Security and Communication Networks

Security and Communication Networks / 2021 / Article
Special Issue

Image Security and Image Privacy Protection

View this Special Issue

Research Article | Open Access

Volume 2021 |Article ID 6625579 | https://doi.org/10.1155/2021/6625579

Zhuo Liu, Yong Wang, Leo Yu Zhang, Jun Ma, "A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model", Security and Communication Networks, vol. 2021, Article ID 6625579, 21 pages, 2021. https://doi.org/10.1155/2021/6625579

A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model

Academic Editor: David Megias
Received28 Dec 2020
Revised04 Feb 2021
Accepted17 Mar 2021
Published10 Apr 2021

Abstract

The digital image, as the critical component of information transmission and storage, has been widely used in the fields of big data, cloud and frog computing, Internet of things, and so on. Due to large amounts of private information in the digital image, the image protection is fairly essential, and the designing of the encryption image scheme has become a hot issue in recent years. In this paper, to resolve the shortcoming that the probability density distribution (PDD) of the chaotic sequences generated in the original two-dimensional coupled map lattice (2D CML) model is uneven, we firstly proposed an improved 2D CML model according to adding the offsets for each node after every iteration of the original model, which possesses much better chaotic performance than the original one, and also its chaotic sequences become uniform. Based on the improved 2D CML model, we designed a compressive image encryption scheme. Under the condition of different keys, the uniform chaotic sequences generated by the improved 2D CML model are utilized for compressing, confusing, and diffusing, respectively. Meanwhile, the message authentication code (MAC) is employed for guaranteeing that the encryption image be integration. Finally, theoretical analysis and simulation tests both demonstrate that the proposed image encryption scheme owns outstanding statistical, well encryption performance, and high security. It has great potential for ensuring the digital image security in application.

1. Introduction

In the recent years, the digital image, as an important carrier tool of information transmission and storage, has been popularly used in the fields of big data, cloud and frog computing, Internet of things, and so on [15]. The digital image contains personal privacy, commercial, and important military information. Thus, the leaking of this important information leads to some serious consequences [6, 7]. In order to combat illegal access, revision, and other attacks of the digital image, it is considerably essential to design high level of encryption schemes. Moreover, due to the enormous amount of the digital image, compression in the digital image should be also taken into account to improve the efficiency of transmission and storage [8, 9].

There are two views on how to design the encryption image scheme; the first one is to consider the traditional encryption method for the digital image encryption [10], such as Data Encryption Standard (DES) and Advanced Encryption Standard (AES). Those traditional schemes can guarantee the digital image safety. However, those schemes are not highly efficient and do not consider the inherent characteristics of the digital image, which causes high pixel correlation and redundancy. That probably brings about some potential vulnerability to the safety image. In addition, the traditional image encryption scheme cannot be applied to compress the digital image. On the other hand, to solve the abovementioned security risks, considering the unique characteristics of randomness and initial sensitivity of the chaos, combining some special features of the digital image, it is quite clear that the chaotic sequences generated by the chaotic system are pretty suitable for compression and encryption [11, 12].

The chaotic system, firstly proposed in 1982, has been widely studied by many researchers [13, 14]. In particular, the higher-dimensional chaotic system, which possesses a much larger Lyapunov exponent (LE) and more complex dynamic performance, is popularly utilized in the digital image encryption recently. The CML model, as one of the classic spatiotemporal models, has been used as key competent to construct the digital image compression and encryption scheme. Compared with the one-dimensional CML (1D CML), the 2D CML model has much more complex chaotic dynamic characteristics, which is promising to the digital image encryption. Based on the 2D Nonadjacent CML model, the digital image encryption scheme was proposed [15], and theoretical analysis and numerical simulation demonstrate that the digital image encryption scheme is effective. He et al. proposed a new image encryption scheme according to the 2D CML model and bit-level permutation [16], which owns more secure and effective performance. A novel image encryption scheme based on the nearest-neighboring CML was proposed [17], and it has higher security level, higher sensitivity, and higher speed. Although the 2D CML model was considered for encryption in the aforementioned schemes [1517], the application of the 2D CML model in compression is still in the infancy; because of the difficulty in verifying the Restricted Isometry Property (RIP), the existing compressive image schemes mainly focus on the low-complexity chaotic system [18, 19]. The logistic system is utilized to produce the measurement matrix for compression in [18]. A novel encrypted compressive sensing of images based on fractional-order hyperchaotic Chen system and DNA operations is proposed in this paper [19]. The low-complexity chaotic system indicates the low-security image encryption scheme and small key space. To improve the encryption scheme’s security and enlarge the key space, the high-dimensional system such as the 2D CML model should be applied in the CS. Moreover, the key issue is how to verify the independence of the chaotic sequences generated by the 2D CML model. However, few scholars have discussed that problem. Meanwhile, the PDD of the core model in those schemes [1519] is uneven, and the uneven sequences indicate that they are easier to be attacked, which brings about the security risks to the designing of the digital image encryption scheme.

