Next Article in Journal
Exploiting Data Distribution: A Multi-Ranking Approach
Previous Article in Journal
High-Accuracy Parallel Neural Networks with Hard Constraints for a Mixed Stokes/Darcy Model
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Social Image Security with Encryption and Watermarking in Hybrid Domains

by
Conghuan Ye
1,2,3,
Shenglong Tan
1,2,3,
Jun Wang
1,2,3,
Li Shi
1,2,3,
Qiankun Zuo
1,2,3 and
Wei Feng
4,*
1
School of Information Engineering, Hubei University of Economics, Wuhan 430205, China
2
Hubei Key Laboratory of Digital Finance Innovation, Hubei University of Economics, Wuhan 430205, China
3
Hubei Internet Finance Information Engineering Technology Research Center, Hubei University of Economics, Wuhan 430205, China
4
School of Mathematics and Computer Science, Panzhihua University, Panzhihua 617000, China
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(3), 276; https://doi.org/10.3390/e27030276
Submission received: 20 January 2025 / Revised: 25 February 2025 / Accepted: 27 February 2025 / Published: 6 March 2025
(This article belongs to the Section Multidisciplinary Applications)

Abstract

:
In this digital era, social images are the most vital information carrier on multimedia social platforms. More and more users are interested in sharing social images with mobile terminals on multimedia social platforms. Social image sharing also faces potential risks from malicious use, such as illegal sharing, piracy, and misappropriation. This paper mainly concentrates on secure social image sharing. To address how to share social images in a safe way, a social image security scheme is proposed. The technology addresses the social image security problem and the active tracing problem. First, discrete wavelet transform (DWT) is performed directly from the JPEG image. Then, the high-bit planes of the LL, LH, and HL are permuted with cellular automation (CA), bit-XOR, and singular value decomposition (SVD) computing, and their low-bit planes are chosen to embed a watermark. In the end, the encrypted and watermarked image is again permuted with cellular automation in the discrete cosine transform (DCT) domain. Experimental results and security analysis show that the social image security method not only has good performance in robustness, security, and time complexity but can also actively trace the illegal distribution of social images. The proposed social image security method can provide double-level security for multimedia social platforms.

1. Introduction

The rapid development of mobile social networks has made social image sharing popular. Social image sharing refers to the practice of individuals with social connections sharing diverse types of images via public multimedia platforms. For instance, this includes personally generated images distributed on social media platforms, the sharing of medical images between doctors and their patients who have established social relationships, and the dissemination of surveillance images on security system network platforms. JPEG images, as the main form of social images, are distributed on multimedia social platforms ubiquitously [1]. Social image sharing underscores potential risks of privacy disclosure. Content sharing on multimedia social platforms causes distinctive security challenges due to the privacy concerns of users [2]. Privacy protection has become increasingly more important for social image sharing on multimedia social platforms [3].
Secure social JPEG image sharing is still in its infancy. Confidentiality and traceability are dependent on secure content sharing [4]. Thus, multi-level secure techniques [5,6] should be adopted. To obtain confidentiality, content should be changed into an unintelligible visual content. The encrypted form of multimedia content can deter illegal access during the content-sharing processes. To realize multimedia content encryption, chaotic systems can be used to encrypt images. Chaotic image encryption algorithms are an important topic in secure image distribution on multimedia social platforms [7,8]. A chaotic signal, which usually looks like noise, is the main advantage of chaotic systems [3,9,10,11].
Chaotic image encryption schemes have been previously proposed [12,13,14]. In addition, an image encryption algorithm [15] was presented based on a 2D chaotic map. Kocak et al. proposed a color image encryption method [16]. Feng et al. proposed an image encryption algorithm based on fusion strategy [17], a multi-image encryption method [18], and an image encryption algorithm using a hyper-chaotic map [19]. A color image encryption scheme was proposed in [20]. Face image security algorithms were researched in [21,22], and an encryption method for ship images was proposed in [23]. An image encryption scheme consists of shuffle and block XOR [24]. The encryption algorithm in [25] includes cyclical bit shift and XOR operations. However, these security schemes only focus on content encryption. Once the encrypted social multimedia content is received and decrypted, the protection no longer exists. The decrypted plaintext could be copied and redistributed to a third party. Therefore, the multimedia content will not be protected, and the privacy may still be leaked.
To deter content redistribution, digital watermarking/fingerprinting can be adopted [26,27] even though both encryption and watermarking can individually protect social images. To indefinitely protect multimedia content, both techniques are used for secure content sharing [28]. Their combination is therefore increasing [29,30,31,32]. However, due to the large volume of multimedia data, the efficiency of content sharing is low if the encryption procedure is conducted in the spatial domain.
Existing image encryption algorithms are not suitable for social JPEG image sharing because of the resource-constrained mobile terminal used. Millions of users can share images/videos on multimedia social platforms taken with professional cameras and personal smartphones. To avoid computing and storage resource consumption, images are compressed before they are uploaded to multimedia social platforms [33]. Although watermarking can authenticate copyright, watermarking in the encrypted compressed domain is still in its infancy. Joint watermarking and encryption (JWE) can provide a more comprehensive security level for social multimedia. The combination of a watermark and encryption has facilitated studies regarding privacy protection and multimedia security. For existing JWE schemes, issues regarding the multimedia big data effect still exists.
This research mainly focuses on the privacy leakage of social multimedia. The authors address the issue of social image secure sharing. The authors also research new challenges of social JPEG image distribution. A novel social multimedia dissemination algorithm is proposed based on a hierarchical community structure to deal with privacy concern issues. The paper proposes a social image security algorithm with Game of Life (GoL) confusion, bit-XOR, and singular value decomposition (SVD) diffusion for wavelet coefficients, which are directly obtained from discrete cosine transform (DCT) blocks.
In this paper, discrete wavelet transform (DWT) from DCT blocks can help to lower the algorithm complexity. Scrambling based on GoL can balance social image security and efficiency. The proposed social image security scheme can solve the problems that existing methods face. The main highlights are as follows:
(1)
DWT from block DCTs can encrypt and watermark images in hybrid domains.
(2)
The algorithm that protects social JPEG images is based on DWT from DCT blocks.
(3)
A lightweight security approach for social multimedia platforms is beneficial for resource-constrained equipment.
There is no related research for privacy protection with GoL permutation in hybrid domains. The background for this paper is presented in Section 2. Section 3 presents details of the security algorithm. Then, Section 4 shows the experimental results and analyzes the security. Conclusions and future work are both presented in Section 5.

2. Background

2.1. Singular Value Decomposition

The SVD [34] is a factorization and approximation technique that is highly useful in linear algebra. It is capable of performing an optimal matrix decomposition in a least-squares sense for any given matrix. Typically, an image can be regarded as a matrix A with size M × N , which has non-negative scalar entries. Subsequently, A can be decomposed using SVD. As a useful tool in signal processing, SVD of A can be represented as follows:
A = U S V T
where A is a rectangular matrix. Both U and V are orthogonal and unitary matrices. S is a singular value matrix. T represents the conjugate transpose operation. Both U and V, when multiplied by their respective transpose matrices, yield the identity matrix.

