Next Article in Journal
Identification and Machine Learning Prediction of Nonlinear Behavior in a Robotic Arm System
Previous Article in Journal
Curvature and Entropy Statistics-Based Blind Multi-Exposure Fusion Image Quality Assessment
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure Surveillance Systems Using Partial-Regeneration-Based Non-Dominated Optimization and 5D-Chaotic Map

1
School of Computer Science and Engineering, Lovely Professional University, Phagwara 144401, India
2
Department of Computer Science and Engineering, Chandigarh University, Mohali 140413, India
3
Department of Electrical Engineering and Computer Science, Howard University, Washington, DC 20059, USA
4
Department of Computer Science, College of Arts and Science, Prince Sattam Bin Abdul Aziz University, Wadi Ad-Dawasir 11991, Saudi Arabia
5
Faculty of Applied Mathematics, Silesian University of Technology, 44100 Gliwice, Poland
*
Authors to whom correspondence should be addressed.
Symmetry 2021, 13(8), 1447; https://doi.org/10.3390/sym13081447
Submission received: 10 June 2021 / Revised: 29 July 2021 / Accepted: 2 August 2021 / Published: 6 August 2021

Abstract

:
Due to Internet of Things (IoT), it has become easy to surveil the critical regions. Images are important parts of Surveillance Systems, and it is required to protect the images during transmission and storage. These secure surveillance frameworks are required in IoT systems, because any kind of information leakage can thwart the legal system as well as personal privacy. In this paper, a secure surveillance framework for IoT systems is proposed using image encryption. A hyperchaotic map is used to generate the pseudorandom sequences. The initial parameters of the hyperchaotic map are obtained using partial-regeneration-based non-dominated optimization (PRNDO). The permutation and diffusion processes are applied to generate the encrypted images, and the convolution neural network (CNN) can play an essential role in this part. The performance of the proposed framework is assessed by drawing comparisons with competitive techniques based on security parameters. It shows that the proposed framework provides promising results as compared to the existing techniques.

1. Introduction

Internet of Things (IoT) has changed the way of life by providing connectivity among network-enabled devices. Surveillance is a major advantage of IoT that helps people to keep an eye on the security of homes, business, and critical places. Due to this, a large volume of data is transferred over the network that is further saved on servers. These data can be in the form of images, audio, video, and text, and are further utilized in many applications, such as military communication, healthcare, identification of suspicious activities, remote sensing, etc. As these data contain valuable information, any leakage of the data may create security breaches, which can further hamper the working of government, intelligence agencies, and personal privacy. Therefore, it is necessary to create a secure surveillance framework for IoT systems. In this work, our focus is to secure the images during transmission and storage, because images play an important role in various multimedia applications. The image captured from IoT devices can be sent to a server or directly to concerned personnel for surveillance. If the images are in plain form, then they can reveal all the information to an attacker. Therefore, transmission and storage of the images should be secured. To secure the images, cryptography is the most suitable method. In cryptography, encryption and decryption processes are used to make the images meaningless and meaningful, respectively.
So far, researchers have implemented various image encryption techniques, utilizing various technologies such as chaotic maps, compressive sensing, transformations, deoxyribonucleic acid, S-box, optics, etc. Among these, chaotic maps are widely used by researchers. To perform the encryption and decryption, a secret key is required, and the whole strength of the cryptosystem is dependent on the secret key, because even if the attacker knows the encryption and decryption algorithms, without the secret key, the attacker will not be able to recover the images. The chaotic maps are the most suitable for developing the secure secret keys due to characteristics such as sensitivity to initial values, random behavior, deterministic nature, and ergodicity. Chaotic maps generate pseudorandom numbers, which are deterministic and can be utilized as secret keys. A number of chaotic maps have been proposed in the literature, and these can be classified as one-dimensional (1D) and high-dimensional chaotic maps (HDCM). The high-dimensional chaotic maps are preferred because of their complex trajectory and secured nature. HDCMs are comprised of more than one state variable and constant that constitute the complex structure. Thus, they provide better security as compared to 1D chaotic maps. However, some studies have shown that HDMCs can be broken by estimating their initial parameters. Therefore, it is necessary to optimally select the parameters of HDMCs. The optimal selection of HDMCs’ parameters can be carried out through meta-heuristic techniques. These techniques provide the optimized solutions using random initial populations that cannot be easily guessed by the attacker.
Motivated by the above factors, in this paper, an efficient image encryption technique for secure surveillance frameworks for IoT systems is proposed. The main contributions of this paper are as follows:
  • The secret keys are generated by utilizing a 5D hyperchaotic map. The reason of selection is to generate more complex pseudorandom numbers that cannot be easily estimated.
  • To strengthen the security of the hyperchaotic map, the initial parameters are optimized using partial-regeneration-based non-dominated optimization (PRNDO). A multi-objective fitness function is designed using correlation coefficient and entropy. These two parameters were selected after analyzing their wide acceptability in the literature. Fitness functions based on these parameters provide better optimized solutions.
  • After the secret key’s generation, permutation is performed to change the pixels’ position. Thereafter, the diffusion process is performed on scrambled images to produce the encrypted images.
  • Finally, the performance of the proposed technique is assessed through comparative analyses with competitive techniques based on security parameters.
The rest of the paper is organized as follows: The related work is discussed in Section 2, background is presented in Section 3, and Section 4 elaborates on the image encryption technique for the secure surveillance framework for IoT systems. In Section 5, the simulation results and analyses are discussed, and Section 6 concludes the paper and presents the future research directions.

