Abstract
This paper proposes a new image compression and encryption scheme based on the nearest-neighboring coupled-map lattices (NCML) and Non-uniform Discrete Cosine Transform (NDCT). A new cross chaotic map proposed based on Devaney’s theory is used as the local map of NCML, which is called spatiotemporal cross chaotic system. The algorithm adopts Huffman coding and NDCT which carries out transformation of image data to compress image data. In this system, there are two layers of encryption protection. The compression data are packed into blocks, and permutation between blocks and diffusion in blocks are done simultaneously. The parameters produced by spatiotemporal cross chaotic system are used to control the non-uniformity of the NDCT, which has also played a role in encryption. The security test results indicate the proposed methods have high speed, high security and good compression effect.










Similar content being viewed by others
References
Behnia S, Akshshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos Solitons Fractals 35(2):408–419
Chen GR, Mao YB, Charles KC (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3):749–761
Chung KL, Liu YW, Yan WM (2006) A hybrid gray image representation using spatial and DCT based approach with application to moment computation. J Vis Commun Image Represent 17(6):1209–1226
Curtis KM, Neil G, Fotopoulos V (2002) A hybrid fractal DCT image compression method. 14th Int Conf Digit Signal Proc 2:1337–1340
Dai CL, Bao WY (2012) Logistic map controlled secure arithmetic coding and its application in image encryption. J Chongqing Univ 35(8):87–91
Deng Y, Zhao XF, Feng DG (2010) Quantization index modulation steganography based on the nonuniform DCT. J Electron Inf Technol 32(2):323–328
Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(6):1259–1284
Ge X, Liu FL, Lu B, Wang W, Chen J (2010) An image encryption algorithm based on spatiotemporal chaos in DCT domain, The 2nd IEEE International Conference on Information Management and Engineering 267–270
Grangetto M, Magli E, Olmo G (2006) Multimedia selective encryption by means of randomized arithmetic coding. IEEE Trans Multimed 8(5):905–917
Han FY, Zhu CX (2007) One kid based on double dimensional chaos system picture encryption algorithm. Comput Eng Appl 43:50–51
Huang X (2011) Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn 67:2411–2417
Jakimoski G, Subbalakshmi K (2008) Cryptanalysis of some multimedia encryption schemes. IEEE Trans Multimed 10(3):330–338
Kaneko K (1985) Spatiotemporal intermittency in coupled map lattices. Prog Theor Phys 74(5):1033
Kaneko K (1989) Pattern dynamics in spatiotemporal chaos: pattern selection, diffusion of defect and pattern competition intermittency. Phys D 34(1–2):1–41
Kanso A (2011) Self-shrinking chaotic stream ciphers. Commun Nonlinear Sci Numer Simul 16(2):822–836
Kim H, Wen J, Villasenor JD (2007) Secure arithmetic coding. IEEE Trans Signal Process 55(5):2263–2272
Kingston A, Autrusseau F (2008) Lossless image compression via predictive coding of discrete Radon projections. Signal Process Image Commun 23(4):313–324
Krikor L, Baba S, Arif T, Shaaban Z (2009) Image encryption using DCT and stream cipher. Eur J Sci Res 32(1):47–57
Lian SG (2009) Efficient image or video encryption based on spatiotemporal chaos system. Chaos Solitons Fractals 40(5):2509–2519
Liu X, Farrell P, Boyd C (1999) A unified code. Cryptogr Coding Lect Notes Comput Sci 1746:84–93
Lu K, Sun JH, OuYang RB, Huan YL (1990) Chaotic dynamics. Shanghai Translation Press, Shanghai
Matthews R (1989) On the derivation of a “chaotic” encryption algorithm. Cryptologia 13(1):29–42
NIST (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications, Special Publication 800–22
Pincus S (1995) Approximate entropy (ApEn) as a complexity measure. Chaos 5(1):110–117
Shi YQ, Sun HF (2008) Image and video compression for multimedia engineering: fundamentals, algorithms, and standards. CRC Press, Boca Raton
Shnnon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715
Sun FY, Lü ZW (2011) Digital image encryption with chaotic map lattices. Chin Phys B 20(4):040506
Sun F, Lü Z, Liu S (2010) A new cryptosystem based on spatial chaotic system. Opt Commun 283:2066–2073
Tang JN, Zhang XD, Zhao L, Zou C (2010) A novel arithmetic coding on data compression and encryption with asymptotic deterministic randomness, 2010 International Conference on Computer Application and System Modeling 2-10-2-14
Teng L, Wang XY (2012) A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive. Opt Commun 285:4048–4054
Tong XJ (2012) The novel bilateral-Diffusion image encryption algorithm with dynamical compound chaos. J Syst Softw 85:850–858
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Wang SH, Kuang JY, Li JH, Luo YL, Lu HP, Hu G (2002) Chaos-based secure communication in a large community. Phys Rev E 66(6):1–4
Wang K, Pei LH, Zou, Song AG, He ZY (2005) On the security of 3D Cat map based symmetric image encryption scheme. Phys Lett A 343:432–439
Wang XY, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92:1101–1108
Wang Y, Wong KW, Liao XF, Chen GR (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11:514–522
Wen J, Kim H, Villasenor J (2006) Binary arithmetic coding with keybased interval splitting. IEEE Signal Process Lett 13(2):69–72
Wong KW, Yuen CH (2008) Embedding compression in chaos-based cryptography. IEEE Trans Circ Syst II: Express Briefs 55(11):1193–1197
Wu CP, Kuo CCJ (2005) Design of integrated multimedia compression and encryption systems. IEEE Trans Multimed 7(5):828–839
Yang HQ, Liao XF, Wong K-W, Zhang W, Wei PC (2012) SPIHT-based joint image compression and encryption. Acta Phys Sin 61(4):040505-1–040505-8
Yuen CH, Wong KW (2011) A chaos-based joint image compression and encryption scheme using DCT and SHA-1. Appl Soft Comput 11:5092–5098
Zhou J, Liang Z, Chen Y, Au OC (2007) Security analysis of multimedia encryption schemes based on multiple Huffman table. IEEE Signal Process Lett 14(3):201–204
Zhou Q, Liao X (2012) Collision-based flexible image encryption algorithm. J Syst Softw 85:400–407
Acknowledgments
This research is supported by the National Natural Science Foundation of China (No.60973162), the Science and Technology of Shandong Province of China (No.2013GGX10129, No.2010GGX10132, No.2012GGX10110), the Soft Science of Shandong Province of China (No. 2012RKA10009) and the National Cryptology Development Foundation of China (No.MMJJ201301006), the Teaching Research Project of Harbin Institute of Technology at Weihai and college of computer (NO. HITWHCS201309), and the Engineering Technology and Research Center of Weihai Information Security.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhang, M., Tong, X. A new algorithm of image compression and encryption based on spatiotemporal cross chaotic system. Multimed Tools Appl 74, 11255–11279 (2015). https://doi.org/10.1007/s11042-014-2227-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-014-2227-4