[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

An Improved Encryption–Compression-based Algorithm for Securing Digital Images

Based on: 21
Published: 22 June 2023 Publication History

Abstract

Nowadays, there is an increasing tendency to upload images to online platforms acting as information carriers for various applications. Unfortunately, the unauthorized utilization of such images is a serious concern that has significantly impacted security and privacy. Although digital images are widely available, the storage of these images requires a large amount of data. This study aims to address these issues by developing an improved encryption–compression-based algorithm for securing digital images that reduces unnecessary hardware storage space, transmission time and bandwidth demand. First, the image is encrypted using chaotic encryption. Then the encrypted image is compressed using wavelet-based compression in order to make efficient use of resources without any information about the encryption key. On the other side, the image is decompressed and decrypted by the receiver. The security assessment of the proposed algorithm is performed in different ways, such as differential and statistical, key sensitivity, and execution time analysis. The experimental analysis proves the security of the method against various possible attacks. Furthermore, the extensive evaluations on a real dataset demonstrate that the proposed solution is secure and has a low encryption overhead compared to similar methods.

References

[1]
W. Sun, J. Zhou, Y. Li, M. Cheung, and J. She. 2021. Robust high-capacity watermarking over online social network shared images. IEEE Transactions on Circuits and Systems for Video Technology 31, 3 (2021), 1208–1221.
[2]
O. P. Singh, A. Singh, G. Srivastava, and N. Kumar. 2020. Image watermarking using soft computing techniques: A comprehensive survey. Multimedia Tools and Applications 80, 20 (2020), 30367–30398.
[3]
Sufyan Ababneh, Rashid Ansari, and Ashfaq Khokhar. 2009. Compensated signature embedding for multimedia content authentication. J. Data and Information Quality 1, 3 (2009).
[4]
M. Kaur and V. Kumar. 2020. A comprehensive review on image encryption techniques. Arch. Computat. Methods Eng. 27 (2020), 15–43.
[5]
K. Sayood. 2017. Introduction to Data Compression. Morgan Kaufmann, 2017.
[6]
Aseel Basheer and Kewei Sha. 2017. Cluster-based quality-aware adaptive data compression for streaming data. J. Data and Information Quality 9, 1 (2017).
[7]
Y. Sun, R. Xu, L. Chen, and X. Hu. 2015. Image compression and encryption scheme using fractal dictionary and Julia set. IET Image Processing 9, 3 (2015), 173–183.
[8]
K. Minemura, K. Wong, X. Qi, and K. Tanaka. 2017. A scrambling framework for block transform compressed image. Multimed. Tools Appl. 76, 5 (2017), 6709–6729.
[9]
J. Karmakar, D. Nandi, and M. K. Mandal. 2020. A novel hyper-chaotic image encryption with sparse-representation based compression. Multimed. Tools Appl. 79 (2020), 28277–28300.
[10]
H. Zhu, C. Zhao, and X. Zhang. 2013. A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem. Signal Process Image Commun. 28 (2013), 670–680.
[11]
W. Liu, W. Zeng, L. Dong, and Q. Yao. 2010. Efficient compression of encrypted grayscale images. IEEE Trans. Image Process 19, 4 (2010), 1097–1102.
[12]
D. Schonberg, S. C. Draper, C. Yeo, and K. Ramchandran. 2008. Toward compression of encrypted images and video sequences. IEEE Trans. Inf. Forensics Security 3, 4 (2008), 749–762.
[13]
G. Ye, K. Jiao, X. Huang, et al. 2020. An image encryption scheme based on public key cryptosystem and quantum logistic map. Sci. Rep. 10, 1 (2020), 1–19.
[14]
X. Huang. 2012. Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn. 67 (2012), 2411–2417.
[15]
A. Said and W. A. Pearlman. 1996. A new, fast, and efficient image codec based on set partitioning in hierarchical trees. In IEEE Transactions on Circuits and Systems for Video Technology 6, 3 (1996), 243–250.
[16]
Wang and S. Chen. 2020. Chaotic image encryption algorithm based on dynamic spiral scrambling transform and deoxyribonucleic acid encoding operation. IEEE Access 8 (2020), 160897–160914.
[17]
M. Ghazvini, M. Mirzadi, and N. Parvar. 2020. A modified method for image encryption based on chaotic map and genetic algorithm. Multimed. Tools Appl. 79 (2020), 26927–26950.
[18]
T. Kamal, K. M. Hosny, T. M. Elgindy, M. M. Darwish, and M. M. Fouda. 2021. A new image encryption algorithm for grey and color medical images. IEEE Access 9 (2021), 37855–37865.
[19]
G. Shengtao, W. Tao, W. Shida, Z. Xuncai, and N. Ying. 2021. A novel image encryption algorithm based on chaotic sequences and cross-diffusion of bits. IEEE Photonics Journal 13, 1 (2021), 1–15
[20]
T. Suguna and R. Shanmugalakshmi. 2021. Secure image communication through adaptive deer hunting optimization based vector quantization coding of perceptually encrypted images. Wireless Personal Communications 116, 3 (2021), 2239–2260.
[21]
Manoj Kumar and Ankita Vaish. 2017. An efficient encryption-then-compression technique for encrypted images using SVD. Digital Signal Processing 60 (2017), 81–89.
[22]
T. Chuman, W. Sirichotedumrong, and H. Kiya. 2019. Encryption-then-compression systems using grayscale-based image encryption for JPEG images. IEEE Transactions on Information Forensics and Security 14, 6 (2019), 1515–1525.
[23]
I. Ahmad and S. Shin. 2022. Encryption-then-compression system for cloud-based medical image services. 2022 International Conference on Information Networking (ICOIN), 30–33.
[24]
I. Yasser, A. T. Khalil, M. A. Mohamed, A. S. Samra, and F. Khalifa. 2022. A robust chaos-based technique for medical image encryption. IEEE Access 10 (2022), 244–257.
[26]
Y. Wu, J. P. Noonan, and S. Agaian. 2011. NPCR and UACI randomness tests for image encryption. Cyber J.: Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. (2011). 31–38.
[27]
H. Nematzadeh, R. Enayatifar, M. Yadollahi, M. Lee, and G. Jeong. 2020. Binary search tree image encryption with DNA. Optik 202 (2020), 163505.
[28]
X. Wang and L. Liu. 2020. Image encryption based on hash table scrambling and DNA substitution. IEEE Access 8 (2020), 68533–68547.
[29]
X. Wang and H. Sun. 2020. A chaotic image encryption algorithm based on improved Joseph traversal and cyclic shift function. Optics & Laser Technology 122 (2020), 105854.
[30]
Y. Zhang, L. Zhang, Z. Zhong, L. Yu, M. Shan, and Y. Zhao. 2021. Hyperchaotic image encryption using phase-truncated fractional Fourier transform and DNA-level operation. Optics and Lasers in Engineering 143 (2021), 106626.
[31]
Q. Cun, X. Tong, Z. Wang, and M. Zhang. 2021. Selective image encryption method based on dynamic DNA coding and new chaotic map. Optik 243 (2021), 167286.
[32]
X. Wang and M. Zhao. 2021. An image encryption algorithm based on hyperchaotic system and DNA coding. Optics & Laser Technology 143 (2021), 107316.
[33]
O. P. Singh and A. K. Singh. 2021. Data hiding in encryption-compression domain. Complex and Intelligent System, 1–14.
[34]
L. Liu and S. Miao. 2016. A new image encryption algorithm based on logistic chaotic map with varying parameter. SpringerPlus 5 (2016), 289.
[35]
O. P. Singh and A. K. Singh. 2021. A robust information hiding algorithm based on lossless encryption and NSCT-HD-SVD. Machine Visions and Applications 32, 4 (2021), 1–13.
[36]
F. Musanna, D. Dangwal, and S. Kumar. 2021. Novel image encryption algorithm using fractional chaos and cellular neural network. J. Ambient Intell. Human Comput., (2021).
[37]
B. Seth, S. Dalal, V. Jaglan, D.-N. Le, S. Mohan, and G. Srivastava. 2020. Integrating encryption techniques for secure data storage in the cloud. Trans. Emerging Tel. Tech. 2020.
[38]
Zh. Chen and G. Srivastava. 2022. A dual chaotic encryption method for lightweight infrared image. Mobile Netw. Appl., (2022).
[39]
A. Rehman, A. Firdous, S. Iqbal, Z. Abbas, M. Sahid, H. Wang, and F. Ullah. 2020. A color image encryption algorithm based on one time key, chaos theory, and concept of rotor machine. IEEE Access 8 (2020), 172275–172295.
[40]
X. Wu, H. Kan, and J. Kurths. 2015. A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Applied Soft Computing 37 (2015), 24–39.

Cited By

View all
  • (2024)JPEG-compatible Joint Image Compression and Encryption Algorithm with File Size PreservationACM Transactions on Multimedia Computing, Communications, and Applications10.1145/363345920:4(1-20)Online publication date: 11-Jan-2024
  • (2024)Optimized data management with color multiplexing in QR codesPhysica Scripta10.1088/1402-4896/ad729f99:10(105036)Online publication date: 11-Sep-2024
  • (2024)A secure fractal compression scheme based on irregular Latin square, Julia and 2D-FCICMDigital Signal Processing10.1016/j.dsp.2024.104725155(104725)Online publication date: Dec-2024
  • Show More Cited By

Index Terms

  1. An Improved Encryption–Compression-based Algorithm for Securing Digital Images

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Journal of Data and Information Quality
    Journal of Data and Information Quality  Volume 15, Issue 2
    June 2023
    363 pages
    ISSN:1936-1955
    EISSN:1936-1963
    DOI:10.1145/3605909
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 June 2023
    Online AM: 06 July 2022
    Accepted: 19 April 2022
    Revision received: 06 April 2022
    Received: 13 February 2022
    Published in JDIQ Volume 15, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Cyber-physical systems
    2. digital images
    3. encryption
    4. compression
    5. chaotic system

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)89
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 12 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)JPEG-compatible Joint Image Compression and Encryption Algorithm with File Size PreservationACM Transactions on Multimedia Computing, Communications, and Applications10.1145/363345920:4(1-20)Online publication date: 11-Jan-2024
    • (2024)Optimized data management with color multiplexing in QR codesPhysica Scripta10.1088/1402-4896/ad729f99:10(105036)Online publication date: 11-Sep-2024
    • (2024)A secure fractal compression scheme based on irregular Latin square, Julia and 2D-FCICMDigital Signal Processing10.1016/j.dsp.2024.104725155(104725)Online publication date: Dec-2024
    • (2023)SIELNet: 3-D Chaotic-Map-Based Secure Image Encryption Using Customized Residual Dense Spatial NetworkIEEE Transactions on Consumer Electronics10.1109/TCE.2022.322740169:4(862-868)Online publication date: Nov-2023

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media