Abstract

Aiming at the problem of the weak avalanche effect in the recently proposed deep learning image encryption algorithm, this paper analyzes the causes of weak avalanche effect in the neural network of Cycle-GAN step-by-step process and proposes an image encryption algorithm combining the traditional diffusion algorithm and deep learning neural network. In this paper, first, the neural network is used for image scrambling and slight diffusion, and then the traditional diffusion algorithm is used to further diffuse the pixels. The experiment in satellite images shows that our algorithm, with the help of the further diffusion mechanism, can compensate for the weak avalanche effect of Cycle-GAN-based image encryption and can change a pixel value to the original image, and the number of pixel change rate (NPCR) and unified average changing intensity (UACI) values can achieve 99.64% and 33.49%, respectively. In addition, our method can effectively encrypt the image where the encrypted image with high information entropy and low pixel correlation is obtained. The experiment on data loss and noise attack declares our method can identify the types and intensity of attacks. What is more, the key space is big enough, and the key sensitivity is high while the key has a certain randomness.

© 2021 Optical Society of America

Full Article  |  PDF Article
More Like This
Medical image encryption based on biometric keys and lower–upper decomposition with partial pivoting

Xiaohui Wang, Zheng Zhu, Fan Wang, Renjie Ni, Jun Wang, and Yuhen Hu
Appl. Opt. 60(1) 24-32 (2021)

Plaintext attack on joint transform correlation encryption system by convolutional neural network

Linfei Chen, BoYan Peng, Wenwen Gan, and Yuanqian Liu
Opt. Express 28(19) 28154-28163 (2020)

A chaos-based digital image encryption scheme with an improved diffusion strategy

Chong Fu, Jun-jie Chen, Hao Zou, Wei-hong Meng, Yong-feng Zhan, and Ya-wen Yu
Opt. Express 20(3) 2363-2378 (2012)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Data Availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (13)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Tables (11)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (39)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription