Skip to main content
Log in

A new algorithm of image compression and encryption based on spatiotemporal cross chaotic system

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes a new image compression and encryption scheme based on the nearest-neighboring coupled-map lattices (NCML) and Non-uniform Discrete Cosine Transform (NDCT). A new cross chaotic map proposed based on Devaney’s theory is used as the local map of NCML, which is called spatiotemporal cross chaotic system. The algorithm adopts Huffman coding and NDCT which carries out transformation of image data to compress image data. In this system, there are two layers of encryption protection. The compression data are packed into blocks, and permutation between blocks and diffusion in blocks are done simultaneously. The parameters produced by spatiotemporal cross chaotic system are used to control the non-uniformity of the NDCT, which has also played a role in encryption. The security test results indicate the proposed methods have high speed, high security and good compression effect.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Behnia S, Akshshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos Solitons Fractals 35(2):408–419

    Article  MathSciNet  MATH  Google Scholar 

  2. Chen GR, Mao YB, Charles KC (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3):749–761

    Article  MathSciNet  MATH  Google Scholar 

  3. Chung KL, Liu YW, Yan WM (2006) A hybrid gray image representation using spatial and DCT based approach with application to moment computation. J Vis Commun Image Represent 17(6):1209–1226

    Article  Google Scholar 

  4. Curtis KM, Neil G, Fotopoulos V (2002) A hybrid fractal DCT image compression method. 14th Int Conf Digit Signal Proc 2:1337–1340

    Google Scholar 

  5. Dai CL, Bao WY (2012) Logistic map controlled secure arithmetic coding and its application in image encryption. J Chongqing Univ 35(8):87–91

    Google Scholar 

  6. Deng Y, Zhao XF, Feng DG (2010) Quantization index modulation steganography based on the nonuniform DCT. J Electron Inf Technol 32(2):323–328

    Article  Google Scholar 

  7. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(6):1259–1284

    Article  MathSciNet  MATH  Google Scholar 

  8. Ge X, Liu FL, Lu B, Wang W, Chen J (2010) An image encryption algorithm based on spatiotemporal chaos in DCT domain, The 2nd IEEE International Conference on Information Management and Engineering 267–270

  9. Grangetto M, Magli E, Olmo G (2006) Multimedia selective encryption by means of randomized arithmetic coding. IEEE Trans Multimed 8(5):905–917

    Article  Google Scholar 

  10. Han FY, Zhu CX (2007) One kid based on double dimensional chaos system picture encryption algorithm. Comput Eng Appl 43:50–51

    Google Scholar 

  11. Huang X (2011) Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn 67:2411–2417

    Article  Google Scholar 

  12. Jakimoski G, Subbalakshmi K (2008) Cryptanalysis of some multimedia encryption schemes. IEEE Trans Multimed 10(3):330–338

    Article  Google Scholar 

  13. Kaneko K (1985) Spatiotemporal intermittency in coupled map lattices. Prog Theor Phys 74(5):1033

    Article  MATH  Google Scholar 

  14. Kaneko K (1989) Pattern dynamics in spatiotemporal chaos: pattern selection, diffusion of defect and pattern competition intermittency. Phys D 34(1–2):1–41

    Article  MathSciNet  MATH  Google Scholar 

  15. Kanso A (2011) Self-shrinking chaotic stream ciphers. Commun Nonlinear Sci Numer Simul 16(2):822–836

    Article  MathSciNet  MATH  Google Scholar 

  16. Kim H, Wen J, Villasenor JD (2007) Secure arithmetic coding. IEEE Trans Signal Process 55(5):2263–2272

    Article  MathSciNet  Google Scholar 

  17. Kingston A, Autrusseau F (2008) Lossless image compression via predictive coding of discrete Radon projections. Signal Process Image Commun 23(4):313–324

    Article  Google Scholar 

  18. Krikor L, Baba S, Arif T, Shaaban Z (2009) Image encryption using DCT and stream cipher. Eur J Sci Res 32(1):47–57

    Google Scholar 

  19. Lian SG (2009) Efficient image or video encryption based on spatiotemporal chaos system. Chaos Solitons Fractals 40(5):2509–2519

    Article  MATH  Google Scholar 

  20. Liu X, Farrell P, Boyd C (1999) A unified code. Cryptogr Coding Lect Notes Comput Sci 1746:84–93

    Article  MathSciNet  Google Scholar 

  21. Lu K, Sun JH, OuYang RB, Huan YL (1990) Chaotic dynamics. Shanghai Translation Press, Shanghai

    Google Scholar 

  22. Matthews R (1989) On the derivation of a “chaotic” encryption algorithm. Cryptologia 13(1):29–42

    Article  MathSciNet  Google Scholar 

  23. NIST (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications, Special Publication 800–22

  24. Pincus S (1995) Approximate entropy (ApEn) as a complexity measure. Chaos 5(1):110–117

    Article  MathSciNet  Google Scholar 

  25. Shi YQ, Sun HF (2008) Image and video compression for multimedia engineering: fundamentals, algorithms, and standards. CRC Press, Boca Raton

    Book  Google Scholar 

  26. Shnnon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715

    Article  Google Scholar 

  27. Sun FY, Lü ZW (2011) Digital image encryption with chaotic map lattices. Chin Phys B 20(4):040506

    Article  Google Scholar 

  28. Sun F, Lü Z, Liu S (2010) A new cryptosystem based on spatial chaotic system. Opt Commun 283:2066–2073

    Article  Google Scholar 

  29. Tang JN, Zhang XD, Zhao L, Zou C (2010) A novel arithmetic coding on data compression and encryption with asymptotic deterministic randomness, 2010 International Conference on Computer Application and System Modeling 2-10-2-14

  30. Teng L, Wang XY (2012) A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive. Opt Commun 285:4048–4054

    Article  Google Scholar 

  31. Tong XJ (2012) The novel bilateral-Diffusion image encryption algorithm with dynamical compound chaos. J Syst Softw 85:850–858

    Article  Google Scholar 

  32. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  33. Wang SH, Kuang JY, Li JH, Luo YL, Lu HP, Hu G (2002) Chaos-based secure communication in a large community. Phys Rev E 66(6):1–4

    MATH  Google Scholar 

  34. Wang K, Pei LH, Zou, Song AG, He ZY (2005) On the security of 3D Cat map based symmetric image encryption scheme. Phys Lett A 343:432–439

    Article  MATH  Google Scholar 

  35. Wang XY, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92:1101–1108

    Article  Google Scholar 

  36. Wang Y, Wong KW, Liao XF, Chen GR (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11:514–522

    Article  Google Scholar 

  37. Wen J, Kim H, Villasenor J (2006) Binary arithmetic coding with keybased interval splitting. IEEE Signal Process Lett 13(2):69–72

    Article  Google Scholar 

  38. Wong KW, Yuen CH (2008) Embedding compression in chaos-based cryptography. IEEE Trans Circ Syst II: Express Briefs 55(11):1193–1197

    Article  Google Scholar 

  39. Wu CP, Kuo CCJ (2005) Design of integrated multimedia compression and encryption systems. IEEE Trans Multimed 7(5):828–839

    Article  Google Scholar 

  40. Yang HQ, Liao XF, Wong K-W, Zhang W, Wei PC (2012) SPIHT-based joint image compression and encryption. Acta Phys Sin 61(4):040505-1–040505-8

    Google Scholar 

  41. Yuen CH, Wong KW (2011) A chaos-based joint image compression and encryption scheme using DCT and SHA-1. Appl Soft Comput 11:5092–5098

    Article  Google Scholar 

  42. Zhou J, Liang Z, Chen Y, Au OC (2007) Security analysis of multimedia encryption schemes based on multiple Huffman table. IEEE Signal Process Lett 14(3):201–204

    Article  Google Scholar 

  43. Zhou Q, Liao X (2012) Collision-based flexible image encryption algorithm. J Syst Softw 85:400–407

    Article  Google Scholar 

Download references

Acknowledgments

This research is supported by the National Natural Science Foundation of China (No.60973162), the Science and Technology of Shandong Province of China (No.2013GGX10129, No.2010GGX10132, No.2012GGX10110), the Soft Science of Shandong Province of China (No. 2012RKA10009) and the National Cryptology Development Foundation of China (No.MMJJ201301006), the Teaching Research Project of Harbin Institute of Technology at Weihai and college of computer (NO. HITWHCS201309), and the Engineering Technology and Research Center of Weihai Information Security.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaojun Tong.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, M., Tong, X. A new algorithm of image compression and encryption based on spatiotemporal cross chaotic system. Multimed Tools Appl 74, 11255–11279 (2015). https://doi.org/10.1007/s11042-014-2227-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2227-4

Keywords

Navigation