Literature DB >> 35885163

Double-Color-Image Compression-Encryption Algorithm Based on Quaternion Multiple Parameter DFrAT and Feature Fusion with Preferable Restoration Quality.

Meihua Xiao1, Ruixiao Tan1, Huosheng Ye2, Lihua Gong2, Zhiliang Zhu1,3.   

Abstract

To achieve multiple color images encryption, a secure double-color-image encryption algorithm is designed based on the quaternion multiple parameter discrete fractional angular transform (QMPDFrAT), a nonlinear operation and a plaintext-related joint permutation-diffusion mechanism. QMPDFrAT is first defined and then applied to encrypt multiple color images. In the designed algorithm, the low-frequency and high-frequency sub-bands of the three color components of each plaintext image are obtained by two-dimensional discrete wavelet transform. Then, the high-frequency sub-bands are further made sparse and the main features of these sub-bands are extracted by a Zigzag scan. Subsequently, all the low-frequency sub-bands and high-frequency fusion images are represented as three quaternion signals, which are modulated by the proposed QMPDFrAT with three quaternion random phase masks, respectively. The spherical transform, as a nonlinear operation, is followed to nonlinearly make the three transform results interact. For better security, a joint permutation-diffusion mechanism based on plaintext-related random pixel insertion is performed on the three intermediate outputs to yield the final encryption image. Compared with many similar color image compression-encryption schemes, the proposed algorithm can encrypt double-color-image with higher quality of image reconstruction. Numerical simulation results demonstrate that the proposed double-color-image encryption algorithm is feasibility and achieves high security.

Entities:  

Keywords:  double-color-image encryption; non-adjacent coupled map lattices; quaternion; random pixel insertion

Year:  2022        PMID: 35885163      PMCID: PMC9315646          DOI: 10.3390/e24070941

Source DB:  PubMed          Journal:  Entropy (Basel)        ISSN: 1099-4300            Impact factor:   2.738


1. Introduction

In recent years, secure transmission of color images has attracted widespread attention. Due to the intrinsic features of images, such as strong correlation between adjacent pixels, large storage capacity, and high redundancy, the traditional textual encryption algorithms, such as DES (Data Encryption Standard) and AES (Advanced Encryption Standard), are not suitable for image encryption [1]. To ensure the confidentiality of the private image information, a great deal of color image encryption algorithms have been presented with various technologies. Among these algorithms, chaotic systems have been widely adopted in image encryption owing to its excellent properties. For instance, Pak et al. introduced a simple and effective method of generating a new chaotic sequence according to the differences in the output sequences of two existing one-dimensional (1D) chaotic maps [2]. Based on the obtained sequences, a linear-nonlinear-linear encryption structure of this cryptographic system was designed to improve security. Similarly, a color image encryption scheme based on a new combination chaotic system was proposed [3]. Nevertheless, the chaotic dynamic properties degrade rapidly in computer realization with finite computation precision [4]. To overcome this problem, a spatiotemporal chaotic system, i.e., the non-adjacent coupled map lattices (NCML) was developed to alleviate the degradation of low-dimensional chaos map [5]. Subsequently, a series of image encryption algorithms were proposed based on the spatiotemporal chaotic system [6,7]. Moreover, for better security and larger key space, the high-dimensional chaotic systems have been increasingly employed to design the image encryption schemes [8,9,10,11]. In ref. [8], a novel 3D chaotic map obtained by coupling the piecewise and logistic map is implemented to improve the performance of cryptosystem. Tong et al. proposed a fast image encryption scheme based on a new 4D chaotic system [9]. In addition, to enhance the security and complexity of the cryptosystems, chaos-based encryption schemes were combined with other methods, such as deoxyribonucleic acid [12], cellular automata [13], fuzzy cellular neural network [14], and so on. However, the permutation and the diffusion processes in these encryption schemes were both performed in the spatial domain, which may reduce the security of cryptosystems to some extent. Inspired by some excellent mathematical properties of transform techniques, many researchers have attempted to devise transform-based image encryption algorithms, where the plaintext image is encrypted in the transform domain and the pixel values can be retrieved through a reverse process. To the best of our knowledge, there are few investigations on double-color-image compression and encryption algorithms. In light of this situation and the above discussions, a new double-color-image compression and encryption algorithm based on QMPDFrAT and a joint permutation-diffusion mechanism are designed. The main contributions of the proposed algorithm are as follows: Multiple parameter discrete fractional angular transform (MPDFrAT) is generalized to quaternion MPDFrAT. The analysis shows its advantages in image encryption. Then, the sub-bands of the original images can be encrypted with the proposed QMPDFrAT in a parallel way. The deficiency caused by the linear transform system is eliminated by nonlinear transform, i.e., spherical transform. A joint permutation-diffusion mechanism with plaintext-related random pixel insertion is designed to ensure the proposed cryptosystem could counteract the powerful chosen-plaintext attack and improve the efficiency of the cryptosystem. The effect of different components of the high-frequency sub-bands on the quality of the decryption image is discussed and a more reasonable feature fusion method of the high-frequency part is implemented by combining DWT with Zigzag operation. Consequently, the proposed image encryption algorithm could achieve higher quality of the decryption images than that of the typical image compression and encryption algorithms. The rest of this paper is arranged as follows. In Section 2, some related works are discussed. In Section 3, some fundamental tools including the NCML system, quaternion algebra, and MPDFrAT are reviewed. The QMPDFrAT is defined and analyzed in Section 4. The details of the proposed double-color-image encryption algorithm are described in Section 5. In Section 6, simulation results and security evaluations are provided. Brief conclusions are given in Section 7.

