DOI QR코드

DOI QR Code

Non-square colour image scrambling based on two-dimensional Sine-Logistic and Hénon map

  • Zhou, Siqi (College of Computer and Information, Hohai University) ;
  • Xu, Feng (College of Computer and Information, Hohai University) ;
  • Ping, Ping (College of Computer and Information, Hohai University) ;
  • Xie, Zaipeng (College of Computer and Information, Hohai University) ;
  • Lyu, Xin (College of Computer and Information, Hohai University)
  • Received : 2016.11.06
  • Accepted : 2017.08.09
  • Published : 2017.12.31

Abstract

Image scrambling is an important technology in information hiding, where the Arnold transformation is widely used. Several researchers have proposed the application of $H{\acute{e}}non$ map in square image scrambling, and certain improved technologies require scrambling many times to achieve a good effect without resisting chosen-plaintext attack although it can be directly applied to non-square images. This paper presents a non-square image scrambling algorithm, which can resist chosen-plaintext attack based on a chaotic two-dimensional Sine Logistic modulation map and $H{\acute{e}}non$ map (2D-SLHM). Theoretical analysis and experimental results show that the proposed algorithm has advantages in terms of key space, efficiency, scrambling degree, ability of anti-attack and robustness to noise interference.

Keywords

References

  1. W. Ding and D. Qi, "Digital Image Transformation and Information Hiding and Camouflage Techniques," Chinese Journal of Computers, vol. 21, no. 9, pp. 838-843, 1998.
  2. V.I. Arnolʹd and A. Avez, Ergodic problems of classical mechanics, Benjamin, 1968.
  3. W. Ding, W. Yan, and D. Qi, "Digital image scrambling technology based on Arnold transformation," Journal of Computer-Aided Design & Computer Graphics, vol. 13, pp. 339-341, April, 2001.
  4. C. Li, Z. Han and H. Zhang, "The overview on image encryption Technology," Journal of Computer Research and Development, vol. 39, no.10, pp. 1317-1324, 2002.
  5. L. Shao, et al., "The overview on image scrambling," Netinfo security, vol. 4, pp. 22-26, 2009.
  6. L. Wan, X. Sun and X. Lin, "Research on Image Encryption Algorithm Based on Fractal Hilbert Curve Mixed Gray Code," Computer Engineering and Applications, vol. 46, no.34, pp. 184-186, 2010.
  7. W. Ding, W. Yan, and D. Qi, "Digital Image Scrambling and Digital Watermarking Technology Based on Life Game," Journal of North China University of Technology, vol.1, pp. 1-5, 2000.
  8. D. Qi, "Research and application on matrix transformation in Image Information Hiding," Journal of North China University of Technology, vol. 1, pp. 24-28, 1999.
  9. D. Yin, and B. Li, "Using Improved Fibonacci Hash Transform to Increase the Robustness of Meaningful Watermarking Algorithm," Journal of Wuhan Yejin University of Science & Technology, vol. 28, no. 3, pp. 266-269, Mar, 2005.
  10. Y. Zhao and X. Sun, "An Algorithm for Scrambling Non - Square Images," Microcomputer Information, vol. 27, pp. 99-101+106, 2009.
  11. Z. Hua, et al., "2D Sine Logistic modulation map for image encryption," Information Sciences, vol. 297, pp. 80-94, 2015. https://doi.org/10.1016/j.ins.2014.11.018
  12. P. Ping, et al., "An image scrambling algorithm using discrete Henon map," in IEEE International Conference on Information and Automation, 2015.
  13. T. Kong and D. Zhang, "A new Arnold inverse transform algorithm," Journal of Software, vol. 10, pp. 1558-1564, 2004.
  14. C. Qin, et al., "A novel image hashing scheme with perceptual robustness using block truncation coding," Information Sciences, vol. 361-362, pp. 84-99, 2016. https://doi.org/10.1016/j.ins.2016.04.036
  15. Q. Mao, C. Chang and H. Wu, "An Image Encryption Scheme Based on Concatenated Torus Automorphisms," KSII Transactions on Internet and Information Systems, vol. 7, no. 6, pp. 1492-1511, 2013. https://doi.org/10.3837/tiis.2013.06.009
  16. X. Wang, L. Teng and X. Qin, "A novel colour image encryption algorithm based on chaos," Signal Processing, vol. 92, no. 4, pp. 1101-1108, April, 2012. https://doi.org/10.1016/j.sigpro.2011.10.023
  17. C. Li, et al., "Breaking a novel colour image encryption algorithm based on chaos," Nonlinear Dynamics, vol. 70, no.4, pp. 2383-2388, 2012. https://doi.org/10.1007/s11071-012-0626-5
  18. C. Qin, et al., "Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy," Signal Processing, vol. 138, pp. 280-293, 2017. https://doi.org/10.1016/j.sigpro.2017.03.033
  19. L. Bao and Y. Zhou, "Image encryption: Generating visually meaningful encrypted images," Information Sciences, vol. 324, pp. 197-207, 2015. https://doi.org/10.1016/j.ins.2015.06.049
  20. C. Qin and X. Zhang, "Effective reversible data hiding in encrypted image with privacy protection for image content," Journal of Visual Communication and Image Representation, vol. 31, pp. 154-164, 2015. https://doi.org/10.1016/j.jvcir.2015.06.009