 Research
 Open access
 Published:
An efficient image encryption algorithm using a discrete memorybased logistic map with deep neural network
Journal of Engineering and Applied Science volume 71, Article number: 41 (2024)
Abstract
In the last few years, multimedia technology has made tremendous strides. These days, the Web is frequently used to transfer multimedia content, including audio, video, and photos. However, the Internet is a very vulnerable medium with many security holes. To ensure that multimedia content carried across unprotected channels, like the Internet, is secure and private, several encryption techniques have been proposed. New encryption strategies must be developed because multimedia data streams cannot be encrypted using traditional methods. Therefore, the main goal of the recommended system is to present an analytical research approach for introducing a sophisticated framework wherein the suggested encryption technologies' efficacy is increased through the use of deep neural networks (DNNs). The robustness of the DNN principle is coupled with a discrete memristorbased logistic chaotic map notion for enhanced security performance. In this paper, three distinct encryption algorithms—Arnie cat with an artificial neural network (ANN), Henon map with an ANN, and logistic map with a DNN—are compared for security and performance with the suggested algorithm. Correlation coefficients, information entropy, number of pixels changing rate (NPCR), encryption quality, and encryption duration are the cryptographic analysis parameters examined here. The results show that the recommended implementation enhances security performance without degrading image quality. The proposed algorithm achieves 35.9% of UACI, 99.95% of NPCR, and 7.997231 of entropy.
Introduction
Digital images have become increasingly popular as network and multimedia technology have advanced. Image data has a high correlation and high redundancy between pixels. In some cases, imaging applications must meet their requirements, such as realtime communication and evaluation. Security is one of the primary objectives of information transmission over a network. Therefore, multimedia information security has become critical in ehealth, the military, ecommerce, banking transactions, and mobile applications [1, 2]. Communication information (plain text) must be protected from unauthorized users to provide security properties to multimedia content. Multimedia content must be protected from attacks such as interception, interruption, fabrication, and modification [3, 4]. Encryption technology is a secure transmission method. This technology encrypts the data to be transmitted, converting it into cypher text that an authorized person can successfully restore. Several encryption schemes can be used to secure images [5] Fig. 1.
Encryption algorithms are classified as direct or partial encryption to provide integrity and privacy [6]. All media data is encrypted in full encryption [7]. It can encrypt large amounts of data, making it less efficient but more secure. Only a portion of the media content is encrypted during selective (partial) encryption. Because encryption operations are performed on a small amount of data, partial encryption algorithms reduce encryption and decryption time, making them more efficient but less secure [8,9,10]. Some researchers have created a single scheme that combines encryption and compression. Encryption and compression are implemented simultaneously in such a scheme [11].
A memristor is a fundamental circuit unit with memory that illustrates the connection between charge and magnetic flux. Furthermore, memristors have numerous applications, including neural networks [12], electrical engineering [13,14,15], secure communication [16], and so on. Classic chaotic maps, such as the logistic and henon maps, frequently suffer from a narrow parameter range and low complexity. To improve the dynamic behavior of two classical discrete maps, this article introduces discrete memristor models in logistic classical discrete maps inspired by previous outstanding works. Furthermore, the chaotic behavior of the chaotic map provides sufficient security. Combining deep learning and chaotic behavior may result in a more compelling image encryption method. As a result, the paper presented here presents a framework in which a deep learning logistic map is used to improve optimization for an enhanced image encryption process. This paper compares the security and performance of the proposed algorithm with three different encryption algorithms: Arnold cat with artificial neural networks (ANN), Henon map with artificial neural networks (ANN), and logistic map with deep neural networks (DNN).
We put the proposed image encryption technique through various assaults as part of our thorough security study. A variety of statistical and cryptanalysis attacks, such as knownplaintext and chosenplaintext attacks, cropping attacks (random and selective), noise attacks (AWGN and saltandpepper noise), and adaptive attacks (iterative and machine learningbased) were among them. We evaluated our scheme’s resilience in protecting sensitive image data by contrasting its performance with current approaches. This allowed us to confirm the scheme's effectiveness and security in various attack situations.
The rest of this article is organized as follows. Section 2 provides an overview of the most recent literature review. Section 3 discusses the proposed encryption techniques. Section 4 discusses the comparison results and security analysis of the proposed algorithms. Finally, Section 5 summarizes some final observations.
Literature survey
Sara t. Kamal et al. (2021) Presented novel cryptographic techniques for greyscale and color medical data. A new image feature extraction based on blocks is demonstrated. The image blocks are shuffled using zigzag patterns, rotations, and random structures. The encrypted image is then propagated using the key generated by the chaotic logic graph. There were comparisons with various encryption techniques. The suggested algorithm performs better than previously available encryption techniques in medical image encryption. The results demonstrate that the algorithm can encrypt color and greyscale grayscale medical images [17].
Shaimaa Abbas et al. (2020) proposed different encryptions and decryption methods using a chaotic neural network (CNN). The goal is to combine ANN and chaotic cryptography efficiently. The neural network weights are determined using the chaotic sequence. They are constantly updated based on the encryption algorithm's key generation. Matlab is used to implement the system. Because it is based on ANN, this system is complex. Matlab software saves time because it is simple and has many tools. This method encrypts the image at the sending end and then uses a decryption algorithm on the receiving end to restore the same original image as the transmitted image [18].
Shima Ramesh Maniyath et al. (2020) created a statistical research method for presenting a sophisticated framework in which DNN was used to optimize the effectiveness of simple encryption techniques. The ability of optimization concepts to improve security efficiency reinforces the Chaos Map concept. The findings reveal that the proposed application increases security while maintaining image quality. As a result, this paper examines a more effective and efficient image system security, with quantitative simulation demonstrating that it outperforms other commonly used machine learning methods [19].
N.K. Pareek et al. (2006) presented an image encryption technique with an 80bit external key and two chaotic logic graphs is proposed. By assigning a different weight to each primary key bit, the default values for both logical mappings are obtained. Furthermore, the suggested encryption method encrypts pixels in an image using eight different types of operations, resulting in the logical mapping determining which one is used for a given pixel. Several experiments, statistical analysis, and sensitivity analysis demonstrate that the suggested algorithm provides a secure and effective method for realtime image communication and encryption [20].
Pranjali Sankhe et al. (2018) presented a proposed symmetric image encryption algorithm that employs a novel image pixel shuffling method to achieve effective and efficient image encryption. The procedure of encrypting and decrypting data that is used to keep data and images secure and private is known as cryptography. We will apply chaotic encryption and decryption to images in this article. The chaos method is a popular algorithm in realtime secure image communication systems. The henon map generates the critical value, and the Arnold cat map completes the pixel blending [21].
Otilia Cangea et al. (2018) presented a novel approach for implementing a chaoticbased color image encryption method with a particular function to improve data security. Color images can be encrypted using the chaosbased encryption system established and proposed in this paper by simultaneously encrypting their R, G, and B components. This cryptosystem was preferred after attempting several various approaches based on the same chaos principle. Still, they were demonstrated to be faster due to heavy computation or the need to save the permutation table required for the decryption stage. This also represents a significant vulnerability [22].
Sakshi Patel et al. (2020) presented an encryption method based on chaotic logistic mapping and DNA encoding. The image is broadcast using the 32bit ASCII private key. The demonstration outcomes show that the proposed algorithms perform better than other logic map encryption methods. The proposed method also considers possible parameters such as PSNR and SSIM. Display and analyze the results of encryption and decryption algorithms using various parameter measurements [23].
Mingming Chen et al. (2020) presented an encoding algorithm that is then used to shuffle the subimage or pixel locations. After that, the encoded subimages are composited into a single image. Finally, DRPE is used to encode the composite image. The new encryption application's security level can be enhanced by modifying the shear let transform's variables and selecting methods to encode pixels and synthesize various pictures into one image. Analytical and experimental outcomes demonstrate that the suggested optical encryption framework is practical. New encoding methods and reversible synthesis methods can be used to improve the proposed cryptographic framework [24].
Zeesha Mishra et al. (2020) presented dualspeed and smallarea configurations for the SIT method in resourceconstrained domains. The suggested channel is helpful for highfrequency applications, whereas the proposed serial configuration benefits applications with small area requirements, lowering hardware costs. The proposed design is implemented in the FPGA device XC5VLX50T3ff1136, with a 287.51MHz operating frequency in a segmented architecture and 46 segments in a serial architecture. SIT has five rounds but provides enough security for data encryption. According to security analysis, the algorithm has more entropy, good NPCR and UACI, more key space, and the best adjacent pixel correlation [25].
