skip to main content
research-article

A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder

Authors Info & Claims
Published:25 February 2023Publication History
Skip Abstract Section

Abstract

With the advancement in technology, digital images can easily be transmitted and stored over the Internet. Encryption is used to avoid illegal interception of digital images. Encrypting large-sized colour images in their original dimension generally results in low encryption/decryption speed along with exerting a burden on the limited bandwidth of the transmission channel. To address the aforementioned issues, a new encryption scheme for colour images employing convolutional autoencoder, DNA and chaos is presented in this paper. The proposed scheme has two main modules, the dimensionality conversion module using the proposed convolutional autoencoder, and the encryption/decryption module using DNA and chaos. The dimension of the input colour image is first reduced from N × M × 3 to P × Q gray-scale image using the encoder. Encryption and decryption are then performed in the reduced dimension space. The decrypted gray-scale image is upsampled to obtain the original colour image having dimension N × M × 3. The training and validation accuracy of the proposed autoencoder is 97% and 95%, respectively. Once the autoencoder is trained, it can be used to reduce and subsequently increase the dimension of any arbitrary input colour image. The efficacy of the designed autoencoder has been demonstrated by the successful reconstruction of the compressed image into the original colour image with negligible perceptual distortion. The second major contribution presented in this paper is an image encryption scheme using DNA along with multiple chaotic sequences and substitution boxes. The security of the proposed image encryption algorithm has been gauged using several evaluation parameters, such as histogram of the cipher image, entropy, NPCR, UACI, key sensitivity, contrast, and so on. The experimental results of the proposed scheme demonstrate its effectiveness to perform colour image encryption.

REFERENCES

  1. [1] Abdoun Nabil, Assad Safwan El, Hoang Thang Manh, Déforges Olivier, Assaf Rima, and Khalil Mohamad. 2020. Designing two secure keyed hash functions based on sponge construction and the chaotic neural network. Entropy 22, 9 (2020), 1012.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Taha Mohammed Abu, Hamidouche Wassim, Sidaty Naty, Viitanen Marko, Vanne Jarno, Assad Safwan El, and Déforges Olivier. 2020. Privacy protection in real time HEVC standard using chaotic system. Cryptography 4, 2 (2020), 18.Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Ahmad Jawad and Hwang Seong Oun. 2016. A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools and Applications 75, 21 (2016), 1395113976.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Ahmad Jawad, Larijani Hadi, Emmanuel Rohinton, Mannion Mike, et al. 2018. Secure occupancy monitoring system for IoT using lightweight intertwining logistic map. In 2018 10th Computer Science and Electronic Engineering (CEEC). IEEE, 208213.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Akkasaligar Prema T. and Biradar Sumangala. 2020. Selective medical image encryption using DNA cryptography. Information Security Journal: A Global Perspective 29, 2 (2020), 91101.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Ballé Johannes, Laparra Valero, and Simoncelli Eero P.. 2016. End-to-end optimized image compression. arXiv preprint arXiv:1611.01704 (2016).Google ScholarGoogle Scholar
  7. [7] Battikh Dalia, Assad Safwan El, Hoang Thang Manh, Bakhache Bassem, Deforges Olivier, and Khalil Mohamad. 2019. Comparative study of three steganographic methods using a chaotic system and their universal steganalysis based on three feature vectors. Entropy 21, 8 (2019), 748.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Belazi Akram, Talha Muhammad, Kharbech Sofiane, and Xiang Wei. 2019. Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access 7 (2019), 3666736681.Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Chai Xiuli, Chen Yiran, and Broyde Lucie. 2017. A novel chaos-based image encryption algorithm using DNA sequence operations. Optics and Lasers in Engineering 88 (2017), 197213.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Chai Xiuli, Gan Zhihua, Yang Kang, Chen Yiran, and Liu Xianxing. 2017. An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Processing: Image Communication 52 (2017), 619.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Cheng Zhengxue, Sun Heming, Takeuchi Masaru, and Katto Jiro. 2018. Deep convolutional autoencoder-based lossy image compression. In 2018 Picture Coding Symposium (PCS). IEEE, 253257.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Chirakkarottu Siyamol and Mathew Sheena. 2020. A novel encryption method for medical images using 2D Zaslavski map and DNA cryptography. SN Applied Sciences 2, 1 (2020), 110.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Clelland Catherine Taylor, Risca Viviana, and Bancroft Carter. 1999. Hiding messages in DNA microdots. Nature 399, 6736 (1999), 533534.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Dimitrov Miroslav M.. 2020. On the design of chaos-based S-boxes. IEEE Access 8 (2020), 117173117181.Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Durafe Asha and Patidar Vinod. 2022. Comparative analysis of chaotic image encryption using improved 2D Gingerbreadman map and Chirikov standard map. In 2022 International Conference for Advancement in Technology (ICONAT). IEEE, 16.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Elkandoz Marwa Tarek and Alexan Wassim. 2022. Image encryption based on a combination of multiple chaotic maps. Multimedia Tools and Applications (2022), 122.Google ScholarGoogle Scholar
  17. [17] Enayatifar Rasul, Abdullah Abdul Hanan, and Isnin Ismail Fauzi. 2014. Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Optics and Lasers in Engineering 56 (2014), 8393.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Garg Disha, Bhatia Komal Kumar, and Gupta Sonali. 2022. A novel genetic algorithm based encryption technique for securing data on fog network using DNA cryptography. In 2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM), Vol. 2. IEEE, 362368.Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Gupta Chirag. 2020. Shallow encoder deep decoder (SEDD) networks for image encryption and decryption. arXiv preprint arXiv:2001.03017 (2020).Google ScholarGoogle Scholar
  20. [20] Hoang Thang Manh and Assad Safwan El. 2020. Novel models of image permutation and diffusion based on perturbed digital chaos. Entropy 22, 5 (2020), 548.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Hu Fei, Pu Changjiu, Gao Haowei, Tang Mengzi, and Li Li. 2016. An image compression and encryption scheme based on deep learning. arXiv preprint arXiv:1608.05001 (2016).Google ScholarGoogle Scholar
  22. [22] Hu Fei, Wang Jingyuan, Xu Xiaofei, Pu Changjiu, and Peng Tao. 2017. Batch image encryption using generated deep features based on stacked autoencoder network. Mathematical Problems in Engineering (2017).Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Telem Adélaïde Nicole Kengnou, Fotsin Hilaire Bertrand, and Kengne Jacques. 2021. Image encryption algorithm based on dynamic DNA coding operations and 3D chaotic systems. Multimedia Tools and Applications 80, 12 (2021), 1901119041.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Kumar Randhir, Tripathi Rakesh, Marchang Ningrinla, Srivastava Gautam, Gadekallu Thippa Reddy, and Xiong Neal N.. 2021. A secured distributed detection system based on IPFS and blockchain for industrial image and video data security. J. Parallel and Distrib. Comput. 152 (2021), 128143.Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Lai Qiang, Lai Cong, Zhang Hui, and Li Chunbiao. 2022. Hidden coexisting hyperchaos of new memristive neuron model and its application in image encryption. Chaos, Solitons & Fractals 158 (2022), 112017.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Latif Shahid, Driss Maha, Boulila Wadii, Huma Zil E., Jamal Sajjad Shaukat, Idrees Zeba, and Ahmad Jawad. 2021. Deep learning for the Industrial Internet of Things (IIoT): A comprehensive survey of techniques, implementation frameworks, potential applications, and future directions. Sensors 21, 22 (2021), 7518.Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] Liao Qi-nan. 2011. TD-RECS chaotic system based digital image encryption algorithm protecting from shearing attack. In 2011 International Conference on Network Computing and Information Security, Vol. 1. IEEE, 402405.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] Liu Lili, Zhang Qiang, and Wei Xiaopeng. 2012. A RGB image encryption algorithm based on DNA encoding and chaos map. Computers & Electrical Engineering 38, 5 (2012), 12401248.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Manikandan C., Gamana A., Sridevi A., and Amirtharajan Rengarajan. 2022. Design of tri-layer image encryption scheme using calendar month vowel count (CMVC) approach. Multimedia Tools and Applications (2022), 135.Google ScholarGoogle Scholar
  30. [30] Masood Fawad, Boulila Wadii, Alsaeedi Abdullah, Khan Jan Sher, Ahmad Jawad, Khan Muazzam A., and Rehman Sadaqat Ur. 2022. A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map. Multimedia Tools and Applications (2022), 129.Google ScholarGoogle Scholar
  31. [31] Masood Fawad, Masood Junaid, Zhang Lejun, Jamal Sajjad Shaukat, Boulila Wadii, Rehman Sadaqat Ur, Khan Fadia Ali, and Ahmad Jawad. 2021. A new color image encryption technique using DNA computing and chaos-based substitution box. Soft Computing (2021), 117.Google ScholarGoogle Scholar
  32. [32] Mukherjee Pratyusa, Garg Hitendra, Pradhan Chittaranjan, Ghosh Soumik, Chowdhury Subrata, and Srivastava Gautam. 2022. Best Fit DNA-based cryptographic keys: The genetic algorithm approach. Sensors 22, 19 (2022), 7332.Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Namasudra Suyel. 2020. Fast and secure data accessing by using DNA computing for the cloud environment. IEEE Transactions on Services Computing (2020).Google ScholarGoogle Scholar
  34. [34] Namasudra Suyel, Chakraborty Rupak, Majumder Abhishek, and Moparthi Nageswara Rao. 2020. Securing multimedia by using DNA-based encryption in the cloud computing environment. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 16, 3s (2020), 119.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] Namasudra Suyel, Devi Debashree, Kadry Seifedine, Sundarasekar Revathi, and Shanthini A.. 2020. Towards DNA based data security in the cloud computing environment. Computer Communications 151 (2020), 539547.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Pak Chanil and Huang Lilian. 2017. A new color image encryption using combination of the 1D chaotic map. Signal Processing 138 (2017), 129137.Google ScholarGoogle ScholarCross RefCross Ref
  37. [37] Pavithran Pramod, Mathew Sheena, Namasudra Suyel, and Srivastava Gautam. 2022. A novel cryptosystem based on DNA cryptography, hyperchaotic systems and a randomly generated Moore machine for cyber physical systems. Computer Communications 188 (2022), 112.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. [38] Qayyum Abdullah, Ahmad Jawad, Boulila Wadii, Rubaiee Saeed, Masood Fawad, Khan Fawad, Buchanan William J., et al. 2020. Chaos-based confusion and diffusion of image pixels using dynamic substitution. IEEE Access 8 (2020), 140876140895.Google ScholarGoogle ScholarCross RefCross Ref
  39. [39] Shafique Arslan, Ahmed Jameel, Boulila Wadii, Ghandorh Hamzah, Ahmad Jawad, and Rehman Mujeeb Ur. 2020. Detecting the security level of various cryptosystems using machine learning models. IEEE Access 9 (2020), 93839393.Google ScholarGoogle ScholarCross RefCross Ref
  40. [40] Shannon Claude Elwood. 1948. A mathematical theory of communication. The Bell System Technical Journal 27, 3 (1948), 379423.Google ScholarGoogle ScholarCross RefCross Ref
  41. [41] Sohal Manreet and Sharma Sandeep. 2022. BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing. Journal of King Saud University-Computer and Information Sciences 34, 1 (2022), 14171425.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. [42] Sun Chunyang, Wang Erfu, and Zhao Bing. 2021. Image encryption scheme with compressed sensing based on a new six-dimensional non-degenerate discrete hyperchaotic system and plaintext-related scrambling. Entropy 23, 3 (2021), 291.Google ScholarGoogle ScholarCross RefCross Ref
  43. [43] Tanaka Kazuo, Okamoto Akimitsu, and Saito Isao. 2005. Public-key system using DNA as a one-way function for key distribution. Biosystems 81, 1 (2005), 2529.Google ScholarGoogle ScholarCross RefCross Ref
  44. [44] Wang Bin, Xie Yingjie, Zhou Shihua, Zhou Changjun, and Zheng Xuedong. 2017. Reversible data hiding based on DNA computing. Computational Intelligence and Neuroscience (2017).Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. [45] Wang Tao and Wang Ming-hui. 2020. Hyperchaotic image encryption algorithm based on bit-level permutation and DNA encoding. Optics & Laser Technology 132 (2020), 106355.Google ScholarGoogle ScholarCross RefCross Ref
  46. [46] Wang Xingyuan and Li Yanpei. 2021. Chaotic image encryption algorithm based on hybrid multi-objective particle swarm optimization and DNA sequence. Optics and Lasers in Engineering 137 (2021), 106393.Google ScholarGoogle ScholarCross RefCross Ref
  47. [47] Wang Yanfeng, Han Qinqin, Cui Guangzhao, and Sun Junwei. 2019. Hiding messages based on DNA sequence and recombinant DNA technique. IEEE Transactions on Nanotechnology 18 (2019), 299307.Google ScholarGoogle ScholarCross RefCross Ref
  48. [48] Xue Xianglian, Zhang Qiang, Wei Xiaopeng, Guo Ling, and Wang Qian. 2010. A digital image encryption algorithm based on DNA sequence and multi-chaotic maps. Neural Network World 20, 3 (2010), 285.Google ScholarGoogle Scholar
  49. [49] Xue Xianglian, Zhou Dongsheng, and Zhou Changjun. 2020. New insights into the existing image encryption algorithms based on DNA coding. Plos One 15, 10 (2020), e0241184.Google ScholarGoogle ScholarCross RefCross Ref
  50. [50] Zhang Shijie and Liu Lingfeng. 2021. A novel image encryption algorithm based on SPWLCM and DNA coding. Mathematics and Computers in Simulation 190 (2021), 723744.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. [51] Zhang Yong. 2018. The image encryption algorithm based on chaos and DNA computing. Multimedia Tools and Applications 77, 16 (2018), 2158921615.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. [52] Zhen Ping, Zhao Geng, Min Lequan, and Jin Xin. 2016. Chaos-based image encryption scheme combining DNA coding and entropy. Multimedia Tools and Applications 75, 11 (2016), 63036319.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Multimedia Computing, Communications, and Applications
        ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 19, Issue 3s
        June 2023
        270 pages
        ISSN:1551-6857
        EISSN:1551-6865
        DOI:10.1145/3582887
        • Editor:
        • Abdulmotaleb El Saddik
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 25 February 2023
        • Online AM: 3 November 2022
        • Accepted: 23 October 2022
        • Revised: 1 October 2022
        • Received: 13 March 2022
        Published in tomm Volume 19, Issue 3s

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
      • Article Metrics

        • Downloads (Last 12 months)334
        • Downloads (Last 6 weeks)47

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text

      HTML Format

      View this article in HTML Format .

      View HTML Format
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!