2. Literature Review

The authors of [1] used a 2D logistic-sine system (2LSS) to encrypt the images generated by sensors before the transmission, where the permutation and diffusion-based framework was utilized to perform the encryption. The authors of [2] enhanced the security of surveillance systems by encrypting the images using a cosine-transform-based chaotic map (CTCM), which was generated through the combination of logistic and sine maps. In [3], the authors implemented an image encryption technique using the Chen chaotic map and discrete fractional random transform (DFRT) for secure surveillance, while in [4], the authors utilized cellular automata to encrypt the images captured from the sensor. The authors of [5] designed an encryption technique to secure the images during storage, where DNA and hyperchaotic maps (DNA-HC) were used to encrypt the images. In [6], a secure surveillance system was designed using the sine tent cosine approach for the transmission of images, while in [7], a secure communication system was developed using compressive sensing and chaotic map (CSCM) for IoT applications. The authors of [8] encrypted the images using permutation and diffusion operations. The permutation process was carried out using a Henon map, while a chaotic restricted Boltzmann machine was used to perform the diffusion operation on the images [8]. In [9], compressive sensing was used to encrypt the images, where a 3D chaotic map was used to generate the measurement matrix and a 1D chaotic map was utilized to diffuse the pixels of the scrambled image. The authors of [10] proposed an improved fractional 1D chaotic map to perform the image encryption. The permutation and substitution steps were combined to change the position of pixels and the values of an image [10]. The authors of [11] investigated and presented current trends on IP and DS in IOT.
The authors of [12] utilized a differential equation to generate the chaotic oscillator, which is used to scramble the pixels of an image to obtain an encrypted image. In [13], a DP model was proposed for security and privacy. The authors of [14] implemented an image encryption framework: Fresnel transform. In this technique, a lens is not used, and the image is divided into three channels and each is encrypted using a separate key [14]. In [15], a time delay chaotic system was used to encrypt the images. The authors of [16] applied coupled map lattices to generate the keys. In this technique, the random-based diffusion process is implemented to encrypt the images [16]. The authors of [17] developed an image encryption scheme using a 6D chaotic map. The position of pixels of images is permuted at the bit-level to enhance the security, and the pixels are finally diffused using DNA coding. In [18], the authors encrypted the images using tent-dynamics coupled map lattices, and the cyclic shift algorithm was utilized to shift the rows and pseudorandom sequences. The above-discussed techniques involved the use of chaotic maps to generate the secret keys, and although these techniques provide secure image transmission and storage, in most of the techniques, the initial parameters of chaotic maps were not selected optimally. Thus, using parameter estimation techniques, these techniques can be broken [18]. The authors of [19] presented a deep learning model for traffic flow prediction.
Some of the researchers have addressed the above-stated issue by implementing the meta-heuristic techniques in image encryption. The authors of [20] developed an encryption system using DNA and the 1D logistic map for secure transmission of images. Particle swarm optimization (PSO) was utilized to select the best encrypted image based on entropy and the correlation coefficient. The non-dominated sorting genetic algorithm-II (NSGA-II) was used in [21] to optimize the intertwining logistic map, the genetic algorithm (GA) was applied in [22] to optimize the beta-chaotic map, and the Pareto evolutionary algorithm-II was implied in [23] to optimally select the parameters of the 4D chaotic map. Adaptive differential evolution (ADE) was used in [24] for tuning the hyperparameters of the Lorenz chaotic map. Grey hole and black hole attacks were presented in [25], while the 5D chaotic map was tuned in [26] using NSGA. An intertwining logistic map was optimized in [27] using memetic differential evolution, the hyperparameters of the beta-chaotic map were tuned in [28] using differential evolution, and IoT-based risk assessments were presented in [29].

3. Background

3.1. Five-Dimensional Hyperchaotic Map

The five-dimensional (5D) hyperchaotic map (5DHCM) provides significantly complex chaotic behavior [30,31]. The 5DHCM has five attributes, a cubic nonlinear product, and a better Lyapunov exponent (LE). The huge number of attributes improves the key space, the large LE provides a more dynamic 5DHCM, and the cubic nonlinear product achieves good resistance [32]. Thus, 5DHCM can achieve better encryption keys and can be computed as:
d′1 = q(d2 − d1) + d2d3d4
d′2 = r(d1 + d2) + d5 − d1d3d4
d′3 = −sd2 − td3 − ud4 + d1d2d4
d′4 = −vd4 + d2d3d1
d′5 = −w(d1 + d2)
Here, in Equation (1), d′1, d′2, d′3, d′4, and d′5 are initial attributes required for 5DHCM, and q, r, s, t, u, v, and w define the control attributes of 5DHCM. Chaotic attractors are represented in Figure 1 and Figure 4 for q = 30, r = 10, s = 15.7, t = 5, u = 2.5, v = 4.45, and w = 38.5. Figure 1 demonstrates the chaotic attractor in the d1-d2 plane, whereas Figure 2 shows the chaotic attractor in the d1, d2, and d3 planes. The chaotic attractor in the y1-y2-y3 plane is presented in Figure 2. The time series analysis of the state attribute d1 utilizes Equation (1), as depicted in Figure 3. It is demonstrated that d1 achieves random behavior and is non-periodic in nature. System (1) contains 5 equilibrium points, such as (0, 0, 0, 0, 0), (2.39, −2.39, −6.85, 8.76, −143.09), (1.56, −1.56, 10.50, −5.71, −93.33), (−2.39, 2.39, 6.85, −8.76, 143.09), and (−1.56, 1.56, −10.50, 5.71, 93.33). The eigenvalues of equilibrium points are positive integers. Thus, the equilibrium points of system (1) are saddle points, unstable, and hyperbolic [33].

3.2. Partial-Regeneration-Based Non-Dominated Optimization

Partial-regeneration-based non-dominated optimization (PRNDO) [34] provides optimal solutions considering both the best and worst cases. This type of optimization is mainly used to solve the asymmetrical problems. In this study, a bottom-boosting methodology was utilized to reduce the number of function evaluations. It also provides a balance between better solutions and computational speed by developing a novel partial-regeneration strategy and mutation operator. Therefore, it can generate efficient solutions with good computational speed. The outline of PRNDO is shown in Figure 4. It contains population initialization, minimum heap (min-heap) construction, bottom-boosting, partial-regeneration strategy, and termination condition. Initially, a population is randomly generated with the pair consisting of solution and scenario. The other parameters are also initialized, such as control attributes, solution and scenario dimensions, and maximum number of generations. Thereafter, by using the given population, a min-heap is built in the beginning of every generation. Every solution is treated as a node of min-heap, and the objective value of it acts as a key of the node. After that, scenarios of min-heap nodes are updated using the bottom-boosting scheme. The fitness function evaluations are also controlled by this scheme. Using fitness values of each individual, a sorted population is generated in increasing order. The trial scenario is produced from mutation and binomial recombination. The fitness value of the trial scenario is then calculated with respect to the original scenario. If the trial provides better fitness, then the original scenario of the individual will be upgraded. Otherwise, the old scenario will be used in the next generation. During the updating of scenarios, min-heap is also updated using the current population. Next, all the individuals are controlled and updated using the partial-regeneration strategy. The mutation and binomial recombination is also utilized. Finally, the termination condition (such as maximum number of generations evaluation) is tested, and optimal solutions are obtained as a result. IoT-based data analytics are presented in [34,35]. In [36] a comparative study is performed based on machine learning techniques.

