中国物理B ›› 2021, Vol. 30 ›› Issue (11): 110501-110501.doi: 10.1088/1674-1056/abfa01

• • 上一篇    下一篇

A secure image protection algorithm by steganography and encryption using the 2D-TSCC

Qi Li(李琦)1, Xingyuan Wang(王兴元)1,2,†, He Wang(王赫)3, Xiaolin Ye(叶晓林)1, Shuang Zhou(周双)4, Suo Gao(高锁)1, and Yunqing Shi(施云庆)5   

  1. 1 School of Information Science and Technology, Dalian Maritime University, Dalian 116026, China;
    2 Guangxi Key Laboratory of Multi-source Information Mining & Security, Guangxi Normal University, Guilin 541004, China;
    3 Dalian Hongwen Middle School, Dalian 116000, China;
    4 School of Mathematical Sciences, Chongqing Normal University, Chongqing 401331, China;
    5 Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark NJ 07102, USA
  • 收稿日期:2021-02-16 修回日期:2021-04-07 接受日期:2021-04-21 出版日期:2021-10-13 发布日期:2021-11-03
  • 通讯作者: Xingyuan Wang E-mail:xywang@dlmu.edu.cn
  • 基金资助:
    Project supported by the National Natural Science Foundation of China (Grant No. 61672124), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (Grant No. MMJJ20170203), Liaoning Provincial Science and Technology Innovation Leading Talents Program Project, China (Grant No. XLYC1802013), Key Research and Development Projects of Liaoning Province, China (Grant No. 2019020105-JH2/103), Jinan City ‘20 Universities’ Funding Projects Introducing Innovation Team Program (Grant No. 2019GXRC031), Research Fund of Guangxi Key Laboratory of Multi-source Information Mining & Security (Grant No. MIMS20-M-02).

A secure image protection algorithm by steganography and encryption using the 2D-TSCC

Qi Li(李琦)1, Xingyuan Wang(王兴元)1,2,†, He Wang(王赫)3, Xiaolin Ye(叶晓林)1, Shuang Zhou(周双)4, Suo Gao(高锁)1, and Yunqing Shi(施云庆)5   

  1. 1 School of Information Science and Technology, Dalian Maritime University, Dalian 116026, China;
    2 Guangxi Key Laboratory of Multi-source Information Mining & Security, Guangxi Normal University, Guilin 541004, China;
    3 Dalian Hongwen Middle School, Dalian 116000, China;
    4 School of Mathematical Sciences, Chongqing Normal University, Chongqing 401331, China;
    5 Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark NJ 07102, USA
  • Received:2021-02-16 Revised:2021-04-07 Accepted:2021-04-21 Online:2021-10-13 Published:2021-11-03
  • Contact: Xingyuan Wang E-mail:xywang@dlmu.edu.cn
  • Supported by:
    Project supported by the National Natural Science Foundation of China (Grant No. 61672124), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (Grant No. MMJJ20170203), Liaoning Provincial Science and Technology Innovation Leading Talents Program Project, China (Grant No. XLYC1802013), Key Research and Development Projects of Liaoning Province, China (Grant No. 2019020105-JH2/103), Jinan City ‘20 Universities’ Funding Projects Introducing Innovation Team Program (Grant No. 2019GXRC031), Research Fund of Guangxi Key Laboratory of Multi-source Information Mining & Security (Grant No. MIMS20-M-02).

摘要: Based on the two-dimensional (2D) tan-sin-cos-coupling (2D-TSCC), a new image protection method is designed, this method includes steganography and encryption. First, a 2D-TSCC system is designed. The 2D-TSCC has a large parameter space in a hyperchaotic state. The chaotic trajectory fills the entire window. The chaotic sequence generated by the 2D-TSCC has a good pseudorandomness, so it can be used in steganography and encryption. Then, the amount of information contained in each bit of the cover image is analyzed, and the three bits which carry the least amount of information are selected. The secret image is hidden in these three bits base on the 2D-TSCC. Finally, the carrier image is scrambled and diffused by the 2D-TSCC. The ciphertext is generated in this way. Send the ciphertext to the recipient through channel transmission, and the recipient obtains the secret image by decrypting twice.

关键词: 2D-TSCC, steganography, image encryption, mod diffuse, chaos

Abstract: Based on the two-dimensional (2D) tan-sin-cos-coupling (2D-TSCC), a new image protection method is designed, this method includes steganography and encryption. First, a 2D-TSCC system is designed. The 2D-TSCC has a large parameter space in a hyperchaotic state. The chaotic trajectory fills the entire window. The chaotic sequence generated by the 2D-TSCC has a good pseudorandomness, so it can be used in steganography and encryption. Then, the amount of information contained in each bit of the cover image is analyzed, and the three bits which carry the least amount of information are selected. The secret image is hidden in these three bits base on the 2D-TSCC. Finally, the carrier image is scrambled and diffused by the 2D-TSCC. The ciphertext is generated in this way. Send the ciphertext to the recipient through channel transmission, and the recipient obtains the secret image by decrypting twice.

Key words: 2D-TSCC, steganography, image encryption, mod diffuse, chaos

中图分类号:  (Nonlinear dynamics and chaos)

  • 05.45.-a
05.45.Ac (Low-dimensional chaos) 05.45.Gg (Control of chaos, applications of chaos) 07.05.Pj (Image processing)