities [7]. Some image encryption schemes have been designed based on cryptographic features, such as the chaos theory [8, 9], DNA coding [10], and other techniques. It is worth noting that the aforementioned algorithms can achieve security performance, but they cannot further compress the cipher images.

The compressive sensing (CS) can be considered as an encryption model of symmetric cryptography, which was firstly presented as a remarkable signal processing breakthrough in [11]. What is more, a sparse or compressible signal can be computed with overwhelming probability using some reconstruction algorithms, which has been studied in [1214]. Consequently, image encryption scheme based on CS for smart cities can perform encryption and compression simultaneously. Based on the inherent characteristics of CS, it has been popularly employed in wireless sensor networks and image cryptosystem [15]. In terms of computational secrecy, Rachlin and Baron[16] point out that the CS-based cryptosystem can achieve computational secrecy when it suffers from cipher only attack and brute force attack. Additionally, the CS security has been evaluated in many papers [1719]. It is worth noting that the above discussed security is limited to the condition that the plain image only can be obtained according to the corresponding cipher image, and the attackers have no right to access many pairs of plain images and cipher images.

Some encryption schemes are designed in [2026], which incorporates CS with other cryptographic techniques. These methods can be divided into two categories. The first kind of methods employs the permutation technique to scramble the measurement value matrix [22, 23] or to scramble the coefficient matrix before encoding the plain image [24, 25]. Another kind of methods mainly combines the double random phase encoding technique with CS to obtain the complicated cryptosystem [21, 26]. However, neither of the above two kinds of methods can resist chosen plain attack (CPA) if the measurement matrix is reused in the encoding process. The most essential cause of the above problem is that the measurement matrix can be calculated by means of launching chosen plain attack (CPA) under the condition of many pairs of plain images, and cipher images can be intercepted by an adversary, which has been pointed out in [27]. But, it is appealing if a large number of plain images can be sampled by the same measurement matrix with the view of engineering. The straight forward way to solve the above problem is to encrypt the measurement value matrix using traditional cryptographic method. However, some traditional methods are not efficient enough, such as AES and DES. Thus, it is necessary to design cryptosystem based on CS with higher efficiency under the condition that the measurement matrix is reused. Subsequently, countermode in block cipher is introduced to the CS framework in [28]. Theoretically, the cryptosystem based on CS can resist CPA if each plain image can be encoded by refreshing different measurement matrices. Based on this knowledge, Hu et al. [29] proposed an effective image encryption algorithm using parallel CS and countermode to void CPA. In [27], another novel approach constructs measurement matrix without satisfying restricted isometry property (RIP) by making full use of the secret key-related sparsifying basis. Based on this basis, a cryptosystem is designed in [30] by performing gyrator transform and double random phase followed by the CS encoding procedure. However, the decryption efficiency will be reduced as the measurement matrices need to be updated for different columns of the coefficient matrix. Apart from the above methods, other efficient techniques are also introduced to CS framework. For example, an image encryption scheme based on CS framework combined with wavelet packet transform was designed in [31]. However, the cipher image is not quantified, which results in reduced transmission efficiency. Chai et al. [32] presented a novel image encryption scheme by introducing cellular automata to CS framework, where the resistance to CPA owes the SHA-512 hash value of the plain image. But it is worth noting that the hash value of the original image must be transmitted to the decoder every time for different plain image, which may result in poor practicability.

In order to balance the efficiency and security of the cryptosystem under the premise that the measurement matrix can be reused, an efficient image encryption scheme using sparse signal transformation (SST) and parallel CS (SST-PCS) is presented in this paper, which includes two stages: the first one is SST-PCS sampling procedure for plain image and the second stage is diffusion-permutation procedure. Furthermore, based on the theory that the quality of reconstruction image will be improved if the coefficient matrix is evenly distributed, zigzag scrambling is applied on the transformed coefficient matrix with the selected start location before CS sampling. As pointed out in [33], it is theoretically feasible to construct the measurement matrix with chaotic sequence. In CS sampling procedure, every column of the final transformed coefficient matrix is encoded via parallel CS by adopting the same measurement matrix, which is constructed by the chaotic system to protect the security of the measurement matrix. What is more, compared to [29, 30], both encryption and decryption efficiency can be improved as the measurement matrix does not need to be updated.

The contributions of this paper can be summarized as follows: (i) the transformation function is employed to change energy information of the coefficient matrix before CS sampling, which is beneficial for improving the security of the cryptosystem; (ii) as SST is linear operation, SST is introduced to cryptosystem without adding computational complexity; (iii) the characteristic of SST is exploited and incorporated into diffusion-permutation framework to balance the efficiency and security of the cryptosystem; and (iv) the proposed algorithm can guarantee resistance against CPA with the help of SST, CS, and diffusion-permutation operation.

