Skip to main content
Log in

Image salient regions encryption for generating visually meaningful ciphertext image

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Image feature encryption is comprised of feature extraction and feature encryption. The existing feature encryption algorithms aim at extracting edge features as significant information for encryption purpose rather than salient regions. However, salient regions in the images usually carry more important information than edge features. Moreover, most of them protect significant information by transforming the input image into noise-like image or texture-like image. Obviously, these images are sign of encrypted image and thus can be easily attacked. In this study, we propose a salient regions encryption method by generating visually meaningful ciphertext image. First, salient regions are efficiently detected by saliency detection model in the compressed domain. Then, we encrypt these salient regions by a chaos-based encryption algorithm. With optical encryption theory, the encrypted salient regions are finally transformed into a visually meaningful ciphertext. To the best of our knowledge, it is the first time to use salient regions as important visual information for encryption to obtain ciphertext image. Results demonstrate the image salient regions have been largely hidden with the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Chen J, Zhu Z, Liu Z, Zhang L, Yu H (2014) A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains. Opt Express 22(6):7349–7361

    Article  Google Scholar 

  2. Zhang Y, Xiao D (2013) Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform. Opt Laser Eng 51(4):472–480

    Article  Google Scholar 

  3. Zhou N, Wang Y, Gong L, He H, Wu J (2011) Novel single-channel color image encryption algorithm based on chaos and fractional Fourier transform. Opt Commun 284(12):2789–2796

    Article  Google Scholar 

  4. Zhang L, Hu X, Liu Y, Wong K, Gan J (2014) A chaotic image encryption scheme owning temp-value feedback. Commun Nonlinear Sci 19(10):3653–3659

    Article  MathSciNet  Google Scholar 

  5. Zhang Y, Xiao D, Shu Y, Li J (2013) A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations. Signal Process Image 28(3):292–300

    Article  Google Scholar 

  6. Zhou Y, Hua Z, Pun C, Chen C (2015) Cascade chaotic system with applications. IEEE Trans Cybern 45(9):2001–2012

    Article  Google Scholar 

  7. Zhang Y, Wen W, Wu Y, Zhang R, Chen J, He X (2015) Deciphering an RGB color image cryptosystem based on Choquet fuzzy integral. Neural Comput Appl. doi:10.1007/s00521-015-2045-2

    Google Scholar 

  8. Taneja N, Raman B, Gupta I (2011) Selective image encryption in fractional wavelet domain. AUE Int J Electron C 65:338–344

    Article  Google Scholar 

  9. Zhang Y, Xiao D, Wen W, Tian Y (2013) Edge-based lightweight image encryption using chaos-based reversible hidden transform and multiple-order discrete fractional cosine transform. Opt Laser Technol 54:1–6

    Article  Google Scholar 

  10. Osama AK, Abdullah MZ, Elankovan AS (2014) Performance study of selective encryption in comparison to full encryption for still visual images. J Zhejiang Univ Sci C Comput Electron 15(6):435–444

    Article  Google Scholar 

  11. Wen W, Zhang Y, Fang Z, Chen J (2015) Infrared target-based selective encryption by chaotic maps. Opt Commun 341:131–139

    Article  Google Scholar 

  12. Rao YVS, Mitra A, Prasanna SRM (2006) A partial image encryption method with pseudo-random sequences. In: Information systems security, lecture notes in computer science, vol 4332, pp 315–325

  13. Kulkarni NS, Raman B, Gupta I (2009) Multimedia encryption: a brief overview. In: Recent advances in multimedia signal processing and communications, vol 231. Springer, pp 417–449

  14. Han Y, Xu C, Baciu G, Li M (2015) Lightness biased cartoon-and-texture decomposition for textile image segmentation. Neurocomputing 168:575–587

    Article  Google Scholar 

  15. Wen W, He C, Zhang Y, Fang Z (2015) A novel method for image segmentation using reaction–diffusion model. Multidimens Syst Signal 1–21. doi:10.1007/s11045-015-0365-0

  16. Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507–518

    Article  Google Scholar 

  17. Pashler HE, Sutherland S (1998) The psychology of attention. MIT press, Cambridge, MA

    Google Scholar 

  18. Fang Y, Lin W, Lee B-S, Lau C-T, Chen ZZ, Lin C-W (2012) Bottom-up saliency detection model based on human visual sensitivity and amplitude spectrum. IEEE Trans Multimedia 14(1):187–198

    Article  Google Scholar 

  19. Liu T, Yuan Z, Sun J, Wang J, Zheng N, Tang X, Shum H (2011) Learning to detect a salient object. IEEE Trans Pattern Anal 33(2):353–367

    Article  Google Scholar 

  20. Achanta R, Hemami S, Estrada F, Susstrunk S (2009) Frequency-tuned salient region detection. In: Proceeding on IEEE international conference on computer vision pattern recognition, pp 1597–1604

  21. Fang Y, Chen Z, Lin W, Lin C-W (2012) Saliency detection in the compressed domain for adaptive image retargeting. IEEE Trans Image Process 21(9):3888–3901

    Article  MathSciNet  MATH  Google Scholar 

  22. Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90:2714–2722

    Article  MATH  Google Scholar 

  23. Bao L, Zhou Y, Chen CLP, Liu H (2012) A new chaotic system for image encryption. In: Proceedings on IEEE international conference on system science engineering (ICSSE), pp 69–73

  24. Zhou Y, Bao L, Chen CLP (2013) Image encryption using a new parametric switching chaotic system. Signal Process 93(11):3039–3052

    Article  Google Scholar 

  25. Bao L, Zhou Y (2015) Image encryption: generating visually meaningful encrypted images. Inf Sci 324:197–207

    Article  MathSciNet  Google Scholar 

  26. Liu T, Sun J, Zheng N, Tang X, Shum H (2007) Learning to detect a salient object. In: Proceeding on IEEE international conference on computer vision pattern recognition, pp 1–8

Download references

Acknowledgements

This work was supported by the Research Foundation of the Education Department of Jiangxi Province (Grant no.GJJ150462), and the National Natural Science Foundation of China (Grant nos. 61462032, 61502399, 61461021, U1536204, and 61462031).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenying Wen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wen, W., Zhang, Y., Fang, Y. et al. Image salient regions encryption for generating visually meaningful ciphertext image. Neural Comput & Applic 29, 653–663 (2018). https://doi.org/10.1007/s00521-016-2490-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-016-2490-6

Keywords

Navigation