Please use this identifier to cite or link to this item:
https://digital.lib.ueh.edu.vn/handle/UEH/63806
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Uğur Erkan | - |
dc.contributor.other | Abdurrahim Toktas | - |
dc.contributor.other | Serdar Enginoğlu | - |
dc.contributor.other | Dang Ngoc Hoang Thanh | - |
dc.date.accessioned | 2022-06-29T02:31:19Z | - |
dc.date.available | 2022-06-29T02:31:19Z | - |
dc.date.issued | 2022 | - |
dc.identifier.issn | 1380-7501 (Print); 1573-7721 (Online) | - |
dc.identifier.uri | http://digital.lib.ueh.edu.vn/handle/UEH/63806 | - |
dc.description.abstract | A secure and reliable image encryption scheme is presented, which depends on a novel chaotic log-map, deep convolution neural network (CNN) model, and bit reversion operation for the manipulation process. CNN is utilized to generate a public key to be based on the image in order to enhance the key sensitivity of the scheme. Initial values and control parameters are then obtained from the key to be used in the chaotic log-map, and thus a chaotic sequence is produced for the encrypting operations. The scheme then encrypts the images by scrambling and manipulating the pixels of images through four operations: permutation, DNA encoding, diffusion, and bit reversion. The encryption scheme is precisely examined for the well-known images in terms of various cryptanalyses such as key-space, key sensitivity, information entropy, histogram, correlation, differential attack, noisy attack, and cropping attack. To corroborate the image encryption scheme, the visual and numerical results are even compared with available scores of the state of the art. Therefore, the proposed log-map-based image encryption scheme is successfully verified and validated by superior absolute and comparative results. As future work, the proposed log-map can be extended to combinational multi-dimensional with existing efficient chaotic maps. | en |
dc.format | Portable Document Format (PDF) | - |
dc.language.iso | eng | - |
dc.publisher | Springer | - |
dc.relation.ispartof | Multimedia Tools and Applications | - |
dc.relation.ispartofseries | Vol. 81 | - |
dc.rights | Springer Nature Switzerland AG. | - |
dc.subject | Image encryption | en |
dc.subject | Chaotic map | en |
dc.subject | Logarithmic map | en |
dc.subject | Deep convolution neural network (CNN) | en |
dc.subject | Bit reversion | en |
dc.title | An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN | en |
dc.type | Journal Article | en |
dc.identifier.doi | https://doi.org/10.1007/s11042-021-11803-1 | - |
dc.format.firstpage | 7365 | - |
dc.format.lastpage | 7391 | - |
ueh.JournalRanking | Scopus, ISI | - |
item.languageiso639-1 | en | - |
item.cerifentitytype | Publications | - |
item.grantfulltext | none | - |
item.openairetype | Journal Article | - |
item.fulltext | Only abstracts | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
Appears in Collections: | INTERNATIONAL PUBLICATIONS |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.