Abstract

In this paper, a three-dimensional chaotic system is proposed. Based on this chaotic system and two-dimensional compressive sensing, an asymmetric visually meaningful image compression-hiding algorithm is presented. Firstly, in the keystream generation stage, a novel parameter transformation model is constructed to pick up the feature information from the plain image as the plaintext key. Then, Rivest-Shamir-Adleman algorithm is employed to encrypt the plaintext key into the ciphertext key seen as public key. Before generating the initial values for the chaotic system, a new initial value getting model is designed to transform both the plaintext and the ciphertext keys. After solving the chaotic system, the keystream is produced which is then used in the image encryption process. Secondly, in the compression and encryption phase, a novel keystream pre-processing model is built to generate new sequences with a confusion performed on the plain image. Then, a newly constructed measurement matrix is designed to do two-dimensional compressive sensing on confusing the image to get measurements. Before obtaining the cipher image, a double diffusion operation is applied on these measurements. Thirdly, in the image hiding stage, the carrier image is performed by integer wavelet transformation to obtain coefficient matrices. Then, the cipher image is decomposed in decimal, getting the ones, tens and hundreds of pixels to form three bit matrices, of which are embedded into the three medium-high coefficient matrices of integer wavelet transformation, respectively. Finally, after performing inverse integer wavelet transformation, the carrier image containing secrets, i.e., visually meaningful encrypted image, is obtained. Experimental results also show that at a low compression ratio of 0.25, the normalized correlation coefficient between the original plain image and the recovered image is almost equal to one, while the peak signal-to-noise ratio between the carrier image containing secrets and its original carrier can reach as high as 42 dB. In addition, the proposed image compression-hiding algorithm performs good ability consideing the brute force attack and the cropping attack.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.