Next Article in Journal
Estimating Quantum Mutual Information of Continuous-Variable Quantum States by Measuring Purity and Covariance Matrix
Previous Article in Journal
Optical Flow-Aware-Based Multi-Modal Fusion Network for Violence Detection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Double-Color-Image Compression-Encryption Algorithm Based on Quaternion Multiple Parameter DFrAT and Feature Fusion with Preferable Restoration Quality

1
School of Software, East China Jiaotong University, Nanchang 330013, China
2
Department of Electronic Information Engineering, Nanchang University, Nanchang 330031, China
3
The State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
*
Author to whom correspondence should be addressed.
Entropy 2022, 24(7), 941; https://doi.org/10.3390/e24070941
Submission received: 27 April 2022 / Revised: 21 June 2022 / Accepted: 1 July 2022 / Published: 6 July 2022

Abstract

:
To achieve multiple color images encryption, a secure double-color-image encryption algorithm is designed based on the quaternion multiple parameter discrete fractional angular transform (QMPDFrAT), a nonlinear operation and a plaintext-related joint permutation-diffusion mechanism. QMPDFrAT is first defined and then applied to encrypt multiple color images. In the designed algorithm, the low-frequency and high-frequency sub-bands of the three color components of each plaintext image are obtained by two-dimensional discrete wavelet transform. Then, the high-frequency sub-bands are further made sparse and the main features of these sub-bands are extracted by a Zigzag scan. Subsequently, all the low-frequency sub-bands and high-frequency fusion images are represented as three quaternion signals, which are modulated by the proposed QMPDFrAT with three quaternion random phase masks, respectively. The spherical transform, as a nonlinear operation, is followed to nonlinearly make the three transform results interact. For better security, a joint permutation-diffusion mechanism based on plaintext-related random pixel insertion is performed on the three intermediate outputs to yield the final encryption image. Compared with many similar color image compression-encryption schemes, the proposed algorithm can encrypt double-color-image with higher quality of image reconstruction. Numerical simulation results demonstrate that the proposed double-color-image encryption algorithm is feasibility and achieves high security.

1. Introduction

In recent years, secure transmission of color images has attracted widespread attention. Due to the intrinsic features of images, such as strong correlation between adjacent pixels, large storage capacity, and high redundancy, the traditional textual encryption algorithms, such as DES (Data Encryption Standard) and AES (Advanced Encryption Standard), are not suitable for image encryption [1]. To ensure the confidentiality of the private image information, a great deal of color image encryption algorithms have been presented with various technologies. Among these algorithms, chaotic systems have been widely adopted in image encryption owing to its excellent properties. For instance, Pak et al. introduced a simple and effective method of generating a new chaotic sequence according to the differences in the output sequences of two existing one-dimensional (1D) chaotic maps [2]. Based on the obtained sequences, a linear-nonlinear-linear encryption structure of this cryptographic system was designed to improve security. Similarly, a color image encryption scheme based on a new combination chaotic system was proposed [3]. Nevertheless, the chaotic dynamic properties degrade rapidly in computer realization with finite computation precision [4]. To overcome this problem, a spatiotemporal chaotic system, i.e., the non-adjacent coupled map lattices (NCML) was developed to alleviate the degradation of low-dimensional chaos map [5]. Subsequently, a series of image encryption algorithms were proposed based on the spatiotemporal chaotic system [6,7]. Moreover, for better security and larger key space, the high-dimensional chaotic systems have been increasingly employed to design the image encryption schemes [8,9,10,11]. In ref. [8], a novel 3D chaotic map obtained by coupling the piecewise and logistic map is implemented to improve the performance of cryptosystem. Tong et al. proposed a fast image encryption scheme based on a new 4D chaotic system [9]. In addition, to enhance the security and complexity of the cryptosystems, chaos-based encryption schemes were combined with other methods, such as deoxyribonucleic acid [12], cellular automata [13], fuzzy cellular neural network [14], and so on.
However, the permutation and the diffusion processes in these encryption schemes were both performed in the spatial domain, which may reduce the security of cryptosystems to some extent. Inspired by some excellent mathematical properties of transform techniques, many researchers have attempted to devise transform-based image encryption algorithms, where the plaintext image is encrypted in the transform domain and the pixel values can be retrieved through a reverse process. To the best of our knowledge, there are few investigations on double-color-image compression and encryption algorithms. In light of this situation and the above discussions, a new double-color-image compression and encryption algorithm based on QMPDFrAT and a joint permutation-diffusion mechanism are designed. The main contributions of the proposed algorithm are as follows:
(1)
Multiple parameter discrete fractional angular transform (MPDFrAT) is generalized to quaternion MPDFrAT. The analysis shows its advantages in image encryption. Then, the sub-bands of the original images can be encrypted with the proposed QMPDFrAT in a parallel way.
(2)
The deficiency caused by the linear transform system is eliminated by nonlinear transform, i.e., spherical transform.
(3)
A joint permutation-diffusion mechanism with plaintext-related random pixel insertion is designed to ensure the proposed cryptosystem could counteract the powerful chosen-plaintext attack and improve the efficiency of the cryptosystem.
(4)
The effect of different components of the high-frequency sub-bands on the quality of the decryption image is discussed and a more reasonable feature fusion method of the high-frequency part is implemented by combining DWT with Zigzag operation. Consequently, the proposed image encryption algorithm could achieve higher quality of the decryption images than that of the typical image compression and encryption algorithms.
The rest of this paper is arranged as follows. In Section 2, some related works are discussed. In Section 3, some fundamental tools including the NCML system, quaternion algebra, and MPDFrAT are reviewed. The QMPDFrAT is defined and analyzed in Section 4. The details of the proposed double-color-image encryption algorithm are described in Section 5. In Section 6, simulation results and security evaluations are provided. Brief conclusions are given in Section 7.

2. Related Works

Based on the gyrator transform, Chen et al. proposed an asymmetric optical cryptosystem for the color image [15]. Xiong et al. designed an optical color image scheme based on fractional Fourier transform and two-step phase-shifting interferometry [16]. Nevertheless, these schemes processed each color channel separately and failed to capture the inherent correlation among three color channels. To deal with the three color channels parallelly, many encryption methods have been investigated with the quaternion-based transforms [17,18,19]. However, the outputs of these aforementioned transform-based algorithms are complex values and the size of encryption results or private keys exceed that of the original images, which may make the transmission and storage of encryption image and private keys inconvenient. To overcome this insufficiency, Zhou et al. devised a nonlinear color image encryption algorithm based on reality-preserving fractional Mellin transform, where the final output was real-value encrypted image [20]. Motivated by this work, many other reality-preserving transforms were defined to encrypt the color image [21,22,23]. To enhance the capacity of the cryptosystem, multiple color image encryptions have attracted increasing attention [24,25,26]. For example, Shao et al. designed a multiple color images encryption framework, in which the multiple color images were encrypted into phase-only function with phase retrieval algorithm under quaternion representation [24]. In many practical applications, for the facility of transmission of ciphertext image, it is necessary to realize simultaneous image compression and encryption. As a novel signal sampling-reconstruction technique, compressive sensing (CS) has been widely employed to solve this problem [27,28,29,30]. For instance, Chen et al. put forward an asymmetric color cryptographic system, in which not only the low-frequency but also the CS-based compressed high-frequency part of the original image were encrypted in the discrete fractional random transform domain [29]. To enhance encryption efficiency, Zhang et al. investigated an efficient color image encryption approach based on CS and fractional Fourier transform, where the measurement matrices exploited in CS were obtained by extending chaos-based low dimensional seed matrices with Kronecker product [30]. However, these transform-based color image compression-encryption schemes were only designed for single color image, which makes them unable to process batch images efficiently to a certain extent. Aiming at this problem, Han et al. suggested a double-color-image compression and encryption algorithm based on CS and self-adaptive random phase encoding [31]. However, in some special applications, the decryption time and the quality of decryption image are also of significance. Table 1 shows the decryption time and the PSNR values of the test image “Peppers” under different reconstruction algorithms with the same compression ratio. Unfortunately, the signal reconstruction takes too much time even though many efficient reconstruction algorithms including orthogonal matching pursuit (OMP) and smoothed norm have been proposed. In other words, the DWT-based compression method may be a good choice in real-time decryption applications.