The rest of this paper is organized as follows. Section 2 introduces the preliminaries including CS and the chaotic map employed in this paper. Then, we detail the proposed scheme in Section 3, and the simulations and security analysis are discussed in Section 4. Finally, Section 5 gives the concluding remarks.

2. Preliminaries

2.1. Parallel Compressive Sensing

For traditional CS, suppose that is a discrete signal, is regarded as -sparse signal if , where is a signal of length with and denotes an orthogonal matrix of size . CS theory states that can be reconstructed by only linear measurements via reconstruction algorithms [13]. The sampled process can be formulated as follows:where represents measurement matrix of size and satisfies the restricted isometry property (RIP) of a certain order if there exists a constant such thatfor all -sparse signals , which can be recovered by solving the following optimization problem:and the convex form of problem (3) can be transformed as(or in noisy condition: ).

However, for traditional CS, only the one-dimensional signal can be directly encoded; that is to say, the multidimensional signal needs to be rearranged to a one-dimensional signal before performing CS sampling process. The above operation will make the computational complexity become larger, as well as the storage space, as the size of measurement matrix becomes large. Subsequently, the block CS [34, 35] is proposed to solve the above problem. In general, the block CS firstly divides the plain image to many small blocks, which are reshaped to corresponding one-dimension vector individually and then sampled by CS, respectively. But for the decoder, in theory, the computational complexity is not reduced since the all small blocks need to be assembled to recover the plain image.

For encoding and decoding, what we are concerned about is whether there is a cryptosystem based on CS with relatively low complexity. To this end, parallel CS is proposed. The main idea of the parallel CS is to convert the original signal into the corresponding 2D matrix, and its each column is then encoded via CS by adopting the same measurement matrix. The encoding process of parallel CS for the image with the size can be defined as follows:where is an orthonormal sparsifying basis and represent the -column of the image and the corresponding measurement value matrix, respectively. It is obvious that the required size of the measurement matrix can be reduced significantly compared to the traditional CS. What is more, decoding also can be computed individually for every column in parallel CS.

2.2. Logistic-Tent System

In our work, Logistic-Tent system is utilized to generate the transformation matrix, measurement matrix, and diffusion matrix. As pointed out in [29], compared with Logistic map and Skew Tent map as presented in equations (6) and (7), respectively, where the initial value and the control parameter of Logistic map and the control parameter of Skew Tent map . Logistic-Tent system exhibits superior performances in terms of chaotic range and other chaotic characteristics, which is described as follows:when the initial value and the control parameter of chaotic system , Logistic-Tent system is chaotic.

3. The Proposed Scheme

In this part, the complete encryption scheme using SST-PCS is presented. The encryption procedure mainly consists of two primary stages: the SST-PCS sampling process and the following measurement value matrix quantization and diffusion-permutation process. The measurement value matrix is obtained by applying SST-PCS to sample the plain image. The decryption procedure is the inverse of the encryption procedure.

3.1. The Encryption Procedure

In this section, the encryption procedure is depicted, as shown in Figure 1. In our scheme, the pairs , which are the initial values and control parameters of Logistic-Tent system, are adopted as the secret keys.

3.1.1. The SST-PCS Sampling Process

In this process, SST and zigzag scrambling are carried out on the coefficient matrix to calculate its scrambled version denoted final transformed coefficient matrix. All the entries of the transformation matrix and the measurement matrix are governed by Logistic-Tent system.Step 1: (DWT transform) for a plain image of size , the coefficient matrix is calculated by applying the discrete wavelet transform on the plain image, formulated aswhere denotes the orthogonal wavelet matrix and denotes the transpose operation of .Step 2: (generation transformation matrix) set the initial value and the control parameter , and iterate chaotic system times to generate the chaotic sequence , where denotes the sampling interval of chaotic sequence. The transformation matrix can be calculated according to the following equation:In this equation, the first “round” part and the second “mod” part will be subsequently used to change the sign and the energy of the sparse coefficient, respectively.Step 3: (SST) reshape the transformation matrix to the matrix of size and apply it to the coefficient matrix to produce the transformed coefficient matrix as follows:where “” denotes the product of the corresponding components of two matrices having the same size.Step 4: (zigzag scrambling) scan the transformed coefficient matrix in a zigzag mode from the start location to obtain the final coefficient matrix , where serves as the secret key. Enforce a part of elements of to be zero under the condition that their values are smaller than threshold .Step 5: (measurement matrix construction) set the initial value and the control parameter , and iterate chaotic system times to generate the chaotic sequence , where denotes the sampling interval of chaotic sequence. Then, regularize to , . Finally, the measurement matrix is obtained by multiplying the factor in a column-wise manner.Step 6: (sensing) utilize the measurement matrix to sample the final coefficient matrix to acquire the measurement value matrix ().

3.1.2. Measurement Value Matrix Quantization and Diffusion-Permutation Process

To enhance the security level, the quantization and diffusion-permutation operations are applied on the measurement value matrix. The detailed steps can be elaborated as follows:Step 1: (quantization) quantize the entries of measurement value matrix () to the range of , and then the quantized measurement value matrix () can be subsequently calculated according to the following equation:where denotes the largest integer not exceeding , while and denote the maximum value and minimum value within the matrix , respectively.Step 2: (diffusion-permutation) the specific procedure is as follows:Step 2.1: set the initial state value and the control parameter , and iterate chaotic system times to generate the chaotic sequence , where denotes the sampling interval of chaotic sequence. The diffusion matrix can be calculated according to the following equation:Step 2.2: reshape the matrix to the matrix of size , and then the matrix can be calculated with the diffusion matrix as follows:where “” is operator and is the given secret value.Step 2.3: obtain the cipher image by scrambling the matrix using index sequences generated by chaotic sequence . Then, reshape the matrix to the matrix of size .

3.2. The Decryption Procedure

As illustrated in Figure 2, the image decryption procedure is the inverse of the image encryption process. The detailed steps can be summarized as follows:Step 1: (inverse diffusion-permutation) reshape the cipher image to the matrix of size . Implement step 2.1 in Section 3.1.2 to acquire diffusion matrix , perform inverse permutation process using index sequences to obtain the matrix , and then obtain the decrypted quantized measurement value matrix by calculating the following equation:where “” is operator and is equal to .Step 2: (inverse quantization) reshape to the matrix of size . Inversely quantize the entries of matrix to obtain the decrypted measurement value matrix as follows:Step 3: (reconstruction)employ orthogonal matching pursuit (OMP) algorithm to recover the decrypted transformed coefficient matrix with the measurement matrix generated by performing step 5 in Section 3.1.1.Step 4: (inverse zigzag scrambling) inversely scan the decrypted transformed coefficient matrix with the secret key to obtain the matrix .Step 5: (inverse SST) perform step 2 in Section 3.1.1 to acquire the transformation matrix , and subsequently calculate the decrypted coefficient matrix according to the following equation:where “” denotes the quotient of the corresponding component of two matrices having the same size.Step 6: (inverse DWT transform) calculate the decrypted image with the orthogonal wavelet matrix by performing the following equation:

4. Simulations and Security Analyses

Numerical simulations and security analyses of the proposed algorithm are presented in this section. The sized Lena, Girl, Boat, Barbara, and Peppers and the sized Finger, Lena256, are chosen as test images in this paper. Set , , , , , and as the secret keys to encrypt the original image. OMP is adopted as the reconstruction algorithm to recover the plain image.

4.1. Effectiveness Evaluation of Encryption and Compression

In this subsection, suppose that the compression rate is set to be 0.5, and some simulation experiments are presented to verify the effectiveness of proposed image encryption scheme in terms of encryption, compression, and quality of the reconstruction image, respectively. The simulation experiments result is presented in Figure 3, where the first to third columns represent the plain images, the cipher images, and the decrypted images with the secret keys, respectively. From the perspective of encryption performances, we cannot obtain useful information from the cipher images presented in the second column. Obviously, the volume of the cipher image is only half of the plain image, and the storage space is significantly reduced. The performances of both encryption and compression have been well illustrated. Then, the performances of reconstruction quality are further evaluated according to numerical simulations. Here, peak signal-to-noise ratio (PSNR) [36] is adopted as the metric to evaluate the quality of the decrypted image. As can be observed, the quality of the decrypted image is akin to the corresponding plain image from the visual perspective. Additionally, from top to bottom in the third column, the reconstructed image is with PSNRs of , , and , respectively. Such numerical simulations indicate that the proposed encryption scheme can satisfactorily achieve encryption and compression simultaneously.

We also compare the quality of reconstructed image of the proposed scheme with other existing encryption schemes based on CS [6, 32, 37]. Table 1 presents the image reconstruction performance on test image Lena256 of size when the compression rate is 0.5. As can be observed, the PSNRs of the decrypted images in [6, 32, 37] are less than our scheme, which indicates that our proposed scheme exhibits image superior reconstruction performance.

