Please wait a minute...
Chin. Phys. B, 2021, Vol. 30(11): 110501    DOI: 10.1088/1674-1056/abfa01
GENERAL Prev   Next  

A secure image protection algorithm by steganography and encryption using the 2D-TSCC

Qi Li(李琦)1, Xingyuan Wang(王兴元)1,2,†, He Wang(王赫)3, Xiaolin Ye(叶晓林)1, Shuang Zhou(周双)4, Suo Gao(高锁)1, and Yunqing Shi(施云庆)5
1 School of Information Science and Technology, Dalian Maritime University, Dalian 116026, China;
2 Guangxi Key Laboratory of Multi-source Information Mining & Security, Guangxi Normal University, Guilin 541004, China;
3 Dalian Hongwen Middle School, Dalian 116000, China;
4 School of Mathematical Sciences, Chongqing Normal University, Chongqing 401331, China;
5 Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark NJ 07102, USA
Abstract  Based on the two-dimensional (2D) tan-sin-cos-coupling (2D-TSCC), a new image protection method is designed, this method includes steganography and encryption. First, a 2D-TSCC system is designed. The 2D-TSCC has a large parameter space in a hyperchaotic state. The chaotic trajectory fills the entire window. The chaotic sequence generated by the 2D-TSCC has a good pseudorandomness, so it can be used in steganography and encryption. Then, the amount of information contained in each bit of the cover image is analyzed, and the three bits which carry the least amount of information are selected. The secret image is hidden in these three bits base on the 2D-TSCC. Finally, the carrier image is scrambled and diffused by the 2D-TSCC. The ciphertext is generated in this way. Send the ciphertext to the recipient through channel transmission, and the recipient obtains the secret image by decrypting twice.
Keywords:  2D-TSCC      steganography      image encryption      mod diffuse      chaos  
Received:  16 February 2021      Revised:  07 April 2021      Accepted manuscript online:  21 April 2021
PACS:  05.45.-a (Nonlinear dynamics and chaos)  
  05.45.Ac (Low-dimensional chaos)  
  05.45.Gg (Control of chaos, applications of chaos)  
  07.05.Pj (Image processing)  
Fund: Project supported by the National Natural Science Foundation of China (Grant No. 61672124), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (Grant No. MMJJ20170203), Liaoning Provincial Science and Technology Innovation Leading Talents Program Project, China (Grant No. XLYC1802013), Key Research and Development Projects of Liaoning Province, China (Grant No. 2019020105-JH2/103), Jinan City ‘20 Universities’ Funding Projects Introducing Innovation Team Program (Grant No. 2019GXRC031), Research Fund of Guangxi Key Laboratory of Multi-source Information Mining & Security (Grant No. MIMS20-M-02).
Corresponding Authors:  Xingyuan Wang     E-mail:  xywang@dlmu.edu.cn

Cite this article: 

Qi Li(李琦), Xingyuan Wang(王兴元), He Wang(王赫), Xiaolin Ye(叶晓林), Shuang Zhou(周双), Suo Gao(高锁), and Yunqing Shi(施云庆) A secure image protection algorithm by steganography and encryption using the 2D-TSCC 2021 Chin. Phys. B 30 110501

[1] Xian Y J and Wang X Y 2021 Inf. Sci. 547 1154
[2] Chen J J, Yan D W, Duan S K and Wang L D 2020 Chin. Phys. B 29 110504
[3] Wang X Y and Gao S 2019 J. Frankl. Inst.-Eng. Appl. Math. 356 11638
[4] Ye G D, Huang X L, Zhang L Y and Wang Z X 2017 Chin. Phys. B 26 010501
[5] Hua Z Y, Zhu Z H, Yi S, Zhang Z and Huang H J 2021 Inf. Sci. 546 1063
[6] Chai X L, Gan Z H, Lu Y, Zhang M H and Chen Y R 2016 Chin. Phys. B 25 100503
[7] Zhang H, Wang X Q, Sun Y J and Wang X Y 2020 Signal Process.-Image Commun. 84 115829
[8] Chai X L, Gan Z H, Yuan K, Lu Y and Chen Y R 2017 Chin. Phys. B 26 020504
[9] Ye X L, Wang X Y, Gao S, Mou J, Wang Z S and Yang F F 2020 Nonlinear Dyn. 99 1489
[10] Wang X Y, Gao S, Ye X L, Zhou S and Wang M X 2021 Int. J. Bifurc. Chaos 31 2150003
[11] Zhou S, Wang X Y, Wang M X and Zhang Y Q 2020 Chaos, Solitons and Fractals 141 110225
[12] Xia Z Q, Wang X Y, Zhou W J, Li R, Wang C P and Zhang C 2019 Signal Process. 157 108
[13] Li Q, Wang X Y, Wang X Y, Ma B, Wang C P, Xian Y J and Shi Y Q 2020 IEEE Access 8 168166
[14] Wang C P, Wang X Y, Xia Z Q and Zhang C 2019 Inf. Sci. 470 109
[15] Wang C P, Wang X Y, Xia Z Q, Ma B and Shi Y Q 2019 IEEE Trans. Circuits Syst. Video Technol. 30 4440
[16] Ma B and Shi Y Q 2016 IEEE Trans. Inf. Forensic Secur. 11 1914
[17] Li Q, Wang X Y, Wang X Y, Ma B, Wang C P and Shi Y Q 2020 Inf. Sci. 553 19
[18] Wang Y P, Liu S T and Li H 2020 Nonlinear Dyn. 102 579
[19] Liu S T and Wang P 2018 Fractal Control Theory (Singapore: Springer) p. 3
[20] Liu S T, Zhang Y P and Liu C A 2020 Fractal Control and Its Applications (Singapore: Springer) p. 235
[21] Tsafack N, Kengne J, Abd-El-Atty B, Iliyasu A M, Hirota K and Abd El-Latif A A 2020 Inf. Sci. 515 191
[22] Yu S S, Zhou N R, Gong L H and Nie Z 2020 Opt. Lasers Eng. 124 105816
[23] Zhou M J and Wang C H 2020 Signal Process. 171 107484
[24] Ye X L, Wang X Y, Gao S, Mou J and Wang Z S 2020 Opt. Lasers Eng. 127 105905
[25] Liu H J, Kadir A and Liu J 2019 Opt. Lasers Eng. 122 123
[26] Hua Z Y, Jin F, Xu B X and Huang H J 2018 Signal Process. 149 148
[27] Parvaz R and Zarebnia M 2018 Opt. Laser Technol. 101 30
[28] Zhu C X and Sun K H 2018 IEEE Access 6 18759
[29] Ullah A, Jamal S S and Shah T 2018 Nonlinear Dyn. 91 359
[30] Wang X Y and Gao S 2020 Inf. Sci. 507 16
[31] Wang X Y and Gao S 2020 Inf. Sci. 539 195
[32] Baluja S 2019 IEEE Trans. Pattern Anal. Mach. Intell. 42 1685
[33] Xie X Z, Chang C C and Lin C C 2019 IEEE Access 8 37
[34] Ma B, Li B, Wang X Y, Wang C P, Li J and Shi Y Q 2019 Secur. Commun. Netw. 4732632
[35] Zhang Y Q and Wang X Y 2014 Inf. Sci. 273 329
[36] Liu Z Y, Xia T C and Wang J B 2018 Chin. Phys. B 27 030502
[37] Jia Q 2007 Phys. Lett. A 366 217
[38] Wu Y, Yang G L, Jin H X and Noonan J P 2012 J. Electron. Imaging 21 013014
[39] Hua Z Y, Zhou Y C, Pun C M and Chen C L P 2015 Inf. Sci. 297 80
[40] Gallas J A C 1993 Phys. Rev. Lett. 70 2714
[41] Zhou S, Wang X Y, Wang Z and Zhang C 2019 Chaos 29 033125
[42] Zhou S and Wang X Y 2018 Chaos 28 123118
[43] Zhou S and Wang X Y 2021 Physica A 563 125478
[44] Wang X Y and Zhang H L 2015 Opt. Commun. 342 51
[45] Wang X Y, Gao S, Yu L J, Sun Y M and Sun H H 2019 IEEE Access 7 103662
[46] Wang X Y, Feng L and Zhao H Y 2019 Inf. Sci. 486 340
[47] Abd-El-Atty B, Abd El-Latif A A and Venegas-Andraca S E 2019 Quantum Inf. Process. 18 272
[48] Alawida M, Samsudin A, Sen Teh J and Alkhawaldeh R S 2019 Signal Process. 160 45
[49] Chen C, Sun K H and He S B 2020 Signal Process. 168 107340
[50] Nardo L G, Nepomuceno E G, Arias-Garcia J and Butusov D N 2019 Chaos, Solitons and Fractals 123 69
[1] An incommensurate fractional discrete macroeconomic system: Bifurcation, chaos, and complexity
Abderrahmane Abbes, Adel Ouannas, and Nabil Shawagfeh. Chin. Phys. B, 2023, 32(3): 030203.
[2] A color image encryption algorithm based on hyperchaotic map and DNA mutation
Xinyu Gao(高昕瑜), Bo Sun(孙博), Yinghong Cao(曹颖鸿), Santo Banerjee, and Jun Mou(牟俊). Chin. Phys. B, 2023, 32(3): 030501.
[3] Asymmetric image encryption algorithm based ona new three-dimensional improved logistic chaotic map
Guo-Dong Ye(叶国栋), Hui-Shan Wu(吴惠山), Xiao-Ling Huang(黄小玲), and Syh-Yuan Tan. Chin. Phys. B, 2023, 32(3): 030504.
[4] Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing
Xing-Yuan Wang(王兴元), Xiao-Li Wang(王哓丽), Lin Teng(滕琳), Dong-Hua Jiang(蒋东华), and Yongjin Xian(咸永锦). Chin. Phys. B, 2023, 32(2): 020503.
[5] Memristor hyperchaos in a generalized Kolmogorov-type system with extreme multistability
Xiaodong Jiao(焦晓东), Mingfeng Yuan(袁明峰), Jin Tao(陶金), Hao Sun(孙昊), Qinglin Sun(孙青林), and Zengqiang Chen(陈增强). Chin. Phys. B, 2023, 32(1): 010507.
[6] A novel algorithm to analyze the dynamics of digital chaotic maps in finite-precision domain
Chunlei Fan(范春雷) and Qun Ding(丁群). Chin. Phys. B, 2023, 32(1): 010501.
[7] Synchronously scrambled diffuse image encryption method based on a new cosine chaotic map
Xiaopeng Yan(闫晓鹏), Xingyuan Wang(王兴元), and Yongjin Xian(咸永锦). Chin. Phys. B, 2022, 31(8): 080504.
[8] Exponential sine chaotification model for enhancing chaos and its hardware implementation
Rui Wang(王蕊), Meng-Yang Li(李孟洋), and Hai-Jun Luo(罗海军). Chin. Phys. B, 2022, 31(8): 080508.
[9] Multi-target ranging using an optical reservoir computing approach in the laterally coupled semiconductor lasers with self-feedback
Dong-Zhou Zhong(钟东洲), Zhe Xu(徐喆), Ya-Lan Hu(胡亚兰), Ke-Ke Zhao(赵可可), Jin-Bo Zhang(张金波),Peng Hou(侯鹏), Wan-An Deng(邓万安), and Jiang-Tao Xi(习江涛). Chin. Phys. B, 2022, 31(7): 074205.
[10] Neural-mechanism-driven image block encryption algorithm incorporating a hyperchaotic system and cloud model
Peng-Fei Fang(方鹏飞), Han Liu(刘涵), Cheng-Mao Wu(吴成茂), and Min Liu(刘旻). Chin. Phys. B, 2022, 31(4): 040501.
[11] Bifurcation and dynamics in double-delayed Chua circuits with periodic perturbation
Wenjie Yang(杨文杰). Chin. Phys. B, 2022, 31(2): 020201.
[12] FPGA implementation and image encryption application of a new PRNG based on a memristive Hopfield neural network with a special activation gradient
Fei Yu(余飞), Zinan Zhang(张梓楠), Hui Shen(沈辉), Yuanyuan Huang(黄园媛), Shuo Cai(蔡烁), and Sichun Du(杜四春). Chin. Phys. B, 2022, 31(2): 020505.
[13] Complex dynamic behaviors in hyperbolic-type memristor-based cellular neural network
Ai-Xue Qi(齐爱学), Bin-Da Zhu(朱斌达), and Guang-Yi Wang(王光义). Chin. Phys. B, 2022, 31(2): 020502.
[14] Energy spreading, equipartition, and chaos in lattices with non-central forces
Arnold Ngapasare, Georgios Theocharis, Olivier Richoux, Vassos Achilleos, and Charalampos Skokos. Chin. Phys. B, 2022, 31(2): 020506.
[15] Resonance and antiresonance characteristics in linearly delayed Maryland model
Hsinchen Yu(于心澄), Dong Bai(柏栋), Peishan He(何佩珊), Xiaoping Zhang(张小平), Zhongzhou Ren(任中洲), and Qiang Zheng(郑强). Chin. Phys. B, 2022, 31(12): 120502.
No Suggested Reading articles found!