AU2018102061A4 - A novel CS-VQ based image encryption scheme - Google Patents
A novel CS-VQ based image encryption scheme Download PDFInfo
- Publication number
- AU2018102061A4 AU2018102061A4 AU2018102061A AU2018102061A AU2018102061A4 AU 2018102061 A4 AU2018102061 A4 AU 2018102061A4 AU 2018102061 A AU2018102061 A AU 2018102061A AU 2018102061 A AU2018102061 A AU 2018102061A AU 2018102061 A4 AU2018102061 A4 AU 2018102061A4
- Authority
- AU
- Australia
- Prior art keywords
- vector
- generate
- image
- measurements
- encryption scheme
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Landscapes
- Compression Or Coding Systems Of Tv Signals (AREA)
Abstract
An image encryption scheme with superior security and efficiency using compression to meet the requirements of a resource-limited network. The encryption method used Vector Quantization (VQ) and compressive sensing (CS). In VQ, the codebook is obtained using the LBG algorithm which allocates the training sample to the cluster of the shortes Euclidean distance based on the nearest neighbour principle. In CS, sparse representation, measurements acquisition and reconstruction are very important. The proposed VQCS being a subdata encryption scheme divides a plain image into two subsets of VQ indexes and error related data.
Description
With the rapid development of multimedia and Internet, digital image as the main information carrier experiences extensive transmission and storage. Illegal users may steal, tamper and destroy image, which may bring enormous loss to legitimate users. In recent years, how to design an image encryption scheme with superior security and efficiency has become an important research topic. Meanwhile, the image data needs to be compressed to meet the requirement of the resource-limited network. Vector quantization (VQ) and compressive sensing (CS) are two kinds of classical data compression techniques. We propose a novel image encryption method based on VQ andCS.
In VQ, the codebook
in VQ can be generated by the following model.
where
is the training sample set and D(jc,,j7) is a suitable metric distance function. We adopt LBG algorithm to obtain codebook, which allocates the training sample to the cluster of the shortest Euclidean distance based on the nearest neighbor principle. The codebook in our cryptosystem is set to be public.
In CS, sparse representation, measurements acquisition and reconstruction are very important. Let x be a one-dimensional signal of sparsity K and length N, and Ψ be the measurement matrix of size MxN . The signal * can be compressed to generate the measurements
With the available measurements y, the main task of CS is to reconstruct the original signal x by the optimal model (3):
Candes et al. pointed out that if we wanted to reconstruct * properly by model (3), the length of the measurements y must satisfy condition (4).
If the signal itself is not sparse enough, it must be sparse after transformation by certain dictionary Φ, which is shown as Eq. (5).
where s denotes the vector of sparse representation coefficients. Thus, the optimal model (3) can be transformed into model (6).
As known to all, the restoration precision of CS depends on the sparsity of data, and so the CS-based schemes directly aiming at plain image may result in a worse restoration and may not achieve better compression due to the less sparsity of plain image. The strategy that VQ indexes are transmitted together with the error data can reconstruct plain image properly. The error data have a better sparsity such that they can be compressed by CS. As far as we know, the image encryption scheme combining CS and VQ has not been proposed yet. We proposes an subdata image encryption scheme by taking advantages of VQ and CS (VQCS) to overcome the defects of traditional encryption scheme and achieve better compression.
The proposed VQCS encryption scheme
Our proposed VQCS is a subdata encryption scheme, which divides a plain image into two subsets of VQ indexes and error related data. The transmitter first compresses a plain image by VQ to generate an index vector and the corresponding error matrix, where the index vector contains most of information of the plain image and the error matrix retains small amount of information. Afterwards, the error matrix is compressed by CS to generate measurements. Then, we scramble and diffuse VQ indexes and the measurements using Eq. (7) to generate a cipher image.
where its three control parameters must satisfy 0.53 < « < 3.81, 0</?< 0.022, 0<y< 0.015 and its three initial parameters a0, b0 and c0 must between 0 and 1. Once receiving the cipher image, the receiver first places anti-permutation and anti-diffusion to obtain the index vector and the measurements. At last, the receiver generates the measurement matrix by the key and reconstructs the plain image with the available codebook.
