Skip to main content
Log in

A modified image selective encryption-compression technique based on 3D chaotic maps and arithmetic coding

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The advances in digital image processing and communications have created a great demand for real–time secure image transmission over the networks. However, the development of effective, fast and secure dependent image compression encryption systems are still a research problem as the intrinsic features of images such as bulk data capacity and high correlation among pixels hinds the use of the traditional joint encryption compression methods. A new approach is suggested in this paper for partial image encryption compression that adopts chaotic 3D cat map to de-correlate relations among pixels in conjunction with an adaptive thresholding technique that is utilized as a lossy compression technique instead of using complex quantization techniques and also as a substitution technique to increase the security of the cipher image. The proposed scheme is based on employing both of lossless compression with encryption on the most significant part of the image after contourlet transform. However the least significant parts are lossy compressed by employing a simple thresholding rule and arithmetic coding to render the image totally unrecognizable. Due to the weakness of 3D cat map to chosen plain text attack, the suggested scheme incorporates a mechanism to generate random key depending on the contents of the image (context key). Several experiments were done on benchmark images to insure the validity of the proposed technique. The compression analysis and security outcomes indicate that the suggested technique is an efficacious and safe for real time image’s applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Al-ghaib H (2012) Lossy Image Compression using Wavelet Transform, Master Thesis, Department of Electrical and Computer Engineering, University of Alabama in Huntsville

  2. Al-Maadeed S, Al-Ali A, Abdalla T (2012) A new chaos-based image encryption and compression algorithm. Can J Electr Comput Eng 15:1–11

    MATH  Google Scholar 

  3. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 16(08):2129–2151

    Article  MathSciNet  MATH  Google Scholar 

  4. Bhatnagar G, Wu Q (2012) Selective image encryption based on pixels of interest and singular value decomposition. J Digit Signal Process 22:648–663

    Article  MathSciNet  Google Scholar 

  5. Brindha M, Gounden N (2016) A Chaos based image encryption and lossless compression algorithm using hash table and Chinese remainder theorem. J Appl Soft Comput 40:379–390

    Article  Google Scholar 

  6. Chen G, Mao Y, Chui C (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761

    Article  MathSciNet  MATH  Google Scholar 

  7. Decanniere C, Biryukov A, Preneel B (2006) An introduction to block cipher cryptanalysis. Proc IEEE 94(2):346–356

    Article  Google Scholar 

  8. Do MN, Vetterli M (2002) Contourlets a directional multiresolution image representation. Proceeding of IEEE International Conference on Image Processing, USA, p 357-360

  9. Do MN, Vetterli M (2005) The Contourlet transform: an efficient directional multiresolution image representation. IEEE Trans Image Process 14(12):2091–2106

    Article  Google Scholar 

  10. Durdi V, Kulkarni P, Su K (2017) Selective Encryption Framework for Secure Multimedia Transmission over Wireless Multimedia Sensor Networks, International Conference on Data Engineering and Communication Technology, p 469-480

  11. Enayatifar R, Abdullah A, Isnin I, Altameem A, Lee M (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146–154

    Article  Google Scholar 

  12. Eslami R, Radha H (2005) Image denoising using translation-invariant contourlet transform. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 4, p 557–560

  13. Gu G, Ling J (2014) A fast image encryption method by using chaotic 3D cat maps. I J Optik 125(17):4700–4705

    Article  Google Scholar 

  14. Hamdi M, Rhouma R, Belghith S (2017) A selective compression-encryption of images based on SPIHT coding and Chirikov standard map. Signal Process 131:514–526

    Article  Google Scholar 

  15. Hore A, Ziou D (2010) Image quality metrics: PSNR vs. SSIM, 20th International Conference on Pattern Recognition, Istanbul, p 2366-2369

  16. Katsigiannis S, Papaioannou G, Maroulis D (2012) A contourlet transform based algorithm for real-time video encoding. J Real Time Image Process 8437:1–12

    Google Scholar 

  17. Martin K, Lukac R, Plataniotis K (2005) Efficient encryption of wavelet-based coded color images. J Pattern Recognit 38(7):1111–1115

    Article  MATH  Google Scholar 

  18. Masmoudi A, Puech W, Masmoudi A (2015) An improved lossless image compression based arithmetic coding using mixture of non-parametric distributions. Multimed Tools Appl 74(23):10605–10619

    Article  Google Scholar 

  19. Mohamed N, El-Azeim M, Zaghloul A, El-Latif A (2015) Image encryption scheme for secure digital images based on 3D cat map and turing machine. International Conference of Soft Computing and Pattern Recognition (SoCPaR), Japan, p 230–234

  20. Pande A, Mohapatra P, Zambreno J (2011) Using chaotic maps for encrypting image and video content, IEEE International Symposium on Multimedia (ISM), CA, p 171-178

  21. Rekha H, Samundiswary P (2016) Image compression using multilevel thresholding based absolute moment block truncation coding for WSN. Proceedings of the International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), India, p 396-400

  22. Seo Y, Kim D, Yoo J, Dey S, Agrawal A (2003) Wavelet domain image encryption by subband selection and data bit selection, Proceeding of World Wireless Congress (WCC’03/3Gwireless’), p 1–6

  23. Song H, Yu S, Song L, Xiong H (2005) Contourlet image coding based on adjusted SPIHT. Adv Multimed Inf Process 3767:629–640

    Google Scholar 

  24. Tan P, Zhao W (2012) Image coding based on Sparsified Contourlet and Adjusted SPIHT’, Proceedings of IEEE 11th International Conference on Signal Processing (ICSP), China, p 922–925

  25. Taneja N, Raman B, Gupta I (2009) ‘Partial Encryption on SPIHT Compressed Images’, International Conference on Pattern Recognition and Machine Intelligence (PReMI), India, p 426-431

  26. Taneja N, Raman B, Gupta I (2009) Partial encryption on SPIHT compressed images. Proceedings of the Third International Conference on Pattern Recognition and Machine Intelligence, India, p 426-431

  27. Tong X, Zhang M, Wang Z, Ma J (2013) A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. J Nonlinear Dyn 72:229–241

    Article  MathSciNet  Google Scholar 

  28. Tong A, Zhang M, Wang Z, Ma J (2016) A joint color image encryption and compression scheme based on hyper-chaotic system. J Nonlinear Dyn 84(4):2333–2356

    Article  Google Scholar 

  29. Weia X, Guoa L, Zhanga Q, Zhanga J, Shiguo L (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299

  30. Veeraswamy K, Mohan B, Reddy Y, Kumar S (2009) Energy based quantization for image compression using contourlet transform. Proceeding of the First International Conference on Networks and Communication (NETCOM), India, p 230–234

  31. Xi Z, Xiao Y (2009) An image compression scheme adopted for contourlet transform. Proceedings of the 2nd International Congress on Image and Signal Processing, China, p 1–4

  32. Xiang T, Qu J, Xiao D (2014) Joint SPIHT compression and selective encryption. Appl Soft Comput 21:159–170

  33. Ye R (2011) An image encryption scheme with efficient permutation and diffusion processes. Communications in Computer and Information Science, Vol. 202. Springer, p 32–39

  34. Zhang M, Tong X (2017) Joint image encryption and compression scheme based on IWT and SPIHT. Opt Lasers Eng 90:254–274

    Article  Google Scholar 

  35. Zhang L, Liao X, Wang X (2005) An image encryption approach based on chaotic maps. Chaos, Solitons Fractals 24(3):759–765

    Article  MathSciNet  MATH  Google Scholar 

  36. Zhang S, Xue X, Shi J (2010) Image compression based on contourlet and no lists SPIHT. Proceedings of the International Conference on Computer, Mechatronics, Control and Electronic Engineering, China, p 211-214

  37. Zhanga X, Wanga X (2013) Chaos-based partial encryption of SPIHT coded color images. J Signal Process 93(9):2422–2431

  38. Belazi A, El-Latif AAA, Diaconu AV, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37–50

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saad Mohamed Darwish.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Darwish, S.M. A modified image selective encryption-compression technique based on 3D chaotic maps and arithmetic coding. Multimed Tools Appl 78, 19229–19252 (2019). https://doi.org/10.1007/s11042-019-7256-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7256-6

Keywords

Navigation