4.2. Key Space

As pointed out in [38], the cryptosystem can resist brute-force attack if the key space, which is composed of the all secret keys used in cryptosystem, is larger than . In our paper, the pairs are adopted as the secret keys. As the computational precision of the double precision number is about , so the key space of the proposed algorithm is , which indicates that the proposed scheme can resist brute-force attack.

4.3. Correlation Analysis

The correlation among adjacent pixels is an important evaluation index to evaluate the cryptosystem. Since the values among adjacent plain image pixels are similar, the plain image correlation coefficients are usually high. An effective encryption scheme should ensure that the correlation coefficients of cipher images are sufficiently low. To calculate the correlation coefficients of the images, 5000 adjacent pixels from the plain image Lena and its corresponding cipher image are randomly selected in horizontal, vertical, and diagonal directions, respectively. The correlation coefficients in horizontal, vertical, and diagonal directions are calculated by the following equation:

The simulation results are depicted in Figure 4 and Table 2. From Figure 4, we can observe that the correlations among adjacent pixels of plain image are dramatically reduced. As presented in Table 2, all listed algorithms exhibit satisfactory cipher image correlations, but compared to [29, 39], the proposed algorithm exhibits superiority in horizontal direction.

4.4. Histogram Analysis

Histogram is an evaluation index to assess the distribution of pixel values. An effective image encryption scheme can make the histogram of the cipher image equally distributed. Simulation results of histograms are presented in Figure 5. The plain image Lena and the corresponding cipher image are shown in Figures 5(a) and 5(c), respectively, and their corresponding histograms are shown in Figures 5(b) and 5(d). As we can see, the histogram of cipher image is uniformly distributed, which indicates that the redundancy of plain image is successfully removed.

4.5. Key Sensitivity Analysis

In order to assess the key sensitivity of cryptosystem performance, some simulation experiments are presented. An effective image encryption scheme will produce two different cipher images when tiny different secret keys are employed to encrypt the same plain image, and the cipher images will not be decrypted correctly when the correct key is changed slightly.

4.5.1. Key Sensitivity Analysis in the Encryption Process

The number of pixels change rate (NPCR) and unified average change in intensity (UACI) are introduced to evaluate the difference between two images of the same size, which are described as follows:where if ; else . Consequently, if two images are completely different, NPCR equals 1. In this test, suppose that the compression rate is set to be 0.75, and Lena is selected as the plain image. To test key sensitivity in the encryption process, a tiny change is sequentially added to one of the parameters with others unchanged to obtain corresponding cipher images. The values of NPCR and UACI for the cipher images are 99.65%, 33.27%, 99.65%, 33.88%, 99.61%, 33.49%, 99.56%, 33.25%, 99.62%, 33.44%, 99.56%, and 33.37% with , , , , , and , respectively.

4.5.2. Key Sensitivity Analysis in the Decryption Process

Key sensitivity performance in the decryption procedure is also tested. Lena is chosen as the plain image, and the cipher image is obtained with the secret keys, as shown in Figure 6(a). The cipher images are sequentially decrypted with the correct key and the wrong keys constructed by adding a tiny change to one of the parameters with others unchanged, namely, , , , , , and . The corresponding decrypted images are presented in Figures 6(b)6(h). The differences between the corresponding decrypted images and the decrypted image with correct keys are 99.81%, 99.77%, 99.80%, 99.82%, 99.91%, and 99.90%, respectively. The simulation results show that the proposed scheme has extreme key sensitivity.

4.6. Efficiency Analysis

For the proposed image encryption algorithm, the time consumption mainly comes from the workloads of generating the measurement matrix and the sort of the chaotic sequence. The complexity is as low as based on the sort algorithm. In many applications, encryption time is also an important index to evaluate the performance of the algorithm. The encryption time of different test images is presented in Table 3, from which one can see that the encryption time changes slightly when the compression ratio (CR) is varying from 0.25 to 0.75 for a same plain image. As shown in Table 3, the encryption time of image Finger varies from 0.2646s to 0.3484s when compression ratio changes from 0.25 to 0.75. We can observe that the encryption time increases as the size of plain image becomes larger. We also compare the encryption time of the proposed scheme with other existing encryption schemes [40]. The simulation results are depicted in Table 4. As a result, the proposed scheme can be applicable in practical applications.

4.7. Chosen Plaintext Attacks

Since the CS process can be regarded as the linear projection, based on the knowledge of [27], the measurement matrix can be revealed essentially by choosing an identity matrix and obtaining the corresponding measurement value matrix. However, in the proposed scheme, the parallel CS output result of an identity matrix is no longer the measurement matrix because the identity matrix has been transformed and scanned in a zigzag mode before sampled by parallel CS.

