深度学习与混沌:图像加密和解密的组合方法

Bharath V Nair, Vismaya V S, Sishu Shankar Muni, Ali Durdu
{"title":"深度学习与混沌:图像加密和解密的组合方法","authors":"Bharath V Nair, Vismaya V S, Sishu Shankar Muni, Ali Durdu","doi":"arxiv-2406.16792","DOIUrl":null,"url":null,"abstract":"In this paper, we introduce a novel image encryption and decryption algorithm\nusing hyperchaotic signals from the novel 3D hyperchaotic map, 2D memristor\nmap, Convolutional Neural Network (CNN), and key sensitivity analysis to\nachieve robust security and high efficiency. The encryption starts with the\nscrambling of gray images by using a 3D hyperchaotic map to yield complex\nsequences under disruption of pixel values; the robustness of this original\nencryption is further reinforced by employing a CNN to learn the intricate\npatterns and add the safety layer. The robustness of the encryption algorithm\nis shown by key sensitivity analysis, i.e., the average sensitivity of the\nalgorithm to key elements. The other factors and systems of unauthorized\ndecryption, even with slight variations in the keys, can alter the decryption\nprocedure, resulting in the ineffective recreation of the decrypted image.\nStatistical analysis includes entropy analysis, correlation analysis, histogram\nanalysis, and other security analyses like anomaly detection, all of which\nconfirm the high security and effectiveness of the proposed encryption method.\nTesting of the algorithm under various noisy conditions is carried out to test\nrobustness against Gaussian noise. Metrics for differential analysis, such as\nthe NPCR (Number of Pixel Change Rate)and UACI (Unified Average Change\nIntensity), are also used to determine the strength of encryption. At the same\ntime, the empirical validation was performed on several test images, which\nshowed that the proposed encryption techniques have practical applicability and\nare robust to noise. Simulation results and comparative analyses illustrate\nthat our encryption scheme possesses excellent visual security, decryption\nquality, and computational efficiency, and thus, it is efficient for secure\nimage transmission and storage in big data applications.","PeriodicalId":501167,"journal":{"name":"arXiv - PHYS - Chaotic Dynamics","volume":"38 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Deep Learning and Chaos: A combined Approach To Image Encryption and Decryption\",\"authors\":\"Bharath V Nair, Vismaya V S, Sishu Shankar Muni, Ali Durdu\",\"doi\":\"arxiv-2406.16792\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we introduce a novel image encryption and decryption algorithm\\nusing hyperchaotic signals from the novel 3D hyperchaotic map, 2D memristor\\nmap, Convolutional Neural Network (CNN), and key sensitivity analysis to\\nachieve robust security and high efficiency. The encryption starts with the\\nscrambling of gray images by using a 3D hyperchaotic map to yield complex\\nsequences under disruption of pixel values; the robustness of this original\\nencryption is further reinforced by employing a CNN to learn the intricate\\npatterns and add the safety layer. The robustness of the encryption algorithm\\nis shown by key sensitivity analysis, i.e., the average sensitivity of the\\nalgorithm to key elements. The other factors and systems of unauthorized\\ndecryption, even with slight variations in the keys, can alter the decryption\\nprocedure, resulting in the ineffective recreation of the decrypted image.\\nStatistical analysis includes entropy analysis, correlation analysis, histogram\\nanalysis, and other security analyses like anomaly detection, all of which\\nconfirm the high security and effectiveness of the proposed encryption method.\\nTesting of the algorithm under various noisy conditions is carried out to test\\nrobustness against Gaussian noise. Metrics for differential analysis, such as\\nthe NPCR (Number of Pixel Change Rate)and UACI (Unified Average Change\\nIntensity), are also used to determine the strength of encryption. At the same\\ntime, the empirical validation was performed on several test images, which\\nshowed that the proposed encryption techniques have practical applicability and\\nare robust to noise. Simulation results and comparative analyses illustrate\\nthat our encryption scheme possesses excellent visual security, decryption\\nquality, and computational efficiency, and thus, it is efficient for secure\\nimage transmission and storage in big data applications.\",\"PeriodicalId\":501167,\"journal\":{\"name\":\"arXiv - PHYS - Chaotic Dynamics\",\"volume\":\"38 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-06-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - PHYS - Chaotic Dynamics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2406.16792\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - PHYS - Chaotic Dynamics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2406.16792","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本文介绍了一种新颖的图像加解密算法,该算法利用新颖的三维超混沌图、二维记忆图、卷积神经网络(CNN)中的超混沌信号以及密钥灵敏度分析来实现稳健的安全性和高效率。该加密方法首先利用三维超混沌图对灰度图像进行扰乱,从而在像素值被扰乱的情况下产生复杂的序列;然后利用卷积神经网络(CNN)学习错综复杂的模式并添加安全层,从而进一步加强了这种原始加密方法的鲁棒性。加密算法的鲁棒性通过密钥敏感性分析(即算法对密钥元素的平均敏感性)来体现。统计分析包括熵分析、相关性分析、直方图分析以及异常检测等其他安全分析,所有这些分析都证实了所提出加密方法的高安全性和有效性。此外,还使用 NPCR(像素变化率)和 UACI(统一平均变化强度)等差异分析指标来确定加密强度。同时,还在几幅测试图像上进行了实证验证,结果表明所提出的加密技术具有实用性和对噪声的鲁棒性。仿真结果和对比分析表明,我们的加密方案具有出色的视觉安全性、解密质量和计算效率,因此可高效地用于大数据应用中的安全图像传输和存储。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Deep Learning and Chaos: A combined Approach To Image Encryption and Decryption
In this paper, we introduce a novel image encryption and decryption algorithm using hyperchaotic signals from the novel 3D hyperchaotic map, 2D memristor map, Convolutional Neural Network (CNN), and key sensitivity analysis to achieve robust security and high efficiency. The encryption starts with the scrambling of gray images by using a 3D hyperchaotic map to yield complex sequences under disruption of pixel values; the robustness of this original encryption is further reinforced by employing a CNN to learn the intricate patterns and add the safety layer. The robustness of the encryption algorithm is shown by key sensitivity analysis, i.e., the average sensitivity of the algorithm to key elements. The other factors and systems of unauthorized decryption, even with slight variations in the keys, can alter the decryption procedure, resulting in the ineffective recreation of the decrypted image. Statistical analysis includes entropy analysis, correlation analysis, histogram analysis, and other security analyses like anomaly detection, all of which confirm the high security and effectiveness of the proposed encryption method. Testing of the algorithm under various noisy conditions is carried out to test robustness against Gaussian noise. Metrics for differential analysis, such as the NPCR (Number of Pixel Change Rate)and UACI (Unified Average Change Intensity), are also used to determine the strength of encryption. At the same time, the empirical validation was performed on several test images, which showed that the proposed encryption techniques have practical applicability and are robust to noise. Simulation results and comparative analyses illustrate that our encryption scheme possesses excellent visual security, decryption quality, and computational efficiency, and thus, it is efficient for secure image transmission and storage in big data applications.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Tunneling Time for Walking Droplets on an Oscillating Liquid Surface Rydberg excitons in cuprous oxide: A two-particle system with classical chaos Disruption of exo-asteroids around white dwarfs and the release of dust particles in debris rings in co-orbital motion Machine-aided guessing and gluing of unstable periodic orbits Nonequilibrium dynamics of coupled oscillators under the shear-velocity boundary condition
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1