Multimedia Tools and Applications

, Volume 72, Issue 1, pp 71–93 | Cite as

A parallel image encryption method based on compressive sensing



Recently, compressive sensing-based encryption methods which combine sampling, compression and encryption together have been proposed. However, since the quantized measurement data obtained from linear dimension reduction projection directly serve as the encrypted image, the existing compressive sensing-based encryption methods fail to resist against the chosen-plaintext attack. To enhance the security, a block cipher structure consisting of scrambling, mixing, S-box and chaotic lattice XOR is designed to further encrypt the quantized measurement data. In particular, the proposed method works efficiently in the parallel computing environment. Moreover, a communication unit exchanges data among the multiple processors without collision. This collision-free property is equivalent to optimal diffusion. The experimental results demonstrate that the proposed encryption method not only achieves the remarkable confusion, diffusion and sensitivity but also outperforms the existing parallel image encryption methods with respect to the compressibility and the encryption speed.


Compressive sensing Image encryption Parallel structure Chaotic model Optimal diffusion 



The second author acknowledges the support provided by Grant NRF-2011-013-D00121 from the National Research Foundation of Korea.


  1. 1.
    Babadi B, Kalouptsidis N, Tarokh V (2010) SPARLS: the sparse RLS algorithm. IEEE Trans Signal Process 58(8):4013–4025CrossRefMathSciNetGoogle Scholar
  2. 2.
    Baraniuk RG (2007) Compressive sensing. IEEE Signal Process Mag 24(4):118–121CrossRefGoogle Scholar
  3. 3.
    Bioucas J, Figueiredo M (2007) A New TwIST: two-step iterative shrinkage thresholding algortihms for image restoration. IEEE Trans Image Process 16(12):2992–3004CrossRefMathSciNetGoogle Scholar
  4. 4.
    Blumensath T, Davies ME (2008) Gradient pursuits. IEEE Trans Signal Process 56(6):2370–2382CrossRefMathSciNetGoogle Scholar
  5. 5.
    Candès EJ, Tao T (2005) Decoding by linear programming. IEEE Trans Inf Theory 51(12):4203–4215CrossRefMATHGoogle Scholar
  6. 6.
    Candès EJ, Romberg J, Tao T (2006) Robust uncertainty principles: exact signal reconstruction from highly incomplete frequecny information. IEEE Trans Inf Theory 52(2):489–509CrossRefMATHGoogle Scholar
  7. 7.
    Donoho DL (2006) Compressive sensing. IEEE Trans Inf Theory 52(4):1289–1306CrossRefMATHMathSciNetGoogle Scholar
  8. 8.
    Fei P, Qiu SS, Min L (2005) An Image Encryption Algorithm based on Mixed Chaotic Dynamic Systems and External Keys. In IEEE Internation Conference Communic Circuits & Systems, pp: 1135–1139Google Scholar
  9. 9.
    Gan L (2007) Block Compressed Sensing of Natural Images. In 15th International Conference on Digital Signal Processing, pp: 403–406Google Scholar
  10. 10.
    Gang C, Yu ZX (2005) A self-adaptive algorithm on image encryption. J Softw 119(11):1974–1982Google Scholar
  11. 11.
    Gao DH, Liu DH, Feng YQ Yu FP (2010) A Robust Image Transmission Scheme for Wireless Channels Based on Compressive Sensing. In ICIC′10 Proceedings of the Advanced intelligent computing theories and applications, pp: 334–341Google Scholar
  12. 12.
    Gorodnitsky IF, Rao BD (1997) Sparse signal reconstruction from limited data using FOCUSS: a re-weighted norm minmization algorithm. IEEE Trans Signal Process 45(3):600–616CrossRefGoogle Scholar
  13. 13.
    Grangetto M, Magli E, Olmo G (2006) Multimedia selective encryption by means of randomized arithmetic coding. IEEE Trans Multimed 8(5):905–917CrossRefGoogle Scholar
  14. 14.
    Lian SG (2008) Multimedia content encryption. CRC Press, Boca RatonMATHGoogle Scholar
  15. 15.
    Liao XF, Lai SY, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90:2714–2722CrossRefMATHGoogle Scholar
  16. 16.
    Liu DH, Shi GM, Gao DH, Gao M (2009) A Robust Image Encryption Scheme over Wireless Channels. In International Conference on Wireless Communications & Signal Processing, pp: 1–6Google Scholar
  17. 17.
    Lloyd S (1982) Least squares quantization in PCM. IEEE Trans Inf Theory 28(2):129–137CrossRefMATHMathSciNetGoogle Scholar
  18. 18.
    Lustig M, Donoho DL, Santos JM, Pauly JM (2008) Compressed sensing MRI. IEEE Trans Signal Process 25(2):72–82CrossRefGoogle Scholar
  19. 19.
    Mastan JMK, Sathishkumar GA, Bagan KB (2011) A color image encryption technique based on a substitution-permutation network. Adv Comput Commun 193(5):524–533CrossRefGoogle Scholar
  20. 20.
    Mirzaei O, Yaghoobi M, Irani H (2011) A New image encryption method: parallel Sub-image encryption with hyper chaos. Nonlinear Dyn. doi: 10.1007/s11071-011-0006-6
  21. 21.
    Mollin RA (2006) An introduction to cryptography. CRC Press, Boca RatonGoogle Scholar
  22. 22.
    Olshausen BA, Field DJ (1997) Sparse coding with an overcomplete basis Set: a strategy employed by V1. Vis Res 37(23):3311–3325CrossRefGoogle Scholar
  23. 23.
    Orsdemir A, Altun HO, Sharma G, Bocko MF (2008) On the Security and Robustness of Encryption via Compressed Sensing. In IEEE Military Communications Conference, pp: 1–7Google Scholar
  24. 24.
    Rachlin Y, Baron D (2008) The Secrecy of Compressed Sensing Measurements. In 46th Annual Allerton Conference on Communication, Control and Computing, September, pp: 813–817Google Scholar
  25. 25.
    Shtewi AA, Hasan BEM, Hegazy AEF (2010) An efficient modified advanced encryption standard (MAES) adapted for image cryptosystems. Int J Comput Sci Netw Secur 10(2):226–232Google Scholar
  26. 26.
    Tropp JA, Gilbert AC (2007) Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans Inf Theory 53(12):4655–4666CrossRefMATHMathSciNetGoogle Scholar
  27. 27.
    Vanstone SA, Menezes AJ, Oorschot PC (1999) Handbook of applied cryptography. CRC Press, Boca RatonGoogle Scholar
  28. 28.
    Wang S, Kuang J, Li J (2002) Chaos-based communication in a large community. Phys Rev 66(6):1–4CrossRefMATHGoogle Scholar
  29. 29.
    Wu CP, Kuo CCJ (2000) Fast Encryption Methods for Audiovisual Data Confidentiality. In Proceedings of SPIE, pp: 284–295Google Scholar
  30. 30.
    Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J: Multidiscip J Sci Technol: J Sel Areas Telecommun 2(4):31–38Google Scholar
  31. 31.
    Zhou K, Wong X, Liao F et al (2008) Parallel image encryption algorithm based on discretized chaotic Map. Chaos, Solitons Fractals 38:1081–1092CrossRefGoogle Scholar
  32. 32.
    Zhou Q, Hu Y, Liao XF (2010) Analysis of the diffusion property of image encryption algorithm in block-and-permutation mode and its implementation. J Electron Inf Technol (Chin) 32(8):2015–2018CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2012

Authors and Affiliations

  1. 1.Graduate School of Information Science and Electrical EngineeringKyushu UniversityFukuokaJapan
  2. 2.Department of IT Convergence and Application EngineeringPukyong National UniversityBusanSouth Korea

Personalised recommendations