New Framework of Robust Image Encryption

被引:0
|
作者
Huang, Lin [1 ]
Qin, Chuan [1 ]
Feng, Guorui [2 ]
Luo, Xiangyang [3 ]
Zhang, Xinpeng [2 ]
机构
[1] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai, Peoples R China
[2] Shanghai Univ, Sch Commun & Informat Engn, Shanghai, Peoples R China
[3] State Key Lab Math Engn & Adv Comp, Zhengzhou, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划; 上海市自然科学基金;
关键词
Image Encryption; Invertible Neural Network; Robustness; Information Reinforcement Module; End-to-End;
D O I
10.1145/3712601
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Designing an end-to-end encryption method for images using the non-linear properties of deep neural networks (DNNs) has gradually attracted the attention of researchers. In this article, we introduce a new framework for DNN-based image encryption that embeds a plaintext image as a secret message into a random noise to obtain a ciphertext image. Based on this, we propose an end-to-end robust image encryption method based on the invertible neural network (INN), which can realize secure encryption and resistance to common image processing attacks. Specifically, the INN is exploited as the shared-parameter encoder and decoder to achieve end-to-end encryption and decryption. The ciphertext image can be obtained through the forward process of the INN by inputting the plaintext image and the key, while the decrypted image can be obtained through the backward process of the INN by inputting the ciphertext image and the key. To enhance the security of our method, we design an information reinforcement module to guarantee the encryption effect and the sensitivity of the key. In addition, to improve the robustness of our method, an attack layer is employed for noise simulation training. Experimental results show that our method not only can realize secure encryption but also can achieve the robustness such as resisting JPEG compression, Gaussian noise, scaling, mean filtering, and Gaussian blurring effectively.
引用
收藏
页数:22
相关论文
共 50 条
  • [21] A Robust Image Encryption Scheme Over Wireless Channels
    Liu, Dan-hua
    Shi, Guang-ming
    Gao, Da-hua
    Gao, Min
    2009 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2009), 2009, : 731 - 736
  • [22] A new image encryption method: parallel sub-image encryption with hyper chaos
    Omid Mirzaei
    Mahdi Yaghoobi
    Hassan Irani
    Nonlinear Dynamics, 2012, 67 : 557 - 566
  • [23] A robust framework for eigenspace image reconstruction
    Tong, YX
    Wen, ZH
    Yang, ST
    WACV 2005: SEVENTH IEEE WORKSHOP ON APPLICATIONS OF COMPUTER VISION, PROCEEDINGS, 2005, : 54 - 59
  • [24] Robust Chaos Image Encryption System using Modification Logistic Map, Gingerbread Man and Arnold Cat Map Robust Chaos Image Encryption System
    Ibrahim, Lina Jamal
    Idoko, John Bush
    Alwhelat, Almuntadher M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (06) : 1305 - 1316
  • [25] A new image encryption method: parallel sub-image encryption with hyper chaos
    Mirzaei, Omid
    Yaghoobi, Mahdi
    Irani, Hassan
    NONLINEAR DYNAMICS, 2012, 67 (01) : 557 - 566
  • [26] A new chaotic algorithm for image encryption
    Gao, HJ
    Zhang, YS
    Liang, SY
    Li, DQ
    CHAOS SOLITONS & FRACTALS, 2006, 29 (02) : 393 - 399
  • [27] A New Image Encryption and Steganography Scheme
    Tang, Hongmei
    Jin, Gaochan
    Wu, Cuixia
    Song, Peijiao
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 60 - 63
  • [28] New chaotic cryptosystem for the image encryption
    Merzoug A.
    Ali-Pacha A.
    Hadj-Said N.
    International Journal of Information and Computer Security, 2020, 12 (04) : 450 - 463
  • [29] A New Cryptology Approach for Image Encryption
    Sethi, Nidhi
    Sharma, Deepika
    2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 905 - 908
  • [30] A new chaotic algorithm for image encryption
    Zhang, Xin
    Chen, Weibin
    2008 INTERNATIONAL CONFERENCE ON AUDIO, LANGUAGE AND IMAGE PROCESSING, VOLS 1 AND 2, PROCEEDINGS, 2008, : 889 - 892