Secure Image Encryption Model with Compressive Sensing and Addition of Watermarking Approach

Authors

  • Shaik Kashif Hussain, S. Saheb Basha

Keywords:

Compressive sensing, Image Encryption, Tamper localization, Transforms, SSIM, MSE Switched capacitor circuits, Integrated circuits.

Abstract

In modern times, protecting medical images is essential to maintaining the accuracy of patient confidential data. One effective method for content-based authentication is watermarking. Multimedia files are first watermarked and then deleted for authentication reasons, according to the conventional watermarking procedure. Conventional watermarking models perform poorly due to their resilience and recovery capabilities, and there is currently no digital watermarking solution that provides total security from any type of attack. To solve these problems, including tamper localization and recovery, novel image authentication based on compressive sensing and watermarking is used. The novel image encryption technique presented in this paper is based on the idea of tamper localization. By detecting and eliminating illegal image modifications, tampering localization is essential for improving image quality. This article presents an ADTCWT, an adaptive dual-tree complex wavelet transform, which splits the input picture into high-frequency and low-frequency versions. In this scenario, the ISEO fine-tunes the ADTCWT's parameters. The processed low- and high-frequency pictures are encrypted using the adaptive 2D logistic chaotic encryption (A-2DLCE) model. The improved ISEO is used to choose the keys for encryption. After that, you may get the original images back by doing an inverse decomposition with the inverse ADTCWT. Also, A-2DLCE gets the encrypted data so that it can decode the images. The reconstructed watermark has very little visible deformation, which keeps it authentic. The experiment showed that the proposed method is less visible and more durable than the present watermarking methods.

Downloads

Download data is not yet available.

References

Zhang, R., & Xiao, D. (2020). A secure image permutation–substitution framework based on chaos and compressive sensing. International Journal of Distributed Sensor Networks, 16(3), 1550147720912949.

Xiao, D., Zhao, A., & Li, F. (2022). Robust watermarking scheme for encrypted images based on scrambling and Kronecker compressed sensing. IEEE signal processing letters, 29, 484-488.

Saravanan, N., Muthukumaran, K., Nandhini, T., Shabeen, S. S., Sasikumar, G., & Yasar, I. M. (2025, April). A Novel Approach to Audio-Based Emotion Recognition Using Transfer Learning Algorithm (Wav2Vec2. 0). In 2025 8th International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 539-543). IEEE.

Thabit, R., Al-Askari, M. A., Mohammed, D. Z., Anaam, E. A., Mahmood, Z. H., Jabbar, D. J., & Salih, Z. A. (2025). Face image authentication scheme based on MTCNN and SLT. Multimedia Tools and Applications, 1-43.

Wang, C., Zhang, Q., Wang, X., Zhou, L., Li, Q., Xia, Z., ... & Shi, Y. Q. (2025). Light-Field Image Multiple Reversible Robust Watermarking Against Geometric Attacks. IEEE Transactions on Dependable and Secure Computing.

Shi, H., Yan, K., Geng, J., & Ren, Y. (2024). A cross-embedding based medical image tamper detection and self-recovery watermarking scheme. Multimedia Tools and Applications, 83(10), 30319-30360.

Capasso, P., Cattaneo, G., & De Marsico, M. (2024). A comprehensive survey on methods for image integrity. ACM Transactions on Multimedia Computing, Communications and Applications, 20(11), 1-34.

Liu, Z., & Xue, R. (2024). Visual image encryption based on compressed sensing and Cycle-GAN. The Visual Computer, 40(8), 5857-5870.

Ping, P., Yang, X., Zhang, X., Mao, Y., & Khalid, H. (2022). Generating visually secure encrypted images by partial block pairing-substitution and semi-tensor product compressed sensing. Digital Signal Processing, 120, 103263.

Qi, Y., Bi, J., Peng, H., & Li, L. (2024). Efficient Homomorphic Encryption for Multi-key Compressed Sensing in Lightweight Cloud-based Image Processing. IEEE Sensors Journal.

Lu, J., Wang, T., & Zhang, J. (2024, November). A color image channel fusion encryption scheme combining a four-dimensional chaotic system. In 2024 2nd International Conference on Computer, Vision and Intelligent Technology (ICCVIT) (pp. 1-9). IEEE.

Shuo, Z., Pijun, H., Yongguang, C., & Wang, B. (2023). A visually secure image encryption method based on semi-tensor product compressed sensing and IWT-HD-SVD embedding. Heliyon, 9(12).

Shi, Y., Chen, R., Liu, D., & Wang, B. (2023). A visually secure image encryption scheme based on adaptive block compressed sensing and non-negative matrix factorization. Optics & Laser Technology, 163, 109345.

Zhang, R., Xiao, D., & Chang, Y. (2018). A Novel Image Authentication with Tamper Localization and Self‐Recovery in Encrypted Domain Based on Compressive Sensing. Security and Communication Networks, 2018(1), 1591206.

Xue, W., Luo, C., Shen, Y., Rana, R., Lan, G., Jha, S., ... & Hu, W. (2020). Towards a compressive-sensing-based lightweight encryption scheme for the internet of things. IEEE Transactions on Mobile Computing, 20(10), 3049-3065.

Pankaj, S., & Dua, M. (2024). Chaos based medical image encryption techniques: A comprehensive review and analysis. Information Security Journal: A Global Perspective, 33(3), 332-358.

Shao, J., Bai, E., Jiang, X., & Wu, Y. (2024). Multi-View Light Field Images Compression and Encryption Using Enhanced 3D Chaotic System and Pixel-Bit-Scrambling. IEEE Access.

Shami, T. M., Grace, D., Burr, A., & Mitchell, P. D. (2024). Single candidate optimizer: a novel optimization algorithm. Evolutionary Intelligence, 17(2), 863-887.

Mohammed, H., & Rashid, T. (2023). FOX: a FOX-inspired optimization algorithm. Applied Intelligence, 53(1), 1030-1050.

Mohammadi-Balani, A., Nayeri, M. D., Azar, A., & Taghizadeh-Yazdi, M. (2021). Golden eagle optimizer: A nature-inspired metaheuristic algorithm. Computers & Industrial Engineering, 152, 107050.

Borra, S., & Thanki, R. (2020). Crypto-watermarking scheme for tamper detection of medical images. Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization, 8(4), 345-355.Bhatti, U. A., Yu, Z., Li, J., Nawaz, S. A., Mehmood, A., Zhang, K., & Yuan, L. (2020). Hybrid watermarking algorithm using Clifford algebra with Arnold scrambling and chaotic encryption. IEEE Access, 8, 76386-76398.

Bhatti, U. A., Yuan, L., Yu, Z., Li, J., Nawaz, S. A., Mehmood, A., & Zhang, K. (2021). New watermarking algorithm utilizing quaternion Fourier transform with advanced scrambling and secure encryption. Multimedia Tools and Applications, 80(9), 13367-13387.

Loan, N. A., Hurrah, N. N., Parah, S. A., Lee, J. W., Sheikh, J. A., & Bhat, G. M. (2018). Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access, 6, 19876-19897.

Attaullah, Shah, T., & Jamal, S. S. (2020). An improved chaotic cryptosystem for image encryption and digital watermarking. Wireless personal communications, 110(3), 1429-1442.

Chen, Y., Jia, Z., Peng, Y., & Peng, Y. (2023). Efficient robust watermarking based on structure-preserving quaternion singular value decomposition. IEEE Transactions on Image Processing, 32, 3964-3979.

Jiang, M. R., Feng, X. F., Wang, C. P., Fan, X. L., & Zhang, H. (2023). Robust color image watermarking algorithm based on synchronization correction with multi-layer perceptron and Cauchy distribution model. Applied Soft Computing, 140, 110271.

Zhang, H., Li, Z., Liu, X., Wang, C., & Wang, X. (2022). Robust image watermarking algorithm based on QWT and QSVD using 2D Chebyshev-Logistic map. Journal of the Franklin Institute, 359(2), 1755-1781.

Dong, Y., Yan, R., & Yin, C. (2024). An adaptive robust watermarking scheme based on chaotic mapping. Scientific Reports, 14(1), 24735.

Wu, W., Dong, Y., & Wang, G. (2024). Image Robust Watermarking Method Based on DWT‐SVD Transform and Chaotic Map. Complexity, 2024(1), 6618382.

Downloads

Published

15.02.2024

How to Cite

Shaik Kashif Hussain. (2024). Secure Image Encryption Model with Compressive Sensing and Addition of Watermarking Approach. International Journal of Intelligent Systems and Applications in Engineering, 12(16s), 774–785. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7918

Issue

Section

Research Article