To remedy the above-mentioned problems, we proposed an improved 2D CML model; compared with the original 2D CML model, it has more uniform PDD. Meanwhile, the chaotic sequences generated by the improved model are independent according to the independent testing. Based on the improved 2D CML model, a novel compressive image encryption scheme is designed. In our scheme, the independent sequences are firstly used for compressive sensing with the key. Then, according to another key of the improved 2D CML model, the chaotic sequences for confusing and diffusing are produced. In addition, the MAC algorithm is utilized to ensure integrity and authentication of digital image. Here, we choose the Hash function as the MAC algorithm. The main contributions of this paper are summarized as follows:(i)According to adding different offsets for each node, an improved 2D CML model is presented. The simulation analysis shows that the PDD of the chaotic sequences generated by the improved 2D CML mode is uniform. Meanwhile, the LE expression of the improved model is derived mathematically, which can guide the setting of the parameters to ensure the complex chaotic performance.(ii)Based on the improved 2D CML model, the proposed image encryption scheme is designed. With different keys, the chaotic sequences generated by the improved model are used for compressing, confusing, and diffusing, respectively.(iii)In the proposed image encryption scheme, we use the MAC algorithm to ensure the digital image integrity. Finally, theory analysis and simulation tests both prove that the proposed scheme possesses outstanding encryption performance.

The remaining part of this paper is organized as follows. Preliminaries are presented in Section 2, and an improved 2D CML model is proposed in Section 3. In Section 4, the proposed image encryption scheme based on the improved model and MAC algorithm is designed. In Section 5, the performances of the proposed encryption scheme are analysed. Finally, we draw the conclusion in Section 6.

2. Preliminaries

2.1. 2D CML Model

The CML model is firstly proposed by Kaneko in [20], which is a common spatiotemporal chaos model. To enhance the complexity of the CML model, it is extended into the 2D CML one, which is depicted as follows.

Definition 1. The 2D CML model is mathematically shown aswhere f(.) denotes the local chaotic map and and are the row and column indexes of the nodes, respectively. The periodic boundary conditions are and .
According to equation (1), we need to iterate f for five times to calculate the value of . For improving the computation efficiency of the model, the 2D CML model is simplified as

2.2. The Piecewise Logistic Map

Owing to much larger LE and more complex chaotic characteristics, the piecewise logistic map (PLM) was proposed [21], which is defined bywhere is the segment number of the PLM function, is the control parameter, is the state value, and . Moreover, when and in equation (3), the LE value of PLM is 4.574594, which is the maximum LE (MLE), and the PLM function owns the most complex chaotic performance.

2.3. Compressive Sensing

Compressive sensing (CS), as depicted in Figure 1, was proposed by Candes and Donoho in 2006 [22], which is shown bywhere x is the original signal of dimensions, is the measurement matrix with dimensions, y is the compressed measurement matrix with dimensions, and . In equation (4), the original signal is mostly not sparse, which is represented as

where is the orthogonal basis matrix and is the coefficient vector.

According to equations (4) and (5), the CS processing is as follows:where is the sensing matrix of dimensional and must satisfy the RIP defined in Definition 2. Due to the reconstruction of the signal, can be recovered by calculating.

Definition 2. Suppose that there exists a constant such thatholds for all .

3. The Improved 2D CML Model

3.1. The Model

In the original 2D CML model, set and in the local mapping PLM and and in model; we plot the PPD of sequences generated by the nodes in Figure 2. Clearly, the PPD of sequences is uneven, and the peak areas are covered in the intervals and .

From the perspective of the cryptography, the uneven PPD of chaotic sequences causes some security breaches for the attackers. To overcome the shortcoming, we add a different offset for each node after each iteration and propose an improved 2D CML model, which is described asand, in the proposed 2D CML model, is the iteration state value of the th and th nodes at time . For each , we add the offset value . is obtained and used for the state value in the next iteration. According to the above-mentioned 2D CML model, using the same parameter as in the original 2D CML model, the PPD of the sequences generated by the improved model is shown in Figure 3. According to Figure 3, the PPD becomes uniform.

3.2. The Characteristics of the Proposed Model
3.2.1. Lyapunov Exponent

LE is usually used to judge whether a system is chaotic, and a positive LE indicates the system is in chaos. Otherwise, it is not chaotic. Meanwhile, according to the LE formula of the chaotic system, we can set the parameters to make the chaotic system remain in the fully chaotic state. Using the method in [23], the LE formula of the improved 2D CML model is derived as follows.

Firstly, the improved 2D CML model is converted to a one-dimensional CML. Therefore, equation (2) is converted to

In equation (9), the periodic boundary is and .

We can get the derivatives of as follows:

Then, the differential of equation (9) is

Based on equations (10) and (11), we have

From equation (13), we can getwhere is the Jacobin matrix and .

Moreover, set , and the eigenvalue of is and the eigenvalue of is . It is easy to verify the formula of LEs:

is a block circulant matrix; its eigenvalue values are . Substituting into equation (15), we have

According to equation (16), we can get the following significant theoretical results. The MLE is solely decided by the local chaotic map. Consequently, in the proposed 2D CML model, when choosing PLM with and, the LE of the proposed 2D CML model is maximum, and it has the most complex chaotic performance.

3.2.2. Bifurcation

The bifurcations of the original 2D CML model and the improved 2D CML model are shown in Figures 4 and 5 , respectively. In the original 2D CML model, the bifurcations of all the nodes are almost the same. Here, select the 1st node as delegate. In the improved 2D CML model, we choose the 1st, 4th, 8th, 12th, and 16th nodes to depict the bifurcation. According to Figures 4 and 5, compared with those two modes, the improved 2D CML model has bigger improvement than the original 2D CML one.

3.2.3. Ergodicity

In statistics, ergodicity describes the randomness of statistical results at time and space. In a chaotic system, the iteration values of a system cover the entire interval, and it indicates that the chaotic system is more complex. Here, fix , , and , and change the value of with ; we plot the ergodicity of the original 2D CML model and the improved 2D CML modelcause, in the improved 2D CML mod in Figures 6 and 7 , respectively. It is clear that the improved model has much better chaotic performance than in the original model, and this is because, in the improved 2D CML model, the values of are covered fully the interval when and when in the original one.

4. Construction of the Chaotic-Based Measurement Matrix

4.1. The Independence Testing of Chaotic Sequences

The chaotic sequences utilized for constructing the measurement matrix must satisfy the RIP, and the chaotic sequences are requested to be independently identically distributed. To authenticate that the chaotic sequences generated by the improved 2D CML model are independent, only the independent sequences can be used as the chaotic-based measurement matrix for compressing the digital image. Moreover, the PPD expression of the model cannot be derived at present; it indicates that we only apply the well-known simulation method to verify the independent; according to the test for independence, we make use of that method to judge whether the chaotic sequences are independent. The step-by-step details of the independence testing method are summarized as follows.Step 1. Let and Y be two sequences; the variances of and Y are and , respectively. The covariance of and Y is , and the relation among them is as follows:Step 2. Supposing that and Y are independent, we use equation (18) to calculate the values of . When satisfies equation (19), the hypothesis testing is reasonable. Otherwise, it is unreasonable.where , , and is the length of the sequence.Step 3. Based on the primary steps, in the improved 2D CML model, select and , the interval of time series is 40, set different initial values for the two improved 2D CML models, and iterate those two models for 2,000 times to eliminate the influence of initial value.Step 4. Perform the two improved 2D CML models, choose the chaotic sequences generated by the node of the 4th row and the 4th column for each iteration, and combine the chaotic sequences with the length 1,000.Step 5. Repeat the above testing for 100 times and plot the testing results in Figure 8. According to Figure 8, it is clear that the chaotic sequences generated by the above steps are independent.

4.2. The Chaotic-Based Measurement Matrix

The CS plays an important part in the proposed image encryption scheme. According to equation (6), it is essential to design enough complex chaotic-based matrix . The chaotic sequences have complex chaotic performance and also those sequences are independent by the independence testing. We unitize those chaotic sequences to design the chaotic-based measurement matrix ; the detailed processing is described in Algorithm 1.

