Skip to main content
Log in

A joint image lossless compression and encryption method based on chaotic map

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Nowadays poor security, low transmission and storage efficiency of images have become serious concerns. In order to improve the situation, this paper put forward a new image lossless compression joint encryption algorithm based on chaotic map with all original information intact. The lossless compression uses SPIHT(Set Partitioning in Hierarchical Trees) encoding method based on integer wavelet transform, and encrypt multiple rounds in the process of wavelet coefficients and SPIHT coding applying many kinds of chaotic maps. Experimental results show that the compressed file size is about 50 % of the original file size, which achieves relatively good lossless compression ratio. Besides, the encryption method passes many security tests, such as sensitivity test, entropy test, autocorrelation test, NIST SP800–22 test. There is a high application value in the medical field and the national security department whose image files require a relatively high quality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Calderbank AR, Daubechies I, Sweldens W, et al. (1998) Wavelet transforms that map integers to integers. Appl Comput Harmon Anal 5:332–369

    Article  MathSciNet  MATH  Google Scholar 

  2. Chen SL, Hwang T (2010) Lin W.W. Randomness enhancement using digitalized modified logistic map. IEEE Trans Circuits Syst Express Briefs 57(12):996–1000

    Article  Google Scholar 

  3. Cohen A, Daubechies I, Feauvean J (1992) Bi-orthogonal bases of compactly supported wavelets. Commun Pure Appl Math 45(5):485–560

    Article  MATH  Google Scholar 

  4. Deng J, Ren Y (2013) Image compression encryption algorithm based on improved zero tree encoding. Acta Photonica Sinica 42(1):121–126

    Article  Google Scholar 

  5. Hadjem T, Azzaz, MS, Tanougast C, Sadoudi S (2014) A new image crypto-compression system SPIHT-PSCS. Control, Decision and Information Technologies (CoDIT), 2014 International Conference on, Metz, pp 706–711

  6. Henon M (1976) A two-dimensional mapping with a strange attractor. Commun Math Phys 50:69–77

    Article  MathSciNet  MATH  Google Scholar 

  7. Li Y, Zhang S (2013) Image compression based on wavelet transform and SHA-1. J Image Graph 18(4):376–381

    Google Scholar 

  8. Li X, Knipe J, Cheng H (1997) Image compression and encryption using tree structures. Pattern Recogn Lett 18:1253–1259

    Article  Google Scholar 

  9. Lian S, Sun J, Wang Z, (2004) Perceptual cryptography on SPIHT compressed images or videos. ICME 2195–2198

  10. Liao X, Xiao D, et al. (2009) Chaotic cryptofigurey and its application. Science Press, Peking, p. 43

    Google Scholar 

  11. Lin R, Mao, Y Wang Z (2008) Chaotic secure image coding based on SPIHT. Communications and Networking in China, 2008. China Com 2008. Third International Conference on, Hangzhou, China, pp 1294–1294

  12. Liu F, Liu S, Liu G, et al. (2007) IInteraction of two scales in Lorenz map. Acta Phys Sin 56(10):5629–5634

    Google Scholar 

  13. Luo R (2001) Design and analysis of remote sensing image information system. Dissertation Zheng Zhou: The PLA Information Engineering University, China. Doctoral, 93

  14. Persohn KJ, Povinelli RJ (2012) Analyzing logistic map pseudorandom number generators forperiodicity induced by finite precision floating-point representation. Chaos, Solitons Fractals 45:238–245

    Article  Google Scholar 

  15. Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164

    Article  Google Scholar 

  16. Qin C, Chang C-C, Chen Y-C (2013) Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism. Signal Process 93(9):2687–2695

    Article  Google Scholar 

  17. Said A, Pearlman WA (1996) A new fast and efficient image codec based on set partitioning in hierarchical trees. IEEE Trans Circuits Syst Video Technol 6:243–250

    Article  Google Scholar 

  18. Shen C, Zhang H, Feng D, et al. (2007) Information security overview. Science China E: Information Science 37(2):129–150

    Google Scholar 

  19. Srikanth B, Kumar GSN, Reddy VSK, et al. (2014) A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23(3):969–978

    Article  MathSciNet  Google Scholar 

  20. Sun Y (2012) Wavelet transform and image processing techniques. Tsinghua University press, Peking, pp. 1–2

    Google Scholar 

  21. Wang D, Deng J, et al. (2014a) Image compression encryption algorithm based on hyper chaotic system. Opt Precis Eng 22(9):2529–2535

    Google Scholar 

  22. Wang B, Zheng X, Zhou S, et al. (2014b) Encrypting the compressed image by chaotic map andarithmetic coding. Optik 125:6117–6122

    Article  Google Scholar 

  23. Weina D, Sun J (2002) A new generation of still image encoding system-JPEG2000. J Circuit Syst 7(3):73–76

    Google Scholar 

  24. Wu Y (2013) Research on joint image compression encryption technology. Nan Chang:Nanchang University, Master degree thesis, 1

  25. Xie Y, Xiao D (2013) A color image encryption algorithm based on JPEG compression of encoding. Acta Phys Sin 62(24):240508–240111

    Google Scholar 

  26. Xie Y, Tang X’a, Sun M, Zhang Y (2010) Image lossless compression algorithm based on classification of LZW. J Image Graph 15(2):236–241

    Google Scholar 

  27. Yang H, Liao X, Wong K-W, et al. (2012) Image compression algorithm based on SPIHT. Acta Phys Sin 61(4):040505–0401:8

    Google Scholar 

  28. Zhang L, Wang K (2003) Image encoding algorithm based on integer wavelet transform. J Softw 14(8):1432–1438

    Google Scholar 

  29. Zhang X, Sun G, Shen L, et al. (2014) Compression of encrypted images with multi-layer decomposition. Multimed Tools Appl 72:489–502

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (60973162), the Natural Science Foundation of Shandong Province of China (ZR2014FM026, ZR2009GM037), the Science and Technology of Shandong Province, China (2013GGX10129, 2010GGX10132, 2012GGX10110), the National Cryptology Development Foundation of China (No. MMJJ201301006), Foundation of Science and Technology on Information Assurance Laboratory (No. KJ-14-005) and the Engineering Technology and Research Center of Weihai Information Security.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiao-Jun Tong.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tong, XJ., Chen, P. & Zhang, M. A joint image lossless compression and encryption method based on chaotic map. Multimed Tools Appl 76, 13995–14020 (2017). https://doi.org/10.1007/s11042-016-3775-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3775-6

Keywords

Navigation