[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Next Article in Journal
A Transfer-Based Framework for Underwater Target Detection from Hyperspectral Imagery
Next Article in Special Issue
Anomaly Detection in Pedestrian Walkways for Intelligent Transportation System Using Federated Learning and Harris Hawks Optimizer on Remote Sensing Images
Previous Article in Journal
ANLPT: Self-Adaptive and Non-Local Patch-Tensor Model for Infrared Small Target Detection
Previous Article in Special Issue
Road Damage Detection Using the Hunger Games Search with Elman Neural Network on High-Resolution Remote Sensing Images
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Block-Scrambling-Based Encryption with Deep-Learning-Driven Remote Sensing Image Classification

by
Faisal S. Alsubaei
1,
Amani A. Alneil
2,
Abdullah Mohamed
3 and
Anwer Mustafa Hilal
2,*
1
Department of Cybersecurity, College of Computer Science and Engineering, University of Jeddah, Jeddah 21959, Saudi Arabia
2
Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam Bin Abdulaziz University, AlKharj 16278, Saudi Arabia
3
Research Centre, Future University in Egypt, New Cairo 11845, Egypt
*
Author to whom correspondence should be addressed.
Remote Sens. 2023, 15(4), 1022; https://doi.org/10.3390/rs15041022
Submission received: 11 January 2023 / Revised: 26 January 2023 / Accepted: 31 January 2023 / Published: 12 February 2023
(This article belongs to the Special Issue Remote Sensing for Intelligent Transportation Systems in Smart Cities)

Abstract

:
Remote sensing is a long-distance measuring technology that obtains data about a phenomenon or an object. Remote sensing technology plays a crucial role in several domains, such as weather forecasts, resource surveys, disaster evaluation and environment protection. The application of remote-sensing images (RSIs) is extensive in some specific domains, such as national security and business secrets. Simple multimedia distribution techniques and the development of the Internet make the content security of RSIs a significant problem for both engineers and scientists. In this background, RSI classification using deep learning (DL) models becomes essential. Therefore, the current research article develops a block-scrambling-based encryption with privacy preserving optimal deep-learning-driven classification (BSBE-PPODLC) technique for the classification of RSIs. The presented BSBE-PPODLC technique follows a two-stage process, i.e., image encryption and classification. Initially, the RSI encryption process takes place based on a BSBE approach. In the second stage, the image classification process is performed, and it encompasses multiple phases, such as densely connected network (DenseNet) feature extraction, extreme gradient boosting (XGBoost) classifier and artificial gorilla troops optimizer (AGTO)-based hyperparameter tuning. The proposed BSBE-PPODLC technique was simulated using the RSI dataset, and the outcomes were assessed under different aspects. The outcomes confirmed that the presented BSBE-PPODLC approach accomplished improved performance compared to the existing models.

1. Introduction

Remote-sensing images (RSIs) have become significant carriers of geospatial information. Their military and economic value are important and serve a crucial role in various domains, such as reconnaissance, surveying and mapping, monitoring and navigation [1]. Though the open network environment and digital storage technique help in realizing rapid communication and effective sharing of RSIs, it brings new difficulties in terms of security for the image datasets. Recently, ownership violations, data leakage and illegal tampering against RSIs have been repetitively prohibited [2,3]. Cloud storage is a cost-effective service that provides huge storage space and provides a lot of new opportunities for huge RSIs. Owing to the openness of Cloud technology, the information that is stored in the Cloud is at risk of malicious damage or deletion by the Cloud service providers [4]. In this background, ensuring the safety of RSIs saved in Cloud storage has been a hot research topic in recent years.
RSIs capture sensitive data, such as military places, oilfields and airports, which are at the risk of being misused and stolen. Further, when such images are processed without safety precautions, it eases the extraction process and provides seamless access to sensitive data that in turn may be exploited for illegal activities. This scenario suggests the requirement for developing a reliable privacy approach that ensures the encryption of large-scale RSIs on the Cloud server without being compromised. Privacy preservation in RSIs is essential as they frequently contain sensitive data of the individuals and their properties. This data may be exploited for unauthorized surveillance, theft of identity and other malicious actions. Moreover, the release of such sensitive data is unethical and illegal and violates an individual’s right to privacy. Thus, it is essential to protect the individual’s privacy and their properties in RSIs by executing a few methods such as access control, data masking and data encryption.
Encryption acts as a potential means of security. If the encoded data are stored in Clouds, it is simple to tamper with the cipher text, and the encrypted outcomes may not be restorable [5,6]. To avoid this situation, many backups of secret information are needed. In [7], the author presented an overview of the privacy-preservation deep learning (PPDL) method that was implemented to protect the privacy of businesses or individual users. This work deceptively argues that the PPDL approaches benefitted from public data analytics. Further, the approaches also thwarted data leakage and maintained the privacy of delicate data from illegal use and unauthorized access [8,9]. DL is typically utilized to build prediction methods for speech and text recognition applications and image processing. Such methods are highly accurate and particularly trained on large datasets [10]. Prediction techniques learn from the existing available datasets and utilize the knowledge to generate novel data that were once inaccessible. In several cases, such information even comprises delicate data that require preservation. Thus, there is a significant challenge existing here, i.e., to protect the privacy of the data if it is transferred to the public Cloud for analysis and processing [11,12]. In most cases, personal computers are not capable of processing huge satellite images. Thus, to extract the insights and valuable knowledge from such huge RS datasets, there comes a higher demand for the execution of big data analytics utilizing public Cloud servers [13]. As mentioned earlier, the satellite images may contain delicate and confidential data, such as military locations, oilfields and airports that can be misused and stolen. Similarly, if these images are processed without protection, it becomes easy to derive the delicate data and exploit it for illegal purposes [14,15]. Hence, it is both a challenging and a rewarding task to explore the possible PPDL approaches to implement them in the satellite images.
Al-Khasawneh et al. [16] described a novel chaos-related encryption method that utilizes Gauss-iterated maps, an external secret key, Henon and Logistic. The presented encryption technique was able to effectively encode a large number of images. If the number of images increases, though the images are smaller in size, the technology becomes impractical or inefficient. This study also analyzed the parallel image encryption technique on a huge number of RSIs in Hadoop. Zhang et al. [17] devised a QAPP method, i.e., quality-aware and privacy-preserving medical image release technique, which efficiently compiled DCT with differential privacy (DP). To be specific, QAPP had three stages. Initially, DCT was implemented in all the medical images to gain its cosine coefficients matrix. Secondly, the original cosine coefficients matrixes were compressed into k*k cosine coefficients matrixes which retained the core features of all the images. Thirdly, a suitable Laplace noise was injected into the formed k*k matrixes to attain differential privacy. Then, the noise-added coefficients were utilized for building the noise-added healthcare images using inverse DCT.
In [18], a new biometric-related authentication mechanism was modelled utilizing two servers, such as the untrusted storage server and a crypto-match server. This mechanism used the Paillier cryptosystem, the biometric image cryptosystem and cryptographic hashing. In the presented cryptosystem, the keystreams were generated from both logistic maps and Henon. It is possible to compute the control variables of such chaotic maps from the input biometric images. Abd EL-Latif et al. [19] presented a new encryption system for a privacy-preserving IoT-related healthcare mechanism in order to protect the privacy of the patients. Decryption or encryption processes depend on controlled alternate quantum walks. The presented cryptosystem method had two stages, such as permutation and substitution, and both were related to independently computed quantum walks. In the study conducted earlier [20], the authors used the BC to build a new privacy-preserving remote data integrity checking technique for IoT information management mechanism without the inclusion of trusted third parties. This technique used BC, a lifted EC-ElGamal cryptosystem and bilinear pairing to protect the security and data privacy of the IoT mechanisms and also to support an effective public batch signature verification.
Qin et al. [21] devised a privacy-preserving image retrieval technique related to adaptive weighted fusion and DL. At first, the authors derived the high-level semantic features of the images, low-level feature edge histogram descriptors and the BOW (bag of words). Then, a pre-filter table was built for the fusion features in order to enhance the search efficiency by the locality-sensitive hashing (LSH) technique. Both the logistic encryption method and the KNN technique were utilized in this study to protect the privacy of the fused images and features, correspondingly. In [22], a privacy-preserving effective and secure remote user authentication method was proposed to be applied in agricultural WSN. The presented technique was formally assessed through a probabilistic random-oracle-model (ROR) to emphasize the robustness of the method. In addition, the technique was also simulated through the AVISPA tool to exhibit its effectiveness in terms of security.
Yang and Newsam [23] examined the bag-of-visual-words (BOVW) systems for land-use classifiers from high-resolution overhead images. The authors assumed a typical non-spatial representation in which the frequency can be utilized for segregation amongst the analogous classes’ and not the places of quantized image features. The proposed feature was used to determine how words can be exploited in the text document classifier without considering their order of presentation. In [24], the authors concentrated entirely on the existing approaches that manage the RSI scene classifier on restricted labelled instances. The authors classified literary works under three broad categories, such as algorithm-level, data-level and model-level. Zhou et al. [25] conducted a systematic review of the presently established RSIR approaches and benchmarks using over 200 papers. In particular, the authors grouped the RSIR approaches under different hierarchical models based on label, modality and image source. Zhu et al. [26] aimed at assisting this work by systematically examining the DL approaches and their applications across different sensor schemes. The authors also offered a detailed summary of the DL execution tips and connection to tutorials, open-source codes and pre-trained approaches that act as great self-contained reference materials for DL practitioners and individuals who are looking forward to being introduced to DL.
Numerous automated tools are available in the literature for effective detection and classification of RSIs. Despite the presence of ML and DL models in the earlier studies, there is still a need to enhance the classification performance along with security. Due to the continuous deepening of the models, the number of parameters in DL models increases too quickly, which results in a model overfitting issue. At the same time, different hyperparameters exert significant impact on the efficiency of the CNN model. Particularly, a few hyperparameters, such as epoch count, batch size and learning rate selection are essential to attain effective outcomes. Since the trial-and-error method for hyperparameter tuning is a tedious and erroneous process, the metaheuristic algorithms are applied. Therefore, in this work, the artificial gorilla troops optimizer (AGTO) algorithm is employed for parameter selection of the DenseNet model. The inclusion of the automated hyperparameter tuning techniques helps reduce the computation time and improve RSI classification performance. In addition, the inclusion of the encryption technique results in enhanced security of the RSIs.
The current research article develops a block-scrambling-based encryption with privacy preserving optimal deep-learning-driven classification (BSBE-PPODLC) technique for the classification of RSIs. The presented BSBE-PPODLC technique initially encrypts the RSI using the BSBE technique, which enables the secure communication of the images in a wireless medium. During the reception process, both decryption and image classification processes occur. In the presented BSBE-PPODLC technique, the image classification process encompasses three sub-processes, namely, densely connected network (DenseNet) feature extraction, extreme gradient boosting (XGBoost) classifier and AGTO-based hyperparameter tuning. The proposed BSBE-PPODLC technique was simulated using the RSI dataset, and the results were assessed under several aspects.