4. Proposed Image Encryption Technique for Secure Surveillance Frameworks

An image encryption technique for secure surveillance frameworks for IoT systems is shown in Figure 5.
The obtained images from surveillance cameras are initially encrypted by the proposed technique, then transmitted over the network. The obtained image is firstly decomposed into red (R), green (G), and blue (B) channels. The secret keys, such as d′1, d′2, d′3, d′4, and d′5, are obtained from 5DHCM (Algorithm 5). The required initial parameters of 5DHCM are optimized using PRNDO (Algorithm 2). All three channels are permuted using Arnold transform. Then, pixels of permuted channels R, G, and B are diffused utilizing d′1, d′2, and d′3, with the (⊕) operator, respectively. The obtained images are δR, G′, and B′. G′ and B′ are further diffused using ⊕ operation using δR, and produce δG and δB. Two more keys (d′6 and d′7) are generated.
d′6 is generated from d′1 and d′2 using ⊕ operation, d′7 is generated from d′3 and d′4 using ⊕ operation, and d′4 is then utilized to update d′5 and d′6. Encrypted color channels, i.e., ϵR, ϵG, and ϵB, are obtained by diffusing δR, δG, and B″ with d′5′, d′6′, and d′7, and the η operator, respectively. Finally, the encrypted image (EM) is obtained by concatenating the ϵR, ϵG, and ϵB.
The step-by-step approach is shown in Algorithm 1.
Algorithm 1 Image encryption technique for surveillance systems
Input: im as image for processing
Output: result of applied encryption EM
/* input image im process on three channels, red (R), green (G), and blue (B) */
R = im(:, :, 1);
G = im(:, :, 2);
B = im(:, :, 3);
Apply Arnold transform to permute color channels R, G, and B;
Use Algorithm 2 to calculate optimal parameters (zk(k = 1: SolDˆ));
Use Algorithm 5 to generate secret keys d′u, for u = 1, …, 7;
//Use d′1, d′2, and d′3 δR = mod (Rd′1, 256) to diffuse processed color channels;
G′ = mod (Gd′2, 256); δG = mod (G′R″, 256); B′ = mod (Bd′3, 256); B″ = mod (B′G′, 256);
//Update d5′ and d6′ using d4′ d5″ = d′5 ⊕ d′4;
d6″ = d′6 ⊕ d′4;
//Encrypt R″, G″, and B″ using d′5, d6″, and d7′ η = ulM;
ϵR = mod (d5″ × R″ + (1 − η) × d5″, 256);
ϵG = mod (d6″ × G″ + (1 − η) × d6″, 256);
ϵB = mod (d7′× B″ + (1 − η) × d7′, 256);
//As a result of processing the output, an encrypted image is generated as a combination of applied color channels;
EM = cat (ϵR, ϵG, ϵB); return EM

4.1. PRNDO-Based Optimal Parameters

The parameters of 5DHCM are d1, d2, d3, d4, d5, q, r, s, t, u, v, and w, and they need to be initialized. Manual selection of the above parameters is a computationally expensive task. For better key generation, these parameters are selected optimally by using PRNDO optimization. The procedure to generate the optimal parameters for 5DHCM using PRNDO is outlined in Algorithm 2.
Algorithm 2 PRNDO-based optimal parameters’ generation
Input: Solution dimension Solo, scenario dimension So, maximum generation Nh, and population size Ml
Output: Optimized population: Set generation u = 0;
//population initialization
Pa = {(z1,u, I1,u), (z2,u, I2,u), …, (zM ,u, IM,u)},
where zk,u = {z1, S2, …, SSold }
for y = 1 to Ms do
fitness of individual (zk,u, Ik,u) is evaluated using Algorithm 6; end
for u = 1 to Nh do
Min heap is built for each individual in qu;
Use (Algorithm 3) to implement the bottom-boosting approach on min-heap;
for k = 1 to Ml do
//Individual (ze, Ie) stored as a root node in the min-heap
zk,u = ze, Ik,u = Ie;
Extract root node from min-heap;
end
zbest = z1, u;
Use partial-regeneration strategy for Du updating (Algorithm 4);
Du+1 = Du;
end
In Algorithm 2, firstly, the parameters’ solution dimension Solo, scenario dimension So, maximum generation Nh, and population size Ml are initialized. Using normal distribution, initial population Du is generated randomly. Each individual (zk,u, Ik,u) represents a set consisting of solution and scenario. Fitness of (zk,u, Ik,u) is evaluated using Algorithm 6. A min-heap is built using Du. The scenarios are updated using Algorithm 3. The current population is updated by extracting the root node of min-heap. Then, the nodes are arranged in increasing order on the basis of fitness. The initial solution of a given population is utilized as a global best solution. Thereafter, a partial-regeneration strategy is utilized to further update the current population (Algorithm 4). The entire steps are iteratively implemented until the stopping criteria are not met.
Algorithm 3 Bottom-boosting approach
Input: Scaling factor F, a min-heap constructed using Du, crossover rate Ie, and number of fitness evaluations
Hw, Output: Min-heap EE = 0;
while EE < Hw do
//Consider each (zk,u, Ik,u) stored in the root, visit root of min-heap;
Mutant is developed as
Iwk,u = Ie1, u + H(Ie2, uIe3, u);//where e1, e2, and e3 are elected on a random basis from {1, …, Ml}
Trial scenario IVk,u is produced using binomial recombination on Ik,u and IUk,u;
if F (zk,u, IVk,u) > F (zk,u, Ik,u) then extract the root node of min-heap; Ik,u = IVk,u;
Update min-heap using (zk,u, Ik,u);
end
EE = EE + 1;
end
Algorithm 4 Partial-regeneration approach
Input: Sorted population Du, scaling factor F, crossover rate Ie, and number of updated individuals β
Output: Updated population Du y = 1;
while yβ do
Xk,u = zk,u + H(Yr1, azl2, u);//Here, k ∈ {1, 2, …, β}
Trail solution ϕk,u is produced using binomial recombination on zk,u and Xk,u; zMl + 1 − y,u = ϕk,u;
Reinitialize IMl + 1 − y,u, randomly;
Evaluate the fitness of (zMl + 1 − y,u, zMl + 1 − y,u) using Algorithm 6;
y = y + 1;
end
Algorithm 5 Generation of secret keys using 5DHCM
Input: Optimized parameters zk(k = 1: SolDˆ)
Output: Secret keys d′1, d′2, d′3, d′4, d′5, d′6, and d′7
//In zk(k = 1: SolDˆ − 1), SolDˆ = 18.
//zk(k = 1: SolDˆ − 1) denotes d1, d2, d3, d4, d5, q, r, s, t, u, v, and w, respectively.
d′1 = z6(z2z1) + z2z3z4;
d′2 = z7(z1 + z2) + z5z1z3z4;
d′3 = −z8z2z9z3z10z4 + z1z2z4; d′4 = −z11z4 + z2z3z1;
d′5 = −z12(z1 + z2); d′6 = z1z2;
d′7 = z3z4;
return d′1, d′2, d′3, d′4, d′5, d′6, and d′7

