Next Article in Journal
Developing an Evaluation Index System for Enterprise Niche
Next Article in Special Issue
High-Performance Artificial Intelligence Recommendation of Quality Research Papers Using Effective Collaborative Approach
Previous Article in Journal
Human-in-Loop: A Review of Smart Manufacturing Deployments
Previous Article in Special Issue
Adaptive Artificial Bee Colony Algorithm for Nature-Inspired Cyber Defense
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Encipher GAN: An End-to-End Color Image Encryption System Using a Deep Generative Model

by
Kirtee Panwar
1,†,
Akansha Singh
1,*,†,
Sonal Kukreja
1,†,
Krishna Kant Singh
2,†,
Nataliya Shakhovska
3,† and
Andrii Boichuk
3,†
1
SCSET, Bennett University, Greater Noida 201310, India
2
Deaprtment of CSE, ASET, Amity University, Noida 201303, India
3
Department of Artificial Intelligence, Lviv Polytechnic National University, 79013 Lviv, Ukraine
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Systems 2023, 11(1), 36; https://doi.org/10.3390/systems11010036
Submission received: 29 November 2022 / Revised: 31 December 2022 / Accepted: 3 January 2023 / Published: 7 January 2023

Abstract

:
Chaos-based image encryption schemes are applied widely for their cryptographic properties. However, chaos and cryptographic relations remain a challenge. The chaotic systems are defined on the set of real numbers and then normalized to a small group of integers in the range 0–255, which affects the security of such cryptosystems. This paper proposes an image encryption system developed using deep learning to realize the secure and efficient transmission of medical images over an insecure network. The non-linearity introduced with deep learning makes the encryption system secure against plaintext attacks. Another limiting factor for applying deep learning in this area is the quality of the recovered image. The application of an appropriate loss function further improves the quality of the recovered image. The loss function employs the structure similarity index metric (SSIM) to train the encryption/decryption network to achieve the desired output. This loss function helped to generate cipher images similar to the target cipher images and recovered images similar to the originals concerning structure, luminance and contrast. The images recovered through the proposed decryption scheme were high-quality, which was further justified by their PSNR values. Security analysis and its results explain that the proposed model provides security against statistical and differential attacks. Comparative analysis justified the robustness of the proposed encryption system.

1. Introduction

With the onset of the Internet of Things era and an extensive increase in digital information transmission over the Internet, security issues such as tampering, personal privacy disclosure and illegal data theft arise from offering convenience to users. Traditional standard techniques such as the DES (Data Encryption Standard) and AES (Advanced Encryption Standard) encrypt textual data and are unsuitable for encrypting digital images. Digital images are crucial information media. As a result, a critical need exists for more secure and effective image encryption techniques. A digital image comprises several pixels with specific numerical values, redundant information and inter-pixel solid correlation. Image encryption is composed of two phases, diffusion and permutation. The pixel positions are exchanged in the permutation phase to eliminate strong correlations among neighboring pixels and hide data. In the diffusion phase, the image pixels are changed and diffused among each other.
Deep learning has tremendous usage in image processing, building chaotic systems, speech recognition, steganography, etc. Recently, deep-learning-based image encryption techniques have received extensive attention. In image encryption techniques, the content remains invisible until decryption using a correct and authorized key. In image cryptography techniques, the original image is encrypted into a cipher image using an encryption key that recovers the actual image using the decryption key. Cryptanalysis is cracking the information security systems, ciphers, keys, or encrypted images with plaintext attacks and ciphertext-only attacks. Figure 1 shows the relation of cryptanalysis with image encryption systems. Chaotic systems offer good cryptographic properties to image encryption techniques against cryptanalysis attacks, due to their non-linear behavior and sensitivity towards initial conditions.
As chaos theory defines itself in a continuum, its application in image cryptography is limited. The range of pixels in the spatial domain of the image is discrete and finite and has a deteriorating effect on the system’s security. A proper connection between chaos and cryptography leads to various attacks, despite various suggestions [1] to improve the cryptosystem. There is an immense need for an alternative, secure system for image encryption. Deep learning offers non-linearity to the image encryption system to enhance security against plaintext attacks. Figure 2 shows the image encryption process with a deep model. Deep-learning-based image encryption schemes are gaining much attention from recent researchers, as these schemes achieve equal or better security when compared to traditional encryption schemes. The encryption network of the deep learning network performs the task of encryption, and the decryption network performs the task of decryption. Apart from these two networks, a discriminator network is also employed to confirm that the decryption network regenerates the original image with the maximum possible similarity. This is performed with a cycle-consistent generative adversarial network (Cycle-GAN) [2]. Cycle-GAN shows outstanding performance in image style transfer. In [3], an image encryption/decryption network is designed based on Cycle-GAN: the original images are transformed into cipher images and recovered back through decryption network. The authors suggest its application in the Internet of Medical Things.
This paper proposes an image encryption scheme based on the Cycle-GAN network for medical applications. The nonlinearity introduced in the cryptosystem makes it secure against plaintext attacks. Further, the SSIM loss function is used in the proposed network, since medical images require good-quality pictures for better information exchange. The photos recovered through the proposed method can capture full details. The applications of this encryption scheme are limited to medical applications that can afford to lose minute or precise information, such as radiograph images. The images recovered through the proposed method can capture full details. The SSIM loss measures the similarity between pictures, rather than the distance between the pictures. The value of SSIM lies between [0,1], and the loss functions used for the encryption network and discriminator network work together to reflect a measure between real and fake data. The encryption network here can affect the distribution of counterfeit data, which depends on the real data’s distribution. This way, the network trains itself. After training, the encryption/decryption network is capable of efficiently encrypting/decrypting an input image. The size of encrypted images is the same as that of the original images. The trainable parameters are the secret keys. The hospital database stores the encrypted images, and only an authorized person with the keys can retrieve the original images.
The remainder of the paper is organized as follows. Section 2 discusses related image encryption schemes in brief. Section 3 illustrates the proposed EncipherGAN, followed by experimental results in Section 4. Section 5 concludes the contribution of the proposed work.