2. The Proposed Model

The current research paper introduces an effective BSBE-PPODLC approach for encryption and classification of the RSIs. The presented BSBE-PPODLC technique initially encrypts the RSIs using the BSBE technique, which enables the secure communication of the images in a wireless medium. During the reception process, both decryption and image classification processes occur. In the presented BSBE-PPODLC technique, the image classification process encompasses three sub-processes, namely DenseNet feature extraction, XGBoost classifier and AGTO-based hyperparameter tuning. Figure 1 represents the block diagram of the proposed BSBE-PPODLC approach.

2.1. Encryption Using the BSBE Technique

The BSBE technique is employed in this study for secure encryption of the RSIs. In the BSBE technique, a user may want to securely transmit image I to viewers using social networking service (SNS) providers [27]. While the consumer does not provide the confidential key K to the SNS provider, the privacy of the image that was shared under the control of the users is secured, even if the SNS provider recompresses image I . Thus, the consumer is assured of the privacy by him/herself. In case of C t E methods, the consumer is bound to disclose the unencrypted images to recompress them.
In this method, an image with X × Y pixels is primarily separated into non-overlapped blocks with B x × B y ; afterwards, four block-scrambling-based processing stages are executed to separate the images. The process to execute the image encryption to generate the encryption image I e is provided as follows:
Step 1: Separate the image into X × Y pixels as blocks and each block with B x × B y pixels. Then, permute the separated blocks arbitrarily with the help of an arbitrary integer created by a confidential key K 1 ,   L bit per pixel. During this work, the occurrence value K 1 has generally been utilized for every color element.
Step 2: Rotate and invert all the blocks arbitrarily by utilizing an arbitrary integer created by the key K 2 , whereas K 2 has generally been utilized for every colour element as well.
Step 3: Execute negative–positive alteration for all the blocks by K 3 , whereas K 3 is generally utilized for every colour element.
During this stage, the transformed pixel value from i t h block B i ,   p , is calculated as given below.
p = p r i = 0 , p 2 L 1 r i = 1 .      
Here, r i implies an arbitrary binary integer created by K 3   a n d   p B i signifies the pixel value of a novel image with L bit per pixel. During this work, the value of the occurrence probability P r i = 0.5 is utilized for inverting the bits arbitrarily.
Step 4: Shuffle three color elements from all the blocks by utilizing an integer that is arbitrarily chosen amongst six integers by key K 4 .
An instance of the encryption image is B x = B y = 16 . During this case, it is concentrated on the block-scrambling-based image encrypt for subsequent reasons.
(a)
The encrypted image is well-suited for JPEG standards.
(b)
The compression efficacy to encrypt the images is almost similar to the original ones in the JPEG standard.
(c)
Robustness against several attacks is established.

2.2. Image Classification Module

During the classification process, the BSBE-PPODLC technique encompasses three sub-processes, namely DenseNet feature extraction, XGBoost classifier and AGTO-based hyperparameter tuning. XGBoost is chosen due to the following advantages: high accuracy, fast training speed, scalability, robustness and flexibility.

2.2.1. Feature Extraction

For the feature extraction process, the DenseNet model is exploited in the current study [28]. DenseNet was chosen due to its efficiency on a combination of features from many layers. Further, it also enables better feature representation and reduces the risk of overfitting. The DenseNet model links every layer with another one in a feedforward manner, thus generating a dense block of layers. It enables the free movement of the data and their gradients via the network and enables robust learning of the features. It requires fewer parameters than the classical CNN, which in turn minimizes the risk of overfitting and makes it computationally efficient.
DenseNet differs from ResNet in the way how the data are passed. In DenseNet, the feature map of the output layer is concatenated with the incoming feature maps instead of adding them. Therefore, the equation is transformed as follows.
x l = H l x 0 + x 1 + + x l 1    
The same problem has been confronted in the studies conducted on ResNet in which it is not possible to combine or concatenate the activities of feature maps since they are of distinct sizes despite. So, it is not practical to either concatenate or add the feature maps in ResNet. DenseNet is separated into dense blocks. In this regard, the dimension of the feature map remains unchanged, whereas the number of filters changes between them. The layer that exists between the dense blocks is termed a transition layer. It can be utilized for downsampling through 2 × 2 pooling, batch normalization and 1 × 1 convolutional layers. The channel dimension increases at all the layers due to the concatenation of the feature map; ‘ k ’ represents the growth rate hyperparameter which maintains the quantity of the data that is saved in all the layers of the network. When H 1 produces k feature maps, the generalized formula to determine the number of feature maps using the l - th layer is demonstrated in the above formula.
A feature map acts as the data or learning data of the network. All the layers have access to the feature map of the preceding layers due to which it possesses collective knowledge. All the layers add feature maps or new data to this collective knowledge in a concrete k feature map of the data. Consequently, DenseNet saves and utilizes the data from the preceding layers which is not so in the case of conventional ConvNet and ResNet models.

2.2.2. Hyperparameter Tuning

To adjust the hyperparameter values of the DenseNet method, the AGTO algorithm is used in this study. The knowledge of the group performances in wild gorillas inspires the AGTO technique [29]. Initializing, global exploration and local exploitation are three stages which make up the AGTO, similar to other intelligent approaches.
  • Initialization Phase
Assume that a D -dimensional space has N gorillas. To identify the position of the i t h gorilla in the universe, it is expressed as X i = x i , 1 ,   x i , 2 ,   x i ,   D , in which I = 1 , 2 , N and is determined as follows:
X N × D = r a n d N ,   D × u b l b + l b
where r a n d   ( ) lies between 0 and 1. The searching range is defined based on the upper as well as lower limits, u b and l b , respectively. The matrix X has A arbitrary value in the range of 0 and 1, and it is assigned to every element of N rows and D columns from the matrix signified as r a n d   N ,   D .
  • Exploration Phase
G X t + 1 = u b l b × r 2 + l b ,   r 1 < p
r 3 C × X A t + L × Z × X t ,   r 1 0.5
X t L × L × X t X B t + r 4 × X t X B t r 1 < 0.5 .
At this point, t implies the iteration time, X t signifies the gorilla’s predefined position vector, and G X t + 1 refers to the position of the potential searching agent during the subsequent iteration. Additionally, the arbitrary numbers r 1 ,   r 2 ,   r 3 and r 4 imply the number value between 0 and 1. Two places between the predefined gorillas’ population, X A t and B t , are chosen arbitrarily; p stands for a fixed value. With the employment of the problem dimensional as an index, Z indicates the row vector, whereas the element value is developed arbitrarily in C ,   C . In addition, C is expressed as follows
C =   cos   2 × r 5 + 1 × 1 t M a x i t e r  
At this point,   cos   implies the cosine function, r 5 stands for positive real numbers between zero and one, and M a x i t e r implies the highest iteration number. The following equation is used to determine L.
L = C × l
At this point, l represents an arbitrary value in the range of −1 and 1. Then, all the probable G X t + 1 solutions are created because of the exploration, and the fitness value is related to them. If G X demonstrates X , then it is retained and employed in the place of X . It can be demonstrated as a condition   G X < F X . Here, F refers to the fitness function for the problem in question t . Furthermore, an optimum option that exists at the time is assumed to be the silverback.
  • Exploitation Phase
If a novel gorilla troop is generated, the silverback is the leading male which is at its peak health and strength. It is followed by blackback gorillas as they forage for food. Certainly, silverbacks tend to age and die, and younger blackbacks from the troops fight other males and occupy and control the troops. The exploitation step in this AGTO model follows the silverback gorillas and plays for adult female gorillas. W is projected to control these moves. Once C in Equation (6) is superior to W , then the silverback primary method is followed.
G X t + 1 = L × M × X t X s i l v e r b a c k + X t                  
In this case, a better solution initiated is represented by the X silverback, the predefined position vector is demonstrated as t and L is evaluated using Equation (7). The values of M are determined as follows.
M = i = 1 n x i t N | x i t N | 2 l 1 2 l  
where N signifies the entire individual number, and X i t refers to the vector that illustrates the position of the gorilla.
G X t + 1 = X s i l v e r b a c k X s i l v e r b a c k × Q X t × Q × A
Q = 2 × r 6 1  
A = ϕ × E ,  
  E = N 1 ,   r 7 0.5   N 2 ,   r 7 < 0.5
It can be a pre-determined place as signified by t and the influence force, Q , which is estimated by Equations (9) and (10). An arbitrary value within 0 and 1 is employed for r 6 in Equation (6).

2.2.3. Image Classification

For image classification, the XGBoost model is used. Due to its accurate and fast performance, XGBoost is regarded as a robust ensemble-learning-based classifier [30]. The ensemble architecture is designed based on various decision tree algorithms. In this model, the trees are added to the parent model by training to fit into accurate prediction and to remove the error that results from the preceding trees. In order to overcome the loss function, the gradient descent optimization technique is utilized. The loss gradient diminishes as the model becomes trained accurately, and the process is called gradient boosting. The XGBoost classifier from the Python repository was utilized in this study, in its initial condition, to check for efficiency. The efficiency of the built-in mechanism is estimated concerning cross-entropy loss, called log loss. The more accurate the classification, the lesser the log loss values are.
  lo g     l o s s = y   ln   p + 1 y ln   1 p    
where p = 1 1 + e x ,   y indicates the actual label within {0, 1} and p represents the probability score.
The system efficiency of the inbuilt XGBoost classifiers are examined, and the variation in the inherent parameter can be performed to minimize the log loss as defined earlier.

3. Results and Discussion

In this section, the proposed BSBE-PPODLC method was experimentally validated using the UCM dataset (http://weegee.vision.ucmerced.edu/datasets/landuse.html), Accessed on 14 September 2022. The UCM dataset comprises a set of aerial images of land use in the UC Merced area. It was developed by researchers at the University of California, Merced and is frequently utilized as a benchmark dataset to evaluate the performance of land-use classification tasks. The UCM dataset includes 21 classes of land use, including agriculture, bare land, buildings, forests, grassland, highways and water bodies. It includes 2100 images, each with a size of 256 × 256 pixels and is divided into training and test datasets. The images in the dataset were collected using aerial imagery from the National Agricultural Imagery Program (NAIP). Figure 2 illustrates some of the sample images. Figure 3 demonstrates the original and the encrypted images.
Table 1 represents the overall encryption results achieved by the proposed BSBE-PPODLC model. The experimental outcomes show that the proposed BSBE-PPODLC method achieved effectual performance under all the images. For example, with the harbor test image, the BSBE-PPODLC technique gained an MSE of 0.1956, RMSE of 0.4423, PSNR of 55.22 dB, SSIM of 99.83% and a QI of 99.97%. Meanwhile, with the river test image, the BSBE-PPODLC technique obtained an MSE of 0.2794, RMSE of 0.5286, PSNR of 53.67 dB, SSIM of 99.80% and a QI of 99.90%. Eventually, with the runway test image, the BSBE-PPODLC method reached an MSE of 0.3465, RMSE of 0.5886, PSNR of 52.73 dB, SSIM of 99.80% and a QI of 99.97%.
In Table 2 and Figure 4, the overall MSE analysis outcomes achieved by the proposed BSBE-PPODLC model and other existing models are given. The outcomes display that the HBMO-LBG and the QPSO-LBG methods attained a poor performance with maximum MSE values. Next, the FF-LBG model and the CS-LBG methods reached moderately low MSE values. Although the SSA-LBG model tried to attain a reasonable MSE value, the BSBE-PPODLC model exhibited the maximum performance with a minimal MSE of 0.1956 for the Harbor image, 0.2794 for the River image, 0.3465 for the runway image and 0.2909 for the tennis court image.
In Table 3 and Figure 5, the overall PSNR study outcomes accomplished by the proposed BSBE-PPODLC approach and other existing methods are portrayed. The outcomes show that the HBMO-LBG and the QPSO-LBG algorithms achieved a poor performance with minimal PSNR values. Then, the FF-LBG model and the CS-LBG approaches reached moderately increased PSNR values. Although the SSA-LBG technique attempted to achieve a reasonable PSNR value, the proposed BSBE-PPODLC algorithm exhibited improved results with a maximum PSNR of 55.22 dB in the case of the harbor image, 53.67 dB for the river image, 0.3465 for the runway image and 0.2909 for the tennis court image.
In Figure 6, the RSI classification results attained by the proposed BSBE-PPODLC model are presented in the form of a confusion matrix. The results specify that the proposed BSBE-PPODLC method effectively identified four classes.
Table 4 and Figure 7 represent the classification performance of the BSBE-PPODLC model on 80:20 of TR/TS data. The obtained values show that the BSBE-PPODLC algorithm identified all the class labels on the RSIs. For example, with 80% of the TR database, the BSBE-PPODLC technique accomplished an average a c c u y of 99.06%, p r e c n of 98.18%, r e c a l of 98.09% and an F s c o r e of 98.10%. Moreover, with 20% of the TS database, the BSBE-PPODLC method attained an average a c c u y of 98.12%, p r e c n of 96.26%, r e c a l of 96.43 % and an F s c o r e of 96.25%.
Table 5 and Figure 8 show the classification performance accomplished by the proposed BSBE-PPODLC method on 70:30 of TR/TS data. The gained values show that the BSBE-PPODLC technique identified all the class labels on the RSIs. For example, with 70% of the TR database, the BSBE-PPODLC method established an average a c c u y of 98.39%, p r e c n of 96.90%, r e c a l of 96.77% and an F s c o r e of 96.77%. Furthermore, with 30% of the TS database, the BSBE-PPODLC method accomplished an average a c c u y of 97.50%, p r e c n of 95.18%, r e c a l of 95.08 % and an F s c o r e of 94.97%.
The TACC and VACC performance outcomes of the BSBE-PPODLC methodology, are shown in Figure 9. The figure implies that the BSBE-PPODLC technique achieved improved performance with increased TACC and VACC values. Notably, the BSBE-PPODLC method reached the maximum TACC outcomes.
The TLS and VLS performance results of the BSBE-PPODLC techniques are portrayed in Figure 10. The figure shows that the BSBE-PPODLC method had a better performance with the least TLS and VLS values. Seemingly, the proposed BSBE-PPODLC method achieved low VLS outcomes.
A clear precision–recall study was conducted upon the proposed BSBE-PPODLC method under the test database and the results are shown in Figure 11. The figure shows that the proposed BSBE-PPODLC technique achieved enhanced precision–recall values under several classes.
A comprehensive ROC study was conducted upon the BSBE-PPODLC technique with the test database and the results are detailed in Figure 12. The fallouts exhibited from the BSBE-PPODLC method established its ability in categorizing the test database into different classes.
In Table 6 and Figure 13, the RSI classification performance of the BSBE-PPODLC model and other DL models are portrayed [31,32]. The outcomes show that the ResNet50 and the DenseNet models offered the least classification performance. Next, the VGG16 and the Xception models reached moderately closer performance.
In contrast, the PP-DL method achieved a reasonable performance with an a c c u y of 98.40%, p r e c n of 97.20%, r e c a l of 97.11% and an F s c o r e of 96.48%. However, the proposed BSBE-PPODLC model exhibited its supremacy with an a c c u y of 99.06%, p r e c n of 98.18%, r e c a l of 98.09% and an F s c o r e of 98.10%. These results confirmed the better performance of the proposed BSBE-PPODLC method over other DL approaches

4. Conclusions

The current research paper introduced an effective BSBE-PPODLC technique for encryption and classification of RSIs. The presented BSBE-PPODLC technique initially encrypts the RSIs using the BSBE technique, which enables secure communication of the images in a wireless medium. During the receipt process, both decryption and the image classification processes occur. In the presented BSBE-PPODLC technique, the image classification process encompassed three sub-processes, namely DenseNet feature extraction, XGBoost classifier and AGTO-based hyperparameter tuning. The simulation values of the BSBE-PPODLC approach were tested on the RSI dataset and the outcomes were assessed under different aspects. The simulation outcomes confirmed that the BSBE-PPODLC technique reached an improved performance over other models with a maximum accuracy of 99.06%. In future, the RSIs can be integrated into other kinds of data, such as LiDAR (light detection and ranging) or radar data, to enhance the image classification performance. In addition, the DL models can also use additional data sources in the classification process. Moreover, future works can focus on developing methods that make DL models highly interpretable. This phenomenon would be highly beneficial for applications in which it is important to understand the reasoning behind the model’s decisions.

Author Contributions

Conceptualization, F.S.A. and A.M.; Methodology A.A.A.; Software, A.M.; Investigation, A.A.A.; Resources, A.M.; Data curation, A.M.; Writing—original draft, F.S.A., A.A.A. and A.M.H.; Writing—review & editing, A.A.A., A.M. and A.M.H.; Supervision, A.A.A.; Project administration, A.M.H.; Funding acquisition, F.S.A. All authors have read and agreed to the published version of the manuscript.

Funding

The authors extend their appreciation to the Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia for funding this research work through the project number MoE-IF-UJ-R-22-0708-1.

