[go: up one dir, main page]

Skip to main content

Advertisement

Log in

A novel image compression technique and secured transmission of compressed images via optical fiber using higher dimensional chaotic map

  • Research Article
  • Published:
Journal of Optics Aims and scope Submit manuscript

Abstract

The current research work establishes an efficient optical transceiver system for secured transmission and authentication of compressed images. There are two aspects of the current work, viz. to enhance security of transmitted images using 5D hyper chaos and to establish a novel loss-less compression technique to optimize transmission bandwidth. In the process, the first step is to encrypt the plain image with five-dimensional hyperchaotic keys which is private to individual user. Chaotic sequence combined with random number controlled by designed logic circuit is used to generate the secret keys. To optimize the transmission bandwidth over optical channel, modified Run Length Encoding and decoding compression-decompression technique is used which are proven to provide better compression ratio (2.00065) in comparison to existing methods. Our designed Optical system gives a Q factor of 7.125 and BER value 10–13 for the distance 50 km, to ensure proper reception with minimum distortion. The performance of the proposed encryption algorithm is examined in terms of correlation parameter, PSNR, information entropy, histogram analysis, key sensitivity analysis, key space analysis and differential analysis. The proposed cryptosystem is proven to be robust enough with information entropy 7.9983. Robustness of the cryptosystem is verified by Known Plaintext Attack, Chosen Plaintext Attack, Chosen Ciphertext Attack, cropping attack and noise attack. Randomness of the bit stream generated by the cryptographic algorithm is tested by NIST SP 800-22 batteries of test suite. The optical communication block has been developed using OptiSystem simulation software.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19

Similar content being viewed by others

Data availability

The data that support the findings of this study are available from the corresponding author upon reasonable request.

References

  1. G.S. Vernam, Cipher printing telegraph systems: for secret wire and radio telegraphic communications. J. AIEE 45(2), 109–115 (1926)

    Google Scholar 

  2. P.V. Nadiya, B.M. Imran, February. Image steganography in DWT domain using double-stegging with RSA encryption. In 2013 International conference on signal processing, image processing & pattern recognition, IEEE pp. 283–287 (2013)

  3. R.L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 26(1), 96–99 (1983)

    Article  Google Scholar 

  4. P.V.V. Kishore, N. Venkatram, C. Sarvya. L.S.S. Reddy, Medical image watermarking using RSA encryption in wavelet domain. In 2014 First international conference on networks & soft computing (ICNSC2014) IEEE pp. 258–262 (2014)

  5. C. Li, G. Luo, K. Qin, C. Li, An image encryption scheme based on chaotic tent map. Nonlinear Dyn. 87(1), 127–133 (2017)

    Article  Google Scholar 

  6. P.S. Sneha, S. Sankar, A.S. Kumar, A chaotic colour image encryption scheme combining Walsh-Hadamard transform and Arnold-Tent maps. J. Ambient. Intell. Humaniz. Comput. 11(3), 1289–1308 (2020)

    Article  Google Scholar 

  7. M. Khalili, DCT-Arnold chaotic based watermarking using JPEG-YCbCr. Optik 126(23), 4367–4371 (2015)

    Article  ADS  Google Scholar 

  8. Z. Yunpeng, S. Peng, X. Jing, H. Yunting. Color image encryption solution based on the chaotic system of logistic and henon. In Int Conf Softwa Data Technol, Piraeus (2010)

  9. C. Zhu, K. Sun, Cryptanalyzing and improving a novel color image encryption algorithm using RT-enhanced chaotic tent maps. IEEE Access 6, 18759–18770 (2018)

    Article  Google Scholar 

  10. C. Li, D. Lin, B. Feng, J. Lü, F. Hao, Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6, 75834–75842 (2018)

    Article  Google Scholar 

  11. G. Ye, C. Pan, X. Huang, Q. Mei, An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dyn. 94(1), 745–756 (2018)

    Article  Google Scholar 

  12. Y. Luo, J. Yu, W. Lai, L. Liu, A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimed. Tools Appl. 78(15), 22023–22043 (2019)

    Article  Google Scholar 

  13. R. Ponuma, R. Amutha, Encryption of image data using compressive sensing and chaotic system. Multimed. Tools Appl. 78(9), 11857–11881 (2019)

    Article  Google Scholar 

  14. B. Wang, S. Zhou, X. Zheng, C. Zhou, J. Dong, L. Zhao, Image watermarking using chaotic map and DNA coding. Optik 126(24), 4846–4851 (2015)

    Article  ADS  Google Scholar 

  15. H. Liu, D. Lin, A. Kadir, A novel data hiding method based on deoxyribonucleic acid coding. Comput. Electr. Eng. 39(4), 1164–1173 (2013)

    Article  ADS  Google Scholar 

  16. X. Fang, X. Lai, DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys. Sci. China Inf. Sci. 57(9), 1–10 (2014)

    Article  MathSciNet  Google Scholar 

  17. X. Huang, G. Ye, An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed. Tools Appl. 72(1), 57–70 (2014)

    Article  Google Scholar 

  18. S.H. Lee, DWT based coding DNA watermarking for DNA copyright protection. Inform. Sci. 273, 263–286 (2014)

    Article  Google Scholar 

  19. D. Heider, A. Barnekow, DNA watermarking: challenging perspectives for biotechnological applications. Curr. Bioinform. 6(3), 375–382 (2011)

    Article  Google Scholar 

  20. S. Shoshani, R. Piran, Y. Arava, E. Keinan, A molecular cryptosystem for images by DNA computing. Angew. Chem. Int. Ed. 51(12), 2883–2887 (2012)

    Article  Google Scholar 

  21. P. Ramasamy, V. Ranganathan, S. Kadry, R. Damaševičius, T. Blažauskas, An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced logistic—Tent map. Entropy 21(7), 656 (2019)

    Article  ADS  MathSciNet  Google Scholar 

  22. T. Gao, Z. Chen, A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(4), 394–400 (2008)

    Article  ADS  Google Scholar 

  23. R. Rhouma, S. Belghith, Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372, 5973–5978 (2008)

    Article  ADS  Google Scholar 

  24. Q. Zhang, L. Guo, X.P. Wei, A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik 124, 3596–3600 (2013)

    Article  ADS  Google Scholar 

  25. F.G. Jeng, W.L. Huang, T.H. Chen, Cryptanalysis and improvement of two hyperchaos-based image encryption schemes. Signal Process. Image Commun. 34, 45–51 (2015)

    Article  Google Scholar 

  26. G. Grassi, F.L. Severance, D.A. Miller, Multi-wing hyperchaotic attractors from coupled Lorenz systems. Chaos Solitons Fractals 41(1), 284–291 (2009)

    Article  ADS  Google Scholar 

  27. Q. Yang, M. Bai, A new 5D hyperchaotic system based on modified generalized Lorenz system. Nonlinear Dyn. 88(1), 189–221 (2017)

    Article  Google Scholar 

  28. S. Shanmugasundaram, R. Lourdusamy, A, “comparative study of text compression algorithms.” Int. J. Wisdom Based Comput. 1, 68–76 (2011)

    Google Scholar 

  29. S.R. Kodituwakku, U.S. Amarasinghe, Comparison of lossless data compression algorithms for text data. Indian J. Comput. Sci. Eng. 1, 416–425 (2010)

    Google Scholar 

  30. M.A. Rahman, S.M.S Islam, J. Shin, M.R. Islam Histogram alternation based digital image compression using base-2 coding. In Proceedings of the digital image computing: techniques and applications (DICTA), Canberra, Australia, 10–13; pp. 1–8 (2018)

  31. W. Burger, M.J. Burge, Digital image processing: an algorithmic introduction using java (Springer, Berlin, 2016)

    Book  Google Scholar 

  32. S.D. Kim, J.H. Lee, J.K. Kim, A new chain-coding algorithm for binary images using run-length codes. Comput. Vis. Graphics Image Process. 41, 114–128 (1988)

    Article  Google Scholar 

  33. B. Khaled et al., A New5-D multistable hyperchaotic system with three positive lyapunov exponents: bifurcation analysis, circuit design, FPGA realization and image encryption. IEEE Access 10, 90111 (2022)

    Article  Google Scholar 

  34. S. Sikder, S. Ghosh, Performance enhancement of optical code-division multiple-access systems using transposed modified Walsh code. Opt. Eng. 57(2), 026114 (2018)

    Article  ADS  Google Scholar 

  35. W. Janke, Pseudo random numbers: Generation and quality checks. (2009)

  36. M. Ghebleh, A. Kanso, A novel efficient image encryption scheme based on chained skew tent maps. Neural Comput. Appl. 31(7), 2415–2430 (2019)

    Article  Google Scholar 

  37. Y. Li, C. Wang, H.A. Chen, Hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt. Lasers Eng. 90, 238–246 (2017)

    Article  Google Scholar 

  38. H.M. Yuan, Y. Liu, L.H. Gong, J. Wang, A new image cryptosystem based on 2D hyper-chaotic system. Multimed. Tools Appl. 76, 8087–108 (2017)

    Article  Google Scholar 

  39. A. Kadir, M. Aili, M. Sattar, Color image encryption scheme using coupled hyper chaotic system with multiple impulse injections. Optik-Int. J. Light Electron Opt. 129, 231–238 (2017)

    Article  Google Scholar 

  40. W. Alexan, N. Alexan, M. Gabr, Multiple-layer image encryption utilizing fractional-order chen hyperchaotic map and cryptographically secure PRNGs. Fractal Fract. 7, 287 (2023)

    Article  Google Scholar 

  41. W. Alexan, Y.L. Chen, L.Y. Por, M. Gabr, Hyperchaotic maps and the single neuron model: a novel framework for chaos-based image encryption. Symmetry 15, 1081 (2023)

    Article  ADS  Google Scholar 

  42. B. Stoyanov, K. Kordov, Image encryption using chebyshev map and rotation equation. Entropy 17, 2117–2139 (2015)

    Article  ADS  MathSciNet  Google Scholar 

  43. C.E. Shannon, Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)

    Article  MathSciNet  Google Scholar 

  44. X. Chai et al., Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption. Signal Process. 183, 108041 (2021)

    Article  Google Scholar 

  45. S. Gao, R. Wu, X. Wang, J. Wang, Q. Li, C. Wang, X. Tang, A 3D model encryption scheme based on a cascaded chaotic system. Signal Process. 202, 108745 (2023)

    Article  Google Scholar 

  46. R. Anushiadevi, R. Amirtharajan, Separable reversible data hiding in an encrypted image using the adjacency pixel difference histogram. J. Inf. Secur. Appl. 72, 103407 (2023)

    Google Scholar 

  47. W. Ali, C. Zhu, R. Latif, M. Asim, M.U. Tariq, Image encryption scheme based on orbital shift pixels shuffling with ILM chaotic system. Entropy 25, 787 (2023)

    Article  ADS  Google Scholar 

  48. J. Li, L. Chen, W. Cai, J. Xiao, J. Zhu, Y. Hu, K. Wen, Holographic encryption algorithm based on bit-plane decomposition and hyperchaotic Lorenz system. Opt. Laser Technol. 152, 108127 (2022)

    Article  Google Scholar 

  49. M.A. Lone, S. Qureshi, RGB image encryption based on symmetric keys using Arnold transform, 3D chaotic map and affine hill cipher. Optik 260, 168880 (2022)

    Article  Google Scholar 

  50. L. Teng, X. Wang, Y. Xian, Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion. Inf. Sci. 605, 71–85 (2022)

    Article  Google Scholar 

  51. G. Ye, H. Wu, M. Liu, Y. Shi, Image encryption scheme based on blind signature and an improved Lorenz system. Expert Syst. Appl. 205, 117709 (2022)

    Article  Google Scholar 

  52. W. Alexan, M. Elkandoz, M. Mashaly, E. Azab, A. Aboshousha, Color image encryption through chaos and KAA map. IEEE Access 11, 11541–11554 (2023)

    Article  Google Scholar 

  53. H. Mahalingam, T. Veeramalai, A.R. Menon, R. Amirtharajan, Dual-domain image encryption in unsecure medium—a secure communication perspective. Mathematics 11(2), 457 (2023)

    Article  Google Scholar 

  54. A. Rahman, M. Hamada, Lossless image compression techniques: a state-of-the-art survey. Symmetry 11, 1274 (2019)

    Article  ADS  Google Scholar 

Download references

Funding

No fund or grant was received.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed equally in the manuscript.

Corresponding author

Correspondence to Banhi Dutta Choudhuri Das.

Ethics declarations

Conflict of interest

The authors declare that there are no conflicts of interest related to this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dutta Choudhuri Das, B., Sikder, S. & Saha, A. A novel image compression technique and secured transmission of compressed images via optical fiber using higher dimensional chaotic map. J Opt (2024). https://doi.org/10.1007/s12596-024-02396-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12596-024-02396-7

Keywords