Data Security Utilizing a Memristive Coupled Neural Network in 3D Models

被引:4
作者
Gabr, Mohamed [1 ]
Diab, Amr [1 ,2 ]
Elshoush, Huwaida T. [2 ]
Chen, Yen-Lin [3 ]
Por, Lip Yee [4 ]
Ku, Chin Soon [5 ]
Alexan, Wassim [6 ,7 ]
机构
[1] German Univ Cairo GUC, Fac Media Engn & Technol, Comp Sci Dept, New Cairo 11835, Egypt
[2] Univ Khartoum, Fac Math Sci & Informat, Dept Comp Sci, Khartoum 11115, Sudan
[3] Natl Taipei Univ Technol, Dept Comp Sci & Informat Engn, Taipei 106344, Taiwan
[4] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
[5] Univ Tunku Abdul Rahman, Dept Comp Sci, Kampar 31900, Malaysia
[6] German Univ Cairo GUC, Fac Informat Engn & Technol, Commun Dept, New Cairo 11835, Egypt
[7] German Int Univ GIU, Math Dept, Cairo 13507, Egypt
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Encryption; Three-dimensional displays; Solid modeling; Data models; Cryptography; Feature extraction; Point cloud compression; Chaos; Coupling circuits; Neural networks; 3D models; chaos theory; data hiding; encryption; memristive coupled neural network; ALGORITHM;
D O I
10.1109/ACCESS.2024.3447075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article proposes a novel double data security algorithm that first encrypts sensitive data using a two-stage encryption method based on numerical solutions from a fractional-order memristive coupled neural network system. Solutions are obtained to generate encryption keys and construct S-boxes, which are then applied along with an initial key to encrypt the data bits through repeated XOR and S-box operations. The encrypted output is then hidden imperceptibly within 3D geometries by slightly modifying model points based on the encrypted data bits. This two-pronged approach provides enhanced protection for confidential information compared to single encryption or data hiding alone. Numerical experiments demonstrate the effectiveness of encryption in obscuring patterns while data extraction from modified 3D models validates recovery with negligible visual impact. Additionally, the proposed encryption scheme is shown to be superior to the standard AES-256 algorithm in terms of both computational efficiency and security against brute-force attacks. Through a synergistic blend of robust encryption and stealthy data hiding within 3D objects, the presented algorithm can reliably ensure privacy for sensitive digital data transmissions and storage applications.
引用
收藏
页码:116457 / 116477
页数:21
相关论文
共 50 条
  • [1] Reversible Data Hiding for Encrypted 3D Mesh Models With Secret Sharing Over Galois Field
    Gao, Kai
    Horng, Ji-Hwei
    Chang, Chin-Chen
    IEEE TRANSACTIONS ON MULTIMEDIA, 2024, 26 : 5499 - 5510
  • [2] A novel approach to improve multimedia security utilizing 3D mixed chaotic map
    Naseer, Yasir
    Shah, Dawood
    Shah, Tariq
    MICROPROCESSORS AND MICROSYSTEMS, 2019, 65 : 1 - 6
  • [3] 3D medical data security protection
    Martin del Rey, A.
    Hernandez Pastora, J. L.
    Rodriguez Sanchez, G.
    EXPERT SYSTEMS WITH APPLICATIONS, 2016, 54 : 379 - 386
  • [4] Neural network for 3D point clouds alignment
    Voronin, Sergei
    Vasilyev, Alexander
    Kober, Vitaly
    Makovetskii, Artyom
    Voronin, Aleksei
    Zhernov, Dmitrii
    APPLICATIONS OF DIGITAL IMAGE PROCESSING XLV, 2022, 12226
  • [5] Action Recognition Using High Temporal Resolution 3D Neural Network Based on Dilated Convolution
    Xu, Yongyang
    Feng, Yaxing
    Xie, Zhong
    Xie, Mingyu
    Luo, Wei
    IEEE ACCESS, 2020, 8 : 165365 - 165372
  • [6] VoxRec: Hybrid Convolutional Neural Network for Active 3D Object Recognition
    Karambakhsh, Ahmad
    Sheng, Bin
    Li, Ping
    Yang, Po
    Jung, Younhyun
    Feng, David Dagan
    IEEE ACCESS, 2020, 8 (08): : 70969 - 70980
  • [7] Neural Network Models in Big Data Analytics and Cyber Security
    Ghimes, Ana-Maria
    Patriciu, Victor-Valeriu
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE - ECAI 2017, 2017,
  • [8] RINet: Efficient 3D Lidar-Based Place Recognition Using Rotation Invariant Neural Network
    Li, Lin
    Kong, Xin
    Zhao, Xiangrui
    Huang, Tianxin
    Li, Wanlong
    Wen, Feng
    Zhang, Hongbo
    Liu, Yong
    IEEE ROBOTICS AND AUTOMATION LETTERS, 2022, 7 (02) : 4321 - 4328
  • [9] Privacy Protection of Medical Data Based on Multi-Scroll Memristive Hopfield Neural Network
    Yu, Fei
    Shen, Hui
    Yu, Qiulin
    Kong, Xinxin
    Sharma, Pradip Kumar
    Cai, Shuo
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (02): : 845 - 858
  • [10] Hierarchical Graph Attention Based Multi-View Convolutional Neural Network for 3D Object Recognition
    Zeng, Hui
    Zhao, Tianmeng
    Cheng, Ruting
    Wang, Fuzhou
    Liu, Jiwei
    IEEE ACCESS, 2021, 9 (09): : 33323 - 33335