Skip to main content

Authenticated Encryption to Prevent Cyber-Attacks in Images

  • Chapter
  • First Online:
Illumination of Artificial Intelligence in Cybersecurity and Forensics

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 109))

  • 680 Accesses

Abstract

The increased usage and availability of multimedia-based applications have led authentication and encryption to gain considerable importance. Cryptography plays an important role in protecting images from theft and alteration. Digital images are used in a large number of applications such as education, defense, medicine, space and industry. This chapter aims at providing a secure authenticated encryption algorithm for the storage and transmission of digital images to avoid cyber threats and attacks. The designed algorithm makes use of the deep convolutional generative adversarial network to test if the image is a fake image originated by the intruder. If found fake exclusive OR operations are performed with the random matrices to confuse the intruder. If the image is not fake, then encryption operations are directly performed on the image. The image is split into two four-bit images and a permutation operation using a logistic map is performed and finally the split images are merged together. Finally, exclusive OR operations are performed on the merged image using the convolution- based round keys generated to generate the concealed image. In addition, authentication is also achieved by calculating the mean of the actual image. The performance analysis shows that the designed technique offers excellent security and also helps in testing the authenticity of the stored images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Nikheta Reddy G, Ugander GJ (2018) A study of cyber security challenges and its emerging trends on latest technologies. Int J Eng Res 5:1–5

    Google Scholar 

  2. Jasper SE (2017) US cyber threat intelligence sharing frameworks. Int J Intell Count Intell 30:53–65

    Google Scholar 

  3. Kizza JM (2005) Computer network security. Springer, New York

    Book  Google Scholar 

  4. Abayomi-Alli OO, Damaševičius R, Maskeliūnas R, Misra S (2021) Few-shot learning with a novel Voronoi tessellation-based image augmentation method for facial palsy detection. Electronics 10(8):978

    Article  Google Scholar 

  5. Abayomi-Alli A, Atinuke O, Onashoga SA, Misra S, Abayomi-Alli O (2020) Facial image quality assessment using an en-semble of pre-trained deep learning models (EFQnet). In: 2020 20th international conference on computational science and its applications (ICCSA), pp 1–8

    Google Scholar 

  6. Yang C, Sun Y, Wu Q (2015) Batch attribute-based encryption for secure clouds. Information 6:704–718

    Article  Google Scholar 

  7. El Assad S, Farajallah M (2016) A new chaos—based image encryption system. Signal Process Image Commun 41:144–157

    Article  Google Scholar 

  8. Emmanuel S, Thomas T, Vijayaraghavan AP (2020) Machine learning and cybersecurity. In: Machine learning approaches in cyber security analytics. Springer, Singapore, pp 37–47

    Google Scholar 

  9. Hua Z, Zhou Y (2016) Image encryption using 2D Logistic-adjusted—Sine map. Inf Sci 339:237–253

    Google Scholar 

  10. Jin J (2012) An image encryption based on elementary cellular automata. Opt Lasers Eng 50:1836–1843

    Article  Google Scholar 

  11. Li C, Luo G, Qin K (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87:127–133

    Article  Google Scholar 

  12. Souyah A, Faraoun KM (2016) Fast and efficient randomized encryption scheme for digital images based on quadtree decomposition and reversible memory cellular automata. Nonlinear Dyn 715–732

    Google Scholar 

  13. Xiao D, Fu Q, Xiang T, Zhang Y (2016) Chaotic image encryption of regions of interest. Int J Bifurc Chaos 26(11):1650193

    Article  Google Scholar 

  14. Ye G, Huang X (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Secur Commun Netw 9:2015–2023

    Google Scholar 

  15. Ejbali R, Zaied M (2017) Image encryption based on new Beta chaotic maps. Opt Lasers Eng 96:39–49

    Article  Google Scholar 

  16. Fang D, Sun S (2020) A new secure image encryption algorithm based on a 5D hyperchaotic map. Plos One 15:e0242110

    Google Scholar 

  17. Huang X, Liu J, Ma J, Xiang Y, Zhou W (2019) Data authentication with privacy protection. In: Advances in cyber security: principles, techniques, and applications. Springer, Singapore, pp 115–142

    Google Scholar 

  18. Chan CS (2011) An image authentication method by applying Hamming code on rearranged bits. Pattern Recogn Lett 32:1679–1690

    Article  Google Scholar 

  19. Lo CC, Hu YC (2014) A novel reversible image authentication scheme for digital images. Signal Process 174–185

    Google Scholar 

  20. Skraparlis D (2003) Design of an efficient authentication method for modern image and video. IEEE Trans Consum Electron 49(2):417–426

    Article  Google Scholar 

  21. Tabatabaei SA, Ur-Rehman O, Zivic N, Ruland C (2015) Secure and robust two-phase image authentication. IEEE Trans Multimed 17(7):945–956

    Article  Google Scholar 

  22. Wu WC (2017) Quantization-based image authentication scheme using QR error correction. EURASIP J Image Video Process 1–12

    Google Scholar 

  23. Rachael O, Misra S, Ahuja R, Adewumi A, Ayeni F, Mmaskeliunas R (2020) Image steganography and steganalysis based on least significant bit (LSB). In: Proceedings of ICETIT. Springer, Cham, pp 1100–1111

    Google Scholar 

  24. Tao L, Baoxiang D, Xiaowen L (2020) Image encryption algorithm based on logistic and two-dimensional Lorenz emerging approaches to cyber security. IEEE Access 8:13792–13805

    Article  Google Scholar 

  25. Mohamed ZT, Xingyuan W, Midoun MA (2021) Fast image encryption algorithm with high security level using the Bülban chaotic map. J Real-Time Image Proc 18:85–98

    Article  Google Scholar 

  26. Yaghoub P, Ranjbarzadeh R, Mardani A (2021) A new algorithm for digital image encryption based on chaos theory. Entropy 23:341

    Article  MathSciNet  Google Scholar 

  27. Bisht A, Dua M, Dua S, Jaroli P (2020) A color image encryption technique based on bit-level permutation and alternate logistic maps. J Intell Syst 29:1246–1260

    Google Scholar 

  28. Maimut D, Reyhanitabar R (2014) Authenticated encryption: toward next-generation algorithms. IEEE Secur Priv 12(2):70–72

    Article  Google Scholar 

  29. Hanis S, Amutha R (2018) Double image compression and encryption scheme using logistic mapped convolution and cellular automata. Multimed Tools Appl 77:6897–6912

    Article  Google Scholar 

  30. Misra S (2021) A step by step guide for choosing project topics and writing research papers in ICT related disciplines. In: Misra S., Muhammad-Bello B (eds) Information and communication technology and applications. ICTA 2020. Communications in computer and in-formation science. Springer, vol 1350, pp 727–744. https://doi.org/10.1007/978-3-030-69143-1_55

  31. Hanis S, Amutha R (2019) A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure. Nonlinear Dyn 95:421–432

    Article  Google Scholar 

  32. Mount DM, Kanungo T, Nathan SN, Piatko C, Silverman R, Ange-la YW (2001) Approxiamting large convolutions in digital images. IEEE Trans Image Process 10:1826–1835

    Article  MathSciNet  Google Scholar 

  33. Hunt BR (1971) A matrix theory proof of the discrete convolution theorem. IEEE Trans. Audio Electro acoust 19:285–288

    Article  MathSciNet  Google Scholar 

  34. Yue W, Yicong Z, George S, Sos A, Joseph P, Premkumar N (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci 222:323–342

    Article  MathSciNet  Google Scholar 

  35. Wu Y, Joseph PN, Agaian S (2011) NPCR and UACI randomness test for image encryption. Cyber J: Multidiscip J Sci Technol J Select Areas Telecommun 31–38

    Google Scholar 

  36. Timothy Shih K (2002) Distributed multimedia databases: techniques and applications. Idea group, USA

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Hanis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Hanis, S., Elizabeth, N.E., Kishore, R., Khalifeh, A. (2022). Authenticated Encryption to Prevent Cyber-Attacks in Images. In: Misra, S., Arumugam, C. (eds) Illumination of Artificial Intelligence in Cybersecurity and Forensics. Lecture Notes on Data Engineering and Communications Technologies, vol 109. Springer, Cham. https://doi.org/10.1007/978-3-030-93453-8_14

Download citation

Publish with us

Policies and ethics