Image encryption based on logistic chaotic systems and deep autoencoder

•Deep autoencoder is incorporated with logistic chaotic systems for image encryption.•A single network can be utilized to encrypt different plaintext images.•Extensive experiments demonstrate that the proposed method is with high sencurity while can effectively resist attacks Please check editor nam...

Full description

Saved in:
Bibliographic Details
Published in:Pattern recognition letters Vol. 153; pp. 59 - 66
Main Authors: Sang, Yongpeng, Sang, Jun, Alam, Mohammad S.
Format: Journal Article
Language:English
Published: Amsterdam Elsevier B.V 01.01.2022
Elsevier Science Ltd
Subjects:
ISSN:0167-8655, 1872-7344
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:•Deep autoencoder is incorporated with logistic chaotic systems for image encryption.•A single network can be utilized to encrypt different plaintext images.•Extensive experiments demonstrate that the proposed method is with high sencurity while can effectively resist attacks Please check editor name in valid PIT's and styled as title-footnote or misc-text according to JSS. In this paper, we propose a novel image encryption method based on logistic chaotic systems and deep autoencoder. In the encryption phase, first, the plaintext image is randomly scrambled by a logistic chaotic system. Then, the random scrambled image is encoded by a deep autoencoder to generate the ciphertext image. In order to obtain the ciphertext image with uniform distribution, we incorporated the uniform distribution constraint into the training of the deep autoencoder. The resulting ciphertext image contains high randomness, which is critical for an excellent image encryption algorithm. Histogram analysis, information entropy analysis, key space analysis, key sensitivity analysis, correlation analysis, and ablation experiments show that the proposed encryption algorithm can effectively resist attacks and has excellent encryption performance while providing high security.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0167-8655
1872-7344
DOI:10.1016/j.patrec.2021.11.025