Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
64 views

Using GAN-Based Encryption To Secure Digital Images With Reconstruction Through Customized Super Resolution Network

This document summarizes a research article that proposes a GAN-based encryption method to securely encrypt digital images. The method first uses a GAN with coupled logistics and Henon map to generate a random sequence and encrypt the image. The encrypted image is then downsampled to 1/4 size and sent to the receiver. Finally, a customized super resolution network reconstructs the image at the receiver without decompressing, providing security and storage savings. Experimental results showed the method achieved high scores on security metrics and was up to 75% faster than recent methods.

Uploaded by

abc
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views

Using GAN-Based Encryption To Secure Digital Images With Reconstruction Through Customized Super Resolution Network

This document summarizes a research article that proposes a GAN-based encryption method to securely encrypt digital images. The method first uses a GAN with coupled logistics and Henon map to generate a random sequence and encrypt the image. The encrypted image is then downsampled to 1/4 size and sent to the receiver. Finally, a customized super resolution network reconstructs the image at the receiver without decompressing, providing security and storage savings. Experimental results showed the method achieved high scores on security metrics and was up to 75% faster than recent methods.

Uploaded by

abc
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

This article has been accepted for publication in IEEE Transactions on Consumer Electronics.

This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TCE.2023.3285626

Using GAN-Based Encryption to Secure Digital


Images with Reconstruction through Customized
Super Resolution Network
Monu Singh, Naman Baranwal, Kedar Nath Singh and Amit Kumar Singh, Senior Member, IEEE

Abstract—Unlike traditional encryption methods, Generative to security, fast transmission over a wide range of domains and
Adversarial Network (GAN)-based methods possess a high level low storage requirements are required. Particularly, a challenge
of security for digital images. Many existing simple encryption problem is encountered: how to save memory and computation
methods may be less secure than expected and have high storage
costs. This paper proposes a GAN-based encryption method to for limited memory consumer electronic devices [4]. Com-
secure digital images, solving these problems. First, a random pression is essential to achieve efficient image storage and
sequence generator using a GAN with cross-coupled logistics transmission. Therefore, researchers studied a method com-
and a Henon map is generated to encrypt an image. Next, the bining encryption simultaneously with compression, called the
encrypted image is downsampled into one-fourth of the original encryption-then-compression scheme. Fig. 1 shows the frame-
size and sent to the receiver. Finally, image reconstruction uses
a Customized Super Resolution Network (CSRNet) rather than work of the encryption-then-compression process. Recently,
decompressing the image at the receiver side. Our extensive
experimental results demonstrate that the proposed method
achieves NPCR, UACI, entropy, PSNR and SSIM up to 0.99604,
0.33460, 7.9993, 37.0462 dB and 0.94561, respectively. Further,
our encryption method achieves up to 75% faster than the recent
methods when evaluated on two standard datasets. Therefore, the
proposed GAN-Based solution can possess a high level of security
and save sufficient storage space for any practical application.
Index Terms—Consumer electronics, Generative adversarial
networks, Images, encryption, down sampling, Security, Attacks.

I. I NTRODUCTION
Fig. 1: An Encryption Then Compression Security Model
B ENEFITING from the advancement of information tech-
nologies and cyber-physical systems communications,
multimedia, especially images, have become more frequent. many researchers have adopted chaotic-based encryption [1],
At present, various multimedia information, consisting of [5]–[9] and deep learning-based encryption [10]–[12] methods
digital images, audio and videos, appears and has been eas- that possess a high level of security for digital images [10].
ily exchanged via consumer electronics (CE) devices [1]. For example, Singh et al. suggested a secure encryption-then-
However, the secure transmission of these data has attracted compression scheme [1]. First, a new 3D chaotic map is
increasing attention in areas such as online diagnosis and introduced for encrypting the color images. The size of the
education, research and development, and remote sensing data encrypted image is reduced by downsampling. After this, a
transmission [2]. Further, data privacy issues have a growing decryption process is performed on a compressed image. Last,
impact on many electronic industries [1]. It has brought great a lossy compression method based on a customized residual
convenience to consumer’s work and life. Therefore, how to dense spatial network is used for plain image reconstruction.
convey useful media information safely via these devices over Experimental results indicate the scheme is secure against
the network have become a hot topic and a major task for most cryptographic attacks. However, its performance against
information security. Encryption is an effective technique for noise attacks needs to be investigated. Zhang and Gong
this objective. It secures digital images by transforming them proposed an encryption scheme to secure color images [5].
into cipher images using a public or private key [3]. In addition First, a pseudo-random sequence generator is designed based
on the Hassell model and the LZW-1 map. Second, the pixels
Monu Singh and Amit Kumar Singh (Corresponding Author) are with of a plain image are scrambled using a three-dimensional (3D)
the Department of Computer Science and Engineering, National Institute
of Technology Patna, Bihar, India. (e-mail: monus.phd20.cs@nitp.ac.in; and zigzag transformation. Last, the diffusion process uses the
amit.singh@nitp.ac.in) generated key on different view planes of the scrambled image.
Naman Baranwal and Kedar Nath Singh are with the Department of This work has good security features with low encryption
Computer Science and Engineering, Noida Institute of Engineering and
Technology, Greater Noida, India. (e-mail: namanbaranwal2002@gmail.com; costs. However, its performance needs to be examined further
and knsinghait@gmail.com) for other cryptographic attacks. In [6], authors have suggested

Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on September 09,2023 at 06:31:13 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Consumer Electronics. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TCE.2023.3285626

a cryptosystem based on a 3D variable structure chaotic networks are used to rebuild the cipher-compressed image. The
system. Adjacent pixels of the original image are confused results show that compression is effective, but further security
by the suggested permutation method based on Rubik’s Cube. analyses must be performed.
Iterative diffusion is applied to confused images. Two rounds Inspired by the idea of chaotic and deep learning-based en-
of confusion and diffusion process are performed on an image cryption, this paper proposes a GAN-based encryption method
to raise security. Experimental results reveal that the suggested to secure digital images. First, we present a pseudo-random
scheme is fast. However, its security needs to be explored number generator strategy using a GAN, coupled logistics
further. Qiang et al.’s [7] strategy suggested a new chaotic and a Henon map to generate a secure key for the encryption
map called the two-dimensional Salomon Map. Based on the procedure. It was established that multiple chaos-based image
chaotic sequences, pixels with low and high bits are exchanged encryption schemes provide greater security [13]. Then, the
selectively and then dispersed into random positions. Three encrypted image is downsampled into one-fourth of the origi-
rounds of confusion and diffusion result in an encrypted image nal size and sent to the receiver. Finally, a customized super-
that no longer contains any usable information. Compared to resolution network (CSRNet) was designed to reconstruct the
other schemes, it performs well in terms of security, but its original image from the downsampled image. Experimental
time complexity can be improved. In [8], authors developed a results prove that the proposed method outperforms some new
secure encryption scheme for digital images. A spatiotemporal encryption methods.
chaotic system was designed with nonlinear perturbations to The rest of this paper is structured as follows. Section II
enhance the security of the encryption scheme. In this work, details the proposed approach, Section III summarizes the
diffusion is applied before confusion procedure. Following one experimental outcomes, and Section IV concludes.
round of diffusion, the image is confused by splitting the bit
plane, and it is then again encrypted via mutual diffusion of
high and low bit planes. The simulation results demonstrate II. M ETHODOLOGY
that the scheme has good security features, but its performance
The complete proposed methodology is shown in Fig. 2.
can be further optimized in complexity. Another chaos-based
We present a GAN-based pseudo random number generator
cryptosystem for color images was developed by Xiuhui et al.
strategy using chaotic maps at first, and then confusion and
[9]. The sequences are generated based on plain images and
diffusion strategy using the generated secure key. In addition,
the Lorenz-Haken laser chaotic system, and the plain image is
we introduce the downsample strategy, and the reconstruction
pre-processed using a lifting scheme. Confusion and diffusion
network of the image.
operations are then performed on the pre-processed image to
produce the cipher image. This scheme can resist brute force,
cropping, and noise attacks but takes longer than the other
A. Key generation
existing schemes.
Deep learning models can learn (like human beings) and The creation of random keys is crucial in cryptosystems.
mimic the given data distribution. Therefore, they are ex- Because of the high randomness, sensitivity to the initial
tensively used in super-resolution, deblurring, denoising, and condition, and non-linearity behaviour of chaotic systems,
private key generation-related tasks. For instance, Chai et al. the chaotic random number generator has been frequently
[10] suggested an image encryption scheme based on com- employed in cryptosystems [6]. However, chaotic systems, par-
pression sensing, GAN, and a chaotic system. Compression is ticularly those in high dimensions, are complex, less efficient,
performed using a compress sensing-based image restoration and have a lengthy iteration period. This result contradicts
model, and a convolutional neural network-based denoising the good pseudo-random generator properties [14]. Another
network reduces noise. The suggested work demonstrates sat- drawback of chaotic systems is that we can produce the
isfactory security performance and good reconstruction ability. same sequence if we know the initial parameters. Therefore,
However, the reconstructed images’ peak signal-to-noise ratio to address these issues, a learning pseudo-random number
(PSNR) can be improved. Yi Liu et al. [11] have proposed a generator is designed based on the GAN model, Henon map,
color image encryption scheme using a deep learning model. and coupled logistic map, enhancing security in this method. It
A bidirectional long short-term memory network was trained improves the practicality of the proposed method in numerous
on Chen’s chaotic sequences to predict random sequences. applications. Initially, two different chaotic sequences gener-
Then these sequences are embedded in the plain image after ated using the Henon map (H) and coupled logistic map (CL)
dividing it into red, green, and blue (RGB) channels using a are considered training sets. These sets train the GAN model
block embedding method. After applying the confusion and to generate random sequences. The process of key generation
diffusion process to the embedded image, the resultant image is shown in algorithm 1.
is a cipher image. This scheme can resist statistical and brute- The National Institute of Standards and Technology (NIST)
force attacks but cannot endure differential attacks. Another test suite [15] measures the randomness of a generated se-
disadvantage is that it works only with images of equal height quence. The randomness results are reported in TABLE I,
and width. In [12], authors created a color image encryption- where the sequences are highly random which is desirable.
then-compression technique. The color images are encrypted Compared to other methods [16]–[18] in TABLE II, this
using modulo addition 256 and then compressed using the method performs better in terms of spectral entropy and
downsampling method. Decryption and residual dense spatial approximation entropy [19].

Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on September 09,2023 at 06:31:13 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Consumer Electronics. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TCE.2023.3285626

Fig. 2: Block diagram of proposed work

Algorithm 1 Key generation TABLE II: Performance comparison


Input: Initial parameter p1 , p2 , p3 and p4 , Key size k Chaotic System Spectral Entropy Approximate Entropy
Output: Random Sequence R [16] 0.9234 0.6355
[17] 0.9264 0.6668
1: x0 , y0 = p1 , p2 [18] 0.997 1.5625
2: for n: 1 to k do Logistic Map 0.9317 0.6514
3: xn+1 , yn+1 = 1–ax2n + yn , bxn where a = 1.4, b = 0.3 Proposed Method 0.9987 1.6151
4: Store in array H
5: end for
6: x0 , y0 = p3 , p4
B. Encryption and decryption Process
7: for n: 1 to k do A secure encryption scheme is implemented based on the
8: xn+1 , yn+1 = (1 − α)f (xn ) + αf (yn ), (1 − α)f (yn ) + pseudo-random matrix generated by the GAN. First, the plain
αf (xn ) where αϵ[0, 0.5] image is partitioned into four parts according to equation 1.
9: Store in array CL
10: end for Iparts = {Ii,j , Ii,j+1 , Ii+1,j , Ii+1,j+1 } (1)
11: G = H + CL
12: R = GAN (G) where i ∈ [0, w) and j ∈ [0, h) with step of 2. In equation
13: Return R 1, adjacent pixels are separated from the image to form a
new part. It is illustrated in Fig. 3. These parts of the image
TABLE I: NIST test analysis (All P-value are random)
Statistical Test P-Value
Frequency Test (Monobit) 0.436025
Frequency Test within a Block 0.912044
Run Test 0.468747
Longest Run of Ones in a Block 0.499047
Binary Matrix Rank Test 0.463138
Discrete Fourier Transform (Spectral) Test 0.734119
Non-Overlapping Template Matching Test 0.903322
Overlapping Template Matching Test 0.665422
Maurer’s Universal Statistical Test 0.999600
Linear Complexity Test 0.281920
Serial test 0.815653
Approximate Entropy Test 0.409011
Cumulative Sums (Forward) Test 0.529616
Cumulative Sums (Reverse) Test 0.503310 Fig. 3: Partitioning of image into 4 parts
Random Excursions Test 0.892552
Random Excursions Variant Test 0.454307
are encrypted by adopting confusion and diffusion operations.
The confusion operation scrambles the pixels of each piece
to near-random positions in that part only. This operation is

Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on September 09,2023 at 06:31:13 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Consumer Electronics. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TCE.2023.3285626

accommodated by swapping the pixel values using pseudo- Algorithm 3 Decryption


random matrix R generated by GAN. The confusion operation Input: Downsampled encrypted Image E, Random matrix R
can be written as Output: Decrypted downsampled image I
1: I = copy(E)
Ik (i), Ik (R(i)) = Ik (R(i)), Ik (i) (2)
2: W,H,D = size(I)
Where, i ∈ [0, w × h × d) , k ∈ [1, 4] and Ik is kth part of 3: for r: 0 to 2 do
the plain image. After the parts of the image are confused, 4: for k: 0 to 2 do
a diffusion operation occurs. Diffusion operation mitigates 5: for i: H-1 to 0 do
the differential attack by creating an avalanche effect on the 6: I(:, i, :) = (I(:, i, :) − I(:, i − 1, :)) ⊕ R(:, i, :
pixels. In this operation, image pixels row/column are merged ) mod 256
with the previous row/column image pixels and a random 7: end for
factor, which is generated using pseudo-random matrix R. The 8: for i: W-1 to 0 do
diffusion operation can be written as 9: I(i, :, :) = (I(i, :, :) − I(i − 1, :, :)) ⊕ R(i, :, :
) mod 256
Ik (i, :, :) = ((Ik (i, :, :)⊕R(i, :, :))+Ik (i−1, :, :)) mod 256 10: end for
(3) 11: end for
12: I = flatten(I)
13: for i : W × H × D − 1 to 0 do
Ik (:, i, :) = ((Ik (:, i, :)⊕R(:, i, :))+Ik (:, i−1, :)) mod 256 14: I(i), I(R(i)) = I(R(i)), I(i)
(4) 15: end for
Where, i ∈ [0, w) and [0, h) , k ∈ [1, 4], Ik is kth part 16: I = reshape(I, [W, H, D])
of the confused image, and ⊕ is the exclusive OR operation. 17: end for
Confusion and diffusion operations are applied to each part 18: Return I
of the image for two rounds to ensure maximum security
with little loss of computational resources. The process of
C. Compression of encrypted image
encryption is further depicted in Algorithm 2.
The data size of the encrypted image is compressed by util-
Algorithm 2 Encryption ising the downsampling scheme [1]. Downsampling involves
Input: Image part I,Pseudo-random matrix R eliminating a portion of the image’s pixels to reduce the size
Output: Encrypted part E of the image by a scale parameter p, as shown in equation 5.
1: E = copy(I) Id (w, h, d) = I(w × p, h × p, d) (5)
2: W,H,D = size(E)
3: for r: 0 to 2 do Where, I and Id are encrypted and compressed encrypted
4: E = flatten(E) image respectively. w, h, and d are height, width and di-
5: for i: 0 to W × H × D do mensions of image respectively. In our proposed method, the
6: E(i), E(R(i)) = E(R(i)), E(i) scale parameter is considered as 2, which means the encrypted
7: end for image is compressed by one-fourth of its original size. The
8: E = reshape(E, [W,H,D]) detailed down-sampling algorithm is illustrated in Algorithm
9: for k: 0 to 2 do 4.
10: for i: 0 to W do Algorithm 4 Compression of encrypted image
11: E(i, :, :) = (E(i, :, :) ⊕ R(i, :, :)) + E(i − 1, :, : Input: Encrypted Image I, Scale parameter p
) mod 256 Output: Encrypted compressed image Id
12: end for
1: w, h, d = size(I)
13: for i: 0 to H do
2: Id = empty matrix of (w/p, h/p, d)
14: E(:, i, :) = (E(:, i, :) ⊕ R(:, i, :)) + E(:, i − 1, :
3: for r : 0 to d do
) mod 256
4: for i: 0 to w/p do
15: end for
5: for j : 0 to h/p do
16: end for
6: Id (i, j, r) = I(i × p, j × p, r)
17: end for
7: end for
18: Return E
8: end for
9: end for
The encrypted parts of the images are merged using the
reverse of equation 1, where the combined image will act as 10: Return Id
an encrypted image. This encrypted image is downsampled by
removing the adjacent pixels [1] and sent to the receiver.
At the receiver side, decryption process is complimentary D. Reconstruction via CSRNet
process of encryption process. It is further depicted in Algo- On the receiver side, extracting a high-resolution image
rithm 3. from its low-resolution counterpart image is a challenging task.

Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on September 09,2023 at 06:31:13 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Consumer Electronics. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TCE.2023.3285626