To illustrate the above argument, some experiments have been done, and the results are shown in Figure 7, where Lena is selected as the test image. Set CR to be 0.5. Here, the CS-based image scheme without considering zigzag scrambling and SST (called the original CS scheme) is introduced and compared. The cipher images produced by the original CS scheme and the proposed scheme are presented in Figures 7(a) and 7(d), respectively. Then, Figures 7(b) and 7(e) represent the measurement value matrices and generated by the original CS scheme and the proposed scheme when the identity matrix is regarded as the plain image under the condition of without applying DWT on the identity matrix. Figure 7(c) is the decrypted image obtained by applying the decryption process of the original CS scheme in Figure 7(a) with the secret key , , , and treating as the measurement matrix. Similarly, Figure 7(f) is the corresponding decrypted image obtained by applying the decryption process of our proposed SST-PCS scheme on Figure 7(d) with the secret key , , and treating as the measurement matrix. From Figure 7(f), one can see that the parallel CS output result of an identity matrix is no longer the measurement matrix.

What is more, the obtained measurement value matrix will be subsequently encrypted by diffusion process, so the probability of extracting the measurement matrix is zero. Consequently, the attacker cannot retrieve the plain image by launching CPA. In the light of the above analysis and experiments, it is impossible to retrieve the plain image by launching CPA.

4.8. Robustness Analysis
4.8.1. Robustness Evaluation against Noise

As the cipher image will be contaminated during the transmission process, robustness against noise attack is an evaluation index for an effective image encryption scheme. To assess the robustness against noise attack, the quality of corresponding decrypted images will be evaluated if the cipher image is contaminated with salt and pepper noise, Gaussian noise, and speckle noise with different intensities. In this test, the image Girl shown in Figure 3 is selected as the plain image, and its corresponding cipher image will be contaminated with noise. As shown in Figure 8, the cipher images with salt and pepper noise intensities 0.1%, 0.3%, 0.5%, and 0.7% are presented in the first row, the ones with Gaussian noise having different intensities 0.0001%, 0.0003%, 0.0005%, and 0.0007% are presented in the third row, and the ones with speckle noise having different intensities 0.0001%, 0.0003%, 0.0005%, and 0.0007% are presented in the fifth row, while the second row, fourth row, and sixth row denote the corresponding decrypted images of the first row, the third row, and the fifth row, respectively. As we can see, the decrypted images are still visually meaningful in the case of the cipher images contaminated.

4.8.2. Robustness Evaluation against Occlusion

Robustness against occlusion of the proposed scheme is also tested in this paper. The image Girl is chosen as the plain image, and its corresponding cipher images will be occluded in the upper left corner, the bottom left corner, the upper right corner, the bottom right corner, and the central directions, as shown in the first row of Figure 9. The decrypted images corresponding to the first row are shown in the second row in Figure 9. From Figure 9, one can still obtain most of the image information from the decrypted image. The simulation results show that the proposed scheme exhibit robustness against occlusion to some extent.

4.9. Entropy Analysis

The entropy is an important evaluation index to evaluate the cryptosystem. To calculate the entropy of the proposed scheme, Lena, Barbara, and Peppers are selected as the plain images. The entropy is calculated by the following equation:where is the probability of appearance of pixel and the maximum value of is 8. We also compare the entropy of the proposed scheme with other existing encryption schemes [41]. The simulation results are depicted in Table 5. We can observe that the entropy of the cipher image is closer to 8, which indicates that the proposed image encryption scheme has high security.

5. Conclusion

In this paper, a scheme for image secure and efficient transmission in smart cities using SST and CS has been presented. Many recent works have investigated how to incorporate CS with other efficient cryptographic primitives to ensure confidentiality of the image. However, since CS sampling is a linear projection, those compound encryption methods can be translated to matrix multiplication, which cannot resist CPA. What is more, for smart cities, security issue is the most important. In our proposed scheme, by incorporating SST into the framework of CS and subsequently performing diffusion-permutation procedure followed by parallel CS, an efficient image simultaneous encryption and compression model with resistance against CPA is realized. Particularly, encryption and decryption can be computed individually for every column in parallel CS. It is practicable and reliable, with high potential to be adopted for CS measurement matrix reuse circumstance. Theoretical analyses and performance evaluations have verified the security and robustness of the proposed scheme.

Data Availability

No data were used to support this study.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work was funded by the Shandong Provincial Natural Science Foundation (no. ZR2020QF014) and the Shandong Provincial Key Research and Development Program (Major Science and Technological Innovation Project, no. 2019JZZY010134).