skip to main content
10.1145/3453187.3453406acmotherconferencesArticle/Chapter ViewAbstractPublication PagesebimcsConference Proceedingsconference-collections
research-article

Performance Analysis of Adaptive Variational Mode Decomposition Approach for Image Encryption

Authors Info & Claims
Published:24 March 2021Publication History

ABSTRACT

A mapping function relation is generated by a variational mode decomposition (VMD) transform, and an adaptive image encryption algorithm based on VMD is proposed. The image sequence is generated using VMD is divided into high frequency, middle frequency, and low frequency according to the entropy value of its mode transformation. The advantages of this algorithm are that the cross-mapping is generated according to VMD, the low-frequency part is the main energy concentration area of the image, the image processing encryption is carried out in the other generated images, the encryption does not affect the original image, and the robustness is improved. The simulation results showed that the algorithm had a good effect of encryption and restoration by measuring the root mean square error and the Euclidean distance. Experiment showed that the proposed method was more robust to the complex distribution of faces than the existing methods considered, yielding favourably comparable results to the state-of-the-art methods on data encryption. The results also showed that the proposed method was scalable in other areas of datasets. Furthermore, we showed that the proposed method did not need the number of features as a prior, was aware of noises and outliers, and could be extended to a multi-view version for more accurate clustering accuracy. These steps, which should require generation of the final output from the styled paper, are mentioned here in this paragraph. First, users have to run "Reference Numbering" from the "Reference Elements" menu; this is the first step to start the bibliography marking (it should be clicked while keeping the cursor at the beginning of the reference list). After the marking is complete, the reference element runs all the options under the "Cross Linking" menu.