2. Related Works

Based on the gyrator transform, Chen et al. proposed an asymmetric optical cryptosystem for the color image [15]. Xiong et al. designed an optical color image scheme based on fractional Fourier transform and two-step phase-shifting interferometry [16]. Nevertheless, these schemes processed each color channel separately and failed to capture the inherent correlation among three color channels. To deal with the three color channels parallelly, many encryption methods have been investigated with the quaternion-based transforms [17,18,19]. However, the outputs of these aforementioned transform-based algorithms are complex values and the size of encryption results or private keys exceed that of the original images, which may make the transmission and storage of encryption image and private keys inconvenient. To overcome this insufficiency, Zhou et al. devised a nonlinear color image encryption algorithm based on reality-preserving fractional Mellin transform, where the final output was real-value encrypted image [20]. Motivated by this work, many other reality-preserving transforms were defined to encrypt the color image [21,22,23]. To enhance the capacity of the cryptosystem, multiple color image encryptions have attracted increasing attention [24,25,26]. For example, Shao et al. designed a multiple color images encryption framework, in which the multiple color images were encrypted into phase-only function with phase retrieval algorithm under quaternion representation [24]. In many practical applications, for the facility of transmission of ciphertext image, it is necessary to realize simultaneous image compression and encryption. As a novel signal sampling-reconstruction technique, compressive sensing (CS) has been widely employed to solve this problem [27,28,29,30]. For instance, Chen et al. put forward an asymmetric color cryptographic system, in which not only the low-frequency but also the CS-based compressed high-frequency part of the original image were encrypted in the discrete fractional random transform domain [29]. To enhance encryption efficiency, Zhang et al. investigated an efficient color image encryption approach based on CS and fractional Fourier transform, where the measurement matrices exploited in CS were obtained by extending chaos-based low dimensional seed matrices with Kronecker product [30]. However, these transform-based color image compression-encryption schemes were only designed for single color image, which makes them unable to process batch images efficiently to a certain extent. Aiming at this problem, Han et al. suggested a double-color-image compression and encryption algorithm based on CS and self-adaptive random phase encoding [31]. However, in some special applications, the decryption time and the quality of decryption image are also of significance. Table 1 shows the decryption time and the PSNR values of the test image “Peppers” under different reconstruction algorithms with the same compression ratio. Unfortunately, the signal reconstruction takes too much time even though many efficient reconstruction algorithms including orthogonal matching pursuit (OMP) and smoothed norm have been proposed. In other words, the DWT-based compression method may be a good choice in real-time decryption applications.
Table 1

Comparison results under the same compression ratio.

Spare and Reconstruction AlgorithmsDWT + OMP DWT+SL0 DWT + IDWT
Decryption time (s)3.55823.69330.0369
PSNR20.344120.529230.5270

3. Fundamental Knowledge

3.1. Non-Adjacent Coupled Map Lattices System

The non-adjacent coupled map lattices system is considered as the improved spatiotemporal chaotic system, which can generate pseudorandom sequences with stable chaotic properties [5]. The NCML considers logistic maps coupled as where is logistic map, is the coupling parameter , is the time index , and , , are the lattices . The relations of , , and can be obtained by Arnold cat map, i.e.,

3.2. Quaternion Representation of Multi-Image

Quaternions are hyper-complex numbers with four dimensions. A quaternion number is [32] where , , , are real numbers and , , are three imaginary operators acting on the following rules. The modulus and the conjugate of a quaternion are respectively defined as If the real part is 0, then is called a pure quaternion. If the modulus equals to 1, then is called a unit quaternion. Based on the above theory, the quaternion representation of multi-image is [17] where is a quaternion signal and , , , are four image signals, respectively.