4.2. Secret Keys

The process of secret keys’ generation using 5DHCM is elaborated in Algorithm 5. It uses the optimized parameters obtained from Algorithm 2. The keys such as d1, d2, d3, d4, d5, d6, and d7 are generated using Algorithm 5. To diffuse the image, these keys are utilized by Algorithm 1 to obtain the encrypted image.

4.3. Fitness Evaluation

To compute the individuals, the following fitness function is utilized
Correlation and entropy are widely accepted parameters to obtain the optimal solutions because in image encryption, there is a need to reduce the relationship between the pixels. In the case of maximum entropy, each pixel carries the same amount of information. Both parameters hide the statistical behavior of the images from the attacker. The desired value of correlation and entropy should be near 0 and 8, respectively. The fitness function is described in Algorithm 6.
Algorithm 6 Fitness function
Input: solution zk(k = 1: SolDˆ), input image, im
Output: Fitness value, F
Encrypted image, EM, is obtained using Algorithm 1
II = correlation (EM);
ϵx = entropy (EM);
if ϵx>7.9990 &&−0.05CC0.05 then
end
return F (ϕ)
Algorithm 7 Image decryption process
Symmetry 13 01447 i001

4.4. Image Decryption Algorithm

The encrypted image is decrypted using Algorithm 7 to obtain the original image. The initial values of d1, d2, d3, d4, d5, q, r, s, t, u, v, w, and η attributes are needed to decrypt the image.

5. Comparative Analysis

Simulations were performed using MATLAB 2020a with the help of the image processing toolbox. The proposed encryption model is compared with five well-known competitive approaches by using various performance metrics. The initial parameters of PRNDO are assigned as F = 0.6, Cr = 0.2, N = 50, KS = 170, and T = 5. Four surveillance camera images were used, with 256 × 256 size.

5.1. Visual Analysis

Input and the respective encrypted surveillance images are shown in Figure 6. It clearly indicates that the obtained encrypted surveillance images seem like purely noisy images in nature. Therefore, no attacker can obtain any kind of details of the encrypted images.

5.2. Quantitative Analysis

5.2.1. Entropy

Entropy [29] computes the degree of randomness in images. In encrypted images, it is desirable to have 8 degrees of randomness. An entropy analysis of the proposed secure surveillance system is depicted in Table 1. It shows that the entropy values of all the techniques on surveillance images (SIk), where k = 1, 2, 3, or 4, were near to 8, but the proposed secure surveillance system achieved higher values than the existing techniques.

5.2.2. Peak Signal-to-Noise Ratio

Peak signal-to-noise ratio (PSNR) [37] analysis is depicted in Table 2. It was found that the proposed secure surveillance system outperformed the existing approaches. Block scrambling methodologies are used for image encryption process [38].

5.2.3. Mean Absolute Error

Mean absolute error (MAE) analysis is shown in Table 3. It revealed that the proposed model obtained significantly better values than the existing models.

5.3. Security Analysis

In this section, we will test the proposed secure surveillance system model against various security attacks. The objective was to evaluate whether or not the proposed secure surveillance system model can resist various security threats.

5.3.1. Histogram Analysis

To evaluate the performance of the proposed secure surveillance system model against an attack, we used histogram analysis. It was found that the histograms of the encrypted images should be uniform. Histogram analysis of the proposed model is shown in Figure 7, and it was found that the histograms of encrypted images obtained from the proposed secure surveillance system model were evenly distributed.

5.3.2. Correlation Analysis

Correlation can also be used to evaluate the statistical information of surveillance images. Thus, it is desirable that the correlation between the adjacent pixels vertically, diagonally, and horizontally should be minimum. The horizontal correlation analysis is depicted in Table 4. It shows that the correlation among horizontal pixels was minimum compared to the existing encryption models. Vertical and diagonal correlation analyses are shown in Table 5 and Table 6. The minimum correlation values of the proposed secure surveillance system indicate that the proposed model can resist correlation attacks.

5.3.3. Differential Analysis

The differential analysis can be computed using the Number of Pixel Change Rates (NPCR) and Unified Average Change Intensity (UACI). The NPCR and UACI analyses of the proposed secure surveillance system are depicted in Table 7 and Table 8. It was found that the proposed model achieved better NPCR and UACI values than the competitive models. Thus, the proposed model is sensitive towards the tiny modification in input surveillance images.

5.3.4. Robustness against Various Attacks

  • Noise attack
Robustness of the proposed secure surveillance system was evaluated against salt and pepper and Gaussian noise attacks with various densities of noise.
Figure 8 shows noisy encrypted images for which Gaussian noise with (µ1 = 0.1, σ1 = 0.1), (µ2 = 0.3, σ2 = 0.3), and (µ3 = 0.5, σ3 = 0.5) were used. The corresponding decrypted images are depicted in Figure 8d–f. The corresponding PSNR values among actual and decrypted images were 27.58, 21.39 and 13.84 dB. The visual analysis shows that the proposed model can preserve details from the attacked images.
Figure 9 shows salt and pepper noise-affected encrypted images, with density = 0.1, 0.3, and 0.6, respectively. Figure 9d–f demonstrates decrypted images evaluated from the respective noisy images.
The corresponding PSNR among SI1 and decrypted SI1 were 32.13, 23.73, and 17.25 dB. The decrypted images show that the proposed model can decrypt images even from high-density noise
  • Enhancement attack
Attackers may utilize image enhancement to damage the encrypted images. Attacked encrypted images obtained from various enhancement attacks such as gamma correction, histogram equalization, and adaptive histogram equalization are shown in Figure 10a–c. The corresponding decrypted images are depicted in Figure 10d–f. The corresponding PSNR values were 27.35, 19.72, and 14.93 dB. Visual analysis also revealed that the proposed model can provide potential information of actual images.