References

  1. JIANG Hong, SU Yang. Denoising Method Based on Improved Wavelet Threshold Function. [J] Laser & Infrared, 2016, 46(1):119--122.Google ScholarGoogle Scholar
  2. Jiang L, Fu C, Liu W, etal. Lidar Backscattering Signal Denoising Method based on Adaptive Multi-scale Morpho-logical Filtering and EMD [J]. Infrared and Laser Engineering, 2015, 44(5):1673--1679.Google ScholarGoogle Scholar
  3. Xia H, Shang guan M, Wang C, et al. Micro-pulse upcon-version Doppler lidar for wind and visibility detection in the atmospheric boundary layer[J]. Optics Letters, 2016, 41(22):5218Google ScholarGoogle ScholarCross RefCross Ref
  4. Chang J, Zhu L, Li H, et al. Noise reduction in Lidar signal using correlation-based EMD combined with soft thresholding and roughness penalty[J]. Optics Communications, 2018, 407:290--295.Google ScholarGoogle ScholarCross RefCross Ref
  5. CUI Shanzheng, GUO Yanzhen, LIANG Zhao, et al. Application of variational mode decomposition in removing ECG signal baseline drift[J]. Journal of Electronic Measurement and Instrumentation, 2018, 32(2): 167--171.Google ScholarGoogle Scholar
  6. Konstantin Dragomiretskiy, Dominique Zosso Variational Mode Decomposition IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 62, NO., 2014, 531--544.Google ScholarGoogle Scholar
  7. An X, Yang J. Denoising of hydropower unit vibration signal based on variational mode decomposition and approximate entropy[J]. Transactions of the Institute of Measurement&Control, 2016, 38(3).Google ScholarGoogle Scholar
  8. N. Pustelnik, P. Borgnat, and P. Flandrin, A multicomponent proximalalgorithm for empirical mode decomposition, in Proc. IEEE 20th Eur. Signal Process. Conf. (EUSIPCO), 2012, 1880--1884.Google ScholarGoogle Scholar
  9. T. Y. Hou and Z. Shi, Adaptive data analysis via sparse time-frequency representation, Adv. Adapt. Data Anal., vol. 03, no. 1 & 2. 1--28, Apr. 2011.Google ScholarGoogle Scholar
  10. XU Fan, CHANG Jian-hua, LIU Bing-gang, etl. De-noising method research for lidar echo signal based on variational mode decomposition [J]. LASER&INFARED. 2018, Vol. 48, No. 11, 1443--1448.Google ScholarGoogle Scholar
  11. XIAO Han, LV Yong, WANG Tao. Detrended fluctuation analysis to gears vibration signals and its application infault classification[J]. Journal of Vibration Engineering, 2015(2):331--336.Google ScholarGoogle Scholar
  12. M. Rostaghi, H. Azami, Dispersion entropy: a measure for time series analysis, IEEE Signal Process. Lett. 2016 (23), 1--1.Google ScholarGoogle Scholar
  13. F. ACastano, AM. Hernandez, Autoregressive Models of Electrocardiographicsignal Contaminated with Motion Artifacts: Benchmark for Biomedical Signalprocessing Studies, in: VII Latin American Congress on BiomedicalEngineering CLAIB 2016, Bucaramanga, Santander, Colombia, October 26th to 28th, 2016 IFMBE Proceedings, 2017, pp. 437--440.Google ScholarGoogle Scholar
  14. H. Azami, M. Rostaghi, D. Abasolo, J. Escudero, Refined composite multiscaledispersion entropy and its application to biomedical signals, IEEE Trans. Biomed. Eng. 2017 (64)(12) 2872--2879.Google ScholarGoogle Scholar
  15. A. B. Das, M. I. H. Bhuiyan, Discrimination and classification of focal andnon-focal EEG signals using entropy-based features in the EMD-DWT domain, Biomed. Signal Process. Control 2016 (29) 11--21.Google ScholarGoogle Scholar
  16. Zhang L F, Li J, Tian P. Application of Kalman Filter for Image Reconstruction of Electrical Capacitance Tomography[J]. Acta Metrologica Sinica, 2017, 38(3): 315--318.Google ScholarGoogle Scholar
  17. J. Manger, A chosen ciphertext attack on rsa optimal asymmetric encryption padding (oaep) as standardized in pkcs# 1 v2. 0, in: Annual International Cryptology Conference, Springer, 2001, pp. 230--238.Google ScholarGoogle Scholar
  18. X. Zhang W. Chen, A new chaotic algorithm for image encryption in: ICALIP 20 08 - 20 08 International Conference on Audio, Language and Image Processing, Proceedings, 2008, pp. 889--892.Google ScholarGoogle Scholar