Input: Two sets of initial conditions in the improved 2D CML model
Output: the measurement matrix
Function Main:
Step 1: select PLM as the local map with, set and in the proposed 2D CML model.
Step 2: under the parameters of step 1, set different initial values for the two improved 2D CML models, iterate the two models for 2000 times to eliminate the influence of initial value.
Step 3: then, run the two improved 2D CML models, choose the chaotic sequences generated by the node of the 4th row and the 4th column for each iteration, and combine the chaotic sequences with the length.
Step 4: for each , according to Algorithm 1, transform the chaotic sequences and form the new chaotic sequences ,
.
Step 5: finally, arrange the chaotic sequences by column and construct the measurement matrix as
where is used for normalization.

5. The Proposed Image Encryption Scheme

Based on the proposed 2D CML model, unitizing the most complexity of the improved model and the high efficiency of the CS to enhance the security and efficiency of the encryption scheme, we design a novel safe image encryption scheme in this section. The key components of the scheme are depicted in Figure 9, and the main flow flat contains the processing of DCT, CS, diffusion, and confusion.

5.1. The Proposed Image Encryption Algorithm

In the proposed image encryption scheme, the processing of the scheme is described in Figure 10, and the detailed steps are elaborated in the following steps.Step 1. Choose the plain image with size , and separate into , , and . Then, produce the discrete cosine transform (DCT) basis and sparse , , and with equation (20); we have , , and with size.Step 2. Utilize Algorithm 1 to generate the chaotic measurement matrix , respectively. According to equation (21), use the chaotic measurement matrix to compress , and and obtain the compressive matrix .Step 3. For the compressive matrix , we do the normalization to transform the values of into the interval by equation (22), respectively. We have the new compressive matrix , , .where is the rounding function and , , , , and are the maximum and minimum of , respectively. , and .Step 4. Utilize the plain image and generate the MAC value by the following equation:wherewhere , , and are the Hash encryption function, the function of transforming Hexadecimal to Decima, and the average function, respectively. is the sum function, is the maximum function, and is the minimum function. is partitioned into 8-bit subblocks. Then, each block with binary format is transformed into the integer with decimal format, and the number of all the integers is 32. Then, we do the following:(і)Apply the 2DWT to , , and . We obtain , and .(ii)Substitute the corresponding Hash values into with the first 32 values.(iii)According to the IDWT, we obtain new , , and .Step 5. The step includes the two following parts:(і)Utilize the plain image and the parameter is generated by the following equation: (ii)In the proposed 2D CML model, set , , and and , and iterate the two models for 2,000 times to eliminate the influence of initial values. Then, generate the chaotic sequences . According to equation (26), use the sequences to diffuse the compressive matrix , , and get the diffusion matrix , .where .Step 6. Utilize the sequences to change the pixel values of , according to the following operations:(і)For some points , and in the row and the column, compute .(ii)Denote the element of as and change the value as follows:(iii)Repeat 1-2 by setting and . Finally, output the confused components , , and .Step 7. For each ,, we do the following operation: get , , and , and combine them into the encryption image C.

5.2. Recovering the Plain Image

According to the proposed image encryption scheme in Section 5.1, we can obtain the encryption image C. The recovering encryption image is the reverse processing of the proposed scheme, and the specific details are as follows: for the encryption image C, we use equation (29) to get ,. Then, utilize the sequences to change the pixel values of , and diffuse the sequences , according to equations (30) and (31), respectively. Finally, we can get the plain image by equations (32) and (33).where and .

6. Experimental Analysis

To verify that the proposed image encryption scheme in Section 5 is effective, we perform the following experiments and analyse the corresponding statistical results of the plain image and encrypted image; all the experimental results and analyses are to demonstrate that the proposed image encryption scheme is suitable for compressing and encrypting the plain image.

6.1. The Encryption Image

Choose the plain images of Lena (), Peppers (), Women (), and Tree (); based on the improved 2D CML model in Section 3 and the proposed image encryption scheme in Section 5, set in the improved 2D CML model and the compressive rate is 0.5; we show the encryption image and the recovering image in Figure 11. According to Figure 11, the encryption images are chaos, irregular and hiding the information of the plain image well. Meanwhile, the recovering images are almost the same as the plain images. All abovementioned results prove that the encryption image scheme is practicable and feasible.

6.2. The Statistical Results

The histogram of the plain image reflects the statistics distributed state of the image grayscale value; the more the even statistics are distributed, the less information is exposed. The histograms of the plain image and the encryption image are listed in Figures 1215 . For example, Figures 12(a)12(c) present the histogram of the plain image of Lena in Red, Green, and Blue, respectively. It can be seen from the histogram that the results of Lena are quite not uniform; the image grayscale values concentrate in the certain interval. Meanwhile, Figures 12(d)12(f) show the distributed state of the encryption image of Lena in Red, Green, and Blue, respectively. It is clear that the histogram results of the encryption image of Lena are pretty uniform, which means that the encryption scheme can realize hiding the grayscale value information of the plain image. Similarly, Figures 1215 demonstrate that the encryption image scheme possesses outstanding encryption performance.

In addition, the correlation coefficients of horizontal (H), vertical (V), and diagonal (D) adjacent in the plain image and encryption image are utilized to measure the correlation among those grayscale values. Choose 2,000 pairs of H, V, and D adjacent grayscale, respectively, and plot them in Figures 1619 . According to Figure 16, the results of Lena are shown in Figures 16(a)16(c), and it can be seen that the grayscale values are concentrated. However, the results of the encryption of Lena are uniform. Moreover, according to equations (34) and (35), we calculate the correlation coefficients of level, vertical, and diagonal adjacent and list them in Table 1. It is clear that the correlation coefficients are all quite close to 0 from Table 1. Thus, there is no relation among the pixel in the encryption image, which suggests that the proposed encryption image scheme holds well encryption characteristic.where and are the adjacent grayscale values, respectively. , and is the number of the grayscale pixel pairs.


ImagePlain imageEncrypted image
HVDHVD

LenaR0.88710.93160.85670.00160.00020.0038
G0.94200.97240.93170.00110.00080.0038
B0.97280.98640.96080.00250.00050.0004

PepperR0.96290.95270.9288−0.0027−0.00070.0043
G0.97720.98400.96340.0005−0.0025−0.0018
B0.95570.97130.9521−0.00150.00240.0065

WomenR0.95770.97400.9358−0.00860.00250.0011
G0.96450.98490.9534−0.00200.0087−0.0035
B0.98070.99100.9738−0.0066−0.00210.0020

TreeR0.95600.94220.93040.00190.00960.0064
G0.96730.94000.92400.00250.0035−0.0018
B0.96190.93580.9193−0.00040.0018−0.0025

6.3. Information Entropy Analysis

The information entropy describes the average information in the image; its ideal value can be calculated by equation (36) and the value is 8.0.where is the grayscale value of the plain image and is the rate of the grayscale value .

According to equation (36), we list the information entropy values in Table 2.


ImageComponentsPlain imageEncrypted image

LenaR6.96847.9985
G7.59407.9985
B7.25317.9986

PepperR7.05837.9986
G7.49637.9987
B7.33887.9986

WomenR6.78257.9952
G7.27057.9951
B7.25497.9937

TreeR6.92077.9950
G7.41387.9948
B7.21047.9940

6.4. Differential Attack Analysis

Considering the differential attack, the attacker usually adjusts to the plaintext and compares differences with the ciphertexts generated before and after the adjustment to attack. For the differential attacks on the image encryption, the two indicators, the number of pixels change rate (NPCR) and the unified average changing intensity (UACI), are evaluated according to equations (37) and (38), and the corresponding calculation formulas are as follows:where and are two encryption images; then, . is as follows:

The results of NPCR and UACI are calculated in Table 3; the ideal values are 0.996094 and 0.334635, respectively. According to Table 3, it can be seen that all the test results are quite close to the ideal values. Therefore, the proposed encryption images scheme has good ability to resist the differential attacks effectively.


ImageComponentsNPCRUACI

LenaR0.99610.3347
G0.99630.3345
B0.99610.3348

PepperR0.99610.3352
G0.99600.3353
B0.99610.3345

WomenR0.99650.3360
G0.99600.3344
B0.99530.3319

TreeR0.99600.3342
G0.99590.3332
B0.99620.3324

6.5. Key Security Analysis
6.5.1. Key Space Analysis

For the image encryption scheme, a larger size of key indicates the larger key space. From the perspective of security, it is infeasible to make brute force when the key space is enough large. The general requirement value of resisting the attack is . In the proposed image encryption scheme, the initial values of all 16 nodes are used as the key for two times. According to the IEEE 754 floating-point standard, the precision of the floating number for each node is , and there are totally , which is much larger than . Thus, it is clear that the image encryption scheme can greatly satisfy the need of resisting the brute-force attacks.

6.5.2. Key Sensitivity Analysis

The key sensitivity denotes that great changes are caused due to a tiny change of the key. According to the following cases, we do the tests of key sensitivity in the proposed image encryption scheme.Case 1: keep the original parameter unchangedCase 2: the parameter is changed from to

Considering the above cases, under the condition of the different parameters as the key, we use the proposed image encryption scheme to compare the differences of the ciphertext, and the differences of the ciphertext are shown in Table 4. According to Table 4, a tiny change of the key would lead to the huge change of the ciphertext. The differences are all larger than 99.5%, which indicates that the image encryption scheme has well key sensitivity.


ImageComponentsCase 1-Case 2

LenaR99.633
G99.577
B99.609

PepperR99.583
G99.623
B99.589

WomenR99.615
G99.597
B99.615

TreeR99.621
G99.603
B99.597

6.6. Comparison Analysis

In this section, to further verify that the proposed image encryption scheme has good encryption characteristic, we compare those schemes with the proposed scheme, and, according to the existing image encryption schemes in [2430], we present the comparison results for correlation coefficient, NPCR, UACI, and information entropy in Tables 57 . According to the correlation coefficients results of the proposed scheme and other schemes from Table 5, it can be seen that the correlation coefficients results in the proposed scheme are almost 0, which are smaller than the schemes in [2529]. In Table 6, The NPCR and UACI results of the proposed scheme and other schemes are shown, and the values in the proposed scheme are closer to the ideal values (NPCR = 0.996094, UACI = 0.334635) than the schemes in [25, 27, 29, 30]. Meanwhile, the information entropy results of the proposed scheme and other schemes are listed in Table 7, and the information entropy values of R, G, and B in our scheme are 7.9986, 7.9985, and 7.9985, respectively. Above all, the comparison analysis fully proves that the proposed scheme has outstanding chaotic characteristic.


ImagePlain imageEncrypted image
HVDHVD

Lena in our scheme0.88710.93160.85670.00160.00020.0038
Lena in [24]0.88710.93160.85670.00030.00400.0013
Lena in [25]0.88710.93160.85670.00130.00340.0072
Lena in [26]0.88710.93160.8567-0.0038-0.00260.0017
Lena in [27]0.88710.93160.8567-0.00310.0025-0.0001
Lena in [28]0.88710.93160.85670.0046-0.00280.0014
Lena in [29]0.88710.93160.85670.0005-0.00700.0006
Lena in [30]0.88710.93160.8567-0.00470.0028-0.0043


ImageNPCRUACI
RGBRGB

Lena in our scheme0.99610.99630.99610.33470.33450.3348
Lena in [24]0.99610.99610.99610.33460.33460.3347
Lena in [25]0.99690.99690.99690.33330.33330.3333
Lena in [26]0.99580.99630.99660.33340.33410.3348
Lena in [27]0.99670.99690.99690.33520.33530.3354
Lena in [28]0.99610.99610.99610.33490.33490.3347
Lena in [29]0.99730.99680.99700.33460.33450.3346
Lena in [30]0.99670.99640.99650.33510.33500.3349


ImagePlain imageEncrypted image
RGBRGB

Lena in our scheme6.96847.59407.25317.99857.99857.9986
Lena in [24]6.96867.59527.25317.99947.99947.9993
Lena in [25]6.96867.59527.25317.99977.99977.9996
Lena in [27]6.96867.59527.25317.99767.99727.9972
Lena in [28]6.96867.59527.25317.99947.99937.9992
Lena in [29]6.96867.59527.25317.99727.99737.9971
Lena in [30]7.24177.57676.91707.99737.99657.9969

7. Conclusion

In our paper, based on the 2D CML model, to overcome the problem of the uneven PDD in the sequences generated in the original 2D CML model, we add the offset for the model after each iteration. The improved 2D CML model has much better chaotic performance than the original 2D CML model. According to the proposed 2D CML model, we proposed a new compressive image encryption scheme, and we unitized the improved 2D CML model for compression. The analysis and simulation demonstrate that the improved image encryption scheme possesses perfect encryption characteristics and application prospects.

