An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN


Creative Commons License

ERKAN U., TOKTAŞ A., ENGİNOĞLU S., Akbacak E., Thanh D. N. H.

MULTIMEDIA TOOLS AND APPLICATIONS, cilt.81, sa.5, ss.7365-7391, 2022 (SCI-Expanded) identifier identifier

  • Yayın Türü: Makale / Tam Makale
  • Cilt numarası: 81 Sayı: 5
  • Basım Tarihi: 2022
  • Doi Numarası: 10.1007/s11042-021-11803-1
  • Dergi Adı: MULTIMEDIA TOOLS AND APPLICATIONS
  • Derginin Tarandığı İndeksler: Science Citation Index Expanded (SCI-EXPANDED), Scopus, FRANCIS, ABI/INFORM, Applied Science & Technology Source, Compendex, Computer & Applied Sciences, INSPEC, zbMATH
  • Sayfa Sayıları: ss.7365-7391
  • Anahtar Kelimeler: Image encryption, Chaotic map, Logarithmic map, Deep convolution neural network (CNN), Bit reversion, ALGORITHM, TRANSFORM, SYSTEM, CRYPTANALYSIS, COMBINATION, SECRET, DESIGN, MATRIX
  • Çanakkale Onsekiz Mart Üniversitesi Adresli: Evet

Özet

A secure and reliable image encryption scheme is presented, which depends on a novel chaotic log-map, deep convolution neural network (CNN) model, and bit reversion operation for the manipulation process. CNN is utilized to generate a public key to be based on the image in order to enhance the key sensitivity of the scheme. Initial values and control parameters are then obtained from the key to be used in the chaotic log-map, and thus a chaotic sequence is produced for the encrypting operations. The scheme then encrypts the images by scrambling and manipulating the pixels of images through four operations: permutation, DNA encoding, diffusion, and bit reversion. The encryption scheme is precisely examined for the well-known images in terms of various cryptanalyses such as key-space, key sensitivity, information entropy, histogram, correlation, differential attack, noisy attack, and cropping attack. To corroborate the image encryption scheme, the visual and numerical results are even compared with available scores of the state of the art. Therefore, the proposed log-map-based image encryption scheme is successfully verified and validated by superior absolute and comparative results. As future work, the proposed log-map can be extended to combinational multi-dimensional with existing efficient chaotic maps.