2.2. The Tree Structure Haar Transform

The TSH wavelet transform, as a hierarchical structure transform, has a good correspondence with social fingerprinting. Digital watermarking techniques using discrete wavelet transform have much higher robustness. The discrete wavelet transform divides an image into four components: LL, HL, LH, and HH sub-bands. The last three of these components are detail sub-components, while the approximate component is very similar to the original image. The discrete wavelet transform is formed by low-pass filtering in both row and column directions, and the components can be further decomposed. In order to make the algorithm scalable, the non-binary tree structure Haar (TSH) [35] transform is chosen, and this TSH wavelet transform can be adapted to the user’s multi-level social fingerprint code. According to the hierarchical structure of the fingerprint code, the corresponding discrete point vector (DPV) is determined to assist the tree structure Haar wavelet transform, and a mapping relationship is established between the carrier and the fingerprint code, which enables the code segments of the multi-level fingerprint code to be embedded into the low-bit planes of coefficients in the TSH domain in parallel and avoids the duplication of embedding the community code segments. This embedding mode can effectively alleviate the server-side duplication of embedding the entire social fingerprint code. The overhead of repeated embedding of the whole fingerprint codeword at the server side can be effectively reduced.
Given an interval I, which is split into I 0 H = [ 1 , 2 1 N ] and I 1 H = [ 2 1 N + 1 , N ] according to Figure 1, the TSH function is defined as follows:
I 0 H = [ 1 , 2 1 N ]
Ψ H ( t ) = 1 N for t I 0 H 1 N for t I 1 H 0 otherwise
where both | | Ψ H ( t ) | | = 1 and Ψ H ( t ) are orthogonal, and | | | | denotes a norm. Usually, the interval I can be partitioned into I 0 T S H = [ 1 , v 0 ] and I 1 T S H = [ v 0 + 1 , N ] , where 1 v 0 < N . The function Ψ T S H ( t ) can be defined as follows:
Ψ T S H ( t ) = v 1 v 0 N for t I 0 T S H v 0 v 1 N for t I 1 T S H 0 otherwise
where v 1 = N v 0 . This construction can be iterated by splitting I 0 T S H into I 00 T S H and I 01 T S H , and I 1 T S H into I 10 T S H and I 11 T S H . All functions Ψ T S H ( t ) ( 1 , N , v 0 ) are orthogonal TSH functions.
Assume a social image I has size ( S × K ) × ( S × L ) . Then, I is partitioned into K × L patches. B L l k denotes the l k _ th block. The size of each patch is S × S , and its corresponding DCT coefficient patch is denoted as C l k ( u , v ) .
In this paper, a social JPEG image is partially decoded to obtain DCT blocks. All of the DCT blocks are used to compute one-level DWT coefficients. The most significant aspect of the wavelet transform is that a mapping can be established between the tree structure of wavelet decomposition and the hierarchical fingerprint code based on social network analysis (SNA).
The 2D DCT transform can be performed on B L l k , resulting in C l k ( u , v ) = B 1 × B L l k × B 1 T . Conversely, B L l k can be recovered by B L l k = B 1 1 × C l k × ( B 1 T ) 1 . Both B 1 and B 1 T are block DCT matrices, and they are orthogonal.
Then, the DWT derived from DCT blocks is as follows:
K R = H × I × Q T
where H and Q are coefficient transformation matrices, both of which are orthogonal and invertible. H contains h z ( k ) , and it is a Haar basis function.
I = H T × K R × Q is the inverse Haar wavelet transform. With the inverse transform, coefficient matrix K R in the DWT domain can be expressed as
K R = A 1 × C p a r t × A 2
where A 1 = H × B 1 1 , A 2 = ( B 1 T ) 1 × Q T , and K R represents the coefficient in the DWT domain. Through inverse transformation, the DCT blocks can be obtained as follows:
C p a r t = A 1 T × K R × A 2 T

2.3. Cellular Automation

CA [36] is a complex spatial–temporal system that is a time discrete system. The two-dimensional CA is known as the Game of Life (GoL). The seed matrix of GoL has a size M × N , and each cell in the grid can be in one of two states: 0 represents dead; 1 represents alive. Chaotic behavior can be generated through CA. The GoL has simple operations for changing the alive and dead states of cells, resulting in low computational complexity. This low-complex operation makes it an effective method for encrypting social images. In the two-dimensional GoL matrix, each cell has eight neighbors in the seed matrix, located either horizontally, vertically, or diagonally. Each cell evolves according to the following GoL rules:
  • Rule 1: Cells that are alive but have fewer than two live neighbors will die.
  • Rule 2: Cells that are alive and have two or three live neighbors will survive.
  • Rule 3: Cells that are alive but have more than three live neighbors will die.
  • Rule 4: Cells that are dead but have exactly three live neighbors will revive.
The evolution of GoL is based on an orthogonal grid of cells. The process is illustrated in Figure 2. The main steps are as follows:
(1)
A random sequence ( x 1 x 2 x M × N ) is produced using a given chaotic map. A grid of cell G 0 is created based on this random sequence. The sum S of the sequence is calculated as S = s u m ( x 1 + + x M × N ) , and the mean value M V is calculated as M V = S / ( M × N ) . For each cell in the grid, if the corresponding value x i > M V , then the cell is set to 1, otherwise, it is set to 0. Using the initial grid G 0 and the rules of GoL, a sequence of matrices G 1 , G 2 , , G k is generated.
(2)
According to the index, the elements of the original images are arranged in a zigzag formation and sequentially insert them into the encrypted images.
Figure 2 shows the GoL process for three images. The GoL permutation operation is based on zigzag order applied to the elements within these three images.

2.4. Secure Hash Algorithm (SHA-3)

SHA-3 can process messages of any length up to a predefined limit [37]. It provides data integrity and security while also generating random sequences. As a popular hash function, the SHA-3 algorithm can generate 256-bit or 512-bit hash values for any form of communication. In this study, the proposed SHA-3 method will utilize a 256-bit hash value. Even if the original message undergoes a very small change, the hash value of the changed message will be completely different. Furthermore, since the hash computing relies on bit-level operations, it provides superior temporal performance. Due to it being very sensitive to the initial input content, it is widely used for key generation.

2.5. Chaotic System

Recently, many 2D chaotic maps have been designed for image encryption [15,16,38]. However, despite their complex chaotic trajectories, these chaotic maps often suffer from low efficiency due to their complex structures. In this paper, we adopted a chaotic map [17] for image encryption as follows:
u i + 1 = ( α u i 2 + 10 β v i ) mod 1 , v i + 1 = ( α v i 2 + 10 β u i ) mod 1 ,
where u 0 and v 0 are the initial values for the chaotic map, while u i and v i are the corresponding outputs ( i = 1 , 2 , ). Both α and β are control parameters.
The Hopfield neural network system [39] can demonstrate chaotic trajectories. The following is the 3D chaotic neural network system:
x 1 = x 1 + 2 f ( x 1 ) f ( x 2 ) x 2 = x 2 + 1.7 f ( x 1 ) + 1.7 f ( x 2 ) + 1.1 f ( x 3 ) x 3 = x 3 2.5 f ( x 1 ) 2.9 f ( x 2 ) + 0.56 f ( x 3 )
f ( x i ) = tanh ( x i ) i = 1 , 2 , 3
where f ( x i ) is the tangent function.

2.6. Joint Watermarking and Encryption

JWE can be utilized to protect privacy. A digital watermarking scheme involves embedding watermark information into a carrier. Recently, the need to apply watermarking in conjunction with image encryption for multimedia content protection has been increasing. There are two distinct methods for combining watermarking and encryption to protect multimedia content. The first method integrates watermarking with the image decryption operation on the client side. The second method primarily combines watermarking and encryption operations on the server side. Image encryption can either be full encryption, whereby all multimedia content is encrypted, or selective encryption, where only the crucial parts are encrypted.

3. The Proposed Scheme

The social image security scheme encompasses encryption and watermarking. Joint encryption and watermarking can offer dual-level protection. Furthermore, the hybrid transform domain allows for the embedding of fingerprints and encryption to be performed in parallel. Most social images are distributed in JPEG format in plaintext mode. JPEG images are highly popular on multimedia social platforms [40]. JPEG compression removes redundant data, achieving a high compression ratio [41]. To encrypt and watermark JPEG images in hybrid domains, partial decoding can be applied to JPEG images to obtain DCT blocks, on which DWT is then performed.

3.1. Coding Using Social Network Analysis

The fingerprint code is generated using SNA. According to Figure 3, the social network exhibits characteristics of a hierarchical community structure. Each individual user belongs to a community, and users within the same community share a common social relationship and a common community structure. Subsequently, the community to which they belong can be coded with the Tardos scheme, and each user within a community is assigned a user code based on the Tardos scheme [42]. Consequently, the fingerprint code possesses a hierarchical structure that mirrors the community structure.

3.2. The Joint Watermarking and Encryption Scheme

The JWE scheme incorporates selective encryption for the high-bit planes of the LL, HL, and LH sub-bands, along with watermarking for the low-bit planes of the LL, HL, and LH sub-bands. The JPEG image is partly decompressed into block DCTs, as illustrated in Figure 4. Subsequently, DWT is performed on these DCT blocks using a 1-to-1 map between DCT blocks and DWT. The fast DWT domain yields the LL, LH, HL, and HH sub-bands. The LL, HL, and LH sub-bands are then decomposed into high-bit planes and low-bit planes through coefficient separation. The high-bit planes undergo confusion based on GoL, followed by diffusion using bit-XOR operations and SVD computing. Meanwhile, the low-bit planes are watermarked using quantization index modulation (QIM). The application of DWT directly on block DCTs is efficient for encrypting and watermarking in hybrid domains, as it can avoid the time-consuming conversion between the spatial domain and the DCT/DWT domain.

3.2.1. Fingerprint Embedding and Traitor Tracing

Figure 4 illustrates the watermarking scheme. The entire JWE process involves embedding fingerprints in the low-bit planes and encrypting data in the high-bit planes. In the first stage of JWE, which focuses on watermarking techniques for embedding fingerprints into digital images, it is advantageous to embed fingerprint information in the transform domain to enhance both robustness and perceptual quality. Due to its increasing popularity, the DWT is frequently utilized in recent watermarking schemes, where the DWT coefficients are modified.
For compressed JPEG images, we directly apply DWT to the block DCTs. Then, we embed hierarchical fingerprints into the hierarchical sub-band of the DWT domain using an improved quantization index modulation (QIM) scheme [43] in parallel. To preserve the visual quality of the marked social image, we adaptively quantize the low-bit planes of the coefficients in the LL, HL, and LH sub-bands using a customized quantization size.
Suppose there are N u users. The fingerprint embedding is based on QIM. Let X O = ( x 1 , x 2 , , x L O ) represent the community segment of the codeword, which is embedded into the low-bit planes of the HL and LH sub-bands. The embedding scheme for the community segment is based on Equation (11). Additionally, we select the low-bit planes of the LL sub-band to obtain another vector, X I = ( x 1 , x 2 , , x L I ) , which is used to embed the inner segment of the fingerprint codeword. Both X I and X O have lengths corresponding to the inner and outer segments of the codeword, respectively. L = L O + L I is the length of fingerprint codeword. The codeword embedding scheme is described in Equation (11).
Y k = Q Δ ( X k O + W k + d k ) W k d k , k = 1 , 2 , , N u
where Q Δ ( ) represents a quantization function with a constant step size Δ . X k O denotes the low-bit planes of the LH and HL sub-band, W k is a codeword for user k, and d k is a dither vector with a uniform distribution in the range ( Δ / 2 , Δ / 2 ).
To detect illegal redistribution, the fingerprinted low-bit planes of the LL, HL and LH sub-bands are extracted. The user m identified as the traitor is determined according to Equation (12).
m ^ = arg min k = 1 , 2 , N u Z Y k 2

3.2.2. Encryption and Decryption Algorithm

Image encryption disrupts the original pixel values to hide information. Visual security is crucial for social image encryption, as it ensures that the cipher image is not perceived to contain any original information. In this case, the visual perception of the cipher image is secure. Without the correct key, the encrypted image cannot be decrypted, making it an effective method for protecting sensitive content. Resource-constrained mobile terminals are the primary medium for content sharing on multimedia social platforms. Therefore, it is essential to process social images in the compressed domain to minimize computational overhead. Processing social images in the spatial domain can result in longer total encryption and fingerprinting times, ultimately leading to big data problems. To address this, selective encryption in hybrid domains can ensure low computational complexity while avoiding redundant embedding of fingerprint information.
Selective encryption in hybrid domains is an effective approach for ensuring social image security. A JWE algorithm is proposed for secure sharing of social images in hybrid domains. The proposed JWE scheme is mainly based on GoL, bit-XOR, and SVD. High-bit planes and low-bit planes of wavelet coefficients are encrypted and watermarked in parallel to enhance security. The proposed coefficient encryption algorithm works as follows:
Step 1: Given a JPEG image I, perform DWT on DCT blocks of the image. Assume that the matrix M represents the HH sub-band of I. Partition M into two parts: M 1 , M 2 . Calculate the sum of the elements in both parts, denoted as S u m M 1 and S u m M 2 , respectively. Obtain the threshold T h by subtracting S u m M 2 from S u m M 1 : T h = S u m M 1 S u m M 2 . Compute the SHA-3 hash of T h to obtain V T h = h a s h S H A 3 ( T h ) . Partition V T h into 16 parts: V 1 T h , V 2 T h , …, V 16 T h . Initial values x 1 , x 2 , x 3 , u 1 , v 1 , and control parameters α and β can be generated based on these hash values: V 1 T h , V 2 T h , …, V 16 T h .
x 1 = V 1 2 17 , x 2 = V 2 2 17 , x 3 = V 3 2 17
u 1 = V 5 2 17 , v 1 = V 6 2 17 , α = V 7 2 17 , β = V 8 2 17
Step 2: Regard the high-bit planes of wavelet coefficients in the LL, HL, and LH sub-bands as three different images. Scramble them based on GoL in Figure 2. Then, three scrambled matrices S M L L , S M H L , and S M L H can be obtained.
Step 3: Using the Hopfield neural network system, generate three chaotic sequences, denoted as R P M × N J K = { r p 1 J K , r p 2 J K , , r p M × N J K } . Subsequently, obtain the ceiling values of these sequences to form C R P M × N J K = { c r p 1 J K , c r p 2 J K , , c r p M × N J K } , where c r p i =ceiling( r p i ). Based on these ceiling sequences C R P M × N J K , we can then construct three random matrices: R M L L , R M H L , and R M L H .
C k = ( S M k , R M k )
where k = { L L , L H , H L } .
Step 4: Using the Hopfield neural network system, generate three chaotic sequences, denoted as F P M × N J K = { f p 1 J K , f p 2 J K , , f p M × N J K } . Subsequently, obtain the ceiling values of these sequences to form C P M × N J K = { c p 1 J K , c p 2 J K , , c p M × N J K } , where c p i =ceiling( f p i ). Arrange C P M × N J K = { c p 1 J K , c p 2 J K , , c p M × N J K } into an M × N matrix denoted as C P k . Next, conduct SVD on C P k , resulting in C P k = U C P k S C P k V C P k T , where k can be { L L , L H , H L } to indicate different matrices.
Step 5: Diffuse the confused and bit-XORed high-bit planes of the wavelet coefficients in the LL, HL, and LH sub-bands using the orthonormal matrices U C P k and V C P k T , as
I K E = U C P k C k V C P k T , M N V C P k C k U C P k T , M > N
where k = { L L , L H , H L } .
Step 6: Combine the encrypted high-bit planes denoted as I k E , k = { L L , L H , H L } , with the watermarked low-bit planes, denoted as Y k , k = { L L , L H , H L } , to obtain the encrypted and watermarked LL, LH, and HL sub-bands.
Step 7: Perform DWT to DCT block transform with the encrypted and watermarked coefficients. Then, apply GoL with a chaotic sequence ( y 1 y 2 y M / 8 × N / 8 ) generated by the 2D chaotic map to obtain confused DCT blocks. The result is the encrypted and watermarked image I J W E .
The image decryption operation is the inverse process of encryption, and the decryption algorithm is as follows:
Step 1: Apply the inverse GoL to the watermarked and encrypted image I J W E to obtain the DCT blocks.
Step 2: Perform DWT decomposition to the DCT blocks to obtain LL, LH, HL, and HH sub-bands.
Step 3: Perform the inverse SVD operation on the diffused high-bit planes of the encrypted sub-bands, as follows:
I ˜ K J W E = U C P k T I ^ k J W E V C P k , M N V C P k T I ^ k J W E U C P k , M > N
Step 4: Apply the bit-XOR operation to the inverted SVD content to obtain the confused coefficient matrix.
Step 5: Use the index matrix obtained during the GoL process to reverse the confusion in the coefficient matrix.
Step 6: Apply IDWT to the decrypted coefficients to retrieve the watermarked image I W .

4. Performance Test and Comparative Analysis

We implement the proposed social security scheme in MATLAB 2012. We used six types of test images (“Baboon, Peppers, Fishing boat, Airplane, Couple and Watch”, 512 × 512 ). Figure 5b shows the encrypted images. Figure 5d demonstrates the decrypted and watermarked image with fingerprint information. From Figure 5b, the visual security can be ensured.

4.1. Fingerprint Imperceptibility

The fingerprint is embedded into the social image during the encryption process. Specifically, the fingerprint information is embedded into the low-bit planes while the high-bit planes of the LL, LH, and HL sub-bands are being encrypted. To maintain high visual quality of the watermarked images, the fingerprint information should remain imperceptible or undetected in the fingerprinted copy. Related watermarked results are shown in Figure 5d. It is evident that the visual quality of the marked image has not undergone any noticeable change. Watermark in the decrypted images should not be perceived in Figure 5d. It is apparent that the security scheme possesses active tracing capabilities for future use.

4.2. Perceptual Effect of Encrypted Images

To protect social images from unauthorized access, encryption is necessary. An algorithm is considered to have a higher level of security if the encrypted images are unviewable to illegal users. Therefore, to limit illegal access, the visual quality of the encrypted images should be poor, as this indicates a safer encryption algorithm. Additionally, the watermark information should remain imperceptible in the decrypted and watermarked image. To achieve this, high-bit planes of the LL, HL, and LH sub-bands are selected for confusion with GoL, and inverse bit-XOR and SVD computing are utilized to diffuse the confused content for enhanced security. Figure 6c displays the experimental results, showcasing encrypted images that resemble noise-like signals and are thus unintelligible. This demonstrates the high security level of the encryption method. Furthermore, Figure 6c demonstrates the encrypted images obtained using the proposed selective encryption in hybrid domains. All encrypted images in Figure 6c are imperceptible, confirming the effectiveness of the proposed JWE algorithm in hybrid domains for social image security.

4.3. Exhaustive Attack Discussion

The keys for the selective encryption algorithm are generated using the SHA-3 hash method. The total keys include initial values x 1 , x 2 , x 3 , u 1 , v 1 , and control parameters α and β . Assume the key sensitivity is 10 15 ; the 3D chaotic map is utilized twice in the encryption process. Consequently, the total key space is approximately 10 15 × 10 = 10 150 . This vast key space provides the selective encryption algorithm with a high level of resistance against brute-force attacks.

4.4. Statistical Attack Discussion

Statistical analysis attack is a method employed by cryptanalysts to decode a ciphertext by examining the statistical patterns within the encrypted text. Two common types of statistical attacks are histogram analysis and correlation analysis of adjacent pixels.

4.4.1. Histogram Attack Discussion

Histogram attack analysis is a valuable tool for assessing the robustness of image encryption algorithms. In the proposed scheme, selective encryption in the wavelet domain is utilized specifically for JPEG images. To evaluate the effectiveness of the encryption algorithm, a comparison is made between the histograms of the encrypted images and the original images. If the encrypted histograms are uniformly distributed and significantly different from the corresponding original histograms, it indicates that the encryption algorithm is resilient to histogram attacks. Figure 6 provides visual evidence of this, where panels (b) and (d) display the gray-scale histograms of the original and encrypted images, respectively. From Figure 6, it is evident that the pixel values in the original images are concentrated in specific ranges. In contrast, the encrypted histograms in panel (d) exhibit a more uniform distribution and are markedly distinct from the original histograms. This suggests that the encryption algorithm has successfully obscured the statistical properties of the original images, making it difficult for an adversary to launch successful histogram attacks.

4.4.2. Correlation Analysis

The correlation analysis is used to evaluate the correlation between adjacent elements. Social images typically exhibit strong correlations among adjacent pixels. The proposed selective encryption algorithm in hybrid domains should be capable of disrupting these correlations. Figure 7a,b display the correlation of two adjacent pixels in the plain images and their corresponding encrypted images, respectively. Figure 7b demonstrates that the correlations in the encrypted image are greatly reduced. Essentially, the correlations present in the original image have been effectively destroyed by the encryption algorithm.

4.5. Encryption Process Discussion

The suggested hybrid watermarking and encryption approach encrypts critical coefficients. Figure 4 depicts the proposed algorithm. First, the high-bit planes of the LL, LH, and HL sub-bands are selected for scrambling. The scrambled results are demonstrated in Figure 8. Figure 8b,c show encrypted images with a 4 × 4 coefficient block scrambling based on GoL and single-coefficient GoL disruption across the LL, HL, and LH sub-bands. The unintelligibility can be enhanced by single-object permutation. Coefficient confusion based on GoL across the LL, HL, and LH sub-bands can achieve confusing and diffusion. Only confusion for the high-bit planes of the LL, LH, and HL sub-bands produces incomprehensible encryption effects. Figure 8 demonstrates that all permuted images are not perceptive. However, GoL permutation across the high-bit planes of the LL, LH, and HL sub-bands may not satisfy higher-level security requirements in some application areas. Therefore, in the proposed social image security scheme, bit-XOR and SVD diffusion operations are added after the GoL scrambling process, as shown in Figure 4. Figure 8d,e demonstrate encrypted images. Figure 8d shows the experimental results of bit-XOR diffusing after 8 coefficient block GoL permutation. Figure 8e shows the encrypted images after applying SVD diffusion to the encrypted images shown in Figure 8d.
All GoL permutations across the LL, HL, and LH sub-bands can render the permuted images unintelligible. In addition, the subsequent bit-XOR and SVD processing steps can provide sufficient security for the high-bit planes of the LL, LH, and HL sub-bands. If the GoL permutation across the high-bit planes of these sub-bands is cracked, the diffusion based on bit-XOR and SVD processing can still safeguard the encrypted social images. Therefore, the proposed technique is perceptually efficient. It can meet various levels of security requirements.

4.6. Encryption and Watermarking Performance Discussion

For the security of multimedia social platforms, it is essential to encrypt social images. It is crucial to achieve a balance between algorithm performance and security to meet the varying security level requirements on multimedia social platforms. The efficiency of the algorithm must be evaluated carefully. Given the resource constraints of many devices, if the social image security scheme takes too much time, it will not be a viable security method for multimedia social platforms.

4.6.1. Comparative Analysis

In this section, we evaluate the efficiency of the encryption algorithm. For social image sharing, if the proposed selective encryption algorithm in hybrid domains has a high running time complexity, it will not be an effective solution for ensuring social image security. Conversely, if the proposed selective encryption algorithm has a low running time complexity and is capable of providing double-level security services within a strict time limit, the security scheme is considered efficient.
The JWE scheme is compared with some existing related algorithms [24,25]. Due to their comprehensive encryption approach, these algorithms are extremely time-consuming in the spatial domain, making full encryption impractical for social image sharing.
The image encryption method [24] consists of shuffling and block XOR operations. Rostami et al.’s image encryption process [24] involves three main steps. Firstly, the chaotic matrix is generated by one-dimensional chaotic mapping, and the image is divided into many blocks, and the values of the chaotic matrix are used to perform XOR operations with the values in each block. Secondly, one-dimensional logical mapping is employed to generate a matrix with the same dimensions as the image. This matrix is used to disturb the position of the image pixels. Finally, a new chaotic matrix is generated using a new initial value. This matrix is then used to perform XOR operations with the blocks of the image. Encryption algorithm in [25] incorporates cyclic bit shifts and XOR operations. Diaconu et al. proposed an encryption technology that combines cyclic displacement and chaos [25]. This technology is primarily divided into two steps. Firstly, each pixel value of the original image is converted into an 8-bit binary array. The number of ‘1’s in each binary array is then counted. The remainder is determined when this count is divided by 2. If the remainder is 0, the binary array will be rotated to the right by count bits in the form of a linked list. If the remainder is 1, the binary array will be rotated to the left by count bits in the form of a linked list. The second step uses logical mapping to generate two encryption matrices of the same size as the length and width of the image, and then performs two XOR operations with the values of pixels on the image to obtain the encrypted image.
Four images are encrypted using both existing algorithms and the proposed scheme. The resulting data are presented in Table 1. From Table 1, it can be seen that the performance of the proposed algorithm can meet real-time requirements. Table 1 also displays the run times of other related algorithms for comparison.
From Table 1, it can be observed that the entropy value of the proposed selective encryption algorithm is lower than that of the algorithms in [24,25]. However, in terms of encryption speed, the proposed algorithm significantly outperforms the related algorithm. Specifically, it takes only about 0.8 s to encrypt an image using the proposed algorithm, whereas Rostami’s scheme requires approximately 46 s of computing time and Diaconu’s algorithm demands 177 s. Through a comparative analysis of these two parameters, it is evident that the proposed algorithm offers a significant improvement in running time compared to the related algorithms.
The JWE scheme presented in this work incorporates GoL permutation, bit-XOR, and SVD diffusion. The joint encryption/watermarking algorithm is expected to be faster than existing schemes due to parallel processing capabilities. In this technique, bit-XOR and SVD computations are reversible, allowing them to meet multi-level security requirements. The proposed JWE method addresses performance issues by applying permutation and SVD diffusion to selected key content. DWT enables all security actions to run in parallel, further enhancing efficiency. Diffusion based on bit-XOR and SVD computations increases the security level to meet various requirements. Since bit-XOR and SVD operations are reversible, decryption will be swift and efficient.

4.6.2. Algorithm Comparison

The algorithm in [31] performed SVD on the horizontal and vertical components within the DWT domain, and then the watermark image was divided into two equal parts. They were multiplied by K, which is an increment factor. These two products were then added to the two singular value vectors. The watermarked content was obtained through the inverse DWT process. The normalized correlation (NC) values obtained are shown in Table 2. However, the method in [31] is less robust against noise and cropping attacks compared to the proposed watermarking scheme. Both security algorithms have their respective advantages and disadvantages, and different watermarking algorithms can be tailored for use in various fields.
Table 3 summarizes the proposed security methods alongside some existing approaches including the watermarking scheme in [44], the joint encryption and watermarking scheme in [45], and the multi-security level scheme [46]: the hybrid watermarking and encryption technology [47], the image encryption algorithm [15], the watermarking method [14], and the multi-level security algorithm [31]. In Table 3, selective encryption refers to the practice of encrypting only the most important parts of the data, rather than all coefficients.
These related security schemes are not scalable for protecting social images on multimedia social platforms. JPEG images are predominantly distributed on these platforms. However, these existing security methods do not offer comprehensive protection throughout the entire lifecycle of social images. Sharing images in the spatial domain can lead to multimedia big data issues on multimedia social platforms, causing significant computational and communication burdens due to the large number of uncompressed images involved.
The proposed JWE method is scalable for secure sharing of social JPEG images. By employing selective encryption and fast DWT transformation from DCT blocks, the method not only secures multimedia content but also reduces time complexity.

5. Conclusions

This paper proposes a social JPEG image security algorithm utilizing JWE. The primary objective is to ensure the information security of multimedia content on social multimedia platforms and facilitate safe sharing of social images through watermarking and encryption technology. This method offers an efficient content sharing approach with low time complexity. It guarantees the security of the entire distribution process, with watermarking technology used to authenticate copyright and fingerprint technology enabling active traceability.
With the proposed JWE method, the selective high-bit plane encryption algorithm for the LL, HL, and LH sub-bands includes scrambling with block GoL, diffusion with bit-XOR, and SVD computing. Selective permutation further meets fast and secure requirements. The embedding of a watermark addresses the copyright issue of images, while image encryption technology enhances the security of image information for secure communication on multimedia social platforms. The combined use of watermarking/fingerprinting and encryption ensures a dual level of security. Ultimately, our security scheme achieves secure multimedia content distribution in social multimedia platforms.
In the future, the algorithm needs further optimization to enhance its resistance to various attacks and improve encryption performance. This will strengthen the security of social image sharing on multimedia social platforms, mitigate the high burdens of computing and storage resources, and prevent information leakage caused by malicious attacks. We plan to study the JWE algorithm for JPEG 2000 and extend it to audio and video watermarking to improve the security of multimedia sharing in social networks.

Author Contributions

Investigation, C.Y. and L.S.; analysis, S.T., J.W. and W.F.; writing, W.F., C.Y. and Q.Z.; funding, Q.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by NSF of China (61502154, 61972136, and 52201363), NSF of Chinese Hubei Province (2024AFB544), Project in Hubei Provincial Department of Education (grant numbers Q20232206 and 23Y116).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data generated and analyzed in this study are included in this published article.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this paper:
GoLGame of Life
SVDSingular value decomposition
DWTDiscrete wavelet transform
JWEJoint watermarking and encryption
SHASecure hash algorithm
DPVDiscrete point vector
HNNHopfield neural network
QIMQuantization index modulation
FRFTFractional Fourier transform
TSHTree structure Haar
SNASocial network analysis
NCNormalized correlation

References

  1. Chai, X.; Cao, G.; Gan, Z.; Zhang, Y.; Ma, Y.; He, X. TPE-AP: Thumbnail-Preserving Encryption Based on Adjustable Precision for JPEG Images. IEEE Internet Things J. 2024, 11, 37021–37031. [Google Scholar] [CrossRef]
  2. Zhang, Y.; Tong, Y.; Li, C.; Peng, Y.; Tan, F. Hybrid diffusion-based visual image encryption for secure cloud storage. Nonlinear Dyn. 2024. early access. [Google Scholar] [CrossRef]
  3. Yang, J.; Liu, X. Enhancing secure storage and sharing of multi-image in cloud environments using a novel chaotic map. Expert Syst. Appl. 2025, 264, 125897. [Google Scholar] [CrossRef]
  4. Ping, P.; Wei, P.; Fu, D.; Guo, B.; Bloh, O.T.; Xu, F. IMIH: Imperceptible Medical Image Hiding for Secure Healthcare. IEEE Trans. Dependable Secur. Comput. 2024, 21, 4652–4667. [Google Scholar] [CrossRef]
  5. Liang, J.; Liu, Y.; Gao, L.; Zhang, Z.; Liu, X. ISWP: Novel high-fidelity adversarial examples generated by incorporating invisible and secure watermark perturbations. Appl. Intell. 2025, 55, 40. [Google Scholar] [CrossRef]
  6. Wei, C.; Wang, Y.; Gao, K.; Shao, S.; Li, Y.; Wang, Z.; Qin, Z. PointNCBW: Toward Dataset Ownership Verification for Point Clouds via Negative Clean-Label Backdoor Watermark. IEEE Trans. Inf. Forensics Secur. 2025, 20, 191–206. [Google Scholar] [CrossRef]
  7. Deng, Q.; Wang, C.; Sun, Y.; Deng, Z.; Yang, G. Memristive Tabu Learning Neuron Generated Multi-Wing Attractor with FPGA Implementation and Application in Encryption. IEEE Trans. Circuits Syst. I Regul. Pap. 2024, 72, 300–311. [Google Scholar] [CrossRef]
  8. Li, J.; Wang, C.; Deng, Q. Symmetric multi-double-scroll attractors in Hopfield neural network under pulse controlled memristor. Nonlinear Dyn. 2024, 112, 14463–14477. [Google Scholar] [CrossRef]
  9. Wu, W.; Zhou, J. Constructing new high-order polynomial chaotic maps and application in pseudorandom number generator. Phys. Scr. 2024, 99, 035238. [Google Scholar] [CrossRef]
  10. Hua, Z.; Yao, J.; Zhang, Y.; Bao, H.; Yi, S. Two-Dimensional Coupled Complex Chaotic Map. IEEE Trans. Ind. Inform. 2024, 21, 85–95. [Google Scholar] [CrossRef]
  11. Liu, X.; Yang, J. A novel multi-layer image encryption algorithm based on 2D drop-wave function. Nonlinear Dyn. 2025, 113, 1775–1797. [Google Scholar] [CrossRef]
  12. Meng, B.; Yuan, X.; Zhang, Q.; Lam, C.T.; Huang, G. Encryption-then-embedding-based hybrid data hiding scheme for medical images. J. King Saud Univ.-Comput. Inf. Sci. 2024, 36, 101932. [Google Scholar] [CrossRef]
  13. Chai, X.; Tang, Z.; Gan, Z.; Lu, Y.; Wang, B.; Zhang, Y. SE-NDEND: A novel symmetric watermarking framework with neural network-based chaotic encryption for Internet of Medical Things. Biomed. Signal Process. Control 2024, 90, 105877. [Google Scholar] [CrossRef]
  14. Nawaz, S.A.; Li, J.; Bhatti, U.A.; Shoukat, M.U.; Li, D.; Raza, M.A. Hybrid watermarking algorithm for medical images based on digital transformation and MobileNetV2. Inf. Sci. 2024, 653, 119810. [Google Scholar] [CrossRef]
  15. Wang, M.; Teng, L.; Zhou, W.; Yan, X.; Xia, Z.; Zhou, S. A new 2D cross hyperchaotic Sine-modulation-Logistic map and its application in bit-level image encryption. Expert Syst. Appl. 2025, 261, 125328. [Google Scholar] [CrossRef]
  16. Toktas, F.; Erkan, U.; Yetgin, Z. Cross-channel color image encryption through 2D hyperchaotic hybrid map of optimization test functions. Expert Syst. Appl. 2024, 249, 123583. [Google Scholar] [CrossRef]
  17. Feng, W.; Zhang, J.; Chen, Y.; Qin, Z.; Zhang, Y.; Ahmad, M.; Wozniakd, M. Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption. Expert Syst. Appl. 2024, 246, 123190. [Google Scholar] [CrossRef]
  18. Feng, W.; Wang, Q.; Liu, H.; Ren, Y.; Zhang, J.; Zhang, S.; Qian, K.; Wen, H. Exploiting Newly Designed Fractional-Order 3D Lorenz Chaotic System and 2D Discrete Polynomial Hyper-Chaotic Map for High-Performance Multi-Image Encryption. Fractal Fract. 2023, 7, 887. [Google Scholar] [CrossRef]
  19. Feng, W.; Yang, J.; Zhao, X.; Qin, Z.; Zhang, J.; Zhu, Z.; Wen, H.; Qian, K. A Novel Multi-Channel Image Encryption Algorithm Leveraging Pixel Reorganization and Hyperchaotic Maps. Mathematics 2024, 12, 3917. [Google Scholar] [CrossRef]
  20. Wang, S.; Pan, J.; Cui, Y.; Chen, Z.; Zhan, W. Fast Color Image Encryption Algorithm Based on DNA Coding and Multi-Chaotic Systems. Mathematics 2024, 12, 3297. [Google Scholar] [CrossRef]
  21. Teng, L.; Du, L.; Leng, Z.; Wang, X. Chaotic image encryption based on partial face recognition and DNA diffusion. Appl. Intell. 2024, 54, 10360–10373. [Google Scholar] [CrossRef]
  22. Jiang, D.; Ahmad, J.; Suo, Z.; Alsulami, M.M.; Ghadi, Y.Y.; Boulila, W. ML-FAS: Multi-Level Face Anonymization Scheme and Its Application to E-Commerce Systems. IEEE Trans. Consum. Electron. 2024, 70, 5090–5100. [Google Scholar] [CrossRef]
  23. Yan, X.; Hu, Q.; Teng, L.; Su, Y. Unmanned ship image encryption method based on a new four-wing three-dimensional chaotic system and compressed sensing. Chaos Solitons Fractals 2024, 185, 115146. [Google Scholar] [CrossRef]
  24. Rostami, M.J.; Shahba, A.; Saryazdi, S.; Nezamabadi-pour, H. A novel parallel image encryption with chaotic windows based on logistic map. Comput. Electr. Eng. 2017, 62, 384–400. [Google Scholar] [CrossRef]
  25. Diaconu, A.V. Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf. Sci. 2016, 355, 314–327. [Google Scholar] [CrossRef]
  26. Wei, D.; Deng, Y. Redistributed invariant redundant fractional wavelet transform and its application in watermarking algorithm. Expert Syst. Appl. 2025, 262, 125707. [Google Scholar] [CrossRef]
  27. Thanki, R.; Kothari, A. Multi-level security of medical images based on encryption and watermarking for telemedicine applications. Multimed. Tools Appl. 2020, 80, 4307–4325. [Google Scholar] [CrossRef]
  28. Wang, L.; Zhou, N.; Sun, B.; Cao, Y.; Mou, J. Novel self-embedding holographic watermarking image encryption protection scheme. Chin. Phys. B 2024, 33, 050501. [Google Scholar] [CrossRef]
  29. Wang, L.; Banerjee, S.; Cao, Y.; Mou, J.; Sun, B. A new self-embedding digital watermarking encryption scheme. Nonlinear Dyn. 2024, 112, 8637–8652. [Google Scholar] [CrossRef]
  30. Yan, F.; Wang, Z.; Hirota, K. Dual medical image watermarking using SRU-enhanced network and EICC chaotic map. Complex Intell. Syst. 2025, 11, 101. [Google Scholar] [CrossRef]
  31. Anand, A.; Singh, A.K. An improved DWT-SVD domain watermarking for medical information security. Comput. Commun. 2020, 152, 72–80. [Google Scholar] [CrossRef]
  32. Ye, C.; Chen, C. Secure medical image sharing for smart healthcare system based on cellular neural network. Complex Intell. Syst. 2023, 9, 1653–1670. [Google Scholar] [CrossRef]
  33. Lin, Y.; Xie, Z.; Chen, T.; Cheng, X.; Wen, H. Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics. Expert Syst. Appl. 2024, 257, 124891. [Google Scholar] [CrossRef]
  34. Liu, R.; Tan, T. An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimed. 2002, 4, 121–128. [Google Scholar] [CrossRef]
  35. Egiazarian, K.; Astola, J. Tree-structured Haar transforms. J. Math. Imaging Vis. 2002, 16, 269–279. [Google Scholar] [CrossRef]
  36. Wolfram, S. A New Kind of Science; Wolfram Media: Champaign, IL, USA, 2002. [Google Scholar]
  37. Jungk, B.; Stoettinger, M. Serialized lightweight SHA-3 FPGA implementations. Micorprocess. Microsyst. 2019, 71, 102857. [Google Scholar] [CrossRef]
  38. Wang, M.; Song, X.; Liu, S.; Zhao, X.; Zhou, N. A novel 2D Log-Logistic-Sine chaotic map for image encryption. Nonlinear Dyn. 2025, 113, 2867–2896. [Google Scholar] [CrossRef]
  39. Hopfield, J.J. Neural networks and physical systems with emergent collective computational abilities. Proc. Natl. Acad. Sci. USA 1982, 79, 2554–2558. [Google Scholar] [CrossRef]
  40. Peng, Y.; Fu, C.; Cao, G.; Song, W.; Chen, J.; Sham, C.W. JPEG-compatible Joint Image Compression and Encryption Algorithm with File Size Preservation. ACM Trans. Multimed. Comput. Commun. Appl. 2024, 20, 1–20. [Google Scholar] [CrossRef]
  41. Xu, S.; Horng, J.H.; Chang, C.C.; Chang, C.C. Reversible Data Hiding in Encrypted JPEG Images with Polynomial Secret Sharing for IoT Security. IEEE Internet Things J. 2025, 12, 1098–1108. [Google Scholar] [CrossRef]
  42. Yasui, T.; Kuribayashi, M.; Funabiki, N.; Echizen, I. Near-Optimal Detection for Binary Tardos Code by Estimating Collusion Strategy. IEEE Trans. Inf. Forensics Secur. 2020, 15, 2069–2080. [Google Scholar] [CrossRef]
  43. Mao, J.; Tang, H.; Lyu, S.; Zhou, Z.; Cao, X. Content-Aware Quantization Index Modulation: Leveraging Data Statistics for Enhanced Image Watermarking. IEEE Trans. Inf. Forensics Secur. 2024, 19, 1935–1947. [Google Scholar] [CrossRef]
  44. Al-Haj, A.; Abdel-Nabi, H. An efficient watermarking algorithm for medical images. Multimed. Tools Appl. 2021, 80, 26021–26047. [Google Scholar] [CrossRef]
  45. Bouslimi, D.; Coatrieux, G.; Cozic, M.; Roux, C. A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images. IEEE Trans. Inf. Technol. Biomed. 2012, 16, 891–899. [Google Scholar] [CrossRef]
  46. Thakur, S.; Singh, A.K.; Ghrera, S.P.; Elhoseny, M. Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed. Tools Appl. 2019, 78, 3457–3470. [Google Scholar] [CrossRef]
  47. Liu, S.; Yu, N.; Xi, S.; Ji, X.; Yuan, H.; Wang, X.; Zhu, Z. Hybrid watermarking and encryption techniques for securing three-dimensional information. Phys. Scr. 2024, 99, 055543. [Google Scholar] [CrossRef]
Figure 1. The DPV production scheme: (a) labeled binary tree; (b) the interval corresponding to the tree in (a); (c) the corresponding complete binary tree.
Figure 1. The DPV production scheme: (a) labeled binary tree; (b) the interval corresponding to the tree in (a); (c) the corresponding complete binary tree.
Entropy 27 00276 g001
Figure 2. The GoL scheme: superior, the initial seed of GoL; middle, the original images; inferior, the scrambled images.
Figure 2. The GoL scheme: superior, the initial seed of GoL; middle, the original images; inferior, the scrambled images.
Entropy 27 00276 g002
Figure 3. Encoding using social network analysis.
Figure 3. Encoding using social network analysis.
Entropy 27 00276 g003
Figure 4. The proposed security scheme.
Figure 4. The proposed security scheme.
Entropy 27 00276 g004
Figure 5. Encrypted and decrypted results: (a) The plain image. (b) The cipher image. (c) The reconstructed image with a different initial value. (d) The reconstructed image with correct parameters.
Figure 5. Encrypted and decrypted results: (a) The plain image. (b) The cipher image. (c) The reconstructed image with a different initial value. (d) The reconstructed image with correct parameters.
Entropy 27 00276 g005
Figure 6. Experimental results: (a) Original images. (b) Initial histograms. (c) Encrypted images. (d) Encrypted histograms.
Figure 6. Experimental results: (a) Original images. (b) Initial histograms. (c) Encrypted images. (d) Encrypted histograms.
Entropy 27 00276 g006
Figure 7. Correlation: (a) original image; (b) encrypted image.
Figure 7. Correlation: (a) original image; (b) encrypted image.
Entropy 27 00276 g007
Figure 8. Encryption process discussion: (a) original images; (b) 4 × 4 block permutation across the high-bit planes of the LL, LH, and HL sub-bands; (c) single-coefficient permutation across the high-bit planes of the LL, LH, and HL sub-bands; (d) bit-XOR diffusion after 8 × 8 block permutation across the high-bit planes of the LL, LH, and HL sub-bands; and (e) SVD diffusion of (d).
Figure 8. Encryption process discussion: (a) original images; (b) 4 × 4 block permutation across the high-bit planes of the LL, LH, and HL sub-bands; (c) single-coefficient permutation across the high-bit planes of the LL, LH, and HL sub-bands; (d) bit-XOR diffusion after 8 × 8 block permutation across the high-bit planes of the LL, LH, and HL sub-bands; and (e) SVD diffusion of (d).
Entropy 27 00276 g008
Table 1. Encryption performance and entropy analysis.
Table 1. Encryption performance and entropy analysis.
ImageProposed[24][25][32]
EntropyTime (s)EntropyTime (s)EntropyTime (s)EntropyTime (s)
Plane6.56280.76947.99972444.32567.999715168.3525.36780.8935
Baboon6.62580.79287.99974545.32877.999716176.2395.23360.8637
Watch6.12460.75937.99976943.26877.999782168.3255.42630.8691
Peppers6.39260.77897.99976946.21897.999763158.3265.12560.8536
Table 2. Watermark NC value.
Table 2. Watermark NC value.
AttackPlaneBaboonWatch
Proposed[31]Proposed[31]Proposed[31]
No attack0.99960.99890.99620.99080.99620.9993
Upper left corner cropping (1/16)0.93450.55230.82350.29120.97960.8965
Center cropping (1/16)0.96520.31580.82910.18910.9548−0.0217
Around cropping (1/8)0.6613−0.15610.80390.17260.9537−0.3612
Salt and pepper (0.005)0.84350.80280.88630.83270.89960.8938
Salt and pepper (0.01)0.79290.71020.81920.69580.87650.7821
Salt and pepper (0.02)0.76820.51230.81860.61280.87980.5587
Gaussian noise (0.001)0.79560.61270.82780.57360.85370.4367
Gaussian noise (0.005)0.78930.65390.82930.63120.88560.5129
Gaussian noise (0.01)0.76390.66780.83690.62180.86780.5357
Table 3. Comparisons of the related schemes.
Table 3. Comparisons of the related schemes.
Ours[45][44][46][15][47][14][31]
WatermarkingYesYesYesYesNoYesYesYes
Selective encryptionYesNoNoNoNoNoNoNo
TracingYesYesNoYesNoYesYesYes
ScalabilityYesNoNoNoNoNoNoNo
Encryption domainDWT/DCTSpatialSpatialSpatialSpatialNoNoSpatial
Encryption schemeChaosRC4RC4ChaosChaosNoNoChaos
Watermark domainDWTSpatialSpatialDWT/DCTNoFRFTDWT/DCTDWT
Watermark detectionEncryptedPlaintextPlaintextPlaintextNoPlaintextPlaintextPlaintext
Controllable security levelYesNoNoNoNoNoNoNo
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ye, C.; Tan, S.; Wang, J.; Shi, L.; Zuo, Q.; Feng, W. Social Image Security with Encryption and Watermarking in Hybrid Domains. Entropy 2025, 27, 276. https://doi.org/10.3390/e27030276

AMA Style

Ye C, Tan S, Wang J, Shi L, Zuo Q, Feng W. Social Image Security with Encryption and Watermarking in Hybrid Domains. Entropy. 2025; 27(3):276. https://doi.org/10.3390/e27030276

Chicago/Turabian Style

Ye, Conghuan, Shenglong Tan, Jun Wang, Li Shi, Qiankun Zuo, and Wei Feng. 2025. "Social Image Security with Encryption and Watermarking in Hybrid Domains" Entropy 27, no. 3: 276. https://doi.org/10.3390/e27030276

APA Style

Ye, C., Tan, S., Wang, J., Shi, L., Zuo, Q., & Feng, W. (2025). Social Image Security with Encryption and Watermarking in Hybrid Domains. Entropy, 27(3), 276. https://doi.org/10.3390/e27030276

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop