1st International ICST Workshop on Multimedia Security in Communication

Research Article

Chaotic Secure Image Coding Based on SPIHT

  • @INPROCEEDINGS{10.1109/CHINACOM.2008.4685263,
        author={Rong Lin and Yaobin Mao and Zhiquan Wang},
        title={Chaotic Secure Image Coding Based on SPIHT},
        proceedings={1st International ICST Workshop on Multimedia Security in Communication},
        keywords={SPIHT; Encryption; Chaos},
  • Rong Lin
    Yaobin Mao
    Zhiquan Wang
    Year: 2008
    Chaotic Secure Image Coding Based on SPIHT
    DOI: 10.1109/CHINACOM.2008.4685263
Rong Lin1,*, Yaobin Mao1, Zhiquan Wang1
  • 1: School of Automation, Nanjing University of Sci. & Tech. Nanjing, China 210094
*Contact email: linrong06@163.com


From the viewpoint of Shannon’s information theory, image coding and image encryption both aim at reducing the correlations of pixels. However, current image encoding methods did not take the confidentiality into account. In this paper, a novel chaotic image encryption scheme integrated with the SPIHT wavelet image coding is proposed. Comparing with the existing image encryption schemes, the new method has three prominent advantages: first, only sensitive bits in the coding stream are encrypted, which introduces small overheads to the image codec; second, by introducing a cipher-text feedback mechanism, the scheme can effectively resist the known-plain-text attack; third, by using chaotic pseudo-random bits to mask the SPIHT encoded bitstream, the scheme can truncate the output stream at any position while keeping the image recoverable with different visual qualities. Cryptanalysis and various experiments have been carried out and the results were reported in this paper, which demonstrate the feasibility and flexibility of the proposed scheme.