5.3.5. Key Analysis

To evaluate the performance of the proposed secure surveillance system against brute-force attack, key sensitivity and key space analysis were considered.
  • Secret key space
The proposed secure surveillance system computes the secret keys by 5DHCM. It requires 7 state attributes (i.e., d1, d2, d3, d4, d5, d6, and d7) and 7 control attributes (i.e., q, r, s, t, u, v, and w). Assume that the precision of attributes is 10−16. Thus, each attribute has 1016 possible values. Thus, the proposed secure surveillance system has key space:
(KS) ≈ 10,119
KS = d1 × d2 × d3 × d4 × d5 × d6 × d7 × q × r × s × t × u × v × w
= 1016 × 1016 × 1016 × 1016 × 1016 × 1016 × 1016 × 1016 × 1016 × 1016 × 1016 × 1016 × 1016 × 1016
≈ 1016^14
Since the key space > 1030 (≈ 2100), therefore, the proposed encryption model can resist a brute-force attack.
  • Secret key sensitivity analysis
It is desirable for the secret keys to be more sensitive towards tiny changes. Seven keys were evaluated to implement the proposed encryption. These 7 keys were computed by Equation (1) with the help of initial state (i.e., u1, u2, u3, u4, u5, u6, and u7) and control (i.e., s, r, t, i, q1, p, n, e, g, and q2) attributes. Assume that a tiny change is made in the bits of u1. To verify the key sensitivity, we will encrypt the surveillance images using an actual key and with a tiny change in the same key. The encrypted surveillance images with actual and modified keys are shown in Figure 11b,c. Figure 11d shows the error between Figure 11b and c. The computed error seems to be a completely random image. We have also decrypted Figure 11b by utilizing both keys. The evaluated results are depicted in Figure 11e,f. If the identical key is used for decryption, then the obtained image is similar to the actual image. The decrypted image obtained using a tiny change in the actual key seems to be a completely noisy image. Thus, the proposed model is very sensitive towards the encryption key.
Table 9 shows the error between a modified and an actual key-based encrypted image. It demonstrates that the proposed secure surveillance system is sensitive towards initial key values.

5.3.6. Execution Time

Encryption and decryption execution time analyses are shown in Table 10 and Table 11. These tables reveal that the proposed model can encrypt and decrypt images at a higher speed, as it requires less time than the existing models.

6. Conclusions

An image encryption technique for secure surveillance for IoT systems has been proposed in this paper. The image was made secure before the transmission from the surveillance system. A hyperchaotic map was utilized to obtain the pseudorandom sequences. The initial parameters of the hyperchaotic map were produced using PRNDO. The permutation was carried out through Arnold transform. Thereafter, a diffusion process was implemented to generate the encrypted images. The performance of the proposed framework was assessed by drawing the comparisons with competitive techniques based on security parameters. It was found that the proposed framework provides promising results as compared to the existing techniques. The proposed technique is able to resist against different attacks, such as noise and enhancement attacks. Experimental analyses showed that the proposed technique outperformed the competitive techniques in terms of visual analysis, quantitative analysis, security analysis, and execution time. As the proposed technique can encrypt and decrypt images at higher speeds, therefore, the proposed technique can be used for real-time secure surveillance systems.

Author Contributions

Conceptualization, G.G., K., D.A., S.V., D.B.R. and M.W.; data curation, K., D.A., S.V., D.B.R. and J.S.; formal analysis, G.G., K., D.A., S.V. and D.B.R.; funding acquisition, J.S. and M.W.; investigation, G.G., K. and D.A.; methodology, G.G., K., D.A., S.V. and D.B.R.; project administration, M.W., S.V., D.B.R. and J.S.; resources, K., D.A., S.V., D.B.R. and Z.M.; software, K., D.A. and S.V.; supervision, S.V., J.S. and M.W.; validation, S.V., D.B.R., J.S. and Z.M.; visualization, G.G., K. and D.A.; writing—review and editing, G.G., K., D.A., S.V., D.B.R. and J.S. All authors have read and agreed to the published version of the manuscript.

Funding

The authors acknowledge contribution to this project from the Rector of Silesian University of Technology, Gliwice, Poland under the proauality grant no. 09/020/RGJ21/0007.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

Jana Shafi would like to thank the Deanship of Scientific Research, Prince Sattam bin Abdul Aziz University, for supporting this work.

Conflicts of Interest

The authors declare that they have no conflict of interest.

