Skip to main content
Log in

Mutated Cleavages of Images for Stealth Disclosure: A Hopfield Neural Network Attractor (HNNA) Approach

  • Published:
Neural Processing Letters Aims and scope Submit manuscript

Abstract

Multimedia data encryption is an ever-growing and challenging domain in the emerging digital world, with image encryption at the forefront to provide privacy for the user’s data. Image encryption aims to generate a stable noisy image irrespective of the input image. The current solution to this communication challenge is to use complex mathematics with a series of algorithms known as public-key cryptography. But the increasing power of computers and the ingenuity of hackers is open up more and more cracks in this mathematical armor. An ideal solution to this problem would provide provable information security, guaranteeing the safety of our personal information. In addition to it, the system must adapt itself to day to day miracles of the real world. Neural assisted techniques are the solutions to satisfy the above-said requirements. Hence, this paper proposes Hopfield neural attractor-assisted image encryption scheme in which combined tent maps are employed for the substitution process. Nowadays, a chosen-plaintext attack is a big challenge for encryption schemes. To resist the chosen plaintext attack, this scheme proposes the higher bitplane confusion using the tent map, which replaces the conventional diffusion process. Besides, the proposed scheme offers desire metrics such as the average correlation of 0.003, entropy as 7.99, and keyspace of 10184.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Suri S, Vijay R (2019) A synchronous intertwining logistic map-DNA approach for color image encryption. J Ambient Intell Hum Comput 10:2277–2290. https://doi.org/10.1007/s12652-018-0825-0

    Article  Google Scholar 

  2. Chidambaram N, Raj P, Thenmozhi K et al (2019) A cloud compatible DNA coded security solution for multimedia file sharing & storage. Multimed Tools Appl 78:33837–33863. https://doi.org/10.1007/s11042-019-08166-z

    Article  Google Scholar 

  3. Sivaraman R, Rajagopalan S, Rayappan B, Bosco J, Rengarajan A (2020) ‘Ring oscillator as confusion–diffusion agent: a complete TRNG drove image security. IET Image Process 14:2987–2997. https://doi.org/10.1049/iet-ipr.2019.0168

    Article  Google Scholar 

  4. Kalpana M, Ratnavelu K, Balasubramaniam P et al (2019) Double-key secure for N-1-N sound record data (SRD) by the drive-response of BAM NNs. Neural Process Lett 50:2925–2944. https://doi.org/10.1007/s11063-019-10067-z

    Article  Google Scholar 

  5. N. I. of S. and Technology (2001) Specification for the Advanced Encryption Standard (AES)—FIPS PUB 197, pp 1–47. https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf

  6. Silva-garcía VM, Flores-carapia R, Rentería-márquez C, Luna-benoso B (2018) Substitution box generation using Chaos: an image encryption application. Appl Math Comput 332:123–135

    MathSciNet  MATH  Google Scholar 

  7. Praveenkumar P, Amirtharajan R, Thenmozhi K, Rayappan JBB (2017) Fusion of confusion and diffusion: a novel image encryption approach. Telecommun Syst 65:65–78

    Article  Google Scholar 

  8. Li G, Wang L (2019) Double chaotic image encryption algorithm based on optimal sequence solution and fractional transform. Vis Comput 35:1267–1277. https://doi.org/10.1007/s00371-018-1574-y

    Article  Google Scholar 

  9. Kumari M, Gupta S, Sardana P (2017) A survey of image encryption algorithms. 3D Res 8(4):1–35

    Article  Google Scholar 

  10. Wang C, Zhang X, Zheng Z (2017) An efficient image encryption algorithm based on a novel chaotic map. Multimed Tools Appl 76(22):24251–24280

    Article  Google Scholar 

  11. Sengul D (2016) A new data hiding method based on chaos embedded genetic algorithm for color image. Artif Intell Rev 46:129–143

    Article  Google Scholar 

  12. Chandrasekaran J, Thiruvengadam SJ (2017) A hybrid chaotic and number theoretic approach for securing DICOM images. Secur Commun Netw 2017:1–12

    Article  Google Scholar 

  13. Wu J, Liao X, Yang B (2018) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process 142:292–300

    Article  Google Scholar 

  14. Dhall S, Pal SK, Sharma K (2018) Cryptanalysis of image encryption scheme based on a new 1D chaotic system. Signal Process 146:22–32

    Article  Google Scholar 

  15. Wang H, Xiao D, Chen X, Huang H (2018) Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Signal Process 144:444–452

    Article  Google Scholar 

  16. Özkaynak F, Özer AB (2016) Cryptanalysis of a new image encryption algorithm based on chaos. Optik (Stuttg) 127(13):5190–5192

    Article  Google Scholar 

  17. Lakshmi C, Thenmozhi K, Rayappan JBB, Amirtharajan R (2018) Encryption and watermark-treated medical image against hacking disease—an immune convention in spatial and frequency domains. Comput Methods Progr Biomed 159:11–21

    Article  Google Scholar 

  18. Hopfield J (1984) Neurons with graded response have collective computational properties like those of two-state neurons. Proc Natl Acad Sci USA 81:3088–3092

    Article  Google Scholar 

  19. Lakshmi C, Thenmozhi K, Rayappan JBB, Amirtharajan R (2019) Hopfield attractor-trusted neural network: an attack-resistant image encryption. Neural Comput Appl 32:11477–11489

    Article  Google Scholar 

  20. Wang XY, Li ZM (2019) A color image encryption algorithm based on Hopfield chaotic neural network. Opt Lasers Eng 115:107–118

    Article  Google Scholar 

  21. Li Q, Yang X-S, Yang F (2005) Hyperchaos in Hopfield-type neural networks. Neurocomputing 67:275–280

    Article  Google Scholar 

  22. Hopfield JJ (1982) Neural networks and physical systems with emergent collective computational abilities (associative memory/parallel processing/categorization/content-addressable memory/fail-soft devices). Biophysics (Oxf) 79:2554–2558

    MathSciNet  MATH  Google Scholar 

  23. Gao T, Gu Q, Emmanuel S (2009) A novel image authentication scheme based on hyper-chaotic cell neural network. Chaos, Solitons Fractals 42(1):548–553

    Article  Google Scholar 

  24. Huang Y, Yang X-S (2006) Hyperchaos and bifurcation in a new class of four-dimensional Hopfield neural networks. Neurocomputing 69(13):1787–1795

    Article  Google Scholar 

  25. Kassem A, Hassan HAH, Harkouss Y, Assaf R (2013) Efficient neural chaotic generator for image encryption. Digit Signal Process 25:266–274

    Article  Google Scholar 

  26. Bigdeli N, Farid Y, Afshar K (2012) A robust hybrid method for image encryption based on Hopfield neural network. Comput Electr Eng 38(2):356–369

    Article  Google Scholar 

  27. Yu W, Cao J (2006) Cryptography based on delayed chaotic neural networks. Phys Lett Sect A Gen At Solid State Phys 356(4–5):333–338

    MATH  Google Scholar 

  28. Fu C et al (2013) An efficient and secure medical image protection scheme based on chaotic map. Comput Biol Med 43(8):1000–1010. https://doi.org/10.1016/j.compbiomed.2013.05.005

    Article  Google Scholar 

  29. El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144–157

    Article  Google Scholar 

  30. Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic S-Box. Inf Sci (NY) 450:361–377. https://doi.org/10.1016/j.ins.2018.03.055

    Article  MathSciNet  MATH  Google Scholar 

  31. Li Q, Yang XS, Yang F (2005) Hyperchaos in Hopfield-type neural networks. Neurocomputing 67(1–4 SUPPL.):275–280

    Article  Google Scholar 

  32. Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shanon entropy measure with statistical tests for image randomness. Inf Sci (NY) 222:323–342

    Article  Google Scholar 

  33. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun 1:31–38

    Google Scholar 

  34. Xue H, Du J, Li S, Ma W (2018) Region of interest encryption for color images based on a hyperchaotic system with three positive Lyapunov exponets. Opt Laser Technol 106:506–516

    Article  Google Scholar 

  35. Diaconu A-V (2016) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf Sci 355–356:314–327. https://doi.org/10.1016/j.ins.2015.10.027

    Article  Google Scholar 

  36. Khan AH, Cao X, Li S, Katsikis VN, Liao L (2020) BAS-ADAM: an ADAM based approach to improve the performance of beetle antennae search optimizer. IEEE/CAA J Autom Sin 7(2):461–471. https://doi.org/10.1109/JAS.2020.1003048

    Article  Google Scholar 

  37. Khan AH et al (2020) Optimal portfolio management for engineering problems using nonconvex cardinality constraint: a computing perspective. IEEE Access 8:57437–57450. https://doi.org/10.1109/ACCESS.2020.2982195

    Article  Google Scholar 

  38. Li Z, Li S (2020) Saturated PI control for nonlinear system with provable convergence: an optimization perspective. IEEE Trans Circuits Syst II Express Briefs 1:5. https://doi.org/10.1109/tcsii.2020.3007879

    Article  Google Scholar 

  39. Li Z, Zuo W, Li S (2020) Zeroing dynamics method for motion control of industrial upper-limb exoskeleton system with minimal potential energy modulation. Measurement 163:107964

    Article  Google Scholar 

  40. Li Z, Li C, Li S, Cao X (2020) A fault-tolerant method for motion planning of industrial redundant manipulator. IEEE Trans Ind Inform 16(12):7469–7478. https://doi.org/10.1109/TII.2019.2957186

    Article  Google Scholar 

Download references

Acknowledgements

The authors thank the Department of Science and Technology, New Delhi for the FIST funding (SR/FST/ET-II/2018/221). Also, the authors wish to thank the Intrusion Detection Lab at School of Electrical and Electronics Engineering, SASTRA Deemed University for providing infrastructural support to carry out this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rengarajan Amirtharajan.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lakshmi, C., Thenmozhi, K., Venkatesan, C. et al. Mutated Cleavages of Images for Stealth Disclosure: A Hopfield Neural Network Attractor (HNNA) Approach. Neural Process Lett 53, 907–928 (2021). https://doi.org/10.1007/s11063-020-10412-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11063-020-10412-7

Keywords

Navigation