2. Related Works

This section discusses conventional research contributions exclusively carried out in the domain of image encryption.
Chen et al. [4] proposed a neural network for impulsive synchronization of the reaction-diffusion mechanism that captures the dynamical behaviors of the system. Further, the system is employed for image encryption applications. Chaotic systems are widely used for cryptography, especially for an image cryptosystem, as it provides security against various traditional attacks, such as plaintext attacks; thus, the neural network system in [4] was also applied in an image cryptosystem. Dridi et al. [5] proposed an image encryption scheme based on combination of chaotic and neural networks. This scheme proved to be more secure and less complex as compared to the existing schemes. Hu et al. [6] proposed image encryption with a stacked auto-encoder network for generating chaotic sequences. The scheme proved efficient due to the stacked autoencoder network’s parallel computing abilities and resistance to traditional attacks. Hu et al. [7] proposed novel image steganography without embedding a message into the carrier image using a deep model that improved image security metrics. The scheme shows high extraction phase and resistance against steganalysis algorithms.
Li et al. [8] illustrated an image encryption scheme that generated the encryption key by training a CNN on the CASIA iris dataset [9], extracting the features from iris image and encoding the feature vector using RS error correcting code. This encoded vector was further used to encrypt plain images using XOR operation. Ding et al. [3] improved the previous scheme by training a GAN on Montgomery County’s chest X-ray set [10] to generate the encryption key. This scheme showed a larger key space, high resistance to standard image processing attacks, high security due to pseudo randomness and high sensitivity to change. Jin and Kim [11] proposed a DNN-based image encryption scheme that restricted pre-sharing of the keys between systems. It instead created and utilized the keys used in the symmetric key encryption itself, which enhanced security. Another DNN-based robust image encryption scheme was proposed by Maniyath and Thanikaiselvan [12], which was trained on the SIPI image dataset and used chaotic maps to encrypt the image without affecting the image quality. Erkan et al. [13] encrypted the images using a diverse chaotic sequence generated using sensitive keys from training a CNN on the ImageNet database. The initial conditions of the hyperchaotic logistic map used for encryption were determined by the parameters generated through the network. Fratalocchi et al. [14] developed a two-layer deep neural network to classify silica aerogel (SA) into physical unclonable functions. SA exhibits chaotic behavior, which can be used as keys for cryptographic applications. This system generates a sequence of random key with every possible input condition. Li et al. [15] proposed a Cycle-GAN-based image encryption scheme; the network was trained on a plain-cipher satellite images dataset. Double random phase encoding was used to encrypt the images. Ding et al. [16] proposed another Cycle-GAN based scheme that was trained on a chest X-ray dataset [10]. In addition to the encryption–decryption task, the neural network also identifies the specific object in the cipher image. Bao and Xue [17] investigated the foundations of a strong avalanche effect by studying weaknesses in the previous scheme. A new improved scheme was proposed that also included a diffusion process into Bao et al.’s [18] scheme. The training of the neural network was performed on a satellite images dataset obtained from Google maps to reduce the avalanche affect. The schemed proved to be more efficient but showed low performance in decryption. Networks of Cycle-GANs are extensively employed in the encryption and decryption networks in deep-learning-based image encryption schemes, image steganography [19], etc.

3. Proposed Method

The proposed EncipherGAN develops an encrypted image from a given plain image, and vice versa. First, the encryption network G spawns an encrypted image from the plain image, and then decryption network H generates a plain image from the cipher image. The encryption network of Encipher-GAN is trained to generate cipher images that look similar to the target cipher image using encryption network G and discriminator network D x ; similarly, the proposed decryption network, F, along with the discriminator, D y , is trained with the objective of reconstructing plain images with minimum differences with reference to the original plain image. Figure 3 presents the flow diagram of the proposed encryption method.

3.1. Encryption Network

The encryption network transforms the style of the plain image (set X) to the style of the cipher image (set Y). The architecture of the encryption network, as illustrated in Figure 4, has three modules, i.e., a feature encoder, a transformation module and a feature decoder. The configuration of the encryption/decryption network, consisting of input layers and a series of convolution layers, is given in Table 1.
  • Feature Encoder:
    The input image is downsampled with three layers of convolution to extract the features of images.
    The encoder consists of three convolutions, each of which is followed by instance normalization and reLU activation. The first convolution layer has 64 filters of size 7 × 7 , followed by convolutions with filters of size 3 × 3 . The encoder downsamples the plain image to extract features.
  • Transformation Module:
    In this phase, the features are transformed by residual blocks. The model is optimized using a ResNet based architecture to enhance the stability of the model. These residual blocks consist of convolution–batch normalization–ReLU–convolution–batch normalization–LRelU. The output of each of these blocks are concatenated and then passed to the decoder. The size of input features and output remains the same during transformation.
  • Feature Decoder:
    The decoder upsamples the transformed features using rounds of transpose convolution layers. In the final convolution layer, these features are mapped to output image of size 256 × 256 × 3 .

3.2. Discriminator Network

The discriminator network consists of layers of convolution with leaky ReLU activation that extracts features of image, reducing the input volume by a factor of 2. Each convolution is performed with kernel size = 4 and stride = 2. Figure 5 presents the architecture of discriminator network. The output of the discriminator is classification of image similar to target or not; this is achieved with sigmoid activation in the final layer. The configuration of discriminator network is given in Table 2. The discriminator takes in two input images and compares its features through the network. The network outputs a value which is used to update the encryption network.

3.3. Decryption Network

The decryption network architecture is identical to the encryption network architecture. The input to this network is the cipher image, and the generated image is the plain image.

3.4. Training

Discriminator data for training: The discriminator takes data from two sources: the real images (plain/cipher) and the fake ones generated by encryption/decryption network. During training of the discriminator D x , the weights of the encryption network remain the same; it generates cipher images for the discriminator to classify correctly. For training, the discriminator uses one loss function. The adam optimizer is employed to generate a global minimum while updating the weights through backpropagation. The loss function to be minimized for training discriminator is defined as
L D = μ ( S S I M ( x , y ) )
where μ = 0.2 is the hyperparameter to achieve an acceptable equilibrium between the structure aspect of target image and generated image, where SSIM, i.e., the structural similarity index metric, is defined as
S S I M ( x , y ) = ( 2 u x u y + C 1 ) ( δ x y + C 2 ) ( u x 2 + u y 2 + C 1 ) ( δ x 2 + δ y 2 + C 2 )
where C 1 = ( k 1 L ) 2 ; C 2 = ( k 2 L ) 2 ; L is the maximum value of a pixel; k 1 = 0.01 and k 2 = 0.03 are constant parameters; δ x represents standard deviation of image x; and δ x y represents the covariance of image x and image y. The values of S S I M lies in range [0,1], where one indicates completely identical images.
The encryption network learns to create fake data so that the discriminator cannot classify correctly. The encryption network takes input image and generates cipher image. This cipher image is tested for similarity with the real cipher image by the discriminator. If the discriminator gives a value below 0.75, then the weights of the encryption network are updated with the loss function used by encryption network L g e n , defined as
L g e n ( G ) = μ ( 1 S S I M ( x , y ) )
The objective of optimization here is to obtain a global minimum, i.e., making the generated cipher images look similar to the real cipher images. The discriminator output determines whether the weights of the encryption network are to be updated using backpropagation or not. The encryption network is trained with the help of the discriminator. The discriminator’s weights remain constant when training of the encryption network is performed. For one epoch, the discriminator is trained, and then the encryption network is trained for one epoch. This cycle is repeated continuously for training of the entire network.
The decryption network is similar to the encryption network and transforms the generated cipher image back to a plain image. The training of discriminator network is performed in a similar way with the help of discriminator D y . The encryption system transforms image x from domain X into a cipher image through mapping G ( x ) , and the decryption system must be able to retrieve the plain image x back from cipher image G ( x ) —i.e.,  x G ( x ) F ( G ( x ) ) x ; therefore, forward-cycle consistency loss [2] is defined as
L c y c = E x P d a t a ( x ) [ | | F ( G ( x ) ) x ) ] + E y P d a t a ( y ) [ ( G ( F ( y ) ) y | | 1 ] ,
and is also employed during training of encryption/decryption network. This loss penalizes the output image x ^ generated by the decryption network when it deviates in content from the target x and vice versa.

Total Loss of the Network

Total loss of the encryption network is defined as
L ( G , F ) = L g e n ( G ) + L D + λ L c y c
The value of constant λ = 10 .
Finally, the information in the plain image is converted into a cipher image with perceptual properties of the real cipher image. The parameters in encryption/decryption network are the final parameters that form the private key. The plain image is regenerated from the cipher image with cycle consistency loss. Mean-square error (MSE) calculates the pixel-level differences between two images that do not account for the adjacent pixel correlation between images. In this paper, the structural features of two images are considered with the SSIM index while selecting the loss function, which is an essential metric for measuring image quality.

3.5. Encryption/Decryption Algorithm

The encryption is performed efficiently with the encryption network once the trained network has been obtained. During training, the parameters are randomly initialized, and the parameters of the network obtained after training are the secret keys of the encryption system. Using these keys, the plain image can be encrypted, and from the encrypted image, the plain image can be retrieved. The plain image to be encrypted must belong to a class of images on which the network is trained. The proposed model was trained on skin cancer images taken from [20]. The encryption algorithm is given below (Algorithm 1):
Algorithm 1 Encryption model.
Input: Plain Image I of size W × H × 3 and Secret Key ( K 1 )
Output: Cipher Image, C
  Initialisation: Assign trained weights to the encryption network using secret key K 1 .
1:
Data preprocessing: The input image has pixels in range from 0 to 255 which is normalized using normalization technique.
2:
The trained network takes in normalized input image and through a series of convolution and activation functions as defined in Table 1, the network generates cipher image of same size as the input.

4. Security Analysis

The nonlinearity of the model enhances the security of the encryption scheme as compared to chaotic encryption schemes, which are vulnerable to phase-space-reconstruction attacks [21]. The depth of the encryption/decryption network is 15, and the number of parameters in the network is approximately 2,800,000. These parameters obtained after training the network are used as the secret keys for encryption/decryption. Due to depth of the deep learning model, the complexity for cryptanalytic attacks is further increased. Various factors that affect security the encryption system are discussed in this section.

4.1. Secret Key Space

The size of the key space determines its potential to counter brute force attacks. The trained parameters of each layer contribute to the key space. Due to the depth of the encryption network, the key space of the encryption system is large, i.e., 2 P a r a m e t e r s 32 . Due to the large key space, a brute force attack is not a practical approach for attackers.

4.2. Secret Key Sensitivity

Key sensitivity can be determined by performing encryption with different keys. Each time the encryption network is trained, a different set of parameters is obtained. Therefore, by training the network two times, two different sets of parameters are obtained. The same image was used to perform encryption with each of the trained encryption networks, and as a result, two different cipher images were obtained, as shown in Figure 6b,c. The PSNR value of between cipher image shown in Figure 6b,c is 10.54, which shows the high sensitivity of the keys used in the encryption system.

4.3. Analysis of the Histogram of Generated Images

Analysis of the histogram of plain images, as shown in Figure 7a–c, and the cipher images shown in Figure 7d–f, was performed. The histogram distribution of encrypted images determines its resistance towards statistical attacks. The histogram of cipher images that have been generated through proposed encryption system is different from the histogram of plain images, though they closely resemble each other. They have the same distributions as their plain images. The similarity in the histograms of encrypted images is shown in Figure 8. This similarity between histograms makes it difficult to obtain any information regarding plain images and is suitable for encrypting medical images.

4.4. Image Information Entropy

Image information entropy determines the uncertainty of pixels in the cipher image and is defined as
I E = i = 0 255 p i log p i
where p i is the probability of pixel i in an image. An image with ideally random pixels has image information entropy value eight. Table 3 displays the entropy values for plain image pixels and their cipher images’ pixels. It is apparent from Table 3 that the entropy values in the cipher images obtained from the image encryption scheme are higher than those of the plain images.

4.5. Correlation Analysis

Neighboring pixel correlation determines the strength of an encryption model against statistical attacks. Adjacent pixel correlation in the horizontal direction was calculated by randomly choosing 2000 horizontally adjacent pixels and then calculating the correlation coefficient between each of the adjacent pixels using
c o r r = N i = 1 N ( x i y i ) i = 1 N x i × y i ( N i = 1 N x i 2 ( i = 1 N x i ) 2 ) × ( N i = 1 N y i 2 ( i = 1 N y i ) 2 )
Similarly, the correlation coefficient was calculated for vertical and diagonal directions. Table 4 displays the adjacent pixel correlation coefficients among pixels in plain images and cipher images.
It is apparent in Table 4 that the adjacent pixel correlation is low in the cipher images compared to their plain images. Figure 9a–c show the dispersal of pixels in three directions (horizontal, vertical and diagonal directions) in plain images. Pixel distribution in its corresponding cipher images, presented in Figure 9d–f for horizontal, vertical and diagonal directions, justifies that the correlation among neighboring pixels in the plain image is minimized successfully in its cipher image.

5. Performance Analysis

The proposed model was tested on two sets of data, one that has the plain images to be encrypted and another that has the cipher images, which does not reveal any information regarding the plain image. These two sets of data were obtained from a skin cancer dataset in [20], from which plain images were taken, and encrypted images were used that were obtained by encrypting these plain images with the image encryption algorithm proposed in [22]. All input images and generated images are of size 256 × 256 × 3 . After training the encryption–decryption model using a skin cancer dataset, the proposed encryption–decryption system is capable of encrypting/decrypting random plain text/cipher text, respectively.

5.1. Optimization Process

The models are trained with the adam version of stochastic gradient descent (SGD) with a batch size of one, which denotes that after each image was generated, weights of the network were updated. Learning rate 0.0002 , b e t a 1 = 0.5 and b e t a 2 = 0.999 were employed for the adam optimizer. The network’s performance was optimized as the training proceeded. This is apparent in the quality of encrypted images obtained at different intervals during training. Figure 10 shows the improvement in cipher image quality as more epochs were completed. Figure 10b shows an encrypted image after one epoch, Figure 10c after 10 epochs and Figure 10d after 40 epochs, which reflects the continuous optimization process of the model. Finally, after 100 epochs, as shown in Figure 10e, a good quality cipher image was obtained.

5.2. Quality of Recovered Image

The natural image has a high correlation among pixels, along with potential structural features. The proposed model employs the SSIM index as a loss function, which captures the essential structure of images in the generated (cipher image) and recovered (original image) images. After the model’s training, the proposed network encrypts original images, as shown in Figure 11, to obtain encrypted images. The proposed decryption network generates recovered images, as shown in Figure 11. The similarity between recovered images and original plain images’ mosaics justifies the recovered images’ quality. Peak signal-to-noise ratio was calculated amongst the original image and the generated image obtained through the proposed decryption network. The values of PSNR given in Table 5 justify the network’s performance. The proposed decryption network recovered good-quality images. Table 5 compares PSNR values obtained with the proposed network to PSNR values obtained with other encryption networks. The value of PSNR for the proposed network is higher than those reported in [3,23].

5.3. Comparative Analysis

Chaos-based image encryption schemes generate good-quality cipher images with high randomness among pixels of the cipher images [12,13], as observed in the entropy values and correlation coefficient values in Table 6. However, various cryptanalytic works [22,26] have shown the vulnerability of chaos-based image encryption schemes to plaintext attacks [27]. The chaotic systems are defined on a set of real numbers and then normalized to a small group of integers in the range 0–255; this affects the security of such cryptosystems [27,28,29]. The proposed encryption scheme resists plaintext attacks due to non-linearity introduced through the deep convolutional neural network. A detailed comparative analysis in Table 6 further justifies the ability of the proposed system to provide robustness compared to existing methods through high PSNR values of the proposed encryption system as compared to those of [3,24,25].

6. Conclusions

In this paper, an efficient and secure end-to-end encryption/decryption network is proposed based on deep learning processes. Two networks were designed for encryption and decryption using a skin cancer dataset. The encryption and decryption networks are trained simultaneously to generate images with the structural feature extraction capability of a CNN. The loss function, SSIM, is employed for training these networks, which also takes into account the structure, luminance and contrast of the target image. The cryptographic properties of its cipher images are comparable to those of cipher images generated by traditional image encryption systems. The proposed decryption system is capable of retrieving robust plain images with good PSNR values. The trainable parameters of the network are the keys of the encryption–decryption system. The encryption system obtained after training has a large number of parameters; therefore, the encryption system has a large key space. The security of the proposed encryption system is compared with that of other state-of-art methods based on deep learning processes, and it is apparent that proposed encryption/decryption system is efficient, secure and robust.

Author Contributions

The contribution of authors are: Conceptualization, A.S. and K.K.S.; methodology, A.S., K.P., N.S. and A.B.; software, K.P.; validation, K.P., N.S. and A.B.; formal analysis, S.K. and K.K.S.; writing—original draft preparation, S.K. and K.P.; writing—review and editing, A.S. and K.K.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
DESData encryption standard
AESAdvanced encryption standard
Cycle GANCycle generative adversarial network
SSIMStructural similarity index
MSEMean-squared error
PSNRpeak signal-to-noise ratio
CNNConvolutional neural network
DNNDeep neural network
SASilica aerogel
IEImage entropy
DeepEDNDeep learning based image encryption and decryption Network

References

  1. Zhang, L.Y.; Liu, Y.; Pareschi, F.; Zhang, Y.; Wong, K.W.; Rovatti, R.; Setti, G. On the security of a class of diffusion mechanisms for image encryption. IEEE Trans. Cybern. 2017, 48, 1163–1175. [Google Scholar] [CrossRef] [Green Version]
  2. Zhu, J.Y.; Park, T.; Isola, P.; Efros, A.A. Unpaired image-to-image translation using cycle-consistent adversarial networks. In Proceedings of the IEEE International Conference on Computer Vision, Venice, Italy, 22–29 October 2017. [Google Scholar]
  3. Ding, Y.; Wu, G.; Chen, D.; Zhang, N.; Gong, L.; Cao, M.; Qin, Z. DeepEDN: A deep-learning-based image encryption and decryption network for internet of medical things. IEEE Internet Things J. 2020, 8, 1504–1518. [Google Scholar] [CrossRef]
  4. Chen, W.H.; Luo, S.; Zheng, W.X. Impulsive synchronization of reaction–diffusion neural networks with mixed delays and its application to image encryption. IEEE Trans. Neural Netw. Learn. Syst. 2016, 27, 2696–2710. [Google Scholar] [CrossRef] [PubMed]
  5. Dridi, M.; Hajjaji, M.A.; Bouallegue, B.; Mtibaa, A. Cryptography of medical images based on a combination between chaotic and neural network. IET Image Process. 2016, 10, 830–839. [Google Scholar] [CrossRef]
  6. Hu, F.; Wang, J.; Xu, X.; Pu, C.; Peng, T. Batch image encryption using generated deep features based on stacked autoencoder network. Math. Probl. Eng. 2017, 2017, 3675459. [Google Scholar] [CrossRef] [Green Version]
  7. Hu, D.; Wang, L.; Jiang, W.; Zheng, S.; Li, B. A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access 2018, 6, 38303–38314. [Google Scholar] [CrossRef]
  8. Li, X.; Jiang, Y.; Chen, M.; Li, F. Research on iris image encryption based on deep learning. EURASIP J. Image Video Process. 2018, 2018, 126. [Google Scholar] [CrossRef] [Green Version]
  9. Debiasi, L.; Uhl, A. Techniques for a forensic analysis of the casia-iris v4 database. In Proceedings of the 3rd International Workshop on Biometrics and Forensics (IWBF 2015), Gjovik, Norway, 3–4 March 2015; pp. 1–6. [Google Scholar]
  10. Jaeger, S.; Candemir, S.; Antani, S.; Wáng, Y.X.J.; Lu, P.X.; Thoma, G. Two public chest X-ray datasets for computer-aided screening of pulmonary diseases. Quant. Imaging Med. Surg. 2014, 4, 475. [Google Scholar]
  11. Jin, J.; Kim, K. 3D CUBE algorithm for the key generation method: Applying deep neural network learning-based. IEEE Access 2020, 8, 33689–33702. [Google Scholar] [CrossRef]
  12. Maniyath, S.R.; Thanikaiselvan, V. An efficient image encryption using deep neural network and chaotic map. Microprocess. Microsyst. 2020, 77, 103134. [Google Scholar] [CrossRef]
  13. Erkan, U.; Toktas, A.; Enginoğlu, S.; Akbacak, E.; Thanh, D.N. An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN. Multimed. Tools Appl. 2022, 81, 7365–7391. [Google Scholar] [CrossRef]
  14. Fratalocchi, A.; Fleming, A.; Conti, C.; Di Falco, A. NIST-certified secure key generation via deep learning of physical unclonable functions in silica aerogels. Nanophotonics 2021, 10, 457–464. [Google Scholar] [CrossRef]
  15. Li, J.; Zhou, J.; Di, X. A learning optical image encryption scheme based on CycleGAN. J. Jilin Univ. (Eng. Technol. Ed.) 2021, 51, 1060–1066. [Google Scholar]
  16. Ding, Y.; Tan, F.; Qin, Z.; Cao, M.; Choo, K.K.R.; Qin, Z. DeepKeyGen: A deep learning-based stream cipher generator for medical image encryption and decryption. IEEE Trans. Neural Netw. Learn. Syst. 2021, 33, 4915–4929. [Google Scholar] [CrossRef] [PubMed]
  17. Bao, Z.; Xue, R. Research on the avalanche effect of image encryption based on the Cycle-GAN. Appl. Opt. 2021, 60, 5320–5334. [Google Scholar] [CrossRef]
  18. Bao, Z.; Xue, R.; Jin, Y. Image scrambling adversarial autoencoder based on the asymmetric encryption. Multimed. Tools Appl. 2021, 80, 28265–28301. [Google Scholar] [CrossRef]
  19. Baluja, S. Hiding images in plain sight: Deep steganography. In Proceedings of the 31st International Conference on Neural Information Processing Systems, Long Beach, CA, USA, 4–9 December 2017; pp. 2223–2232. [Google Scholar]
  20. Codella, N.; Rotemberg, V.; Tschandl, P.; Celebi, M.E.; Dusza, S.; Gutman, D.; Helba, B.; Kalloo, A.; Liopyris, K.; Marchetti, M.; et al. Skin lesion analysis toward melanoma detection 2018: A challenge hosted by the international skin imaging collaboration (ISIC). arXiv 2019, arXiv:1902.03368. [Google Scholar]
  21. Sang, Y.; Sang, J.; Alam, M.S. Image encryption based on logistic chaotic systems and deep autoencoder. Pattern Recognit. Lett. 2022, 153, 59–66. [Google Scholar] [CrossRef]
  22. Panwar, K.; Purwar, R.K.; Jain, A. Cryptanalysis and improvement of an image encryption scheme using combination of one-dimensional chaotic maps. J. Electron. Imaging 2018, 27, 053037. [Google Scholar]
  23. Zheng, Z.; Liu, H.; Yu, Z.; Zheng, H.; Wu, Y.; Yang, Y.; Shi, J. Encryptgan: Image steganography with domain transform. arXiv 2019, arXiv:1905.11582. [Google Scholar]
  24. Chen, J.; Li, X.W.; Wang, Q.H. Deep learning for improving the robustness of image encryption. IEEE Access 2019, 7, 181083–181091. [Google Scholar] [CrossRef]
  25. Zhang, Q.; Li, J. Single Exposure Phase-Only Optical Image Encryption and Hiding Method via Deep Learning. IEEE Photonics J. 2022, 14, 1–8. [Google Scholar] [CrossRef]
  26. Li, C.; Lin, D.; Lü, J.; Hao, F. Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE Multimed. 2018, 25, 46–56. [Google Scholar] [CrossRef] [Green Version]
  27. Kocarev, L. Chaos-based cryptography: A brief overview. IEEE Circuits Syst. Mag. 2001, 1, 6–21. [Google Scholar] [CrossRef] [Green Version]
  28. Li, C.; Feng, B.; Li, S.; Kurths, J.; Chen, G. Dynamic analysis of digital chaotic maps via state-mapping networks. IEEE Trans. Circuits Syst. Regul. Pap. 2019, 66, 2322–2335. [Google Scholar] [CrossRef]
  29. Lu, X.; Li, C.; Tan, K. Network Analysis of Chebyshev Polynomial in a Fixed-precision Digital Domain. In Proceedings of the 2021 40th Chinese Control Conference (CCC), Shanghai, China, 26–28 July 2021; pp. 8634–8638. [Google Scholar]
Figure 1. Image cryptography and cryptanalysis.
Figure 1. Image cryptography and cryptanalysis.
Systems 11 00036 g001
Figure 2. Deep-learning-based image encryption.
Figure 2. Deep-learning-based image encryption.
Systems 11 00036 g002
Figure 3. Flow diagram of the encryption process.
Figure 3. Flow diagram of the encryption process.
Systems 11 00036 g003
Figure 4. Encryption/decryption network.
Figure 4. Encryption/decryption network.
Systems 11 00036 g004
Figure 5. Discriminator model.
Figure 5. Discriminator model.
Systems 11 00036 g005
Figure 6. Plain image. (a) Image 1. (b) Cipher Image 1; (c) Cipher Image 2—generated with different sets of keys.
Figure 6. Plain image. (a) Image 1. (b) Cipher Image 1; (c) Cipher Image 2—generated with different sets of keys.
Systems 11 00036 g006
Figure 7. Plain image. (a) Image 1, (b) Image 2, (c) Image 3. (d) Cipher Image 1. (e) Cipher Image 2. (f) Cipher Image 3.
Figure 7. Plain image. (a) Image 1, (b) Image 2, (c) Image 3. (d) Cipher Image 1. (e) Cipher Image 2. (f) Cipher Image 3.
Systems 11 00036 g007
Figure 8. Histogram of plain images (ac) and corresponding cipher images (df).
Figure 8. Histogram of plain images (ac) and corresponding cipher images (df).
Systems 11 00036 g008
Figure 9. Adjacent pixel correlations (horizontal, vertical and diagonal directions) of plain images (ac) and corresponding cipher images (df).
Figure 9. Adjacent pixel correlations (horizontal, vertical and diagonal directions) of plain images (ac) and corresponding cipher images (df).
Systems 11 00036 g009
Figure 10. Comparison of the quality of encrypted images as training proceeded: (a) Original Image; (b) Cipher Image (epoch 1); (c) Cipher Image (epoch 10); (d) Cipher Image (epoch 40); (e) Cipher Image (epoch 100).
Figure 10. Comparison of the quality of encrypted images as training proceeded: (a) Original Image; (b) Cipher Image (epoch 1); (c) Cipher Image (epoch 10); (d) Cipher Image (epoch 40); (e) Cipher Image (epoch 100).
Systems 11 00036 g010
Figure 11. Quality of recovered images generated with the decryption network: (a) Original Image; (b) Encrypted Image of (a); (c) Recovered Image from (b); (d) Original Image; (e) Encrypted Image of (d); (f) Recovered Image from (e); (g) Original Image; (h) Encrypted Image of (g); (i) Recovered Image from (h); (Column 1 displays original images. Column 2 displays encrypted images generated with the encryption network. Column 3 shows recovered images generated with the decryption network.)
Figure 11. Quality of recovered images generated with the decryption network: (a) Original Image; (b) Encrypted Image of (a); (c) Recovered Image from (b); (d) Original Image; (e) Encrypted Image of (d); (f) Recovered Image from (e); (g) Original Image; (h) Encrypted Image of (g); (i) Recovered Image from (h); (Column 1 displays original images. Column 2 displays encrypted images generated with the encryption network. Column 3 shows recovered images generated with the decryption network.)
Systems 11 00036 g011
Table 1. Architecture of the encryption/decryption network.
Table 1. Architecture of the encryption/decryption network.
LayerSize of KernelNormalization TechniqueActivation FunctionOutputParameters
Input 256 × 256 × 3
Convolution 7 × 7 InstanceReLU 64 × 256 × 256 4704
Convolution 3 × 3 InstanceReLU 128 × 128 × 128 18,432
Convolution 3 × 3 InstanceReLU 256 × 64 × 64 73,728
Resnet Blocks (9, each with 2 convolutions) 3 × 3 BatchReLU 256 × 64 × 64 2,564,208
Transpose Convolution 3 × 3 InstanceReLU 128 × 128 × 128 73,728
Transpose Convolution 3 × 3 InstanceReLU 64 × 256 × 256 18,432
Convolution 7 × 7 TanhReLU 256 × 256 × 3 4704
Table 2. Architecture of discriminator.
Table 2. Architecture of discriminator.
LayerSize of KernelNormalization TechniqueActivation FunctionOutputParameters
Input (Two Inputs of same size) 256 × 256 × 3
Convolution 4 × 4 ReLU 128 × 128 × 64 3136
Convolution 4 × 4 Instance NormalizationReLU 64 × 64 × 128 131,456
Convolution 4 × 4 Instance NormalizationReLU 32 × 32 × 256 524,056
Convolution 4 × 4 Instance NormalizationReLU 16 × 16 × 512 2,098,688
Convolution 4 × 4 Instance Normalization 16 × 16 × 1 8193
linear Sigmoid1
Table 3. Image information entropy values of plain images and cipher images.
Table 3. Image information entropy values of plain images and cipher images.
ImagesImage 1Image 2Image 3
Plain7.156.276.04
Cipher7.407.367.38
Table 4. Correlation coefficient values among adjacent pixels.
Table 4. Correlation coefficient values among adjacent pixels.
ImagesHorizontalVerticalDiagonal
Image 10.99760.99860.9959
Cipher0.48120.45840.2169
Image 20.99760.99840.9963
Cipher0.50900.45380.2043
Image 30.99770.99860.9961
Cipher0.52030.41470.1782
Table 5. PSNR values between plain images and recovered plain images.
Table 5. PSNR values between plain images and recovered plain images.
MethodsAverage PSNR
Proposed Method39.9703
DeepEDN [3]36.514
EncryptGAN [23]17.5992
Image encryption system with CNN denoiser [24]24.8975
Optical Image Encryption using Deep Learning [25]30.0000
Table 6. Comparative analysis of image encryption schemes with the proposed encryption system.
Table 6. Comparative analysis of image encryption schemes with the proposed encryption system.
Ref.TechniquePSNR between
Original Image and
Recovered Image
SSIM between
Original Image and
Recovered Image
Correlation
Coefficient
Image Entropy of
Cipher Image
ProposedDeep learning based encryption39.97030.99720.38557.36
[12]Deep learning based
secret keys and
chaos-based
encryption
inf10.01497.98
[13]Deep learning based
secret keys and
chaos-based
encryption
inf10.000027.99
[3]Deep learning based
image encryption
scheme
36.5140.900007.95
[24]Optical image
encryption scheme
using deep
convolutional neural
network
24.89750.8885
[25]Optical Image
encryption and
Hiding using deep
learning
30.00000.9306
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Panwar, K.; Singh, A.; Kukreja, S.; Singh, K.K.; Shakhovska, N.; Boichuk, A. Encipher GAN: An End-to-End Color Image Encryption System Using a Deep Generative Model. Systems 2023, 11, 36. https://doi.org/10.3390/systems11010036

AMA Style

Panwar K, Singh A, Kukreja S, Singh KK, Shakhovska N, Boichuk A. Encipher GAN: An End-to-End Color Image Encryption System Using a Deep Generative Model. Systems. 2023; 11(1):36. https://doi.org/10.3390/systems11010036

Chicago/Turabian Style

Panwar, Kirtee, Akansha Singh, Sonal Kukreja, Krishna Kant Singh, Nataliya Shakhovska, and Andrii Boichuk. 2023. "Encipher GAN: An End-to-End Color Image Encryption System Using a Deep Generative Model" Systems 11, no. 1: 36. https://doi.org/10.3390/systems11010036

APA Style

Panwar, K., Singh, A., Kukreja, S., Singh, K. K., Shakhovska, N., & Boichuk, A. (2023). Encipher GAN: An End-to-End Color Image Encryption System Using a Deep Generative Model. Systems, 11(1), 36. https://doi.org/10.3390/systems11010036

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop