Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Multiple remote sensing image encryption scheme based on saliency extraction and magic cube circular motion

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

To improve the salient region security and transmission efficiency of remote sensing images, a multiple remote sensing image (MRSIs) encryption scheme based on saliency extraction and magic cube circular motion is proposed in this paper. The scheme provides two tiers of privacy protection for salient regions (airport locations) in remote sensing images. First, a 4D improved discrete tabu learning neuron (4D-IDTLN) chaotic system is proposed. The analysis of phase diagrams, the Lyapunov exponents (LEs) spectrum and bifurcation diagrams of the system show that the system exhibits rich dynamic behaviors. Second, the salient regions of remote sensing images are classified and extracted via knowledge-oriented saliency (KOS) and vision-oriented saliency (VOS) techniques to create a mask contour positioning model (MCPM) for the salient regions, which is then encrypted. Then, the MRSIs are fused into a cube, which is encrypted using magic cube circular motion and chaotic sequences and further encrypted using closed-loop diffusion. Finally, the security of the proposed encryption scheme is evaluated. The results indicate that the scheme provides higher security and better transmission efficiency for MRSIs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig.16
Fig.17
Fig.18

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability

The datasets generated during and/or analyzed during the current study are available from the corresponding author on reasonable request.

References

  1. Lin H, Wang C, Cui L, Sun Y, Xu C, Yu F (2022) Brain-like initial-boosted hyperchaos and application in biomedical image encryption. IEEE Trans Industr Inf 18(12):8839–8850

    Google Scholar 

  2. Zheng W, Yan L, Gou C, Wang F-Y (2021) An ACP-based parallel approach for color image encryption using redundant blocks. IEEE Transactions on Cybernetics 52(12):13181–13196

    Google Scholar 

  3. Zhang Z, Cao Y, Jahanshahi H, Mou J (2023) Chaotic color multi-image compression-encryption/lsb data type steganography scheme for nft transaction security. Journal of King Saud University-Computer and Information Sciences 35(10):101839

    Google Scholar 

  4. Gao X, Mou J, Banerjee S, Zhang Y (2023) Color-Gray Multi-Image Hybrid Compression-Encryption Scheme Based on BP Neural Network and Knight Tour. IEEE Transactions on Cybernetics 53:5037–5047

    Google Scholar 

  5. Kumar CM, Vidhya R, Brindha M (2022) An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function. Appl Intell 52(3):2556–2585

    Google Scholar 

  6. Lin C-M, Pham D-H, Huynh T-T (2021) Encryption and decryption of audio signal and image secure communications using chaotic system synchronization control by tsk fuzzy brain emotional learning controllers. IEEE Transactions on Cybernetics 52(12):13684–13698

    Google Scholar 

  7. Sha Y, Mou J, Banerjee S, Zhang Y (2023) Exploiting flexible and secure cryp- tographic technique for multi-dimensional image based on graph data structure and three-input majority gate. IEEE Trans Industr Inf 20:3835–3846

    Google Scholar 

  8. Wu R, Gao S, Wang X, Liu S, Li Q, Erkan U, Tang X (2022) Aea-ncs: An audio encryption algorithm based on a nested chaotic system. Chaos, Solitons Fractals 165:112770

    Google Scholar 

  9. Cao H, Wang Y, Banerjee S, Cao Y, Mou J (2024) A discrete Chialvo-Rulkov neuron network coupled with a novel memristor model: Design, Dynamical anal- ysis, DSP implementation and its application. Chaos, Solitons Fractals 179:114466

    Google Scholar 

  10. Mou J, Han Z, Cao Y, Banerjee S (2024) Discrete Second-Order Memristor and Its Application to Chaotic Map. IEEE Trans Circuits Syst II Express Briefs. https://doi.org/10.1109/TCSII.2023.3348998

    Article  Google Scholar 

  11. Mou J, Ma T, Banerjee S, Zhang Y (2024) A Novel Memcapacitive-Synapse Neuron: Bionic Modeling, Complex Dynamics Analysis and Circuit Implemen- tation. IEEE Trans Circuits Syst I Regul Pap. https://doi.org/10.1109/TCSI.2024.3355120

    Article  Google Scholar 

  12. Wang X, Cao Y, Li H, Li B (2023) A chaos-enhanced fractional-order chaotic system with self-reproduction based on a memcapacitor and meminductor. Fractal and Fractional 7(8):582

    Google Scholar 

  13. Niu Z, Zheng M, Zhang Y, Wang T (2019) A new asymmetrical encryption algo- rithm based on semitensor compressed sensing in WBANs. IEEE Internet Things J 7(1):734–750

    Google Scholar 

  14. Yang F, Ma J (2023) A controllable photosensitive neuron model and its application. Opt Laser Technol 163:109335

    Google Scholar 

  15. Liu X, Mou J, Zhang Y, Cao Y (2023) A New Hyperchaotic Map Based on Discrete Memristor and Meminductor: Dynamics Analysis, Encryption Application, and DSP Implementation. IEEE Trans Industr Electron 71:5094–5104

    Google Scholar 

  16. Ma Y, Mou J, Banerjee S, Miao M (2023) A quartic nonlinear flux-controlled mem- ristor model and its application in chaotic system. Applied and Computational Mathematics 22(3):317–337

    Google Scholar 

  17. Wang X, Mou J, Jahanshahi H, Alotaibi ND, Bi X (2023) Extreme multistability arising from periodic repetitive bifurcation behavior in a hyperchaotic oscillator. Nonlinear Dyn 111:13561–13578

    Google Scholar 

  18. Bao B, Wang Z, Hua Z, Chen M, Bao H (2023) Regime transition and multi-scroll hyperchaos in a discrete neuron model. Nonlinear Dyn 111:13499–13512

    Google Scholar 

  19. Liu X, Chen Y, Wang C, Tan K, Li J (2023) A lightweight building instance extraction method based on adaptive optimization of mask contour. Int J Appl Earth Obs Geoinf 122:103420

    Google Scholar 

  20. Wei S, Zhang T, Ji S, Luo M, Gong J (2023) BuildMapper: A fully learn- able framework for vectorized building contour extraction. ISPRS J Photogramm Remote Sens 197:87–104

    Google Scholar 

  21. Wang X, Li G, Plaza A, He Y (2022) Revisiting SLIC: Fast superpixel segmentation of marine SAR images using density features. IEEE Trans Geosci Remote Sens 60:1–18

    Google Scholar 

  22. Zhang Q, Zhang L, Shi W, Liu Y (2018) Airport extraction via complementary saliency analysis and saliency-oriented active contour model. IEEE Geosci Remote Sens Lett 15(7):1085–1089

    Google Scholar 

  23. Singh AK et al (2022) Fastmie: faster medical image encryption without compromis- ing security. Measurement 196:111175

    Google Scholar 

  24. Zhou J, Li J, Di X (2020) A novel lossless medical image encryption scheme based on game theory with optimized ROI parameters and hidden ROI position. IEEE Access 8:122210–122228

    Google Scholar 

  25. Suo Z, Xia C, Jiang D, Peng H, Tong F, Chen X (2023) Multi-tiered ReversibleData Privacy Protection Scheme for IoT Based on Compression Sensing and Digital Watermarking. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2023.3330459

    Article  Google Scholar 

  26. Wang X, Liu P (2021) A new full chaos coupled mapping lattice and its application in privacy image encryption. IEEE Trans Circuits Syst I Regul Pap 69(3):1291–1301

    Google Scholar 

  27. Qian K, Feng W, Qin Z, Zhang J, Luo X, Zhu Z (2022) A novel image encryption scheme based on memristive chaotic system and combining bidirectional bit-level cyclic shift and dynamic DNA-level diffusion. Frontiers in Physics 10:963795

    Google Scholar 

  28. Wang C, Song L (2023) An image encryption scheme based on chaotic system and compressed sensing for multiple application scenarios. Inf Sci 642:119166

    Google Scholar 

  29. Cun Q, Tong X, Wang Z, Zhang M (2023) A new chaotic image encryption algo- rithm based on dynamic DNA coding and RNA computing. Vis Comput 39:6589–6608

    Google Scholar 

  30. Xu M (2023) A multiple-image encryption algorithm based on orthogonal arrays withstrength 3. Opt Laser Technol 167:109746

    Google Scholar 

  31. Gao S, Wu R, Wang X, Liu J, Li Q, Wang C, Tang X (2023) Asynchronous updating boolean network encryption algorithm. IEEE Trans Circuits Syst Video Technol 33:4388–4400

    Google Scholar 

  32. Wang X, Wang Y (2023) Multiple medical image encryption algorithm based on scrambling of region of interest and diffusion of odd-even interleaved points. Expert Syst Appl 213:118924

    Google Scholar 

  33. Sangavi V, Thangavel P (2023) An exquisite multiple image encryption harnessing multi-scroll lu–chen and chua chaotic systems employing domino strategy. Journal of Information Security and Applications 72:103408

    Google Scholar 

  34. Liu X, Tong X, Wang Z, Zhang M, Fan Y (2023) A novel devaney chaotic map with uniform trajectory for color image encryption. Appl Math Model 120:153–174

    MathSciNet  Google Scholar 

  35. Liu L, Wang J (2023) A cluster of 1d quadratic chaotic map and its applications in image encryption. Math Comput Simul 204:89–114

    MathSciNet  Google Scholar 

  36. Gao S, Liu S, Wang X, Wu R, Wang J, Li Q, Tang X (2023) New image encryption algorithm based on hyperchaotic 3D-IHAL and a hybrid cryptosystem. Appl Intell 53(22):27826–27843

    Google Scholar 

  37. Chen X, Mou J, Cao Y, Banerjee S (2023) Chaotic multiple-image encryption algo- rithm based on block scrambling and dynamic dna coding. International Journal of Bifurcation and Chaos 33(16):2350190

    Google Scholar 

  38. Zhou S, Qiu Y, Qi G, Zhang Y (2023) A new conservative chaotic system and its application in image encryption. Chaos, Solitons Fractals 175:113909

    MathSciNet  Google Scholar 

  39. Zhou Z, Xu X, Yao Y, Jiang Z, Sun K (2023) Novel multiple-image encryp- tion algorithm based on a two-dimensional hyperchaotic modular model. Chaos, Solitons Fractals 173:113630

    Google Scholar 

  40. Shao Z, Liu X, Yao Q, Qi N, Shang Y, Zhang J (2020) Multiple-image encryptionbased on chaotic phase mask and equal modulus decomposition in quaternion gyrator domain. Signal Processing: Image Communication 80:115662

    Google Scholar 

  41. Liu J, Tang S, Lian J, Ma Y, Zhang X (2019) A novel fourth order chaotic system and its algorithm for medical image encryption. Multidimension Syst Signal Process 30:1637–1657

    Google Scholar 

  42. Gao X, Mou J, Banerjee S, Cao Y, Xiong L, Chen X (2022) An effective multiple-image encryption algorithm based on 3D cube and hyperchaotic map. Journal of King Saud University-Computer and Information Sciences 34(4):1535–1551

    Google Scholar 

  43. Li S-Y, Gai Y, Shih K-C, Chen C-S (2023) An Efficient Image Encryption Algorithm Based on Innovative DES Structure and Hyperchaotic Keys. IEEE Trans Circuits Syst I Regul Pap 70:4103–4111

    Google Scholar 

  44. Zhou S, Wang X, Zhang Y (2023) Novel image encryption scheme based on chaotic signals with finite-precision error. Inf Sci 621:782–798

    Google Scholar 

  45. Yi G, Cao Z (2023) An algorithm of image encryption based on AES & Rossler hyperchaotic modeling. Mob Netw Appl, pp 1–9. https://doi.org/10.1007/s11036-023-02216-5

  46. Wu Y, Zhang L, Liu X, Zhang H (2024) A novel image encryption scheme with adaptive fourier decomposition. J Franklin Inst 361(4):106630

    Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Grant Nos.62061014); Technological innovation projects in the field of artificial intelligence in Liaoning province(Grant Nos. 2023JH26/10300011); Basic scientific research projects in department of education of Liaoning Province(Grant Nos. JYTZD2023021).

Author information

Authors and Affiliations

Authors

Contributions

Chang Cai designed and carried out experiments, data analyzed and manuscript wrote. Yu Wang, and Yinghong Cao made the theoretical guidance for this paper. Bo Sun, and Jun Mou carried out experiment and improved the algorithm. All authors reviewed the manuscript.

Corresponding author

Correspondence to Jun Mou.

Ethics declarations

Ethical and informed consent for data used

The test images used in this paper are from the SIPI image database and are used for scientifc research only, not for other purposes, and without copyright disputes.

Competing interests

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cai, C., Wang, Y., Cao, Y. et al. Multiple remote sensing image encryption scheme based on saliency extraction and magic cube circular motion. Appl Intell 54, 5944–5960 (2024). https://doi.org/10.1007/s10489-024-05447-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-024-05447-5

Keywords

Navigation