Comparative Analysis of CryptoGAN: Evaluating Quality Metrics and Security in GAN-based Image Encryption
Abstract
Keywords
Full Text:
PDFReferences
P. Sharma, A. Singh, S. Raheja, and K. K. Singh, "Automatic vehicle detection using spatial time frame and object-based classification," Journal of Intelligent & Fuzzy Systems, vol. 37, no. 6, pp. 8147-8157, 2019, doi: 10.3233/jifs-190593.
J. S. Teh, M. Alawida, and Y. C. Sii, "Implementation and practical problems of chaos-based cryptography revisited," Journal of Information Security and Applications, vol. 50, p. 102421, 2020, doi: 10.1016/j.jisa.2019.102421.
P. Singh, N. Singh, K. K. Singh, and A. Singh, "Diagnosing of disease using machine learning," Machine Learning and the Internet of Medical Things in Healthcare, pp. 89-111, 2021, doi: 10.1016/b978-0-12-821229-5.00003-3.
W. Sirichotedumrong and H. Kiya, "A GAN-Based Image Transformation Scheme for Privacy-Preserving Deep Neural Networks," 2020 28th European Signal Processing Conference (EUSIPCO), pp. 745-749, 2021, doi: 10.23919/eusipco47968.2020.9287532.
A. Mokhnache and L. Ziet, “Cryptanalysis of a Pixel Permutation Based Image Encryption Technique Using Chaotic Map,” Traitement du Signal, vol. 37, no. 1, pp. 95-100, 2020, doi: 10.18280/ts.370112.
X. Wang and J. Yang, "A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient," Information Sciences, vol. 569, pp. 217-240, 2021, doi: 10.1016/j.ins.2021.04.013.
X. Wang and X. Chen, "An image encryption algorithm based on dynamic row scrambling and Zigzag transformation," Chaos Solitons & Fractals, vol. 147, p. 110962, 2021, doi: 10.1016/j.chaos.2021.110962.
B. Rahul, K. Kuppusamy, and A. Senthilrajan, “Dynamic DNA cryptography-based image encryption scheme using multiple chaotic maps and SHA-256 hash function,” Optik, vol. 289, p. 171253, 2023, doi: 10.1016/j.ijleo.2023.171253.
X. Wang and S. Gao, "Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network," Information Sciences, vol. 539, pp. 195-214, 2020, doi: 10.1016/j.ins.2020.06.030.
K. Panwar, R. K. Purwar, and G. Srivastava, “A Fast Encryption Scheme Suitable for Video Surveillance Applications Using SHA-256 Hash Function and 1D Sine–Sine Chaotic Map,” International Journal of Image and Graphics, vol. 21, no. 2, p. 2150022, 2020, doi: 10.1142/s0219467821500224.
K. Sahu, G. Swain, M. Sahu, and J. Hemalatha, "Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP," Journal of Information Security and Applications, vol. 58, p. 102808, 2021, doi: 10.1016/j.jisa.2021.102808.
A. K. Sahu and M. Sahu, “Digital image steganography and steganalysis: A journey of the past three decades,” Open Computer Science, vol. 10, no. 1, pp. 296-342, 2020, doi: 10.1515/comp-2020-0136.
Z. Bao, R. Xue, and Y. Jin, “Image scrambling adversarial autoencoder based on the asymmetric encryption,” Multimedia Tools and Applications, vol. 80, no. 18, pp. 28265-28301, 2021, doi: 10.1007/s11042-021-11043-3.
F. Sherif, W. A. Mohamed, and A. Mohra, “Skin Lesion Analysis Toward Melanoma Detection Using Deep Learning Techniques,” International Journal of Electronics and Telecommunications, pp. 597-602, 2019, doi: 10.24425/ijet.2019.129818.
C. Zhang, P. Benz, A. Karjauv, and I. S. Kweon, "Universal Adversarial Perturbations Through the Lens of Deep Steganography: Towards a Fourier Perspective," Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, no. 4, pp. 3296-3304, 2021, doi: 10.1609/aaai.v35i4.16441.
Z. Bao and R. Xue, "Research on the avalanche effect of image encryption based on the Cycle-GAN," Applied Optics, vol. 60, no. 18, p. 5320, 2021, doi: 10.1364/ao.428203.
S. R. Maniyath and T. V, “An efficient image encryption using deep neural network and chaotic map,” Microprocessors and Microsystems, vol. 77, p. 103134, 2020, doi: 10.1016/j.micpro.2020.103134.
