4.6 Article

A compression-diffusion-permutation strategy for securing image

Journal

SIGNAL PROCESSING
Volume 150, Issue -, Pages 183-190

Publisher

ELSEVIER SCIENCE BV
DOI: 10.1016/j.sigpro.2018.04.014

Keywords

Image encryption; Compressive sensing; Diffusion; Permutation

Funding

  1. Fundamental Research Funds for the Central Universities [XDJK20178046]
  2. Chongqing Education Commission Science and Technology Project [KJ1601401]
  3. Natural Science Foundation of Jiangxi Province [20171BAB202015]
  4. Research Foundation of the Education Department of Jiangxi Province [GJJ170322]
  5. National Natural Science Foundation of China [61502399, 61462032, 61572089, 61773320]

Ask authors/readers for more resources

In the background of big data, it is of great significance to protect image data's confidentiality. In this paper, a compression-diffusion-permutation strategy for securing big image data is proposed. Firstly, an image is compressed by use of compressive sensing technique, in which the Hadamard matrix used as the measurement matrix is constructed through iterating two-dimensional Sine-Logistic modulation map(2D-SLMM) instead of using the entire Gaussian matrix as a key. Thus, only the utilization of a few keys in the 2D-SLMM avoids the transmission of the Gaussian matrix. Secondly, XOR is used to further diffuse the compressed image to enhance the security. Thirdly, an index sequence produced by 2D-SLMM with initial values is utilized to rearrange the positions of the diffused image. Experimental results indicate that the proposed algorithm makes some potential attacks impracticable, such as known plaintext attack and chosen ciphertext attack. Security analysis demonstrates the effectiveness and the security of the proposed algorithm. (C) 2018 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available