利用混沌图对有视觉意义的图像进行加密,以实现安全的认证数据传输

IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-11-14 DOI:10.1016/j.jksuci.2024.102235
Deep Singh , Sandeep Kumar , Chaman Verma , Zoltán Illés , Neerendra Kumar
{"title":"利用混沌图对有视觉意义的图像进行加密,以实现安全的认证数据传输","authors":"Deep Singh ,&nbsp;Sandeep Kumar ,&nbsp;Chaman Verma ,&nbsp;Zoltán Illés ,&nbsp;Neerendra Kumar","doi":"10.1016/j.jksuci.2024.102235","DOIUrl":null,"url":null,"abstract":"<div><div>Image ciphering techniques usually transform a given plain image data into a cipher image data resembling noise, serving as an indicator of the presence of secret image data. However, the transmission of such noise-like images could draw attention, thereby attracting the attackers and may face several possible attacks. This paper presents an approach for generating a visually meaningful image encryption (VMIE) scheme that combines three layers of security protection: encryption, digital signature, and steganography. The present scheme is dedicated to achieving a balanced performance in robustness, security and operational efficiency. First, the original image is partially encrypted by using the RSA cryptosystem and modified Hénon map (MHM). In the second stage, a digital signature is generated for the partially encrypted image by employing a hash function and the RSA cryptosystem. The obtained digital signature is appended to the partially encrypted image produced after implementing the zigzag confusion in the above partially encrypted image. Further, to achieve better confusion and diffusion, the partially encrypted image containing a digital signature undergoes through the application of 3D Arnold cat map (<span><math><mrow><mi>A</mi><msub><mrow><mi>R</mi></mrow><mrow><mi>n</mi><mi>o</mi></mrow></msub></mrow></math></span> times), to produce the secret encrypted image <span><math><mrow><mo>(</mo><msub><mrow><mi>S</mi></mrow><mrow><mi>r</mi><mn>5</mn></mrow></msub><mo>)</mo></mrow></math></span>. To ensure the security and robustness of the proposed technique against various classical attacks, the hash value obtained from the SHA-256 hash function and carrier images is utilized to generate the initial conditions <span><math><mrow><mi>M</mi><msub><mrow><mi>h</mi></mrow><mrow><mn>10</mn></mrow></msub></mrow></math></span> and <span><math><mrow><mi>M</mi><msub><mrow><mi>h</mi></mrow><mrow><mn>20</mn></mrow></msub></mrow></math></span> for modified Hénon map, and initial position <span><math><mrow><msub><mrow><mi>Z</mi></mrow><mrow><mi>i</mi><mi>p</mi></mrow></msub><mo>=</mo><mrow><mo>(</mo><msub><mrow><mi>z</mi></mrow><mrow><mi>r</mi><mi>o</mi><mi>w</mi></mrow></msub><mo>,</mo><msub><mrow><mi>z</mi></mrow><mrow><mi>c</mi><mi>o</mi><mi>l</mi></mrow></msub><mo>)</mo></mrow></mrow></math></span> for zigzag confusion. In the proposed algorithm, the digital signature is utilized for both purposes to verify the sender’s authenticity and to enhance the encryption quality. The carrier image undergoes lifting wavelet transformation, and its high-frequency components are utilized in the embedding process through a permuted pattern of MHM, resulting in a visually meaningful encrypted image. The proposed scheme achieves efficient visual encryption with minimal distortion and ensures lossless image quality upon decryption (infinite PSNR), balancing high level of security along with a good computational efficiency.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102235"},"PeriodicalIF":5.2000,"publicationDate":"2024-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Visually meaningful image encryption for secure and authenticated data transmission using chaotic maps\",\"authors\":\"Deep Singh ,&nbsp;Sandeep Kumar ,&nbsp;Chaman Verma ,&nbsp;Zoltán Illés ,&nbsp;Neerendra Kumar\",\"doi\":\"10.1016/j.jksuci.2024.102235\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Image ciphering techniques usually transform a given plain image data into a cipher image data resembling noise, serving as an indicator of the presence of secret image data. However, the transmission of such noise-like images could draw attention, thereby attracting the attackers and may face several possible attacks. This paper presents an approach for generating a visually meaningful image encryption (VMIE) scheme that combines three layers of security protection: encryption, digital signature, and steganography. The present scheme is dedicated to achieving a balanced performance in robustness, security and operational efficiency. First, the original image is partially encrypted by using the RSA cryptosystem and modified Hénon map (MHM). In the second stage, a digital signature is generated for the partially encrypted image by employing a hash function and the RSA cryptosystem. The obtained digital signature is appended to the partially encrypted image produced after implementing the zigzag confusion in the above partially encrypted image. Further, to achieve better confusion and diffusion, the partially encrypted image containing a digital signature undergoes through the application of 3D Arnold cat map (<span><math><mrow><mi>A</mi><msub><mrow><mi>R</mi></mrow><mrow><mi>n</mi><mi>o</mi></mrow></msub></mrow></math></span> times), to produce the secret encrypted image <span><math><mrow><mo>(</mo><msub><mrow><mi>S</mi></mrow><mrow><mi>r</mi><mn>5</mn></mrow></msub><mo>)</mo></mrow></math></span>. To ensure the security and robustness of the proposed technique against various classical attacks, the hash value obtained from the SHA-256 hash function and carrier images is utilized to generate the initial conditions <span><math><mrow><mi>M</mi><msub><mrow><mi>h</mi></mrow><mrow><mn>10</mn></mrow></msub></mrow></math></span> and <span><math><mrow><mi>M</mi><msub><mrow><mi>h</mi></mrow><mrow><mn>20</mn></mrow></msub></mrow></math></span> for modified Hénon map, and initial position <span><math><mrow><msub><mrow><mi>Z</mi></mrow><mrow><mi>i</mi><mi>p</mi></mrow></msub><mo>=</mo><mrow><mo>(</mo><msub><mrow><mi>z</mi></mrow><mrow><mi>r</mi><mi>o</mi><mi>w</mi></mrow></msub><mo>,</mo><msub><mrow><mi>z</mi></mrow><mrow><mi>c</mi><mi>o</mi><mi>l</mi></mrow></msub><mo>)</mo></mrow></mrow></math></span> for zigzag confusion. In the proposed algorithm, the digital signature is utilized for both purposes to verify the sender’s authenticity and to enhance the encryption quality. The carrier image undergoes lifting wavelet transformation, and its high-frequency components are utilized in the embedding process through a permuted pattern of MHM, resulting in a visually meaningful encrypted image. The proposed scheme achieves efficient visual encryption with minimal distortion and ensures lossless image quality upon decryption (infinite PSNR), balancing high level of security along with a good computational efficiency.</div></div>\",\"PeriodicalId\":48547,\"journal\":{\"name\":\"Journal of King Saud University-Computer and Information Sciences\",\"volume\":\"36 10\",\"pages\":\"Article 102235\"},\"PeriodicalIF\":5.2000,\"publicationDate\":\"2024-11-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of King Saud University-Computer and Information Sciences\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1319157824003240\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of King Saud University-Computer and Information Sciences","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1319157824003240","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

图像加密技术通常将给定的普通图像数据转换成类似噪声的加密图像数据,作为存在秘密图像数据的指示器。然而,传输这种类似噪声的图像会引起注意,从而吸引攻击者,并可能面临多种攻击。本文提出了一种生成视觉意义图像加密(VMIE)方案的方法,该方案结合了三层安全保护:加密、数字签名和隐写术。本方案致力于实现稳健性、安全性和运行效率的平衡。首先,使用 RSA 密码系统和修正的赫农图谱(MHM)对原始图像进行部分加密。第二阶段,使用哈希函数和 RSA 密码系统为部分加密的图像生成数字签名。在对上述部分加密图像进行之字形混淆后,将获得的数字签名附加到部分加密图像上。此外,为了达到更好的混淆和扩散效果,包含数字签名的部分加密图像还要经过三维阿诺德猫图的应用(ARno 次),以生成秘密加密图像(Sr5)。为确保所提技术的安全性和鲁棒性,以抵御各种经典攻击,利用 SHA-256 哈希函数和载波图像获得的哈希值生成修正 Hénon 映射的初始条件 Mh10 和 Mh20,以及之字形混淆的初始位置 Zip=(zrow,zcol)。在所提出的算法中,数字签名既可用于验证发送者的真实性,也可用于提高加密质量。载波图像经过提升小波变换,其高频分量通过 MHM 的包络模式被用于嵌入过程,从而得到视觉上有意义的加密图像。所提出的方案以最小的失真实现了高效的视觉加密,并确保了解密时的无损图像质量(PSNR 无穷大),同时兼顾了高水平的安全性和良好的计算效率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Visually meaningful image encryption for secure and authenticated data transmission using chaotic maps
Image ciphering techniques usually transform a given plain image data into a cipher image data resembling noise, serving as an indicator of the presence of secret image data. However, the transmission of such noise-like images could draw attention, thereby attracting the attackers and may face several possible attacks. This paper presents an approach for generating a visually meaningful image encryption (VMIE) scheme that combines three layers of security protection: encryption, digital signature, and steganography. The present scheme is dedicated to achieving a balanced performance in robustness, security and operational efficiency. First, the original image is partially encrypted by using the RSA cryptosystem and modified Hénon map (MHM). In the second stage, a digital signature is generated for the partially encrypted image by employing a hash function and the RSA cryptosystem. The obtained digital signature is appended to the partially encrypted image produced after implementing the zigzag confusion in the above partially encrypted image. Further, to achieve better confusion and diffusion, the partially encrypted image containing a digital signature undergoes through the application of 3D Arnold cat map (ARno times), to produce the secret encrypted image (Sr5). To ensure the security and robustness of the proposed technique against various classical attacks, the hash value obtained from the SHA-256 hash function and carrier images is utilized to generate the initial conditions Mh10 and Mh20 for modified Hénon map, and initial position Zip=(zrow,zcol) for zigzag confusion. In the proposed algorithm, the digital signature is utilized for both purposes to verify the sender’s authenticity and to enhance the encryption quality. The carrier image undergoes lifting wavelet transformation, and its high-frequency components are utilized in the embedding process through a permuted pattern of MHM, resulting in a visually meaningful encrypted image. The proposed scheme achieves efficient visual encryption with minimal distortion and ensures lossless image quality upon decryption (infinite PSNR), balancing high level of security along with a good computational efficiency.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
10.50
自引率
8.70%
发文量
656
审稿时长
29 days
期刊介绍: In 2022 the Journal of King Saud University - Computer and Information Sciences will become an author paid open access journal. Authors who submit their manuscript after October 31st 2021 will be asked to pay an Article Processing Charge (APC) after acceptance of their paper to make their work immediately, permanently, and freely accessible to all. The Journal of King Saud University Computer and Information Sciences is a refereed, international journal that covers all aspects of both foundations of computer and its practical applications.
期刊最新文献
Visually meaningful image encryption for secure and authenticated data transmission using chaotic maps Leukocyte segmentation based on DenseREU-Net Knowledge-embedded multi-layer collaborative adaptive fusion network: Addressing challenges in foggy conditions and complex imaging Feature-fused residual network for time series classification Low-light image enhancement: A comprehensive review on methods, datasets and evaluation metrics
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1