A scheme for encrypting user-defined image region is proposed. The region may be chosen interactively by the user using a mouse or directly entering position parameters. Key streams are generated from a chaotic system. The image is randomly substituted based on DNA encoding. Information about the user-defined region is embedded into the encrypted image with reversible watermarking before transmission. The receiver can directly extract the region information without relying on any additional transmission. Tests and analysis show that the scheme can meet security requirements with good flexibility and practicability.
PENG Shan, LONG Min
. Region-Selected Image Encryption with Combination of DNA Coding and Chaos[J]. Journal of Applied Sciences, 2015
, 33(6)
: 655
-662
.
DOI: 10.3969/j.issn.0255-8297.2015.06.009
[1] Ge X, Liu F, Lu B, Wang W. Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem and its improved version[J]. Physics Letters A, 2011, 5(31):908-13.
[2] Akhavan A, Samsudin A, Akhshani A. Cryptanalysis of "an improvement over an image encryption method based on total shuffling"[J]. Optics Communications, 2015, 350:77-82.
[3] Jeng F G, Huang W L, Chen T H. Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes[J]. Signal Processing:Image Communication, 2015, 34:45-51.
[4] Liu Y S, Tang J, Xie T. Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map[J]. Optics & Laser Technology, 2014, 60:111-115.
[5] 张顺,高铁杠.基于类DNA编码分组与替换的加密方案[J].电子与信息学报, 2015, 37(1):150-157. Zhang S, Gao T G. Encryption based on DNA coding, codon grouping and substitution[J]. Journal of Electronics & Information Technology, 2015, 37(1):150-157. (in Chinese)
[6] Wang X Y, Zhang Y Q, Bao X M. A novel chaotic image encryption scheme using DNA sequence operations[J]. Optics and Lasers in Engineering, 2015, 73:53-61.
[7] 房东鑫,张健.基于猫映射和DNA编码的图像加密算法[J].计算机工程, 2014, 40(12):89-93. Fang D X, Zhang J. Image encryption algorithm based on cat maping and DNA coding[J]. Computer Engineering, 2014, 40(12):89-93. (in Chinese)
[8] 赵亮,廖晓峰,向涛,肖迪.基于Z矩阵映射和选择加密的彩色图像退化算法研究[J].物理学报, 2010, 3(59):1507-1523. Zhao L, Liao X F, Xiang T, Xiao D. Color image degradation algorithms based on Z-matrix map and selective encryption[J]. Acta Physica Sinica, 2010, 3(59):1507-1523. (in Chinese)
[9] 胡月,周庆,黎立,王昱文. GIF图像选择加密算法及其性能研究[J].计算机工程, 2010, 36(24):121-124. Hu Y, Zhou Q, Li L, Wang Y W. GIF image selection encryption algorithm and its performance research[J]. Computer Engineering, 2010, 36(24):121-124.
[10] Xiang T, Hu J, Sun J L. Outsourcing chaotic selective image encryption to the cloud with steganography[J]. Digital Signal Processing, 2015, 43:28-37.
[11] 于俊清,刘青,何云峰.基于感兴趣区域的H.264视频加密算法[J].计算机学报, 2010, 33(5):945-953. Yu J Q, Liu Q, He Y F. H.264 video encryption algorithm based on region of interest[J]. Chinese Journal of Computers, 2010, 33(5):945-953. (in Chinese)
[12] 郑淑丽,王美玲,邢慧芬,胡东辉。一种基于位平面的差值扩展可逆水印算法[J].合肥工业大学学报, 2012, 35(10):1346-1348. Zheng S L, Wang M L, Xin H F, Hu D H. A difference expansion reversible watermarking algorithm based on bit plane[J]. Journal of Hefei University of technology, 2012, 35(10):1346- 1348. (in Chinese)
[13] Tai W L, Yeh V M, Chang C C. Reversible data hiding based on histogram modification of pixel differences[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2009, 19(6):906-910.
[14] 程艳云,宋玉蓉.基于耦合映射格子混沌系统的Hash函数构造[J].应用科学学报, 2010, 28(1):44-48. Chen Y Y, Song Y R. Hash function construction based on chaotic system of coupled map lattice[J]. Journal of Applied Sciences, 2010, 28(1):44-48. (in Chinese)