3. Fundamental Knowledge

3.1. Non-Adjacent Coupled Map Lattices System

The non-adjacent coupled map lattices system is considered as the improved spatiotemporal chaotic system, which can generate pseudorandom sequences with stable chaotic properties [5]. The NCML considers L logistic maps coupled as
x n + 1 ( ρ ) = ( 1 δ ) f [ x n ( ρ ) ] + δ 2 { f [ x n ( υ ) ] + f [ x n ( ω ) ] }
where f ( x ) = λ x ( 1 x ) is logistic map, δ is the coupling parameter ( 0 δ 1 ) , n is the time index ( n = 1 , 2 , 3 , ) , and ρ , υ , ω are the lattices ( 1 ρ , υ , ω L ) . The relations of ρ , υ , and ω can be obtained by Arnold cat map, i.e.,
[ υ ω ] = [ 1 1 1 2 ] [ ρ ρ ] mod ( L )

3.2. Quaternion Representation of Multi-Image

Quaternions are hyper-complex numbers with four dimensions. A quaternion number Q is [32]
Q = a + b i + c j + d k
where a , b , c , d are real numbers and i , j , k are three imaginary operators acting on the following rules.
i 2 = j 2 = k 2 = 1 ,   i j = j i = k ,   j k = k j = i ,   k i = i k = j
The modulus and the conjugate of a quaternion are respectively defined as
| Q | = a 2 + b 2 + c 2 + d 2 ,   Q * = a b i c j d k
If the real part a is 0, then Q is called a pure quaternion. If the modulus | Q | equals to 1, then Q is called a unit quaternion. Based on the above theory, the quaternion representation of multi-image is [17]
f Q ( x , y ) = f 1 ( x , y ) + f 2 ( x , y ) i + f 3 ( x , y ) j + f 4 ( x , y ) k
where f Q ( x , y ) is a quaternion signal and f 1 ( x , y ) , f 2 ( x , y ) , f 3 ( x , y ) , f 4 ( x , y ) are four image signals, respectively.

3.3. Multiple Parameter Discrete Fractional Angular Transform

Briefly, the definition of the discrete fractional angular transform (DFrAT) is introduced. The kernel matrix of the DFrAT is [33]
R N α , θ = V N θ D N α ( V N θ ) T
where D N α = diag { 1 , exp ( 2 i π α / M ) , exp ( 4 i π α / M ) , , exp ( 2 ( N 1 ) i π α / M ) } is a diagonal matrix, whose diagonal values are eigenvalues of the DFrAT, V N θ is an orthonormal matrix and consists of the eigenvectors of the DFrAT. V N θ can be obtained with a recurrence algorithm elaborated in [33].
Based on the DFrAT, a new multiple parameter discrete fractional angular transform (MPDFrAT) was presented [34]. For a 1D signal x ( n ) of size N × 1 , its α th order 1D MPDFrAT is [34]
F M , η 1 α , θ [ x ( n ) ] = l = 0 M 1 C l α ( η 1 ) X l [ x ( n ) ]
where M is an arbitrary positive integer, η 1 = ( n 0 , n 1 , , n M 1 ) Z M is a random M-dimensional integer vector, l = 0 , 1 , 2 , , M 1 , C l α ( η 1 ) denotes the weight coefficient given by
C l α ( η 1 ) = 1 M k = 0 M 1 { exp ( 2 π i / M ) [ α ( k + n k M ) l k ] }
X l [ x ( n ) ] denotes 1D DFrAT with the angle θ and the fractional order 4 l / M , i.e.,
X l [ x ( n ) ] = R N 4 l / M , θ x ( n )
where R N 4 l / M , θ denotes the kernel matrix of DFrAT and can be obtained with Equation (7).
In fact, the MPDFrAT has a similar form with the multiple parameter discrete fractional Fourier transform (MPDFrFT). The difference between MPDFrAT and MPDFrFT is the generation process of the eigenvector of the kernel matrix. To calculate the MPDFrAT of a discrete signal in an efficient way, one can utilize a discretization method [19] by eigen-decomposing MPDFrAT matrix M , η 1 α , θ as
M , η 1 α , θ = V N θ D N α ( V N θ ) T = t = 0 N 1 exp { ( 2 π i / M ) [ α ( mod ( m t , M ) + n mod ( m t , M ) M ) ] } v m t v m t T ,
where m t = t , m N 1 = N for even N while m N 1 = N 1 for odd N , mod ( ) denotes the modulo operation, v m t is eigenvector of DFrAT.
Then, one can rewrite the α th order 1D MPDFrAT of a signal x as an eigen-decomposition form, i.e.,
M , η 1 α , θ = M , η 1 α , θ x

4. Quaternion Multiple Parameter Discrete Fractional Angular Transform

Enlighted by the idea of the definition for 1D MPDFrAT with eigen-decomposition form shown in Equation (11), one can define a new quaternion multiple parameter discrete fractional angular transform (QMPDFrAT) for quaternion signal. For a 1D quaternion signal x q = x r + x i i + x j j + x k k , its left-side QMPDFrAT is defined as
Φ M , η 1 μ , α , θ = M , η 1 μ , α , θ x q
where
M , η 1 μ , α , θ = V N θ D M μ , α ( V N θ ) T = t = 0 N 1 exp { ( 2 π μ / M ) [ α ( mod ( m t , M ) + n mod ( m t , M ) M ) ] } v m t v m t T
Equation (14) is similar to MPDFrAT matrix M , η 1 α , θ in Equation (11) and complex number i is replaced by quaternion μ . Due to the anticommutation of the multiplication of quaternions shown in Equation (4), one can also define the right-side 1D QMPDFrAT by shifting the kernel matrix M , η 1 μ , α , θ to the right-side of x q , i.e.,
Φ M , η 1 μ , α , θ = ( x q ) T M , η 1 μ , α , θ
Without loss of generality, the left-side 1D QMPDFrAT is exploited in this paper. In addition, to illustrate the feature of the proposed QMPDFrAT, a 1D quaternion signal of size 256   ×   1 is transformed by using the fractional quaternion Fourier transform (FRQFT) [35], the quaternion discrete fractional random transform (QDFRNT) [36], the multiple-parameter fractional quaternion Fourier transform (MPFrQFT) [19], and the proposed QMPDFrAT. The comparison results are recorded in Table 2. For brevity, only the first imaginary parts of the input and output quaternion signal are drawn in Table 2. The complicated Hermite polynomials calculation for eigenvectors in the MPFrQFT and the Schmidt orthogonalization of a random matrix in the QDFRNT require relatively higher time. However, the eigenvectors in the QMPDFrAT can be obtained only by simple recurrences and thus the calculation speed is greatly improved. Furthermore, the proposed QMPDFrAT possesses the largest key space among these four quaternion transforms. Therefore, the proposed QMPDFrAT is a suitable tool for image encryption.
The 1D QMPDFrAT can be developed to the 2D one by calculating two 1D QMPDFrATs in the x-axis and the y-axis, respectively, i.e.,
Y M 1 , M 2 , η 1 , η 2 μ , α , β , θ 1 , θ 2 = M 1 , η 1 μ , α , θ 1 y q ( M 2 , η 2 μ , β , θ 2 ) T
where y q = y r + y i i + y j j + y k k is a 2D quaternion signal.

5. Double-Color-Image Compression and Encryption Algorithm

The encryption process for the designed double-color-image encryption algorithm is shown in Figure 1. The main encryption processes include three stages: sparse representation of the color plaintext images, double-color-image encryption in the frequency domain under quaternion representation, and joint permutation-diffusion mechanism. The detailed steps are described as follows.

