Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Efficient color image encryption by color-grayscale conversion based on steganography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Traditional image encryption algorithms usually aim to encrypt the RGB channels of color plain images separately. In this paper, a novel dimension reduction method is proposed for color image encryption, where a color plain image is first converted into a grayscale image by using steganography technique followed by an encryption operation on the resultant grayscale image thereby reducing the dimension of the encryption. And the color information can be restored back without losing any details. More specifically, a color plain image is first converted into the YCbCr channels, where the Y channel is used as the steganography carrier and to hide the other two channels that are down-sampled by a bicubic interpolation. Our algorithm can compress and encrypt the color plain image to generate a grayscale cipher image so as to reduce the repeatability of encryption. Furthermore, only the used pixel values are encrypted, where a bridge is built between binary image encryption and traditional grayscale image encryption. The security and performance of the proposed image encryption algorithm are analyzed, and the unification between binary image encryption and grayscale image encryption is achieved.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Algorithm 1:
Fig. 1
Algorithm 2:
Algorithm 3:
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data availability

The data that support the findings of this study are available upon reasonable request from the authors.

References

  1. Athira V, George S N, Deepthi P P (2013) A novel encryption method based on compressive sensing. International Mutli-conference on automation, computing, communication, control and compressed sensing (iMac4s). IEEE: 271-275

  2. Bao L, Zhou Y (2015) Image encryption: generating visually meaningful encrypted images. Inf Sci 324:197–207

    Article  MathSciNet  MATH  Google Scholar 

  3. Bao W, Zhu C (2022) A secure and robust image encryption algorithm based on compressive sensing and DNA coding. Multimed Tools Appl 81:15977–15996

    Article  Google Scholar 

  4. Bao H, Hua Z, Li H, Chen M, Bao B (2021) Discrete memristor hyperchaotic maps. IEEE Trans Circuits Syst I: Regul Pap 68(11):4534–4544

    Article  Google Scholar 

  5. Calderbank AR, Daubechies I, Sweldens W, Yeo BL (1998) Wavelet transforms that map integers to integers. Appl Comput Harmon Anal 5(3):332–369

    Article  MathSciNet  MATH  Google Scholar 

  6. Chai X, Gan Z, Chen Y, Zhang Y (2017) A visually secure image encryption scheme based on compressive sensing. Signal Process 134:35–51

    Article  Google Scholar 

  7. Chai X, Zheng X, Gan Z, Han D, Chen Y (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124–144

    Article  Google Scholar 

  8. Chai X, Wu H, Gan Z, Zhang Y, Chen Y, Nixon KW (2020) An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding. Opt Lasers Eng 124:105837

    Article  Google Scholar 

  9. Chai X, Wu H, Gan Z, Han D, Zhang Y, Chen Y (2021) An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing. Inf Sci 556:305–340

    Article  MathSciNet  MATH  Google Scholar 

  10. Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474

    Article  MATH  Google Scholar 

  11. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3):749–761

    Article  MathSciNet  MATH  Google Scholar 

  12. Chen E, Min L, Chen G (2017) Discrete chaotic systems with one-line equilibria and their application to image encryption. Int J Bifurcat Chaos 27(03):1750046

    Article  MathSciNet  MATH  Google Scholar 

  13. Chen X, Zou M, Yang B, Wang Z, Wu N, Qi L (2021) A visually secure image encryption method based on integer wavelet transform and rhombus prediction. Math Biosci Eng: MBE 18(2):1722–1739

    Article  MATH  Google Scholar 

  14. Deng J, Zhao S, Wang Y, Wang L, Wang H, Sha H (2017) Image compression-encryption scheme combining 2D compressive sensing with discrete fractional random transform. Multimed Tools Appl 76(7):10097–10117

    Article  Google Scholar 

  15. Dong Y, Zhao G, Ma Y, Pan Z, Wu R (2022) A novel image encryption scheme based on pseudo-random coupled map lattices with hybrid elementary cellular automata. Inf Sci 593:121–154

    Article  Google Scholar 

  16. Donoho DL (2006) Compressed sensing. IEEE Trans Inf Theory 52(4):1289–1306

    Article  MathSciNet  MATH  Google Scholar 

  17. Duan CF, Zhou J, Gong LH, Wu JY, Zhou NR (2022) New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method. Opt Lasers Eng 150:106881

    Article  Google Scholar 

  18. Eftekhari A, Babaie-Zadeh M, Moghaddam HA (2011) Two-dimensional random projection. Signal Process 91(7):1589–1603

    Article  MATH  Google Scholar 

  19. Gao X, Mou J, Xiong L, Sha Y, Yan H, Cao Y (2022) A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dynamics 108:613–636

    Article  Google Scholar 

  20. Hua Z, Zhou Y (2016) Image encryption using 2D logistic-adjusted-sine map. Inf Sci 339:237–253

    Article  Google Scholar 

  21. Hua Z, Zhu Z, Chen Y, Li Y (2021) Color image encryption using orthogonal Latin squares and a new 2D chaotic system. Nonlinear Dynamics 104(4):4505–4522

    Article  Google Scholar 

  22. Hua Z, Zhang K, Li Y, Zhou Y (2021) Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing. Signal Process 183:107998

    Article  Google Scholar 

  23. Hua Z, Chen Y, Bao H, Zhou Y (2021) Two-dimensional parametric polynomial chaotic system. IEEE Trans Syst Man Cybern Syst. https://doi.org/10.1109/TSMC.2021.3096967

  24. Huo D, Zhu X, Dai G, Yang H, Zhou X, Feng M (2020) Novel image compression–encryption hybrid scheme based on DNA encoding and compressive sensing. Applied Physics B 126(3):1–9

    Article  Google Scholar 

  25. Huo D, Zhu Z, Wei L, Han C, Zhou X (2021) A visually secure image encryption scheme based on 2D compressive sensing and integer wavelet transform embedding. Opt Commun 492:126976

    Article  Google Scholar 

  26. Iqbal N, Hanif M (2021) An efficient grayscale image encryption scheme based on variable length row-column swapping operations. Multimed Tools Appl 80(30):36305–36339

    Article  Google Scholar 

  27. Jiang D, Liu L, Zhu L, Wang X, Rong X, Chai H (2021) Adaptive embedding: a novel meaningful image encryption scheme based on parallel compressive sensing and slant transform. Signal Process 188:108220

    Article  Google Scholar 

  28. Kanso A, Ghebleh M (2017) An algorithm for encryption of secret images into meaningful images. Opt Lasers Eng 90:196–208

    Article  Google Scholar 

  29. Li T, Du B, Liang X (2020) Image encryption algorithm based on logistic and two-dimensional lorenz. IEEE Access 8:13792–13805

    Article  Google Scholar 

  30. Liao X, Wang H (2021) An innovative technique for image encryption using tri-partite graph and chaotic maps. Multimed Tools Appl 80(14):21979–22005

    Article  Google Scholar 

  31. Lin CC, Shiu PF (2010) High capacity data hiding scheme for DCT-based images. J Inf Hiding Multimed Signal Process 1(3):220–240

    Google Scholar 

  32. Lin H, Wang C, Cui L, Sun Y, Xu C, Yu F (2022) Brain-like initial-boosted hyperchaos and application in biomedical image encryption. IEEE Trans Industr Inform:1. https://doi.org/10.1109/TII.2022.3155599

  33. Liu S, Guo C, Sheridan JT (2014) A review of optical image encryption techniques. Opt Laser Technol 57:327–342

    Article  Google Scholar 

  34. Loukhaoukha K, Nabti M, Zebbiche K (2013) An efficient image encryption algorithm based on blocks permutation and Rubik's cube principle for iris images. The 8th international workshop on systems, signal processing and their applications (WoSSPA). IEEE: 267-272

  35. Loukhaoukha K, Refaey A, Zebbiche K, Shami A (2018) Efficient and secure cryptosystem for fingerprint images in wavelet domain. Multimed Tools Appl 77(8):9325–9339

    Article  Google Scholar 

  36. Miri A, Faez K (2018) An image steganography method based on integer wavelet transform. Multimed Tools Appl 77(11):13133–13144

    Article  Google Scholar 

  37. Mohimani H, Babaie-Zadeh M, Jutten C (2008) A fast approach for overcomplete sparse decomposition based on smoothed l0 norm. IEEE Trans Signal Process 57(1):289–301

    Article  MATH  Google Scholar 

  38. Ping P, Fu J, Mao Y, Xu F, Gao J (2019) Meaningful encryption: generating visually meaningful encrypted images by compressive sensing and reversible color transformation. IEEE Access 7:170168–170184

    Article  Google Scholar 

  39. Rani N, Sharma SR, Mishra V (2022) Grayscale and colored image encryption model using a novel fused magic cube. Nonlinear Dynamics 108:1773–1796

    Article  Google Scholar 

  40. Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379–423

    Article  MathSciNet  MATH  Google Scholar 

  41. Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358

    Article  MATH  Google Scholar 

  42. Wang H, Xiao D, Li M, Xiang Y, Li X (2019) A visually secure image encryption scheme based on parallel compressive sensing. Signal Process 155:218–232

    Article  Google Scholar 

  43. Wang X, Liu C, Jiang D (2021) A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT. Inf Sci 574:505–527

    Article  MathSciNet  Google Scholar 

  44. Wang S, Peng Q, Du B (2022) Chaotic color image encryption based on 4D chaotic maps and DNA sequence. Opt Laser Technol 148:107753

    Article  Google Scholar 

  45. Wu Y, Zhou Y, Noonan J P, Panetta K, Agaian S (2010) Image encryption using the sudoku matrix. Mobile multimedia/image processing, security, and applications 2010. International Society for Optics and Photonics, 7708: 77080P

  46. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. J Sel Areas Telecommun (JSAT) 1(2):31–38

    Google Scholar 

  47. Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci 222:323–342

    Article  MathSciNet  MATH  Google Scholar 

  48. Wu Y, Zhou Y, Noonan JP, Agaian S (2014) Design of image cipher using latin squares. Inf Sci 264:317–339

    Article  MathSciNet  MATH  Google Scholar 

  49. Xian Y, Wang X, Teng L, Yan X, Li Q, Wang X (2022) Cryptographic system based on double parameters fractal sorting vector and new spatiotemporal chaotic system. Inf Sci 596:304–320

    Article  Google Scholar 

  50. Yang Y, Yuhua P, Zhaoguang L (2007) A fast algorithm for YCbCr to RGB conversion. IEEE Trans Consum Electron 53(4):1490–1493

    Article  Google Scholar 

  51. Yang YG, Tian J, Lei H, Zhou YH, Shi WM (2016) Novel quantum image encryption using one-dimensional quantum cellular automata. Inf Sci 345:257–270

    Article  Google Scholar 

  52. Yang YG, Zhang YC, Chen XB, Zhou YH, Shi WM (2018) Eliminating the texture features in visually meaningful cipher images. Inf Sci 429:102–119

    Article  MathSciNet  Google Scholar 

  53. Yang YG, Guan BW, Li J, Li D, Zhou YH, Shi WM (2019) Image compression-encryption scheme based on fractional order hyper-chaotic systems combined with 2D compressed sensing and DNA encoding. Opt Laser Technol 119:105661

    Article  Google Scholar 

  54. Yang YG, Zou L, Zhou YH, Shi WM (2020) Visually meaningful encryption for color images by using Qi hyper-chaotic system and singular value decomposition in YCbCr color space. Optik 213:164422

    Article  Google Scholar 

  55. Yang YG, Wang BP, Yang YL, Zhou YH, Shi WM (2021) Visually meaningful image encryption based on universal embedding model. Inf Sci 562:304–324

    Article  MathSciNet  Google Scholar 

  56. Yang YG, Wang BP, Yang YL, Zhou YH, Shi WM (2021) Dual embedding model: a new framework for visually meaningful image encryption. Multimed Tools Appl 80(6):9055–9074

    Article  Google Scholar 

  57. Yang YG, Wang BP, Pei SK, Zhou YH, Shi WM, Liao X (2021) Using M-ary decomposition and virtual bits for visually meaningful image encryption. Inf Sci 580:174–201

    Article  MathSciNet  Google Scholar 

  58. Yang YG, Wang BP, Yang YL, Zhou YH, Shi WM, Liao X (2022) A visually meaningful image encryption algorithm based on adaptive 2D compressive sensing and chaotic system. Multimed Tools and Appl. https://doi.org/10.1007/s11042-021-11656-8

  59. Zhang X (2010) Lossy compression and iterative reconstruction for encrypted image. IEEE Trans Inf Forensics Secur 6(1):53–58

    Article  Google Scholar 

  60. Zhong H, Li G (2022) Multi-image encryption algorithm based on wavelet transform and 3D shuffling scrambling. Multimed Tools Appl 81:24757–24776. https://doi.org/10.1007/s11042-022-12479-x

    Article  Google Scholar 

  61. Zhou N, Pan S, Cheng S, Zhou Z (2016) Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121–133

    Article  Google Scholar 

  62. Zhu L, Song H, Zhang X, Yan M, Zhang L, Yan T (2019) A novel image encryption scheme based on nonuniform sampling in block compressive sensing. IEEE Access 7:22161–22174

    Article  Google Scholar 

  63. Zhu L, Song H, Zhang X, Yan M, Zhang T, Wang X, Xu J (2020) A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding. Signal Process 175:107629

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grant Nos. 62071015, 61972142, 62171264).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu-Guang Yang.

Ethics declarations

Conflict of interest

We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work, there is no professional or other personal interest of any nature or kind in any product, service and/or company that could be construed as influencing the position presented in, or the review of, the manuscript.

Ethics statement

Ethics Committee approval was obtained from the Institutional Ethics Committee of Beijing University of Technology to the commencement of the study.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, YG., Wang, BP., Zhou, YH. et al. Efficient color image encryption by color-grayscale conversion based on steganography. Multimed Tools Appl 82, 10835–10866 (2023). https://doi.org/10.1007/s11042-022-13689-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13689-z

Keywords