Y. Ding, “DeepEDN: A Deep-Learning-Based Image Encryption and Decryption Network for Internet of Medical Things,” IEEE Internet of Things Journal, vol. 8, no. 3, pp. 1504-1518, 2021, doi: 10.1109/jiot.2020.3012452.
W. Shi and S. Liu, “Hiding Message Using a Cycle Generative Adversarial Network,” ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 18, no. 3, pp. 1-15, 2022, doi: 10.1145/3495566.
Z. Man, J. Li, X. Di, Y. Sheng, and Z. Liu, “Double image encryption algorithm based on neural network and chaos,” Chaos, Solitons & Fractals, vol. 152, p. 111318, 2021, doi: 10.1016/j.chaos.2021.111318.
Y. Ding, F. Tan, Z. Qin, M. Cao, K.-K. R. Choo, and Z. Qin, “DeepKeyGen: A Deep Learning-Based Stream Cipher Generator for Medical Image Encryption and Decryption,” IEEE Transactions on Neural Networks and Learning Systems, vol. 33, no. 9, pp. 4915-4929, 2022, doi: 10.1109/tnnls.2021.3062754.
C. Wang and Y. Zhang, “A novel image encryption algorithm with deep neural network,” Signal Processing, vol. 196, p. 108536, 2022, doi: 10.1016/j.sigpro.2022.108536.
Y. Sang, J. Sang, and M. S. Alam, “Image encryption based on logistic chaotic systems and deep autoencoder,” Pattern Recognition Letters, vol. 153, pp. 59-66, 2022, doi: 10.1016/j.patrec.2021.11.025.
R. Meng, Q. Cui, Z. Zhou, Z. Fu, and X. Sun, "A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things," IEEE Access, vol. 7, pp. 90574-90584, 2019, doi: 10.1109/access.2019.2920956.
K. Panwar, R. K. Purwar, and A. Jain, “Cryptanalysis and Improvement of a Color Image Encryption Scheme Based on DNA Sequences and Multiple 1D Chaotic Maps,” International Journal of Bifurcation and Chaos, vol. 29, no. 8, p. 1950103, 2019, doi: 10.1142/s0218127419501037.
T. Asanuma and T. Isobe, “Even-Mansour Space-hard Cipher: White-box Cryptography Cipher Meets Physically Unclonable Function,” Journal of Information Processing, vol. 31, pp. 88-96, 2023, doi: 10.2197/ipsjjip.31.88.
L. Chen, C. Li, and C. Li, “Security measurement of a medical communication scheme based on chaos and DNA coding,” Journal of Visual Communication and Image Representation, vol. 83, p. 103424, 2022, doi: 10.1016/j.jvcir.2021.103424.
L. Wang and H. Cheng, "Pseudo-Random Number Generator Based on Logistic Chaotic System," Entropy, vol. 21, no. 10, p. 960, 2019, doi: 10.3390/e21100960.
R. M. R. Guddeti, “Exploiting skeleton-based gait events with attention-guided residual deep learning model for human identification,” Applied Intelligence, vol. 53, no. 23, pp. 28711-28729, 2023, doi: 10.1007/s10489-023-05019-z.
A. Arifianto, "EDGAN: Disguising Text as Image using Generative Adversarial Network," 2020 3rd International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), pp. 1-6, 2020, doi: 10.1109/ISRTI51436.2020.9315474.
J. Chen, X.-W. Li, and Q.-H. Wang, “Deep Learning for Improving the Robustness of Image Encryption,” IEEE Access, vol. 7, pp. 181083-181091, 2019, doi: 10.1109/access.2019.2959031.
X. Dong, “Automatic multiorgan segmentation in thorax CT images using U‐net‐GAN,” Medical Physics, vol. 46, no. 5, pp. 2157-2168, 2019, doi: 10.1002/mp.13458.
C. Li, X. Shen, and S. Liu, “Cryptanalyzing an Image Encryption Algorithm Underpinned by 2-D Lag-Complex Logistic Map,” IEEE MultiMedia, vol. 31, no. 1, pp. 99-109, 2024, doi: 10.1109/mmul.2024.3356494.
M. Lawnik and M. Berezowski, “New Chaotic System: M-Map and Its Application in Chaos-Based Cryptography,” Symmetry, vol. 14, no. 5, p. 895, 2022, doi: 10.3390/sym14050895.
C. Li, B. Feng, S. Li, J. Kurths, and G. Chen, “Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 66, no. 6, pp. 2322-2335, 2019, doi: 10.1109/tcsi.2018.2888688.
X. Lu, C. Li, and K. Tan, “Network Analysis of Chebyshev Polynomial in a Fixed-precision Digital Domain,” 2021 40th Chinese Control Conference (CCC), pp. 8634-8638, 2021, doi: 10.23919/ccc52363.2021.9550220.
Y. Wu, Y. Wan, L. Tang, and W. Xiong, "A Generative Adversarial Network-based Approach to Image Synthesis with Self-Attention Mechanism," in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3824-3833, 2020, doi: 10.1109/CVPR42600.2020.00382.
M. Shafiq and Z. Gu, “Deep Residual Learning for Image Recognition: A Survey,” Applied Sciences, vol. 12, no. 18, p. 8972, 2022, doi: 10.3390/app12188972.
D. Kumar, A. B. Joshi, S. Singh, and V. N. Mishra, “Digital color-image encryption scheme based on elliptic curve cryptography ElGamal encryption and 3D Lorenz map,” International conference on recent trends in applied mathematical sciences (ICRTAMS-2020), vol. 2364, no. 1, 2021, doi: 10.1063/5.0062877.
A. Bose, A. Kumar, M. K. Hota, and S. Sherki, “Steganography Method Using Effective Combination of RSA Cryptography and Data Compression,” 2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT), pp. 1-5, 2022, doi: 10.1109/iceeict53079.2022.9768402.
Z. Zhang, G. Fu, F. Di, C. Li, and J. Liu, “Generative Reversible Data Hiding by Image-to-Image Translation via GANs,” Security and Communication Networks, vol. 2019, pp. 1-10, 2019, doi: 10.1155/2019/4932782.
M. Hasani and H. Khotanlou, “An Empirical Study on Position of the Batch Normalization Layer in Convolutional Neural Networks,” 2019 5th Iranian Conference on Signal Processing and Intelligent Systems (ICSPIS), pp. 1-4, 2019, doi: 10.1109/icspis48872.2019.9066113.
B. François, S. Thao, and M. Vrac, “Adjusting spatial dependence of climate model outputs with Cycle-Consistent Adversarial Networks,” Climate dynamics, vol. 57, no. 11, pp. 3323-3353, 2021, doi: 10.21203/rs.3.rs-299929/v1.
R. Cakaj, J. Mehnert, and B. Yang, “Spectral Batch Normalization: Normalization in the Frequency Domain,” 2023 International Joint Conference on Neural Networks (IJCNN), pp. 1-10, 2023, doi: 10.1109/ijcnn54540.2023.10191931.
N. Subramanian, O. Elharrouss, S. Al-Maadeed, and A. Bouridane, “Image Steganography: A Review of the Recent Advances,” IEEE Access, vol. 9, pp. 23409-23423, 2021, doi: 10.1109/access.2021.3053998.
X. Duan, K. Jia, B. Li, D. Guo, E. Zhang, and C. Qin, “Reversible Image Steganography Scheme Based on a U-Net Structure,” IEEE Access, vol. 7, pp. 9314-9323, 2019, doi: 10.1109/access.2019.2891247.
Q. Zhou, X. Wang, M. Jin, L. Zhang, and B. Xu, “Optical image encryption based on two-channel detection and deep learning,” Optics and Lasers in Engineering, vol. 162, p. 107415, 2023, doi: 10.1016/j.optlaseng.2022.107415.
Z. Zheng, H. Liu, Z. Yu, H. Zheng, Y. Wu, Y. Yang, and J. Shi, "EncryptGAN: Image steganography with domain transform," arXiv:1905.11582, 2019.
K. SundaraKrishnan, R. SP, and J. B, “A Symmetric Key Multiple Color Image Cipher Based on Cellular Automata, Chaos Theory and Image Mixing,” Information Technology and Control, vol. 50, no. 1, pp. 55-75, 2021, doi: 10.5755/j01.itc.50.1.28012.
Y. Wang, “Multiple color image encryption based on cascaded quaternion gyrator transforms,” Signal Processing: Image Communication, vol. 107, p. 116793, 2022, doi: 10.1016/j.image.2022.116793.
