|
|
A secure image protection algorithm by steganography and encryption using the 2D-TSCC |
Qi Li(李琦)1, Xingyuan Wang(王兴元)1,2,†, He Wang(王赫)3, Xiaolin Ye(叶晓林)1, Shuang Zhou(周双)4, Suo Gao(高锁)1, and Yunqing Shi(施云庆)5 |
1 School of Information Science and Technology, Dalian Maritime University, Dalian 116026, China; 2 Guangxi Key Laboratory of Multi-source Information Mining & Security, Guangxi Normal University, Guilin 541004, China; 3 Dalian Hongwen Middle School, Dalian 116000, China; 4 School of Mathematical Sciences, Chongqing Normal University, Chongqing 401331, China; 5 Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark NJ 07102, USA |
|
|
Abstract Based on the two-dimensional (2D) tan-sin-cos-coupling (2D-TSCC), a new image protection method is designed, this method includes steganography and encryption. First, a 2D-TSCC system is designed. The 2D-TSCC has a large parameter space in a hyperchaotic state. The chaotic trajectory fills the entire window. The chaotic sequence generated by the 2D-TSCC has a good pseudorandomness, so it can be used in steganography and encryption. Then, the amount of information contained in each bit of the cover image is analyzed, and the three bits which carry the least amount of information are selected. The secret image is hidden in these three bits base on the 2D-TSCC. Finally, the carrier image is scrambled and diffused by the 2D-TSCC. The ciphertext is generated in this way. Send the ciphertext to the recipient through channel transmission, and the recipient obtains the secret image by decrypting twice.
|
Received: 16 February 2021
Revised: 07 April 2021
Accepted manuscript online: 21 April 2021
|
PACS:
|
05.45.-a
|
(Nonlinear dynamics and chaos)
|
|
05.45.Ac
|
(Low-dimensional chaos)
|
|
05.45.Gg
|
(Control of chaos, applications of chaos)
|
|
07.05.Pj
|
(Image processing)
|
|
Fund: Project supported by the National Natural Science Foundation of China (Grant No. 61672124), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (Grant No. MMJJ20170203), Liaoning Provincial Science and Technology Innovation Leading Talents Program Project, China (Grant No. XLYC1802013), Key Research and Development Projects of Liaoning Province, China (Grant No. 2019020105-JH2/103), Jinan City ‘20 Universities’ Funding Projects Introducing Innovation Team Program (Grant No. 2019GXRC031), Research Fund of Guangxi Key Laboratory of Multi-source Information Mining & Security (Grant No. MIMS20-M-02). |
Corresponding Authors:
Xingyuan Wang
E-mail: xywang@dlmu.edu.cn
|
Cite this article:
Qi Li(李琦), Xingyuan Wang(王兴元), He Wang(王赫), Xiaolin Ye(叶晓林), Shuang Zhou(周双), Suo Gao(高锁), and Yunqing Shi(施云庆) A secure image protection algorithm by steganography and encryption using the 2D-TSCC 2021 Chin. Phys. B 30 110501
|
[1] Xian Y J and Wang X Y 2021 Inf. Sci. 547 1154 [2] Chen J J, Yan D W, Duan S K and Wang L D 2020 Chin. Phys. B 29 110504 [3] Wang X Y and Gao S 2019 J. Frankl. Inst.-Eng. Appl. Math. 356 11638 [4] Ye G D, Huang X L, Zhang L Y and Wang Z X 2017 Chin. Phys. B 26 010501 [5] Hua Z Y, Zhu Z H, Yi S, Zhang Z and Huang H J 2021 Inf. Sci. 546 1063 [6] Chai X L, Gan Z H, Lu Y, Zhang M H and Chen Y R 2016 Chin. Phys. B 25 100503 [7] Zhang H, Wang X Q, Sun Y J and Wang X Y 2020 Signal Process.-Image Commun. 84 115829 [8] Chai X L, Gan Z H, Yuan K, Lu Y and Chen Y R 2017 Chin. Phys. B 26 020504 [9] Ye X L, Wang X Y, Gao S, Mou J, Wang Z S and Yang F F 2020 Nonlinear Dyn. 99 1489 [10] Wang X Y, Gao S, Ye X L, Zhou S and Wang M X 2021 Int. J. Bifurc. Chaos 31 2150003 [11] Zhou S, Wang X Y, Wang M X and Zhang Y Q 2020 Chaos, Solitons and Fractals 141 110225 [12] Xia Z Q, Wang X Y, Zhou W J, Li R, Wang C P and Zhang C 2019 Signal Process. 157 108 [13] Li Q, Wang X Y, Wang X Y, Ma B, Wang C P, Xian Y J and Shi Y Q 2020 IEEE Access 8 168166 [14] Wang C P, Wang X Y, Xia Z Q and Zhang C 2019 Inf. Sci. 470 109 [15] Wang C P, Wang X Y, Xia Z Q, Ma B and Shi Y Q 2019 IEEE Trans. Circuits Syst. Video Technol. 30 4440 [16] Ma B and Shi Y Q 2016 IEEE Trans. Inf. Forensic Secur. 11 1914 [17] Li Q, Wang X Y, Wang X Y, Ma B, Wang C P and Shi Y Q 2020 Inf. Sci. 553 19 [18] Wang Y P, Liu S T and Li H 2020 Nonlinear Dyn. 102 579 [19] Liu S T and Wang P 2018 Fractal Control Theory (Singapore: Springer) p. 3 [20] Liu S T, Zhang Y P and Liu C A 2020 Fractal Control and Its Applications (Singapore: Springer) p. 235 [21] Tsafack N, Kengne J, Abd-El-Atty B, Iliyasu A M, Hirota K and Abd El-Latif A A 2020 Inf. Sci. 515 191 [22] Yu S S, Zhou N R, Gong L H and Nie Z 2020 Opt. Lasers Eng. 124 105816 [23] Zhou M J and Wang C H 2020 Signal Process. 171 107484 [24] Ye X L, Wang X Y, Gao S, Mou J and Wang Z S 2020 Opt. Lasers Eng. 127 105905 [25] Liu H J, Kadir A and Liu J 2019 Opt. Lasers Eng. 122 123 [26] Hua Z Y, Jin F, Xu B X and Huang H J 2018 Signal Process. 149 148 [27] Parvaz R and Zarebnia M 2018 Opt. Laser Technol. 101 30 [28] Zhu C X and Sun K H 2018 IEEE Access 6 18759 [29] Ullah A, Jamal S S and Shah T 2018 Nonlinear Dyn. 91 359 [30] Wang X Y and Gao S 2020 Inf. Sci. 507 16 [31] Wang X Y and Gao S 2020 Inf. Sci. 539 195 [32] Baluja S 2019 IEEE Trans. Pattern Anal. Mach. Intell. 42 1685 [33] Xie X Z, Chang C C and Lin C C 2019 IEEE Access 8 37 [34] Ma B, Li B, Wang X Y, Wang C P, Li J and Shi Y Q 2019 Secur. Commun. Netw. 4732632 [35] Zhang Y Q and Wang X Y 2014 Inf. Sci. 273 329 [36] Liu Z Y, Xia T C and Wang J B 2018 Chin. Phys. B 27 030502 [37] Jia Q 2007 Phys. Lett. A 366 217 [38] Wu Y, Yang G L, Jin H X and Noonan J P 2012 J. Electron. Imaging 21 013014 [39] Hua Z Y, Zhou Y C, Pun C M and Chen C L P 2015 Inf. Sci. 297 80 [40] Gallas J A C 1993 Phys. Rev. Lett. 70 2714 [41] Zhou S, Wang X Y, Wang Z and Zhang C 2019 Chaos 29 033125 [42] Zhou S and Wang X Y 2018 Chaos 28 123118 [43] Zhou S and Wang X Y 2021 Physica A 563 125478 [44] Wang X Y and Zhang H L 2015 Opt. Commun. 342 51 [45] Wang X Y, Gao S, Yu L J, Sun Y M and Sun H H 2019 IEEE Access 7 103662 [46] Wang X Y, Feng L and Zhao H Y 2019 Inf. Sci. 486 340 [47] Abd-El-Atty B, Abd El-Latif A A and Venegas-Andraca S E 2019 Quantum Inf. Process. 18 272 [48] Alawida M, Samsudin A, Sen Teh J and Alkhawaldeh R S 2019 Signal Process. 160 45 [49] Chen C, Sun K H and He S B 2020 Signal Process. 168 107340 [50] Nardo L G, Nepomuceno E G, Arias-Garcia J and Butusov D N 2019 Chaos, Solitons and Fractals 123 69 |
No Suggested Reading articles found! |
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
Altmetric
|
blogs
Facebook pages
Wikipedia page
Google+ users
|
Online attention
Altmetric calculates a score based on the online attention an article receives. Each coloured thread in the circle represents a different type of online attention. The number in the centre is the Altmetric score. Social media and mainstream news media are the main sources that calculate the score. Reference managers such as Mendeley are also tracked but do not contribute to the score. Older articles often score higher because they have had more time to get noticed. To account for this, Altmetric has included the context data for other articles of a similar age.
View more on Altmetrics
|
|
|