Computer Science and Information Systems 2024 Volume 21, Issue 4, Pages: 1673-1697
https://doi.org/10.2298/CSIS240314053W
Full text ( 1121 KB)
GAN-DNADE: Image encryption algorithm based on generative adversarial network and DNA dynamic encoding
Wang Xi (School of Artificial Intelligence and Software Engineering, Nanyang Normal University, Nanyang, China), 352720214@qq.com
Aiming at the problems such as small key space and incomplete color channel encryption in traditional image encryption, this paper proposes a novel image encryption algorithm based on generative adversarial network (GAN) and DNA dynamic encoding. This paper introduces GAN into random key generation, and uses GAN to learn and train the random key generated by hyperchaotic system. A parallel chaotic system is used to generate two sets of pseudo-random sequences, and DNA dynamic encoding is introduced to further transform them to generate a new sequence. The pixel-level diffusion and scrambling of images within and between channels are carried out by using random sequences. The experimental results show that the randomness of GAN can significantly expand the key space, and the proposed algorithm has significant advantages in the security and anti-attack ability of ciphertext images.
Keywords: image encryption, generative adversarial network, DNA dynamic encoding, hyperchaotic system
Show references
Vandenbosch L, Fardouly J, Tiggemann M. Social media and body image: Recent trends and future directions[J]. Current opinion in psychology, 2022, 45: 101289.
S. Yin, H. Li, A. A. Laghari, T. R. Gadekallu, et al. An Anomaly Detection Model Based on Deep Auto-encoder and Capsule Graph Convolution via Sparrow Search Algorithm in 6G Internet-of-Everything[J]. IEEE Internet of Things Journal, 2024. DOI: 10.1109/JIOT.2024.3353337.
Jung C, Kwon G, Ye J C. Exploring patch-wise semantic relation for contrastive learning in image-to-image translation tasks[C]//Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2022: 18260-18269.
T. Yu, L. Chen, N. Xu, H. Xu, X. Hu and X. Zhang, ”Fengyun-3E Low Light Observation and Nighttime Lights Product,” in IEEE Transactions on Geoscience and Remote Sensing, vol. 61, pp. 1-12, 2023, Art no. 4703612, doi: 10.1109/TGRS.2023.3292236.
Li Y, Cai F, Tu Y, et al. Low-Light Image Enhancement Under Non-uniform Dark[C]//International Conference on Multimedia Modeling. Cham: Springer Nature Switzerland, 2023: 190-201.
J. Liu, J. Zhang, S. Yin. Hybrid chaotic system-oriented artificial fish swarm neural network for image encryption. Evolutionary Intelligence, 16, 77-87, 2023. https://doi.org/10.1007/s12065-021-00643-5.
Li C, Sprott J C, Zhang X, et al. Constructing conditional symmetry in symmetric chaotic systems[J]. Chaos, Solitons & Fractals, 2022, 155: 111723.
Gao S, Wu R, Wang X, et al. A 3D model encryption scheme based on a cascaded chaotic system[J]. Signal Processing, 2023, 202: 108745.
S. Yin, H. Li, L. Teng, A. A. Laghari, V. V.a Estrela. Attribute-based Multiparty Searchable encryption model for Privacy Protection of Text Data[J]. Multimedia Tools and Applications, 2023. ttps://doi.org/10.1007/s11042-023-16818-4.
Gao X, Mou J, Xiong L, et al. A fast and efficient multiple images encryption based on singlechannel encryption and chaotic system[J]. Nonlinear dynamics, 2022, 108(1): 613-636.
Zhou S,Wang X, Zhang Y, et al. A novel image encryption cryptosystem based on true random numbers and chaotic systems[J]. Multimedia Systems, 2022: 1-18.
M. Ji’e, D. Yan, S. Sun, F. Zhang, S. Duan and L. Wang, ”A Simple Method for Constructing a Family of Hamiltonian Conservative Chaotic Systems,” in IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 69, no. 8, pp. 3328-3338, Aug. 2022, doi: 10.1109/TCSI.2022.3172313.
Z. Zhang, H. A. Hamadi, E. Damiani, C. Y. Yeun and F. Taher, ”Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research,” in IEEE Access, vol. 10, pp. 93104-93139, 2022, doi: 10.1109/ACCESS.2022.3204051.
Goodfellow I, Pouget-Abadie J, Mirza M, et al. Generative adversarial nets[J]. Advances in neural information processing systems, 2014, 27.
Gao N, Xue H, Shao W, et al. Generative adversarial networks for spatio-temporal data: A survey[J]. ACM Transactions on Intelligent Systems and Technology (TIST), 2022, 13(2): 1- 25.
Amin M, Shah B, Sharif A, et al. Androidmalware detection through generative adversarial networks[ J]. Transactions on Emerging Telecommunications Technologies, 2022, 33(2): e3675.
Sekar J G, Periyathambi E, Chokkalingam A. Hybrid chaos-based image encryption algorithm using Chebyshev chaotic map with deoxyribonucleic acid sequence and its performance evaluation[ J]. International Journal of Electrical & Computer Engineering (2088-8708), 2023, 13(6).
Wang Y, Cui W, Tao Y. A color image chunking encryption algorithm based on DNA and compound chaotic system[J]. Multimedia Tools and Applications, 2023: 1-21.
Li H, Zhang L, Cao H, et al. Hash Based DNA Computing Algorithm for Image Encryption[J]. Applied Sciences, 2023, 13(14): 8509.
Wang Z, Xu M, Zhang Y. Review of quantum image processing[J]. Archives of Computational Methods in Engineering, 2022, 29(2): 737-761.
Fang P, Liu H, Wu C, et al. A block image encryption algorithm based on a hyperchaotic system and generative adversarial networks[J]. Multimedia Tools and Applications, 2022, 81(15): 21811-21857.
X. Zhang, D. Gu, T. Wang and Y. Huang, ”Old School, New Primitive: Toward Scalable PUFBased Authenticated Encryption Scheme in IoT,” in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 42, no. 12, pp. 4569-4582, Dec. 2023, doi: 10.1109/TCAD.2023.3286260.
X. Zhang, D. Gu, T. Wang and Y. Huang, ”Old School, New Primitive: Toward Scalable PUFBased Authenticated Encryption Scheme in IoT,” in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 42, no. 12, pp. 4569-4582, Dec. 2023, doi: 10.1109/TCAD.2023.3286260.
Singh K N, Singh A K. Towards integrating image encryption with compression: A survey[J]. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), 2022, 18(3): 1-21.
Zhang D, Shafiq M, Wang L, et al. Privacy-preserving remote sensing images recognition based on limited visual cryptography[J]. CAAI Transactions on Intelligence Technology, 2023. https://doi.org/10.1049/cit2.12164.
Yu J, Xie W, Zhong Z, et al. Image encryption algorithm based on hyperchaotic system and a new DNA sequence operation[J]. Chaos, Solitons & Fractals, 2022, 162: 112456.
Ouguissi H, Saadi S, Merrad A, et al. Hybrid scheme for safe speech transmission based on multiple chaotic maps, watermarking and Arnold scrambling algorithm[J]. Multimedia Tools and Applications, 2023, 82(1): 327-346.
Wang X, Zhao M, Feng S, et al. An image encryption scheme using bit-plane cross-diffusion and spatiotemporal chaos system with nonlinear perturbation[J]. Soft Computing, 2023, 27(3): 1223-1240.
Wei C, Li G. A selective image encryption scheme using LICC hyperchaotic system[J]. IET Image Processing, 2022, 16(12): 3342-3358.
J. -W. Lee et al., ”Privacy-Preserving Machine Learning With Fully Homomorphic Encryption for Deep Neural Network,” in IEEE Access, vol. 10, pp. 30039-30054, 2022, doi: 10.1109/ACCESS. 2022.3159694.
Sideris A, Sanida T, Dasygenis M. A Novel Hardware Architecture for Enhancing the Keccak Hash Function in FPGA Devices[J]. Information, 2023, 14(9): 475.
Wu, B., Zhang, T., Mao, L.: Large-scale Image Classification with Multi-perspective Deep Transfer Learning. Computer Science and Information Systems, Vol. 20, No. 2, 743-763. (2023), https://doi.org/10.2298/CSIS220714015W.
Zhang G, Xu Y, Rauf M, et al. Breaking the Limitation of Elevated Coulomb Interaction in Crystalline Carbon Nitride for Visible and Near-Infrared Light Photoactivity[J]. Advanced Science, 2022, 9(21): 2201677.
Lu L, Ren W X, Wang S D. Fractional Fourier transform: Time-frequency representation and structural instantaneous frequency identification[J]. Mechanical Systems and Signal Processing, 2022, 178: 109305.
Yan, Z., Hongle, D., Lin, Z., Jianhua, Z.: Personalization Exercise Recommendation Framework based on Knowledge Concept Graph. Computer Science and Information Systems, Vol. 20, No. 2, 857-878. (2023), https://doi.org/10.2298/CSIS220706024Y.
Yu F, Kong X, Chen H, et al. A 6D fractional-order memristive Hopfield neural network and its application in image encryption[J]. Frontiers in Physics, 2022, 10: 847385.
Kaur G, Agarwal R, Patidar V. Color image encryption scheme based on fractional Hartley transform and chaotic substitution-permutation[J]. The Visual Computer, 2022, 38(3): 1027- 1050.
A. Sambas et al., ”A Novel 3D Chaotic System With Line Equilibrium: Multistability, Integral Sliding Mode Control, Electronic Circuit, FPGA Implementation and Its Image Encryption,” in IEEE Access, vol. 10, pp. 68057-68074, 2022, doi: 10.1109/ACCESS.2022.3181424.