IDEAS home Printed from https://ideas.repec.org/a/eee/matcom/v237y2025icp316-334.html
   My bibliography  Save this article

Image hiding algorithm based on local binary pattern and compressive sensing

Author

Listed:
  • Ye, Guodong
  • Liu, Shoukang
  • Xiao, Xiuchun
  • Hunag, Xiaoling

Abstract

In recent years, with the rapid growth of digital communication, the protection of image privacy has become a critical concern. Traditional image encryption methods may attract attacker attention due to the noise-like appearance of cipher image. To address the theft risk to the private image, a novel three-dimensional chaotic map of Chebyshev coupled Logistic with Sine map (3D-CCLSM) is designed, and then an image hiding algorithm based on local binary pattern (LBP) and compressive sensing (CS) is proposed, named ImHALC. By integrating LBP-based texture feature extraction and CS-based image compression, ImHALC aims to enhance both the security and imperceptibility for steganographic image. Especially, LBP is taken to connect the plain image and keystream, resulting a high security for ImHALC. Firstly, in stage of keystream generation, texture information of the plain image is extracted by using LBP and seen as input of hash function SHA-256, to produce corresponding hash values. Then, these hash values are used to generate the initial value of 3D-CCLSM by a new designed key transformation model (KAM), so as to get the keystream for encryption. Secondly, in stage of image compression, a measurement matrix is constructed by above keystream, and CS is applied to the plain image to get measurements. Thirdly, in stage of image encryption, measurements are confused and diffused to produce a cipher image. Finally, in stage of embedding, an embedding method using integer wavelet transformation (IWT) and 2k correction is presented, so as to embed the secrets (i.e., cipher image) into a given carrier image to obtain hiding performance, i.e., forming a carrier image hiding secrets (CHS). In particular, the ImHALC can achieve the effect of blind extraction. After adopting a two-dimensional projection gradient algorithm with embedded decryption (2DPG-ED), the reconstruction quality for the plain image is good for test images.

Suggested Citation

  • Ye, Guodong & Liu, Shoukang & Xiao, Xiuchun & Hunag, Xiaoling, 2025. "Image hiding algorithm based on local binary pattern and compressive sensing," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 237(C), pages 316-334.
  • Handle: RePEc:eee:matcom:v:237:y:2025:i:c:p:316-334
    DOI: 10.1016/j.matcom.2025.05.005
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0378475425001879
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.matcom.2025.05.005?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to

    for a different version of it.

    References listed on IDEAS

    as
    1. Hu, Long-Long & Chen, Ming-Xuan & Wang, Meng-Meng & Zhou, Nan-Run, 2024. "A multi-image encryption scheme based on block compressive sensing and nonlinear bifurcation diffusion," Chaos, Solitons & Fractals, Elsevier, vol. 188(C).
    2. Wang, Xingyuan & Liu, Cheng & Jiang, Donghua, 2022. "Visually meaningful image encryption scheme based on new-designed chaotic map and random scrambling diffusion strategy," Chaos, Solitons & Fractals, Elsevier, vol. 164(C).
    3. Li, Xuejun & Mou, Jun & Banerjee, Santo & Wang, Zhisen & Cao, Yinghong, 2022. "Design and DSP implementation of a fractional-order detuned laser hyperchaotic circuit with applications in image encryption," Chaos, Solitons & Fractals, Elsevier, vol. 159(C).
    4. Shahna, K.U., 2023. "Novel chaos based cryptosystem using four-dimensional hyper chaotic map with efficient permutation and substitution techniques," Chaos, Solitons & Fractals, Elsevier, vol. 170(C).
    5. Yu, Jinwei & Xie, Wei & Zhong, Zhenyu & Wang, Huan, 2022. "Image encryption algorithm based on hyperchaotic system and a new DNA sequence operation," Chaos, Solitons & Fractals, Elsevier, vol. 162(C).
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Antonios S. Andreatos & Apostolos P. Leros, 2025. "Secure Chaotic Cryptosystem for 3D Medical Images," Mathematics, MDPI, vol. 13(20), pages 1-44, October.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. SaberiKamarposhti, Morteza & Ghorbani, Amirabbas & Yadollahi, Mehdi, 2024. "A comprehensive survey on image encryption: Taxonomy, challenges, and future directions," Chaos, Solitons & Fractals, Elsevier, vol. 178(C).
    2. Chai, Xiuli & Shang, Guangyu & Wang, Binjie & Gan, Zhihua & Zhang, Wenkai, 2024. "Exploiting 2D-SDMCHM and matching embedding driven by flag-shaped hexagon prediction for visually meaningful medical image cryptosystem," Chaos, Solitons & Fractals, Elsevier, vol. 185(C).
    3. Sundarapandian Vaidyanathan & Ahmad Taher Azar & Ibrahim A. Hameed & Khaled Benkouider & Esteban Tlelo-Cuautle & Brisbane Ovilla-Martinez & Chang-Hua Lien & Aceng Sambas, 2023. "Bifurcation Analysis, Synchronization and FPGA Implementation of a New 3-D Jerk System with a Stable Equilibrium," Mathematics, MDPI, vol. 11(12), pages 1-22, June.
    4. Wu, Rui & Gao, Suo & Wang, Xingyuan & Liu, Songbo & Li, Qi & Erkan, Uğur & Tang, Xianglong, 2022. "AEA-NCS: An audio encryption algorithm based on a nested chaotic system," Chaos, Solitons & Fractals, Elsevier, vol. 165(P1).
    5. Shi, Qianqian & Qu, Shaocheng & An, Xinlei & Wei, Ziming & Zhang, Chen, 2024. "Three-dimensional m-HR neuron model and its application in medical image encryption," Chaos, Solitons & Fractals, Elsevier, vol. 189(P1).
    6. Hassan, Ali & Zhou, Liangqiang, 2025. "A novel 6D four-wing memristive hyperchaotic system: Generalized fixed-time synchronization and its application in secure image encryption," Chaos, Solitons & Fractals, Elsevier, vol. 192(C).
    7. M. I. Kopp & I. Samuilik, 2025. "Hidden Attractors in a New 4D Memristor-Based Hyperchaotic System: Dynamical Analysis, Circuit Design, Synchronization, and Its Applications," Mathematics, MDPI, vol. 13(17), pages 1-34, September.
    8. Ren, Lujie & Mou, Jun & Banerjee, Santo & Zhang, Yushu, 2023. "A hyperchaotic map with a new discrete memristor model: Design, dynamical analysis, implementation and application," Chaos, Solitons & Fractals, Elsevier, vol. 167(C).
    9. Xiaoqiang Zhang & Mi Liu & Xiaochang Yang, 2023. "Color Image Encryption Algorithm Based on Cross-Spiral Transformation and Zone Diffusion," Mathematics, MDPI, vol. 11(14), pages 1-28, July.
    10. Lai, Qiang & Chen, Zhijie, 2023. "Grid-scroll memristive chaotic system with application to image encryption," Chaos, Solitons & Fractals, Elsevier, vol. 170(C).
    11. Fei Yu & Wuxiong Zhang & Xiaoli Xiao & Wei Yao & Shuo Cai & Jin Zhang & Chunhua Wang & Yi Li, 2023. "Dynamic Analysis and FPGA Implementation of a New, Simple 5D Memristive Hyperchaotic Sprott-C System," Mathematics, MDPI, vol. 11(3), pages 1-15, January.
    12. Yan, Shaohui & Jiang, Defeng & Cui, Yu & Zhang, Hanbing & Li, Lin & Jiang, Jiawei, 2024. "A fractional-order hyperchaotic system that is period in integer-order case and its application in a novel high-quality color image encryption algorithm," Chaos, Solitons & Fractals, Elsevier, vol. 182(C).
    13. Garipcan, Ali Murat & Aydin, Yılmaz & Özkaynak, Fatih, 2025. "An efficient 2D hyper chaos and DNA encoding-based s-box generation method using chaotic evolutionary improvement algorithm for nonlinearity," Chaos, Solitons & Fractals, Elsevier, vol. 191(C).
    14. Lai, Qiang & Hu, Genwen & Erkan, Uǧur & Toktas, Abdurrahim, 2023. "High-efficiency medical image encryption method based on 2D Logistic-Gaussian hyperchaotic map," Applied Mathematics and Computation, Elsevier, vol. 442(C).
    15. Zhao, Mingjie & Li, Lixiang & Yuan, Zheng, 2024. "A multi-image encryption scheme based on a new n-dimensional chaotic model and eight-base DNA," Chaos, Solitons & Fractals, Elsevier, vol. 186(C).
    16. Ding, Dawei & Liu, Xiang & Zhang, Hongwei & Yang, Zongli & Jin, Fan & Chen, Siqi & Zhou, Haitao, 2025. "Reversible image encryption and hiding algorithm based on fractional-order memristive Hopfield neural network," Chaos, Solitons & Fractals, Elsevier, vol. 199(P2).
    17. Hu, Tingyao & Luo, Shaohua & Zhang, Ya & Deng, Guangwei & Ouakad, Hassen M., 2024. "Dynamical analysis and event-triggered neural backstepping control of two Duffing-type MEMS gyros with state constraints," Chaos, Solitons & Fractals, Elsevier, vol. 189(P1).
    18. Fujiu Xu & Jianqiang Li & Xi Xu, 2025. "An Encrypted Speech Integrity Authentication Method: Focus on Fine-Grained Tampering Detection and Tampering Recovery Under High Tamper Ratios," Mathematics, MDPI, vol. 13(4), pages 1-26, February.
    19. Antonios S. Andreatos & Apostolos P. Leros, 2025. "Secure Chaotic Cryptosystem for 3D Medical Images," Mathematics, MDPI, vol. 13(20), pages 1-44, October.
    20. Pai Liu & Shihua Zhou & Wei Qi Yan, 2022. "A 3D Cuboid Image Encryption Algorithm Based on Controlled Alternate Quantum Walk of Message Coding," Mathematics, MDPI, vol. 10(23), pages 1-26, November.

    More about this item

    Keywords

    ;
    ;
    ;
    ;
    ;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:matcom:v:237:y:2025:i:c:p:316-334. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.journals.elsevier.com/mathematics-and-computers-in-simulation/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.