3.3. Multiple Parameter Discrete Fractional Angular Transform

Briefly, the definition of the discrete fractional angular transform (DFrAT) is introduced. The kernel matrix of the DFrAT is [33] where is a diagonal matrix, whose diagonal values are eigenvalues of the DFrAT, is an orthonormal matrix and consists of the eigenvectors of the DFrAT. can be obtained with a recurrence algorithm elaborated in [33]. Based on the DFrAT, a new multiple parameter discrete fractional angular transform (MPDFrAT) was presented [34]. For a 1D signal of size , its order 1D MPDFrAT is [34] where is an arbitrary positive integer, is a random M-dimensional integer vector, , denotes the weight coefficient given by denotes 1D DFrAT with the angle and the fractional order , i.e., where denotes the kernel matrix of DFrAT and can be obtained with Equation (7). In fact, the MPDFrAT has a similar form with the multiple parameter discrete fractional Fourier transform (MPDFrFT). The difference between MPDFrAT and MPDFrFT is the generation process of the eigenvector of the kernel matrix. To calculate the MPDFrAT of a discrete signal in an efficient way, one can utilize a discretization method [19] by eigen-decomposing MPDFrAT matrix as where , for even while for odd , denotes the modulo operation, is eigenvector of DFrAT. Then, one can rewrite the order 1D MPDFrAT of a signal as an eigen-decomposition form, i.e.,

4. Quaternion Multiple Parameter Discrete Fractional Angular Transform

Enlighted by the idea of the definition for 1D MPDFrAT with eigen-decomposition form shown in Equation (11), one can define a new quaternion multiple parameter discrete fractional angular transform (QMPDFrAT) for quaternion signal. For a 1D quaternion signal , its left-side QMPDFrAT is defined as where Equation (14) is similar to MPDFrAT matrix in Equation (11) and complex number is replaced by quaternion . Due to the anticommutation of the multiplication of quaternions shown in Equation (4), one can also define the right-side 1D QMPDFrAT by shifting the kernel matrix to the right-side of , i.e., Without loss of generality, the left-side 1D QMPDFrAT is exploited in this paper. In addition, to illustrate the feature of the proposed QMPDFrAT, a 1D quaternion signal of size is transformed by using the fractional quaternion Fourier transform (FRQFT) [35], the quaternion discrete fractional random transform (QDFRNT) [36], the multiple-parameter fractional quaternion Fourier transform (MPFrQFT) [19], and the proposed QMPDFrAT. The comparison results are recorded in Table 2. For brevity, only the first imaginary parts of the input and output quaternion signal are drawn in Table 2. The complicated Hermite polynomials calculation for eigenvectors in the MPFrQFT and the Schmidt orthogonalization of a random matrix in the QDFRNT require relatively higher time. However, the eigenvectors in the QMPDFrAT can be obtained only by simple recurrences and thus the calculation speed is greatly improved. Furthermore, the proposed QMPDFrAT possesses the largest key space among these four quaternion transforms. Therefore, the proposed QMPDFrAT is a suitable tool for image encryption.
Table 2

Comparison of four quaternion transforms.

TransformFRQFT [35]QDFRNT [36]MPFrQFT [19]ProposedQMPDFrAT
Performance
Secret keys α,μ α,μ α,μ,M1,η1 α,θ,μ,M1,η1
Calculation time (s) of eigenvector (N = 256)0.0145130.0219120.0145130.004462
The 1D QMPDFrAT can be developed to the 2D one by calculating two 1D QMPDFrATs in the x-axis and the y-axis, respectively, i.e., where is a 2D quaternion signal.

5. Double-Color-Image Compression and Encryption Algorithm

The encryption process for the designed double-color-image encryption algorithm is shown in Figure 1. The main encryption processes include three stages: sparse representation of the color plaintext images, double-color-image encryption in the frequency domain under quaternion representation, and joint permutation-diffusion mechanism. The detailed steps are described as follows.
Figure 1

Double-color-image encryption algorithm.

5.1. Compression Process

Step 1: Double-color plaintext images and of size are converted into their red, green, and blue components which can be expressed as , , , , , and , respectively. Step 2: The one level 2D DWT is performed on the six color components to obtain 24 image sub-bands of size , namely, for , for , for , for , for , for . Step 3: Low-frequency parts of six spectra are chosen as the three imaginary parts of two quaternion signals and . To improve the quality of image reconstruction and achieve small transmission load simultaneously, a new method for processing high-frequency parts of six spectra is designed as follows: The sub-bands , and of are transformed by the DWT and the interim results are scanned by the Zigzag operation [37] to obtain three 1D sequences with length , respectively. The compression process for is drawn in Figure 2a.
Figure 2

Compression process for . (a) shows the whole compression process and (b) shows the schematic diagram of Zigzag operation in (a).

Each sequence is cut to acquire a new sequence with length . Figure 2b shows the schematic diagram of Zigzag operation. The results after performing DWT on the high-frequency parts are scanned from the upper left corner to the lower right corner. This scan order can extract the main information of the high-frequency parts, which promises the preferable restoration quality as analyzed in Section 5.2. The above-mentioned three new sequences are constructed into one sequence. If necessary, the zero elements are filled in the right-most row of this reorganized sequence to ensure that the length of this sequence is . Then, this sequence is converted into a composite matrix of size . In a similar way, one can obtain five other composite matrices , , , , and from five high-frequency parts of , , , , and , respectively.

