Abstract

The rapid development of the Internet leads to a surge in the amount of information transmission and brings many security problems. For multimedia information transmission, especially digital images, it is necessary to compress and encrypt at the same time. The emergence of compressive sensing solves this problem. Compressive sensing can compress and encrypt at the same time, which can not only reduce the transmission bandwidth of the network but also improve the security of the system. However, when using compressive sensing encryption, the whole measurement matrix needs to be stored, and the compressive sensing can be combined with a chaotic system, so only the generation parameters of the matrix need to be stored, and the security of the system can be further improved by using the sensitivity of the chaotic system. This paper introduces a secure and efficient image compression-encryption scheme using a new chaotic structure and compressive sensing. The chaotic map used in the scheme is generated by our new and universal chaotic structure, which not only expands the chaotic range of the chaotic system but also improves the performance of the chaotic system. After analyzing the performance comparison of traditional one-dimensional chaotic maps and some existing methods, the image compression-encryption scheme based on a new chaotic structure and compressive sensing has a good encryption effect and large keyspace, which can resist brute force attack and statistical attack.

1. Introduction

With the advent of the fifth-generation mobile networks (5G) era, the amount of information transmission is gradually increasing, and the requirements for transmission speed are also increased significantly, which requires more effective compression sampling methods to achieve higher sampling rates and signal processing speeds. Due to the security problems of the network itself, multimedia data are vulnerable to various attacks in the process of storage and secure transmission in the network, so it is particularly important to ensure the security of media information data [1, 2]. In order to carry out multimedia communication more effectively, the original image must be compressed and encrypted at the same time, and the emergence of compressive sensing can solve this problem. In 2006, Donoho [3] and Candès et al. [4] formally proposed the theory of compressive sensing (CS). Compressive sensing is an improvement on the Nyquist sampling, which can sample sparse signals nonuniformly with the number of samples far less than Nyquist sampling law and recover the original data with the reconstruction performance lower than Nyquist sampling. It is widely used in wireless sensor networks, image encryption, image data hiding, etc.

Due to the use of compressive sensing for encryption, the whole measurement matrix needs to be stored, which requires a large amount of storage space. However, it is possible to use the chaotic system that only needs to store the generation parameters of the measurement matrix, instead of storing the characteristics of the whole measurement matrix to reduce the storage space. Because of their chaotic characteristics, such as sensitivity to initial values and parameters [5, 6], ergodicity [7, 8], and uncertainty [9, 10], chaotic systems have been widely used in encryption fields [1113]. Therefore, researchers have designed many image encryption algorithms that combine compressive sensing with chaotic systems [1416].

Peng et al. [14] proposed a security and energy-saving scheme in wireless body area networks, which can solve both energy-saving and data security problems. Compared with the traditional encryption scheme, which only used one matrix to encrypt, they use any one of Chebyshev map, Logistic map, and Tent map to generate two chaotic matrices to encrypt at the same time, which increased the security and solved the security problem in a wireless volume domain network. Wang et al. [15] proposed a visual security image encryption scheme with parallel compressive sensing and designed a visual security encryption scheme with parallel compressive sensing counter mode and embedding technology. In order to achieve a higher security level, the Logistic-Tent chaotic system and 3D Cat map are introduced to construct the measurement matrix, and Zigzag confusion is used for interference. Chai et al. [16] proposed an image encryption method based on the combination of a magnetically controlled memristive chaotic system and compressive sensing. This scheme uses the technologies of a magnetically controlled memristive chaotic system, Secure Hash Algorithm- (SHA-) 512, and cellular automata. In this scheme, cellular automata are used in the diffusion stage to enhance the security of the encryption system, and SHA-512 is used to calculate the initial value of the chaotic system and further generate a measurement matrix, which makes the measurement matrix used in encrypting different types of data. This scheme can improve the correlation between the original image and the algorithm and resist known plaintext attacks and selected plaintext attacks. Chanil et al. [17] proposed a chaotic structure and applied a Logistic map and Sine map into their structure. In order to verify the performance of the proposed chaotic structure, they proposed a new bit-level color image encryption scheme. Through simulation analyses of the bifurcation diagram and Lyapunov exponent, it was proved that their chaotic structure was correct and the range of chaotic parameters was expanded.

We propose a secure and effective image compression-encryption scheme using the new chaotic structure and compressive sensing. The chaotic map used in the compression-encryption scheme is to apply the commonly used traditional one-dimensional chaotic maps to the new and general chaotic structure proposed by us. In this encryption scheme, compressive sensing is used for sampling, which can reduce storage space and transmission bandwidth. The chaotic system only needs to store matrix generation parameters, which can further reduce transmission bandwidth. Arnold interference technology and the SHA-256 function are also used, and the SHA-256 function makes different original images have different keys. Firstly, the Discrete Wavelet Transform (DWT) is used to sparse the original image, and then Arnold interference is applied to the sparse image. The interference parameters of Arnold interference are generated by the SHA-256 function. Then, compressive sensing is used to compress and sample the interference images. Finally, a chaotic sequence is used to perform row and column cyclic shift interference on the compressed and sampled image. Simulation results show that the compression-encryption scheme has a large parameter space and keyspace, which can prevent the statistical attack and brute force attack.

The rest of this paper is arranged as follows. Section 2 introduces the related basic knowledge. Section 3 describes the proposed chaotic structure and chaotic map under a new structure. Section 4 describes our encryption and decryption scheme. Section 5 simulates and evaluates our encryption scheme. Section 6 summarizes the research content carried out in this paper.

2. Fundamental Knowledge

This section gives a brief introduction to the traditional one-dimensional chaotic maps and compressive sensing.

2.1. Chaotic Maps

The commonly used traditional one-dimensional chaotic systems are the Sine map, Logistic map, Chebyshev map, and Tent map.(1)Sine mapSine map is a very simple and commonly used chaotic system [18]. Sine map is denoted aswhere is the chaotic parameter of the Sine map, and is the Sine chaotic sequence.

The bifurcation diagram and Lyapunov exponent diagram of the traditional Sine map are shown in Figures 1(a) and 2(a). The Lyapunov exponent indicates that the chaotic system must have at least one positive Lyapunov exponent. When the Lyapunov exponent is positive, the chaotic characteristics of the system can be quantified; that is, a chaotic system is sensitive to initial conditions. The larger the Lyapunov exponent is, the more sensitive to initial values the chaotic system is. As can be seen from Figures 1(a) and 2(a), the Sine map has chaotic behaviors when the chaotic parameter is in the range .(2)Logistic mapThe logistic map is also a very simple but widely used chaotic system [19]. Its performance is similar to that of a Logistic map, and it is defined aswhere is the chaotic parameter of the Logistic map, and is the Logistic chaotic sequence.The bifurcation diagram and Lyapunov exponent diagram of the traditional Logistic map are shown in Figures 1(c) and 2(c). As can be seen from Figures 1(c) and 2(c), the Logistic map has chaotic behaviors when the control parameter is in the range .(3)Chebyshev mapLike the Logistic map and Sine map, the Chebyshev map is also a commonly used one-dimensional chaotic map [20], and it is defined as follows:where is the chaotic parameter of the Chebyshev map, and is the Chebyshev chaotic sequence.The bifurcation diagram and Lyapunov exponent diagram of the traditional Chebyshev map are shown in Figures 1(e) and 2(e). Chebyshev map has chaotic behaviors when the chaotic parameter takes values in the range .(4)Tent mapTent map is defined as follows [21]:where is the chaotic parameter of the Tent map, and is the chaotic sequence of the Tent map.The bifurcation diagram and Lyapunov exponent diagram of the traditional Tent map are shown in Figures 1(g) and 2(g). Tent map has chaotic behaviors when the chaotic parameter is in the range .

2.2. Compressive Sensing

Candès et al. [22] proposed that if is an unknown vector, which is sparse or compressible on a set of orthogonal bases, the unknown vector can be accurately recovered by fewer random measured values . And this sampling process can be described by a mathematical model as follows:where is the matrix is of size , , and is the sampling value.

This mathematical representation is also a description of the standard framework of compressed perception which is a special case of underdetermined linear equations. Since there are infinitely many solutions in equation (5), the original signal cannot be recovered directly from the sampled value . However, if reflects sparsity in the sparse dictionary [23], that is,where is K-sparse and is denoted as , so we havewhere is the measurement matrix in compressive sensing. So we can recover from . is recovered by

Equation (8) is a optimization problem. Under certain conditions, the optimization problem can be transformed into a optimization problem. The typical conditions include Null Space Property (NSP) and Restricted Isometry Property (RIP). And the equivalent solution can be obtained by [24]

For the measurement matrix, spark property should be satisfied, that is, the minimum number of linear correlation of the columns of the measurement matrix, and the formula is

Donoho [25] pointed out that if , for any vector , there is at most one signal that makes .

Because solving a sparse solution is an NP-hard problem, it is impractical to solve the measurement matrix that satisfies this condition from the perspective of computation [26]. In order to recover sparse signals in reality, Candès et al. [4] introduced the RIP that there is a constant . Equation (11) holds true for all .

Although RIP provides a theoretical guarantee for recovering K-sparse signals, it is relatively complex to verify that a measurement matrix meets RIP characteristics. Therefore, in many cases, it is necessary to use the correlation of the measurement matrix to provide a more specific recovery guarantee. Correlation refers to the maximum value of the normalized inner product of two columns randomly selected in [27], namely,where is the i-th column of . For any vector , if , there is at most one signal , making .

Common recovery algorithms include Matching Pursuit (MP) algorithm [28], Orthogonal Matching Pursuit (OMP) algorithm [29], Orthogonal Matching Pursuit (StOMP) algorithm [30], and Compressive Sampling Matching Pursuit (CoSaMP) algorithm [31].

3. New Chaotic Structure

In this section, we firstly describe a new chaotic structure in detail, and secondly, we describe the new chaotic maps generated by applying the Sine map, Logistic map, Chebyshev map, and Tent map to the new chaotic structure.

3.1. New Chaotic Structure

The new chaotic structure is given as follows:where is the traditional one-dimensional chaotic map mentioned in Section 2, is a new chaotic map generated under our new chaotic structure, is the chaotic sequence, is the chaotic parameter of the proposed chaotic structure, and can take any value. is a modulus function, which ensures that the values of the generated chaotic sequence are in the range . is an adjustment function about the iteration parameter , which is iterated through adjustments to eliminate the transient effect. The values of in this chaotic structure should be specifically analyzed according to the embedded map; that is to say, when different chaotic maps are applied to the proposed chaotic structure, the values of will have different value ranges.

3.2. Application and Analysis of Our New Chaotic Structure

In this subsection, we give the detailed analyses of new chaotic maps generated by our new chaotic structure.(1)New Sine map under our new chaotic structureThe new Sine map under our new structure is defined as follows:where is the new Sine chaotic sequence which is generated by our new chaotic structure, and is the initial value of the new Sine chaotic sequence. is the chaotic parameter of this new Sine map, and is the iterations parameter of the new Sine map.The bifurcation diagram and Lyapunov exponent diagram of the new Sine map under our new structure are shown in Figures 1(b) and 2(b). It can be seen from Figures 1(b) and 2(b) that the new Sine map under our new structure has a much larger chaotic parameter range than the traditional Sine map and the Lyapunov exponent that are all positive numbers, which proves the superiority of the proposed Sine map. When and , the state of the new Sine map under our new structure is fully chaotic.(2)New Logistic map under our new chaotic structureThe new Logistic map generated by our new chaotic structure is presented as follows:where is the new Logistic chaotic sequence which is generated by our new chaotic structure, and is the initial value of the new Logistic chaotic sequence. is the chaotic parameter of the new Logistic map, and is the iterations parameter of the new Logistic map.The bifurcation diagram and Lyapunov exponent diagram of the new Logistic map under our new structure are shown in Figures 1(d) and 2(d). Like the new Sine map under our new structure, its chaotic range and performance are much better than the traditional Logistic map. When , , the Logistic map under our new structure is in a fully chaotic state.(3)New Chebyshev map under our new chaotic structureThe new Chebyshev map under our new structure can be expressed as follows:where is the new Chebyshev chaotic sequence which is generated by our new chaotic structure, and is the initial value of the new Chebyshev chaotic sequence. is the chaotic parameter of this new Chebyshev map, and is the iterations parameter of the new Chebyshev map.The bifurcation diagram and Lyapunov exponent diagram of the new Chebyshev map under our new structure are shown in Figures 1(f) and 2(f). When and , the state of the Chebyshev map under our new structure is fully chaotic.(4)New Tent map under our new chaotic structureThe new Tent map under our new structure is defined as follows:where is the new Tent chaotic sequence which is generated by our new chaotic structure, and is the initial value of the new Tent chaotic sequence. is the chaotic parameter of the new Tent map, and is the iterations parameter of the new Tent map.The bifurcation diagram and Lyapunov exponent diagram of the new Tent map under our new structure are shown in Figures 1(h) and 2(h). The Tent map under our new chaotic structure is fully chaotic when , .

4. The Proposed Compression-Encryption Scheme

In this section, a secure and effective image compression-encryption scheme is proposed by using the new chaotic map under a new structure and compressive sensing.

4.1. Key Generation

(1)The generation of the Arnold interference parameters and the interference number : calculate the 256-bit hash value according to the original image with SHA-256 function, then divide into two blocks, and three initial values are randomly selected. SHA-256 function can be used to calculate the key according to the original image, and different original images have different Arnold interference effects and different chaotic sequence parameters, so as to achieve different effects of original images and different measurement matrix. The specific formula of SHA-256 function can be expressed as follows:(2)The generation of two improved chaotic sequences : we use the new chaotic maps proposed in this paper to generate chaotic sequences. Two improved chaotic sequences are generated according to the initial values and control parameters . Take a new Tent map and new Chebyshev map as examples:(3)Calculate the cyclic sequence in the row direction. Randomly select the cycle number of the cyclic shift in the row direction, and generate according to the initial value and control parameter . The steps can be expressed as follows:where is the traditional Logistic map which is used to interfere with the sequence in the row direction, is the numbers of rows, and is the numbers of columns. The number of cycles on the row is once per row, so it needs time. The interference in the row direction is performed according to the cycle number of the cyclic shift in the row direction. Since the number of interference in the row direction will not be greater than the number of , the number of cycles can be set to .(4)Calculate the cyclic sequence in the column direction. Randomly select the cycle number of the cyclic shift in the column direction, and generate according to the initial value and control parameter . The steps can be expressed as follows:where is the traditional Logistic map which is used to interfere with the sequence in the column direction. Similarly, the number of cycles on the column is one for each column, so it takes time. Interference in the column direction is performed according to the number of cycles of cyclic shift in the column direction. Since the number of interference in the column direction will not be greater than the number of , the number of cycles can be set to .

4.2. Compression-Encryption Scheme

The chaotic map proposed in this paper is used to construct the measurement matrix for compression and encryption. Specific encryption steps can be described as follows:Step 1: firstly, an original image with the size of is obtained.Step 2: the original image is sparse by Discrete Wavelet Transform (DWT), and the sparse image with the size is obtained.Step 3: Arnold interference is carried out on a sparse image according to Arnold interference parameters and interference number . The interference image is represented by with size .Step 4: according to the chaotic sequences, two measurement matrices are obtained. One measurement matrix is represented by and the size is . is a random number as the number of rows of the measurement matrix. The number of columns of the measurement matrix is the same as the number of rows of the measured image, that is , which is used for compression and sampling, and the other measurement matrix is represented by , whose size is . The compression and sampling process using compressive sensing is expressed as follows:where is the image after compressed sampling, and its size is .Step 5: then perform cyclic shift encryption in the row direction to obtain the encrypted image in the row direction, wherein the size is , and the encryption steps in the row direction are expressed as follows:where is the number of bit cycles to be performed in all row directions for the control as a whole. function has two parameters, one to control the row and the other to control the column. Now, as long as the column is operated, function is set to .Step 6: then, perform cyclic shift encryption in the column direction to obtain the encrypted image in the column direction with size , and the encryption steps in the column direction are expressed as follows:where is the number of bit cycles to be performed in all column directions for the control as a whole. Now, as long as the row is operated, so the function is set to .

4.3. Decryption Scheme

The decryption scheme is actually the reverse operation of the encryption scheme, and its principle is the same as that of the encryption scheme. The specific decryption steps can be described as follows:Step 1: first obtain the encrypted image, which is represented by and size is .Step 2: according to the cycle number of the cyclic shift in the column direction sent by the encryption party, a bit cyclic sequence for decryption in the column direction is constructed.Step 3: decrypt the encrypted image with a cyclic shift in column direction according to and and obtain the cyclic shift in the column direction to decrypt image , with size . The steps are as follows:Step 4: according to the cycle number of the cyclic shift in the row direction sent by the encryption party, construct the bit cyclic sequence used for encryption in the row direction.Step 5: perform cyclic shift decryption on the cyclic shift decrypted image in the column direction according to the cycle number of cyclic shift encryption in the row direction sent by the encrypting party to obtain the cyclic shift decrypted image in the row direction with size . The steps are as follows:Step 6: generate the improved chaotic sequence according to the improved chaotic sequence initial values sent by the encryption party to construct the random measurement matrix, which is used for decompression sampling. And is recovered by the OMP algorithm to obtain a decompressed image, which is represented as with size .Step 7: Arnold inverse interference is performed on according to Arnold interference parameters and interference number sent by the encryption party, and the image after inverse Arnold interference is represented as with size .Step 8: image is subjected to inverse sparsity processing by Inverse Discrete Wavelet Transform (IDWT), and the final decrypted image with size is obtained.

This allows the receiver to decrypt the encrypted image and retrieve the original message. The flow chart of encryption and decryption is shown in Figure 3.

5. Simulation Result and Discussion

In this section, we simulate and evaluate the safe and effective image compression-encryption scheme, using MATLAB R2018a to simulate. The size of the selected image is , and the size of the constructed random measurement matrix is . And , the initial values of all chaotic sequences are set to 0.3, and . The cycle number of row cyclic shift encryption is , and the cycle number of column cyclic shift is . DWT is used to perform the sparse operation, and the OMP algorithm is used for recovery.

5.1. Encryption Effect

We select “Lena,” “Boom,” “Moon,” and “Rice” images for encryption to analyze the encryption and decryption effect. We use four new chaotic maps proposed in this paper to perform chaotic encryption. The encryption effect is shown in Figure 4.

It can be seen from Figures 4(a) and 4(c) that the original image becomes disorganized and irregular after encryption, and the data of the original image cannot be identified, which proves that the encryption scheme proposed in this paper has a good encryption effect.

5.2. Histogram Analysis

The histogram represents the distribution of the pixel intensity of digital images in a graphical way, which can intuitively show the pixel distribution states of the original image and the encrypted image. When the pixel distribution is not uniform, it may cause the loss of image details. The histogram of the original image is unique and vulnerable to statistical attack. To prevent this attack, the histogram of the encrypted image must be relatively uniform and different from that of the original image.

From Figures 4(b) and 4(d), the histograms of the original images are not uniformly distributed, while the encrypted histograms are uniformly distributed. It can be seen that the proposed chaotic maps applied to the encryption field have a strong resistance to statistical attack.

5.3. Key Sensitivity Analysis

We use the proposed Logistic map under our new structure for testing. Firstly, we give a set of encryption keys to encrypt the original image and then decrypt it with the same key. We randomly use a set of keys to encryption. When we use to decrypt, we can get the decrypted image. But when we use to decrypt, we could not get the decrypted image. As shown in Figure 5, even if the decryption keys differ by , the decrypted image cannot be obtained; thus, the useful information cannot be obtained, which shows that new chaotic maps have high sensitivity.

5.4. Keyspace Analysis

A good encryption scheme should make the keyspace greater than in order to resist a brute force attack. There are 14 keys in our encryption scheme, which are . If the accuracy is set to , then the keyspace of our encryption scheme is . This shows that the keyspace of our encryption scheme is large enough to resist a brute force attack.

5.5. PSNR and SSIM Analysis

In order to further verify whether the encryption algorithm is safe and reliable, the quality of the images before and after encryption is analyzed. The quality of the restored images can be evaluated using the Peak Signal-to-Noise Ratio (PSNR) and the Structural Similarity Index (SSIM). PSNR can be expressed aswhere is the pixel value at the position of the original image, is the pixel value at the position of the restored image, is the size of the image selected for the experiment, and 255 is the maximum value of the 8-bit representation. Generally, when the value of PSNR is lower than 28, the difference in image quality is greater. The smaller the PSNR, the greater the difference in image quality. The greater the PSNR, the less distortion the original image.

SSIM is used to measure the similarity between the original image and the restored image, which can be expressed aswhere , is the mean value of the original image, and is the mean value of the restored image. is the variance of the original image, is the variance of the restored image, and is the covariance of the original image and the restored image. The range of structural similarity is . In general, the larger the SSIM values, the better the overall quality of the reconstructed images. When the original image and the restored image are identical, the value of SSIM is 1.

Table 1 lists the analysis results of PSNR and SSIM. It can be seen from Table 1 that the PSNR and SSIM of our encryption scheme are the largest, indicating that the encryption and decryption effect proposed in this paper is good.

5.6. Information Entropy Analysis

Information entropy is used to measure the confusion of the image and the distribution of gray values. The larger the entropy of the images is, the more consistent the gray distribution of the images is. For a gray image of size , the theoretical value of information entropy is 8. An effective encryption algorithm should make the information entropy of the encrypted image close to the theoretical value. The information entropy can be expressed aswhere is the probability of the gray value , and is the gray level.

Table 2 lists the results of information entropy analysis. As can be seen from Table 2, the information entropy of the encrypted image is higher than that of the original image, which proves that the gray distribution of the encrypted image is more uniform than that of the original image.

5.7. Correlation Analysis

Correlation analysis mainly analyzes the correlation between pixels in adjacent locations. The correlation between adjacent pixels of the original image is very high, while the correlation between encrypted cryptographic images after an effective secure encryption system should be relatively low, with the correlation coefficient close to 0. The correlation calculation can be expressed aswhere and represent the gray values of two adjacent pixels.

Table 3 lists the correlation coefficient analysis results of the safe and effective image encryption scheme. It can be seen from Table 3 that, compared with the correlation coefficient of the original image, the correlation coefficient of the encrypted image is greatly reduced and close to 0, which indicates that the abovementioned security theoretical scheme has a good encryption effect.

6. Conclusion

We propose a safe and effective image compression-encryption scheme based on a new chaotic structure and compressive sensing. This scheme uses a new chaotic structure proposed by ourselves and applies the commonly used traditional one-dimensional chaotic maps to the proposed chaotic structure to generate corresponding new one-dimensional chaotic maps. The proposed new chaotic maps not only keep the advantages of simple structure and easy implementation of a traditional one-dimensional chaotic map but also expands the parameter range space of traditional one-dimensional chaotic maps. It is useful whenever chaotic digital sequences are needed. In addition, compressive sensing is used for sampling in this encryption scheme, which can reduce the storage space and transmission bandwidth. The chaotic system only needs to store matrix generation parameters, which can further reduce the bandwidth. Simulation results show that the proposed chaotic structure and chaotic maps have a good chaotic effect and high chaotic intensity, and the output sequence has strong chaos in a very large area of parameter space and can prevent phase space reconstruction. It can be applied to the image encryption scheme in this paper and has a large parameter space and keyspace, which can prevent brute force attacks and statistical attacks.

Data Availability

The data used to support the findings of this study are available from the first or corresponding author upon request.

Conflicts of Interest

The authors declare there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This research was fully supported by the National Natural Science Foundation of China (nos. 61972051 and 62032002), the Support Plan of Scientific and Technological Innovation Team in Universities of Henan Province (no. 20IRTSTHN013), the Henan Key Laboratory of Network Cryptography Technology (no. LNCT2019-A04), and the Research Foundation of Young Core Instructor in Henan Province (no. 2018GGJS058).