120
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

A visually meaningful image encryption scheme based on a 5D chaotic map and deep learning

, &
Pages 164-176 | Received 12 Aug 2022, Accepted 26 Nov 2022, Published online: 06 Jan 2023

References

  • Diffie W, Hellman M. New directions in cryptography. IEEE Trans Inf Theory. 1976;22(6):644–654. doi:10.1109/TIT.1976.1055638
  • Kadhim IJ, Premaratne P, Vial PJ, et al. Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing. 2019;335:299–326. doi:10.1016/j.neucom.2018.06.075
  • Bao L, Zhou Y. Image encryption: generating visually meaningful encrypted images. Inf Sci (N Y). 2015;324:197–207.
  • Wang H, Xiao D, Li M, et al. A visually secure image encryption scheme based on parallel compressive sensing. Signal Process. 2019;155:218–232. doi:10.1016/j.sigpro.2018.10.001
  • Chai X, Wu H, Gan Z, et al. An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing. Inf Sci (N Y). 2021;556:305–340. doi:10.1016/j.ins.2020.10.007
  • Jiang D, Liu L, Zhu L, et al. Adaptive embedding: A novel meaningful image encryption scheme based on parallel compressive sensing and slant transform. Signal Process. 2021;188; doi:10.1016/j.sigpro.2021.108220
  • Jiang D, Zhu L, Wang X, et al. Double-Image visually meaningful encryption algorithm based on compressed sensing and frft embedding 2021, 17 March, PREPRINT (Version 1) available at Research Square. doi:10.21203/rs.3.rs-291468/v1
  • Chai X, Gan Z, Chen Y, et al. A visually secure image encryption scheme based on compressive sensing. Signal Process. 2017;134:35–51. doi:10.1016/j.sigpro.2016.11.016
  • Ping P, Fu J, Mao Y, et al. Meaningful encryption: generating visually meaningful encrypted images by compressive sensing and reversible color transformation. IEEE Access. 2019;7:170168–170184. doi:10.1109/ACCESS.2019.2955570
  • Ye G, Pan C, Dong Y, et al. Image encryption and hiding algorithm based on compressive sensing and random numbers insertion. Signal Process. 2020;172;107563. doi:10.1016/j.sigpro.2020.107563
  • Chai X, Wu H, Gan Z, et al. Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy. Signal Process. 2020;171;107525. doi:10.1016/j.sigpro.2020.107525
  • Pan C, Ye G, Huang X, et al. Novel meaningful image encryption based on block compressive sensing. Secur Commun Netw. 2019;2019;1–12. doi:10.1155/2019/6572105
  • Khan JS, Ahmad J, Ahmed SS, et al. DNA key based visual chaotic image encryption. J Intell Fuzzy Syst. 2019;37(2):2549–2561. doi:10.3233/JIFS-182778
  • Sun X, Liu D, Ji Y, et al. A new image block encryption method based on chaotic map and DNA encoding. Proceedings - 7th International Conference on Digital Home, ICDH 2018; Feb. 2019, p. 37–41. doi: 10.1109/ICDH.2018.00015
  • Tuncer T, Dogan S, Tadeusiewicz R, et al. Improved reference image encryption methods based on 2 K correction in the integer wavelet domain. Int J Appl Math Comput Sci. 2019;29(4):817–829. doi:10.2478/amcs-2019-0060
  • Ur Rehman A, Rahim R, Nadeem S, et al. “End-to-end trained CNN encoder-decoder networks for image steganography”.
  • Baluja S. Hiding images within images. IEEE Trans Pattern Anal Mach Intell. 2020;42(7):1685–1697. doi:10.1109/tpami.2019.2901877
  • Yang J, Ruan D, Huang J, et al. An embedding cost learning framework using GAN. IEEE Trans Inf Forensics Secur. 2020;15:839–851. doi:10.1109/TIFS.2019.2922229
  • Ronneberger O, Fischer P, Brox T. U-Net: convolutional networks for biomedical image segmentation. In International Conference on Medical image computing and computer-assisted intervention. 2015;9351:234–241. doi:10.1007/978-3-319-24574-4_28.
  • Li Y, Li X, Jin X, et al. An image encryption algorithm based on zigzag transformation and 3-dimension chaotic logistic map. in Communications in Computer and Information Science. 2015;557:3–13. doi:10.1007/978-3-662-48683-2_1
  • Fang D, Sun S. A new secure image encryption algorithm based on a 5D hyperchaotic map. PLoS One. 2020;15(11 November):e0242110. doi:10.1371/journal.pone.0242110
  • Mehdi SA, Kadhim Jabbar K, Hanoon Abbood F. Image encryption based on the novel 5d hyper-chaotic system Via improved Aes algorithm. Int J Civil Eng Technology (IJCIET). 2018;9(10):1841–1855. [Online]. Available: http://iaeme.com/Home/issue/IJCIET?Volume=9&Issue=10http://iaeme.com.
  • Kulkarni P, Zepeda J, Jurie F, et al. Hybrid multi-layer deep CNN/aggregator feature for image classification). 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP); Apr. 2015, p. 1379–1383. doi:10.1109/ICASSP.2015.7178196
  • Kim P. Convolutional neural network. MATLAB deep learning, Berkeley, CA: Apress, 2017, pp. 121–147. doi:10.1007/978-1-4842-2845-6_6
  • Albawi S, Mohammed TA, Al-Zawi S. Understanding of a convolutional neural network. 2017 international Conference on Engineering and Technology (ICET); Aug. 2017, p. 1–6. doi: 10.1109/ICEngTechnol.2017.8308186
  • Li Y, Zhang T, Liu Z, et al. “A concatenating framework of shortcut convolutional neural networks,” Li, Y., Zhang, T., Liu, Z., & Hu, H. (2017) … ., 2017.
  • Ide H, Kurita T. Improvement of learning for CNN with ReLU activation by sparse regularization. 2017 international Joint Conference on Neural Networks (IJCNN); May 2017, pp. 2684–2691. doi: 10.1109/IJCNN.2017.7966185
  • Kingma DP, Ba J. “Adam: A method for stochastic optimization,” 2014.
  • Available from: http://vis-www.cs.umass.edu/lfw/.
  • Ahmad J, Fawad A. Efficiency analysis and security evaluation of image encryption schemes. Computing. 2010;23:25.
  • Hanchinamani G, Kulakarni L. Image encryption based on 2-D Zaslavskii chaotic map and pseudo Hadmard transform. Int J Hybrid Inf Technol. 2014;7(4):185–200.
  • Hore A, Ziou D. “"Image quality metrics: PSNR vs. SSIM.,” 2010.
  • Pradhan A, Sahu AK, Gandharba S, et al. Performance evaluation parameters of image steganography techniques. 2016 international Conference on Research Advances in Integrated Navigation Systems (RAINS); 2016.
  • Boehm B. “Stegexpose-A tool for detecting LSB steganography,” arXiv preprint arXiv:1410.6656, 2014.
  • Pevny T, Bas P, Fridrich J J, “Steganalysis by Subtractive Pixel Adjacency Matrix,” 2010. [Online]. Available from: https://hal.archives-ouvertes.fr/hal-00541410.
  • Fridrich J, Kodovský J. “Rich Models for Steganalysis of Digital Images,” 2012.
  • Chai X, Wu H, Gan Z, et al. An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding. Opt Lasers Eng. 2020;124:105837. doi:10.1016/j.optlaseng.2019.105837
  • Musanna F, Dangwal D, Kumar S. A novel chaos-based approach in conjunction with MR-SVD and pairing function for generating visually meaningful cipher images. Multimed Tools Appl. 2020;79(33–34):25115–25142. doi:10.1007/s11042-020-09034-x
  • Armijo-Correa JO, Murguía JS, Mejía-Carlos M, et al. An improved visually meaningful encrypted image scheme. Opt Laser Technol. 2020;127:106165. doi:10.1016/j.optlastec.2020.106165
  • Kanso A, Ghebleh M. An algorithm for encryption of secret images into meaningful images. Opt Lasers Eng. 2017;90:196–208. doi: 10.1016/j.optlaseng.2016.10.009
  • Yang YG, Wang BP, Yang YL, et al. Dual embedding model: a new framework for visually meaningful image encryption. Multimed Tools Appl. 2021;80(6):9055–9074. doi:10.1007/s11042-020-10149-4
  • Yang YG, Wang BP, Yang YL, et al. Visually meaningful image encryption based on universal embedding model. Inf Sci (N Y). 2021;562:304–324. doi:10.1016/j.ins.2021.01.041
  • Pan C, Huang X, Ye G, et al. An image visual cryptography using double encryption and hiding technology. in ACM International Conference Proceeding Series. 2019: 50–54. doi:10.1145/3373419.3373454

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.