A lossless image compression and encryption algorithm combining JPEG-LS, neural network and hyperchaotic system
In this paper, a lossless image compression and encryption algorithm combining JPEG-LS, neural networks and hyperchaotic mapping is proposed to protect the privacy of digital images and reduce data storage space. Firstly, we design a new 2-Dimensional Logistic-Like Hyperchaotic Map (2DLLHM), which h...
        Saved in:
      
    
          | Published in | Nonlinear dynamics Vol. 111; no. 16; pp. 15445 - 15475 | 
|---|---|
| Main Authors | , , , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
        Dordrecht
          Springer Netherlands
    
        01.08.2023
     Springer Nature B.V  | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 0924-090X 1573-269X  | 
| DOI | 10.1007/s11071-023-08622-4 | 
Cover
| Summary: | In this paper, a lossless image compression and encryption algorithm combining JPEG-LS, neural networks and hyperchaotic mapping is proposed to protect the privacy of digital images and reduce data storage space. Firstly, we design a new 2-Dimensional Logistic-Like Hyperchaotic Map (2DLLHM), which has more complex dynamics than some existing known chaotic systems, and can be used to build a good pseudorandom sequence generator. Secondly, to compress images efficiently, we design a new pixel predictor by combining the MED (Median Edge Detector) of JPEG-LS with MLP (Multilayer Perceptron). This predictor is called MMP. The MMP can effectively improve the prediction effect of edge texture area. On this basis, a threshold segmentation method is proposed. The method combined with MMP, run-length coding and Huffman coding can further improve the image compression ratio. Finally, to avoid some of the existing weak encryption designs, we construct a multi-round nonlinear diffusion structure with more excellent diffusion performance. Experiments show that the algorithm achieves a good compression ratio and can resist brute force attacks, statistical attacks, chosen-plaintext attacks and chosen-ciphertext attacks. | 
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14  | 
| ISSN: | 0924-090X 1573-269X  | 
| DOI: | 10.1007/s11071-023-08622-4 |