An efficient image encryption using deep neural network and chaotic map

https://doi.org/10.1016/j.micpro.2020.103134Get rights and content

Abstract

Inspite of progressive growth of cryptography, encrypting sensitive information of an image is still a computationally complex task. After reviewing existing literature, it is now known that security problems are yet not solved and there is an open scope of further research. In most recent times, it has been noticed that neural network has proven cost effective optimization mechanism in offering security towards images. However, such implementation are computationally expensive process and do not solve various diversified attacks on image. Hence, the prime purpose of proposed system is to introduce an analytical research methodology for presenting a sophisticated framework where deep neural network has been used for optimizing the performance of simple encryption approaches. The robustness of optimization principle is further added with chaotic map concept for enhanced security performance. The study outcome shows that proposed implementation offers much better security performance without any negative effect on image quality.

Introduction

Data is one of the essential assets for all the enterprise which are required to be effectively protected. The concern associated with the data protection originates when the data are subjected for storage, transmission, and processing over any form of network system. At present, there are various forms of data security algorithm but it has its own scope of application, beneficial factors, as well as limiting factors too. The application of the data security approaches is also specific to the forms and structure of the data and it also depends if they are implemented over centralized or distributed system. Security has always been the major concern in many enterprise applications that are hosted over distributed networking system.

The Information Security refers to the procedures and approaches which are intended and applied to secure sensitive, private and confidential information or data from illegal access, usage, misappropriation, revelation, obliteration, alteration. Confidentiality, integrity, and availability are the main components of information security. The current state of world poses that most of the Information are exchanges across the internet and the storage of these data in open networks have created an environment in which illegal users can obtain the important information from that image data. Hence vulnerability of image data is significantly more in this regards.

In open environments, there are several security problems associated with the processing and transmission of digital images. Therefore it is necessary to affirm the integrity and confidentiality of the digital image being transmitted. A cryptography technique is one of the efficient mechanisms in order to resist potential threats. Both of symmetric-key and asymmetric-key encryptions are considered as primary types of encryption. However, performing encryption over images is quite a challenging task in contrast to normal data owing to massive level of information carried within an image. The most challenging aspect of applying encryption over an image is the degradation of an image while extracting the encrypted image.

At present, there are various security mechanisms towards assisting resisting attacks over an image, but they are not found completely fruitful towards balancing security demands and image quality demands. Most recently, deep neural network is found to offer better results even in presence of unstructured data with complete independence towards data labelling. Apart from this the chaos behaviour of chaotic map also offers extensive security. Hence, integration of deep learning and chaotic behaviour can offer a better form of encryption method of images. Therefore, the proposed paper presents a model where deep learning- chaotic map has been used for performing better optimization towards strengthening the encryption performance of image.

The rest of the paper is organized as follows: Section 2 discusses about the existing literatures where different techniques are discussed for detection schemes used in power transmission lines along discussion of research problems and proposed solution in 3. Section 4 discusses about algorithm implementation followed by discussion of result analysis in Section 5. The last Section 6 concludes the paper.

Section snippets

Review of literature

This section presents conventional research works exclusively carried out in the domain of Image security.

The work carried out by Chen et al. [1] have presented novel Impulsive Synchronization of Reaction–Diffusion Neural Networks with Mixed Delays and Its Application to Image Encryption. The experimental results verify that the proposed image-encrypting cryptosystem has the advantages of large key space and high security against some traditional attacks. In study of Dridi et al. [2] have

Proposed methodology

The core idea of the proposed system is to develop a framework for performing highly optimized image encryption performance using analytical research methodology. The proposed study will be focused on addressing the problems explored in recent studies. By using a robust learning model, the proposed study will mechanize a method which can generate secret key resistive of different forms of attack. Usage of chaotic map further enhances the encryption method for better secrecy leading to effective

Algorithm implementation

This section discusses about the algorithm that has been constructed for performing image encryption operation. Different from existing system, the proposed algorithm offers a novel way to generate a secret key in order to ensure highest security against any form of image-based attacks through any channels. The proposed algorithm also emphasizes on offered scalability as well as performance enhancement in encryption process with an aid of deep neural network. However, different than any

Result analysis

This section illustrates about results obtained by execution of algorithms discussed in prior section. The implementation of the proposed system is carried out using MATLAB and 64 bit windows machine. The functions of deep learning approaches using stacked auto-encoder were developed that also make use of neural network in order to perform learning of the potential features from the image data. Multiple layers of processing non-linear elements are integrated with an aid of normal elements that

Conclusion

The proposed system has presented a unique mechanism of performing image security with an aid of deep neural network. The idea is basically to boost up the encryption mechanism in order to leverage the trap-door function in cryptography. At the same time, the proposed system also emphasized that it shouldn't offer heavy cryptographic operation. Usage of stacked encoder has actually overcome the iterative problem of feed-forward approach while enhanced chaotic map leads to better generation of

Declaration of Competing Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Shima Ramesh Maniyath became a Member (M) of IEEE in 2016. She was born in 08/08/1986. She has completed her B.Tech in Electronics and Communication Engineering from Govt College of Engineering Kannur, Kerala in the year 2009. Completed her Masters in Embedded System from Amrita Viswa Vidyapeedam, Bangalore in the year 2011. Registered her Ph.D. in 2016 in Information Security from Vellore Institute of Technology, Vellore Under the Guidance of Dr. Prof Thanikaiselvan V.Her research area is

References (24)

  • J.S. Luo et al.

    Binary malware image classification using machine learning with local binary pattern

  • B. Marohn et al.

    Approximate thumbnail preserving encryption

  • Cited by (53)

    View all citing articles on Scopus

    Shima Ramesh Maniyath became a Member (M) of IEEE in 2016. She was born in 08/08/1986. She has completed her B.Tech in Electronics and Communication Engineering from Govt College of Engineering Kannur, Kerala in the year 2009. Completed her Masters in Embedded System from Amrita Viswa Vidyapeedam, Bangalore in the year 2011. Registered her Ph.D. in 2016 in Information Security from Vellore Institute of Technology, Vellore Under the Guidance of Dr. Prof Thanikaiselvan V.Her research area is Information security, Image processing, Signals and system, Digital signal processing. So far she has published 11 research articles. In that 3 are in peer-reviewed Scopus indexed journals. She is currently working as an ASSISTANT PROFESSOR in MVJ College of Engineering, Bangalore

    Dr. Thanikaiselvan V received his Ph.D. degree in the field of Information security fromm VIT university, Vellore, Tamilnadu, India, in the year 2014. He received M.Tech in Advanced Communication Systems from SASTRA University, Thanjavur, in 2006 and B.E in Electronics and Communication Engineering form Bharathidasan University, Trichy, in 2002.

    Currently he is working as HoD and Associate Professor in Department of Communication Engineering under the School of Electronics Engineering, VIT University,Vellore. His teaching and research interest include Digital communication, Wireless communication, Digital signal and Image Processing, Wireless Sensor Networks and Information Security. So far he has published 50 research articles in peer-reviewed Scopus indexed journals and 5 Scopus indexed conference papers. Currently he is guiding 4 Ph.D. candidates in the areas of Information Security and Digital Image Processing. He has supervised more than 100 UG and PG projects.

    View full text