Partially Deep-Learning Encryption Technique

被引:1
作者
Mousa, Hamdy M. [1 ]
机构
[1] Menoufia Univ, Fac Comp & Informat, Menoufia 32511, Egypt
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 74卷 / 02期
关键词
Encryption technique; deep learning; security; zigzag transformation; image partitioning;
D O I
10.32604/cmc.2023.034593
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The biggest problem facing the world is information security in the digital era. Information protection and integrity are hot topics at all times, so many techniques have been introduced to transmit and store data securely. The increase in computing power is increasing the number of security breaches and attacks at a higher rate than before on average. Thus, a number of existing security systems are at risk of hacking. This paper proposes an encryption technique called Partial Deep-Learning Encryption Technique (PD-LET) to achieve data security. PD-LET includes several stages for encoding and decoding digital data. Data preprocessing, convolution layer of standard deep learning algorithm, zigzag transformation, image partitioning, and encryption key are the main stages of PD-LET. Initially, the proposed technique converts digital data into the corresponding matrix and then applies encryption stages to it. The implementation of encrypting stages is frequently changed. This collaboration between deep learning and zigzag transformation techniques provides the best output result and transfers the original data into a completely undefined image which makes the proposed technique efficient and secure via data encryption. Moreover, its implementation phases are continuously changed during the encryption phase, which makes the data encryption technique more immune to some future attacks because breaking this technique needs to know all the information about the encryption technique. The security analysis of the obtained results shows that it is computationally impractical to break the proposed technique due to the large size and diversity of keys and PD-LET has achieved a reliable security system.
引用
收藏
页码:4277 / 4291
页数:15
相关论文
共 38 条
[1]  
Acquah J. B., 2022, ENHANCED RSA ALGORIT
[2]  
Amounas F., 2012, Int J Inform Netw Secur (IJNS), V1, P54
[3]   A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding [J].
Azam, Naveed Ahmed .
SECURITY AND COMMUNICATION NETWORKS, 2017,
[4]   Image encryption based on the Jacobian elliptic maps [J].
Behnia, S. ;
Akhavan, A. ;
Akhshani, A. ;
Samsudin, A. .
JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (09) :2429-2438
[5]  
Boriga Radu Eugen, 2014, IAENG International Journal of Computer Science, V41, P249
[6]  
Daemen Joan., 2002, The design of Rijndael: AES-the advanced encryption standard
[7]   A Hybrid Security Framework for Medical Image Communication [J].
El-Shafai, Walid ;
Abd El-Hameed, Hayam A. ;
Khalaf, Ashraf A. M. ;
Soliman, Naglaa F. ;
Alhussan, Amel A. ;
Abd El-Samie, Fathi E. .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (02) :2713-2730
[8]  
Faculty of Computers and Information Menoufia University Egypt, 2019, International Journal of Intelligent Systems and Applications, V11, P1, DOI 10.5815/ijisa.2019.11.01
[9]   Symmetric ciphers based on two-dimensional chaotic maps [J].
Fridrich, J .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06) :1259-1284
[10]  
GaneshKumar K, 2017, INDIAN J SCI TECHNOL, V9, DOI [10.17485/ijst/2016/v9i48/108970, DOI 10.17485/ijst/2016/v9i48/108970]