Abstract
An efficient and simple encryption and compression scheme for digital image is reported in this paper. This scheme is based on the algorithm of the generalized knight’s tour, discrete cosine transform and non-linear chaotic maps. In this scheme, according to the structure of compression, confusion and diffusion are attained by methods of the generalized knight’s tour and chaotic maps. Firstly, the generalized knight’s tour algorithm is utilized to scramble the pixels while the data correlation preserved. Then, the chaotic system is used to generate a pseudorandom permutation to encrypt the part of coefficients from discrete cosine transform for diffusion. Experimental results show that the proposed scheme can gain robust security and a high compression ratio, which indicates that the proposed scheme is practicable.









Similar content being viewed by others
References
Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos 16:2129–2151
Bai S, Liao X-F, Qu X-H, Liu Y-J (2006) Generalized knight’s tour problem and its solutions algorithm, computational intelligence and security. International Conference 1:570–573
Bai S, Yang X-F, Zhu G-B, Jiang D-L, Huang J (2010) Generalized knight’s tour on 3D chessboards. Discret Appl Math 158:1727–1731
Chen J, Zhou J, Wong K-W (2011) A modified chaos-based joint compression and encryption scheme, circuits and systems II: express briefs. IEEE Transactions on 58:110–114
Delei J, Sen B, Wenming D (2008) An image encryption algorithm based on Knight’s tour and slip encryption-filter,. computer science and software engineering, 2008 international conference on 1:251–255
Gordon VS, Slocum TJ (2004) The knight’s tour-evolutionary vs. depth-first search, Evolutionary Computation, 2004. CEC2004. Congress on 2:1435–1440
Grangetto M, Magli E, Olmo G (2006) Multimedia selective encryption by means of randomized arithmetic coding, multimedia. IEEE Transactions on 8:905–917
Gupta K, Silakari S (2012) Novel approach for fast compressed hybrid color image cryptosystem. Adv Eng Softw 49:29–42
Jakimoski G, Subbalakshmi K (2008) Cryptanalysis of some multimedia encryption schemes, multimedia. IEEE Transactions on 10:330–338
Kim H, Wen J, Villasenor JD (2007) Secure arithmetic coding, signal processing. IEEE Transactions on 55:2263–2272
Li S, Li C, Lo K-T, Chen G (2006) Cryptanalysis of an image encryption scheme. J Electron Imaging 15:043012–043013
Li S, Li C, Kuo JC-C (2011) On the security of a secure Lempel-Ziv-Welch (LZW) algorithm, multimedia and expo (ICME). I.E. International Conference pp 1–5
Li C, Liu Y, Zhang LY, Wong K-w (2013) Breaking an image compression and encryption scheme based on Chinese Remainder Theorem. arXiv preprint arXiv 1306(5615)
Nivasch G (2003) Experimental results on Hamiltonian-cycle-finding algorithms. Technical Report, Weizman Institute, Israel, pp 1–15
Philip A (2013) A generalized pseudo-knight’ s tour algorithm for encryption of an image, potentials. IEEE 32:10–16
Sen B, Chang-Xiu C (2002) A novel algorithm for scrambling the details of digital image, Intelligent Control and Automation, 2002. Proceedings of the 4th World Congress on 2:1333–1336
Thanikaiselvan V, Arulmozhivarman P, Amirtharajan R, Rayappan JBB (2012) Horse riding and hiding in image for data guarding. Procedia Engineering 30:36–44
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity, image processing. IEEE Transactions on 13:600–612
Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system,. J Syst Softw 85(2):290–299
Wen J, Kim H, Villasenor JD (2006) Binary arithmetic coding with key-based interval splitting, signal processing letters. IEEE 13:69–72
Wong K-W, Yuen C-H (2008) Embedding compression in chaos-based cryptography, circuits and systems II: express briefs. IEEE Transactions on 55:1193–1197
Wu C-P, Kuo C-C (2005) Design of integrated multimedia compression and encryption systems, multimedia. IEEE Transactions on 7:828–839
Yuen CH, Wong KW (2011) A chaos-based joint image compression and encryption scheme using DCT and SHA-1. Appl Soft Comput 11:5092–5098
Zhang Y, Xiao D, Liu H, Nan H (2014) GLS coding based security solution to JPEG with the structure of aggregated compression and encryption. Commun Nonlinear Sci Numer Simul 19:1366–1374
Zhou J, Au OC (2008) Comments on” a novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system, circuits and systems I: regular papers. IEEE Transactions on 55:3368–3369
Zhou J, Liang Z, Chen Y, Au OC (2007) Security analysis of multimedia encryption schemes based on multiple Huffman table, signal processing letters. IEEE 14:201–204
Zhou J, Au OC, Wong P-W (2009) Adaptive chosen-ciphertext attack on secure arithmetic coding, signal processing. IEEE Transactions on 57:1825–1838
Zhou J, Liu X, Au OC, et al. (2014) Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation[J]. IEEE Transactions on Information Forensics & Security 9(1):39–50
Zhu Z, Zhang Q, Yu H, et al. (2009) A New Hyper-Chaos Generated from Chen’s System via an External Periodic Perturbation, Chaos-Fractals Theories and Applications, 2009. IWCFTA’09. International Workshop on IEEE:260–266
Zhu H, Zhao C, Zhang X (2013) A novel image encryptionCcompression scheme using hyper-chaos and Chinese remainder theorem. Signal Process Image Commun 28:670–680
Acknowledgments
The work on this paper is supported by National Natural Science Foundation of China (Grant No.61272043), Basic and Frontier Project of Chongqing (Project No. cstc2013jjB40009), Program for Innovative Research Team in University of Chongqing (No. KJTD201343) and innovation project of graduate students (CYS14203).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Xiaoyong, J., Sen, B., Guibin, Z. et al. Image encryption and compression based on the generalized knight’s tour, discrete cosine transform and chaotic maps. Multimed Tools Appl 76, 12965–12979 (2017). https://doi.org/10.1007/s11042-016-3684-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3684-8