Data Availability

The data used to support the findings of this study are available within the article.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work was supported by grants from the National Natural Science Foundation of China (no. 61572089), the Doctoral Talent Training Project of Chongqing University of Posts and Telecommunications (no. BYJS202003), the Science and Technology Foundation Project of Guizhou Province (QianKeHeJiChu[2020]1Y422), and the Key Project Research Achievements of Guizhou Education University in 2020 (no. 2020ZD006).

References

  1. A. Alfalou and C. Brosseau, “Optical image compression and encryption methods,” Advances in Optics and Photonics, vol. 1, no. 3, pp. 589–636, 2009. View at: Publisher Site | Google Scholar
  2. Y. Zhang, Y. Xiang, L. Y. Zhang, L.-X. Yang, and J. Zhou, “Efficiently and securely outsourcing compressed sensing reconstruction to a cloud,” Information Sciences, vol. 496, pp. 150–160, 2019. View at: Publisher Site | Google Scholar
  3. R. Hamza, Z. Yan, K. Muhammad, P. Bellavista, and F. Titouna, “A privacy-preserving cryptosystem for IOT E-healthcare,” Information Sciences, vol. 527, pp. 493–510, 2020. View at: Publisher Site | Google Scholar
  4. G. Ye, K. Jiao, H. Wu, C. Pan, and X. Huang, “An asymmetric image encryption algorithm based on a fractional-order chaotic system and the RSA public-key cryptosystem,” International Journal of Bifurcation and Chaos, vol. 30, no. 15, Article ID 2050233, 2020. View at: Publisher Site | Google Scholar
  5. Y. J. Xian, S. J. Xie, and Y. L. Tu, “Multi-image encryption algorithm based on hyper-chaotic system,” Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), vol. 32, no. 6, 2020. View at: Google Scholar
  6. S. Arabnejad, B. Johnston, M. Tanzer, and D. Pasini, “Fully porous 3D printed titanium femoral stem to reduce stress-shielding following total hip arthroplasty,” Journal of Orthopaedic Research, vol. 35, no. 8, pp. 1774–1783, 2017. View at: Publisher Site | Google Scholar
  7. C. G. Reile, M. S. Rodriguez, D. D. D. Fernandes et al., “Qualitative and quantitative analysis based on digital images to determine the adulteration of ketchup samples with Sudan I dye,” Food Chemistry, vol. 328, 127101 pages, 2020. View at: Publisher Site | Google Scholar
  8. M. Abedi, B. Sun, and Z. Zheng, “Single-pixel compressive imaging based on random DoG filtering,” Signal Process., vol. 178, Article ID 107746, 2021. View at: Google Scholar
  9. G. D. Ye, P. Chen, and D. Y. Xia, “Image encryption and hiding algorithm based on compressive sensing and random numbers insertion,” Signal Process., vol. 172, Article ID 107563, 2020. View at: Google Scholar
  10. C. L. Chowdhary, P. V. Patel, K. J. Kathrotia, M. Attique, K. Perumal, and M. F. Ijaz, “Analytical study of hybrid techniques for image encryption and decryption,” Sensors, vol. 20, no. 18, p. 5162, 2020. View at: Publisher Site | Google Scholar
  11. G. Ye, C. Pan, Y. Dong, K. Jiao, and X. Huang, “A novel multi‐image visually meaningful encryption algorithm based on compressive sensing and Schur decomposition,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 2, 2021. View at: Publisher Site | Google Scholar
  12. S. Zhu and C. Zhu, “A new image compression-encryption scheme based on Compressive sensing and cyclic shift,” Multimedia Tools and Applications, vol. 78, no. 15, pp. 20855–20875, 2019. View at: Publisher Site | Google Scholar
  13. S. Oishi and H. Inoue, “Pseudo-random number generators and chaos,” IEICE Transactions (1976–1990), vol. 65, no. 9, pp. 534–541, 1982. View at: Google Scholar
  14. Z. Liu, Y. Wang, Y. Zhao, and L. Y. Zhang, “A stream cipher algorithm based on 2D coupled map lattice and partitioned cellular automata,” Nonlinear Dynamics, vol. 101, no. 2, pp. 1383–1396, 2020. View at: Publisher Site | Google Scholar
