Cy: Chaotic yolo for user intended image encryption and sharing in social media

被引:35
作者
Asgari-Chenaghlu, Meysam [1 ]
Feizi-Derakhshi, Mohammad-Reza [1 ]
Nikzad-Khasmakhi, Narjes [1 ]
Feizi-Derakhshi, Ali-Reza [1 ]
Ramezani, Majid [1 ]
Jahanbakhsh-Nagadeh, Zoleikha [1 ,2 ]
Rahkar-Farshi, Taymaz [1 ,3 ]
Zafarani-Moattar, Elnaz [1 ,4 ]
Ranjbar-Khadivi, Mehrdad [1 ,5 ]
Balafar, Mohammad-Ali [6 ]
机构
[1] Univ Tabriz, Dept Comp Engn, Computerized Intelligence Syst Lab, Tabriz, Iran
[2] Islamic Azad Univ, Dept Comp Engn, Naghadeh Branch, Naghadeh, Iran
[3] Altinbas Univ, Dept Software Engn, Istanbul, Turkey
[4] Islamic Azad Univ, Dept Comp Engn, Tabriz Branch, Tabriz, Iran
[5] Islamic Azad Univ, Dept Comp Engn, Shabestar Branch, Shabestar, Iran
[6] Univ Tabriz, Fac Elect & Comp Engn, Dept Comp Engn, Tabriz, Iran
关键词
Deep learning; Chaotic maps; Image encryption; Data preservation; Social media; ALGORITHM; SYSTEM; MAP;
D O I
10.1016/j.ins.2020.07.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social media is an inseparable part of our daily life where we post and share photos and media related to our life and in some cases we intend to share them between specific people. This intended and cherry picked sharing of media needs a better solution rather than simply picking users. Some social media platforms do not restrict other users from sharing timeline posts of others; meaning, one can simply forward a post from another person to a third one and no data preservation has been applied. In most cases we do not intend to secure the whole media and only important parts of it are intended to be secured. In this work we propose a novel method based on YoloV3 object detection and chaotic image encryption to overcome the issue of user intended data preservation in social media platforms. Our proposed method is capable of both automatic image encryption on full or user selected regions. Statistical and cryptographic analysis show superiority of our method compared to other state-of-the-art methods while it keeps the speed as high as possible for online and realtime use cases. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:212 / 227
页数:16
相关论文
共 48 条
[1]   An image encryption scheme based on quantum logistic map [J].
Akhshani, A. ;
Akhavan, A. ;
Lim, S. -C. ;
Hassan, Z. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2012, 17 (12) :4653-4661
[2]  
Al Haj Hassan H., 2012, 2012 Symposium on Broadband Networks and Fast Internet (RELABIRA), P103, DOI 10.1109/RELABIRA.2012.6235103
[3]   An efficient and secure chaotic cipher algorithm for image content preservation [J].
Amina, Souyah ;
Mohamed, Faraoun Kamel .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2018, 60 :12-32
[4]  
[Anonymous], ARXIV180402767
[5]   A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation [J].
Asgari-Chenaghlu, Meysam ;
Balafar, Mohammad-Ali ;
Feizi-Derakhshi, Mohammad-Reza .
SIGNAL PROCESSING, 2019, 157 :1-13
[6]  
Caers R., 2013, FACEBOOK LIT REV
[7]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[8]  
Daemen J., 1999, COMPLEXITY, P1
[9]   EXHAUSTIVE CRYPT-ANALYSIS OF NBS DATA ENCRYPTION STANDARD [J].
DIFFIE, W ;
HELLMAN, ME .
COMPUTER, 1977, 10 (06) :74-84
[10]   LIAPUNOV EXPONENTS FROM TIME-SERIES [J].
ECKMANN, JP ;
KAMPHORST, SO ;
RUELLE, D ;
CILIBERTO, S .
PHYSICAL REVIEW A, 1986, 34 (06) :4971-4979