5.2. Double-Color-Image Encryption under Quaternion Representation

Step 1: Quaternion representation (QR): the selected to-be-encrypted sub-bands are represented by quaternion algebra shown as follows Step 2: With the secret keys , , , , , , , , , , and , three quaternion signals shown in Equation (17) are modulated by the proposed QMPDFrAT with three quaternion random phase masks, respectively. where phase mask is a random matrix uniformly distributed in . Step 3: The four parts of each quaternion signal are extracted and reorganized (EAR) to form a new matrix of size . where , , , and extract the real part and the three imaginary parts of the quaternion signal , respectively. Step 4: To eliminate the deficiency caused by the inherent linearity of the QMPDFrAT, a nonlinear operation called spherical transform is followed to further hide the information obtained by matrices , , and . For the convenience of decryption, the matrix is first mapped to the matrix whose values are greater than zero. As shown in Figure 3, the three matrices , , and can be regarded as the orthorhombic axis in the spherical coordinate domain. The mapping rules are where is a plaintext-related adjustment factor which can be calculated as
Figure 3

Rotation map on matrix in spherical transform.

In this process, is considered as a supplementary key for decryption.

5.3. Joint Permutation-Diffusion Mechanism with Plaintext-Related Random Pixel Insertion

For the image encryption algorithm with the traditional permutation-diffusion structure shown in Figure 4, there are three main drawbacks: (1) multiple rounds of permutation and diffusion operations improve the level of security but sacrifice efficiency; (2) the secret keys are dependent on the original image and the user could not obtain keys before performing the encryption process; (3) the same ciphertext image is obtained each time when it is applied to the same plaintext image with secret keys, which weakens the robustness of the cryptosystem. Aiming at these shortcomings, a new joint permutation-diffusion mechanism based on the plaintext-related random pixel insertion is designed to acquire the final encryption image , in which only one-time traversal of the to-be-encrypted sequence is executed [38]. The specific process is shown in Figure 5. The encryption steps are described as follows.
Figure 4

Structure of general image encryption algorithm.

Figure 5

Joint permutation-diffusion mechanism with plaintext-related random pixel insertion.

Step 1: With the initial keys , , , and , NCML system is iterated times. To eliminate the transient effect, the former values are discarded. Then, one can obtain the chaotic sequence with length : . Subsequently, the sequence is further processed as Additionally, one could sort sequence and record the positions of the corresponding values of the sorted sequence in to obtain address sequence of length . Step 2: Three matrices , , and are converted into a 1D sequence , Afterwards, one can quantify into the range of , Step 3: Generation of random pixel values related to plaintext. Adopting the secret keys , , and the sum of all the pixels in the original images as the input of hash function SHA-512, a 512-bits hash value can be obtained. One can randomly select a binary sequence of length 8 from for times and convert each binary sequence into decimal integer. Consequently, a plaintext-related random sequence of length is obtained. Afterwards, sequence and sequence are concatenated into one sequence of length . Step 4: Joint permutation-diffusion mechanism. The first encrypted pixel value is randomly selected from sequence . Then, other encrypted pixel values are obtained by where . Step 5: The final ciphertext is obtained by In the proposed joint permutation-diffusion strategy, the plaintext-related random values are randomly inserted in the interim sequence . The value of encrypted sequence not only depends on the to-be-encrypted value , chaotic value , but also is determined by the previous encrypted value , which accords the proposed color image cryptosystem a high level of security, as elaborated in the later section.

5.4. Double-Color-Image Decryption Algorithm

Since the proposed double-color-image encryption algorithm is symmetric, those who know the whole keys can decrypt the ciphertext with the reverse encryption process described in Section 5.2. The decryption process is exhibited in Figure 6. Particularly, the inverse decryption process of joint permutation-diffusion strategy is where The inverse transform for Equation (20) is
Figure 6

Double-color-image decryption algorithm.

After performing the inverse QMPDFrATs and inverse phase mask modulations, one can extract the four parts of each resulting quaternion signals, respectively. Finally, the decryption images can be retrieved through the inverse compression process and inverse DWT operation.

6. Simulation Results and Security Analyses

6.1. Encryption and Decryption Results

To verify the feasibility of the proposed encryption algorithm, four groups of color images of size shown in Figure 7 are selected from the USC-SIPI image database to be tested [39]. The secret keys and are arbitrarily taken as 25 and 29, respectively. The pure quaternions , , , and are set as , , , and , respectively. The -dimensional parameter vector is random real vector whose values are independent and uniformly distributed in . The fractional orders and are randomly given as 0.4697 and 0.4023, respectively. The initial values and control parameters of the NCML system are chosen arbitrarily as: , , , , respectively. Figure 8 and Figure 9 show the encryption and the decryption results, respectively. To measure the quality of restored image, two image quality assessment criteria are considered, i.e.,
Figure 7

Original images: (a) “Lena”, (b) “Peppers”, (c) “Female”, (d) “Milkdrop”, (e) “House”, (f) “Airplane”, (g) “Couple”, (h) “Tree”.

Figure 8

Ciphertext images: (a) “Lena-Peppers”, (b) “Female-Milkdrop”, (c) “House-Airplane”, (d) “Couple-Tree”.

Figure 9

Decryption images: (a) “Lena”, (b) “Peppers”, (c) “Female”, (d) “Milkdrop”, (e) “House”, (f) “Airplane”, (g) “Couple”, (h) “Tree”.

Peak Signal-to-Noise Ratio (PSNR) is where and represent the pixel values of each color component of the original color image and the decryption one, respectively. Structural similarity (SSIM) index [40] is where and are the windows of two images with size , and denote the average values of and , and are variances of and , respectively, is the covariance between and . , , , , is the gray level of the plaintext image. The greater SSIM means the better recovery of image. The PSNR values and the mean SSIM (MSSIM) values for different images are collected in Table 3. It can be seen from Figure 8 and Figure 9 and Table 3 that the ciphertext images cannot reveal the information of the original images and the decryption images achieve good reconstruction quality.
Table 3

PSNR and MSSIM values of decryption images.

Decryption ImagePSNR (dB)MSSIM
RGBAverage
“Lena”30.878328.175929.376629.47690.9801
“Peppers”31.162629.132630.882930.39270.9903
“Female”34.954334.198032.379033.84370.9925
“Milkdrop”41.528332.183533.633935.78190.9957
“House”34.612834.633532.683333.97650.9946
“Airplane”28.335327.465930.748328.84990.9787
“Couple”34.881735.736234.241734.95320.9904
“Tree”30.628228.309629.389829.44250.9842

6.2. Decryption Quality Evaluation

In the conventional DWT-based image compression and encryption methods, to achieve the purpose of compression, only the low-frequency part of the original image is utilized for encryption and the high-frequency parts are discarded, which affects the decryption quality of the image [41,42]. In this paper, to achieve compression and improve the quality of image reconstruction simultaneously, five methods shown in Table 4 are designed to flexibly select the high-frequency parts of the original images.
Table 4

Five methods for selecting high-frequency sub-bands.

Method6 High-Frequency Sub-Bands
Method 1 LH1R1,G1,B1,R2,G2,B2
Method 2 HL1R1,G1,B1,R2,G2,B2
Method 3 HH1R1,G1,B1,R2,G2,B2
Method 4 LH1R1,R2,HL1G1,G2,HH1B1,B2
Method 5 (LH1R1,R2+HL1R1,R2+HH1R1,R2)DWT&ZigzagC1R1,R2(LH1G1,G2+HL1G1,G2+HH1G1,G2)DWT&ZigzagC1G1,G2(LH1B1,B2+HL1B1,B2+HH1B1,B2)DWT&ZigzagC1B1,B2
Simulations are conducted with the five above-mentioned methods. The corresponding PSNR values of different decryption images are depicted in Figure 10. Decryption images with the proposed five methods have relatively higher reconstruction quality than those in [29,31], since both the low-frequency parts and the high-frequency parts of original images are reserved to be encrypted. As an example, decryption images “Peppers” with five methods are shown in Figure 11. Corresponding selected details of decryption “Peppers” are exhibited in Figure 12. From Figure 10, Figure 11 and Figure 12, although the PSNR value of the decryption image with method 1 (2, 3) is acceptable, the details of the corresponding decryption image are distorted obviously, for only one of the three high-frequency parts associated with the original RGB components are reserved to be encrypted. For method 4, the selected high-frequency parts (, , ) of each RGB component are different and the decryption images contain all these three high-frequency parts as possible, which leads to the decryption images not only achieving similar decryption quality with method 1 (2, 3), but also reducing the undesirable distortion effect of the detail part to a certain extent. For method 5, the main information of all the three high-frequency parts of every RGB component are reserved via the DWT and Zigzag operation, which can make the decryption images achieve higher visual quality and relatively higher reconstruction quality than method 4. Based on the above discussion, the adoption of method 5 as the feature fusion of the high-frequency parts of the original images is more helpful for improving the reconstruction quality of decryption image.
Figure 10

PSNR values with different methods: the eight points on the abscissa denote decryption images “Lena”, “Peppers”, “Female”, “Milkdrop”, “House”, “Airplane”, “Couple”, and “Tree”, respectively. Yellow [29], Black [31].

Figure 11

Decryption results: (a–f) decryption images “Peppers” with methods 1, 2, 3, 4, 5, and method in ref. [31], respectively.

Figure 12

(a–e) Details of the decryption image “Peppers” with methods 1, 2, 3, 4, and 5, respectively.

