Log in

A double-embedding hidden image encryption and authentication scheme based on compressed sensing and double random phase encoding

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The image may be maliciously tampered when transmitted on the shared platform, and the receiver cannot determine whether the received image is a true image. In order to solve the above problems, an image encryption and authentication scheme with visual security based on compressed sensing and double random phase encoding are proposed. Firstly, the plain image is compressed and encoded by double random phase encoding to obtain authentication information to verify the authenticity of the image. Then, the compressed image and authentication information are fused and then scrambled to hide the authentication information and ensure the security of the encrypted image and authentication information. Finally, the secret image and authentication information are embedded into the carrier image by singular value decomposition and least significant bit method, respectively, to improve the security of the secret image and the anti-attack ability of the authentication information. The experimental results show that the PSNR and peak-to-correlation energy of the image are still greater than 17 dB and 0.001 under a certain attack intensity, indicating that the scheme has good reconstruction quality and strong robustness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Germany)

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Algorithm 2
Algorithm 3
Fig. 2
Algorithm 4
Algorithm 5
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Data Availability

The datasets analysed during the current study are available from the corresponding author on reasonable request.

References

  1. Maini S, Aggarwal AK (2018) Camera position estimation using 2D image dataset. Int J Innov Eng Technol 10(2):199–203

    Google Scholar 

  2. Kumar A, Sato Y, Oishi T et al (2014) Improving GPS position accuracy by identification of reflected GPS signals using range data for modeling of urban structures. SEISAN KENKYU 66(2):101–107

    Google Scholar 

  3. Kumar A, Banno A, Ono S et al (2013) Global Coordinate Adjustment of the 3D Survey Models under Unstable GPS Condition. SEISAN KENKYU 65(2):91–95

    Google Scholar 

  4. Bharath B, Kanmani M (2017) Swarm intelligence based image fusion for thermal and visible images. In: 2017 International conference on computation of power, energy information and commuincation (ICCPEIC). IEEE, pp 043–048

  5. Kanmani M, Narasimhan V (2020) An optimal weighted averaging fusion strategy for remotely sensed images. Multidim Syst Sign Process 79:17859–17883

    Google Scholar 

  6. Kanmani M, Narasimhan V (2019) Optimal fusion aided face recognition from visible and thermal face images. Multimed Tools Appl 30:1911–1935

    Google Scholar 

  7. Dittmann J, Wohlmacher P, Nahrstedt K (2001) Using cryptographic and watermarking algorithms. IEEE MultiMedia 8(4):54–65

    Google Scholar 

  8. Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403–419

    Google Scholar 

  9. Mansouri A, Wang X (2020) A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf Sci 520:46–62

    MathSciNet  Google Scholar 

  10. Wang X, Li Y, ** J (2020) A new one-dimensional chaotic system with applications in image encryption. Chaos Solitons Fractals 139(110):102

    MathSciNet  Google Scholar 

  11. Farah MAB, Guesmi R, Kachouri A et al (2020) A novel chaos based optical image encryption using fractional fourier transform and DNA sequence operation. Opt Laser Technol 121(105):777

    Google Scholar 

  12. Belazi A, Talha M, Kharbech S, et al (2019) Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access 7:36,667–36,681

  13. Chai X, Fu X, Gan Z et al (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44–62

    Google Scholar 

  14. Yaghouti Niyat A, Moattar MH, Niazi Torshiz M (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng 90:225–237

    Google Scholar 

  15. Dong Y, Zhao G, Ma Y et al (2022) A novel image encryption scheme based on pseudo-random coupled map lattices with hybrid elementary cellular automata. Inf Sci 593:121–154

    Google Scholar 

  16. Wu B, **e D, Chen F et al (2022) A multi-party secure encryption-sharing hybrid scheme for image data base on compressed sensing. Digit Signal Process 123(103):391

    Google Scholar 

  17. Xu Q, Sun K, He S et al (2020) An effective image encryption algorithm based on compressive sensing and 2D-SLIM. Opt Lasers Eng 134(106):178

    Google Scholar 

  18. Chai X, Bi J, Gan Z et al (2020) Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process 176(107):684

    Google Scholar 

  19. Wang X, Su Y (2021) Image encryption based on compressed sensing and DNA encoding. Signal Process Image Commun 95(116):246

    Google Scholar 

  20. Yao S, Chen L, Zhong Y (2019) An encryption system for color image based on compressive sensing. Opt Laser Technol 120(105):703

    Google Scholar 

  21. **e D, Chen F, Luo Y et al (2019) One-to-many image encryption with privacy-preserving homomorphic outsourced decryption based on compressed sensing. Digit Signal Process 95(102):587

    Google Scholar 

  22. **ao D, Zhao M, Wang M (2021) Low-cost and secure multi-image encryption scheme based on p-tensor product compressive sensing. Opt Laser Technol 140(107):077

    Google Scholar 

  23. Ye G, Pan C, Dong Y et al (2020) Image encryption and hiding algorithm based on compressive sensing and random numbers insertion. Signal Process 172(107):563

    Google Scholar 

  24. Wang H, **ao D, Li M et al (2019) A visually secure image encryption scheme based on parallel compressive sensing. Signal Process 155:218–232

    Google Scholar 

  25. Hua Z, Zhang K, Li Y et al (2021) Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing. Signal Process 183(107):998

    Google Scholar 

  26. Zhu L, Song H, Zhang X et al (2020) A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding. Signal Process 175(107):629

    Google Scholar 

  27. Wang X, Liu C, Jiang D (2021) A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT. Inf Sci 574:505–527

    MathSciNet  Google Scholar 

  28. Wen W, Hong Y, Fang Y et al (2020) A visually secure image encryption scheme based on semi-tensor product compressed sensing. Signal Process 173(107):580

    Google Scholar 

  29. Chai X, Wu H, Gan Z et al (2020) Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy. Signal Process 171(107):525

    Google Scholar 

  30. Zhou K, Fan J, Fan H et al (2020) Secure image encryption scheme using double random-phase encoding and compressed sensing. Opt Laser Technol 121(105):769

    Google Scholar 

  31. Yuan L, Ran Q, Zhao T (2017) Image authentication based on double-image encryption and partial phase decryption in nonseparable fractional fourier domain. Opt Laser Technol 88:111–120

    ADS  Google Scholar 

  32. Ren H, Niu S (2022) ) Joint encryption and authentication in hybrid domains with hidden double random-phase encoding. Multimed Tools Appl 81:25,993-26,014

    Google Scholar 

  33. Yi F, Kim Y, Moon I (2018) Secure image-authentication schemes with hidden double random-phase encoding. IEEE Access 6:70,113-70,121

    Google Scholar 

  34. Chen J, Bao N, Zhang LY et al (2018) Optical information authentication using optical encryption and sparsity constraint. Optics Lasers Eng 107:352–363

    ADS  Google Scholar 

  35. Yuan L, Ran Q, Zhao T (2017) Image authentication based on double-image encryption and partial phase decryption in nonseparable fractional fourier domain. Opt Laser Technol 88:111–120

    ADS  Google Scholar 

  36. Zhang R, **ao D (2022) Double image encryption scheme based on compressive sensing and double random phase encoding. Mathematics 10(8):1242

    Google Scholar 

  37. Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182

    Google Scholar 

  38. Donoho DL (2006) Compressed sensing. IEEE Trans Inf Theory 52(4):1289–1306

    Google Scholar 

  39. Candes EJ, Romberg J, Tao T (2006) Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans Inf Theory 52(2):489–509

    MathSciNet  Google Scholar 

  40. Tropp JA, Gilbert AC (2007) Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans Inf Theory 53:4655–4666

    MathSciNet  Google Scholar 

  41. Mohimani GH, Babaie-Zadeh M, Jutten C (2007) Fast sparse representation based on smoothed \(\ell \)0 norm. Independent component analysis and signal separation. Springer, Berlin Heidelberg, pp 389–396

    Google Scholar 

  42. Refregier P, Javidi B (1995) Optical image encryption based on input plane and fourier plane random encoding. Opt Lett 20(7):767–769

    ADS  CAS  PubMed  Google Scholar 

  43. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 16:2129–2151

    MathSciNet  Google Scholar 

  44. Gan Z, Song S, Zhou L, et al (2022) Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication. J King Saud Univ- Comput Inform Sci 34(10, Part B):9252–9272

  45. Hanis S, Amutha R (2019) A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure. Nonlinear Dyn 95:421–432

    Google Scholar 

  46. Zhang Y, He Q, Chen G et al (2020) A Low-Overhead, Confidentiality-Assured, and Authenticated Data Acquisition Framework for IoT. IEEE Trans Ind Inform 16:7566–7578

  47. Li H, Yu C, Wang X (2021) Cloud-decryption-assisted image compression and encryption based on compressed sensing. Multimed Tools Appl 80:8721–8758

    Google Scholar 

Download references

Acknowledgements

This paper is partially supported by the National Natural Science Foundation of China (Grant Nos. 61801004 and 61972438), the Natural Science Foundation of Anhui Province (Grant No. 1808085QF211), and the Key Research and Development Projects in Anhui Province (Grant Nos. 202004a05020002)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dong **e.

Ethics declarations

Competing interest

The authors have no relevant financial or non-financial interests to disclose.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ren, N., Cheng, G., **e, D. et al. A double-embedding hidden image encryption and authentication scheme based on compressed sensing and double random phase encoding. Multimed Tools Appl 83, 31417–31442 (2024). https://doi.org/10.1007/s11042-023-16743-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16743-6

Keywords

Navigation