Abstract
Recently, internet of things (IoT) is extensively used in wide applications like industry, e-healthcare, agriculture to send images through internet for the cloud storage. However, these images should be secured before the transmission. In this context, a novel cryptosystem for region of interest protection of images is proposed in this article. The proposed cryptosystem employs You Only Look Once v3 (YOLOv3) to detect regions of interest (ROI) in the original image and a new row column shift (RCS) image encryption algorithm based on two dimensional modified Henon map (2D-MHM) in order to obtain encrypted object image. A series of analyses are carried out to validate the proposed cryptosystem which includes histogram analysis, correlation coefficient analysis, information entropy analysis etc. The experimental results reveal that the ROI based image encryption algorithm shows strong performance with respect to security. Moreover, it reduces the time and computational complexity when compared to full encryption scheme.
Similar content being viewed by others
Availability of data and material
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.
References
Adarsh P, Rathi P, Kumar M (2020) YOLO v3-Tiny: object detection and recognition using one stage improved model. In: IEEE International Conference on Advanced Computing and Communication Systems (ICACCS). pp 687–694
Asgari-Chenaghlu M, Feizi-Derakhshi MR, Nikzad-Khasmakhi N et al (2021) Cy: chaotic yolo for user intended image encryption and sharing in social media. Inf Sci 542:212–227
Gupta BB, Li KC, Leung VC, Psannis KE, Yamaguchi S (2021) Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE/CAA J Autom Sin 8(12):1877–1890
Hanchinamani G, Kulkarni L (2015) An efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. 3D Res 6(3):1–15
Hao Z, Xing-yuan W, Si-wei W, Kang G, Xiao-hui L (2017) Application of coupled map lattice with parameter q in image encryption. Opt Lasers Eng 88:65–74
Hosny KM (ed) (2020) Multimedia security using chaotic maps: principles and methodologies, vol 884. Springer, New York
https://sipi.usc.edu/database/database.php?volume=misc Accessed 12 May 2022
https://www.imageprocessingplace.com/ Accessed 12 May 2022
Jawad LM, Sulong G (2015) Classification of novel selected region of interest for color image encryption. Res J Appl Sci Eng Technol 9(11):969–981
Joshi B, Joshi B, Mishra A, Arya V, Gupta AK, Perakovic D (2022) A comparative study of privacy-preserving homomorphic encryption techniques in cloud computing. International Journal of Cloud Applications and Computing (IJCAC) 12(1):1–11
L’ecuyer P, Simard R (2007) TestU01: AC library for empirical testing of random number generators. ACM Trans Math Softw (TOMS) 33(4):1–40
Liu Y, Tang J, Xie T (2014) Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Opt Laser Technol 60:111–115
Liu Y, Zhang J, Han D et al (2020) A multidimensional chaotic image encryption algorithm based on the region of interest. Multimed Tools Appl 79(25):17669–17705
Machkour M, Saaidi A, Benmaati AL (2015) A novel image encryption algorithm based on the two-dimensional logistic map and the Latin square image cipher. 3D Res 6(4):1–18
Mao QC, Sun HM, Liu YB, Jia RS (2019) Mini-YOLOv3: real-time object detector for embedded applications. IEEE Access 7:133529–133538
Murali P, Niranjana G, Paul AJ, Muthu JS (2022) Domain-flexible selective image encryption based on genetic operations and chaotic maps. Vis Comput 1–23
Noori Ghanim Z, Raheem Khoja SA (2022) A partial image encryption scheme based on DWT and texture segmentation. Cogent Eng 9(1):2026555
Nykvist C, Larsson M, Sodhro A, Gurtov A (2020) A lightweight portable intrusion detection communication system for auditing applications. Int J Commun Syst 33(7):e4327
Pandurangi Ramacharya B, Patil MR, Keralkar S (2022) Fast partial image encryption with fuzzy logic and chaotic mapping. Evol Intell 1–17
Raj MG, Pani SK (2022) Chaotic whale crow optimization algorithm for secure routing in the IoT environment. Int J Semant Web Inf Syst (IJSWIS) 18(1):1–25
Schneier B (2007) Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons
Sheela SJ, Suresh KV, Tandur D (2018) Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimed Tools Appl 77(19):25223–25251
Song W, Fu C, Zheng Y et al (2022) Protection of image ROI using chaos-based encryption and DCNN-based object detection. Neural Comput Appl 34(7):5743–5756
Xiao D, Fu Q, Xiang T, Zhang Y (2016) Chaotic image encryption of regions of interest. Int J Bifurcation Chaos 26(11):1650193
Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25
Yuan HM, Liu Y, Gong LH, Wang J (2017) A new image cryptosystem based on 2D hyper-chaotic system. Multimed Tools Appl 76(6):8087–8108
Zhang W, Yu H, Zhao YL et al (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36–50
Zhou Y, Bao L, Chen CP (2013) Image encryption using a new parametric switching chaotic system. Signal Process 93(11):3039–3052
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Ethics approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Conflict of interest
The authors declare that there are no conflicts of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Sheela, S.J., Suresh, K.V. Real time region of interest based chaotic image cryptosystem for IoT applications. Multimed Tools Appl 83, 16161–16177 (2024). https://doi.org/10.1007/s11042-023-16093-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-16093-3