A multidimensional chaotic image encryption algorithm based on the region of interest
- Authors
- Liu, Yang; Zhang, Jindong; Han, Dongqi; Wu, Peibin; Sun, Yiding; Moon, Young Shik
- Issue Date
- Jul-2020
- Publisher
- Springer Nature
- Keywords
- Chaos; Histogram of oriented gradients; Region of interest; Support vector machine; Henon sequence; Unified chaotic sequence
- Citation
- Multimedia Tools and Applications, v.79, no.25-26, pp 17669 - 17705
- Pages
- 37
- Indexed
- SCIE
SCOPUS
- Journal Title
- Multimedia Tools and Applications
- Volume
- 79
- Number
- 25-26
- Start Page
- 17669
- End Page
- 17705
- URI
- https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/1908
- DOI
- 10.1007/s11042-020-08645-8
- ISSN
- 1380-7501
1573-7721
- Abstract
- Most image encryption algorithms encrypt the whole image, but only part of the data is important in the image. In this paper, we propose a multidimensional chaotic image encryption algorithm based on the region of interest (ROI). The histogram of oriented gradients (HOG) feature extraction and support vector machine (SVM) are used to separate the region of interest from the whole image. Then, the region of interest pixels is messed up by using the improved Henon sequence, Joseph sequence and the region of interest pixels are diffused by using the unified chaotic sequence to hide the sensitive information in the image, so as to achieve the purpose of private protection. Furthermore, the improved logistic sequence is used to hide the edge information of the target image to achieve the tradeoff between the secrecy of information and the complexity of encryption. A series of analyses are carried out including key space analysis, key sensitivity analysis, statistical analysis, information entropy analysis, analysis of the fixed-point obscuration analysis, quality analysis and image decryption for our encryption algorithm. Through experiments and comparisons, the proposed algorithm has good performance in encrypting image and coping with various invasions. The image encryption algorithm based on ROI has a good performance of security, moreover through the main encryption of ROI can effectively shorten the encryption time, so as to achieve the compromise of security and computational complexity.
- Files in This Item
-
Go to Link
- Appears in
Collections - COLLEGE OF COMPUTING > SCHOOL OF COMPUTER SCIENCE > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/1908)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.