Log in

Visual image encryption based on compressed sensing and Cycle-GAN

  • Original article
  • Published:
The Visual Computer Aims and scope Submit manuscript

Abstract

At present, most image encryption schemes directly change plaintext images into ciphertext images without visual significance, and such ciphertext images can be detected by hackers during transmission, and therefore subject to various attacks. To protect the content security and visual safety of images, a learning visual image encryption scheme based on compressed sensing (CS) and cycle generative adversarial network is proposed. First, the secret image is sparse by discrete wavelet transform and compressed by CS. Secondly, the compressed image is permuted and diffused by an improved Henon map to obtain the ciphertext image. Finally, the images are migrated from the ciphertext domain to the plaintext domain by generating an adversarial network to obtain visually meaningful images. We constrain and guide the image generation process by introducing a feature loss function to guarantee the quality of the reconstructed images. Experimental results and security analysis show that the image encryption scheme has sufficient key space, strong key sensitivity, and high reconstruction quality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Data availability

The data that support the findings of this study are available from the corresponding author upon reasonable request.

References

  1. Kesavan, K. K., Kumar, M. R.: Optical color image encryption based on Hartley transform and double random phase encoding system. In: 2011 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 1–3. IEEE (2011)

  2. Kumar, M. R., Linslal, C. L., Pillai, V. M., Krishna, S. S.: Color image encryption and decryption based on jigsaw transform employed at the input plane of a double random phase encoding system. In: International Congress on Ultra Modern Telecommunications and Control Systems, pp. 860–862. IEEE (2010)

  3. Kesavan, K. K., Kumar, M. R.: Optical data security using Hartley transform, pixel scrambling and chaos theory for images. In: 2011 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 1–5. IEEE (2011)

  4. Bezerra, J.I.M., Machado, G., Molter, A., Soares, R.I., Camargo, V.: A novel simultaneous permutation–diffusion image encryption scheme based on a discrete space map. Chaos Solitons Fractals 168, 113160 (2023)

    Article  Google Scholar 

  5. **an, Y., Wang, X., Zhang, Y., Yan, X., Leng, Z.: A novel chaotic image encryption with FSV based global bit-level chaotic permutation. Multimed. Tools Appl. 82(1), 407–426 (2023)

    Article  Google Scholar 

  6. Xu, S., Wang, X., Ye, X.: A new fractional-order chaos system of Hopfield neural network and its application in image encryption. Chaos Solitons Fractals 157, 111889 (2022)

    Article  MathSciNet  MATH  Google Scholar 

  7. Yan, S., Gu, Z., Park, J.H., **e, X.: Synchronization of delayed fuzzy neural networks with probabilistic communication delay and its application to image encryption. IEEE Trans. Fuzzy Syst. 31(3), 930–940 (2022)

    Article  Google Scholar 

  8. Shamsi, Z., Laiphrakpam, D. S.: Securing encrypted image information in audio data. Multimed. Tools Appl. 1–23 (2023)

  9. Bao, L., Zhou, Y.: Image encryption: generating visually meaningful encrypted images. Inf. Sci. 324, 197–207 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  10. Ye, G., Pan, C., Dong, Y., Jiao, K., Huang, X.: A novel multi-image visually meaningful encryption algorithm based on compressive sensing and Schur decomposition. Trans. Emerg. Telecommun. Technol. 32(2), e4071 (2021)

    Article  Google Scholar 

  11. **, P., Yang, X., Zhang, X., Mao, Y., Khalid, H.: Generating visually secure encrypted images by partial block pairing-substitution and semi-tensor product compressed sensing. Digit. Signal Process. 120, 103263 (2022)

    Article  Google Scholar 

  12. Ren, H., Niu, S., Chen, J., Li, M., Yue, Z.: A visually secure image encryption based on the fractional lorenz system and compressive sensing. Fractal Fract. 6(6), 302 (2022)

    Article  Google Scholar 

  13. Wang, C., Zhang, Y.: A novel image encryption algorithm with deep neural network. Signal Process. 196, 108536 (2022)

    Article  Google Scholar 

  14. Shen, H., Li, X., Zhang, L., Tao, D., Zeng, C.: Compressed sensing-based inpainting of aqua moderate resolution imaging spectroradiometer band 6 using adaptive spectrum-weighted sparse Bayesian dictionary learning. IEEE Trans. Geosci. Remote Sens. 52(2), 894–906 (2013)

    Article  Google Scholar 

  15. **uli, C., Zhihua, G., Yiran, C., Yushu, Z.: A visually secure image encryption scheme based on compressive sensing. Signal Process. 134, 35–51 (2017)

    Article  Google Scholar 

  16. Li, X., Jiang, Y., Chen, M., Li, F.: Research on iris image encryption based on deep learning. EURASIP J. Image Video Process. 2018(1), 1–10 (2018)

    Article  Google Scholar 

  17. Bao, Z., Xue, R.: Research on the avalanche effect of image encryption based on the Cycle-GAN. Appl. Opt. 60(18), 5320–5334 (2021)

    Article  Google Scholar 

  18. Panwar, K., Kukreja, S., Singh, A., Singh, K.K.: Towards deep learning for efficient image encryption. Procedia Comput. Sci. 218, 644–650 (2023)

