An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN

被引:36
作者
Erkan, Ugur [1 ]
Toktas, Abdurrahim [2 ]
Enginoglu, Serdar [3 ]
Akbacak, Enver [4 ]
Thanh, Dang N. H. [5 ]
机构
[1] Karamanoglu Mehmetbey Univ, Fac Engn, Dept Comp Engn, TR-70200 Karaman, Turkey
[2] Karamanoglu Mehmetbey Univ, Fac Engn, Dept Elect Elect Engn, TR-70200 Karaman, Turkey
[3] Canakkale Onsekiz Mart Univ, Fac Arts & Sci, Dept Math, Canakkale, Turkey
[4] Halic Univ, Fac Engn, Dept Comp Engn, Sutluce Mah Imrahor Cad 82 Beyoglu, TR-34445 Istanbul, Turkey
[5] Univ Econ Ho Chi Minh City, Sch Business Informat Technol, Dept Informat Technol, Ho Chi Minh City, Vietnam
关键词
Image encryption; Chaotic map; Logarithmic map; Deep convolution neural network (CNN); Bit reversion; ALGORITHM; TRANSFORM; SYSTEM; CRYPTANALYSIS; COMBINATION; SECRET; DESIGN; MATRIX;
D O I
10.1007/s11042-021-11803-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A secure and reliable image encryption scheme is presented, which depends on a novel chaotic log-map, deep convolution neural network (CNN) model, and bit reversion operation for the manipulation process. CNN is utilized to generate a public key to be based on the image in order to enhance the key sensitivity of the scheme. Initial values and control parameters are then obtained from the key to be used in the chaotic log-map, and thus a chaotic sequence is produced for the encrypting operations. The scheme then encrypts the images by scrambling and manipulating the pixels of images through four operations: permutation, DNA encoding, diffusion, and bit reversion. The encryption scheme is precisely examined for the well-known images in terms of various cryptanalyses such as key-space, key sensitivity, information entropy, histogram, correlation, differential attack, noisy attack, and cropping attack. To corroborate the image encryption scheme, the visual and numerical results are even compared with available scores of the state of the art. Therefore, the proposed log-map-based image encryption scheme is successfully verified and validated by superior absolute and comparative results. As future work, the proposed log-map can be extended to combinational multi-dimensional with existing efficient chaotic maps.
引用
收藏
页码:7365 / 7391
页数:27
相关论文
共 67 条
[31]  
Kolesnikov A., 2019, BIG TRANSFER BIT GEN
[32]   ImageNet Classification with Deep Convolutional Neural Networks [J].
Krizhevsky, Alex ;
Sutskever, Ilya ;
Hinton, Geoffrey E. .
COMMUNICATIONS OF THE ACM, 2017, 60 (06) :84-90
[33]   Scalable and Storage Efficient Dynamic Key Management Scheme for Wireless Sensor Network [J].
Kumar, Vipin ;
Malik, Navneet ;
Dhiman, Gaurav ;
Lohani, Tarun Kumar .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
[34]   Integrated chaotic systems for image encryption [J].
Lan, Rushi ;
He, Jinwen ;
Wang, Shouhua ;
Gu, Tianlong ;
Luo, Xiaonan .
SIGNAL PROCESSING, 2018, 147 :133-145
[35]   Cryptanalysis and enhancement of an image encryption scheme based on a 1-D coupled Sine map [J].
Liu, Yu ;
Qin, Zheng ;
Liao, Xiaofeng ;
Wu, Jiahui .
NONLINEAR DYNAMICS, 2020, 100 (03) :2917-2931
[36]   A robust image encryption algorithm based on Chua's circuit and compressive sensing [J].
Luo, Yuling ;
Lin, Jia ;
Liu, Junxiu ;
Wei, Duqu ;
Cao, Lvchen ;
Zhou, Ronglong ;
Cao, Yi ;
Ding, Xuemei .
SIGNAL PROCESSING, 2019, 161 :227-247
[37]   A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme [J].
Mansouri, Ali ;
Wang, Xingyuan .
INFORMATION SCIENCES, 2020, 520 :46-62
[38]   Time efficient secure DNA based access control model for cloud computing environment [J].
Namasudra, Suyel ;
Roy, Pinki ;
Vijayakumar, Pandi ;
Audithan, Sivaraman ;
Balusamy, Balamurugan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 73 :90-105
[39]   An IoT and machine learning-based routing protocol for reconfigurable engineering application [J].
Natarajan, Yuvaraj ;
Srihari, Kannan ;
Dhiman, Gaurav ;
Chandragandhi, Selvaraj ;
Gheisari, Mehdi ;
Liu, Yang ;
Lee, Cheng-Chi ;
Singh, Krishna Kant ;
Yadav, Kusum ;
Alharbi, Hadeel Fahad .
IET COMMUNICATIONS, 2022, 16 (05) :464-475
[40]  
Nusse HE., 1994, DYNAMICS NUMERICAL E, P229, DOI [10.1007/978-1-4684-0231-5_6, DOI 10.1007/978-1-4684-0231-5_6]