IDEAS home Printed from https://ideas.repec.org/a/plo/pone00/0300228.html
   My bibliography  Save this article

Secure image communication based on two-layer dynamic feedback encryption and DWT information hiding

Author

Listed:
  • Jinlong Zhang
  • Heping Wen

Abstract

In response to the vulnerability of image encryption techniques to chosen plaintext attacks, this paper proposes a secure image communication scheme based on two-layer dynamic feedback encryption and discrete wavelet transform (DWT) information hiding. The proposed scheme employs a plaintext correlation and intermediate ciphertext feedback mechanism, and combines chaotic systems, bit-level permutation, bilateral diffusion, and dynamic confusion to ensure the security and confidentiality of transmitted images. Firstly, a dynamically chaotic encryption sequence associated with a secure plaintext hash value is generated and utilized for the first round of bit-level permutation, bilateral diffusion, and dynamic confusion, resulting in an intermediate ciphertext image. Similarly, the characteristic values of the intermediate ciphertext image are used to generate dynamically chaotic encryption sequences associated with them. These sequences are then employed for the second round of bit-level permutation, bilateral diffusion, and dynamic confusion to gain the final ciphertext image. The ciphertext image hidden by DWT also provides efficient encryption, higher level of security and robustness to attacks. This technology offers indiscernible secret data insertion, rendering it challenging for assailants to spot or extract concealed information. By combining the proposed dynamic closed-loop feedback secure image encryption scheme based on the 2D-SLMM chaotic system with DWT-based hiding, a comprehensive and robust image encryption approach can be achieved. According to the results of theoretical research and experimental simulation, our encryption scheme has dynamic encryption effect and reliable security performance. The scheme is highly sensitive to key and plaintext, and can effectively resist various common encryption attacks and maintain good robustness. Therefore, our proposed encryption algorithm is an ideal digital image privacy protection technology, which has a wide range of practical application prospects.

Suggested Citation

  • Jinlong Zhang & Heping Wen, 2024. "Secure image communication based on two-layer dynamic feedback encryption and DWT information hiding," PLOS ONE, Public Library of Science, vol. 19(8), pages 1-25, August.
  • Handle: RePEc:plo:pone00:0300228
    DOI: 10.1371/journal.pone.0300228
    as

    Download full text from publisher

    File URL: https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0300228
    Download Restriction: no

    File URL: https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0300228&type=printable
    Download Restriction: no

    File URL: https://libkey.io/10.1371/journal.pone.0300228?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Wang, Xingyuan & Yang, Jingjing & Guan, Nana, 2021. "High-sensitivity image encryption algorithm with random cross diffusion based on dynamically random coupled map lattice model," Chaos, Solitons & Fractals, Elsevier, vol. 143(C).
    2. Heping Wen & Shenghao Kang & Zhuxi Wu & Yiting Lin & Yiming Huang, 2023. "Dynamic RNA Coding Color Image Cipher Based on Chain Feedback Structure," Mathematics, MDPI, vol. 11(14), pages 1-17, July.
    3. Toktas, Abdurrahim & Erkan, Uğur & Gao, Suo & Pak, Chanil, 2024. "A robust bit-level image encryption based on Bessel map," Applied Mathematics and Computation, Elsevier, vol. 462(C).
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. SaberiKamarposhti, Morteza & Ghorbani, Amirabbas & Yadollahi, Mehdi, 2024. "A comprehensive survey on image encryption: Taxonomy, challenges, and future directions," Chaos, Solitons & Fractals, Elsevier, vol. 178(C).
    2. Chai, Xiuli & Shang, Guangyu & Wang, Binjie & Gan, Zhihua & Zhang, Wenkai, 2024. "Exploiting 2D-SDMCHM and matching embedding driven by flag-shaped hexagon prediction for visually meaningful medical image cryptosystem," Chaos, Solitons & Fractals, Elsevier, vol. 185(C).
    3. Hu, Long-Long & Chen, Ming-Xuan & Wang, Meng-Meng & Zhou, Nan-Run, 2024. "A multi-image encryption scheme based on block compressive sensing and nonlinear bifurcation diffusion," Chaos, Solitons & Fractals, Elsevier, vol. 188(C).
    4. Liu, Xilin & Tong, Xiaojun & Wang, Zhu & Zhang, Miao, 2022. "A new n-dimensional conservative chaos based on Generalized Hamiltonian System and its’ applications in image encryption," Chaos, Solitons & Fractals, Elsevier, vol. 154(C).
    5. Yang, Xiaofang & Lu, Tianxiu & Waseem, Anwar, 2021. "Chaotic properties of a class of coupled mapping lattice induced by fuzzy mapping in non-autonomous discrete systems," Chaos, Solitons & Fractals, Elsevier, vol. 148(C).
    6. Bezerra, João Inácio Moreira & Machado, Gustavo & Molter, Alexandre & Soares, Rafael Iankowski & Camargo, Vinícius, 2023. "A novel simultaneous permutation–diffusion image encryption scheme based on a discrete space map," Chaos, Solitons & Fractals, Elsevier, vol. 168(C).
    7. Huang, Yibo & Wang, Ling & Li, Zhiyong & Zhang, Qiuyu, 2024. "A new 3D robust chaotic mapping and its application to speech encryption," Chaos, Solitons & Fractals, Elsevier, vol. 184(C).
    8. Man, Zhenlong & Li, Jinqing & Di, Xiaoqiang & Sheng, Yaohui & Liu, Zefei, 2021. "Double image encryption algorithm based on neural network and chaos," Chaos, Solitons & Fractals, Elsevier, vol. 152(C).
    9. Cao, Hongli & Wang, Yu & Banerjee, Santo & Cao, Yinghong & Mou, Jun, 2024. "A discrete Chialvo–Rulkov neuron network coupled with a novel memristor model: Design, Dynamical analysis, DSP implementation and its application," Chaos, Solitons & Fractals, Elsevier, vol. 179(C).
    10. He, Shaobo & Hu, Kai & Wang, Mengjiao & Wang, Huihai & Wu, Xianming, 2024. "Design and dynamics of discrete dual-memristor chaotic maps and its application in speech encryption," Chaos, Solitons & Fractals, Elsevier, vol. 188(C).

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:plo:pone00:0300228. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: plosone (email available below). General contact details of provider: https://journals.plos.org/plosone/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.