共 67 条
An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN
被引:36
作者:
Erkan, Ugur
[1
]
Toktas, Abdurrahim
[2
]
Enginoglu, Serdar
[3
]
Akbacak, Enver
[4
]
Thanh, Dang N. H.
[5
]
机构:
[1] Karamanoglu Mehmetbey Univ, Fac Engn, Dept Comp Engn, TR-70200 Karaman, Turkey
[2] Karamanoglu Mehmetbey Univ, Fac Engn, Dept Elect Elect Engn, TR-70200 Karaman, Turkey
[3] Canakkale Onsekiz Mart Univ, Fac Arts & Sci, Dept Math, Canakkale, Turkey
[4] Halic Univ, Fac Engn, Dept Comp Engn, Sutluce Mah Imrahor Cad 82 Beyoglu, TR-34445 Istanbul, Turkey
[5] Univ Econ Ho Chi Minh City, Sch Business Informat Technol, Dept Informat Technol, Ho Chi Minh City, Vietnam
关键词:
Image encryption;
Chaotic map;
Logarithmic map;
Deep convolution neural network (CNN);
Bit reversion;
ALGORITHM;
TRANSFORM;
SYSTEM;
CRYPTANALYSIS;
COMBINATION;
SECRET;
DESIGN;
MATRIX;
D O I:
10.1007/s11042-021-11803-1
中图分类号:
TP [自动化技术、计算机技术];
学科分类号:
0812 ;
摘要:
A secure and reliable image encryption scheme is presented, which depends on a novel chaotic log-map, deep convolution neural network (CNN) model, and bit reversion operation for the manipulation process. CNN is utilized to generate a public key to be based on the image in order to enhance the key sensitivity of the scheme. Initial values and control parameters are then obtained from the key to be used in the chaotic log-map, and thus a chaotic sequence is produced for the encrypting operations. The scheme then encrypts the images by scrambling and manipulating the pixels of images through four operations: permutation, DNA encoding, diffusion, and bit reversion. The encryption scheme is precisely examined for the well-known images in terms of various cryptanalyses such as key-space, key sensitivity, information entropy, histogram, correlation, differential attack, noisy attack, and cropping attack. To corroborate the image encryption scheme, the visual and numerical results are even compared with available scores of the state of the art. Therefore, the proposed log-map-based image encryption scheme is successfully verified and validated by superior absolute and comparative results. As future work, the proposed log-map can be extended to combinational multi-dimensional with existing efficient chaotic maps.
引用
收藏
页码:7365 / 7391
页数:27
相关论文