  15. Y. J. Sun, H. Zhang, X. Y. Wang et al., “2D Non-adjacent coupled map lattice with q and its applications in image encryption,” Advances in Optics and Photonics, vol. 373, 125039 pages, 2020. View at: Publisher Site | Google Scholar
  16. Y. He, Y.-Q. Zhang, and X.-Y. Wang, “A new image encryption algorithm based on two-dimensional spatiotemporal chaotic system,” Neural Computing and Applications, vol. 32, no. 1, pp. 247–260, 2020. View at: Publisher Site | Google Scholar
  17. S. M. Seyedzadeh, B. Norouzi, M. R. Mosavi et al., “A novel color image encryption algorithm based on spatial permutation and quantum chaotic map,” Nonlinear Dynamics, vol. 81, no. 1-2, pp. 511–529, 2015. View at: Publisher Site | Google Scholar
  18. X. L. Chai, J. Q. Bi, Z. H. Gan et al., “Color image compression and encryption scheme based on compressive sensing and double random encryption strategy,” Signal Process, vol. 176, Article ID 107684, 2020. View at: Google Scholar
  19. S. Kayalvizhi and S. Malarvizhi, “A novel encrypted compressive sensing of images based on fractional order hyper chaotic Chen system and DNA operations,” Multimedia Tools and Applications, vol. 79, no. 5-6, pp. 3957–3974, 2020. View at: Publisher Site | Google Scholar
  20. K. Kaneko, “Pattern dynamics in spatiotemporal chaos: pattern selection, diffusion of defect and pattern competition intermittency,” Journal of Physics D, vol. 34, no. 1-2, pp. 1–41, 1989. View at: Publisher Site | Google Scholar
  21. Y. Wang, Z. Liu, J. Ma, and H. He, “A pseudorandom number generator based on piecewise logistic map,” Nonlinear Dynamics, vol. 83, no. 4, pp. 2373–2391, 2016. View at: Publisher Site | Google Scholar
  22. E. J. Candes and T. Tao, “Near-optimal signal recovery from random projections: universal encoding strategies?” IEEE Transactions on Information Theory, vol. 52, no. 12, pp. 5406–5425, 2006. View at: Publisher Site | Google Scholar
  23. M. Ding and W. Yang, “Stability of synchronous chaos and on-off intermittency in coupled map lattices,” Physical Review E, vol. 56, no. 4, pp. 4009–4016, 1997. View at: Publisher Site | Google Scholar
  24. L. Huang, S. Cai, M. Xiao, and X. Xiong, “A simple chaotic map-based image encryption system using both plaintext related permutation and diffusion,” Entropy, vol. 20, no. 535, 2018. View at: Publisher Site | Google Scholar
  25. X.-J. Tong, M. Zhang, Z. Wang, Y. Liu, H. Xu, and J. Ma, “A fast encryption algorithm of color image based on four-dimensional chaotic system,” Journal of Visual Communication and Image Representation, vol. 33, pp. 219–234, 2015. View at: Publisher Site | Google Scholar
  26. C. Pak and L. Huang, “A new color image encryption using combination of the 1D chaotic map,” Signal Processing, vol. 138, pp. 129–137, 2017. View at: Publisher Site | Google Scholar
  27. M. Mollaeefar, A. Sharif, and M. Nazari, “A novel encryption scheme for colored image based on high level chaotic maps,” Multimedia Tools and Applications, vol. 76, no. 1, pp. 607–629, 2017. View at: Publisher Site | Google Scholar
  28. S. Cai, L. Huang, X. Chen et al., “A symmetric plaintext-related color image encryption system based on bit permutation,” Entropy, vol. 20, no. 282, 2018. View at: Publisher Site | Google Scholar
  29. X. Wu, B. Zhu, Y. Hu et al., “A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps,” IEEE Access, vol. 5, pp. 6429–6436, 2017. View at: Google Scholar
  30. A. U. Rehman and X. Liao, “A novel robust dual diffusion/confusion encryption technique for color image based on Chaos, DNA and SHA-2,” Multimedia Tools and Applications, vol. 78, no. 2, pp. 2105–2133, 2019. View at: Publisher Site | Google Scholar

Copyright © 2021 Zhuo Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


More related articles

 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder
Views67
Downloads81
Citations

Related articles