Improved fractal coding and hyperchaotic system for lossless image compression and encryption

被引:0
|
作者
Long, Bofeng [1 ,2 ]
Chen, Zhong [1 ,2 ]
Liu, Tongzhe [1 ,2 ]
Wu, Ximei [1 ,2 ]
He, Chenchen [3 ]
Wang, Lujie [1 ,2 ]
Cao, Can [4 ]
机构
[1] Hengyang Normal Univ, Coll Comp Sci & Technol, Hengyang 421002, Peoples R China
[2] Hunan Prov Key Lab Intelligent Informat Proc & App, Hengyang 421002, Peoples R China
[3] Huaihua Univ, Sch Comp & Artificial Intelligence, Sch Software, Huaihua 418000, Peoples R China
[4] Hengyang Normal Univ, Coll Math & Stat, Hengyang 421002, Peoples R China
关键词
Hyperchaotic system; Fractal coding; Image encryption; Lossless compression; Tetris; ALGORITHM; SECURITY; ENTROPY;
D O I
10.1007/s11071-024-10671-2
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In response to the growing demand for computation and storage, and increasing vulnerabilities to attacks, maintaining image security and integrity remains a critical challenge. This paper introduces a novel, lossless image compression algorithm integrating improved fractal coding and a robust encryption method based on a new hyperchaotic system, irregular block permutation, and non-adjacent diffusion. The proposed 4D hyperchaotic system exhibits a wider chaotic range and more complex dynamics than existing systems, generating high-quality pseudo-random sequences for enhanced encryption security. Additionally, a lossless multi-directional delta encoding and segment run-length encoding method, utilizing variable-grid fractal coding, are developed to optimize data compression and preserve information integrity. Furthermore, a Tetris-based permutation and 2D nonlinear diffusion technique is proposed, using irregular patterns and non-adjacent double diffusion to resist various attacks. Experiments show that compared with other compression and encryption algorithms, the proposed algorithm has a higher compression ratio, strong sensitivity to key or plaintext, and can resist various attacks, such as brute-force attacks, statistical attacks and differentiable attacks.
引用
收藏
页码:12233 / 12262
页数:30
相关论文
共 50 条
  • [41] Research on image encryption based on hyperchaotic system
    Huang, Xin
    Nia, Matin Pirouz
    Ding, Qun
    Journal of Network Intelligence, 2020, 5 (01): : 10 - 22
  • [42] An Image Encryption Model Based on Hyperchaotic System
    Hu, Xiaoyu
    Shen, Tianshi
    Ni, Junkang
    Liu, Chongxin
    Liu, Kai
    Zhang, Zece
    PROCEEDINGS OF THE 2016 IEEE 11TH CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2016, : 539 - 544
  • [43] Image Encryption Algorithm Based on Hyperchaotic System
    Lin Jinqiu
    Si Xica
    2009 INTERNATIONAL WORKSHOP ON CHAOS-FRACTALS THEORIES AND APPLICATIONS (IWCFTA 2009), 2009, : 153 - 156
  • [44] An improved SPIHT algorithm for lossless image coding
    Brahimi, Tahar
    Melit, Ali
    Khelifi, Fouad
    DIGITAL SIGNAL PROCESSING, 2009, 19 (02) : 220 - 228
  • [45] Color image encryption algorithm based on hyperchaotic system and improved quantum revolving gate
    Wang, Xingyuan
    Su, Yining
    Luo, Chao
    Nian, Fuzhong
    Teng, Lin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (10) : 13845 - 13865
  • [46] A New Conservative Hyperchaotic System-Based Image Symmetric Encryption Scheme with DNA Coding
    Lu, Qing
    Yu, Linlan
    Zhu, Congxu
    SYMMETRY-BASEL, 2021, 13 (12):
  • [47] Facial image encryption scheme based on improved 4-D hyperchaotic system
    Zhang, Xuncai
    Liu, Mengrui
    Niu, Ying
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (03):
  • [48] Color image encryption algorithm based on hyperchaotic system and improved quantum revolving gate
    Xingyuan Wang
    Yining Su
    Chao Luo
    Fuzhong Nian
    Lin Teng
    Multimedia Tools and Applications, 2022, 81 : 13845 - 13865
  • [49] An improved wavelet image lossless compression algorithm
    Li, Jia
    OPTIK, 2013, 124 (11): : 1041 - 1044
  • [50] Implementation of Multiwavelet Transform Coding for Lossless Image Compression
    Rajakumar, K.
    Arivoli, T.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 634 - 637