• Index vector and error matrix generation by VQ
Let a plain image be
, where R and C denote the height and width of I0 respectively. First, the plain image I0 is divided into Ry.CH/1 sub-blocks of size lx l. The number /2 of elements of each sub-block equals to the dimension of a codeword. Let
denote the sub-blocks set. We can find the closest matching codeword for each sub-block and allocate the corresponding index to this sub-block. All the indexes formulate a vector
, which is computed as Eq. (8).
Making use of the index vector and codebook, a reconstructed image / that is close to the plain image I0 is obtained. By Eq. (9), the VQ error matrix can be computed.
The error matrix El relates to the codebook such that the better the codebook fits for the plain image, the nearer the error data approximate to zero, and vice versa. There usually exist blocking artifacts in the reconstructed image I . Many algorithms explore low pass filter to reduce the artifacts, which smooth the reconstructed image but bring the blur problem at the same time. Therefore, we discard the filter method and use CS to compress the error matrix instead. At the receiver end, the error matrix must satisfy the sparsity requirement to reconstruct plain image properly.
• Error matrix compression based on CS
The distribution of nonzero values is extraordinarily unequal such that some sub-blocks have better sparsity and some sub-blocks are not sparse enough. If we use the same compression rate to compress all the sub-blocks, the ones with worse sparsity would have poor recovery. In order to make the distribution of nonzero values more uniform, we utilize pseudorandom sequence generated by the 3-D logistic map as shown in Eq. (7) to scramble the error matrix. Let
be the stretched vector of the VQ error matrix Et in Eq. (9). We can obtain a scrambled error vector
from ex byEq. (10).
Reshaping the error vector e2 we can obtain an error matrix
The following will demonstrate how to compress E2 by block-based CS.
The error matrix E2 is first divided into non-overlapping sub-blocks of the fixed size /W and then they are expanded to vector set
. Suppose that the number of nonzero values of each block is saved in
We can use a measurement matrix of size Ms x ls to compress and encrypt each vector in V, as shown in Eq. (11).
where ls > Ms > NZt. To reconstruct the vector vt, we can use the following optimal model.
where Φ is a dictionary of size ls x ls and st is the sparse representation vector.
After the vector st is computed, the reconstructed vt can be obtained by Eq. (13).
If the number of the measurements of each sub-block satisfies Ms > 0(NZt log(/s / NZt)), the vector v, can be reconstructed without distortion with a high probability. • The steps of the encryption process
In VQ phase, we use a codebook with 256 codewords of length 16, whose codeword indexes are 0,1,---,254,255 from the first codeword to the last one. Thus, we can generate the index vector of size Nv = RvxRxC from the plain image, where R = 1/16. In CS phase, let ls = 16x 16 and the compression rate be Ra. Then, the number of the measurements of each sub-block is Ms = Ra x ls, and the number of the measurements of whole error matrix is Nm = Msx Rx C/ls — R^x RxC. Thus, the number of all the data including VQ indexes and measurements is NT - Nv + Nm = RxC. Last, after scrambling the indexes and measurements, we can obtain the cipher image. The detailed steps are shown as the following.
Step 1 Compress the plain image by VQ to generate the index vector
and the error matrix Ex.
Step 2 Scramble the error matrix Ex to generate the new error matrix E2 by the secret sequence
Step 3 Multiply the measurement matrix Ψ with each sub-blocks of E2 to generate measurements
Step 4 Extend linearly the measurements range to [0,255] and generate a new vector
Step 5 Append the measurement vectors
to the index vector s orderly to generate a new vector
Step 6 Diffuse the scrambled vector ev by Eq. (15) and Eq. (16) [26] to generate a new vector ed.
Step 7 Scramble the vector ed to generate the final cipher vector el by Eq. (17).
Step 8 Reshape the cipher vector to a cipher image Ex.
The decryption is the inverse process of the encryption, so we don’t reiterate here.
Claims (8)
- The encryption steps: Step 1 Compress the plain image by VQ to generate the index vectorand the error matrix El. Step
- 2 Scramble the error matrix Ex to generate the new error matrix E2 by the secret sequenceStep
- 3 Multiply the measurement matrix Ψ with each sub-blocks of E2 to generate measurementsStep
- 4 Extend linearly the measurements range to [0,255] and generate a new vectorStep
- 5 Append the measurement vectorsto the index vector s orderly to generate a new vectorStep
- 6 Diffuse the scrambled vector ev by Eq. (15) and Eq. (16) [26] to generate a new vector e&.Step
- 7 Scramble the vector ed to generate the final cipher vector e] by Eq. (17).Step
- 8 Reshape the cipher vector to a cipher image Ex. The decryption is the inverse process of the encryption, so we don’t reiterate here.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2018102061A AU2018102061A4 (en) | 2018-12-13 | 2018-12-13 | A novel CS-VQ based image encryption scheme |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2018102061A AU2018102061A4 (en) | 2018-12-13 | 2018-12-13 | A novel CS-VQ based image encryption scheme |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2018102061A4 true AU2018102061A4 (en) | 2019-02-07 |
Family
ID=65235606
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2018102061A Ceased AU2018102061A4 (en) | 2018-12-13 | 2018-12-13 | A novel CS-VQ based image encryption scheme |
Country Status (1)
Country | Link |
---|---|
AU (1) | AU2018102061A4 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113485081A (en) * | 2021-07-09 | 2021-10-08 | 北京航空航天大学 | Non-cascade optical scanning holographic multi-image parallel encryption method |
-
2018
- 2018-12-13 AU AU2018102061A patent/AU2018102061A4/en not_active Ceased
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113485081A (en) * | 2021-07-09 | 2021-10-08 | 北京航空航天大学 | Non-cascade optical scanning holographic multi-image parallel encryption method |
CN113485081B (en) * | 2021-07-09 | 2022-09-16 | 北京航空航天大学 | Non-cascade optical scanning holographic multi-image parallel encryption method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chai et al. | An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata | |
US10785545B2 (en) | Systems and methods for simultaneous compression and encryption | |
Gao et al. | Image representation using block compressive sensing for compression applications | |
CN102164282B (en) | Coefficient-random-permutation-based compressive sensing method and system for image coding | |
Setyaningsih et al. | Review of image compression and encryption techniques | |
Zhou et al. | Scalable compression of stream cipher encrypted images through context-adaptive sampling | |
Xiao et al. | Multi-focus image fusion and robust encryption algorithm based on compressive sensing | |
Kumar et al. | Reversible data hiding: A contemporary survey of state-of-the-art, opportunities and challenges | |
Gan et al. | Exploiting 2D compressed sensing and information entropy for secure color image compression and encryption | |
Yang et al. | A visually meaningful image encryption algorithm based on adaptive 2D compressive sensing and chaotic system | |
CN107483963B (en) | 1-bit image compression encryption method | |
Ponnaian et al. | Crypt analysis of an image compression–encryption algorithm and a modified scheme using compressive sensing | |
Tu et al. | Reversible data hiding with high payload based on referred frequency for VQ compressed codes index | |
Yang et al. | Dual embedding model: a new framework for visually meaningful image encryption | |
Leihong et al. | Research on multiple-image encryption scheme based on Fourier transform and ghost imaging algorithm | |
Meng et al. | Reversible data hiding in encrypted images based on IWT and chaotic system | |
AU2018102061A4 (en) | A novel CS-VQ based image encryption scheme | |
Ren et al. | Reversible data hiding scheme in encrypted images based on homomorphic encryption and pixel value ordering | |
Cao et al. | Separable Reversible Data Hiding in Encrypted VQ‐Encoded Images | |
CN103581677B (en) | Image encrypted compression and decompression decryption method and device | |
CN115442492B (en) | Visual security image encryption method based on one-dimensional sine chaotic mapping and discrete U-transformation embedding mode | |
Zhang et al. | Compressing cipher images by using semi-tensor product compressed sensing and pre-mapping | |
Wang et al. | Compressing encrypted images using the integer lifting wavelet | |
Zhang et al. | An improved image compression scheme with an adaptive parameters set in encrypted domain | |
Narayanan et al. | A Critical Study on Encryption Based Compression Techniques. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FGI | Letters patent sealed or granted (innovation patent) | ||
MK22 | Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry |