Skip to main content
Log in

Image encryption algorithm based on face recognition, facial features recognition and bitonic sequence

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Traditional scrambling algorithms frequently rely on static and fixed scrambling modes, which lack the involvement of chaotic sequences during the scrambling phase. This results in poor randomness in the scrambling process and can leave key information, such as facial features in images, inadequately protected. In the event that such sensitive information is stolen, it could lead to significant trouble. To mitigate these issues, this paper presents an image encryption algorithm that incorporates face recognition and bitonic sequence techniques. The algorithm utilizes the SHA-512 (Secure Hash Algorithm) for key generation and the Chen system for generating chaotic sequences during the encryption process. Initially, the algorithm identifies the face and facial features within the image via face recognition and facial feature recognition technologies. A row-column scrambling algorithm, designed based on the characteristics of the bitonic sequence, is then implemented to scramble the facial features while the Zigzag algorithm is used to break the row-column correlation. With respect to the overall image scrambling, the Fisher Yeats scrambling algorithm is employed, and the entire image is uniformly diffused. Through simulation experiments and security tests, the proposed algorithm has shown better performance than other methods in terms of NPCR and UACI testing studies, resulting in outcomes closer to the ideal values of 99.6094% and 33.4635%, respectively. Other experimental data also demonstrates performance that is near ideal, and the decrypted images show good visual quality against various attacks. Overall, the proposed algorithm exhibits strong robustness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

Data availability

Data will be made available on reasonable request.

References

  1. Gao XY, Mou J, Xiong L, Sha YW, Yan HZ, Cao YH (2022) A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dyn 108(1):613–636

    Article  Google Scholar 

  2. Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods Eng 27(1):15–43

    Article  MathSciNet  Google Scholar 

  3. Song W, Fu C, Zheng Y, Tie M, Liu J, Chen JX (2022) A parallel image encryption algorithm using intra bitplane scrambling. Math Comput Simul 204:71–88

    Article  MathSciNet  Google Scholar 

  4. Wang XY, Liu C, Jiang DH (2021) A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT. Inf Sci 574:505–527

    Article  MathSciNet  Google Scholar 

  5. Xian YJ, Wang XY (2021) Fractal sorting matrix and its application on chaotic image encryption. Inf Sci 547:1154–1169

    Article  MathSciNet  Google Scholar 

  6. Pourasad Y, Ranjbarzadeh R, Mardani A (2021) A new algorithm for digital image encryption based on chaos theory. Entropy 23(3):341

    Article  ADS  MathSciNet  PubMed  PubMed Central  Google Scholar 

  7. Kocarev L (2002) Chaos-based cryptography: A brief overview. IEEE Circuits Syst Mag 1(3):6–21

    Article  Google Scholar 

  8. Chen H T, Wang Y H, Guo T Y et al (2021) Pre-trained image processing transformer. IEEE Conference on Computer Vision and Pattern Recognition 12294–12305

  9. Lin HR, Wang CH, Cui L, Sun YC, Xu C, Yu F (2022) Brain-like initial-boosted hyperchaos and application in biomedical image encryption. IEEE Trans Industr Inf 18(2):8839–8850. https://doi.org/10.1109/TII.2022.3155599

    Article  Google Scholar 

  10. Zamir S W, Arora A, Khan S, Hayat M, Khan F S, Yang M H, Shao L (2021) Multi-stage progressive image restoration. IEEE Conference on Computer Vision and Pattern Recognition 14816–14826

  11. Sha YW, Bo S, Yang CX, Mou J, Jahanshahi H (2022) A chaotic image encryption scheme based on genetic central dogma and KMP method. Int J Bifurcation Chaos 32(12):2250186

    Article  MathSciNet  Google Scholar 

  12. Ye GD, Liu M, Wu MF (2022) Double image encryption algorithm based on compressive sensing and elliptic curve. Alex Eng J 61(9):6785–6795

    Article  Google Scholar 

  13. Ding X H, Zhang X Y, Ma N N, Han J G, Ding G G, Sun J (2021) RepVGG: Making VGG-style convnets great again. IEEE Conf Comput Vis Pattern Recognit:13728–13737. https://doi.org/10.1109/CVPR46437.2021.01352

  14. Wang XY, Gao S, Ye XL, Zhou S, Wang MX (2021) A new image encryption algorithm with Cantor Diagonal Scrambling based on the PUMCML System. Int J Bifurcation Chaos 31(1):2150003

    Article  MathSciNet  Google Scholar 

  15. Jo Y, Park J (2019) SC-FEGAN: Face editing generative adversarial network with user’s sketch and color. IEEE Int Conf Comput Vis:1745–1753. https://doi.org/10.1109/ICCV.2019.00183

  16. Sun P Z, Zhang R F, Jiang Y et al (2021) Sparse R-CNN: End-to-end object detection with learnable proposals. IEEE Conf Comput Vis Pattern Recognit:14449–14458. https://doi.org/10.1109/CVPR46437.2021.01422

  17. Wang XQ, Zhang H, Sun YJ, Wang XY (2021) A plaintext-related image encryption algorithm based on compressive sensing and a novel hyperchaotic system. Int J Bifurcation Chaos 31(2):2150021

    Article  MathSciNet  Google Scholar 

  18. Esser P, Rombach R, Ommer B (2021) Taming transformers for high-resolution image synthesis. IEEE Conference on Computer Vision and Pattern Recognition 12868–12878

  19. Wang XY, Li YP (2021) Chaotic image encryption algorithm based on hybrid multi-objective particle swarm optimization and DNA sequence. Opt Lasers Eng 137:106393

    Article  Google Scholar 

  20. Wang SM, Peng QQ, Du BX (2022) Chaotic color image encryption based on 4D chaotic maps and DNA sequence. Opt Laser Technol 148:107753

    Article  Google Scholar 

  21. Wu YR, Zhang LL, Berretti S, Wan SH (2023) A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level. IEEE Trans Industr Inf 19(2):2089–2098

    Article  Google Scholar 

  22. Wu XJ, Wang KS, Wang XY, Kan HB, Kurths J (2018) Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process 148:272–287

    Article  Google Scholar 

  23. Li X L, Jiang Y R, Chen M R, Li F (2018) Research on iris image encryption based on deep learning. Eurasip J Image Video Process 126. https://doi.org/10.1186/s13640-018-0358-7

  24. Zhao J, Yan SC, Feng JS (2022) Towards age-invariant face recognition. IEEE Trans Pattern Anal Mach Intell 44(1):474–487

    Article  PubMed  Google Scholar 

  25. Lu JW, Liong VE, Zhou XZ, Zhou J (2015) Learning compact binary face descriptor for face recognition. IEEE Trans Pattern Anal Mach Intell 37(10):2041–2056

    Article  PubMed  Google Scholar 

  26. Chen BJ, Liu X, Zheng YH, Zhao GY, Shi YQ (2022) A robust GAN-Generated face detection method based on dual-color spaces and an improved Xception. IEEE Trans Circuits Syst Video Technol 32(6):3527–3538

    Article  Google Scholar 

  27. Ding CX, Tao DC (2015) Robust face recognition via multimodal deep face representation. IEEE Trans Multimedia 17(11):2049–2058

    Article  Google Scholar 

  28. Jin B, Cruz L, Goncalves N (2022) Pseudo RGB-D face recognition. IEEE Sens J 22(22):21780–21794

    Article  ADS  Google Scholar 

  29. Rivera AR, Castillo JR, Chae O (2013) Local directional number pattern for face analysis: face and expression recognition. IEEE Trans Image Process 22(5):1740–1752

    Article  ADS  MathSciNet  PubMed  Google Scholar 

  30. Yan C G, Meng L X, Li L et al (2022) Age-invariant face recognition by multi-feature fusion and decomposition with self-attentio pattern recognition letters. ACM Trans Multimed Comput Commun Appl 18(1):29. https://doi.org/10.1145/3472810

  31. Song L X, Gong D H, Li Z F, Liu C S, Liu W (2019) Occlusion robust face recognition based on mask learning with pairwise differential Siamese network. IEEE Int Conf Comput Vis 773–782. https://doi.org/10.1109/ICCV.2019.00086

  32. Wang XY, Feng L, Zhao HY (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358

    Article  Google Scholar 

  33. Wang XY, Guan NN (2020) A novel chaotic image encryption algorithm based on extended Zigzag confusion and RNA operation. Opt Laser Technol 131:106366

    Article  CAS  Google Scholar 

  34. Li XJ, Mou J, Xiong L, Wang ZS, Xu J (2021) Fractional-order double-ring erbium-doped fiber laser chaotic system and its application on image encryption. Opt Laser Technol 140:107074

    Article  CAS  Google Scholar 

  35. Chai XL, Fu JY, Gan ZH, Lu Y, Zhang YS (2022) An image encryption scheme based on multi-objective optimization and block compressed sensing. Nonlinear Dyn 108(3):2671–2704

    Article  Google Scholar 

  36. Peters H, Schulz-Hildebrandt O, Luttenberger N (2011) Fast in-place, comparison-based sorting with CUDA: a study with bitonic sort. Concurrency and Computation-practice & experience 23(7):681–693

    Article  Google Scholar 

  37. Mao N, Tong XJ, Zhang M, Wang Z (2023) Real-time image encryption algorithm based on combined chaotic map and optimized lifting wavelet transform. J Real-Time Image Proc 20(2):35

    Article  Google Scholar 

  38. Yan SH, Gu BX, Wang ER, Ren Y (2023) Finite-time synchronization of multi-scroll hyperchaotic system and its application in image encryption. Math Comput Simul 206:391–409

    Article  MathSciNet  Google Scholar 

  39. Kitio GJ, Fanda AD, Feulefack IRK, Pone JRM, Kengne R, Tiedeu A (2023) Biomedical image encryption with a novel Memristive Chua Oscillator embedded in a microcontroller. Braz J Phys 53(3):56

    Article  ADS  Google Scholar 

  40. Kumari P, Mondal B (2023) An encryption scheme based on grain stream cipher and chaos for privacy protection of image data on IoT network. Wireless Pers Commun 130(3):2261–2280

    Article  Google Scholar 

  41. Yan DW, Shi H, Wu JN, Ji’E M, Wang LD, Duan SK (2023) Complex chaotic attractor via fractal process with parabolic map and triangular map. Euro Phys J Plus 138(4):343

    Article  Google Scholar 

  42. Chai XL, Fu JY, Gan ZH, Lu Y, Zhang YS, Han DJ (2023) Exploiting semi-tensor product compressed sensing and hybrid cloud for secure medical image transmission. IEEE Internet Things J 10(8):7380–7392

    Article  Google Scholar 

  43. Alexan W, Alexan N, Gab M (2023) Multiple-Layer image encryption utilizing fractional-order Chen hyperchaotic map and cryptographically secure PRNGs. Fractal Fractional 7(4):287

    Article  Google Scholar 

  44. Silva-Garcia VM, Flores-Carapia R, Cardona-Lopez MA, Villarreal-Cervantes MG (2023) Generation of boxes and permutations using a bijective function and the Lorenz equations: An application to color image encryption. Mathematics 11(3):599

    Article  Google Scholar 

Download references

Acknowledgements

This research is supported by the National Natural Science Foundation of China (No: 61672124), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (No: MMJJ20170203), Liaoning Province Science and Technology Innovation Leading Talents Program Project (No: XLYC1802013), Key R&D Projects of Liaoning Province (No: 2019020105-JH2/103), Jinan City ‘20 universities’ Funding Projects Introducing Innovation Team Program (No: 2019GXRC031), Research Fund of Guangxi Key Lab of Multi-source Information Mining & Security (No: MIMS20-M-02).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Xingyuan Wang or Ziyu Leng.

Ethics declarations

This manuscript is the authors’ original work and has not been published nor has it been submitted simultaneously elsewhere. All authors have checked the manuscript and have agreed to the submission.

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, X., Leng, Z. Image encryption algorithm based on face recognition, facial features recognition and bitonic sequence. Multimed Tools Appl 83, 31603–31627 (2024). https://doi.org/10.1007/s11042-023-16787-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16787-8

Keywords

Navigation