Conflicts of Interest

The authors declare that they have no conflict of interest. The manuscript was written through the contributions of all authors. All authors have given approval for the final version of the manuscript.

References

  1. Chouragade, P.M.; Ambhore, P.B. A Survey on Privacy Preserving Content Based Image Retrieval and Information Sharing in Cloud Environment. In Proceedings of the 2021 4th International Conference on Recent Trends in Computer Science and Technology (ICRTCST), Jamshedpur, India, 1–12 February 2022; IEEE: New York, NY, USA; pp. 238–245. [Google Scholar] [CrossRef]
  2. Saravanan, K.; Suganthi, K.; Kalaiselvi, R.; Divya, B.; Kumar, S.D. Privacy Preserving On Remote Sensing Data Using Reversible Data Hiding. J. Phys. Conf. Ser. 2021, 1979, 012050. [Google Scholar] [CrossRef]
  3. Yang, J.; Cheng, G.; Shen, M. Secure fusion of encrypted RSI based on Brovey. Sci. China Inf. Sci. 2021, 64, 1–3. [Google Scholar] [CrossRef]
  4. Boulemtafes, A.; Derhab, A.; Braham, N.A.A.; Challal, Y. PReDIHERO–Privacy-Preserving Remote Deep Learning Inference based on Homomorphic Encryption and Reversible Obfuscation for Enhanced Client-side Overhead in Pervasive Health Monitoring. In Proceedings of the 2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA), Tangier, Morocco, 30 November–3 December 2021; IEEE: New York, NY, USA; pp. 1–8. [Google Scholar] [CrossRef]
  5. Rajput, A.S.; Raman, B.; Imran, J. Privacy-preserving human action recognition as a remote cloud service using RGB-D sensors and deep CNN. Expert Syst. Appl. 2020, 152, 113349. [Google Scholar] [CrossRef]
  6. Hasan, M.M.; Islam, M.U.; Sadeq, M.J.; Fung, W.K.; Uddin, J. Review on the Evaluation and Development of Artificial Intelligence for COVID-19 Containment. Sensors 2023, 23, 527. [Google Scholar] [CrossRef] [PubMed]
  7. Xie, D.; Chen, F.; Luo, Y.; Li, L. One-to-many image encryption with privacy-preserving homomorphic outsourced decryption based on compressed sensing. Digit. Signal Process. 2019, 95, 102587. [Google Scholar] [CrossRef]
  8. Du, G.; Zhou, L.; Li, Z.; Wang, L.; Lü, K. Neighbor-aware deep multi-view clustering via graph convolutional network. Inf. Fusion 2023, 93, 330–343. [Google Scholar] [CrossRef]
  9. Sirisha, U.; Chandana, B.S. Privacy Preserving Image Encryption with Optimal Deep Transfer Learning Based Accident Severity Classification Model. Sensors 2023, 23, 519. [Google Scholar] [CrossRef] [PubMed]
  10. Li, S.; Wu, L.; Meng, W.; Xu, Z.; Qin, C.; Wang, H. DVPPIR: Privacy-preserving image retrieval based on DCNN and VHE. Neural Comput. Appl. 2022, 34, 14355–14371. [Google Scholar] [CrossRef]
  11. Jayaram, R.; Prabakaran, S. Onboard disease prediction and rehabilitation monitoring on secure edge-cloud integrated privacy preserving healthcare system. Egypt. Inform. J. 2021, 22, 401–410. [Google Scholar] [CrossRef]
  12. Zhang, Z.; Zhou, F.; Qin, S.; Jia, Q.; Xu, Z. Privacy-Preserving Image Retrieval and Sharing in Social Multimedia Applications. IEEE Access 2020, 8, 66828–66838. [Google Scholar] [CrossRef]
  13. Wang, X.; Li, J.; Yan, H. An improved anti-quantum MST3 public key encryption scheme for RSI. Enterp. Inf. Syst. 2021, 15, 530–544. [Google Scholar] [CrossRef]
  14. Lee, T.; Lin, Z.; Pushp, S.; Li, C.; Liu, Y.; Lee, Y.; Xu, F.; Xu, C.; Zhang, L.; Song, J. Occlumency: Privacy-preserving remote deep-learning inference using SGX. In Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, Los Cabos, Mexico, 21–25 October 2019; pp. 1–17. [Google Scholar]
  15. Janani, T.; Brindha, M. Secure Similar Image Matching (SESIM): An Improved Privacy Preserving Image Retrieval Protocol over Encrypted Cloud Database. IEEE Trans. Multimed. 2021, 24, 3794–3806. [Google Scholar] [CrossRef]
  16. Al-Khasawneh, M.A.; Uddin, I.; Shah, S.A.A.; Khasawneh, A.M.; Abualigah, L.; Mahmoud, M. An improved chaotic image encryption algorithm using Hadoop-based MapReduce framework for massive remote sensed images in parallel IoT applications. Clust. Comput. 2022, 25, 999–1013. [Google Scholar] [CrossRef]
  17. Zhang, X.; Wang, Y.; Ma, J.; Jin, Q. QAPP: A quality-aware and privacy-preserving medical image release scheme. Inf. Fusion 2022, 88, 281–295. [Google Scholar] [CrossRef]
  18. Falmari, V.R.; Brindha, M. Privacy preserving biometric authentication using chaos on remote untrusted server. Measurement 2021, 177, 109257. [Google Scholar] [CrossRef]
  19. Abd EL-Latif, A.A.; Abd-El-Atty, B.; Abou-Nassar, E.M.; Venegas-Andraca, S.E. Controlled alternate quantum walks based privacy preserving healthcare images in internet of things. Opt. Laser Technol. 2020, 124, 105942. [Google Scholar] [CrossRef]
  20. Zhao, Q.; Chen, S.; Liu, Z.; Baker, T.; Zhang, Y. Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems. Inf. Process. Manag. 2020, 57, 102355. [Google Scholar] [CrossRef]
  21. Qin, J.; Chen, J.; Xiang, X.; Tan, Y.; Ma, W.; Wang, J. A privacy-preserving image retrieval method based on deep learning and adaptive weighted fusion. J. Real-Time Image Process. 2019, 17, 161–173. [Google Scholar] [CrossRef]
  22. Rangwani, D.; Sadhukhan, D.; Ray, S.; Khan, M.K.; Dasgupta, M. An improved privacy preserving remote user authentication scheme for agricultural wireless sensor network. Trans. Emerg. Telecommun. Technol. 2021, 32, e4218. [Google Scholar] [CrossRef]
  23. Yang, Y.; Newsam, S. Bag-of-visual-words and spatial extensions for land-use classification. In Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, San Jose, CA, USA, 2–5 November 2010; pp. 270–279. [Google Scholar]
  24. Dutta, S.; Das, M. Remote sensing scene classification under scarcity of labelled samples—A survey of the state-of-the-arts. Comput. Geosci. 2023, 171, 105295. [Google Scholar] [CrossRef]
  25. Zhou, W.; Guan, H.; Li, Z.; Shao, Z.; Delavar, M.R. Remote Sensing Image Retrieval in the Past Decade: Achievements, Challenges, and Future Directions. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 2023, 16, 1447–1473. [Google Scholar] [CrossRef]
  26. Zhu, Y.; Wang, M.; Yin, X.; Zhang, J.; Meijering, E.; Hu, J. Deep Learning in Diverse Intelligent Sensor Based Systems. Sensors 2023, 23, 62. [Google Scholar] [CrossRef] [PubMed]
  27. Chuman, T.; Sirichotedumrong, W.; Kiya, H. Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images. IEEE Trans. Inf. Forensics Secur. 2018, 14, 1515–1525. [Google Scholar] [CrossRef]
  28. Nalluri, S.; Sasikala, R. A deep neural architecture for SOTA pneumonia detection from chest X-rays. Int. J. Syst. Assur. Eng. Manag. 2022, 1–14. [Google Scholar] [CrossRef]
  29. Alsolai, H.; Alzahrani, J.S.; Maray, M.; Alghamdi, M.; Qahmash, A.; Alnfiai, M.M.; Aziz, A.S.A.; Mustafa Hilal, A. Enhanced Artificial Gorilla Troops Optimizer Based Clustering Protocol for UAV-Assisted Intelligent Vehicular Network. Drones 2022, 6, 358. [Google Scholar] [CrossRef]
  30. Li, S.; Qin, J.; He, M.; Paoli, R. Fast Evaluation of Aircraft Icing Severity Using Machine Learning Based on XGBoost. Aerospace 2020, 7, 36. [Google Scholar] [CrossRef]
  31. Minu, M.S.; Canessane, R.A. An Efficient Squirrel Search Algorithm based Vector Quantization for Image Compression in Unmanned Aerial Vehicles. In Proceedings of the 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), Coimbatore, India, 25–27 March 2021; IEEE: New York, NY, USA; pp. 789–793. [Google Scholar] [CrossRef]
  32. Alkhelaiwi, M.; Boulila, W.; Ahmad, J.; Koubaa, A.; Driss, M. An Efficient Approach Based on Privacy-Preserving Deep Learning for Satellite Image Classification. Remote Sens. 2021, 13, 2221. [Google Scholar] [CrossRef]
Figure 1. Block diagram of BSBE-PPODLC system.
Figure 1. Block diagram of BSBE-PPODLC system.
Remotesensing 15 01022 g001
Figure 2. Sample images: (a) harbor; (b) river; (c) runway; (d) tennis court.
Figure 2. Sample images: (a) harbor; (b) river; (c) runway; (d) tennis court.
Remotesensing 15 01022 g002
Figure 3. (a) Original images; (b) encrypted images.
Figure 3. (a) Original images; (b) encrypted images.
Remotesensing 15 01022 g003
Figure 4. MSE analysis outcomes of the proposed BSBE-PPODLC method for distinct test images.
Figure 4. MSE analysis outcomes of the proposed BSBE-PPODLC method for distinct test images.
Remotesensing 15 01022 g004
Figure 5. MSE analysis results of the BSBE-PPODLC approach under distinct test images.
Figure 5. MSE analysis results of the BSBE-PPODLC approach under distinct test images.
Remotesensing 15 01022 g005
Figure 6. Confusion matrices of the BSBE-PPODLC approach: (a,b) TR and TS databases of 80:20; (c,d) TR and TS databases of 70:30.
Figure 6. Confusion matrices of the BSBE-PPODLC approach: (a,b) TR and TS databases of 80:20; (c,d) TR and TS databases of 70:30.
Remotesensing 15 01022 g006
Figure 7. Average outcomes of the BSBE-PPODLC approach on 80:20 on TR/TS datasets.
Figure 7. Average outcomes of the BSBE-PPODLC approach on 80:20 on TR/TS datasets.
Remotesensing 15 01022 g007
Figure 8. Average outcomes of the proposed BSBE-PPODLC approach on 70:30 on TR/TS datasets.
Figure 8. Average outcomes of the proposed BSBE-PPODLC approach on 70:30 on TR/TS datasets.
Remotesensing 15 01022 g008
Figure 9. TACC and VACC outcomes of the BSBE-PPODLC approach.
Figure 9. TACC and VACC outcomes of the BSBE-PPODLC approach.
Remotesensing 15 01022 g009
Figure 10. TLS and VLS outcomes of the BSBE-PPODLC approach.
Figure 10. TLS and VLS outcomes of the BSBE-PPODLC approach.
Remotesensing 15 01022 g010
Figure 11. Precision–recall outcomes of the BSBE-PPODLC approach.
Figure 11. Precision–recall outcomes of the BSBE-PPODLC approach.
Remotesensing 15 01022 g011
Figure 12. ROC outcomes of the BSBE-PPODLC approach.
Figure 12. ROC outcomes of the BSBE-PPODLC approach.
Remotesensing 15 01022 g012
Figure 13. Comparative analysis outcomes of the BSBE-PPODLC approach and other systems.
Figure 13. Comparative analysis outcomes of the BSBE-PPODLC approach and other systems.
Remotesensing 15 01022 g013
Table 1. Overall encryption outcomes of the proposed BSBE-PPODLC approach under distinct test images.
Table 1. Overall encryption outcomes of the proposed BSBE-PPODLC approach under distinct test images.
Test-ImageMSERMSEPSNR (dB)SSIM (%)QI (%)
Harbor0.19560.442355.2299.8399.97
River0.27940.528653.6799.8099.90
Runway0.34650.588652.7399.8099.97
Tennis Court0.29090.539453.4999.8199.91
Table 2. MSE analysis results of the proposed BSBE-PPODLC method with other methods for distinct test images.
Table 2. MSE analysis results of the proposed BSBE-PPODLC method with other methods for distinct test images.
MSE
Test-ImageBSBE-PPODLCSSA-LBGCS-LBGFF-LBGHBMO-LBGQPSO-LBG
Harbor0.19560.27230.33020.37800.42510.4907
River0.27940.36010.42690.49690.57790.6400
Runway0.34650.41680.49090.54770.58880.6496
Tennis Court0.29090.37520.43050.48360.57060.6339
Table 3. PSNR analysis outcomes of the proposed BSBE-PPODLC method with other methods for distinct test images.
Table 3. PSNR analysis outcomes of the proposed BSBE-PPODLC method with other methods for distinct test images.
PSNR (dB)
Test-ImageBSBE-PPODLCSSA-LBGCS-LBGFF-LBGHBMO-LBGQPSO-LBG
Harbor55.2253.7852.9452.3651.8551.22
River53.6752.5751.8351.1750.5150.07
Runway52.7351.9351.2250.7550.4350.00
Tennis Court53.4952.3951.7951.2950.5750.11
Table 4. Classification outcomes of the proposed BSBE-PPODLC approach on 80:20 TR/TS datasets.
Table 4. Classification outcomes of the proposed BSBE-PPODLC approach on 80:20 TR/TS datasets.
Class A c c u y P r e c n R e c a l F s c o r e
Testing Phase (80%)
Harbor99.0696.34100.0098.14
River99.0698.7297.4798.09
Runway98.75100.0094.8797.37
Tennis Court99.3897.67100.0098.82
Average99.0698.1898.0998.10
Testing Phase (20%)
Harbor96.2590.9195.2493.02
River97.50100.0090.4895.00
Runway100.00100.00100.00100.00
Tennis Court98.7594.12100.0096.97
Average98.1296.2696.4396.25
Table 5. Classification results of the proposed BSBE-PPODLC approach on 70:30 on TR/TS datasets.
Table 5. Classification results of the proposed BSBE-PPODLC approach on 70:30 on TR/TS datasets.
Class A c c u y P r e c n R e c a l F s c o r e
Training Phase (70%)
Harbor97.8698.4692.7595.52
River99.2998.6198.6198.61
Runway97.8692.00100.0095.83
Tennis Court98.5798.5395.7197.10
Average98.3996.9096.7796.77
Testing Phase (30%)
Harbor98.33100.0093.5596.67
River96.6787.50100.0093.33
Runway98.3396.7796.7796.77
Tennis Court96.6796.4390.0093.10
Average97.5095.1895.0894.97
Table 6. Comparative analysis results of the BSBE-PPODLC approach and other systems.
Table 6. Comparative analysis results of the BSBE-PPODLC approach and other systems.
MethodsAccuracyPrecisionRecallF-Score
BSBE-PPODLC99.0698.1898.0998.10
VGG1697.4695.0196.4094.77
Xception97.2195.1294.2692.59
ResNet5094.5195.4693.7694.94
DenseNet12194.1893.8294.8894.36
PP-DL Model98.4097.2097.1196.48
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Alsubaei, F.S.; Alneil, A.A.; Mohamed, A.; Mustafa Hilal, A. Block-Scrambling-Based Encryption with Deep-Learning-Driven Remote Sensing Image Classification. Remote Sens. 2023, 15, 1022. https://doi.org/10.3390/rs15041022

AMA Style

Alsubaei FS, Alneil AA, Mohamed A, Mustafa Hilal A. Block-Scrambling-Based Encryption with Deep-Learning-Driven Remote Sensing Image Classification. Remote Sensing. 2023; 15(4):1022. https://doi.org/10.3390/rs15041022

Chicago/Turabian Style

Alsubaei, Faisal S., Amani A. Alneil, Abdullah Mohamed, and Anwer Mustafa Hilal. 2023. "Block-Scrambling-Based Encryption with Deep-Learning-Driven Remote Sensing Image Classification" Remote Sensing 15, no. 4: 1022. https://doi.org/10.3390/rs15041022

APA Style

Alsubaei, F. S., Alneil, A. A., Mohamed, A., & Mustafa Hilal, A. (2023). Block-Scrambling-Based Encryption with Deep-Learning-Driven Remote Sensing Image Classification. Remote Sensing, 15(4), 1022. https://doi.org/10.3390/rs15041022

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop