Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication

Image encryption is an effective method to protect private images by converting them into meaningless ones, but many current image encryption algorithms still have security and efficiency problems. This paper combines compressed sensing (CS) and secret image sharing (SIS) to propose a certifiable vi...

Full description

Saved in:
Bibliographic Details
Main Authors: Zhihua Gan, Shiping Song, Lin Zhou, Daojun Han, Jiangyu Fu, Xiuli Chai
Format: Article
Language:English
Published: Springer 2022-11-01
Series:Journal of King Saud University: Computer and Information Sciences
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S1319157822003275
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849324998303416320
author Zhihua Gan
Shiping Song
Lin Zhou
Daojun Han
Jiangyu Fu
Xiuli Chai
author_facet Zhihua Gan
Shiping Song
Lin Zhou
Daojun Han
Jiangyu Fu
Xiuli Chai
author_sort Zhihua Gan
collection DOAJ
description Image encryption is an effective method to protect private images by converting them into meaningless ones, but many current image encryption algorithms still have security and efficiency problems. This paper combines compressed sensing (CS) and secret image sharing (SIS) to propose a certifiable visually secure image selection encryption. Firstly, a selective encryption based on multi-task convolutional neural network (SE-MTCNN) is presented to distinguish and encrypt the sensitive and non-sensitive information of plain images. Subsequently, the SIS algorithm is used to decompose the resulting plain image into multiple shadow images to disperse the risk of cryptographic image loss and resist hacking attacks. Herein, a pseudo-convolutional sliding scrambling based on chaotic sequences driven by plaintext (PCSS-CSDP) is proposed to eliminate the correlation between adjacent image pixels. Finally, the IWT-M-embedding algorithm is used to embed shadow images into carrier images to get multiple visually meaningful cipher images. Additionally, a new authentication scheme based on bit-level cyclic shifts and dynamic combination (AS-BCSDC) is introduced, and the obtained authentication information is fused into cipher images to prevent the deception of illegal users and malicious tampering of cloud platform. Experiments demonstrate the effectiveness of our algorithm, and it may be applied for image secure communication.
format Article
id doaj-art-5849ce2c0e674f96bad2e127fcad28eb
institution Kabale University
issn 1319-1578
language English
publishDate 2022-11-01
publisher Springer
record_format Article
series Journal of King Saud University: Computer and Information Sciences
spelling doaj-art-5849ce2c0e674f96bad2e127fcad28eb2025-08-20T03:48:31ZengSpringerJournal of King Saud University: Computer and Information Sciences1319-15782022-11-0134109252927210.1016/j.jksuci.2022.09.006Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authenticationZhihua Gan0Shiping Song1Lin Zhou2Daojun Han3Jiangyu Fu4Xiuli Chai5School of Software, Intelligent Data Processing Engineering Research Center of Henan Province, Institute of Intelligent Network System, Henan University, Kaifeng 475004, China; Henan Key Laboratory of Cyberspace Situation Awareness, Zhengzhou 450001, ChinaSchool of Artificial Intelligence, Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Zhengzhou 450046, ChinaSchool of Artificial Intelligence, Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Zhengzhou 450046, China; Corresponding authors at: School of Artificial Intelligence, Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Zhengzhou 450046, China (L. Zhou, D. Han and X. Chai).School of Computer and Information Engineering, Institute of Image Processing and Pattern Recognition, Henan University, Kaifeng 475004, China; Corresponding authors at: School of Artificial Intelligence, Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Zhengzhou 450046, China (L. Zhou, D. Han and X. Chai).School of Artificial Intelligence, Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Zhengzhou 450046, ChinaHenan Key Laboratory of Cyberspace Situation Awareness, Zhengzhou 450001, China; School of Artificial Intelligence, Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Zhengzhou 450046, China; Corresponding authors at: School of Artificial Intelligence, Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Zhengzhou 450046, China (L. Zhou, D. Han and X. Chai).Image encryption is an effective method to protect private images by converting them into meaningless ones, but many current image encryption algorithms still have security and efficiency problems. This paper combines compressed sensing (CS) and secret image sharing (SIS) to propose a certifiable visually secure image selection encryption. Firstly, a selective encryption based on multi-task convolutional neural network (SE-MTCNN) is presented to distinguish and encrypt the sensitive and non-sensitive information of plain images. Subsequently, the SIS algorithm is used to decompose the resulting plain image into multiple shadow images to disperse the risk of cryptographic image loss and resist hacking attacks. Herein, a pseudo-convolutional sliding scrambling based on chaotic sequences driven by plaintext (PCSS-CSDP) is proposed to eliminate the correlation between adjacent image pixels. Finally, the IWT-M-embedding algorithm is used to embed shadow images into carrier images to get multiple visually meaningful cipher images. Additionally, a new authentication scheme based on bit-level cyclic shifts and dynamic combination (AS-BCSDC) is introduced, and the obtained authentication information is fused into cipher images to prevent the deception of illegal users and malicious tampering of cloud platform. Experiments demonstrate the effectiveness of our algorithm, and it may be applied for image secure communication.http://www.sciencedirect.com/science/article/pii/S1319157822003275Compressed sensing (CS)Secret image sharing (SIS)Integer wavelet transform (IWT)-M-embeddingImage encryption
spellingShingle Zhihua Gan
Shiping Song
Lin Zhou
Daojun Han
Jiangyu Fu
Xiuli Chai
Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication
Journal of King Saud University: Computer and Information Sciences
Compressed sensing (CS)
Secret image sharing (SIS)
Integer wavelet transform (IWT)-M-embedding
Image encryption
title Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication
title_full Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication
title_fullStr Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication
title_full_unstemmed Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication
title_short Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication
title_sort exploiting compressed sensing and polynomial based progressive secret image sharing for visually secure image selection encryption with authentication
topic Compressed sensing (CS)
Secret image sharing (SIS)
Integer wavelet transform (IWT)-M-embedding
Image encryption
url http://www.sciencedirect.com/science/article/pii/S1319157822003275
work_keys_str_mv AT zhihuagan exploitingcompressedsensingandpolynomialbasedprogressivesecretimagesharingforvisuallysecureimageselectionencryptionwithauthentication
AT shipingsong exploitingcompressedsensingandpolynomialbasedprogressivesecretimagesharingforvisuallysecureimageselectionencryptionwithauthentication
AT linzhou exploitingcompressedsensingandpolynomialbasedprogressivesecretimagesharingforvisuallysecureimageselectionencryptionwithauthentication
AT daojunhan exploitingcompressedsensingandpolynomialbasedprogressivesecretimagesharingforvisuallysecureimageselectionencryptionwithauthentication
AT jiangyufu exploitingcompressedsensingandpolynomialbasedprogressivesecretimagesharingforvisuallysecureimageselectionencryptionwithauthentication
AT xiulichai exploitingcompressedsensingandpolynomialbasedprogressivesecretimagesharingforvisuallysecureimageselectionencryptionwithauthentication