scholarly journals Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing

2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Yongli Tang ◽  
Mingjie Zhao ◽  
Lixiang Li

The rapid development of the Internet leads to a surge in the amount of information transmission and brings many security problems. For multimedia information transmission, especially digital images, it is necessary to compress and encrypt at the same time. The emergence of compressive sensing solves this problem. Compressive sensing can compress and encrypt at the same time, which can not only reduce the transmission bandwidth of the network but also improve the security of the system. However, when using compressive sensing encryption, the whole measurement matrix needs to be stored, and the compressive sensing can be combined with a chaotic system, so only the generation parameters of the matrix need to be stored, and the security of the system can be further improved by using the sensitivity of the chaotic system. This paper introduces a secure and efficient image compression-encryption scheme using a new chaotic structure and compressive sensing. The chaotic map used in the scheme is generated by our new and universal chaotic structure, which not only expands the chaotic range of the chaotic system but also improves the performance of the chaotic system. After analyzing the performance comparison of traditional one-dimensional chaotic maps and some existing methods, the image compression-encryption scheme based on a new chaotic structure and compressive sensing has a good encryption effect and large keyspace, which can resist brute force attack and statistical attack.

Entropy ◽  
2021 ◽  
Vol 23 (3) ◽  
pp. 291
Author(s):  
Chunyang Sun ◽  
Erfu Wang ◽  
Bing Zhao

Digital images can be large in size and contain sensitive information that needs protection. Compression using compressed sensing performs well, but the measurement matrix directly affects the signal compression and reconstruction performance. The good cryptographic characteristics of chaotic systems mean that using one to construct the measurement matrix has obvious advantages. However, existing low-dimensional chaotic systems have low complexity and generate sequences with poor randomness. Hence, a new six-dimensional non-degenerate discrete hyperchaotic system with six positive Lyapunov exponents is proposed in this paper. Using this chaotic system to design the measurement matrix can improve the performance of image compression and reconstruction. Because image encryption using compressed sensing cannot resist known- and chosen-plaintext attacks, the chaotic system proposed in this paper is introduced into the compressed sensing encryption framework. A scrambling algorithm and two-way diffusion algorithm for the plaintext are used to encrypt the measured value matrix. The security of the encryption system is further improved by generating the SHA-256 value of the original image to calculate the initial conditions of the chaotic map. A simulation and performance analysis shows that the proposed image compression-encryption scheme has high compression and reconstruction performance and the ability to resist known- and chosen-plaintext attacks.


Author(s):  
Jun Peng ◽  
Shangzhu Jin ◽  
Shaoning Pang ◽  
Du Zhang ◽  
Lixiao Feng ◽  
...  

For a security system built on symmetric-key cryptography algorithms, the substitution box (S-box) plays a crucial role to resist cryptanalysis. In this article, we incorporate quantum chaos and PWLCM chaotic map into a new method of S-box design. The secret key is transformed to generate a six tuple system parameter, which is involved in the generation process of chaotic sequences of two chaotic systems. The output of one chaotic system will disturb the parameters of another chaotic system in order to improve the complexity of encryption sequence. S-box is obtained by XOR operation of the output of two chaotic systems. Over the obtained 500 key-dependent S-boxes, we test the S-box cryptographical properties on bijection, nonlinearity, SAC, BIC, differential approximation probability, respectively. Performance comparison of proposed S-box with those chaos-based one in the literature has been made. The results show that the cryptographic characteristics of proposed S-box has met our design objectives and can be applied to data encryption, user authentication and system access control.


2016 ◽  
Vol 76 (7) ◽  
pp. 10097-10117 ◽  
Author(s):  
Juan Deng ◽  
Shu Zhao ◽  
Yan Wang ◽  
Lei Wang ◽  
Hong Wang ◽  
...  

2020 ◽  
Vol 176 ◽  
pp. 107684 ◽  
Author(s):  
Xiuli Chai ◽  
Jianqiang Bi ◽  
Zhihua Gan ◽  
Xianxing Liu ◽  
Yushu Zhang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document