An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN

被引:36
作者
Erkan, Ugur [1 ]
Toktas, Abdurrahim [2 ]
Enginoglu, Serdar [3 ]
Akbacak, Enver [4 ]
Thanh, Dang N. H. [5 ]
机构
[1] Karamanoglu Mehmetbey Univ, Fac Engn, Dept Comp Engn, TR-70200 Karaman, Turkey
[2] Karamanoglu Mehmetbey Univ, Fac Engn, Dept Elect Elect Engn, TR-70200 Karaman, Turkey
[3] Canakkale Onsekiz Mart Univ, Fac Arts & Sci, Dept Math, Canakkale, Turkey
[4] Halic Univ, Fac Engn, Dept Comp Engn, Sutluce Mah Imrahor Cad 82 Beyoglu, TR-34445 Istanbul, Turkey
[5] Univ Econ Ho Chi Minh City, Sch Business Informat Technol, Dept Informat Technol, Ho Chi Minh City, Vietnam
关键词
Image encryption; Chaotic map; Logarithmic map; Deep convolution neural network (CNN); Bit reversion; ALGORITHM; TRANSFORM; SYSTEM; CRYPTANALYSIS; COMBINATION; SECRET; DESIGN; MATRIX;
D O I
10.1007/s11042-021-11803-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A secure and reliable image encryption scheme is presented, which depends on a novel chaotic log-map, deep convolution neural network (CNN) model, and bit reversion operation for the manipulation process. CNN is utilized to generate a public key to be based on the image in order to enhance the key sensitivity of the scheme. Initial values and control parameters are then obtained from the key to be used in the chaotic log-map, and thus a chaotic sequence is produced for the encrypting operations. The scheme then encrypts the images by scrambling and manipulating the pixels of images through four operations: permutation, DNA encoding, diffusion, and bit reversion. The encryption scheme is precisely examined for the well-known images in terms of various cryptanalyses such as key-space, key sensitivity, information entropy, histogram, correlation, differential attack, noisy attack, and cropping attack. To corroborate the image encryption scheme, the visual and numerical results are even compared with available scores of the state of the art. Therefore, the proposed log-map-based image encryption scheme is successfully verified and validated by superior absolute and comparative results. As future work, the proposed log-map can be extended to combinational multi-dimensional with existing efficient chaotic maps.
引用
收藏
页码:7365 / 7391
页数:27
相关论文
共 67 条
[51]  
Tan MX, 2019, PR MACH LEARN RES, V97
[52]   Chaotic Map Optimization for Image Encryption Using Triple Objective Differential Evolution Algorithm [J].
Toktas, Abdurrahim ;
Erkan, Ugur ;
Toktas, Feyza ;
Yetgin, Zeki .
IEEE ACCESS, 2021, 9 :127814-127832
[53]   2D fully chaotic map for image encryption constructed through a quadruple-objective optimization via artificial bee colony algorithm [J].
Toktas, Abdurrahim ;
Erkan, Ugur .
NEURAL COMPUTING & APPLICATIONS, 2022, 34 (06) :4295-4319
[54]   An image encryption scheme based on an optimal chaotic map derived by multi-objective optimization using ABC algorithm [J].
Toktas, Abdurrahim ;
Erkan, Ugur ;
Ustun, Deniz .
NONLINEAR DYNAMICS, 2021, 105 (02) :1885-1909
[55]   Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map [J].
Wang, Hui ;
Xiao, Di ;
Chen, Xin ;
Huang, Hongyu .
SIGNAL PROCESSING, 2018, 144 :444-452
[56]   Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network [J].
Wang, Xingyuan ;
Gao, Suo .
INFORMATION SCIENCES, 2020, 539 :195-214
[57]   MOLECULAR STRUCTURE OF NUCLEIC ACIDS - A STRUCTURE FOR DEOXYRIBOSE NUCLEIC ACID [J].
WATSON, JD ;
CRICK, FHC .
NATURE, 1953, 171 (4356) :737-738
[58]   Colour light field image encryption based on DNA sequences and chaotic systems [J].
Wen, Wenying ;
Wei, Kangkang ;
Zhang, Yushu ;
Fang, Yuming ;
Li, Ming .
NONLINEAR DYNAMICS, 2020, 99 (02) :1587-1600
[59]   Image encryption using 2D Henon-Sine map and DNA approach [J].
Wu, Jiahui ;
Liao, Xiaofeng ;
Yang, Bo .
SIGNAL PROCESSING, 2018, 153 :11-23
[60]  
Wu Y, 2011, Cyber J. Multidiscip. J Sci. Technol. J. Sel. Areas Telecommun. (JSAT), V1, P31