An improved visually meaningful encrypted image scheme

被引:34
|
作者
Armijo-Correa, J. O. [1 ]
Murguia, J. S. [2 ]
Mejia-Carlos, M. [3 ]
Arce-Guevara, V. E. [2 ]
Aboytes-Gonzalez, J. A. [3 ]
机构
[1] Univ Autonoma San Luis Potosi, Fac Ciencias, Alvaro Obregon 64, San Luis Potosi 78000, San Luis Potosi, Mexico
[2] Univ Autonoma San Luis Potosi, Fac Ciencias, Lab Nacl CI3M, Alvaro Obregon 64, San Luis Potosi 78000, San Luis Potosi, Mexico
[3] Univ Autonoma San Luis Potosi, Inst Invest Comunicac Opt, Alvaro Obregon 64, San Luis Potosi 78000, San Luis Potosi, Mexico
来源
OPTICS AND LASER TECHNOLOGY | 2020年 / 127卷 / 127期
关键词
Image encryption; Visually meaningful encrypted image; S-box; Integer discrete wavelet transform; WAVELET TRANSFORMS; TIME-SERIES; MAP; ALGORITHM;
D O I
10.1016/j.optlastec.2020.106165
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
An encrypted image generally presents an appearance of texture-like or noise-like image, which exhibits an indication of encrypted data that may motivate a significantly large number of attacks. To address this problem several approaches have been carried out, where an encrypted image is transformed into a visually meaningful encrypted image (VMEI). We present an improved approach to encrypt a plain image into a visually meaningful cover image, where the preprocessing and embedding phases are modified to achieve a quite comparable performance. To make the assessment of this proposal, some standard metrics such as PSNR and SSIM are performed, and the obtained numerical results show that this proposal is comparable or superior to some VMEI schemes used as benchmark in this work. In most of the reference images considered in the dataset the values of PSNR are greater than 40 dB, and a value close to 1 for the SSIM metric, which means a great similarity and high quality, respectively, between the reference images and their obtained VMEI images. Also, the two-dimensional detrended fluctuation analysis is carried out to observe the scaling behavior of the images, which allows us to have a perceptual security parameter of encrypted images and visually meaningful cover images. For this metric, the scaling exponent values of the VMEI images are close to 2.1, which are very similar to the values obtained for the reference images, a situation that confirms that the hidden information may not be detected by the human visual system. Furthermore, for two reference images, this metric was able to detect how the pixel values are distributed, and how the pixel values are highly correlated, suggesting that this metric can be an objective measure of encrypted images.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Optical cryptosystem for visually meaningful encrypted images based on gyrator transform and Henon map
    Abdelfattah, Mohamed G.
    Hegazy, Salem F.
    Areed, Nihal F. F.
    Obayya, Salah S. A.
    OPTICAL AND QUANTUM ELECTRONICS, 2022, 54 (02)
  • [22] Systematic Survey on Visually Meaningful Image Encryption Techniques
    Himthani, Varsha
    Dhaka, Vijaypal Singh
    Kaur, Manjit
    Singh, Dilbag
    Lee, Heung-No
    IEEE ACCESS, 2022, 10 : 98360 - 98373
  • [23] Image salient regions encryption for generating visually meaningful ciphertext image
    Wen, Wenying
    Zhang, Yushu
    Fang, Yuming
    Fang, Zhijun
    NEURAL COMPUTING & APPLICATIONS, 2018, 29 (03): : 653 - 663
  • [24] Image salient regions encryption for generating visually meaningful ciphertext image
    Wenying Wen
    Yushu Zhang
    Yuming Fang
    Zhijun Fang
    Neural Computing and Applications, 2018, 29 : 653 - 663
  • [25] Verifiable visually meaningful image encryption based on compressed sensing (CS) and improved game of life (IGOL)
    Long, Guoqiang
    Zhou, Lin
    Gan, Zhihua
    Chai, Xiuli
    Fu, Zhifeng
    Ma, Yakun
    OPTIK, 2022, 262
  • [26] An Improved Scheme for Range Queries on Encrypted Data
    Xiong, Ye
    Gu, Dawu
    Lu, Haining
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 497 - 503
  • [27] Encrypted Image Search Scheme with Forward Security
    Ge, Yue
    Li, Yu-Xi
    Zhou, Fu-Cai
    Zhang, Xin-Yue
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2021, 42 (08): : 1079 - 1085
  • [28] Image search scheme over encrypted database
    Ye, Jun
    Xu, Zheng
    Ding, Yong
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 251 - 258
  • [29] Optical cryptosystem for visually meaningful encrypted images based on gyrator transform and Hénon map
    Mohamed G. Abdelfattah
    Salem F. Hegazy
    Nihal F. F. Areed
    Salah S. A. Obayya
    Optical and Quantum Electronics, 2022, 54
  • [30] Visually meaningful image encryption algorithm based on digital signature
    Xiaoling Huang
    Youxia Dong
    Guodong Ye
    WunShe Yap
    BokMin Goi
    Digital Communications and Networks, 2023, 9 (01) : 159 - 165