Abstract

For efficiency and security of image transmission and storage, the joint image compression and encryption method that performs compression and encryption in a single step is a promising solution due to better security. Moreover, on some important occasions, it is necessary to save images in high quality by lossless compression. Thus, a joint lossless image compression and encryption scheme based on a context-based adaptive lossless image codec (CALIC) and hyperchaotic system is proposed to achieve lossless image encryption and compression simultaneously. Making use of the characteristics of CALIC, four encryption locations are designed to realize joint image compression and encryption: encryption for the predicted values of pixels based on gradient-adjusted prediction (GAP), encryption for the final prediction error, encryption for two lines of pixel values needed by prediction mode and encryption for the entropy coding file. Moreover, a new four-dimensional hyperchaotic system and plaintext-related encryption based on table lookup are all used to enhance the security. The security tests show information entropy, correlation and key sensitivity of the proposed methods reach 7.997, 0.01 and 0.4998, respectively. This indicates that the proposed methods have good security. Meanwhile, compared to original CALIC without security, the proposed methods increase the security and reduce the compression ratio by only 6.3%. The test results indicate that the proposed methods have high security and good lossless compression performance.

Highlights

  • With the development of network technology, more and more image files are accessed and shared over the network

  • Zhang et al [11] proposed several image encryption schemes for popular image formats based on chaotic maps

  • Through the analysis of the context-based adaptive lossless image codec (CALIC), we find the possible encryption locations and carry out a feasibility analysis

Read more

Summary

Introduction

With the development of network technology, more and more image files are accessed and shared over the network. Due to the good cryptography properties of chaos, chaos-based image encryption methods have been proposed [1,2,3,4,5,6,7,8,9,10,11]. Masood et al [10] used three-dimensional Lorenz chaotic maps for diffusion processes. Zhang et al [11] proposed several image encryption schemes for popular image formats based on chaotic maps. The chaotic map is a low-dimensional chaotic system, and the key space is limited. Tong et al [14,15] proposed a new four-dimensional hyperchaotic system to achieve image encryption. Due to the failed design of the encryption process, some of these methods are insecure [17,18]

Objectives
Methods
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call