Fig. 4: Architecture of CSRNet

With GAN, this task is more straightforward than with the TABLE III: Architectural comparison of super resolution
algorithmic approach. This method uses CSRNet to reconstruct networks
the original image from a downsampled image. The CSRNet Features SRResNet [20] EDSR [21] MDSR [21] CSRNet
Parameters 2.04M 43M 8.02M 2.7M
comprises three parallel series of six residual blocks chained Batch Normalization Yes No No No
together, reconstructing the image’s features. An upscaling Residual Blocks 16 32 80 36
Loss MSE/VGG22/VGG54 MSE MSE ResNet152
layer is added to the network, which upscales the image to Filters 64 256 64 64
twice its size. This upscale layer is then passed through three
parallel chains of six residual blocks connected by a single
A. Experimental setup
convolution layer with three filters and a sigmoid activation
layer. The proposed framework of CSRNet is given in Fig. 4. Experiments are conducted on the Kodak 24 [22] and T91
Content loss and adversarial loss are used for training the datasets [22]. The CSRNet trained on a Tesla P100 graphics
model. Accordingly, the content loss is formulated as: processing unit with 1000 epochs, where a random sample
of 1000 images is considered from the COCO2017 dataset
SR 1 [23]. Low-resolution images are obtained by downsampling
lcontent = (ω(I HR ) − ω(G(I LR ))2 (6)
W ×H the images with a factor of 2. For optimisation, we use the
Adam optimiser with β1 = 0.9, β2 = 0.999, and ϵ=1e-8 with
where ω is feature maps obtained by last convolutional layer
a learning rate of 0.5e-4. The generator and discriminator net-
of ResNet152V2 network [20], G is generator output for I LR ,
work contains 2,701,763 and 5,779,585 trainable parameters,
W and H are width and height of the feature map and lastly
respectively.
I LR and I HR are low-resolution and high-resolution of images
from dataset respectively. Adversarial loss is formulated as
B. Results
N
SR
X Five different analyses are used to measure the perfor-
ladv = −log10 D(G(I LR )) (7) mance of our encryption method: key analysis, statistical
n=1
and differential attack analysis, key space, correlation, and
Where D and G are discriminator and generator for the entropy analysis. Three metrics are leveraged to measure the
proposed CSRNet model. The combination of these two losses performance of the reconstruction network: PSNR, structural
is called Perceptual Loss which is given as – similarity index (SSIM), and compression ratio (CR). The
time cost for the encryption and decryption process is also
lSR = lcontent
SR
+ 10−3 ladv
SR
(8) evaluated.
1) Key Analysis : The key space should not be less than
The proposed CSRNet architecture has been compared to 2100 to resist brute force attack [24]. Our method uses a 256-
other super-resolution networks [20] and [21]. The proposed bit random external key that comprises 2256 permutations. A
network has fewer parameters but still provides good visual key sensitivity test is also performed to check the sensitivity
quality and perception results in less time. TABLE III provides of the encryption key. Two keys are considered with a slightly
the architectural comparison with other networks. changed bit, and then the image is encrypted. The second
key cannot decrypt the image encrypted by the first key. We
noticed that the difference between these two encrypted images
III. E XPERIMENTS
is 99.71%. Therefore, the proposed scheme can efficiently
This part will analyze our method’s performance in security, withstand brute force attacks and is highly sensitive to en-
visual quality, compression ratio, and time complexity. cryption keys.

Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on September 09,2023 at 06:31:13 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Consumer Electronics. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TCE.2023.3285626

2) Statistical analysis : The statistical analysis is given in correlations are concentrated on the diagonal axis, which
terms of the histogram and chi-square test. The histogram means high correlations between adjacent pixels, whereas the
displays the pixel distribution of an image [25]. An encrypted encrypted correlation spread on the whole span means low
image histogram should be flat so that an attacker cannot guess correlations. This analysis indicates that the proposed scheme
any information. To measure the performance of the proposed is secure against statistical attacks.
method against statistical attacks, a histogram of the plain
image and encrypted image was plotted for each RGB channel,
as illustrated in Fig. 5. It is noteworthy that the histograms
differ from each other. Also, the encrypted image’s histogram
is uniform. The chi-square test (χ2 ) [26] was also performed
to check the uniformity of the encrypted image histogram. It
is calculated as:
255
X (Of − Ef )2
χ2 = (9)
i=0
Ef
Where Of = Observed frequency of grey levels, Ef = Expected
frequency of each grey level. The ideal test result for a signif-
icant level of 0.05 should be less than 293.2478. TABLE IV Fig. 6: (a), (b), (c), (d): Original image, correlation of
indicates the average chi-square test scores of cipher images. channels in horizontal, vertical and diagonal (e), (f), (g), (h):
All the values are lesser than the optimal score, proving that Encrypted image, correlation of channels in horizontal,
the cipher image histogram is uniform. vertical and diagonal.

4) Entropy analysis: Entropy, marked as H(S), is an


important index that describes the degree of randomness of
information per bit in an image [27]. A higher entropy value
reflects enormous randomness in the encrypted image. For any
perfectly encrypted image, a value of nearly 8 is ideal for
entropy. It is obtained by
255
X
H(S) = − (P (Si ) × log2 P (Si )) (14)
Fig. 5: (a): Original image (b): Histogram of plain image (c) i=0
Histogram of cipher image.
Where, H(S) = Entropy of message source (S) and P (Si )
= Probability of occurrence of Si The entropy value of test
3) Correlation Analysis: An encryption scheme is secure
images and the average entropy value of all images in the
against statistical attacks if it can produce an encrypted image
two datasets were computed and listed in TABLE IV. The
with negligible correlation among the adjacent pixels [27].The
maximum entropy score of the proposed scheme for encrypted
correlation coefficients between adjacent pixels in the horizon-
Kodak24 and T91 datasets are 7.9993 and 7.9988, respectively.
tal (H), vertical (V ), and diagonal (D) directions are defined
5) Differential analysis: Two metrics are used to measure
as follows:
C(x, y) the performance of the proposed framework against differen-
rx,y = p p (10) tial attacks: the number of pixels change rate (NPCR) and the
D(x) × D(y)
PK unified average change intensity (UACI) [27]. It is defined as
(xi − E(x))(yi − E(y)) 1
C(x, y) = i=1
X
(11) N P CR = D(i, j) (15)
K W × H ij
K
1 X 1 X |C1(i, j) − C2(i, j)|
D(x) = (xi − E(x))2 (12) U ACI = (16)
K i=1 W × H ij 255
K (
1 X 1, C1(i, j) ̸= C2(i, j(i, j)
D(y) = (yi − E(y))2 (13) D(i, j) = (17)
K i=1 0 otherwise
Where x, y= Coordinates of an image pixel; C(x, y) = Co- Here, C1 and C2 are ciphered images before and after pixel
variance between samples x and y; k= Nnumber of pixel pairs alteration. The ideal NPCR and UACI values for differential
(xi yi ); D(X) and D(Y )= Standard deviation of x and y, and attack protection are 99.6094% and 33.4635%, respectively
E(x)= Mean of xi pixel values. TABLE IV shows that the [27]. TABLE IV demonstrates the average value of NPCR
proposed method significantly reduced the correlation value and UACI scores with two different datasets. The NPCR and
in encrypted images to near 0 in all three directions. Fig. UACI values for the Kodak dataset are 0.9960 and 0.33460,
6 demonstrates the correlation between plain and encrypted respectively, which are near-ideal values. Thus, this work is
images in all directions and three channels. The plain image’s robust against differential attacks.

Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on September 09,2023 at 06:31:13 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Consumer Electronics. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TCE.2023.3285626

TABLE IV: Experimental result analysis


Image/ Size χ2 NPCR/ UACI Entropy Correlation Enc. /Dec. PSNR SSIM CR
Dataset (H/V/D) time(sec)
kodim03 500×500×3 233.9065 0.99493/0.33484 7.9993 -0.0015/0.0148/0.0604 0.4087/0.3771 32.47166 0.85374 0.25
kodim07 500×500×3 261.6788 0.99632/0.33429 7.9992 -0.0014/-0.0006/0.0761 0.3707/0.3815 32.21322 0.89552 0.25
kodim20 500×500×3 247.2049 0.99649/0.33471 7.9993 0.0139/-0.0037/0.0049 0.3728/0.3763 33.52683 0.90443 0.25
t12 114×120×3 247.8680 0.99554/0.33354 7.9903 -0.0066/-0.0075/-0.0041 0.0318/0.0317 36.20484 0.93084 0.25
t20 78×78×3 252.2084 0.99607/0.33420 7.9954 -0.0042/0.0065/-0.0203 0.0139/0.0173 37.04623 0.94561 0.25
t21 124×112×3 246.3501 0.99591/0.33319 7.9870 0.0059/0.0121/-0.0063 0.0313/0.0312 36.61870 0.88317 0.25
t30 136×152×3 250.5002 0.99449/0.33504 7.9947 -0.0078/0.0008/-0.0269 0.044/0.0455 36.15190 0.93839 0.25
Kodak24 500×500×3 256.8882 0.99604/0.33460 7.9993 0.0007/0.0017/0.0018 0.3772/0.3774 32.39478 0.85222 0.25
T91 Variable 255.5838 0.99616/0.33463 7.9951 -0.0011/0.0008/-0.0020 0.1106/0.1027 34.62989 0.90686 0.25

TABLE V: Security and time cost comparison of our method and five existing methods
Scheme Size NPCR UACI Correlation Entropy Enc/Dec
(H/V/D) (sec)
[1] 256×256×3 99.60948 33.45977 -0.00106/0.008263/0.00548 7.99935 0.134442/0.134442
[6] 512×512×3 99.6099 33.5061 0.0003/0.0008/0.0007 7.9973 0.922003/0.841457
[7] 512×512×3 99.6093 33.4798 0.0021 /0.0012/0.0017 7.9975 0.2399/-
[8] 512×512×3 99.6082 33.444 0.013/0.0141/-0.0258 7.9975 1.384/1.628
[9] 256×256×3 99.63333 33.47333 0.0005/0.001667/-0.0033 7.9971 1.7715/1.5159
Proposed 512×512×3 99.602 33.462 -0.0018/-0.0018/0.0048 7.999307 0.4326/0.4326

C. Compared methods TABLE VI: Comparison of reconstruction quality with


benchmark methods
Security and time cost comparison of this method and five
existing methods [1], [6-9] are given in TABLE V, indicating Scheme PSNR SSIM
SRResNet [20] 28.49 0.8184
the proposed method gets the best security results. To resist EDSR [21] 32.32 0.9013
the differential attack, the NPCR and UACI values should MDSR [21] 32.29 0.9007
be N P CR ≃ 99.6094% and U ACI ≃ 33.4635%. Further, CSRNet (Proposed) 34.6299 0.90686
a secure encryption scheme shall disrupt this correlation to
improve resistance against statistical analysis, i.e. correlation
coefficient between adjacent pixels is near to 0. Furthermore, IV. C ONCLUSION
entropy value should be 8 to show the high randomness in the This paper proposes a new method of encryption-then-
encrypted image. The proposed algorithm reckons the NPCR, compression based on the GAN model from encryption to re-
UACI, correlation coefficient, and entropy score are 99.602%, construction of an image. First, we generate a pseudo-random
33.462%, -0.0018(H)/-0.0018(V)/0.0048(D), and 7.999, re- number using the GAN model. Coupled logistics and Henon
spectively. The encryption cost of the proposed scheme is less map sequences allow the model to generate a secure key for
by nearly 58%, 68%, and 75% compared to techniques used in the encryption procedure. While it was established that mul-
[6], [8], and [9], respectively. Therefore, the proposed scheme tiple chaos-based image encryption schemes provide greater
is efficient and highly secure. security, this key is used to perform encryption/decryption
operations to achieve high security. Then, the encrypted image
D. Reconstruction analysis
is downsampled into one-fourth of the original size and sent to
In TABLE IV, three metrics are used to measure the perfor- the receiver. Finally, a CSRNet reconstructs the original image
mance of the proposed reconstruction framework: the PSNR, from the downsampled data. The experimental results on two
SSIM, and CR [28]. A large PSNR and SSIM result means standard datasets show that the proposed method is secure
a better-reconstructed performance. Specifically, we obtain at a low cost and has good compression and reconstruction
maximum scores of 37.04623 dB and 0.94561, respectively. performance. The proposed method has higher security, lower
The CR of 0.25 show that the proposed method compresses the time costs, and significant reconstruction quality than other
images to one-fourth of their original size. Table VI shows the advanced methods. Further studies will focus on the security
comparison of reconstruction quality with benchmark meth- of deep learning models.
ods. This analysis shows that the proposed scheme effectively
reconstructs high-quality images with significant compression
performance. R EFERENCES
[1] K. N. Singh, N. Baranwal, O. P. Singh, and A. K. Singh, “Sielnet: 3d
E. Time Cost Analysis chaotic-map-based secure image encryption using customized residual
TABLE IV demonstrates the encryption and decryption dense spatial network,” IEEE Transactions on Consumer Electronics,
2022.
time cost for the proposed method. It required an average [2] A. Naguib, W. El-Shafai, and M. Shokair, “Performance evaluation of an
of 0.3772/0.3774 seconds and 0.1106/0.1027 seconds to en- encrypted color image transmission over wireless network with different
crypt/decrypt the Kodak24 and T91 datasets, respectively. chaotic-based techniques,” Journal of Optics, pp. 1–10, 2023.
[3] Y. Wu, L. Zhang, S. Berretti, and S. Wan, “Medical image encryption by
This method shows a clear advantage on a tested dataset for content-aware dna computing for secure healthcare,” IEEE Transactions
practical applications. on Industrial Informatics, vol. 19, no. 2, pp. 2089–2098, 2022.

Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on September 09,2023 at 06:31:13 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Consumer Electronics. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TCE.2023.3285626

[4] S. Rani, D. Gupta, S. Garg, M. J. Piran, and M. S. Hossain, “Con- [27] M. Singh and A. K. Singh, “A comprehensive survey on encryption
sumer electronic devices: evolution and edge security solutions,” IEEE techniques for digital images,” Multimedia Tools and Applications, pp.
Consumer Electronics Magazine, vol. 11, no. 2, pp. 15–20, 2021. 1–33, 2022.
[5] X. Zhang and Z. Gong, “Color image encryption algorithm based [28] K. N. Singh and A. K. Singh, “Towards integrating image encryption
on 3d zigzag transformation and view planes,” Multimedia Tools and with compression: a survey,” ACM Transactions on Multimedia Com-
Applications, vol. 81, no. 22, pp. 31 753–31 785, 2022. puting, Communications, and Applications (TOMM), vol. 18, no. 3, pp.
[6] J. Xin, H. Hu, and J. Zheng, “3d variable-structure chaotic system and 1–21, 2022.
its application in color image encryption with new rubik’s cube-like
permutation,” Nonlinear Dynamics, pp. 1–24, 2023.
[7] Q. Lai, G. Hu, U. Erkan, and A. Toktas, “A novel pixel-split image
encryption scheme based on 2d salomon map,” Expert Systems with
Applications, vol. 213, p. 118845, 2023.
[8] X. Wang, M. Zhao, S. Feng, and X. Chen, “An image encryption scheme
using bit-plane cross-diffusion and spatiotemporal chaos system with
nonlinear perturbation,” Soft Computing, pp. 1–18, 2023.
[9] X. Chen, M. Gong, Z. Gan, Y. Lu, X. Chai, and X. He, “Cie-lscp:
color image encryption scheme based on the lifting scheme and cross-
component permutation,” Complex & Intelligent Systems, pp. 1–24,
2022.
[10] X. Chai, Y. Tian, Z. Gan, Y. Lu, X.-J. Wu, and G. Long, “A robust
compressed sensing image encryption algorithm based on gan and cnn,”
Journal of Modern Optics, vol. 69, no. 2, pp. 103–120, 2022.
[11] Y. Liu, G. Cen, B. Xu, X. Wang et al., “Color image encryption based
on deep learning and block embedding,” Security and Communication
Networks, vol. 2022, 2022.
[12] C. Wang, T. Zhang, H. Chen, Q. Huang, J. Ni, and X. Zhang, “A
novel encryption-then-lossy-compression scheme of color images using
customized residual dense spatial network,” IEEE Transactions on
Multimedia, 2022.
[13] M. T. Elkandoz and W. Alexan, “Image encryption based on a combi-
nation of multiple chaotic maps,” Multimedia Tools and Applications,
vol. 81, no. 18, pp. 25 497–25 518, 2022.
[14] Z. Man, J. Li, X. Di, X. Liu, J. Zhou, J. Wang, and X. Zhang, “A novel
image encryption algorithm based on least squares generative adversarial
network random number generator,” Multimedia Tools and Applications,
vol. 80, pp. 27 445–27 469, 2021.
[15] K. N. Singh, O. P. Singh, A. K. Singh, and A. K. Agrawal, “Eimol:
A secure medical image encryption algorithm based on optimization
and the lorenz system,” ACM Transactions on Multimidia Computing
Communications and Applications, 2022.
[16] Q. Lu, C. Zhu, and G. Wang, “A novel s-box design algorithm based
on a new compound chaotic system,” Entropy, vol. 21, no. 10, p. 1004,
2019.
[17] B. Yosefnezhad Irani, P. Ayubi, F. Amani Jabalkandi, M. Yousefi Valan-
dar, and M. Jafari Barani, “Digital image scrambling based on a new
one-dimensional coupled sine map,” Nonlinear Dynamics, vol. 97, no. 4,
pp. 2693–2721, 2019.
[18] P. Fang, H. Liu, C. Wu, and M. Liu, “A secure chaotic block image
encryption algorithm using generative adversarial networks and dna
sequence coding,” Mathematical Problems in Engineering, vol. 2021,
pp. 1–26, 2021.
[19] L. Gong, R. Wu, and N. Zhou, “A new 4d chaotic system with coexisting
hidden chaotic attractors,” International Journal of Bifurcation and
Chaos, vol. 30, no. 10, p. 2050142, 2020.
[20] C. Ledig, L. Theis, F. Huszár, J. Caballero, A. Cunningham, A. Acosta,
A. Aitken, A. Tejani, J. Totz, Z. Wang et al., “Photo-realistic single
image super-resolution using a generative adversarial network,” in
Proceedings of the IEEE conference on computer vision and pattern
recognition, 2017, pp. 4681–4690.
[21] B. Lim, S. Son, H. Kim, S. Nah, and K. Mu Lee, “Enhanced deep
residual networks for single image super-resolution,” in Proceedings
of the IEEE conference on computer vision and pattern recognition
workshops, 2017, pp. 136–144.
[22] “[Online],” Available: https://www.kaggle.com/datasets/jesucristo/
super-resolution-benchmarks.
[23] “[Online],” Available: https://www.kaggle.com/datasets/awsaf49/
coco-2017-dataset.
[24] G. Alvarez and S. Li, “Some basic cryptographic requirements for chaos-
based cryptosystems,” International journal of bifurcation and chaos,
vol. 16, no. 08, pp. 2129–2151, 2006.
[25] S. T. Kamal, K. M. Hosny, T. M. Elgindy, M. M. Darwish, and M. M.
Fouda, “A new image encryption algorithm for grey and color medical
images,” IEEE Access, vol. 9, pp. 37 855–37 865, 2021.
[26] A. Banu S and R. Amirtharajan, “A robust medical image encryption in
dual domain: chaos-dna-iwt combined approach,” Medical & biological
engineering & computing, vol. 58, pp. 1445–1458, 2020.

Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on September 09,2023 at 06:31:13 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.

You might also like