Abstract
Traditional scrambling algorithms frequently rely on static and fixed scrambling modes, which lack the involvement of chaotic sequences during the scrambling phase. This results in poor randomness in the scrambling process and can leave key information, such as facial features in images, inadequately protected. In the event that such sensitive information is stolen, it could lead to significant trouble. To mitigate these issues, this paper presents an image encryption algorithm that incorporates face recognition and bitonic sequence techniques. The algorithm utilizes the SHA-512 (Secure Hash Algorithm) for key generation and the Chen system for generating chaotic sequences during the encryption process. Initially, the algorithm identifies the face and facial features within the image via face recognition and facial feature recognition technologies. A row-column scrambling algorithm, designed based on the characteristics of the bitonic sequence, is then implemented to scramble the facial features while the Zigzag algorithm is used to break the row-column correlation. With respect to the overall image scrambling, the Fisher Yeats scrambling algorithm is employed, and the entire image is uniformly diffused. Through simulation experiments and security tests, the proposed algorithm has shown better performance than other methods in terms of NPCR and UACI testing studies, resulting in outcomes closer to the ideal values of 99.6094% and 33.4635%, respectively. Other experimental data also demonstrates performance that is near ideal, and the decrypted images show good visual quality against various attacks. Overall, the proposed algorithm exhibits strong robustness.
Similar content being viewed by others
Data availability
Data will be made available on reasonable request.
References
Gao XY, Mou J, Xiong L, Sha YW, Yan HZ, Cao YH (2022) A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dyn 108(1):613–636
Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods Eng 27(1):15–43
Song W, Fu C, Zheng Y, Tie M, Liu J, Chen JX (2022) A parallel image encryption algorithm using intra bitplane scrambling. Math Comput Simul 204:71–88
Wang XY, Liu C, Jiang DH (2021) A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT. Inf Sci 574:505–527
Xian YJ, Wang XY (2021) Fractal sorting matrix and its application on chaotic image encryption. Inf Sci 547:1154–1169
Pourasad Y, Ranjbarzadeh R, Mardani A (2021) A new algorithm for digital image encryption based on chaos theory. Entropy 23(3):341
Kocarev L (2002) Chaos-based cryptography: A brief overview. IEEE Circuits Syst Mag 1(3):6–21
Chen H T, Wang Y H, Guo T Y et al (2021) Pre-trained image processing transformer. IEEE Conference on Computer Vision and Pattern Recognition 12294–12305
Lin HR, Wang CH, Cui L, Sun YC, Xu C, Yu F (2022) Brain-like initial-boosted hyperchaos and application in biomedical image encryption. IEEE Trans Industr Inf 18(2):8839–8850. https://doi.org/10.1109/TII.2022.3155599
Zamir S W, Arora A, Khan S, Hayat M, Khan F S, Yang M H, Shao L (2021) Multi-stage progressive image restoration. IEEE Conference on Computer Vision and Pattern Recognition 14816–14826
Sha YW, Bo S, Yang CX, Mou J, Jahanshahi H (2022) A chaotic image encryption scheme based on genetic central dogma and KMP method. Int J Bifurcation Chaos 32(12):2250186
Ye GD, Liu M, Wu MF (2022) Double image encryption algorithm based on compressive sensing and elliptic curve. Alex Eng J 61(9):6785–6795
Ding X H, Zhang X Y, Ma N N, Han J G, Ding G G, Sun J (2021) RepVGG: Making VGG-style convnets great again. IEEE Conf Comput Vis Pattern Recognit:13728–13737. https://doi.org/10.1109/CVPR46437.2021.01352
Wang XY, Gao S, Ye XL, Zhou S, Wang MX (2021) A new image encryption algorithm with Cantor Diagonal Scrambling based on the PUMCML System. Int J Bifurcation Chaos 31(1):2150003
Jo Y, Park J (2019) SC-FEGAN: Face editing generative adversarial network with user’s sketch and color. IEEE Int Conf Comput Vis:1745–1753. https://doi.org/10.1109/ICCV.2019.00183
Sun P Z, Zhang R F, Jiang Y et al (2021) Sparse R-CNN: End-to-end object detection with learnable proposals. IEEE Conf Comput Vis Pattern Recognit:14449–14458. https://doi.org/10.1109/CVPR46437.2021.01422
Wang XQ, Zhang H, Sun YJ, Wang XY (2021) A plaintext-related image encryption algorithm based on compressive sensing and a novel hyperchaotic system. Int J Bifurcation Chaos 31(2):2150021
Esser P, Rombach R, Ommer B (2021) Taming transformers for high-resolution image synthesis. IEEE Conference on Computer Vision and Pattern Recognition 12868–12878
Wang XY, Li YP (2021) Chaotic image encryption algorithm based on hybrid multi-objective particle swarm optimization and DNA sequence. Opt Lasers Eng 137:106393
Wang SM, Peng QQ, Du BX (2022) Chaotic color image encryption based on 4D chaotic maps and DNA sequence. Opt Laser Technol 148:107753
Wu YR, Zhang LL, Berretti S, Wan SH (2023) A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level. IEEE Trans Industr Inf 19(2):2089–2098
Wu XJ, Wang KS, Wang XY, Kan HB, Kurths J (2018) Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process 148:272–287
Li X L, Jiang Y R, Chen M R, Li F (2018) Research on iris image encryption based on deep learning. Eurasip J Image Video Process 126. https://doi.org/10.1186/s13640-018-0358-7
Zhao J, Yan SC, Feng JS (2022) Towards age-invariant face recognition. IEEE Trans Pattern Anal Mach Intell 44(1):474–487
Lu JW, Liong VE, Zhou XZ, Zhou J (2015) Learning compact binary face descriptor for face recognition. IEEE Trans Pattern Anal Mach Intell 37(10):2041–2056
Chen BJ, Liu X, Zheng YH, Zhao GY, Shi YQ (2022) A robust GAN-Generated face detection method based on dual-color spaces and an improved Xception. IEEE Trans Circuits Syst Video Technol 32(6):3527–3538
Ding CX, Tao DC (2015) Robust face recognition via multimodal deep face representation. IEEE Trans Multimedia 17(11):2049–2058
Jin B, Cruz L, Goncalves N (2022) Pseudo RGB-D face recognition. IEEE Sens J 22(22):21780–21794
Rivera AR, Castillo JR, Chae O (2013) Local directional number pattern for face analysis: face and expression recognition. IEEE Trans Image Process 22(5):1740–1752
Yan C G, Meng L X, Li L et al (2022) Age-invariant face recognition by multi-feature fusion and decomposition with self-attentio pattern recognition letters. ACM Trans Multimed Comput Commun Appl 18(1):29. https://doi.org/10.1145/3472810
Song L X, Gong D H, Li Z F, Liu C S, Liu W (2019) Occlusion robust face recognition based on mask learning with pairwise differential Siamese network. IEEE Int Conf Comput Vis 773–782. https://doi.org/10.1109/ICCV.2019.00086
Wang XY, Feng L, Zhao HY (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358
Wang XY, Guan NN (2020) A novel chaotic image encryption algorithm based on extended Zigzag confusion and RNA operation. Opt Laser Technol 131:106366
Li XJ, Mou J, Xiong L, Wang ZS, Xu J (2021) Fractional-order double-ring erbium-doped fiber laser chaotic system and its application on image encryption. Opt Laser Technol 140:107074
Chai XL, Fu JY, Gan ZH, Lu Y, Zhang YS (2022) An image encryption scheme based on multi-objective optimization and block compressed sensing. Nonlinear Dyn 108(3):2671–2704
Peters H, Schulz-Hildebrandt O, Luttenberger N (2011) Fast in-place, comparison-based sorting with CUDA: a study with bitonic sort. Concurrency and Computation-practice & experience 23(7):681–693
Mao N, Tong XJ, Zhang M, Wang Z (2023) Real-time image encryption algorithm based on combined chaotic map and optimized lifting wavelet transform. J Real-Time Image Proc 20(2):35
Yan SH, Gu BX, Wang ER, Ren Y (2023) Finite-time synchronization of multi-scroll hyperchaotic system and its application in image encryption. Math Comput Simul 206:391–409
Kitio GJ, Fanda AD, Feulefack IRK, Pone JRM, Kengne R, Tiedeu A (2023) Biomedical image encryption with a novel Memristive Chua Oscillator embedded in a microcontroller. Braz J Phys 53(3):56
Kumari P, Mondal B (2023) An encryption scheme based on grain stream cipher and chaos for privacy protection of image data on IoT network. Wireless Pers Commun 130(3):2261–2280
Yan DW, Shi H, Wu JN, Ji’E M, Wang LD, Duan SK (2023) Complex chaotic attractor via fractal process with parabolic map and triangular map. Euro Phys J Plus 138(4):343
Chai XL, Fu JY, Gan ZH, Lu Y, Zhang YS, Han DJ (2023) Exploiting semi-tensor product compressed sensing and hybrid cloud for secure medical image transmission. IEEE Internet Things J 10(8):7380–7392
Alexan W, Alexan N, Gab M (2023) Multiple-Layer image encryption utilizing fractional-order Chen hyperchaotic map and cryptographically secure PRNGs. Fractal Fractional 7(4):287
Silva-Garcia VM, Flores-Carapia R, Cardona-Lopez MA, Villarreal-Cervantes MG (2023) Generation of boxes and permutations using a bijective function and the Lorenz equations: An application to color image encryption. Mathematics 11(3):599
Acknowledgements
This research is supported by the National Natural Science Foundation of China (No: 61672124), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (No: MMJJ20170203), Liaoning Province Science and Technology Innovation Leading Talents Program Project (No: XLYC1802013), Key R&D Projects of Liaoning Province (No: 2019020105-JH2/103), Jinan City ‘20 universities’ Funding Projects Introducing Innovation Team Program (No: 2019GXRC031), Research Fund of Guangxi Key Lab of Multi-source Information Mining & Security (No: MIMS20-M-02).
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
This manuscript is the authors’ original work and has not been published nor has it been submitted simultaneously elsewhere. All authors have checked the manuscript and have agreed to the submission.
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Wang, X., Leng, Z. Image encryption algorithm based on face recognition, facial features recognition and bitonic sequence. Multimed Tools Appl 83, 31603–31627 (2024). https://doi.org/10.1007/s11042-023-16787-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-16787-8