5.1. Compression Process

Step 1: Double-color plaintext images C 1 and C 2 of size W × H are converted into their red, green, and blue components which can be expressed as R 1 , G 1 , B 1 , R 2 , G 2 , and B 2 , respectively.
Step 2: The one level 2D DWT is performed on the six color components to obtain 24 image sub-bands of size W 2 × H 2 , namely, { L L 1 R 1 , L H 1 R 1 , H L 1 R 1 , H H 1 R 1 } for R 1 , { L L 1 G 1 , L H 1 G 1 , H L 1 G 1 , H H 1 G 1 } for G 1 , { L L 1 B 1 , L H 1 B 1 , H L 1 B 1 , H H 1 B 1 } for B 1 , { L L 1 R 2 , L H 1 R 2 , H L 1 R 2 , H H 1 R 2 } for R 2 , { L L 1 G 2 , L H 1 G 2 , H L 1 G 2 , H H 1 G 2 } for G 2 , { L L 1 B 2 , L H 1 B 2 , H L 1 B 2 , H H 1 B 2 } for B 2 .
Step 3: Low-frequency parts of six spectra are chosen as the three imaginary parts of two quaternion signals f Q 1 and f Q 3 . To improve the quality of image reconstruction and achieve small transmission load simultaneously, a new method for processing high-frequency parts of six spectra is designed as follows:
(1)
The sub-bands L H 1 R 1 , H L 1 R 1 and H H 1 R 1 of R 1 are transformed by the DWT and the interim results are scanned by the Zigzag operation [37] to obtain three 1D sequences with length 1 4 W H , respectively. The compression process for R 1 is drawn in Figure 2a.
(2)
Each sequence is cut to acquire a new sequence with length ( W H ) / 12 . Figure 2b shows the schematic diagram of Zigzag operation. The results after performing DWT on the high-frequency parts are scanned from the upper left corner to the lower right corner. This scan order can extract the main information of the high-frequency parts, which promises the preferable restoration quality as analyzed in Section 5.2.
(3)
The above-mentioned three new sequences are constructed into one sequence. If necessary, the zero elements are filled in the right-most row of this reorganized sequence to ensure that the length of this sequence is ( W H ) / 4 . Then, this sequence is converted into a composite matrix C R 1 of size W 2 × H 2 .
(4)
In a similar way, one can obtain five other composite matrices C G 1 , C B 1 , C R 2 , C G 2 , and C B 2 from five high-frequency parts of G 1 , B 1 , R 2 , G 2 , and B 2 , respectively.

5.2. Double-Color-Image Encryption under Quaternion Representation

Step 1: Quaternion representation (QR): the selected to-be-encrypted sub-bands are represented by quaternion algebra shown as follows
{ f Q 1 = C R 1 + L L 1 R 1 i + L L 1 G 1 j + L L 1 B 1 k f Q 2 = C G 1 + C R 2 i + C G 2 j + C B 2 k f Q 3 = C B 1 + L L 1 R 2 i + L L 1 G 2 j + L L 1 B 2 k
Step 2: With the secret keys M 1 , M 2 , η 1 , η 2 , α , β , θ 1 , θ 2 , μ 1 , μ 2 , and μ 3 , three quaternion signals shown in Equation (17) are modulated by the proposed QMPDFrAT with three quaternion random phase masks, respectively.
G i = M 1 , η 1 μ 1 , α , θ 1 [ f Q i exp ( μ 3 2 π ϕ i ) ] ( M 2 , η 2 μ 2 , β , θ 2 ) T ( i = 1 , 2 , 3 )
where phase mask ϕ i ( i = 1 , 2 , 3 ) is a random matrix uniformly distributed in [ 0 , 1 ) .
Step 3: The four parts of each quaternion signal G i are extracted and reorganized (EAR) to form a new matrix of size W × H .
A i = [ R ( G i ) X ( G i ) Y ( G i ) Z ( G i ) ] ( i = 1 , 2 , 3 )
where R ( G i ) , X ( G i ) , Y ( G i ) , and Z ( G i ) extract the real part and the three imaginary parts of the quaternion signal G i , respectively.
Step 4: To eliminate the deficiency caused by the inherent linearity of the QMPDFrAT, a nonlinear operation called spherical transform is followed to further hide the information obtained by matrices A 1 , A 2 , and A 3 . For the convenience of decryption, the matrix A i ( i = 1 , 2 , 3 ) is first mapped to the matrix B i ( i = 1 , 2 , 3 ) whose values are greater than zero. As shown in Figure 3, the three matrices B 1 , B 2 , and B 3 can be regarded as the orthorhombic axis in the spherical coordinate domain. The mapping rules are
{ r ( u , v ) = B 1 ( u , v ) 2 + B 2 ( u , v ) 2 + B 3 ( u , v ) 2 θ ( u , v ) = ε arccos B 3 ( u , v ) r ( u , v ) φ ( u , v ) = ε arctan B 2 ( u , v ) B 1 ( u , v )
where ε is a plaintext-related adjustment factor which can be calculated as
ε = sum 255 3 = 1 255 3 i = 1 W j = 1 H [ R 1 ( i , j ) + G 1 ( i , j ) + B 1 ( i , j ) + R 2 ( i , j ) + G 2 ( i , j ) + B 2 ( i , j ) ]
In this process, ε is considered as a supplementary key for decryption.

5.3. Joint Permutation-Diffusion Mechanism with Plaintext-Related Random Pixel Insertion

For the image encryption algorithm with the traditional permutation-diffusion structure shown in Figure 4, there are three main drawbacks: (1) multiple rounds of permutation and diffusion operations improve the level of security but sacrifice efficiency; (2) the secret keys are dependent on the original image and the user could not obtain keys before performing the encryption process; (3) the same ciphertext image is obtained each time when it is applied to the same plaintext image with secret keys, which weakens the robustness of the cryptosystem. Aiming at these shortcomings, a new joint permutation-diffusion mechanism based on the plaintext-related random pixel insertion is designed to acquire the final encryption image E , in which only one-time traversal of the to-be-encrypted sequence is executed [38]. The specific process is shown in Figure 5. The encryption steps are described as follows.
Step 1: With the initial keys x 1 ( 1 ) , x 2 ( 1 ) , δ , and λ , NCML system is iterated N 0 + 3 W H + 3 H times. To eliminate the transient effect, the former N 0 values are discarded. Then, one can obtain the chaotic sequence X i with length 3 W H + 3 H : X i = { x i ( 1 ) , x i ( 2 ) , , x i ( 3 W H + 3 H ) } ( i = 1 , 2 ) . Subsequently, the sequence X 1 is further processed as
S = mod ( round ( X 1 × 10 9 ) , 256 )
Additionally, one could sort sequence X 2 and record the positions of the corresponding values of the sorted sequence in X 2 to obtain address sequence d of length 3 W H + 3 H .
Step 2: Three matrices r , θ , and φ are converted into a 1D sequence E 1 ,
{ E 1 R = reshape ( r , 1 , W H ) E 1 G = reshape ( θ , 1 , W H ) E 1 B = reshape ( φ , 1 , W H ) E 1 = [ E R , E G , E B ]
Afterwards, one can quantify E 1 into the range of [ 0 , 255 ] ,
E 2 = round   [ 255 × ( E 1 min ( E 1 ) ) max ( E 1 ) min ( E 1 ) ]
Step 3: Generation of random pixel values related to plaintext. Adopting the secret keys x 1 ( 1 ) , x 2 ( 1 ) , δ and the sum of all the pixels in the original images as the input of hash function SHA-512, a 512-bits hash value V can be obtained. One can randomly select a binary sequence b = ( b 7 b 6 b 0 ) of length 8 from V for 3 H times and convert each binary sequence into decimal integer. Consequently, a plaintext-related random sequence L of length 3 H is obtained. Afterwards, sequence L and sequence E 2 are concatenated into one sequence L E of length 3 W H + 3 H .
Step 4: Joint permutation-diffusion mechanism. The first encrypted pixel value E ( 1 , d ( 1 ) ) is randomly selected from sequence L . Then, other encrypted pixel values are obtained by
E ( 1 , d ( k ) ) = bitxor ( mod ( bitxor ( L E ( 1 , k ) , S ( 1 , k ) ) , 256 ) , E ( 1 , d ( k 1 ) ) )
where k = 2 , , 3 W H + 3 H .
Step 5: The final ciphertext E is obtained by
E = reshape ( E , W , H + 1 , 3 )
In the proposed joint permutation-diffusion strategy, the plaintext-related random values are randomly inserted in the interim sequence E . The value of encrypted sequence E ( 1 , d ( k ) ) not only depends on the to-be-encrypted value L E ( 1 , k 1 ) , chaotic value S ( 1 , k ) , but also is determined by the previous encrypted value E ( 1 , d ( k 1 ) ) , which accords the proposed color image cryptosystem a high level of security, as elaborated in the later section.

5.4. Double-Color-Image Decryption Algorithm

Since the proposed double-color-image encryption algorithm is symmetric, those who know the whole keys can decrypt the ciphertext with the reverse encryption process described in Section 5.2. The decryption process is exhibited in Figure 6. Particularly, the inverse decryption process of joint permutation-diffusion strategy is
{ L E ( 1 , 1 ) = E ( 1 , d ( 1 ) ) L E ( 1 , k ) = bitxor ( S ( k , 1 ) , mod ( bitxor ( E ( 1 , d ( k ) ) , E ( 1 , d ( k 1 ) ) ) + 256 , 256 ) )
where k = 2 , , 3 W H + 3 H . The inverse transform for Equation (20) is
{ B 1 ( u , v ) = r ( u , v ) sin θ ( u , v ) ε cos φ ( u , v ) ε B 2 ( u , v ) = r ( u , v ) sin θ ( u , v ) ε sin φ ( u , v ) ε B 3 ( u , v ) = r ( u , v ) cos θ ( u , v ) ε
After performing the inverse QMPDFrATs and inverse phase mask modulations, one can extract the four parts of each resulting quaternion signals, respectively. Finally, the decryption images can be retrieved through the inverse compression process and inverse DWT operation.

6. Simulation Results and Security Analyses

6.1. Encryption and Decryption Results

To verify the feasibility of the proposed encryption algorithm, four groups of color images of size 256 × 256 shown in Figure 7 are selected from the USC-SIPI image database to be tested [39]. The secret keys M 1 and M 2 are arbitrarily taken as 25 and 29, respectively. The pure quaternions μ 1 , μ 2 , μ 3 , and μ 4 are set as i , j , k , and ( i + j + k ) / 3 , respectively. The M i -dimensional parameter vector η i ( i = 1 , 2 ) is random real vector whose values are independent and uniformly distributed in [ 0 , 100 ] . The fractional orders α and β are randomly given as 0.4697 and 0.4023, respectively. The initial values and control parameters of the NCML system are chosen arbitrarily as: x 1 ( 1 ) = 0.4728 , x 2 ( 1 ) = 0.3977 , δ = 0.2635 , λ = 3.9864 , respectively. Figure 8 and Figure 9 show the encryption and the decryption results, respectively. To measure the quality of restored image, two image quality assessment criteria are considered, i.e.,
(1)
Peak Signal-to-Noise Ratio (PSNR) is
PSNR = 10 log W × H × 255 2 m = 1 W n = 1 H [ C ( m , n ) D ( m , n ) ] 2
where C ( m , n ) and D ( m , n ) represent the pixel values of each color component of the original color image and the decryption one, respectively.
(2)
Structural similarity (SSIM) index [40] is
SSIM ( x , y ) = ( 2 μ x μ y + c 1 ) ( 2 σ x y + c 2 ) ( μ x 2 + μ y 2 + c 1 ) ( σ x 2 + σ y 2 + c 2 )
where x and y are the windows of two images with size m × m , μ x and μ y denote the average values of x and y , σ x 2 and σ y 2 are variances of x and y , respectively, σ x y is the covariance between x and y . c 1 = ( k 1 L ) 2 , c 2 = ( k 2 L ) 2 , k 1 = 0.01 , k 2 = 0.03 , L is the gray level of the plaintext image. The greater SSIM means the better recovery of image.
The PSNR values and the mean SSIM (MSSIM) values for different images are collected in Table 3. It can be seen from Figure 8 and Figure 9 and Table 3 that the ciphertext images cannot reveal the information of the original images and the decryption images achieve good reconstruction quality.

6.2. Decryption Quality Evaluation

In the conventional DWT-based image compression and encryption methods, to achieve the purpose of compression, only the low-frequency part of the original image is utilized for encryption and the high-frequency parts are discarded, which affects the decryption quality of the image [41,42]. In this paper, to achieve compression and improve the quality of image reconstruction simultaneously, five methods shown in Table 4 are designed to flexibly select the high-frequency parts of the original images.
Simulations are conducted with the five above-mentioned methods. The corresponding PSNR values of different decryption images are depicted in Figure 10. Decryption images with the proposed five methods have relatively higher reconstruction quality than those in [29,31], since both the low-frequency parts and the high-frequency parts of original images are reserved to be encrypted. As an example, decryption images “Peppers” with five methods are shown in Figure 11. Corresponding selected details of decryption “Peppers” are exhibited in Figure 12. From Figure 10, Figure 11 and Figure 12, although the PSNR value of the decryption image with method 1 (2, 3) is acceptable, the details of the corresponding decryption image are distorted obviously, for only one of the three high-frequency parts associated with the original RGB components are reserved to be encrypted. For method 4, the selected high-frequency parts ( L H 1 , H L 1 , H H 1 ) of each RGB component are different and the decryption images contain all these three high-frequency parts as possible, which leads to the decryption images not only achieving similar decryption quality with method 1 (2, 3), but also reducing the undesirable distortion effect of the detail part to a certain extent. For method 5, the main information of all the three high-frequency parts of every RGB component are reserved via the DWT and Zigzag operation, which can make the decryption images achieve higher visual quality and relatively higher reconstruction quality than method 4. Based on the above discussion, the adoption of method 5 as the feature fusion of the high-frequency parts of the original images is more helpful for improving the reconstruction quality of decryption image.

6.3. Statistical Analyses

6.3.1. Histogram Analysis

Histograms play an important role in statistical analyses. Figure 13(a1–c1,a2–c2) are the histograms of RGB components of original “Lena” and “Peppers”, respectively. Figure 13(a3–c3) are the histograms of RGB components of encryption image, respectively. In the encryption process, the proposed QMPDFrAT is performed on the compressed image, which causes the histograms of the intermediate results have a similar distribution. Afterward, the proposed joint permutation-diffusion operation can make the pixel values of intermediate results distributed uniformly among the range of 0–255. From Figure 13, the histograms of RGB components of original color images “Lena” and “Peppers” are quite different while those of RGB components of the encryption image show similarity and uniform distribution. In addition, the chi-square ( χ 2 ) test is adopted to numerically measure the uniformity of the histogram of ciphertext [43], i.e.,
χ 2 = L = 0 255 ( o L e L ) 2 e L
where o L is the observed number of the L-th gray level and e L is the expected number of the L-th gray level. Table 5 gives the results of the chi-square test for the RGB components of the encryption image under different input images. From Table 5, the χ 2 -values of encrypted RGB components are under the critical values with 1% and 5% level of significance, which indicates that the proposed encryption algorithm can withstand the histogram attack.

6.3.2. Correlation Analysis

A total of 12,000 pairs of adjacent pixels in the horizontal, vertical, and diagonal directions are chosen randomly from the original color image “Lena” and the corresponding encryption image. Their correlation distributions are displayed in Figure 14. In Figure 14, the correlation distributions of the three color channels of the original image “Lena” are linear and strongly correlated, while those of the corresponding three color channels of the encryption image are almost uniform. Moreover, to evaluate this feature numerically, the correlation coefficients of the selected 12,000 pairs of adjacent pixels in three directions are calculated, as shown in Table 6. The correlation coefficients in the original color images are close to 1, while those in the encryption images are near 0. The results suggest that the proposed algorithm can reduce the correlation in original images significantly. Therefore, the statistical analysis attack is impracticable for the proposed double−color−image encryption algorithm.

6.3.3. Information Entropy Analysis

Information entropy H ( m ) can reflect the degree of randomness and the unpredictability of a random event m , i.e.,
H ( m ) = i = 0 2 N 1 p ( m i ) log 1 p ( m i )
where p ( m i ) is the occurrence probability of the random event m i . Theoretically, the value of H ( m ) for an encryption image with 256−level gray is 8 bits when all gray levels obey the uniform probability distribution. In our double−color−image encryption algorithm, the ciphertext image is obtained by the QMPDFrAT and chaos-based joint permutation−diffusion, which makes encrypted pixel values randomly distributed as much as possible. The information entropies of the RGB components in the final encryption image under different input test images are shown in Table 7. One can see that the information entropies are extremely close to 8 bits. Therefore, the proposed double-color-image encryption algorithm can resist the information entropy analysis attack.

6.4. Sensibility Analyses

6.4.1. Key Sensitivity Analysis

To inspect the sensitivity of the proposed algorithm, a set of tests are performed by decrypting the ciphertext image with a tiny perturbation in the correct encryption key. Figure 15 and Figure 16 exhibit the decryption image “Peppers” when one of the initial keys has a tiny deviation while all the other keys are correct, respectively. Figure 16 shows the decryption image “Peppers” decrypted with wrong keys α = α + 10 3 , β = β + 10 3 , M 1 = M 1 + 1 , M 2 = M 2 + 1 , randomly generated real vectors η 1 and η 2 , respectively. The decryption results indicate that these images cannot reveal any serviceable information and the proposed image encryption algorithm is sensitive to the above-mentioned keys.

6.4.2. Key Space Analysis

Simulations show that the secret keys θ 1 , θ 2 , and ε are not sensitive enough, thus they are considered supplementary keys. From the sensitivity analysis in Section 6.4.1, the precision of the keys x 1 ( 1 ) , x 2 ( 1 ) , and λ is up to 10 15 . The deviation of control parameter δ is about 10 6 . The key space for fractional order α ( β ) is 10 3 . Therefore, the total key space of the proposed algorithm is at least 10 57 , which is greater than 2 189 . It indicates that the key space of the proposed encryption algorithm is large enough to resist the brute-force attack.

6.4.3. Differential Attack Analysis

Two common indicators, i.e., NPCR (number of pixel change rate) and UACI (unified average changing intensity) are introduced to evaluate the ability of the proposed algorithm to resist differential attack. These two indicators can be computed, respectively, as [11]
NPCR R , G , B = i , j D R , G , B ( i , j ) W × H × 100 %
UACI R , G , B = i , j | E R , G , B ( i , j ) E R , G , B ( i , j ) | 255 × W × H × 100 %
D R , G , B ( i , j ) = { 0 , E R , G , B ( i , j ) = E R , G , B ( i , j ) 1 , E R , G , B ( i , j ) E R , G , B ( i , j )
where E R , G , B and E R , G , B are the ciphertext images without and with only one pixel altered in the plaintext images, respectively. In these experiments, 10 pixels of different positions in each plaintext image are randomly selected and only one pixel is changed each time. In the diffusion process, the plaintext-related random values are randomly inserted into the to-be-encrypted sequence and the encrypted values are determined by the chaotic values and their previous ciphered values, both of which make the proposed cryptosystem sensitive to plaintext images. The average NPCR values and the average UACI values for the two ciphertext images are tabulated in Table 8. It shows that the proposed encryption algorithm could resist differential attack, since the values of NPCR and UACI are close to their theoretical values.

6.5. Robustness against Noise Analysis and Data Loss Attack

Assume that the encryption image is polluted by the additive Gaussian noise and Salt and Pepper noise during transmission. Decryption results of image “Peppers” with these two types of noises added to the ciphertext are displayed in Figure 17. Although the quality of decryption images decreases with the increase of noise parameter, the decryption images are still identifiable. It indicates that the proposed color image encryption algorithm could resist the noise attack to a certain extent. Figure 18 shows the PSNR values of different decryption images with the increase of noise parameter, which further supports our conclusion. To analyze the robustness of the proposed algorithm against data loss attack, the ciphertext image is assumed to be cropped to a limited degree. Simulation results are exhibited in Figure 19. It can be noted that the main information of the decryption image can still be recognized since the main information of the plaintext images is randomly distributed over the whole ciphertext image by the proposed QMPDFrAT and the joint permutation-diffusion mechanism. Therefore, the proposed algorithm can withstand data loss attack to a limited degree.

6.6. Robustness of the Proposed Algorithm against Four Typical Attacks

Among the four potential attacks including ciphertext-only attack, known-plaintext attack, chosen-ciphertext attack, and chosen-plaintext attack, the chosen-plaintext attack is considered as the most powerful one. In the cryptanalysis, if the cryptosystem is immune to the chosen-plaintext attack, it will be able to withstand other three attacks [12].
Under the chosen-plaintext attack, attackers may deduce the secret keys by a pair of the corresponding plaintext and ciphertext images. In our algorithm, the deficiency caused by the linear transform system is eliminated by a nonlinear spherical transform. The current encrypted pixel value is associated with the plaintext-related values and the previous ciphered value, which contributes to the high sensitivity for the plaintext images. On the other hand, the plaintext-related values are obtained in a random way, which enables the proposed algorithm to generate a completely different encrypted images each time when it is applied to the same original images with the same secret keys. In addition, some attackers may deduce the secret keys by analyzing the special images, such as all black and all white images [44]. To analyze this situation, double black images and double white images are considered as the inputs of the proposed cryptosystem, respectively. Figure 20 shows one of the double special images and their corresponding encryption images. As it is shown from the simulation results, the ciphertext images of these two special images are all noise-like. Therefore, the designed double-color-image encryption algorithm has a strong ability to resist the chosen-plaintext attack and the other three potential attacks.

6.7. Time Analysis

Execution time is a significant consideration in image encryption and decryption processes. The encryption and decryption time of the proposed cryptosystem and similar algorithms in refs. [11,29,31,38] is shown in Table 9. Simulations with the same number of input images are conducted under MATLAB (R2016a) on a personal computer with Intel (R) Core (TM) i7−3537 U CPU @2.00 GHz, 4GB RAM running Windows 10. In ref. [11], the keystreams utilized in encryption and decryption processes are generated by iterating the 6D hyperchaotic system, which takes too much time. In refs. [29,31], the compression and encryption are realized efficiently by combining CS with joint low-dimensional chaotic system. However, the decryption process is time-consuming as it takes too much time to reconstruct the original signal. Since the whole encryption process is executed in the spatial domain, the security of the encryption algorithm in ref. [38] is guaranteed by the complex permutation and diffusion operations, which leads to relatively longer encryption and decryption time. In our algorithm, the time-consuming parts include double-color-image compression, three times QMPDFrATs, a spherical transform, and one-time joint permutation-diffusion operation. QMPDFrAT was pointed out to be efficient in Section 3. Only one-time traversal of the to-be-encrypted sequence allows the permutation-diffusion process to take relatively shorter encryption and decryption time. Figure 21a,b shows the encryption time and the decryption time of each part, respectively. As observed from Figure 21, the encryption and decryption time is acceptable. Therefore, the proposed image compression-encryption algorithm is feasible in real-time cryptosystem.

7. Conclusions

The quaternion multiple parameter discrete fractional angular transform is firstly defined. The analysis shows that the proposed quaternion multiple parameter discrete fractional angular transform is a suitable tool for image encryption. Based on this transform, a new double-color-image compression-encryption algorithm with a spatiotemporal chaotic system is obtained. Sub-bands of original images based on quaternion representation are encrypted with quaternion multiple parameter discrete fractional angular transform and the intermediate results are constructed into three new matrices with the same size of plaintext images, which avoids the additional data extension that many transform-based methods yield. The spherical transform, as a nonlinear operation, is introduced to nonlinearly make the three transform results interact. A new joint permutation-diffusion mechanism with plaintext-related random pixel insertion is developed to enhance the security of cryptosystem and reduce encryption time simultaneously. The simulation results show that the proposed algorithm has better reconstruction effects than some similar compression-encryption algorithms. The security performance evaluation demonstrates that the proposed color image encryption algorithm has a large key space, high key sensitivity, and can withstand statistical analyses attack, differential attack, noise attack, occlusion attack, known-plaintext attack, and chosen-plaintext attack.

Author Contributions

Conceptualization, M.X. and Z.Z.; methodology, L.G.; software, R.T.; validation, R.T., H.Y. and Z.Z.; writing—original draft preparation, M.X.; writing—review and editing, L.G. and Z.Z.; project administration, Z.Z.; funding acquisition, M.X., L.G. and Z.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (Grant Nos. 61861029 and 61962020), the Major Academic Discipline and Technical Leader of Jiangxi Province (Grant No. 20162BCB22011), the Natural Science Foundation of Jiangxi Province (Grant Nos. 20171BAB202002 and 20202BABL212006), the State Key Laboratory of Computer Science Open Subject Fund (Grant No. SYSKF2102), and the Cultivation Plan of Applied Research of Jiangxi Province (Grant No. 20181BBE58022).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhou, N.R.; Jiang, H.; Gong, L.H.; Xie, X.W. Double-image compression and encryption algorithm based on co-sparse representation and random pixel exchanging. Opt. Lasers Eng. 2018, 110, 72–79. [Google Scholar] [CrossRef]
  2. Pak, C.; Huang, L.L. A new color image encryption using combination of the 1D chaotic map. Signal Process. 2017, 138, 129–137. [Google Scholar] [CrossRef]
  3. Parvaz, R.; Zarebnia, M. A combination chaotic system and application in color image encryption. Opt. Laser Technol. 2018, 101, 30–41. [Google Scholar] [CrossRef] [Green Version]
  4. Zhang, Y.Q.; Wang, X.Y. A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf. Sci. 2014, 273, 329–351. [Google Scholar] [CrossRef]
  5. Zhang, Y.Q.; Wang, X.Y. A new image encryption algorithm based on non-adjacent coupled map lattices. Appl. Soft Comput. 2015, 26, 10–20. [Google Scholar] [CrossRef]
  6. Wang, X.Y.; Feng, L.; Li, R.; Zhang, F.C. A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model. Nonlinear Dyn. 2019, 95, 2797–2824. [Google Scholar] [CrossRef]
  7. Gayathri, J.; Subashini, S. An efficient spatiotemporal chaotic image cipher with an improved scrambling algorithm driven by dynamic diffusion phase. Inf. Sci. 2019, 489, 227–254. [Google Scholar] [CrossRef]
  8. Sahari, M.L.; Boukemara, I. A pseudo-random numbers generator based on a novel 3D chaotic map with an application to color image encryption. Nonlinear Dyn. 2018, 94, 723–744. [Google Scholar] [CrossRef]
  9. Tong, X.J.; Zhang, M.; Wang, Z.; Liu, Y.; Xu, H.; Ma, J. A fast encryption algorithm of color image based on four-dimensional chaotic system. J. Vis. Commun. Image Represent. 2015, 33, 219–234. [Google Scholar] [CrossRef]
  10. Chen, C.; Sun, K.H.; He, S.B. An improved image encryption algorithm with finite computing precision. Signal Process. 2020, 168, 107340. [Google Scholar] [CrossRef]
  11. Wu, X.J.; Wang, D.W.; Kurths, J.; Kan, H.B. A novel lossless color encryption scheme using 2D DWT and 6D hyperchaotic system. Inf. Sci. 2016, 349, 137–153. [Google Scholar] [CrossRef]
  12. Chai, X.L.; Fu, X.L.; Gan, Z.H.; Lu, Y.; Chen, Y.R. A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process. 2019, 155, 44–62. [Google Scholar] [CrossRef]
  13. Niyat, A.Y.; Moattar, M.H.; Torshiz, M.N. Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt. Lasers Eng. 2017, 90, 225–237. [Google Scholar] [CrossRef]
  14. Mani, P.; Rajan, R.; Shanmugam, L.; Joo, Y.H. Adaptive control for fractional order induced chaotic fuzzy cellular neural networks and its application to image encryption. Inf. Sci. 2019, 491, 74–89. [Google Scholar] [CrossRef]
  15. Chen, H.; Tanougast, C.; Liu, Z.J.; Sieler, L. Asymmetric optical cryptosystem for color image based on equal modulus decomposition in gyrator transform domains. Opt. Lasers Eng. 2017, 93, 1–8. [Google Scholar] [CrossRef]
  16. Xiong, Y.; Du, J.; Quan, C. Single-channel optical color image cryptosystem using two-step phase-shifting interferometry and random modulus decomposition. Opt. Laser Technol. 2019, 119, 105580. [Google Scholar] [CrossRef]
  17. Wang, X.L.; Zhai, H.C.; Li, Z.L.; Ge, Q. Double random-phase encryption based on discrete quaternion Fourier-transforms. Optik 2011, 122, 1856–1859. [Google Scholar] [CrossRef]
  18. Shao, Z.H.; Liu, X.L.; Yao, Q.J.; Qi, N.; Shang, Y.Y.; Zhang, J.J. Multiple-image encryption based on chaotic phase mask and equal modulus decomposition in quaternion gyrator domain. Signal Process. Image Commun. 2020, 80, 115662. [Google Scholar] [CrossRef]
  19. Chen, B.J.; Yu, M.; Tian, Y.H.; Li, L.D.; Wang, D.C.; Sun, X.M. Multiple-parameter fractional quaternion Fourier transform and its application in colour image encryption. IET Image Process. 2018, 12, 2238–2249. [Google Scholar] [CrossRef]
  20. Zhou, N.R.; Wang, Y.X.; Gong, L.H.; Chen, X.B.; Yang, Y.X. Novel color image encryption algorithm based on the reality preserving fractional Mellin transform. Opt. Laser Technol. 2012, 44, 2270–2281. [Google Scholar] [CrossRef]
  21. Kang, X.J.; Ming, A.L.; Tao, R. Reality-preserving multiple parameter discrete fractional angular transform and its application to color image encryption. IEEE Trans. Circuits Syst. 2019, 29, 1595–1607. [Google Scholar] [CrossRef]
  22. Kang, X.J.; Tao, R. Color image encryption using pixel scrambling operation and reality-preserving MPFRHT. IEEE Trans. Circuits Syst. 2019, 29, 1919–1932. [Google Scholar]
  23. Lang, J. Color image encryption based on color blend and chaos permutation in the reality-preserving multiple-parameter fractional Fourier transform domain. Opt. Commun. 2015, 333, 181–192. [Google Scholar] [CrossRef]
  24. Shao, Z.H.; Shang, Y.Y.; Tong, Q.B.; Ding, H.; Zhao, X.X.; Fu, X.Y. Multiple color image encryption and authentication based on phase retrieval and partial decryption in quaternion gyrator domain. Multimed. Tools Appl. 2018, 77, 25821–25840. [Google Scholar] [CrossRef]
  25. Shao, Z.H.; Shu, H.Z.; Wu, J.S.; Dong, Z.F.; Coatrieux GCoatrieux, J.L. Double color image encryption using iterative phase retrieval algorithm in quaternion gyrator domain. Opt. Express 2014, 22, 4932–4942. [Google Scholar] [CrossRef] [Green Version]
  26. Wei, R.; Li, X.W.; Wang, Q.H. Double color image encryption scheme based on off-axis holography and maximum length cellular automata. Optik 2017, 145, 407–417. [Google Scholar] [CrossRef]
  27. Song, Y.J.; Zhu, Z.L.; Zhang, W.; Guo, L.; Yang, X.; Yu, H. Joint image compression-encryption scheme using entropy coding and compressive sensing. Nonlinear Dyn. 2019, 95, 2235–2261. [Google Scholar] [CrossRef]
  28. Xu, Q.Y.; Sun, K.H.; Cao, C.; Zhu, C.X. A fast image encryption algorithm based on compressive sensing and hyperchaotic map. Opt. Lasers Eng. 2019, 121, 203–214. [Google Scholar] [CrossRef]
  29. Chen, X.D.; Wang, Y.; Wang, J.; Wang, Q.H. Asymmetric color cryptosystem based on compressed sensing and equal modulus decomposition in discrete fractional random transform domain. Opt. Lasers Eng. 2019, 121, 143–149. [Google Scholar] [CrossRef]
  30. Zhang, D.; Liao, X.F.; Yang, B.; Zhang, Y.S. A fast and efficient approach to color-image encryption based on compressive sensing and fractional Fourier transform. Multimed. Tools Appl. 2018, 77, 2191–2208. [Google Scholar] [CrossRef]
  31. Han, F.; Liao, X.F.; Yang, B.; Zhang, Y.S. A hybrid scheme for self-adaptive double color-image encryption. Multimed. Tools Appl. 2018, 77, 14285–14304. [Google Scholar] [CrossRef]
  32. Hamilton, W. Elements of Quaternions; Longmans: Harlow, UK; London, UK, 1866. [Google Scholar]
  33. Liu, Z.J.; Ahmad, M.A.; Liu, S. A discrete fractional angular transform. Opt. Commun. 2008, 281, 1424–1429. [Google Scholar] [CrossRef]
  34. Sui, L.S.; Duan, K.K.; Liang, J.L. Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps. Opt. Commun. 2015, 343, 140–149. [Google Scholar] [CrossRef]
  35. Xu, G.L.; Wang, X.T.; Xu, X.G. Fractional quaternion Fourier transform, convolution and correlation. Signal Process. 2008, 88, 2511–2517. [Google Scholar]
  36. Chen, B.J.; Zhou, C.F.; Jeon, B.; Zheng, Y.H.; Wang, J.W. Quaternion discrete fractional random transform for color image adaptive watermarking. Multimed. Tools Appl. 2018, 77, 20809–20837. [Google Scholar] [CrossRef]
  37. Chai, X.L.; Zheng, X.Y.; Gan, Z.H.; Han, D.J.; Chen, Y.R. An image encryption algorithm based on chaotic system and compressive sensing. Signal Process. 2018, 148, 124–144. [Google Scholar] [CrossRef]
  38. Huang, L.Q.; Cai, S.T.; Xiong, X.M.; Xiao, M.Q. On symmetric color image encryption system with permutation-diffusion simultaneous operation. Opt. Lasers Eng. 2019, 115, 7–20. [Google Scholar] [CrossRef]
  39. Usi-Sipi Image Database for Research in Image Processing, Image Analysis, and Machine Vision. Available online: http://sipi.usc.edu/database/ (accessed on 19 September 2017).
  40. Wang, Z.; Bovik, A.C.; Sheikh, H.R.; Simoncelli, E.P. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 2004, 13, 600–612. [Google Scholar] [CrossRef] [Green Version]
  41. Kong, D.Z.; Shen, X.J. Multiple-image encryption based on optical wavelet transform and multichannel fractional Fourier transform. Opt. Laser Technol. 2014, 57, 343–349. [Google Scholar] [CrossRef]
  42. Qin, Y.; Gong, Q.; Wang, Z.P.; Wang, H.J. Optical multiple-image encryption in diffractive-imaging-based scheme using spectral fusion and nonlinear operation. Opt. Express. 2016, 24, 26877–26886. [Google Scholar] [CrossRef]
  43. Gong, L.H.; Qiu, K.D.; Deng, C.Z.; Zhou, N.R. An image compression and encryption algorithm based on chaotic system and compressive sensing. Opt. Laser Technol. 2019, 115, 257–267. [Google Scholar] [CrossRef]
  44. Cao, C.; Sun, K.H.; Liu, W.H. A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process. 2018, 143, 122–133. [Google Scholar] [CrossRef]
Figure 1. Double-color-image encryption algorithm.
Figure 1. Double-color-image encryption algorithm.
Entropy 24 00941 g001
Figure 2. Compression process for R 1 . (a) shows the whole compression process and (b) shows the schematic diagram of Zigzag operation in (a).
Figure 2. Compression process for R 1 . (a) shows the whole compression process and (b) shows the schematic diagram of Zigzag operation in (a).
Entropy 24 00941 g002
Figure 3. Rotation map on matrix B i ( i = 1 , 2 , 3 ) in spherical transform.
Figure 3. Rotation map on matrix B i ( i = 1 , 2 , 3 ) in spherical transform.
Entropy 24 00941 g003
Figure 4. Structure of general image encryption algorithm.
Figure 4. Structure of general image encryption algorithm.
Entropy 24 00941 g004
Figure 5. Joint permutation-diffusion mechanism with plaintext-related random pixel insertion.
Figure 5. Joint permutation-diffusion mechanism with plaintext-related random pixel insertion.
Entropy 24 00941 g005
Figure 6. Double-color-image decryption algorithm.
Figure 6. Double-color-image decryption algorithm.
Entropy 24 00941 g006
Figure 7. Original images: (a) “Lena”, (b) “Peppers”, (c) “Female”, (d) “Milkdrop”, (e) “House”, (f) “Airplane”, (g) “Couple”, (h) “Tree”.
Figure 7. Original images: (a) “Lena”, (b) “Peppers”, (c) “Female”, (d) “Milkdrop”, (e) “House”, (f) “Airplane”, (g) “Couple”, (h) “Tree”.
Entropy 24 00941 g007
Figure 8. Ciphertext images: (a) “Lena-Peppers”, (b) “Female-Milkdrop”, (c) “House-Airplane”, (d) “Couple-Tree”.
Figure 8. Ciphertext images: (a) “Lena-Peppers”, (b) “Female-Milkdrop”, (c) “House-Airplane”, (d) “Couple-Tree”.
Entropy 24 00941 g008
Figure 9. Decryption images: (a) “Lena”, (b) “Peppers”, (c) “Female”, (d) “Milkdrop”, (e) “House”, (f) “Airplane”, (g) “Couple”, (h) “Tree”.
Figure 9. Decryption images: (a) “Lena”, (b) “Peppers”, (c) “Female”, (d) “Milkdrop”, (e) “House”, (f) “Airplane”, (g) “Couple”, (h) “Tree”.
Entropy 24 00941 g009
Figure 10. PSNR values with different methods: the eight points on the abscissa denote decryption images “Lena”, “Peppers”, “Female”, “Milkdrop”, “House”, “Airplane”, “Couple”, and “Tree”, respectively. Yellow [29], Black [31].
Figure 10. PSNR values with different methods: the eight points on the abscissa denote decryption images “Lena”, “Peppers”, “Female”, “Milkdrop”, “House”, “Airplane”, “Couple”, and “Tree”, respectively. Yellow [29], Black [31].
Entropy 24 00941 g010
Figure 11. Decryption results: (af) decryption images “Peppers” with methods 1, 2, 3, 4, 5, and method in ref. [31], respectively.
Figure 11. Decryption results: (af) decryption images “Peppers” with methods 1, 2, 3, 4, 5, and method in ref. [31], respectively.
Entropy 24 00941 g011
Figure 12. (ae) Details of the decryption image “Peppers” with methods 1, 2, 3, 4, and 5, respectively.
Figure 12. (ae) Details of the decryption image “Peppers” with methods 1, 2, 3, 4, and 5, respectively.
Entropy 24 00941 g012
Figure 13. Histograms: (a1c1) R, G, B components of image “Lena”, respectively. (a2c2) R, G, B components of image “Peppers”, respectively. (a3c3) R, G, B components of encryption image “Lena-Peppers”, respectively.
Figure 13. Histograms: (a1c1) R, G, B components of image “Lena”, respectively. (a2c2) R, G, B components of image “Peppers”, respectively. (a3c3) R, G, B components of encryption image “Lena-Peppers”, respectively.
Entropy 24 00941 g013
Figure 14. Correlation distributions of adjacent pixels in the horizontal, vertical, diagonal directions: (a) distribution of original color image “Lena”; (bd) distributions of red, green, and blue components of encryption image “Lena−Peppers”, respectively.
Figure 14. Correlation distributions of adjacent pixels in the horizontal, vertical, diagonal directions: (a) distribution of original color image “Lena”; (bd) distributions of red, green, and blue components of encryption image “Lena−Peppers”, respectively.
Entropy 24 00941 g014
Figure 15. Decryption image “Peppers” with adjusted keys: (a1) x 1 ( 1 ) = x 1 ( 1 ) + 10 15 , (b1) x 2 ( 1 ) = x 2 ( 1 ) + 10 15 , (c1) λ = λ + 10 15 , (d1) δ = δ + 10 6 .
Figure 15. Decryption image “Peppers” with adjusted keys: (a1) x 1 ( 1 ) = x 1 ( 1 ) + 10 15 , (b1) x 2 ( 1 ) = x 2 ( 1 ) + 10 15 , (c1) λ = λ + 10 15 , (d1) δ = δ + 10 6 .
Entropy 24 00941 g015
Figure 16. Decryption image “Peppers” with adjusted keys: (a2) α = α + 10 3 , (b2) β = β + 10 3 , (c2) η 1 , (d2) η 2 (e2) M 1 = M 1 + 1 , (f2) M 2 = M 2 + 1 .
Figure 16. Decryption image “Peppers” with adjusted keys: (a2) α = α + 10 3 , (b2) β = β + 10 3 , (c2) η 1 , (d2) η 2 (e2) M 1 = M 1 + 1 , (f2) M 2 = M 2 + 1 .
Entropy 24 00941 g016
Figure 17. Decryption images “Peppers” with different noise attacks: Gaussian noise with intensity k  (a) k = 0.25 , (b) k = 0.75 , Salt and Pepper noise with the density of noise distribution (c) 0.1 (d) 0.5.
Figure 17. Decryption images “Peppers” with different noise attacks: Gaussian noise with intensity k  (a) k = 0.25 , (b) k = 0.75 , Salt and Pepper noise with the density of noise distribution (c) 0.1 (d) 0.5.
Entropy 24 00941 g017
Figure 18. Average PSNR value versus noise parameter: (a) Gaussian noise, (b) Salt and Pepper noise.
Figure 18. Average PSNR value versus noise parameter: (a) Gaussian noise, (b) Salt and Pepper noise.
Entropy 24 00941 g018
Figure 19. Results of data loss attack: (ad) are encryption images with 1%, 2.5%, 5%, 10% data loss, respectively; (eh) are the corresponding decryption images “Peppers”.
Figure 19. Results of data loss attack: (ad) are encryption images with 1%, 2.5%, 5%, 10% data loss, respectively; (eh) are the corresponding decryption images “Peppers”.
Entropy 24 00941 g019
Figure 20. Encryption results of black and white images: (a) black image, (b) encryption black image, (c) white image, (d) encryption white image.
Figure 20. Encryption results of black and white images: (a) black image, (b) encryption black image, (c) white image, (d) encryption white image.
Entropy 24 00941 g020
Figure 21. (a) Encryption time and time consumption percentage of each part; (b) decryption time and time consumption percentage of each part.
Figure 21. (a) Encryption time and time consumption percentage of each part; (b) decryption time and time consumption percentage of each part.
Entropy 24 00941 g021
Table 1. Comparison results under the same compression ratio.
Table 1. Comparison results under the same compression ratio.
Spare and Reconstruction AlgorithmsDWT + OMP DWT + SL 0 DWT + IDWT
Decryption time (s)3.55823.69330.0369
PSNR20.344120.529230.5270
Table 2. Comparison of four quaternion transforms.
Table 2. Comparison of four quaternion transforms.
TransformFRQFT [35]QDFRNT [36]MPFrQFT [19]Proposed
QMPDFrAT
Performance Entropy 24 00941 i001 Entropy 24 00941 i002 Entropy 24 00941 i003 Entropy 24 00941 i004
Secret keys α , μ α , μ α , μ , M 1 , η 1 α , θ , μ , M 1 , η 1
Calculation time (s) of eigenvector (N = 256)0.0145130.0219120.0145130.004462
Table 3. PSNR and MSSIM values of decryption images.
Table 3. PSNR and MSSIM values of decryption images.
Decryption ImagePSNR (dB)MSSIM
RGBAverage
“Lena”30.878328.175929.376629.47690.9801
“Peppers”31.162629.132630.882930.39270.9903
“Female”34.954334.198032.379033.84370.9925
“Milkdrop”41.528332.183533.633935.78190.9957
“House”34.612834.633532.683333.97650.9946
“Airplane”28.335327.465930.748328.84990.9787
“Couple”34.881735.736234.241734.95320.9904
“Tree”30.628228.309629.389829.44250.9842
Table 4. Five methods for selecting high-frequency sub-bands.
Table 4. Five methods for selecting high-frequency sub-bands.
Method6 High-Frequency Sub-Bands
Method 1 L H 1 R 1 , G 1 , B 1 , R 2 , G 2 , B 2
Method 2 H L 1 R 1 , G 1 , B 1 , R 2 , G 2 , B 2
Method 3 H H 1 R 1 , G 1 , B 1 , R 2 , G 2 , B 2
Method 4 L H 1 R 1 , R 2 , H L 1 G 1 , G 2 , H H 1 B 1 , B 2
Method 5 ( L H 1 R 1 , R 2 + H L 1 R 1 , R 2 + H H 1 R 1 , R 2 ) DWT & Zigzag C 1 R 1 , R 2 ( L H 1 G 1 , G 2 + H L 1 G 1 , G 2 + H H 1 G 1 , G 2 ) DWT & Zigzag C 1 G 1 , G 2 ( L H 1 B 1 , B 2 + H L 1 B 1 , B 2 + H H 1 B 1 , B 2 ) DWT & Zigzag C 1 B 1 , B 2
Table 5. Results of chi-square test.
Table 5. Results of chi-square test.
Imageχ2-ValueCritical Value
RGB1% Probability5% Probability
“Lena-Peppers”244.9391227.9453260.7734310.457293.2478
“Female-Milkdrop”239.0859243.7813249.9844
“House-Airplane”267.0547223.8281261.0781
“Couple-Tree”243.7188249.2656191.0938
Table 6. Correlation coefficients of adjacent pixels.
Table 6. Correlation coefficients of adjacent pixels.
SchemeImage Horizontal DirectionVertical DirectionDiagonal Direction
Proposed scheme“Lena”R0.96620.93550.9056
G0.94590.90470.8735
B0.89310.86620.8314
“Peppers”R0.95070.94530.9069
G0.96520.95710.9307
B0.94510.93560.9028
“Female”R0.95530.97160.9401
G0.96530.97220.9547
B0.94930.96070.9360
“Milkdrop”R0.99470.98240.9809
G0.97100.95720.9418
B0.95420.95670.9182
“Lena−Peppers”R−0.0013−0.01110.0046
G0.01350.0064−0.0241
B0.01790.01310.0023
“Female−Milkdrop”R0.00160.0044−0.0013
G−0.01200.00950.0056
B0.00170.00940.0141
Ref. [11]“Lena”R−0.0027−0.0131−0.0032
G0.00730.01780.0127
B0.0012−0.01400.0123
Ref. [31]“Lena”R0.08470.05010.0356
G0.0707−0.03180.0831
B0.1394−0.01330.1065
Ref. [38]“Lena”R0.00250.00470.0021
G0.00190.01270.0037
B−0.00320.01010.0087
Table 7. Results of information entropy (dB) of encryption color images.
Table 7. Results of information entropy (dB) of encryption color images.
AlgorithmEncryption ImageRGB
Proposed algorithm“Lena−Peppers”7.99707.99747.9976
“Female−Milkdrop”7.99737.99747.9971
“House−Airplane”7.99707.99767.9975
“Couple−Tree”7.99737.99737.9979
Ref. [11]“Lena”7.99157.99127.9909
Ref. [30]“Lena”7.34887.46377.3369
Ref. [31]“Lena”7.24967.35557.2855
Ref. [38]“Lena”7.99907.99897.9992
Table 8. Results of average NPCR and UACI values for different color images.
Table 8. Results of average NPCR and UACI values for different color images.
ImageNPCR (%)UACI (%)
RedGreenBlueRedGreenBlue
“Lena”99.642999.662899.626133.444033.487633.4167
“Peppers”99.632599.611899.625333.453033.472933.4237
“Female”99.653699.633299.637933.452133.413633.4377
“Milkdrop”99.604599.599299.621033.356133.412933.4459
“Lena” in Ref. [11]99.610199.613699.614133.469533.429233.4665
“Lena” in Ref. [31]99.625899.636699.599733.389433.394433.4859
“Lena” in Ref. [38]99.610399.909899.608933.465533.465233.4591
Table 9. Encryption and decryption time (s).
Table 9. Encryption and decryption time (s).
TimeProposed SchemeRef. [11]Ref. [29]Ref. [31]Ref. [38]
Encryption time1.22714.08210.85740.91391.8094
Decryption time1.15794.21164.66584.53481.9225
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Xiao, M.; Tan, R.; Ye, H.; Gong, L.; Zhu, Z. Double-Color-Image Compression-Encryption Algorithm Based on Quaternion Multiple Parameter DFrAT and Feature Fusion with Preferable Restoration Quality. Entropy 2022, 24, 941. https://doi.org/10.3390/e24070941

AMA Style

Xiao M, Tan R, Ye H, Gong L, Zhu Z. Double-Color-Image Compression-Encryption Algorithm Based on Quaternion Multiple Parameter DFrAT and Feature Fusion with Preferable Restoration Quality. Entropy. 2022; 24(7):941. https://doi.org/10.3390/e24070941

Chicago/Turabian Style

Xiao, Meihua, Ruixiao Tan, Huosheng Ye, Lihua Gong, and Zhiliang Zhu. 2022. "Double-Color-Image Compression-Encryption Algorithm Based on Quaternion Multiple Parameter DFrAT and Feature Fusion with Preferable Restoration Quality" Entropy 24, no. 7: 941. https://doi.org/10.3390/e24070941

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop