Professional Documents
Culture Documents
org
Published in IET Image Processing
Received on 2nd April 2014
Revised on 17th June 2014
Accepted on 21st July 2014
doi: 10.1049/iet-ipr.2014.0224
ISSN 1751-9659
College of Computer Science and Technology, DaLian University of Technology, Dalian, Peoples Republic of China
National Astronomical Observatories, Chinese Academy of Sciences, Beijing, Peoples Republic of China
E-mail: syuan@dlut.edu.cn
Abstract: An efcient and secure environment is necessary for data transmission and storage, especially for large-column
multimedia data. In this study, a novel compressionencryption scheme is presented using a fractal dictionary and Julia set.
For the compression in this scheme, fractal dictionary encoding not only reduces time consumption, but also gives good
quality image reconstruction. For the encryption in the scheme, the key has large key space and high sensitivity, even to tiny
perturbation. Besides, the stream cipher encryption and the diffusion process adopted in this study help spread perturbation in
the plaintext, achieving high plain sensitivity and giving an effective resistance to chosen-plaintext attacks.
Introduction
2
2.1
www.ietdl.org
q R). (x0, y0) corresponds to each point in W before
iteration. There are n m pixels in W which are presented
as (1), where (0, 1, , n 1) are the X or Y coordinates.
The details are as follows
x0 = 0, 1, . . . , n 1
y0 = 0, 1, . . . , m 1
(1)
2.2
x=
1,
0,
x xave
x , xave
(2)
_
Fractal dictionary
www.ietdl.org
Proposed method
www.ietdl.org
BTC queue and the best matching domain block with the
minimum distortion is recorded together with the encoding
parameters, which will be discussed later. Usually,
distortion criterion, dened as (3), is used to measure the
distortion between the range block and afne transformed
domain block
d(X , D) =
N
(xij s + o yij )
(3)
i, j=1
t3
t4
N
N
j=1
s=
N
N
2
i=1 xij
j=1
i=1 xij
j=1
N
i=1 yij
j=1
2
(4)
i=1 yij
j=1
(5)
identity
orthogonal reflection about mid-vertical axis
of block
orthogonal reflection about mid-horizontal
axis of block
orthogonal reflection about first diagonal of
block
orthogonal reflection about second diagonal
of block
rotation about centre of block, through +90
rotation about centre of block, through +180
rotation about centre of block, through 90
N
N
N
1
x s
yij
o=
N i=1 ij
i=1
j=1
t5
t6
t7
Action
(6)
j=1
3.2
The fractal encoding is a lossy compression, which means that
a minor perturbation in image may have no changes in the
corresponding compression codes. However, a secure
encryption system should be sensitive to a minor change in
image, that is, it should have high plaintext sensitivity. To
ensure the sensitivity to the encoding parameter s as well as
o, larger storage spaces for s and o work better. We utilised
the data without being quantied when conducting
compression with s and o. The experiments with each pixel
least signicant bit (LSB) changed in the 256 256
Aeroplane image show that a tiny change in image causes
the changes in the encoding record, conrming the plaintext
sensitivity.
For fractal decoding based on fractal dictionary, the image
restoration uses the BTC value and the offset to locate the
best matching domain block. Applying (6), we obtain a
Data preprocessing
www.ietdl.org
Table 2
Sensitivity
18
17
16
14
22
20
18
NO
NO
NO
NO
YES
YES
YES
6
7
8
10
10
12
18
Zji
(0 i , plainlength)
(7)
j = stream length 1
(1 i , plain length)
Z 0 = Julia Stream Cipherj ,
0 j , stream length
(8)
(9)
www.ietdl.org
Zji
j = stream length 1
(1 i , plain length)
Z 0 = Julia Stream Cipherj ,
0 j , stream length
(10)
3.4
Experimental results
max2
MSE
(13)
4.2
(11)
(12)
178
IET Image Process., 2015, Vol. 9, Iss. 3, pp. 173183
This is an open access article published by the IET under the Creative Commons Attribution
doi: 10.1049/iet-ipr.2014.0224
License (http://creativecommons.org/licenses/by/3.0/)
www.ietdl.org
Fig. 7 Fractal dictionary-based compression performance of boat image with the size 512 512. The left boat image is the initial one and the
right one is the restored image. The compression costs 949 ms and the PSNR is 32.3705
Peppers
Elain
Time, s
PSNR
Time, s
PSNR
Time, s
PSNR
0.234/0.015
32.483
0.281/0.016
32.244
0.296/0.016
33.327
NPCR =
UACI =
load in year is more than
2256
. 20.7902831 1021
1000 106 60 60 24 365
years, which is a very long time and practically infeasible.
When the size of Julia set K is 10, the stream cipher is 800
bits length, and the corresponding key space is nearly 2272.
4.3
Sensitivity analysis
Role
Type
Space, bits
m
p
q
X
Y
key1
key2
double
double
double
integer
integer
integer
integer
64
64
64
32
32
32
32
W
,H
1
D(i, j) 100%
W H i=1, j=1
(14)
W
,H
1
|C1 (i, j) C2 (i, j)|
100% (15)
W H i=1, j=1
255
www.ietdl.org
set may not change, making the sensitivity for cipher to key
weak. Table 5 demonstrates the experimental results.
Fig. 9 shows the results of key sensitivity with a certain
key changed. In Fig. 9, the keys sensitivities of p and q
both achieve 1016 and that of m achieves 1015. In
addition, the wrong keys cannot decrypt the ciphertext
correctly. As what we have anticipated, the key has a
high sensitivity.
Table 5
4
6
8
10
0
0
99.5514%
99.6033%
180
IET Image Process., 2015, Vol. 9, Iss. 3, pp. 173183
This is an open access article published by the IET under the Creative Commons Attribution
doi: 10.1049/iet-ipr.2014.0224
License (http://creativecommons.org/licenses/by/3.0/)
www.ietdl.org
4.4
Table 6 shows that our encrypted data of the 512 512 Lena
image passes the sp80022 test suite. It proves that the
ciphertext has a good randomness.
4.5
Encryption/decryption speed
Conclusions
www.ietdl.org
Fig. 9 continued
P-value
Result
0.860274
0.560222
0.346199
0.954460
0.732205
0.646259
SUCCESS
SUCCESS
SUCCESS
SUCCESS
SUCCESS
SUCCESS
0.730268
SUCCESS
0.694044
0.166080
0.744639,
0.588098
0.217446
0.581458,
0.858775
0.743932
0.566680
0.978239
0.865548
SUCCESS
SUCCESS
SUCCESS
SUCCESS
SUCCESS
Images
SUCCESS
SUCCESS
SUCCESS
SUCCESS
Encryption time, ms
Decryption time, ms
31
31
125
110
31
46
172
125
182
IET Image Process., 2015, Vol. 9, Iss. 3, pp. 173183
This is an open access article published by the IET under the Creative Commons Attribution
doi: 10.1049/iet-ipr.2014.0224
License (http://creativecommons.org/licenses/by/3.0/)
www.ietdl.org
6
Acknowledgments
References
1 Ahmed, F., Siyal, M.Y., Abbas, V.U.: A perceptually scalable and jpeg
compression tolerant image encryption scheme. 2010 Fourth
Pacic-Rim Symp. on Image and Video Technology (PSIVT), IEEE,
2010, pp. 232238
2 Yuen, C.H., Wong, K.W.: A chaos-based joint image compression and
encryption scheme using DCT and SHA-1, Appl. Soft Comput., 2011,
11, (8), pp. 50925098
3 Hermassi, H., Rhouma, R., Belghith, S.: Joint compression and
encryption using chaotically mutated Huffman trees, Commun.
Nonlinear Sci. Numer. Simul., 2010, 15, (10), pp. 29872999
4 Bourbakis, N.G.: Image data compression-encryption using G-scan
patterns. IEEE Int. Conf. on Systems, Man, and Cybernetics,
Computational Cybernetics and Simulation, IEEE, 1997, no. 2,
pp. 11171120
5 Lian, S., Chen, X., Ye, D.: Secure fractal image coding based on fractal
parameter encryption, Fractals, 2009, 17, (02), pp. 149160
6 Lock, A.J.J., Loh, C.H., Juhari, S.H., Samsudin, A.:
Compression-encryption based on fractal geometric. 2010 Second
8
9
10
11
12
13
14
15
16
17