Advertisement

Double verifiable image encryption based on chaos and reversible watermarking algorithm

  • Hang Gao
  • Tiegang Gao
Article
  • 54 Downloads

Abstract

The integrity of image is the premise for various applications. The existing image encryption algorithms rarely have the function of verifying the integrity for the decrypted image. To cope with this problem, a novel double verifiable image encryption algorithm based on chaos and reversible watermarking is proposed. In the proposed scheme, the 256-bit hash of original image is firstly calculated and embedded into the pixel-level permutated image by histogram shifting based reversible watermarking, then image diffusion is conducted based on hyper-chaos. Lastly, the hash values of diffused image and original image are embedded into the diffused image itself using difference expansion based reversible watermarking, thus the verifiable encrypted image (VEI) is generated. The secret key of the algorithm depends on the image itself; this makes the brute-force attacks impossible, and the application of reversible watermarking guarantees that the integrity of the VEI and decrypted image can be verified. Experiments and analysis are given to demonstrate that the proposed scheme has better performances, and it has good potential in the application of medical and military image.

Keywords

Verifiable image encryption Reversible watermarking Chaos optimization Image hash 

Notes

Acknowledgements

The work was supported by the Program of Natural Science Fund of Tianjin, China (Grant NO. 16JCYBJC15700).

References

  1. 1.
    Belazi A, Hermassi H, Rhouma R et al (2014) Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map. Nonlinear Dynamics 76:1989–2004CrossRefzbMATHGoogle Scholar
  2. 2.
    Chai X, Gan Z, Yuan K et al (2017) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput & Applic.  https://doi.org/10.1007/s00521-017-2993-9
  3. 3.
    Chai X, Gan Z, Yang K et al (2017) An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process Image Commun 52:6–19CrossRefGoogle Scholar
  4. 4.
    Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons and Fractals 21:749–761MathSciNetCrossRefzbMATHGoogle Scholar
  5. 5.
    Chen JX, Zhu ZL, Fu C (2015) An efficient image encryption scheme using lookup table based confusion and diffusion. Nonlinear Dyn 81:1151–1166CrossRefGoogle Scholar
  6. 6.
    Chen B, Yang Z, Huang S et al. (2017) Cyber-physical system enabled nearby traffic flow modelling for autonomous vehicles. In Proc. IEEE 36th International Performance Computing and Communications Conference (IPCCC), pp 1–6Google Scholar
  7. 7.
    Ding M, Fan G (2015) Multilayer joint gait-pose manifolds for human gait motion modeling. IEEE Transactions on Cybernetics 45(11):2413–2424CrossRefGoogle Scholar
  8. 8.
    Ding M, Fan G (2016) Articulated and generalized gaussian kernel correlation for human pose estimation. IEEE Trans Image Process 25(2):776–789MathSciNetCrossRefGoogle Scholar
  9. 9.
    Dong C'e (2014) Color image encryption using one-time keys and coupled chaotic systems. Signal Process Image Commun 29(5):628–640MathSciNetCrossRefGoogle Scholar
  10. 10.
    Federal Information Processing Standards Publication 180-2. (2002) Announcing the Secure Hash Standard, U.S. DoC/NIST, AugustGoogle Scholar
  11. 11.
    Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. International J. Bifur Chaos 8(6):125–984MathSciNetzbMATHGoogle Scholar
  12. 12.
    Gan Z, Chai X, Yuan K et al (2018) A novel image encryption algorithm based on LFT based S-boxes and chaos. Multimedia Tools Appl 77(7):8759–8783CrossRefGoogle Scholar
  13. 13.
    Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372(4):394–400CrossRefzbMATHGoogle Scholar
  14. 14.
    Gao T, Chen Z (2008) Image encryption based on a new total shuffling algorithm. Chaos, Solitons Fractals 38(1):213–220MathSciNetCrossRefzbMATHGoogle Scholar
  15. 15.
    Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 4(21):394–400CrossRefzbMATHGoogle Scholar
  16. 16.
    Gao T, Chen Z et al (2006) A hyper-chaos generated from Chen’s system. International Journal of Modern Physics C 17:471–478CrossRefzbMATHGoogle Scholar
  17. 17.
    Gu Q, Gao T (2013) A novel reversible robust watermarking algorithm based on chaotic system. Digital Signal Processing 23(1):213–217MathSciNetCrossRefGoogle Scholar
  18. 18.
    Hu Y, Lee H-K, Chen K et al (2008) Difference expansion based reversible data hiding using two embedding directions. IEEE Transactions on Multimedia 10(8):1500–1512CrossRefGoogle Scholar
  19. 19.
    Hu T, Liu Y, Gong L-H et al (2017) Chaotic image cryptosystem using DNA deletion and DNA insertion. Signal Process 134:234–243CrossRefGoogle Scholar
  20. 20.
    Li C (2016) Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process 118:203–210CrossRefGoogle Scholar
  21. 21.
    Li C, Liu Y, Xie T et al (2013) Breaking a novel image encryption scheme based on improved hyper-chaotic sequences. Nonlinear Dyn 73(3):2083–2092CrossRefzbMATHGoogle Scholar
  22. 22.
    Li X, Li B, Yang B et al (2013) General framework to histogram-shifting-based reversible data hiding. IEEE Trans Image Process 22(6):2181–2191MathSciNetCrossRefzbMATHGoogle Scholar
  23. 23.
    Li X, Zhang W, Gui X et al (2015) Efficient reversible data hiding based on multiple histograms modification. IEEE Transactions on Information Forensics and Security 10(9):2016–2027CrossRefGoogle Scholar
  24. 24.
    Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238–246CrossRefGoogle Scholar
  25. 25.
    Liu X, Meiling F (2015) Cuckoo search algorithm based on frog leaping local search and chaos theory. Appl Math Comput 266:1083–1092MathSciNetGoogle Scholar
  26. 26.
    Liu Q, Li P, Zhang M et al (2015) A novel image encryption algorithm based on chaos maps with Markov properties. Commun Nonlinear Sci Numer Simulat 20:506–515CrossRefzbMATHGoogle Scholar
  27. 27.
    Mohamad J, Abbas S, Saeid S (2017) A novel parallel image encryption with chaotic windows based on logistic map. Computers & Electrical Engineering.  https://doi.org/10.1016/j.compeleceng.2017.04.004
  28. 28.
    Sui L, Lu H, Wang Z (2014) Double-image encryption using discrete fractional random transform and logistic maps. Opt Lasers Eng 56:1–12CrossRefGoogle Scholar
  29. 29.
    Wang X, Zhang H (2015) A color image encryption with heterogeneous bit permutation and correlated chaos. Opt Commun 342:51–60CrossRefGoogle Scholar
  30. 30.
    Wang XY, Zhang HL (2016) A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dyn 83:333–346MathSciNetCrossRefGoogle Scholar
  31. 31.
    Wang Y, Wong K, Liao X et al (2009) A chaos-based image encryption algorithm with variable control parameters. Chaos, Solitons Fractals 41(4):1773–1783CrossRefzbMATHGoogle Scholar
  32. 32.
    Wu X, Wang D, Kurths J et al (2016) A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inf Sci 349-350:137–153CrossRefGoogle Scholar
  33. 33.
    Xie E, Li C, Yu S (2017) On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Signal Process 132:150–154CrossRefGoogle Scholar
  34. 34.
    Xu L, Li Z, Li J (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25CrossRefGoogle Scholar
  35. 35.
    Yanchuk S, Kapitaniak T (2001) Symmetry-increasing bifurcation as a predictor of a chaos-hyperchaos transition in coupled systems. Phys Rev E 64:056235CrossRefGoogle Scholar
  36. 36.
    Yuan X, Zhao J, Yang Y, Wang Y (2014) Hybrid parallel chaos optimization algorithm with harmony search algorithm. Appl Soft Comput 17:12–22CrossRefGoogle Scholar
  37. 37.
    Zhang S, Gao T (2016) A coding and substitution frame based on hyper-chaotic systems for secure communication. Nonlinear Dynamics 84(2):833–849MathSciNetCrossRefGoogle Scholar
  38. 38.
    Zhang S, Gao T (2016) An image encryption scheme based on DNA coding and permutation of hyper-image. Multimedia Tools and Applications 75(24):17157–17170CrossRefGoogle Scholar
  39. 39.
    Zhu C (2012) A novel image encryption scheme based on improved hyper-chaotic sequences. Opt Communications 285(1):29–37CrossRefGoogle Scholar
  40. 40.
    Zhu H, Zhang X, Yu H (2017) An image encryption algorithm based on compound homogeneous hyper-chaotic system. Nonlinear Dynamics 89:61–79CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.College of Computer and Control EngineeringNankai UniversityTianjinChina
  2. 2.College of SoftwareNankai UniversityTianjinChina

Personalised recommendations