Image Encryption Technology Based on Fractal Image Compression Algorithm

Authors

  • Jinna Yu School of Computer Engineering, Shangqiu Polytechnic, Shangqiu, 476100, China

DOI:

https://doi.org/10.13052/jcsm2245-1439.1325

Keywords:

Knight’s tour, fractal image compression, Arnold transformation, Frobenius canonical form, fractal

Abstract

As the most commonly used information transmission method, digital images often store a large amount of personal information. To prevent information leakage, encrypting images is essential. Common image encryption techniques suffer from certain limitations, such as overly simple encryption methods and long encryption times. In response to the above issues, this study proposes the Frobenius canonical form image encryption scheme. It calculates the fractal code through the fractal compression algorithm and to encrypt the image, it adjusts the brightness coefficient in the fractal code. To address unsatisfactory correlation coefficients in encrypted images, the Frobenius canonical form image encryption is improved by introducing the Arnold transformation encryption, which combines the two methods to reduce correlation coefficients. Finally, the knight tour algorithm is put forward. In response to the long image scrambling time in the knight tour algorithm, the Tetragonal theorem is combined with the scheme to encrypt the image. It is then re-encrypted using the Frobenius canonical form. The experimental findings illustrate that when using Frobenius canonical form, Arnold transformation combined with Frobenius canonical form, and the tetragonal algorithm combined with knight tour algorithm to encrypt Lena images, the three decryption methods correspond to image similarity of over 70%, over 80%, and over 90%, respectively. Combining the tetragonal algorithm and the knight tour algorithm can significantly increase the security of image encryption.

Downloads

Download data is not yet available.

Author Biography

Jinna Yu, School of Computer Engineering, Shangqiu Polytechnic, Shangqiu, 476100, China

Jinna Yu, a professional course teacher at the School of Computer Engineering at Shangqiu Vocational and Technical College, obtained a Master’s degree in Software Engineering from Northwestern Polytechnical University in 2016. Her areas of interest include image processing, information security, big data analysis, etc. She have served as an internship instructor in multiple companies and have led students to participate in provincial and national competitions multiple times.

References

Kaur G, Agarwal R, Patidar V. Color image encryption scheme based on fractional Hartley transform and chaotic substitution-permutation. The visual computer, 2022, 38(3):1027–1050.

Guo L, Du H, Huang D. A quantum image encryption algorithm based on the Feistel structure. Quantum Information Processing, 2021, 21(1):20–37.

Peng X, Zeng Y. Image encryption application in a system for compounding self-excited and hidden attractors. Chaos Solitons & Fractals, 2020, 139(6):1144–1159.

Mohamed Boussif, Noureddine Aloui, Adnene Cherif, Boussif M, Aloui N, Chrif A. Securing DICOM Images by a New Encryption Algorithm Using Arnold Transform and Vigenère Cipher. IET Image Processing, 2020, 14(6):1209–1216.

Wang X, Gao S. Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Information Sciences, 2020, 539(9):195–214.

Jain K, Aji A, Krishnan P. Medical Image Encryption Scheme Using Multiple Chaotic Maps. Pattern recognition letters, 2021, 152(12): 356–364.

Zarebnia M, Pakmanesh H, Parvaz R. A fast multiple-image encryption algorithm based on hybrid chaotic systems for gray scale images – ScienceDirect. Optik, 2019, 179(3):761–773.

Hu W, Dong Y. Quantum color image encryption based on a novel 3D chaotic system. Journal of Applied Physics, 2022, 11(131):1142–1155.

Huang H, Yang S, Ye R. An efficient symmetric image encryption by using a novel 2D chaotic system. IET Image Processing, 2020, 14(6):1157–1163.

Nie Z, Liu Z X, He X T, Gong L H. Image compression and encryption algorithm based on advanced encryption standard and hyper-chaotic system. Optica Applicata, 2019, 49(4):545–558.

Li B, Feng Y, Xiong Z, Yang W, Liu G. Research on AI Security Enhanced Encryption Algorithm of Autonomous IoT Systems. Information Sciences, 2021, 575(3):379–398.

Hanif R, Mustafa S, Iqbal S, Piracha S. A study of time series forecasting enrollments using fuzzy interval partitioning method. Journal of Computational and Cognitive Engineering, 2023, 2(2):143–149.

Kaur G, Agarwal R, Patidar V. Color image encryption scheme based on fractional Hartley transform and chaotic substitution-permutation. The visual computer, 2022, 38(3):1027–1050.

Wang X, Gao S. Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Information Sciences, 2020, 539(9):195–214.

Khan S, Han L, Qian Y, Lu H, Jiao SM. Security of multimedia communication with game trick based fast, efficient, and robust color-/gray-scale image encryption algorithm. Transactions on Emerging Telecommunications Technologies, 2020, 32(2):12–41.

Singh P, Acharya B, Chaurasiya R K. Low-area and high-speed hardware architectures of Lblock cipher for Internet of Things image encryption. Journal of electronic imaging, 2022, 5(3):33012–33040.

Erkan U, Toktas A, Toktas F, Alenezi F. 2D eπ-map for image encryption. Information Sciences, 2022, 589(5560):770–789.

Wang X, Yang J. A Privacy Image Encryption Algorithm based on Piecewise Coupled Map Lattice with Multi Dynamic coupling coefficient. Information Sciences, 2021, 569(5):217–240.

Liu C, Wang X, Jiang D. A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT. Information Sciences, 2021, 574(1):505–527.

Ratan R, Yadav A. Security Analysis of Bit plane Level Image Encryption Schemes. Defence Science Journal, 2021, 71(2):209–221.

Downloads

Published

2024-02-12

How to Cite

1.
Yu J. Image Encryption Technology Based on Fractal Image Compression Algorithm. JCSANDM [Internet]. 2024 Feb. 12 [cited 2024 Apr. 27];13(02):283-304. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/23153

Issue

Section

EIC Select