Optical Image Encryption Vulnerability Detection by Using Generative Adversarial Networks

被引:1
|
作者
Yu, Runchao [1 ]
Tu, Xiaowei [1 ]
Yang, Jianming [1 ]
Yang, Qinghua [1 ]
机构
[1] Shanghai Univ, Inst Mechatron & Automat, Shanghai, Peoples R China
关键词
optical encryption; computer generated hologram (CGH); deep Learning (DL); generative Adversarial Networks (GAN);
D O I
10.1109/CAC51589.2020.9327816
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although the rapid development of science and technology makes information transmission more convenient, it also brings about information leakage. Therefore, information needs to be encrypted. Among many encryption methods, optical encryption based on computer generated hologram (CGII) is very popular for its parallelism and low cost. Generally, unauthorized receivers are unable to realize decoding without the encryption rule, security key or decryption instrument. However, the vulnerability and security of CGH based optical encryption has not been verified effectively. In this paper, a new type of Deep Learning (DL) framework based on Generative Adversarial Networks (GAN) is proposed to restore unknown plaintexts. Unauthorized users can extract information from encrypted images by the learning model without a direct retrieval of the encryption rule or security key. Meanwhile, a classification network is added into GAN to improve its classification accuracy. Experimental results show that the convolutional neural network (CNN) is robust to the encryption rule. The applicability of this network for different optical encryption algorithms is also verified. The proposed method is demonstrated to be effective and feasible to the cryptoanalysis of CGH based optical encryption systems, which makes an effective contribution to the the improvement of optical encryption technology.
引用
收藏
页码:5118 / 5123
页数:6
相关论文
共 50 条
  • [41] Historical Text Image Enhancement Using Image Scaling and Generative Adversarial Networks
    Khan, Sajid Ullah
    Ullah, Imdad
    Khan, Faheem
    Lee, Youngmoon
    Ullah, Shahid
    SENSORS, 2023, 23 (08)
  • [42] StegGAN: hiding image within image using conditional generative adversarial networks
    Brijesh Singh
    Prasen Kumar Sharma
    Shashank Anil Huddedar
    Arijit Sur
    Pinaki Mitra
    Multimedia Tools and Applications, 2022, 81 : 40511 - 40533
  • [43] A Novel Chaotic Block Image Encryption Algorithm Based on Deep Convolutional Generative Adversarial Networks
    Fang, Pengfei
    Liu, Han
    Wu, Chengmao
    IEEE ACCESS, 2021, 9 : 18497 - 18517
  • [44] Fingerprinting Image-to-Image Generative Adversarial Networks
    Li, Guanlin
    Xu, Guowen
    Qiu, Han
    Guo, Shangwei
    Wang, Run
    Li, Jiwei
    Zhang, Tianwei
    Lu, Rongxing
    9TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P 2024, 2024, : 41 - 61
  • [45] Effective Malicious URL Detection by Using Generative Adversarial Networks
    Geng, Jinbu
    Li, Shuhao
    Liu, Zhicheng
    Cheng, Zhenyu
    Fan, Li
    WEB ENGINEERING (ICWE 2022), 2022, 13362 : 341 - 356
  • [46] Unsupervised anomaly detection using inverse generative adversarial networks
    Xiao, Feng
    Zhou, Jianfeng
    Han, Kunpeng
    Hu, Haoyuan
    Fan, Jicong
    INFORMATION SCIENCES, 2025, 689
  • [47] IoT Threat Detection Testbed Using Generative Adversarial Networks
    Shaikh, Farooq
    Bou-Harb, Elias
    Vehabovic, Aldin
    Crichigno, Jorge
    Yayimli, Aysegul
    Ghani, Nasir
    2022 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2022, : 77 - 84
  • [48] DeepMoney: counterfeit money detection using generative adversarial networks
    Ali, Toqeer
    Jan, Salman
    Alkhodre, Ahmad
    Nauman, Mohammad
    Amin, Muhammad
    Siddiqui, Muhammad Shoaib
    PEERJ COMPUTER SCIENCE, 2019, 2019 (09)
  • [49] Stock Price Manipulation Detection using Generative Adversarial Networks
    Leangarun, Teema
    Tangamchit, Poj
    Thajchayapong, Suttipong
    2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 2104 - 2111
  • [50] Malware Detection Using Deep Transferred Generative Adversarial Networks
    Kim, Jin-Young
    Bu, Seok-Jun
    Cho, Sung-Bae
    NEURAL INFORMATION PROCESSING, ICONIP 2017, PT I, 2017, 10634 : 556 - 564