Secure Surveillance Systems Using Partial-Regeneration-Based Non-Dominated Optimization and 5D-Chaotic Map

被引:20
作者
Ghosh, Gopal [1 ]
Kavita [2 ]
Anand, Divya [1 ]
Verma, Sahil [2 ]
Rawat, Danda B. [3 ]
Shafi, Jana [4 ]
Marszalek, Zbigniew [5 ]
Wozniak, Marcin [5 ]
机构
[1] Lovely Profess Univ, Sch Comp Sci & Engn, Phagwara 144401, India
[2] Chandigarh Univ, Dept Comp Sci & Engn, Mohali 140413, India
[3] Howard Univ, Dept Elect Engn & Comp Sci, Washington, DC 20059 USA
[4] Prince Sattam Bin Abdul Aziz Univ, Dept Comp Sci, Coll Arts & Sci, Wadi Ad Dawasir 11991, Saudi Arabia
[5] Silesian Tech Univ, Fac Appl Math, PL-44100 Gliwice, Poland
来源
SYMMETRY-BASEL | 2021年 / 13卷 / 08期
关键词
hyperchaotic map; image encryption; convolution neural network; partial-regeneration-based non-dominated optimization; fitness function; SORTING GENETIC ALGORITHM; IMAGE; CHAOS;
D O I
10.3390/sym13081447
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Due to Internet of Things (IoT), it has become easy to surveil the critical regions. Images are important parts of Surveillance Systems, and it is required to protect the images during transmission and storage. These secure surveillance frameworks are required in IoT systems, because any kind of information leakage can thwart the legal system as well as personal privacy. In this paper, a secure surveillance framework for IoT systems is proposed using image encryption. A hyperchaotic map is used to generate the pseudorandom sequences. The initial parameters of the hyperchaotic map are obtained using partial-regeneration-based non-dominated optimization (PRNDO). The permutation and diffusion processes are applied to generate the encrypted images, and the convolution neural network (CNN) can play an essential role in this part. The performance of the proposed framework is assessed by drawing comparisons with competitive techniques based on security parameters. It shows that the proposed framework provides promising results as compared to the existing techniques.
引用
收藏
页数:20
相关论文
共 38 条
  • [1] Hybrid Logical Security Framework for Privacy Preservation in the Green Internet of Things
    Batra, Isha
    Verma, Sahil
    Malik, Arun
    Kavita
    Ghosh, Uttam
    Rodrigues, Joel J. P. C.
    Nguyen, Gia Nhu
    Hosen, A. S. M. Sanwar
    Mariappan, Vinayagam
    [J]. SUSTAINABILITY, 2020, 12 (14)
  • [2] Bing Fan, 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, P2069, DOI 10.1109/FSKD.2012.6233786
  • [3] Image encryption based on compressive sensing and chaos systems
    Brahim, A. Hadj
    Pacha, A. Ali
    Said, N. Hadj
    [J]. OPTICS AND LASER TECHNOLOGY, 2020, 132
  • [4] Parameter Identification of a New Hyper-chaotic System
    Dang, Hong-Gang
    [J]. 2013 FIFTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2013), 2013, : 785 - 787
  • [5] Hamza Rafik, 2019, Machine Learning for Cyber Security. Second International Conference, ML4CS 2019. Proceedings: Lecture Notes in Computer Science (LNCS 11806), P271, DOI 10.1007/978-3-030-30619-9_19
  • [6] A Resource-Efficient Hybrid Proxy Mobile IPv6 Extension for Next-Generation IoT Networks
    Hussain, Anwar
    Nazir, Shah
    Khan, Fazlullah
    Nkenyereye, Lewis
    Ullah, Ayaz
    Khan, Sulaiman
    Verma, Sahil
    Kavita
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (03) : 2095 - 2103
  • [7] Lightweight secure image encryption scheme based on chaotic differential equation
    Javeed, Adnan
    Shah, Tariq
    Attaullah
    [J]. CHINESE JOURNAL OF PHYSICS, 2020, 66 : 645 - 659
  • [8] Parallel strength Pareto evolutionary algorithm-II based image encryption
    Kaur, Manjit
    Singh, Dilbag
    Singh Uppal, Raminder
    [J]. IET IMAGE PROCESSING, 2020, 14 (06) : 1015 - 1026
  • [9] Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map
    Kaur, Manjit
    Singh, Dilbag
    Sun, Kehui
    Rawat, Umashankar
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 (107): : 333 - 350
  • [10] Color image encryption approach based on memetic differential evolution
    Kaur, Manjit
    Kumar, Vijay
    Li, Li
    [J]. NEURAL COMPUTING & APPLICATIONS, 2019, 31 (11) : 7975 - 7987