  19. Tan Y, Huang H X, Xu J M, et al. Road edge detection from remote sensing image based on improved Sobel operator [J]. RemoteSensing for Land and R esources, 2016, 28 (3): 7--11.doi: 10. 6046/gtzyyg. 2016.03.02.Google ScholarGoogle Scholar
  20. Y. Zhou, L. Bao, C. L. P. Chen, A new 1D chaotic system for image encryption, Signal Process. 97 (2014) 172--182.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. X Huang, Image encryption algorithm using chaotic chebyshev generator, Nonlinear Dyn. 67 (4) (2012) 2411--2417.Google ScholarGoogle ScholarCross RefCross Ref
  22. N. K. Pareek, V. Patidar, K. K. Sud, Image encryption using chaotic logistic map, Image Vis. Comput. 24 (9) (2006) 926--934.Google ScholarGoogle ScholarCross RefCross Ref
  23. G. Chen, Y. Mao, C. K. Chui, A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos Solit. Fract. 21 (3) (2004) 749--761.Google ScholarGoogle ScholarCross RefCross Ref
  24. D. Zhang, F. Zhang, Chaotic encryption and decryption of JPEG image, Optik (Stuttg) 125 (2) (2014) 717--720.Google ScholarGoogle ScholarCross RefCross Ref
  25. Z. Tang, X. Zhang, W. Lan, Efficient image encryption with block shuffling and chaotic map, Multimed. Tools Appl. 74 (15) (2015) 5429--5448.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. A. Kanso, M. Ghebleh, A novel image encryption algorithm based on a 3D chaotic map, Commun. Nonlinear Sci. Numer. Simul. 17 (7) (2012) 2943--2959.Google ScholarGoogle ScholarCross RefCross Ref
  27. S. Liu, J. Sun, Z. Xu, An improved image encryption algorithm based on chaotic system, J. Comput. (Taipei) 4 (11) (2009) 1091--1100.Google ScholarGoogle ScholarCross RefCross Ref
  28. B. Wang, Y. Xie, C. Zhou, S. Zhou, X. Zheng, Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps, Optik (Stuttg) 127 (7) (2016) 3541--3545.Google ScholarGoogle ScholarCross RefCross Ref
  29. G. Srividya, P. Nandakumar, A Triple-Key chaotic image encryption method, in: ICCSP 2011 - 2011 International Conference on Communications and Signal Processing, 2011, pp. 266--270.Google ScholarGoogle ScholarCross RefCross Ref
  30. B. Norouzi, S. Mirzakuchaki, A fast color image encryption algorithm based on hyper-chaotic systems, Nonlinear Dyn. 78 (2) (2014) 995--1015Google ScholarGoogle ScholarCross RefCross Ref
  31. F. Y. Sun, S. T. Liu, Z. W. Lü, Image encryption using high-dimension chaotic sys- tem, Chin Phys. 16 (12) (2007) 3616--3623.Google ScholarGoogle ScholarCross RefCross Ref
  32. P. Khade, M. Narnaware, 3D Chaotic functions for image encryption, IJCSI Int. J. Comput. Sci. Issues 9 (3) (2012) 323--328.Google ScholarGoogle Scholar
  33. Y. Zhou, L. Bao, C. L. Chen Image encryption using a new parametric switching chaotic system, Signal Process. 93 (11) (2013) 3039--3052.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. A. Pisarchik, M. Zanin, Image encryption with chaotically coupled chaotic maps, Physica D 237 (20) (2008) 2638--2648.Google ScholarGoogle ScholarCross RefCross Ref
  35. H. Al Haj Hassan, A. Kassem, Y. Harkouss, R. Assaf, S. El Assad, New chaotic image encryption technique, in: 2012 Symposium on Broadband Networks and Fast Internet, RELABIRA 2012, 2012, pp. 103--108.Google ScholarGoogle Scholar
  36. Z. Parvin, H. Seyedarabi, M. Shamsi, A new secure and sensitive image encryption scheme based on new substitution with chaotic function, Multimed. Tools Appl. 75 (17) (2016) 10631--10648.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. S. El Assad, M. Farajallah, A new chaos-based image encryption system, Signal Process. Image Commun. 41 (2016) 144--157.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. L. Bao, Y. Zhou, C. L. P. Chen, H. Liu, A new chaotic system for image encryption, in: Proceedings 2012 International Conference on System Science and Engi- neering, ICSSE 2012, IEEE, 2012, pp. 69--73.Google ScholarGoogle ScholarCross RefCross Ref
  39. T. Zhang, Y. Zhou, C. L. P. Chen, A new combined chaotic system for image en- cryption, in: CSAE 2012 - Proceedings, 2012 IEEE International Conference on Computer Science and Automation Engineering, 2, 2012, pp. 331--335.Google ScholarGoogle Scholar
  40. M. Kalpana, K. Ratnavelu, P. Balasubramaniam, M. Kamali, Synchronization of chaotic-type delayed neural networks and its application, Nonlinear Dyn. (2018) 1--13.Google ScholarGoogle Scholar
  41. G. Jakimoski, L. Kocarev, Chaos and cryptography: block encryption ciphers based on chaotic maps, IEEE Trans. Circuits Syst. I 48 (2) (2001) 163--169.Google ScholarGoogle ScholarCross RefCross Ref
  42. Y. Zhou, W. Cao, C. Philip Chen, Image encryption using binary bitplane, Signal Process. 100 (2014) 197--207.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. K. Ratnavelu, M. Kalpana, P. Balasubramaniam, K. Wong, P. Raveendran, Im- age encryption method based on chaotic fuzzy cellular neural networks, Signal Process. 140 (2017) 87--96.Google ScholarGoogle ScholarCross RefCross Ref
  44. X. Chai, X. Zheng, Z. Gan, D. Han, Y. Chen, An image encryption algorithm based on chaotic system and compressive sensing, Signal Process. 148 (2018) 124--144.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, Technical Report, Booz-Allen and Hamilton Inc Mclean Va, 2001.Google ScholarGoogle Scholar
  46. S. H. Strogatz, Nonlinear dynamics and chaos, 48, Addison-Wesley Pub, 1994.Google ScholarGoogle Scholar
  47. B. R. Hunt, E. Ott, Defining chaos, Chaos 25 (9) (2015).Google ScholarGoogle ScholarCross RefCross Ref
  48. L. Kocarev, S. Lian, Chaos-based cryptography: Theory, algorithms and applica- tions, 354, Springer, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  49. M. Asgari Chenaghlu, S. Jamali, N. Nikzad Khasmakhi, A novel keyed parallel hashing scheme based on a new chaotic system, Chaos Solit. Fract. 87 (2016) 216--225.Google ScholarGoogle ScholarCross RefCross Ref
  50. S. Lynch, Dynamical systems with applications using MATLAB, Springer, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  51. M. T. Rosenstein, J. J. Collins, C. J. De Luca, A practical method for calculating largest lyapunov exponents from small data sets, Physica D 65 (1--2) (1993) 117--134.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Z. Hua, Y. Zhou, Dynamic parameter-control chaotic system, IEEE Trans. Cybern 46 (12) (2016) 3330--3341.Google ScholarGoogle ScholarCross RefCross Ref
  53. Y. Wu, J. P. Noonan, S. Agaian, Shannon entropy based randomness measurement and test for image encryption, arXiv:1103.5520 (2011).Google ScholarGoogle Scholar
  54. A. G. Weber, The USC-SIPI Image Database Version 5, USC-SIPI Report, 1997.Google ScholarGoogle Scholar
  55. S. Amina, F. K. Mohamed, An efficient and secure chaotic cipher algorithm for image content preservation, Commun. Nonlinear Sci. Numer. Simul 60 (2018) 12--32.Google ScholarGoogle ScholarCross RefCross Ref
  56. E. Yavuz, M. C. Kasapba s ι, E. Yamaç, et al., A chaos-based image encryption al- gorithm with simple logical functions, Comput. Electr. Eng 54 (2016) 471--483.Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. M. Farajallah, S. El Assad, O. Deforges, Fast and secure chaos-based cryptosystem for images, Int. J. Bifurcation Chaos 26 (02) (2016) 1650021.Google ScholarGoogle ScholarCross RefCross Ref
  58. M. Farajallah, Chaos-based Crypto and Joint Crypto-Compression Systems for Images and Videos, Universite de Nantes, 2015 Ph. D. thesis.Google ScholarGoogle Scholar
  59. Z. liang Zhu, W. Zhang, K. wo Wong, H. Yu, A chaos-based symmetric image encryption scheme using a bit-level permutation, Inf. Sci. (NY) 181 (6) (2011) 1171--1186.Google ScholarGoogle Scholar

Index Terms

  1. Performance Analysis of Adaptive Variational Mode Decomposition Approach for Image Encryption

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      EBIMCS '20: Proceedings of the 2020 3rd International Conference on E-Business, Information Management and Computer Science
      December 2020
      718 pages
      ISBN:9781450389099
      DOI:10.1145/3453187

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 24 March 2021

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      EBIMCS '20 Paper Acceptance Rate112of566submissions,20%Overall Acceptance Rate143of708submissions,20%
    • Article Metrics

      • Downloads (Last 12 months)4
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader