Abstract
The image may be maliciously tampered when transmitted on the shared platform, and the receiver cannot determine whether the received image is a true image. In order to solve the above problems, an image encryption and authentication scheme with visual security based on compressed sensing and double random phase encoding are proposed. Firstly, the plain image is compressed and encoded by double random phase encoding to obtain authentication information to verify the authenticity of the image. Then, the compressed image and authentication information are fused and then scrambled to hide the authentication information and ensure the security of the encrypted image and authentication information. Finally, the secret image and authentication information are embedded into the carrier image by singular value decomposition and least significant bit method, respectively, to improve the security of the secret image and the anti-attack ability of the authentication information. The experimental results show that the PSNR and peak-to-correlation energy of the image are still greater than 17 dB and 0.001 under a certain attack intensity, indicating that the scheme has good reconstruction quality and strong robustness.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16743-6/MediaObjects/11042_2023_16743_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16743-6/MediaObjects/11042_2023_16743_Figa_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16743-6/MediaObjects/11042_2023_16743_Figb_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16743-6/MediaObjects/11042_2023_16743_Figc_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16743-6/MediaObjects/11042_2023_16743_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16743-6/MediaObjects/11042_2023_16743_Figd_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16743-6/MediaObjects/11042_2023_16743_Fige_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16743-6/MediaObjects/11042_2023_16743_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16743-6/MediaObjects/11042_2023_16743_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16743-6/MediaObjects/11042_2023_16743_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16743-6/MediaObjects/11042_2023_16743_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16743-6/MediaObjects/11042_2023_16743_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16743-6/MediaObjects/11042_2023_16743_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16743-6/MediaObjects/11042_2023_16743_Fig9_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16743-6/MediaObjects/11042_2023_16743_Fig10_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-023-16743-6/MediaObjects/11042_2023_16743_Fig11_HTML.png)
Similar content being viewed by others
Data Availability
The datasets analysed during the current study are available from the corresponding author on reasonable request.
References
Maini S, Aggarwal AK (2018) Camera position estimation using 2D image dataset. Int J Innov Eng Technol 10(2):199–203
Kumar A, Sato Y, Oishi T et al (2014) Improving GPS position accuracy by identification of reflected GPS signals using range data for modeling of urban structures. SEISAN KENKYU 66(2):101–107
Kumar A, Banno A, Ono S et al (2013) Global Coordinate Adjustment of the 3D Survey Models under Unstable GPS Condition. SEISAN KENKYU 65(2):91–95
Bharath B, Kanmani M (2017) Swarm intelligence based image fusion for thermal and visible images. In: 2017 International conference on computation of power, energy information and commuincation (ICCPEIC). IEEE, pp 043–048
Kanmani M, Narasimhan V (2020) An optimal weighted averaging fusion strategy for remotely sensed images. Multidim Syst Sign Process 79:17859–17883
Kanmani M, Narasimhan V (2019) Optimal fusion aided face recognition from visible and thermal face images. Multimed Tools Appl 30:1911–1935
Dittmann J, Wohlmacher P, Nahrstedt K (2001) Using cryptographic and watermarking algorithms. IEEE MultiMedia 8(4):54–65
Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403–419
Mansouri A, Wang X (2020) A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf Sci 520:46–62
Wang X, Li Y, ** J (2020) A new one-dimensional chaotic system with applications in image encryption. Chaos Solitons Fractals 139(110):102
Farah MAB, Guesmi R, Kachouri A et al (2020) A novel chaos based optical image encryption using fractional fourier transform and DNA sequence operation. Opt Laser Technol 121(105):777
Belazi A, Talha M, Kharbech S, et al (2019) Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access 7:36,667–36,681
Chai X, Fu X, Gan Z et al (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44–62
Yaghouti Niyat A, Moattar MH, Niazi Torshiz M (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng 90:225–237
Dong Y, Zhao G, Ma Y et al (2022) A novel image encryption scheme based on pseudo-random coupled map lattices with hybrid elementary cellular automata. Inf Sci 593:121–154
Wu B, **e D, Chen F et al (2022) A multi-party secure encryption-sharing hybrid scheme for image data base on compressed sensing. Digit Signal Process 123(103):391
Xu Q, Sun K, He S et al (2020) An effective image encryption algorithm based on compressive sensing and 2D-SLIM. Opt Lasers Eng 134(106):178
Chai X, Bi J, Gan Z et al (2020) Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process 176(107):684
Wang X, Su Y (2021) Image encryption based on compressed sensing and DNA encoding. Signal Process Image Commun 95(116):246
Yao S, Chen L, Zhong Y (2019) An encryption system for color image based on compressive sensing. Opt Laser Technol 120(105):703
**e D, Chen F, Luo Y et al (2019) One-to-many image encryption with privacy-preserving homomorphic outsourced decryption based on compressed sensing. Digit Signal Process 95(102):587
**ao D, Zhao M, Wang M (2021) Low-cost and secure multi-image encryption scheme based on p-tensor product compressive sensing. Opt Laser Technol 140(107):077
Ye G, Pan C, Dong Y et al (2020) Image encryption and hiding algorithm based on compressive sensing and random numbers insertion. Signal Process 172(107):563
Wang H, **ao D, Li M et al (2019) A visually secure image encryption scheme based on parallel compressive sensing. Signal Process 155:218–232
Hua Z, Zhang K, Li Y et al (2021) Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing. Signal Process 183(107):998
Zhu L, Song H, Zhang X et al (2020) A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding. Signal Process 175(107):629
Wang X, Liu C, Jiang D (2021) A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT. Inf Sci 574:505–527
Wen W, Hong Y, Fang Y et al (2020) A visually secure image encryption scheme based on semi-tensor product compressed sensing. Signal Process 173(107):580
Chai X, Wu H, Gan Z et al (2020) Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy. Signal Process 171(107):525
Zhou K, Fan J, Fan H et al (2020) Secure image encryption scheme using double random-phase encoding and compressed sensing. Opt Laser Technol 121(105):769
Yuan L, Ran Q, Zhao T (2017) Image authentication based on double-image encryption and partial phase decryption in nonseparable fractional fourier domain. Opt Laser Technol 88:111–120
Ren H, Niu S (2022) ) Joint encryption and authentication in hybrid domains with hidden double random-phase encoding. Multimed Tools Appl 81:25,993-26,014
Yi F, Kim Y, Moon I (2018) Secure image-authentication schemes with hidden double random-phase encoding. IEEE Access 6:70,113-70,121
Chen J, Bao N, Zhang LY et al (2018) Optical information authentication using optical encryption and sparsity constraint. Optics Lasers Eng 107:352–363
Yuan L, Ran Q, Zhao T (2017) Image authentication based on double-image encryption and partial phase decryption in nonseparable fractional fourier domain. Opt Laser Technol 88:111–120
Zhang R, **ao D (2022) Double image encryption scheme based on compressive sensing and double random phase encoding. Mathematics 10(8):1242
Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182
Donoho DL (2006) Compressed sensing. IEEE Trans Inf Theory 52(4):1289–1306
Candes EJ, Romberg J, Tao T (2006) Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans Inf Theory 52(2):489–509
Tropp JA, Gilbert AC (2007) Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans Inf Theory 53:4655–4666
Mohimani GH, Babaie-Zadeh M, Jutten C (2007) Fast sparse representation based on smoothed \(\ell \)0 norm. Independent component analysis and signal separation. Springer, Berlin Heidelberg, pp 389–396
Refregier P, Javidi B (1995) Optical image encryption based on input plane and fourier plane random encoding. Opt Lett 20(7):767–769
Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 16:2129–2151
Gan Z, Song S, Zhou L, et al (2022) Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication. J King Saud Univ- Comput Inform Sci 34(10, Part B):9252–9272
Hanis S, Amutha R (2019) A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure. Nonlinear Dyn 95:421–432
Zhang Y, He Q, Chen G et al (2020) A Low-Overhead, Confidentiality-Assured, and Authenticated Data Acquisition Framework for IoT. IEEE Trans Ind Inform 16:7566–7578
Li H, Yu C, Wang X (2021) Cloud-decryption-assisted image compression and encryption based on compressed sensing. Multimed Tools Appl 80:8721–8758
Acknowledgements
This paper is partially supported by the National Natural Science Foundation of China (Grant Nos. 61801004 and 61972438), the Natural Science Foundation of Anhui Province (Grant No. 1808085QF211), and the Key Research and Development Projects in Anhui Province (Grant Nos. 202004a05020002)
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Competing interest
The authors have no relevant financial or non-financial interests to disclose.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Ren, N., Cheng, G., **e, D. et al. A double-embedding hidden image encryption and authentication scheme based on compressed sensing and double random phase encoding. Multimed Tools Appl 83, 31417–31442 (2024). https://doi.org/10.1007/s11042-023-16743-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-16743-6