Skip to main content
Log in

Image encryption and compression based on the generalized knight’s tour, discrete cosine transform and chaotic maps

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

An efficient and simple encryption and compression scheme for digital image is reported in this paper. This scheme is based on the algorithm of the generalized knight’s tour, discrete cosine transform and non-linear chaotic maps. In this scheme, according to the structure of compression, confusion and diffusion are attained by methods of the generalized knight’s tour and chaotic maps. Firstly, the generalized knight’s tour algorithm is utilized to scramble the pixels while the data correlation preserved. Then, the chaotic system is used to generate a pseudorandom permutation to encrypt the part of coefficients from discrete cosine transform for diffusion. Experimental results show that the proposed scheme can gain robust security and a high compression ratio, which indicates that the proposed scheme is practicable.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos 16:2129–2151

    Article  MathSciNet  MATH  Google Scholar 

  2. Bai S, Liao X-F, Qu X-H, Liu Y-J (2006) Generalized knight’s tour problem and its solutions algorithm, computational intelligence and security. International Conference 1:570–573

  3. Bai S, Yang X-F, Zhu G-B, Jiang D-L, Huang J (2010) Generalized knight’s tour on 3D chessboards. Discret Appl Math 158:1727–1731

    Article  MathSciNet  MATH  Google Scholar 

  4. Chen J, Zhou J, Wong K-W (2011) A modified chaos-based joint compression and encryption scheme, circuits and systems II: express briefs. IEEE Transactions on 58:110–114

    Google Scholar 

  5. Delei J, Sen B, Wenming D (2008) An image encryption algorithm based on Knight’s tour and slip encryption-filter,. computer science and software engineering, 2008 international conference on 1:251–255

    Article  Google Scholar 

  6. Gordon VS, Slocum TJ (2004) The knight’s tour-evolutionary vs. depth-first search, Evolutionary Computation, 2004. CEC2004. Congress on 2:1435–1440

    Google Scholar 

  7. Grangetto M, Magli E, Olmo G (2006) Multimedia selective encryption by means of randomized arithmetic coding, multimedia. IEEE Transactions on 8:905–917

    Google Scholar 

  8. Gupta K, Silakari S (2012) Novel approach for fast compressed hybrid color image cryptosystem. Adv Eng Softw 49:29–42

    Article  Google Scholar 

  9. Jakimoski G, Subbalakshmi K (2008) Cryptanalysis of some multimedia encryption schemes, multimedia. IEEE Transactions on 10:330–338

    Google Scholar 

  10. Kim H, Wen J, Villasenor JD (2007) Secure arithmetic coding, signal processing. IEEE Transactions on 55:2263–2272

    Article  MathSciNet  Google Scholar 

  11. Li S, Li C, Lo K-T, Chen G (2006) Cryptanalysis of an image encryption scheme. J Electron Imaging 15:043012–043013

  12. Li S, Li C, Kuo JC-C (2011) On the security of a secure Lempel-Ziv-Welch (LZW) algorithm, multimedia and expo (ICME). I.E. International Conference pp 1–5

  13. Li C, Liu Y, Zhang LY, Wong K-w (2013) Breaking an image compression and encryption scheme based on Chinese Remainder Theorem. arXiv preprint arXiv 1306(5615)

  14. Nivasch G (2003) Experimental results on Hamiltonian-cycle-finding algorithms. Technical Report, Weizman Institute, Israel, pp 1–15

  15. Philip A (2013) A generalized pseudo-knight’ s tour algorithm for encryption of an image, potentials. IEEE 32:10–16

    Google Scholar 

  16. Sen B, Chang-Xiu C (2002) A novel algorithm for scrambling the details of digital image, Intelligent Control and Automation, 2002. Proceedings of the 4th World Congress on 2:1333–1336

    Google Scholar 

  17. Thanikaiselvan V, Arulmozhivarman P, Amirtharajan R, Rayappan JBB (2012) Horse riding and hiding in image for data guarding. Procedia Engineering 30:36–44

    Article  Google Scholar 

  18. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity, image processing. IEEE Transactions on 13:600–612

    Google Scholar 

  19. Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system,. J Syst Softw 85(2):290–299

    Article  Google Scholar 

  20. Wen J, Kim H, Villasenor JD (2006) Binary arithmetic coding with key-based interval splitting, signal processing letters. IEEE 13:69–72

    Google Scholar 

  21. Wong K-W, Yuen C-H (2008) Embedding compression in chaos-based cryptography, circuits and systems II: express briefs. IEEE Transactions on 55:1193–1197

    Article  Google Scholar 

  22. Wu C-P, Kuo C-C (2005) Design of integrated multimedia compression and encryption systems, multimedia. IEEE Transactions on 7:828–839

    Google Scholar 

  23. Yuen CH, Wong KW (2011) A chaos-based joint image compression and encryption scheme using DCT and SHA-1. Appl Soft Comput 11:5092–5098

    Article  Google Scholar 

  24. Zhang Y, Xiao D, Liu H, Nan H (2014) GLS coding based security solution to JPEG with the structure of aggregated compression and encryption. Commun Nonlinear Sci Numer Simul 19:1366–1374

    Article  Google Scholar 

  25. Zhou J, Au OC (2008) Comments on” a novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system, circuits and systems I: regular papers. IEEE Transactions on 55:3368–3369

    Article  Google Scholar 

  26. Zhou J, Liang Z, Chen Y, Au OC (2007) Security analysis of multimedia encryption schemes based on multiple Huffman table, signal processing letters. IEEE 14:201–204

    Google Scholar 

  27. Zhou J, Au OC, Wong P-W (2009) Adaptive chosen-ciphertext attack on secure arithmetic coding, signal processing. IEEE Transactions on 57:1825–1838

    Article  MathSciNet  Google Scholar 

  28. Zhou J, Liu X, Au OC, et al. (2014) Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation[J]. IEEE Transactions on Information Forensics & Security 9(1):39–50

    Article  Google Scholar 

  29. Zhu Z, Zhang Q, Yu H, et al. (2009) A New Hyper-Chaos Generated from Chen’s System via an External Periodic Perturbation, Chaos-Fractals Theories and Applications, 2009. IWCFTA’09. International Workshop on IEEE:260–266

  30. Zhu H, Zhao C, Zhang X (2013) A novel image encryptionCcompression scheme using hyper-chaos and Chinese remainder theorem. Signal Process Image Commun 28:670–680

    Article  Google Scholar 

Download references

Acknowledgments

The work on this paper is supported by National Natural Science Foundation of China (Grant No.61272043), Basic and Frontier Project of Chongqing (Project No. cstc2013jjB40009), Program for Innovative Research Team in University of Chongqing (No. KJTD201343) and innovation project of graduate students (CYS14203).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bai Sen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xiaoyong, J., Sen, B., Guibin, Z. et al. Image encryption and compression based on the generalized knight’s tour, discrete cosine transform and chaotic maps. Multimed Tools Appl 76, 12965–12979 (2017). https://doi.org/10.1007/s11042-016-3684-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3684-8

Keywords

Navigation