Deep Singh , Sandeep Kumar , Chaman Verma , Zoltán Illés , Neerendra Kumar
{"title":"利用混沌图对有视觉意义的图像进行加密,以实现安全的认证数据传输","authors":"Deep Singh , Sandeep Kumar , Chaman Verma , Zoltán Illés , Neerendra Kumar","doi":"10.1016/j.jksuci.2024.102235","DOIUrl":null,"url":null,"abstract":"<div><div>Image ciphering techniques usually transform a given plain image data into a cipher image data resembling noise, serving as an indicator of the presence of secret image data. However, the transmission of such noise-like images could draw attention, thereby attracting the attackers and may face several possible attacks. This paper presents an approach for generating a visually meaningful image encryption (VMIE) scheme that combines three layers of security protection: encryption, digital signature, and steganography. The present scheme is dedicated to achieving a balanced performance in robustness, security and operational efficiency. First, the original image is partially encrypted by using the RSA cryptosystem and modified Hénon map (MHM). In the second stage, a digital signature is generated for the partially encrypted image by employing a hash function and the RSA cryptosystem. The obtained digital signature is appended to the partially encrypted image produced after implementing the zigzag confusion in the above partially encrypted image. Further, to achieve better confusion and diffusion, the partially encrypted image containing a digital signature undergoes through the application of 3D Arnold cat map (<span><math><mrow><mi>A</mi><msub><mrow><mi>R</mi></mrow><mrow><mi>n</mi><mi>o</mi></mrow></msub></mrow></math></span> times), to produce the secret encrypted image <span><math><mrow><mo>(</mo><msub><mrow><mi>S</mi></mrow><mrow><mi>r</mi><mn>5</mn></mrow></msub><mo>)</mo></mrow></math></span>. To ensure the security and robustness of the proposed technique against various classical attacks, the hash value obtained from the SHA-256 hash function and carrier images is utilized to generate the initial conditions <span><math><mrow><mi>M</mi><msub><mrow><mi>h</mi></mrow><mrow><mn>10</mn></mrow></msub></mrow></math></span> and <span><math><mrow><mi>M</mi><msub><mrow><mi>h</mi></mrow><mrow><mn>20</mn></mrow></msub></mrow></math></span> for modified Hénon map, and initial position <span><math><mrow><msub><mrow><mi>Z</mi></mrow><mrow><mi>i</mi><mi>p</mi></mrow></msub><mo>=</mo><mrow><mo>(</mo><msub><mrow><mi>z</mi></mrow><mrow><mi>r</mi><mi>o</mi><mi>w</mi></mrow></msub><mo>,</mo><msub><mrow><mi>z</mi></mrow><mrow><mi>c</mi><mi>o</mi><mi>l</mi></mrow></msub><mo>)</mo></mrow></mrow></math></span> for zigzag confusion. In the proposed algorithm, the digital signature is utilized for both purposes to verify the sender’s authenticity and to enhance the encryption quality. The carrier image undergoes lifting wavelet transformation, and its high-frequency components are utilized in the embedding process through a permuted pattern of MHM, resulting in a visually meaningful encrypted image. The proposed scheme achieves efficient visual encryption with minimal distortion and ensures lossless image quality upon decryption (infinite PSNR), balancing high level of security along with a good computational efficiency.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102235"},"PeriodicalIF":5.2000,"publicationDate":"2024-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Visually meaningful image encryption for secure and authenticated data transmission using chaotic maps\",\"authors\":\"Deep Singh , Sandeep Kumar , Chaman Verma , Zoltán Illés , Neerendra Kumar\",\"doi\":\"10.1016/j.jksuci.2024.102235\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Image ciphering techniques usually transform a given plain image data into a cipher image data resembling noise, serving as an indicator of the presence of secret image data. However, the transmission of such noise-like images could draw attention, thereby attracting the attackers and may face several possible attacks. This paper presents an approach for generating a visually meaningful image encryption (VMIE) scheme that combines three layers of security protection: encryption, digital signature, and steganography. The present scheme is dedicated to achieving a balanced performance in robustness, security and operational efficiency. First, the original image is partially encrypted by using the RSA cryptosystem and modified Hénon map (MHM). In the second stage, a digital signature is generated for the partially encrypted image by employing a hash function and the RSA cryptosystem. The obtained digital signature is appended to the partially encrypted image produced after implementing the zigzag confusion in the above partially encrypted image. Further, to achieve better confusion and diffusion, the partially encrypted image containing a digital signature undergoes through the application of 3D Arnold cat map (<span><math><mrow><mi>A</mi><msub><mrow><mi>R</mi></mrow><mrow><mi>n</mi><mi>o</mi></mrow></msub></mrow></math></span> times), to produce the secret encrypted image <span><math><mrow><mo>(</mo><msub><mrow><mi>S</mi></mrow><mrow><mi>r</mi><mn>5</mn></mrow></msub><mo>)</mo></mrow></math></span>. To ensure the security and robustness of the proposed technique against various classical attacks, the hash value obtained from the SHA-256 hash function and carrier images is utilized to generate the initial conditions <span><math><mrow><mi>M</mi><msub><mrow><mi>h</mi></mrow><mrow><mn>10</mn></mrow></msub></mrow></math></span> and <span><math><mrow><mi>M</mi><msub><mrow><mi>h</mi></mrow><mrow><mn>20</mn></mrow></msub></mrow></math></span> for modified Hénon map, and initial position <span><math><mrow><msub><mrow><mi>Z</mi></mrow><mrow><mi>i</mi><mi>p</mi></mrow></msub><mo>=</mo><mrow><mo>(</mo><msub><mrow><mi>z</mi></mrow><mrow><mi>r</mi><mi>o</mi><mi>w</mi></mrow></msub><mo>,</mo><msub><mrow><mi>z</mi></mrow><mrow><mi>c</mi><mi>o</mi><mi>l</mi></mrow></msub><mo>)</mo></mrow></mrow></math></span> for zigzag confusion. In the proposed algorithm, the digital signature is utilized for both purposes to verify the sender’s authenticity and to enhance the encryption quality. The carrier image undergoes lifting wavelet transformation, and its high-frequency components are utilized in the embedding process through a permuted pattern of MHM, resulting in a visually meaningful encrypted image. The proposed scheme achieves efficient visual encryption with minimal distortion and ensures lossless image quality upon decryption (infinite PSNR), balancing high level of security along with a good computational efficiency.</div></div>\",\"PeriodicalId\":48547,\"journal\":{\"name\":\"Journal of King Saud University-Computer and Information Sciences\",\"volume\":\"36 10\",\"pages\":\"Article 102235\"},\"PeriodicalIF\":5.2000,\"publicationDate\":\"2024-11-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of King Saud University-Computer and Information Sciences\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1319157824003240\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of King Saud University-Computer and Information Sciences","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1319157824003240","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Visually meaningful image encryption for secure and authenticated data transmission using chaotic maps
Image ciphering techniques usually transform a given plain image data into a cipher image data resembling noise, serving as an indicator of the presence of secret image data. However, the transmission of such noise-like images could draw attention, thereby attracting the attackers and may face several possible attacks. This paper presents an approach for generating a visually meaningful image encryption (VMIE) scheme that combines three layers of security protection: encryption, digital signature, and steganography. The present scheme is dedicated to achieving a balanced performance in robustness, security and operational efficiency. First, the original image is partially encrypted by using the RSA cryptosystem and modified Hénon map (MHM). In the second stage, a digital signature is generated for the partially encrypted image by employing a hash function and the RSA cryptosystem. The obtained digital signature is appended to the partially encrypted image produced after implementing the zigzag confusion in the above partially encrypted image. Further, to achieve better confusion and diffusion, the partially encrypted image containing a digital signature undergoes through the application of 3D Arnold cat map ( times), to produce the secret encrypted image . To ensure the security and robustness of the proposed technique against various classical attacks, the hash value obtained from the SHA-256 hash function and carrier images is utilized to generate the initial conditions and for modified Hénon map, and initial position for zigzag confusion. In the proposed algorithm, the digital signature is utilized for both purposes to verify the sender’s authenticity and to enhance the encryption quality. The carrier image undergoes lifting wavelet transformation, and its high-frequency components are utilized in the embedding process through a permuted pattern of MHM, resulting in a visually meaningful encrypted image. The proposed scheme achieves efficient visual encryption with minimal distortion and ensures lossless image quality upon decryption (infinite PSNR), balancing high level of security along with a good computational efficiency.
期刊介绍:
In 2022 the Journal of King Saud University - Computer and Information Sciences will become an author paid open access journal. Authors who submit their manuscript after October 31st 2021 will be asked to pay an Article Processing Charge (APC) after acceptance of their paper to make their work immediately, permanently, and freely accessible to all. The Journal of King Saud University Computer and Information Sciences is a refereed, international journal that covers all aspects of both foundations of computer and its practical applications.