    Article  Google Scholar 

  19. Donoho, D.L.: Compressed sensing. IEEE Trans. Inf. Theory 52, 1289–1306 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  20. Bandeira, A.S., Dobriban, E., Mixon, D.G., Sawin, W.F.: Certifying the restricted isometry property is hard. IEEE Trans. Inf. Theory 59(6), 3448–3450 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  21. Baraniuk, R.G.: Compressive sensing. IEEE Signal Process. Mag. 24, 118–121 (2007)

    Article  Google Scholar 

  22. Krstulovic, S., Gribonval, R.: MPTK: matching pursuit made tractable. In: 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings, Vol. 3, pp. III–III. IEEE (2006)

  23. Donoho, D.L., Tsaig, Y., Drori, I., Starck, J.L.: Sparse solution of underdetermined systems of linear equations by stagewise orthogonal matching pursuit. IEEE Trans. Inf. Theory 58(2), 1094–1121 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  24. Zhang, X., Xu, W., Cui, Y., Lu, L., Lin, J.: On recovery of block sparse signals via block compressive sampling matching pursuit. IEEE Access 7, 175554–175563 (2019)

    Article  Google Scholar 

  25. Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Bengio, Y.: Generative adversarial networks. Commun. ACM 63(11), 139–144 (2020)

    Article  MathSciNet  Google Scholar 

  26. Cao, Y.J., Jia, L.L., Chen, Y.X., Lin, N., Yang, C., Zhang, B., Dai, H.H.: Recent advances of generative adversarial networks in computer vision. IEEE Access 7, 14985–15006 (2018)

    Article  Google Scholar 

  27. Zhu, Y., Zhang, Y., Yang, H., Wang, F.: GANCoder: an automatic natural language-to-programming language translation approach based on GAN. In: Natural Language Processing and Chinese Computing: 8th CCF International Conference, NLPCC 2019, Dunhuang, China, October 9–14, 2019, Proceedings, Part II 8, pp. 529–539. Springer International Publishing (2019)

  28. Zhuang, Q., Gan, S., Zhang, L.: Human-computer interaction based health diagnostics using ResNet34 for tongue image classification. Comput. Methods Programs Biomed. 226, 107096 (2022)

    Article  Google Scholar 

  29. Fang, W., Zhang, F., Sheng, V.S., Ding, Y.: A method for improving CNN-based image recognition using DCGAN. Comput. Mater. Contin. 57(1), 167–178 (2018)

    Google Scholar 

  30. Abdal, R., Qin, Y., Wonka, P.: Image2stylegan: How to embed images into the stylegan latent space? In: Proceedings of the IEEE/CVF International Conference on Computer Vision, pp. 4432–4441 (2019)

  31. Zhang, H., Xu, T., Li, H., Zhang, S., Wang, X., Huang, X., Metaxas, D. N.: Stackgan: text to photo-realistic image synthesis with stacked generative adversarial networks. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 5907–5915 (2017)

  32. Zhang, Y., Liu, S., Dong, C., Zhang, X., Yuan, Y.: Multiple cycle-in-cycle generative adversarial networks for unsupervised image super-resolution. IEEE Trans. Image Process. 29, 1101–1112 (2019)

    Article  MathSciNet  MATH  Google Scholar 

  33. Ding, Y., Wu, G., Chen, D., Zhang, N., Gong, L., Cao, M., Qin, Z.: DeepEDN: A deep-learning-based image encryption and decryption network for internet of medical things. IEEE Internet Things J. 8(3), 1504–1518 (2020)

    Article  Google Scholar 

  34. Gao, X.: A color image encryption algorithm based on an improved Hénon map. Phys. Scr. 96(6), 065203 (2021)

    Article  Google Scholar 

  35. Farah, M.A., Farah, A., Farah, T.: An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn. 99(4), 3041–3064 (2020)

    Article  Google Scholar 

  36. Tang, Z., Zhang, X., Lan, W.: Efficient image encryption with blockshuffling and chaotic map. Multimed. Tools Appl. 74, 5429–5448 (2015)

    Article  Google Scholar 

  37. Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21, 749–761 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  38. Man, Z., Li, J., Di, X., Bai, O.: An image segmentation encryption algorithm based on hybrid chaotic system. IEEE Access 7, 103047–103058 (2019)

    Article  Google Scholar 

  39. Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error measurement to structural similarity. IEEE Trans. Image Process. 13, 600–612 (2004)

    Article  Google Scholar 

  40. Belazi, A., El-Latif, A.A.A., Belghith, S.: A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process. 128, 155–170 (2016)

    Article  Google Scholar 

  41. Ding, Y., Tan, F., Qin, Z., Cao, M., Choo, K.K.R., Qin, Z.: DeepKeyGen: a deep learning-based stream cipher generator for medical image encryption and decryption. IEEE Trans. Neural Netw. Learn. Syst. 33(9), 4915–4929 (2021)

    Article  Google Scholar 

Download references

Funding

This project is supported in part by the National Natural Science Foundation of China: 62262062, the major programs incubation plan of **zang Minzu University: 22MDZ03, and the Research Team Project for **zang-related Network Information Content and Data Security (No. 324042000709).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ru Xue.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, Z., Xue, R. Visual image encryption based on compressed sensing and Cycle-GAN. Vis Comput (2023). https://doi.org/10.1007/s00371-023-03140-1

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s00371-023-03140-1

Keywords

Navigation