Neural Attractor-Based Adaptive Key Generator with DNA-Coded Security and Privacy Framework for Multimedia Data in Cloud Environments

被引:23
作者
Mahalingam, Hemalatha [1 ]
Velupillai Meikandan, Padmapriya [2 ]
Thenmozhi, Karuppuswamy [3 ]
Moria, Kawthar Mostafa [4 ]
Lakshmi, Chandrasekaran [3 ]
Chidambaram, Nithya [3 ]
Amirtharajan, Rengarajan [3 ]
机构
[1] King Abdulaziz Univ, Fac Engn, Dept Elect & Comp Engn, Jeddah 22254, Saudi Arabia
[2] Marquette Univ, Dept Comp Sci, Milwaukee, WI 53233 USA
[3] SASTRA Deemed Univ, Sch Elect & Elect Engn, Thanjavur 613401, India
[4] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Comp Sci, Jeddah 22254, Saudi Arabia
关键词
chaos key generator; adaptive key generator; DNA encoding; image ciphering; neural networks; cloud storage; IMAGE ENCRYPTION; ALGORITHM; CHAOS; CRYPTOSYSTEM; ISSUES; 2D;
D O I
10.3390/math11081769
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Cloud services offer doctors and data scientists access to medical data from multiple locations using different devices (laptops, desktops, tablets, smartphones, etc.). Therefore, cyber threats to medical data at rest, in transit and when used by applications need to be pinpointed and prevented preemptively through a host of proven cryptographical solutions. The presented work integrates adaptive key generation, neural-based confusion and non-XOR, namely DNA diffusion, which offers a more extensive and unique key, adaptive confusion and unpredictable diffusion algorithm. Only authenticated users can store this encrypted image in cloud storage. The proposed security framework uses logistics, tent maps and adaptive key generation modules. The adaptive key is generated using a multilayer and nonlinear neural network from every input plain image. The Hopfield neural network (HNN) is a recurrent temporal network that updates learning with every plain image. We have taken Amazon Web Services (AWS) and Simple Storage Service (S3) to store encrypted images. Using benchmark evolution metrics, the ability of image encryption is validated against brute force and statistical attacks, and encryption quality analysis is also made. Thus, it is proved that the proposed scheme is well suited for hosting cloud storage for secure images.
引用
收藏
页数:23
相关论文
共 53 条
[11]   A Novel Chaotic Image Encryption Scheme Armed with Global Dynamic Selection [J].
Chen, Xin ;
Wang, Qianxue ;
Fan, Linfeng ;
Yu, Simin .
ENTROPY, 2023, 25 (03)
[12]   A cloud compatible DNA coded security solution for multimedia file sharing & storage [J].
Chidambaram, Nithya ;
Raj, Pethuru ;
Thenmozhi, K. ;
Rajagopalan, Sundararaman ;
Amirtharajan, Rengarajan .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (23) :33837-33863
[13]   A chaos-based probabilistic block cipher for image encryption [J].
Dhall, Sakshi ;
Pal, Saibal K. ;
Sharma, Kapil .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (01) :1533-1543
[14]   Circular inter-intra pixels bit-level permutation and chaos-based image encryption [J].
Diaconu, Adrian-Viorel .
INFORMATION SCIENCES, 2016, 355 :314-327
[15]   New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method [J].
Duan, Chen-Feng ;
Zhou, Jie ;
Gong, Li-Hua ;
Wu, Jun-Yun ;
Zhou, Nan-Run .
OPTICS AND LASERS IN ENGINEERING, 2022, 150
[16]   Image encryption using a synchronous permutation-diffusion technique [J].
Enayatifar, Rasul ;
Abdullah, Abdul Hanan ;
Isnin, Ismail Fauzi ;
Altameem, Ayman ;
Lee, Malrey .
OPTICS AND LASERS IN ENGINEERING, 2017, 90 :146-154
[17]   The Opening Capability for Security against Privacy Infringements in the Smart Grid Environment [J].
Eom, Sungwook ;
Huh, Jun-Ho .
MATHEMATICS, 2018, 6 (10)
[18]   A hybrid NEQR image encryption cryptosystem using two-dimensional quantum walks and quantum coding [J].
Hao, Wentao ;
Zhang, Tianshuo ;
Chen, Xianyi ;
Zhou, Xiaoyi .
SIGNAL PROCESSING, 2023, 205
[19]   Chaotic image cryptosystem using DNA deletion and DNA insertion [J].
Hu, Ting ;
Liu, Ye ;
Gong, Li-Hua ;
Guo, Shao-Feng ;
Yuan, Hong-Mei .
SIGNAL PROCESSING, 2017, 134 :234-243
[20]   2D Sine Logistic modulation map for image encryption [J].
Hua, Zhongyun ;
Zhou, Yicong ;
Pun, Chi-Man ;
Chen, C. L. Philip .
INFORMATION SCIENCES, 2015, 297 :80-94