Key Generation Method Based on Generative Adversarial Network and Its Application in Low-light-level Image Encryption

被引:0
|
作者
Li J. [1 ,2 ]
Liu Z. [1 ,2 ]
Man Z. [1 ,2 ]
机构
[1] School of Computer Science and Technology, Changchun University of Science and Technology, Jilin
[2] Jilin Key Laboratory of Network and Information Security, Changchun
来源
Binggong Xuebao/Acta Armamentarii | 2022年 / 43卷 / 02期
关键词
Deep learning; Encryption algorithm; Generative adversarial network; Key generation; Low-light-level image;
D O I
10.3969/j.issn.1000-1093.2022.02.011
中图分类号
学科分类号
摘要
Generative adversarial network (GAN) is a deep learning model, which is one of the most promising methods for unsupervised learning in complex distributed environment in recent years. The random numbers generated by GAN and chaotic systems have many similar advantages, such as randomness and sensitivity. But at the same time, the random numbers generated by GAN have the features that the random numbers generated by chaotic systems do not have, such as non-reproducibility.The random number generated by GAN training shows its rapidity and higher security in the encryption of low-light-level images with low signal-to-noise ratio and few gray levels. GAN is introduced into the random key generation. The pseudo-random number generated by quantum cellular neural network (QCNN) system is used as the training set of GAN, and a completely random key pool is obtained through GAN to learn and train the random key generated by hyperchaotic system. For the application of the proposed key generation method in low-light-level image encryption, a new low-light-level image encryption algorithm is proposed, which uses a 2D-pointer related to the plaintext to randomly select two phase masks in the key pool to achieve the security of low-light-level images. The results show that the encryption key generated by the learning key generation scheme can pass all the random tests of The National Institute of Standards and Technology, and the scheme can resist differential attacks by cryptanalysts, known/chosen plaintext attacks, and various statistical analyses. The performance comparison with other similar algorithms also shows the superiority of the proposed cryptosystem. © 2022, Editorial Board of Acta Armamentarii. All right reserved.
引用
收藏
页码:337 / 344
页数:7
相关论文
共 25 条
  • [1] BAI L, LAI X F, HAN W Q, Et al., An infrared image nonuniformity correction method adapted to adjustment of integration time, Acta Photonica Sinica, 49, 1, pp. 169-177, (2020)
  • [2] LI J, LI S J, DUAN X H, Et al., Infrared image enhancement based on retinex and probability nonlocal means filtering, Acta Photonica Sinica, 49, 4, pp. 182-191, (2020)
  • [3] ZONG Y T, JIANG X Y, WANG X, Et al., Research on electronic image stabilization technique for vehicle-borne low-light-level telescope, Acta Armamentarii, 33, 9, pp. 1041-1047, (2012)
  • [4] ZENG G L, SU B H, NIU L H, Et al., Neural network-based low-light-level image enhancement and reconstruction, Acta Armamentarii, 27, 4, pp. 652-654, (2006)
  • [5] MAN Z L, LI J Q, DI X Q, Et al., An image segmentation encryption algorithm based on hybrid chaotic system, IEEE Access, 7, pp. 103047-103058, (2019)
  • [6] DI X Q, LI J Q, QI H, Et al., A semi-symmetric image encryption scheme based on the function projective synchronization of two hyperchaotic systems, PloS One, 12, 9, (2017)
  • [7] WANG H X, CAI G L, MIAO S, Et al., Nonlinear feedback control of a novel hyperchaotic system and its circuit implementation, Chinese Physics B, 19, 3, pp. 150-157, (2010)
  • [8] STINSONDR, PATERSON M., Cryptography: theory and practice, (2018)
  • [9] TSAFACK N, KENGNE J, ABD-EL-ATTY B, Et al., Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption, Information Sciences, 515, pp. 191-217, (2020)
  • [10] RAKHEJ P, VIG R, SINGH P, Et al., Double image encryption using 3D Lorenz chaotic system, 2D non-separable linear canonical transform and QR decomposition, Optical and Quantum Electronics, 52, 2, (2020)