References

  1. Muhammad, K.; Hamza, R.; Ahmad, J.; Lloret, J.; Wang, H.H.G.; Baik, S.W. Secure Surveillance Framework for IoT Systems Using Probabilistic Image Encryption. IEEE Trans. Ind. Inform. 2018, 14, 3679–3689. [Google Scholar] [CrossRef]
  2. Khan, J.; Li, J.P.; Ahamad, B.; Parveen, S.; Haq, A.U.; Khan, G.A.; Sangaiah, A.K. SMSH: Secure Surveillance Mechanism on Smart Healthcare IoT System With Probabilistic Image Encryption. IEEE Access 2020, 8, 15747–15767. [Google Scholar] [CrossRef]
  3. Hamza, R.; Hassan, A.; Patil, A.S. A Lightweight Secure IoT Surveillance Framework Based on DCT-DFRT Algorithms. In Proceedings of the International Conference on Machine Learning for Cyber Security, Xi’an, China, 19–22 September 2019; Springer: Berlin/Heidelberg, Germany, 2019; pp. 271–278. [Google Scholar]
  4. Roy, S.; Shrivastava, M.; Pandey, C.V.; Nayak, S.K.; Rawat, U. Ievca: An efficient image encryption technique for iot applications using 2-d von-neumann cellular automata. Multimed. Tools Appl. 2020, 1–39. [Google Scholar] [CrossRef]
  5. Hussain, A.; Nazir, S.; Khan, F.; Nkenyereye, L.; Ullah, A.; Khan, S.; Verma, S.; Kavita. A Resource Efficient hybrid Proxy Mobile IPv6 extension for Next Generation IoT Networks. IEEE Internet Things J. 2021, 1, 3058982. [Google Scholar] [CrossRef]
  6. Singh, A.P.; Pradhan, N.R.; Luhach, A.K.K.; Agnihotri, S.; Jhanjhi, N.Z.; Verma, S.; Kavita; Ghosh, U.; Roy, D.S. A Novel Patient-Centric Architectural Framework for Blockchain-Enabled Healthcare Applications. IEEE Trans. Ind. Inform. 2021, 17, 5779–5789. [Google Scholar] [CrossRef]
  7. Li, L.; Wen, G.; Wang, Z.; Yang, Y.-X. Efficient and Secure Image Communication System Based on Compressed Sensing for IoT Monitoring Applications. IEEE Trans. Multimed. 2019, 22, 82–95. [Google Scholar] [CrossRef]
  8. Feixiang, Z.; Mingzhe, L.; Kun, W.; Hong, Z. Color image encryption via Hénon-zigzag map and chaotic restricted Boltzmann machine over Blockchain. Opt. Laser Technol. 2021, 135, 106610. [Google Scholar] [CrossRef]
  9. Brahim, A.H.; Pacha, A.A.; Said, N.H. Image encryption based on compressive sensing and chaos systems. Opt. Laser Technol. 2020, 132, 106489. [Google Scholar] [CrossRef]
  10. Talhaoui, M.Z.; Wang, X. A new fractional one dimensional chaotic map and its application in high-speed image encryption. Inf. Sci. 2021, 550, 13–26. [Google Scholar] [CrossRef]
  11. Yang, G.; Jan, M.A.; Rehman, A.U.; Babar, M.; Aimal, M.M.; Verma, S. Interoperability and Data Storage in Internet of Multimedia Things: Investigating Current Trends, Research Challenges and Future Directions. IEEE Access 2020, 8, 124382–124401. [Google Scholar] [CrossRef]
  12. Javeed, A.; Shah, T. Attaullah Lightweight secure image encryption scheme based on chaotic differential equation. Chin. J. Phys. 2020, 66, 645–659. [Google Scholar] [CrossRef]
  13. Sumit, K.; Ravishankar; Sahil, V. Context Aware Dynamic Permission Model: A Ret-rospect of Privacy and Security in Android System. In Proceedings of the International Conference on Intelligent Circuits and Systems, Phagwara, India, 19–20 April 2018; Springer: Berlin/Heidelberg, Germany, 2018. [Google Scholar]
  14. Logeswaran, T.; Kalaivani, S.; Karunakaran, S.; Anand, L.V.; Kumar, K.V. The generalized non-linear fresnel transform and its application to image encryption. Mater. Today Proc. 2020, 1, 1. [Google Scholar]
  15. Wang, B.; Zhang, B.; Liu, X. An image encryption approach on the basis of a time delay chaotic system. Optik 2021, 225, 165737. [Google Scholar] [CrossRef]
  16. Tao, Y.; Cui, W.; Zhang, Z. Spatiotemporal chaos in multiple dynamically coupled map lattices and its application in a novel image encryption algorithm. J. Inf. Secur. Appl. 2020, 55, 102650. [Google Scholar] [CrossRef]
  17. Wang, T.; Wang, M.-H. Hyperchaotic image encryption algorithm based on bit-level permutation and DNA encoding. Opt. Laser Technol. 2020, 132, 106355. [Google Scholar] [CrossRef]
  18. Wang, X.; Xue, W.; An, J. Image encryption algorithm based on tent-dynamics coupled map lattices and diffusion of house-hold. Chaos Solitons Fractals 2020, 141, 110309. [Google Scholar] [CrossRef]
  19. Vijayalakshmi, B.; Ramar, K.; Jhanjhi, N.Z.; Verma, S.; Kaliappan, M.; Vijayalakshmi, K.; Vimal, S.; Kavita; Ghosh, U. An Attention Based Deep Learning Model For Traffic Flow Prediction Using Spatio Temporal Features Towards Sustainable Smart City. Int. J. Commun. Syst. 2021, 34, e4609. [Google Scholar] [CrossRef]
  20. Wang, X.; Li, Y. Chaotic image encryption algorithm based on hybrid multi-objective particle swarm optimization and DNA sequence. Opt. Lasers Eng. 2021, 137, 106393. [Google Scholar] [CrossRef]
  21. Kaur, M.; Kumar, V. Parallel non-dominated sorting genetic algorithm-II-based image encryption technique. Imaging Sci. J. 2018, 66, 453–462. [Google Scholar] [CrossRef]
  22. Kaur, M.; Kumar, V. Beta Chaotic Map Based Image Encryption Using Genetic Algorithm. Int. J. Bifurc. Chaos 2018, 28, 1850132. [Google Scholar] [CrossRef]
  23. Kaur, M.; Singh, D.; Uppal, R.S. Parallel strength Pareto evolutionary algorithm-II based image encryption. IET Image Process. 2020, 14, 1015–1026. [Google Scholar] [CrossRef]
  24. Kaur, M.; Kumar, V. Adaptive Differential Evolution-Based Lorenz Chaotic System for Image Encryption. Arab. J. Sci. Eng. 2018, 43, 8127–8144. [Google Scholar] [CrossRef]
  25. Rani, P.; Kavita; Verma, S.; Nguyen, G.N. Mitigation of Black Hole and Gray Hole Attack Using Swarm Inspired Algorithm With Artificial Neural Network. IEEE Access 2020, 8, 121755–121764. [Google Scholar] [CrossRef]
  26. Kaur, M.; Singh, D.; Sun, K.; Rawat, U. Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map. Futur. Gener. Comput. Syst. 2020, 107, 333–350. [Google Scholar] [CrossRef]
  27. Kaur, M.; Kumar, V.; Li, L. Color image encryption approach based on memetic differential evolution. Neural Comput. Appl. 2019, 31, 7975–7987. [Google Scholar] [CrossRef]
  28. Kaur, M.; Kumar, V. Colour image encryption technique using differential evolution in non-subsampled contourlet transform domain. IET Image Process. 2018, 12, 1273–1283. [Google Scholar] [CrossRef]
  29. Radanliev, P.; De Roure, D.C.; Nurse, J.R.C.; Montalvo, R.M.; Cannady, S.; Santos, O.; Maddox, L.; Burnap, P.; Maple, C. Future developments in standardisation of cyber risk in the Internet of Things (IoT). SN Appl. Sci. 2020, 2, 1–16. [Google Scholar] [CrossRef] [Green Version]
  30. Fan, B.; Tang, L.-R. A new five-dimensional hyperchaotic system and its application in DS-CDMA. In Proceedings of the 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, Chongqing, China, 29–31 May 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 2069–2073. [Google Scholar]
  31. Yuan, H.-M.; Liu, Y.; Lin, T.; Hu, T.; Gong, L.-H. A new parallel image cryptosystem based on 5D hyper-chaotic system. Signal Process. Image Commun. 2017, 52, 87–96. [Google Scholar] [CrossRef]
  32. Dang, H.-G. Parameter Identification of a New Hyper-chaotic System. In Proceedings of the 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation, Hong Kong, China, 16–17 January 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 785–787. [Google Scholar]
  33. Qiu, X.; Xu, J.-X.; Xu, Y.H.; Tan, K.C. A New Differential Evolution Algorithm for Minimax Optimization in Robust Design. IEEE Trans. Cybern. 2018, 48, 1355–1368. [Google Scholar] [CrossRef] [PubMed]
  34. Mondal, B.; Mandal, T. A light weight secure image encryption scheme based on chaos & DNA computing. J. King Saud Univ. Comput. Inf. Sci. 2017, 29, 499–504. [Google Scholar]
  35. Batra, I.; Verma, S.; Malik, A.; Kavita; Ghosh, U.; Rodrigues, J.J.P.C.; Nguyen, G.N.; Hosen, A.S.M.S.; Mariappan, V. Hybrid Logical Security Framework for Privacy Preservation in the Green Internet of Things. Sustainability 2020, 12, 5542. [Google Scholar] [CrossRef]
  36. Li, W.; Chai, Y.; Khan, F.; Jan, S.R.U.; Verma, S.; Menon, V.G.; Kavita; Li, X. A Comprehensive Survey on Machine Learning-Based Big Data Analytics for IoT-Enabled Smart Healthcare System. Mob. Netw. Appl. 2021, 26, 234–252. [Google Scholar] [CrossRef]
  37. Rawat, N.; Kim, B.; Kumar, R. Fast digital image encryption based on compressive sensing using structurally random matrices and arnold transform technique. Optik 2016, 127, 2282–2286. [Google Scholar] [CrossRef]
  38. Ramasamy, P.; Ranganathan, V.; Kadry, S.; Damaševičius, R.; Blažauskas, T. An Image Encryption Scheme Based on Block Scrambling, Modified Zigzag Transformation and Key Generation Using Enhanced Logistic—Tent Map. Entropy 2019, 21, 656. [Google Scholar] [CrossRef] [PubMed] [Green Version]
Figure 1. Chaotic attractor in the y1-y2 plane.
Figure 1. Chaotic attractor in the y1-y2 plane.
Symmetry 13 01447 g001
Figure 2. Chaotic attractor in the y1-y2-y3 plane.
Figure 2. Chaotic attractor in the y1-y2-y3 plane.
Symmetry 13 01447 g002
Figure 3. Time series plot for state variable y1 using system (1).
Figure 3. Time series plot for state variable y1 using system (1).
Symmetry 13 01447 g003
Figure 4. Flowchart of PRNDO.
Figure 4. Flowchart of PRNDO.
Symmetry 13 01447 g004
Figure 5. Applied model of encryption.
Figure 5. Applied model of encryption.
Symmetry 13 01447 g005
Figure 6. Input images: (ad) input surveillance images. Encrypted images: (eh) encrypted surveillance images. Decrypted images: (il) decrypted surveillance images.
Figure 6. Input images: (ad) input surveillance images. Encrypted images: (eh) encrypted surveillance images. Decrypted images: (il) decrypted surveillance images.
Symmetry 13 01447 g006
Figure 7. Histogram analysis: (a) surveillance images, (b) histogram of surveillance images, (c) histogram of encrypted surveillance images, and (d) encrypted surveillance images.
Figure 7. Histogram analysis: (a) surveillance images, (b) histogram of surveillance images, (c) histogram of encrypted surveillance images, and (d) encrypted surveillance images.
Symmetry 13 01447 g007
Figure 8. Gaussian noise attack-based encrypted images: (a) with µ = 0.1 and σ2 = 0.1, (b) with µ = 0.3 and σ2 = 0.3, and (c) with µ = 0.5 and σ2 = 0.5. Corresponding decrypted images: (d) evaluated using (a), (e) evaluated using (b), and (f) evaluated using (c).
Figure 8. Gaussian noise attack-based encrypted images: (a) with µ = 0.1 and σ2 = 0.1, (b) with µ = 0.3 and σ2 = 0.3, and (c) with µ = 0.5 and σ2 = 0.5. Corresponding decrypted images: (d) evaluated using (a), (e) evaluated using (b), and (f) evaluated using (c).
Symmetry 13 01447 g008
Figure 9. Salt and pepper noise-based encrypted images (a) with density = 0.1, (b) with density = 0.3, and (c) with density = 0.6. Corresponding encrypted images: (d) evaluated using (a), (e) evaluated using (b), and (f) evaluated using (c).
Figure 9. Salt and pepper noise-based encrypted images (a) with density = 0.1, (b) with density = 0.3, and (c) with density = 0.6. Corresponding encrypted images: (d) evaluated using (a), (e) evaluated using (b), and (f) evaluated using (c).
Symmetry 13 01447 g009
Figure 10. Enhancement-based encrypted images: (a) gamma correction, (b) histogram equalization, and (c) adaptive histogram equalization. Corresponding decrypted images: (d) evaluated using (a), (e) evaluated using (b), and (f) evaluated using (c).
Figure 10. Enhancement-based encrypted images: (a) gamma correction, (b) histogram equalization, and (c) adaptive histogram equalization. Corresponding decrypted images: (d) evaluated using (a), (e) evaluated using (b), and (f) evaluated using (c).
Symmetry 13 01447 g010
Figure 11. Sensitivity analysis: (a) actual surveillance image, (b) actual key-based encrypted image, (c) same key with tiny changes-based encrypted image, (d) error between (b) and (c), (e) actual key-based decrypted image, and (f) tiny changed key-based decrypted image.
Figure 11. Sensitivity analysis: (a) actual surveillance image, (b) actual key-based encrypted image, (c) same key with tiny changes-based encrypted image, (d) error between (b) and (c), (e) actual key-based decrypted image, and (f) tiny changed key-based decrypted image.
Symmetry 13 01447 g011
Table 1. Entropy analysis of the proposed secure surveillance system.
Table 1. Entropy analysis of the proposed secure surveillance system.
ModelSI1SI2SI3SI4
2LSS [1]7.99687.98367.99867.9886
CTCM [2]7.99867.98467.99257.9860
DFRT [3]7.99367.99597.98457.9899
HDNA-HC [5]7.98807.99567.98367.9836
CSCM [7]7.99727.98627.99697.9885
Proposed7.99807.99827.99867.9984
Table 2. PSNR analysis of the proposed snecure surveillance system.
Table 2. PSNR analysis of the proposed snecure surveillance system.
ModelSI1SI2SI3SI4
2LSS [1]71.382671.767569.925669.3956
CTCM [2]69.786970.404068.836270.9381
DFRT [3]69.428869.198370.745271.9038
HDNA-HC [5]70.625771.353969.906269.3482
CSCM [7]69.928269.926470.963671.8936
Proposed80.926182.368980.836280.3782
Table 3. Mean absolute error analysis of the proposed secure surveillance system.
Table 3. Mean absolute error analysis of the proposed secure surveillance system.
ModelSI1SI2SI3SI4
2LSS [1]79.483481.838279.362382.8262
CTCM [2]83.805282.361784.385481.3822
DFRT [3]81.882683.908381.866982.4837
HDNA-HC [5]83.706881.189884.765684.0944
CSCM [7]83.694585.606587.808486.8636
Proposed88.284790.874291.350890.6820
Table 4. Horizontal correlation analysis.
Table 4. Horizontal correlation analysis.
ModelSI1SI2SI3SI4
2LSS [1]0.00280.00290.0038−0.0022
CTCM [2]0.00900.00600.00400.0022
DFRT [3]−0.00500.01230.00900.0040
HDNA-HC [5]0.00400.0070−0.00900.0036
CSCM [7]0.00720.0038−0.00500.0055
Proposed−0.0090.00160.00190.0021
Table 5. Vertical correlation analysis.
Table 5. Vertical correlation analysis.
ModelSI1SI2SI3SI4
2LSS [1]0.00360.0030−0.00260.0016
CTCM [2]−0.00660.00680.00260.0042
DFRT [3]0.00260.00150.00220.0019
HDNA-HC [5]0.00280.0016−0.00250.0014
CSCM [7]0.0016−0.00240.00280.0024
Proposed0.0014−0.00100.00130.0009
Table 6. Diagonal correlation analysis.
Table 6. Diagonal correlation analysis.
ModelSI1SI2SI3SI4
2LSS [1]−0.01180.00720.00580.0028
CTCM [2]0.00460.00340.00600.0032
DFRT [3]0.00620.00440.00280.0026
HDNA-HC [5]−0.00440.00340.00560.0038
CSCM [7]0.00420.00500.0044−0.0062
Proposed0.00190.00210.00180.0020
Table 7. NPCR analysis of the proposed secure surveillance system.
Table 7. NPCR analysis of the proposed secure surveillance system.
ModelSI1SI2SI3SI4
2LSS [1]99.4099.5299.4899.50
CTCM [2]99.4499.4099.5099.52
DFRT [3]99.4699.5099.5499.48
HDNA-HC [5]99.4599.5299.4899.50
CSCM [7]99.5999.5699.5899.46
Proposed99.6599.7099.6999.72
Table 8. UACI analysis of the proposed secure surveillance system.
Table 8. UACI analysis of the proposed secure surveillance system.
ModelSI1SI2SI3SI4
2LSS [1]33.2533.3333.3533.30
CTCM [2]33.3933.4033.3833.36
DFRT [3]33.3033.3733.4033.38
HDNA-HC [5]33.3833.4233.4233.48
CSCM [7]33.4033.5033.5033.49
Proposed33.5533.5833.6433.62
Table 9. Error between actual and modified key-based encrypted images.
Table 9. Error between actual and modified key-based encrypted images.
SI1SI2SI3SI4
Error99.996599.995899.996999.9971
Table 10. Encryption time analysis.
Table 10. Encryption time analysis.
ImageDimensions2LSS [1]CTCM [2]DFRT [3]DNA-HC [5]CSCM [7]Proposed Approach
SI1256 × 25611.315.412.412.611.110.3
SI2512 × 51258.860.856.855.658.639.4
SI31024 × 1024648.6601.6626.8611.8598.8592.6
SI42048 × 20482368.82658.82358.42261.21996.21872.1
Table 11. Decryption time analysis.
Table 11. Decryption time analysis.
ImageDimensions2LSS [1]CTCM [2]DFRT [3]DNA-HC [5]CSCM [7]Proposed Approach
SI1256 × 2560.0620.0510.0420.0390.0410.034
SI2512 × 5120.0490.0510.0430.0520.0460.037
SI31024 × 10240.0610.0510.0460.0510.0450.037
SI42048 × 20480.0640.0510.0430.0520.0390.035
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ghosh, G.; Kavita; Anand, D.; Verma, S.; Rawat, D.B.; Shafi, J.; Marszałek, Z.; Woźniak, M. Secure Surveillance Systems Using Partial-Regeneration-Based Non-Dominated Optimization and 5D-Chaotic Map. Symmetry 2021, 13, 1447. https://doi.org/10.3390/sym13081447

AMA Style

Ghosh G, Kavita, Anand D, Verma S, Rawat DB, Shafi J, Marszałek Z, Woźniak M. Secure Surveillance Systems Using Partial-Regeneration-Based Non-Dominated Optimization and 5D-Chaotic Map. Symmetry. 2021; 13(8):1447. https://doi.org/10.3390/sym13081447

Chicago/Turabian Style

Ghosh, Gopal, Kavita, Divya Anand, Sahil Verma, Danda B. Rawat, Jana Shafi, Zbigniew Marszałek, and Marcin Woźniak. 2021. "Secure Surveillance Systems Using Partial-Regeneration-Based Non-Dominated Optimization and 5D-Chaotic Map" Symmetry 13, no. 8: 1447. https://doi.org/10.3390/sym13081447

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop