Abstract
The increased usage and availability of multimedia-based applications have led authentication and encryption to gain considerable importance. Cryptography plays an important role in protecting images from theft and alteration. Digital images are used in a large number of applications such as education, defense, medicine, space and industry. This chapter aims at providing a secure authenticated encryption algorithm for the storage and transmission of digital images to avoid cyber threats and attacks. The designed algorithm makes use of the deep convolutional generative adversarial network to test if the image is a fake image originated by the intruder. If found fake exclusive OR operations are performed with the random matrices to confuse the intruder. If the image is not fake, then encryption operations are directly performed on the image. The image is split into two four-bit images and a permutation operation using a logistic map is performed and finally the split images are merged together. Finally, exclusive OR operations are performed on the merged image using the convolution- based round keys generated to generate the concealed image. In addition, authentication is also achieved by calculating the mean of the actual image. The performance analysis shows that the designed technique offers excellent security and also helps in testing the authenticity of the stored images.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Nikheta Reddy G, Ugander GJ (2018) A study of cyber security challenges and its emerging trends on latest technologies. Int J Eng Res 5:1–5
Jasper SE (2017) US cyber threat intelligence sharing frameworks. Int J Intell Count Intell 30:53–65
Kizza JM (2005) Computer network security. Springer, New York
Abayomi-Alli OO, Damaševičius R, Maskeliūnas R, Misra S (2021) Few-shot learning with a novel Voronoi tessellation-based image augmentation method for facial palsy detection. Electronics 10(8):978
Abayomi-Alli A, Atinuke O, Onashoga SA, Misra S, Abayomi-Alli O (2020) Facial image quality assessment using an en-semble of pre-trained deep learning models (EFQnet). In: 2020 20th international conference on computational science and its applications (ICCSA), pp 1–8
Yang C, Sun Y, Wu Q (2015) Batch attribute-based encryption for secure clouds. Information 6:704–718
El Assad S, Farajallah M (2016) A new chaos—based image encryption system. Signal Process Image Commun 41:144–157
Emmanuel S, Thomas T, Vijayaraghavan AP (2020) Machine learning and cybersecurity. In: Machine learning approaches in cyber security analytics. Springer, Singapore, pp 37–47
Hua Z, Zhou Y (2016) Image encryption using 2D Logistic-adjusted—Sine map. Inf Sci 339:237–253
Jin J (2012) An image encryption based on elementary cellular automata. Opt Lasers Eng 50:1836–1843
Li C, Luo G, Qin K (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87:127–133
Souyah A, Faraoun KM (2016) Fast and efficient randomized encryption scheme for digital images based on quadtree decomposition and reversible memory cellular automata. Nonlinear Dyn 715–732
Xiao D, Fu Q, Xiang T, Zhang Y (2016) Chaotic image encryption of regions of interest. Int J Bifurc Chaos 26(11):1650193
Ye G, Huang X (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Secur Commun Netw 9:2015–2023
Ejbali R, Zaied M (2017) Image encryption based on new Beta chaotic maps. Opt Lasers Eng 96:39–49
Fang D, Sun S (2020) A new secure image encryption algorithm based on a 5D hyperchaotic map. Plos One 15:e0242110
Huang X, Liu J, Ma J, Xiang Y, Zhou W (2019) Data authentication with privacy protection. In: Advances in cyber security: principles, techniques, and applications. Springer, Singapore, pp 115–142
Chan CS (2011) An image authentication method by applying Hamming code on rearranged bits. Pattern Recogn Lett 32:1679–1690
Lo CC, Hu YC (2014) A novel reversible image authentication scheme for digital images. Signal Process 174–185
Skraparlis D (2003) Design of an efficient authentication method for modern image and video. IEEE Trans Consum Electron 49(2):417–426
Tabatabaei SA, Ur-Rehman O, Zivic N, Ruland C (2015) Secure and robust two-phase image authentication. IEEE Trans Multimed 17(7):945–956
Wu WC (2017) Quantization-based image authentication scheme using QR error correction. EURASIP J Image Video Process 1–12
Rachael O, Misra S, Ahuja R, Adewumi A, Ayeni F, Mmaskeliunas R (2020) Image steganography and steganalysis based on least significant bit (LSB). In: Proceedings of ICETIT. Springer, Cham, pp 1100–1111
Tao L, Baoxiang D, Xiaowen L (2020) Image encryption algorithm based on logistic and two-dimensional Lorenz emerging approaches to cyber security. IEEE Access 8:13792–13805
Mohamed ZT, Xingyuan W, Midoun MA (2021) Fast image encryption algorithm with high security level using the Bülban chaotic map. J Real-Time Image Proc 18:85–98
Yaghoub P, Ranjbarzadeh R, Mardani A (2021) A new algorithm for digital image encryption based on chaos theory. Entropy 23:341
Bisht A, Dua M, Dua S, Jaroli P (2020) A color image encryption technique based on bit-level permutation and alternate logistic maps. J Intell Syst 29:1246–1260
Maimut D, Reyhanitabar R (2014) Authenticated encryption: toward next-generation algorithms. IEEE Secur Priv 12(2):70–72
Hanis S, Amutha R (2018) Double image compression and encryption scheme using logistic mapped convolution and cellular automata. Multimed Tools Appl 77:6897–6912
Misra S (2021) A step by step guide for choosing project topics and writing research papers in ICT related disciplines. In: Misra S., Muhammad-Bello B (eds) Information and communication technology and applications. ICTA 2020. Communications in computer and in-formation science. Springer, vol 1350, pp 727–744. https://doi.org/10.1007/978-3-030-69143-1_55
Hanis S, Amutha R (2019) A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure. Nonlinear Dyn 95:421–432
Mount DM, Kanungo T, Nathan SN, Piatko C, Silverman R, Ange-la YW (2001) Approxiamting large convolutions in digital images. IEEE Trans Image Process 10:1826–1835
Hunt BR (1971) A matrix theory proof of the discrete convolution theorem. IEEE Trans. Audio Electro acoust 19:285–288
Yue W, Yicong Z, George S, Sos A, Joseph P, Premkumar N (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci 222:323–342
Wu Y, Joseph PN, Agaian S (2011) NPCR and UACI randomness test for image encryption. Cyber J: Multidiscip J Sci Technol J Select Areas Telecommun 31–38
Timothy Shih K (2002) Distributed multimedia databases: techniques and applications. Idea group, USA
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Hanis, S., Elizabeth, N.E., Kishore, R., Khalifeh, A. (2022). Authenticated Encryption to Prevent Cyber-Attacks in Images. In: Misra, S., Arumugam, C. (eds) Illumination of Artificial Intelligence in Cybersecurity and Forensics. Lecture Notes on Data Engineering and Communications Technologies, vol 109. Springer, Cham. https://doi.org/10.1007/978-3-030-93453-8_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-93453-8_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-93452-1
Online ISBN: 978-3-030-93453-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)