scholarly journals An Image Encryption Scheme Based on Chaotic Logarithmic Map and Key Generation using Deep CNN

Author(s):  
Ugur Erkan ◽  
Abdurrahim Toktas ◽  
Serdar Enginoglu ◽  
Enver Akbacak ◽  
Dang N. H. Thanh

Abstract A secure and reliable image encryption scheme is presented in this study. The encryption scheme hereby introduces a novel chaotic log-map, deep convolution neural network (CNN) model for key generation, and bit reversion operation for the manipulation process. Thanks to the sensitive key generation by the CNN, initial values and control parameters are produced for the chaotic log-map, and thus a diverse chaotic sequence is achieved for encrypting operations. The scheme then encrypts the images by scrambling and manipulating the pixels of images through four operations: permutation, DNA encoding, diffusion, and bit reversion. The encryption scheme is precisely examined for the well-known images in terms of various cryptoanalyses such as keyspace, key sensitivity, information entropy, histogram, correlation, differential attack, noisy attack, and cropping attack. To corroborate the scheme, the visual and numerical results are even compared with available outcomes of the state of the art. Therefore, the proposed log-map based image encryption scheme is successfully verified and validated by the superior absolute and comparative results.

Author(s):  
Ali A. Yassin ◽  
Abdullah Mohammed Rashid ◽  
Abdulla J. Yassin ◽  
Hamid Alasadi

Recently, the concept of DNA has been invested in computing technology in different ways which linking information technology and biological sciences. There are several encryption algorithms based on DNA encoding that has been proposed, which leads to generating a new direction in image encryption. However, the DNA encryption scheme has drawbacks such as expensive experimental equipment, difficult operations, and hard to hold its biotechnology. Additionally, during careful cryptanalysis that applied to most of these image encryption schemes, we notice that DNA operators can only influence one DNA base, which causes poor diffusion. Our proposed scheme is not applied complex biological operation but just is given to improve the diffusion ability of image encryption scheme by using DNA sequence and DCT transform. Our works overcome above-aforementioned issues. Furthermore, empirical results on real images and security analysis demonstrate that our proposed scheme not only has flexibility and efficiency encryption scheme but also has the ability to resist well-known attacks such as entropy attack, differential attack, statistical attack, chosen/known plain image attack. Additionally, our work enjoys several strong characteristics as follows: (1) the decryption error is very low to recover the original image; (2) Once key for each encryption process and if the user wants to use the same key in many times, our proposed scheme supports secret key sensitivity; (3) the value of correlation of the encrypted image is null; (4) the scrambling process is good and generate high disorder at the output. As a result, our proposed scheme achieves a good balance between strong security and high performance.


2019 ◽  
Vol 29 (08) ◽  
pp. 1950103 ◽  
Author(s):  
Kirtee Panwar ◽  
Ravindra Kumar Purwar ◽  
Anchal Jain

This paper presents cryptanalysis of a color image encryption scheme. DNA encoding and multiple 1D chaotic maps are used in the encryption process which increases its computational speed. The key streams generated in this scheme are dependent on secret keys, updated using the sum of pixel intensities of plain image of size [Formula: see text]. This paper analyzes the security of encryption scheme against the chosen plaintext attack and finds that only [Formula: see text] different key matrices for diffusion are possible, an equivalent version of which can be revealed with [Formula: see text] chosen plain images. Experimental results are presented to prove that equivalent diffusion keys and block permutation sequence can be effectively revealed through the attack. In addition, low sensitivity of keys towards changes in plaintext along with insecure diffusion process involved in encryption process is also reported. Finally, to remedy the shortcomings of the original encryption scheme, an enhanced encryption scheme is generated that can resist chosen/known plaintext attack while maintaining the merits of the original encryption scheme.


2013 ◽  
Vol 2013 ◽  
pp. 1-10 ◽  
Author(s):  
Adrian-Viorel Diaconu ◽  
Khaled Loukhaoukha

A recently proposed secure image encryption scheme has drawn attention to the limited security offered by chaos-based image encryption schemes (mainly due to their relatively small key space) proposing a highly robust approach, based on Rubik's cube principle. This paper aims to study a newly designed image cryptosystem that uses the Rubik's cube principle in conjunction with a digital chaotic cipher. Thus, the original image is shuffled on Rubik's cube principle (due to its proven confusion properties), and then XOR operator is applied to rows and columns of the scrambled image using a chaos-based cipher (due to its proven diffusion properties). Finally, the experimental results and security analysis show that the newly proposed image encryption scheme not only can achieve good encryption and perfect hiding ability but also can resist any cryptanalytic attacks (e.g., exhaustive attack, differential attack, statistical attack, etc.).


2013 ◽  
Vol 80 (7) ◽  
pp. 45-50
Author(s):  
Bala SuyambuJeyaram ◽  
Rama Raghavan ◽  
Krishna Shankara Narayanan

Author(s):  
Ramireddy Navatejareddy ◽  
Muthukuru Jayabhaskar ◽  
Bachala Sathyanarayana

<p>Image <span>encryption enables users to safely transmit digital photographs via a wireless medium while maintaining enhanced anonymity and validity. Numerous studies are being conducted to strengthen picture encryption systems. Elliptical curve cryptography (ECC) is an effective tool for safely transferring images and recovering them at the receiver end in asymmetric cryptosystems. This method's key generation generates a public and private key pair that is used to encrypt and decrypt a picture. They use a public key to encrypt the picture before sending it to the intended user. When the receiver receives the image, they use their private key to decrypt it. This paper proposes an ECC-dependent image encryption scheme utilizing an enhancement strategy based on the gravitational search algorithm (GSA) algorithm. The private key generation step of the ECC system uses a GSA-based optimization process to boost the efficiency of picture encryption. The image's output is used as a health attribute in the optimization phase, such as the peak signal to noise ratio (PSNR) value, which demonstrates the efficacy of the proposed approach. As comparison to the ECC method, it has been discovered that the suggested encryption scheme offers better optimal PSNR </span>values.</p>


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 36667-36681 ◽  
Author(s):  
Akram Belazi ◽  
Muhammad Talha ◽  
Sofiane Kharbech ◽  
Wei Xiang

Sign in / Sign up

Export Citation Format

Share Document