Abstract
Image feature encryption is comprised of feature extraction and feature encryption. The existing feature encryption algorithms aim at extracting edge features as significant information for encryption purpose rather than salient regions. However, salient regions in the images usually carry more important information than edge features. Moreover, most of them protect significant information by transforming the input image into noise-like image or texture-like image. Obviously, these images are sign of encrypted image and thus can be easily attacked. In this study, we propose a salient regions encryption method by generating visually meaningful ciphertext image. First, salient regions are efficiently detected by saliency detection model in the compressed domain. Then, we encrypt these salient regions by a chaos-based encryption algorithm. With optical encryption theory, the encrypted salient regions are finally transformed into a visually meaningful ciphertext. To the best of our knowledge, it is the first time to use salient regions as important visual information for encryption to obtain ciphertext image. Results demonstrate the image salient regions have been largely hidden with the proposed method.
Similar content being viewed by others
References
Chen J, Zhu Z, Liu Z, Zhang L, Yu H (2014) A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains. Opt Express 22(6):7349–7361
Zhang Y, Xiao D (2013) Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform. Opt Laser Eng 51(4):472–480
Zhou N, Wang Y, Gong L, He H, Wu J (2011) Novel single-channel color image encryption algorithm based on chaos and fractional Fourier transform. Opt Commun 284(12):2789–2796
Zhang L, Hu X, Liu Y, Wong K, Gan J (2014) A chaotic image encryption scheme owning temp-value feedback. Commun Nonlinear Sci 19(10):3653–3659
Zhang Y, Xiao D, Shu Y, Li J (2013) A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations. Signal Process Image 28(3):292–300
Zhou Y, Hua Z, Pun C, Chen C (2015) Cascade chaotic system with applications. IEEE Trans Cybern 45(9):2001–2012
Zhang Y, Wen W, Wu Y, Zhang R, Chen J, He X (2015) Deciphering an RGB color image cryptosystem based on Choquet fuzzy integral. Neural Comput Appl. doi:10.1007/s00521-015-2045-2
Taneja N, Raman B, Gupta I (2011) Selective image encryption in fractional wavelet domain. AUE Int J Electron C 65:338–344
Zhang Y, Xiao D, Wen W, Tian Y (2013) Edge-based lightweight image encryption using chaos-based reversible hidden transform and multiple-order discrete fractional cosine transform. Opt Laser Technol 54:1–6
Osama AK, Abdullah MZ, Elankovan AS (2014) Performance study of selective encryption in comparison to full encryption for still visual images. J Zhejiang Univ Sci C Comput Electron 15(6):435–444
Wen W, Zhang Y, Fang Z, Chen J (2015) Infrared target-based selective encryption by chaotic maps. Opt Commun 341:131–139
Rao YVS, Mitra A, Prasanna SRM (2006) A partial image encryption method with pseudo-random sequences. In: Information systems security, lecture notes in computer science, vol 4332, pp 315–325
Kulkarni NS, Raman B, Gupta I (2009) Multimedia encryption: a brief overview. In: Recent advances in multimedia signal processing and communications, vol 231. Springer, pp 417–449
Han Y, Xu C, Baciu G, Li M (2015) Lightness biased cartoon-and-texture decomposition for textile image segmentation. Neurocomputing 168:575–587
Wen W, He C, Zhang Y, Fang Z (2015) A novel method for image segmentation using reaction–diffusion model. Multidimens Syst Signal 1–21. doi:10.1007/s11045-015-0365-0
Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507–518
Pashler HE, Sutherland S (1998) The psychology of attention. MIT press, Cambridge, MA
Fang Y, Lin W, Lee B-S, Lau C-T, Chen ZZ, Lin C-W (2012) Bottom-up saliency detection model based on human visual sensitivity and amplitude spectrum. IEEE Trans Multimedia 14(1):187–198
Liu T, Yuan Z, Sun J, Wang J, Zheng N, Tang X, Shum H (2011) Learning to detect a salient object. IEEE Trans Pattern Anal 33(2):353–367
Achanta R, Hemami S, Estrada F, Susstrunk S (2009) Frequency-tuned salient region detection. In: Proceeding on IEEE international conference on computer vision pattern recognition, pp 1597–1604
Fang Y, Chen Z, Lin W, Lin C-W (2012) Saliency detection in the compressed domain for adaptive image retargeting. IEEE Trans Image Process 21(9):3888–3901
Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90:2714–2722
Bao L, Zhou Y, Chen CLP, Liu H (2012) A new chaotic system for image encryption. In: Proceedings on IEEE international conference on system science engineering (ICSSE), pp 69–73
Zhou Y, Bao L, Chen CLP (2013) Image encryption using a new parametric switching chaotic system. Signal Process 93(11):3039–3052
Bao L, Zhou Y (2015) Image encryption: generating visually meaningful encrypted images. Inf Sci 324:197–207
Liu T, Sun J, Zheng N, Tang X, Shum H (2007) Learning to detect a salient object. In: Proceeding on IEEE international conference on computer vision pattern recognition, pp 1–8
Acknowledgements
This work was supported by the Research Foundation of the Education Department of Jiangxi Province (Grant no.GJJ150462), and the National Natural Science Foundation of China (Grant nos. 61462032, 61502399, 61461021, U1536204, and 61462031).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wen, W., Zhang, Y., Fang, Y. et al. Image salient regions encryption for generating visually meaningful ciphertext image. Neural Comput & Applic 29, 653–663 (2018). https://doi.org/10.1007/s00521-016-2490-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-016-2490-6