G. Ye, C. Pan, X. Huang, Z. Zhao, and J. He, "A chaotic image encryption algorithm based on information entropy," Int. J. Bifurcat. Chaos, vol. 28, no. 01, p. 1850010, 2018, doi: 10.1142/S0218127418500104.
J. Zhang and D. Huo, “Image encryption algorithm based on quantum chaotic map and DNA coding,” Multimedia Tools and Applications, vol. 78, no. 11, pp. 15605-15621, 2018, doi: 10.1007/s11042-018-6973-6.
M. Kumari and S. Gupta, “A Novel Image Encryption Scheme Based on Intertwining Chaotic Maps and RC4 Stream Cipher,” 3D Research, vol. 9, no. 1, 2018, doi: 10.1007/s13319-018-0162-2.
B. Zhang, B. Rahmatullah, S. L. Wang, and Z. Liu, “A plain-image correlative semi-selective medical image encryption algorithm using enhanced 2D-logistic map,” Multimedia Tools and Applications, vol. 82, no. 10, pp. 15735-15762, 2022, doi: 10.1007/s11042-022-13744-9.
Q. Zhang and J. Li, “Single Exposure Phase-Only Optical Image Encryption and Hiding Method via Deep Learning,” IEEE Photonics Journal, vol. 14, no. 1, pp. 1-8, 2022, doi: 10.1109/jphot.2022.3146456.
D. F. Santos, “Chaos-based Digital Image Encryption Using Unique Iris Features,” International Journal of Applied Engineering Research, vol. 15, no. 4, p. 358, 2020, doi: 10.37622/ijaer/15.4.2020.358-363.
M. Alkhelaiwi, W. Boulila, J. Ahmad, A. Koubaa, and M. Driss, “An Efficient Approach Based on Privacy-Preserving Deep Learning for Satellite Image Classification,” Remote Sensing, vol. 13, no. 11, p. 2221, 2021, doi: 10.3390/rs13112221.
Y. Al Najjar, “Comparative Analysis of Image Quality Assessment Metrics: MSE, PSNR, SSIM and FSIM,” International Journal of Science and Research (IJSR), vol. 13, no. 3, pp. 110-114, 2024, doi: 10.21275/sr24302013533.
Y. Reznik, “Another look at SSIM image quality metric,” Electronic Imaging, vol. 35, no. 8, 2023, doi: 10.2352/ei.2023.35.8.iqsp-305.
M. Martini, “On the relationship between SSIM and PSNR for DCT-based compressed images and video: SSIM as content-aware PSNR,” Authorea Preprints, 2023, doi: 10.36227/techrxiv.21725390.
D. R. I. M. Setiadi, “PSNR vs SSIM: imperceptibility quality assessment for image steganography,” Multimedia Tools and Applications, vol. 80, no. 6, pp. 8423-8444, 2020, doi: 10.1007/s11042-020-10035-z.
U. Sara, M. Akter, and M. S. Uddin, “Image Quality Assessment through FSIM, SSIM, MSE and PSNR—A Comparative Study,” Journal of Computer and Communications, vol. 7, no. 3, pp. 8-18, 2019, doi: 10.4236/jcc.2019.73002.
L. M. H. Yepdia and A. Tiedeu, “Secure Transmission of Medical Image for Telemedicine,” Sensing and Imaging, vol. 22, no. 1, 2021, doi: 10.1007/s11220-021-00340-8.
P. Udayakumar and N. Rajagopalan, “(Retracted) Blockchain enabled secure image transmission and diagnosis scheme in medical cyber-physical systems,” Journal of Electronic Imaging, vol. 31, no. 6, 2022, doi: 10.1117/1.jei.31.6.062002.
A. Orman, “Image Retrieval Using Pixel Similarity,” Research Square, 2023, doi: 10.21203/rs.3.rs-3311259/v1.
M. H. Shaheen, “Proposed Hybrid Encryption Framework for Reliable 3-D Wireless Video Communications,” Hybrid Encryption Algorithms Over Wireless Communication Channels, pp. 82-103, 2021, doi: 10.1201/9781003051428-5.
R. S. Ali, M. K. Ibrahim, and S. N. Alsaad, “Fast and Secure Image Encryption System Using New Lightweight Encryption Algorithm,” TEM Journal, pp. 198-206, 2024, doi: 10.18421/tem131-20.
M. Li, Q. Cui, X. Wang, Y. Zhang, and Y. Xiang, “Ftpe-Bc: Fast Thumbnail-Preserving Image Encryption Using Block-Churning,” Available at SSRN 4698446, 2024, doi: 10.2139/ssrn.4698446.
D. Koeglmayr and C. Räth, “A fast reservoir computing based image encryption algorithm,” 2023 International Joint Conference on Neural Networks (IJCNN), pp. 1-7, 2023, doi: 10.1109/ijcnn54540.2023.10191083.
H. Ghanbari, R. Enayatifar, and H. Motameni, “A Fast Image Encryption based on Linear Feedback Shift Register and Deoxyribonucleic acid,” Research Square, 2022, doi: 10.21203/rs.3.rs-1662684/v1.
F. Neri, “An Introduction to Computational Complexity,” Linear Algebra for Computational Sciences and Engineering, pp. 419-432, 2019, doi: 10.1007/978-3-030-21321-3_11.
D.-G. Cheroiu, M. Raducanu, and C. M. Nitu, “Fast Image Encryption Algorithm Based on Multiple Chaotic Maps,” 2022 14th International Conference on Communications (COMM), pp. 1-4, 2022, doi: 10.1109/comm54429.2022.9817317.
Z. Liu, J. Y. Liu, L. Y. Zhang, Y. Zhao, and X. F. Gong, “Performance of the 2D Coupled Map Lattice Model and Its Application in Image Encryption,” Complexity, vol. 2022, no. 1, 2022, doi: 10.1155/2022/5193618.
C. F. Foo and S. Winkler, “Image Data Augmentation with Unpaired Image-to-Image Camera Model Translation,” 2022 IEEE International Conference on Image Processing (ICIP), pp. 3246-3250, 2022, doi: 10.1109/icip46576.2022.9897671.
M. S. Fadhil, A. K. Farhan, and M. N. Fadhil, “Designing Substitution Box Based on the 1D Logistic Map Chaotic System,” IOP Conference Series: Materials Science and Engineering, vol. 1076, no. 1, p. 012041, 2021, doi: 10.1088/1757-899x/1076/1/012041.
U. Erkan, A. Toktas, S. Enginoğlu, E. Akbacak, and D. N. H. Thanh, “An image encryption scheme based on chaotic logarithmic map & key generation using deep CNN,” Multimedia Tools & Applications, vol. 81, no. 5, pp. 7365-7391, 2022, doi: 10.1007/s11042-021-11803-1.
Z. Wang, “Data Hiding with Deep Learning: A Survey Unifying Digital Watermarking and Steganography,” IEEE Transactions on Computational Social Systems, vol. 10, no. 6, pp. 2985-2999, 2023, doi: 10.1109/tcss.2023.326895.
S. Haunts, “Hybrid Encryption,” Applied Cryptography in .NET and Azure Key Vault, pp. 113-141, 2019, doi: 10.1007/978-1-4842-4375-6_9.
M. S. Alam, D. Wang, and A. Sowmya, “Image data augmentation for improving performance of deep learning-based model in pathological lung segmentation,” 2021 Digital Image Computing: Techniques and Applications (DICTA), pp. 1-5, 2021, doi: 10.1109/dicta52665.2021.9647209.
L. Tong, P. Xia, and T. Lv, “Research on Quantum Secure Route Model and Line Model Image Encryption Technology Based on Big Data Technology,” 2022 International Conference on Cloud Computing, Big Data Applications and Software Engineering (CBASE), pp. 115-118, 2022, doi: 10.1109/cbase57816.2022.00028.
F. S. Abas and R. Arulmurugan, “Radix Trie improved Nahrain chaotic map-based image encryption model for effective image encryption process,” International Journal of Intelligent Networks, vol. 3, pp. 102-108, 2022, doi: 10.1016/j.ijin.2022.08.002.
DOI: https://doi.org/10.18196/jrc.v5i5.23096
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 Ranjith Bhat, Raghu Nanjundegowda
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Journal of Robotics and Control (JRC)
P-ISSN: 2715-5056 || E-ISSN: 2715-5072
Organized by Peneliti Teknologi Teknik Indonesia
Published by Universitas Muhammadiyah Yogyakarta in collaboration with Peneliti Teknologi Teknik Indonesia, Indonesia and the Department of Electrical Engineering
Website: http://journal.umy.ac.id/index.php/jrc
Email: jrcofumy@gmail.com