6.3. Statistical Analyses

6.3.1. Histogram Analysis

Histograms play an important role in statistical analyses. Figure 13(a1–c1,a2–c2) are the histograms of RGB components of original “Lena” and “Peppers”, respectively. Figure 13(a3–c3) are the histograms of RGB components of encryption image, respectively. In the encryption process, the proposed QMPDFrAT is performed on the compressed image, which causes the histograms of the intermediate results have a similar distribution. Afterward, the proposed joint permutation-diffusion operation can make the pixel values of intermediate results distributed uniformly among the range of 0–255. From Figure 13, the histograms of RGB components of original color images “Lena” and “Peppers” are quite different while those of RGB components of the encryption image show similarity and uniform distribution. In addition, the chi-square test is adopted to numerically measure the uniformity of the histogram of ciphertext [43], i.e., where is the observed number of the L-th gray level and is the expected number of the L-th gray level. Table 5 gives the results of the chi-square test for the RGB components of the encryption image under different input images. From Table 5, the -values of encrypted RGB components are under the critical values with 1% and 5% level of significance, which indicates that the proposed encryption algorithm can withstand the histogram attack.
Figure 13

Histograms: (a1–c1) R, G, B components of image “Lena”, respectively. (a2–c2) R, G, B components of image “Peppers”, respectively. (a3–c3) R, G, B components of encryption image “Lena-Peppers”, respectively.

Table 5

Results of chi-square test.

Imageχ2-ValueCritical Value
RGB1% Probability5% Probability
“Lena-Peppers”244.9391227.9453260.7734310.457293.2478
“Female-Milkdrop”239.0859243.7813249.9844
“House-Airplane”267.0547223.8281261.0781
“Couple-Tree”243.7188249.2656191.0938

6.3.2. Correlation Analysis

A total of 12,000 pairs of adjacent pixels in the horizontal, vertical, and diagonal directions are chosen randomly from the original color image “Lena” and the corresponding encryption image. Their correlation distributions are displayed in Figure 14. In Figure 14, the correlation distributions of the three color channels of the original image “Lena” are linear and strongly correlated, while those of the corresponding three color channels of the encryption image are almost uniform. Moreover, to evaluate this feature numerically, the correlation coefficients of the selected 12,000 pairs of adjacent pixels in three directions are calculated, as shown in Table 6. The correlation coefficients in the original color images are close to 1, while those in the encryption images are near 0. The results suggest that the proposed algorithm can reduce the correlation in original images significantly. Therefore, the statistical analysis attack is impracticable for the proposed double−color−image encryption algorithm.
Figure 14

Correlation distributions of adjacent pixels in the horizontal, vertical, diagonal directions: (a) distribution of original color image “Lena”; (b–d) distributions of red, green, and blue components of encryption image “Lena−Peppers”, respectively.

Table 6

Correlation coefficients of adjacent pixels.

SchemeImage Horizontal DirectionVertical DirectionDiagonal Direction
Proposed scheme“Lena”R0.96620.93550.9056
G0.94590.90470.8735
B0.89310.86620.8314
“Peppers”R0.95070.94530.9069
G0.96520.95710.9307
B0.94510.93560.9028
“Female”R0.95530.97160.9401
G0.96530.97220.9547
B0.94930.96070.9360
“Milkdrop”R0.99470.98240.9809
G0.97100.95720.9418
B0.95420.95670.9182
“Lena−Peppers”R−0.0013−0.01110.0046
G0.01350.0064−0.0241
B0.01790.01310.0023
“Female−Milkdrop”R0.00160.0044−0.0013
G−0.01200.00950.0056
B0.00170.00940.0141
Ref. [11]“Lena”R−0.0027−0.0131−0.0032
G0.00730.01780.0127
B0.0012−0.01400.0123
Ref. [31]“Lena”R0.08470.05010.0356
G0.0707−0.03180.0831
B0.1394−0.01330.1065
Ref. [38]“Lena”R0.00250.00470.0021
G0.00190.01270.0037
B−0.00320.01010.0087

6.3.3. Information Entropy Analysis

Information entropy can reflect the degree of randomness and the unpredictability of a random event , i.e., where is the occurrence probability of the random event . Theoretically, the value of for an encryption image with 256−level gray is 8 bits when all gray levels obey the uniform probability distribution. In our double−color−image encryption algorithm, the ciphertext image is obtained by the QMPDFrAT and chaos-based joint permutation−diffusion, which makes encrypted pixel values randomly distributed as much as possible. The information entropies of the RGB components in the final encryption image under different input test images are shown in Table 7. One can see that the information entropies are extremely close to 8 bits. Therefore, the proposed double-color-image encryption algorithm can resist the information entropy analysis attack.
Table 7

Results of information entropy (dB) of encryption color images.

AlgorithmEncryption ImageRGB
Proposed algorithm“Lena−Peppers”7.99707.99747.9976
“Female−Milkdrop”7.99737.99747.9971
“House−Airplane”7.99707.99767.9975
“Couple−Tree”7.99737.99737.9979
Ref. [11]“Lena”7.99157.99127.9909
Ref. [30]“Lena”7.34887.46377.3369
Ref. [31]“Lena”7.24967.35557.2855
Ref. [38]“Lena”7.99907.99897.9992

6.4. Sensibility Analyses

6.4.1. Key Sensitivity Analysis

To inspect the sensitivity of the proposed algorithm, a set of tests are performed by decrypting the ciphertext image with a tiny perturbation in the correct encryption key. Figure 15 and Figure 16 exhibit the decryption image “Peppers” when one of the initial keys has a tiny deviation while all the other keys are correct, respectively. Figure 16 shows the decryption image “Peppers” decrypted with wrong keys , , , , randomly generated real vectors and , respectively. The decryption results indicate that these images cannot reveal any serviceable information and the proposed image encryption algorithm is sensitive to the above-mentioned keys.
Figure 15

Decryption image “Peppers” with adjusted keys: (a1) , (b1) , (c1) , (d1) .

Figure 16

Decryption image “Peppers” with adjusted keys: (a2) , (b2) , (c2) , (d2) (e2) , (f2) .

6.4.2. Key Space Analysis

Simulations show that the secret keys , , and are not sensitive enough, thus they are considered supplementary keys. From the sensitivity analysis in Section 6.4.1, the precision of the keys , , and is up to . The deviation of control parameter is about . The key space for fractional order () is . Therefore, the total key space of the proposed algorithm is at least , which is greater than . It indicates that the key space of the proposed encryption algorithm is large enough to resist the brute-force attack.

6.4.3. Differential Attack Analysis

Two common indicators, i.e., NPCR (number of pixel change rate) and UACI (unified average changing intensity) are introduced to evaluate the ability of the proposed algorithm to resist differential attack. These two indicators can be computed, respectively, as [11] where and are the ciphertext images without and with only one pixel altered in the plaintext images, respectively. In these experiments, 10 pixels of different positions in each plaintext image are randomly selected and only one pixel is changed each time. In the diffusion process, the plaintext-related random values are randomly inserted into the to-be-encrypted sequence and the encrypted values are determined by the chaotic values and their previous ciphered values, both of which make the proposed cryptosystem sensitive to plaintext images. The average NPCR values and the average UACI values for the two ciphertext images are tabulated in Table 8. It shows that the proposed encryption algorithm could resist differential attack, since the values of NPCR and UACI are close to their theoretical values.
Table 8

Results of average NPCR and UACI values for different color images.

ImageNPCR (%)UACI (%)
RedGreenBlueRedGreenBlue
“Lena”99.642999.662899.626133.444033.487633.4167
“Peppers”99.632599.611899.625333.453033.472933.4237
“Female”99.653699.633299.637933.452133.413633.4377
“Milkdrop”99.604599.599299.621033.356133.412933.4459
“Lena” in Ref. [11]99.610199.613699.614133.469533.429233.4665
“Lena” in Ref. [31]99.625899.636699.599733.389433.394433.4859
“Lena” in Ref. [38]99.610399.909899.608933.465533.465233.4591

6.5. Robustness against Noise Analysis and Data Loss Attack

Assume that the encryption image is polluted by the additive Gaussian noise and Salt and Pepper noise during transmission. Decryption results of image “Peppers” with these two types of noises added to the ciphertext are displayed in Figure 17. Although the quality of decryption images decreases with the increase of noise parameter, the decryption images are still identifiable. It indicates that the proposed color image encryption algorithm could resist the noise attack to a certain extent. Figure 18 shows the PSNR values of different decryption images with the increase of noise parameter, which further supports our conclusion. To analyze the robustness of the proposed algorithm against data loss attack, the ciphertext image is assumed to be cropped to a limited degree. Simulation results are exhibited in Figure 19. It can be noted that the main information of the decryption image can still be recognized since the main information of the plaintext images is randomly distributed over the whole ciphertext image by the proposed QMPDFrAT and the joint permutation-diffusion mechanism. Therefore, the proposed algorithm can withstand data loss attack to a limited degree.
Figure 17

Decryption images “Peppers” with different noise attacks: Gaussian noise with intensity  (a) , (b) , Salt and Pepper noise with the density of noise distribution (c) 0.1 (d) 0.5.

Figure 18

Average PSNR value versus noise parameter: (a) Gaussian noise, (b) Salt and Pepper noise.

Figure 19

Results of data loss attack: (a–d) are encryption images with 1%, 2.5%, 5%, 10% data loss, respectively; (e–h) are the corresponding decryption images “Peppers”.

6.6. Robustness of the Proposed Algorithm against Four Typical Attacks

Among the four potential attacks including ciphertext-only attack, known-plaintext attack, chosen-ciphertext attack, and chosen-plaintext attack, the chosen-plaintext attack is considered as the most powerful one. In the cryptanalysis, if the cryptosystem is immune to the chosen-plaintext attack, it will be able to withstand other three attacks [12]. Under the chosen-plaintext attack, attackers may deduce the secret keys by a pair of the corresponding plaintext and ciphertext images. In our algorithm, the deficiency caused by the linear transform system is eliminated by a nonlinear spherical transform. The current encrypted pixel value is associated with the plaintext-related values and the previous ciphered value, which contributes to the high sensitivity for the plaintext images. On the other hand, the plaintext-related values are obtained in a random way, which enables the proposed algorithm to generate a completely different encrypted images each time when it is applied to the same original images with the same secret keys. In addition, some attackers may deduce the secret keys by analyzing the special images, such as all black and all white images [44]. To analyze this situation, double black images and double white images are considered as the inputs of the proposed cryptosystem, respectively. Figure 20 shows one of the double special images and their corresponding encryption images. As it is shown from the simulation results, the ciphertext images of these two special images are all noise-like. Therefore, the designed double-color-image encryption algorithm has a strong ability to resist the chosen-plaintext attack and the other three potential attacks.
Figure 20

Encryption results of black and white images: (a) black image, (b) encryption black image, (c) white image, (d) encryption white image.

6.7. Time Analysis

Execution time is a significant consideration in image encryption and decryption processes. The encryption and decryption time of the proposed cryptosystem and similar algorithms in refs. [11,29,31,38] is shown in Table 9. Simulations with the same number of input images are conducted under MATLAB (R2016a) on a personal computer with Intel (R) Core (TM) i7−3537 U CPU @2.00 GHz, 4GB RAM running Windows 10. In ref. [11], the keystreams utilized in encryption and decryption processes are generated by iterating the 6D hyperchaotic system, which takes too much time. In refs. [29,31], the compression and encryption are realized efficiently by combining CS with joint low-dimensional chaotic system. However, the decryption process is time-consuming as it takes too much time to reconstruct the original signal. Since the whole encryption process is executed in the spatial domain, the security of the encryption algorithm in ref. [38] is guaranteed by the complex permutation and diffusion operations, which leads to relatively longer encryption and decryption time. In our algorithm, the time-consuming parts include double-color-image compression, three times QMPDFrATs, a spherical transform, and one-time joint permutation-diffusion operation. QMPDFrAT was pointed out to be efficient in Section 3. Only one-time traversal of the to-be-encrypted sequence allows the permutation-diffusion process to take relatively shorter encryption and decryption time. Figure 21a,b shows the encryption time and the decryption time of each part, respectively. As observed from Figure 21, the encryption and decryption time is acceptable. Therefore, the proposed image compression-encryption algorithm is feasible in real-time cryptosystem.
Table 9

Encryption and decryption time (s).

TimeProposed SchemeRef. [11]Ref. [29]Ref. [31]Ref. [38]
Encryption time1.22714.08210.85740.91391.8094
Decryption time1.15794.21164.66584.53481.9225
Figure 21

(a) Encryption time and time consumption percentage of each part; (b) decryption time and time consumption percentage of each part.

7. Conclusions

The quaternion multiple parameter discrete fractional angular transform is firstly defined. The analysis shows that the proposed quaternion multiple parameter discrete fractional angular transform is a suitable tool for image encryption. Based on this transform, a new double-color-image compression-encryption algorithm with a spatiotemporal chaotic system is obtained. Sub-bands of original images based on quaternion representation are encrypted with quaternion multiple parameter discrete fractional angular transform and the intermediate results are constructed into three new matrices with the same size of plaintext images, which avoids the additional data extension that many transform-based methods yield. The spherical transform, as a nonlinear operation, is introduced to nonlinearly make the three transform results interact. A new joint permutation-diffusion mechanism with plaintext-related random pixel insertion is developed to enhance the security of cryptosystem and reduce encryption time simultaneously. The simulation results show that the proposed algorithm has better reconstruction effects than some similar compression-encryption algorithms. The security performance evaluation demonstrates that the proposed color image encryption algorithm has a large key space, high key sensitivity, and can withstand statistical analyses attack, differential attack, noise attack, occlusion attack, known-plaintext attack, and chosen-plaintext attack.
  3 in total

1.  Image quality assessment: from error visibility to structural similarity.

Authors:  Zhou Wang; Alan Conrad Bovik; Hamid Rahim Sheikh; Eero P Simoncelli
Journal:  IEEE Trans Image Process       Date:  2004-04       Impact factor: 10.856

2.  Optical multiple-image encryption in diffractive-imaging-based scheme using spectral fusion and nonlinear operation.

Authors:  Yi Qin; Qiong Gong; Zhipeng Wang; Hongjuan Wang
Journal:  Opt Express       Date:  2016-11-14       Impact factor: 3.894

3.  Double color image encryption using iterative phase retrieval algorithm in quaternion gyrator domain.

Authors:  Zhuhong Shao; Huazhong Shu; Jiasong Wu; Zhifang Dong; Gouenou Coatrieux; Jean Louis Coatrieux
Journal:  Opt Express       Date:  2014-03-10       Impact factor: 3.894

  3 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.