Methods
Image cryptographic techniques can become an essential part of the image delivery process if they strive for reliability while maintaining the highest level of security. This section details the proposed algorithm with three algorithms: the Logistic with deep neural network (DNN), the Henon map with artificial neural network (ANN), and the Arnold map with ANN. The original and encrypted images are fed into the ANN/DNN. The encrypted and decrypted images are then provided into an artificial neural network/deep neural network. Intensity histograms for the actual and encrypted images, pixel correlation plots, key sensitivity, loss, and accuracy for the original, encrypted, and decrypted images, and structural similarity among the authentic and encrypted photos are among the metrics used to assess their quality. Figure 2 shows the system design of the proposed methodology.
Arnold cat with artificial neural network (ANN)
Arnold cat map algorithm (ACM)
ACM is one of the encryption methods used to encrypt images. The theory works mathematically by expanding and deforming a square, then snapping it together similarly. ACM works by encoding the position of a pixel without varying its value. ACM is a twodimensional reversible chaotic graph [26]. This can be accomplished using the formula below.
Where c and d are both positive integers. (x_{n + 1}, y_{n + 1}) represents the new position of the original image, and (x_{n}, y_{n}) represents the primary position of the actual image. Where n = 0, 1, 2, There exist positive integers T after iterating N times, such that ( x_{n + 1}, y_{n + 1}) =(x, y).
The period T is determined by the original image’s variables c, d, and size M. Because there are only linear transforms and modulation functions, using an ACM to shuffle pixel positions is highly efficient. After much iteration, the relationship between proximate pixels can be mixed entirely. On the other hand, the periodicity of the Arnold cat graph reduces the encryption's security because a potential attacker can iterate through the Arnold cat graph indefinitely to reappear the actual image. The distinction between authentic and encrypted images is not statistically significant. Furthermore, the space available for positive integer keys is limited.
Artificial neural network
A neural network is a machine that depicts how the brain performs a specific task. ANN is used to create matrix codes from planes. After training, the ANN broadcasts the code that generates the bias and weight matrices for the first step. It is a computer system inspired by the human brain's learning ability. It is the only type of structure handling method. ANNs are wellknown for their unique features. It has elementary processing elements, such as neurons. A large number of weighted links exist between distributed elements. These are analyzed during the elearning process. Because of their distributed representation, massive parallelism, learning ability, and fault tolerance, artificial neural networks are more valuable. An ANN consists of processing units, topology, and learning algorithms.
ANN is widely used in a variety of fields. Some examples include clustering/classification, function approximation, prediction, pattern classification, optimization, control, and contentaddressable memory. At the decryption end, a chaotic binary sequence is generated and sent to the ANN, and the ANN generates the weight to generate the key to obtain the original image. Figure 3 shows the ANN structure.
Henon map with artificial neural network (ANN)
Henon map
The Henon map is a wellstudied method of chaotic discretetime dynamical systems. It was first proposed as a simplified version of the Lorentz model. It is formed by using the following equation [27] to map a point (x_{n}, y_{n}) to the next point.
In Eqs. (2) and (3), x_{n} and y_{n} are the current positions, and x_{n + 1} and y_{n + 1} are the subsequent positions. The primary values of x_{n} and y_{n} determine the succeeding point in the initial conditions. Slight variations in the initial conditions x_{n} and y_{n} can significantly influence the final map. The traditional Henon map employs values of 𝛼 = 1.4 and 𝛽 = 0.3, which distort the outcomes. A change in both values changes the characteristics of the resulting graph, which may no longer be chaotic [28, 29]. The Henon map model is frequently used in image encryption as a broadcast technique or as a keystream generator to change pixel values in an image. This chaos graph requires two initial values (x_{0} and y_{0}). Each iteration yields new x_{n} and y_{n} values, which are then used to set the threshold. After being transformed to a bit value (0 or 1), this threshold will be converted to grayscale; the grayscale value for each pixel up to the chaos map is 𝑚×𝑛 size.
Proposed discrete memristor (D.M.)based logistic map with DNN model
Logistic map
Logistic maps are also known as wormhole models. A logistic map is a simple, chaotic map in mathematical terms. Its mathematical expression is as follows:
Where xϵ 0, 1 and μϵ 0, 4 are logistic parameters. When xϵ 0, 1, the logistic map is chaotic. That is, the sequence produced by the logistic map's action on the initial condition x_{0} is nonperiodic and does not converge. Beyond this range, the generated sequence must connect to a particular value 3.5699456 < μ ≤ 4. When the above condition is approximately 4, the values developed iteratively follow a pseudorandom distribution. After a certain number of iterations, other values are generated. The deal will then tend to converge on a single value. The sensitivity of chaotic systems to initial conditions is their defining feature. These sequences are known as chaotic sequences.
DMbased logistic map mathematical model
This section incorporates discrete memristors into logical maps and generates DMbased logistic maps. The D.M. model's input is set to the sequence x_{i}, and its output is shown in the formula (5).
Where the output is a sequence as well, let be the D.M. (i.e., the discrete memristor output) multiplied by the x_{i} term in equation (1 x_{i}) (4). The mathematical model for DMbased Logistics Mapping is as follows:
Among them, μ is the system control parameter, k is the memristor parameter, and q_{0} is the initial value of the Memristor. Set Amp to 1, then open the accumulator on the D.M. in order, and the logistic map based on D.M. can be written as follows:
Where w_{0} = 0. The state of the DMbased logistic diagram is determined by μ, k, and q_{0}. If k = 0.0001 is set, the mapping formula (7) is modified using the discrete memristor formula (6). This article examines trajectories, Lyapunov exponents, bifurcation graphs, and complexity analysis relating to the dynamic behavior of DMbased logistic graphs. Figure 4 depicts the Simulink model based on the D.M. logistic graph. The unit delay block and unit delay one block represent x_{i} and w_{i}, respectively, and can set the sequence’s initial value. The gain block represents the parameter k. The sequence x_{i} can be seen in the scope block. The constant block represents the initial q_{0} Memristor and the system parameter μ. Driving delay blocks, gain blocks, and continuous blocks can all be used to control the map’s state.
Hyperchaos in memristive logistic map
To demonstrate the dynamics of memristive logic graphs, we investigate the dynamic behavior based on control parameters in terms of bifurcation graphs, dynamic graphs, and phaseplane graphs. The internal parameters of the discrete Memristor are set to a = − 1, b = 1, and the initial state of the memristor logic map is set to (x0, q0) = (0.5, 0.5). Bifurcation plots are generated on a 2D parameter plane by detecting the cycle number of a discrete map iteration sequence. Figure 5a depicts the bifurcation plot of the memristive logistic map for Fig. 5a shows the bifurcation plot of the memristive Logistic map for k∈ [1.2, 2] and μ ∈ [0.4, 0.4]. The parameter areas are colored differently based on the cycle number of iterative sequences. Mainly, white represents unbounded behavior, red denotes chaos, orange denotes multiperiod, dark blue denotes stable point, and other colors denote period2, period3, and period8, respectively.
Figure 5b shows the LLE of the memristive logistic plot of the 2D bifurcation graph in Fig. 5a under the same parameter region, with different LLEs colored differently. As a result, the dynamic graph in Fig. 5b can also be used to characterize the dynamic behavior of the memristive logic graph, which is a valuable supplement to the bifurcation graph in Fig. 5a.
It should be noted that the white areas represent unbounded behavior. In summary, the memristive logistic map can exhibit complex dynamical behaviors determined by the k and μ.
Deep neural network
A neural network is a machine that simulates how the brain performs specific tasks. DNN generates matrix code from blueprints. The DNN generates encoded weight and bias matrices for the first diffusion step at the end of this training process. Deep neural networks are used for encryption and decryption. DNNs are used in deep learning. DNNs are a type of deep neural network that is commonly used to analyze visual images. Individual neurons respond to stimuli only in a small area of the visual field known as the receptive field. The receptive fields of the neurons overlap to cover the entire field of view.
When compared to other image classification algorithms, DNNs require very little preprocessing. DNNs differ from traditional neural networks in their architecture. Ordinary N.N.s process input information using several hidden layers. Each layer contains a set of neurons, and each layer is fully connected to all of the neurons in the previous layer. In the final stage, there is a final fully connected layer, the output layer, representing the prediction.
Algorithm: Image encryption using deep neural network
Step 1: The first input sequence generates a chaotic series. The logistic map will then be used to create the messy line.
Step 2: Create a DNN output for creating a DNN network that uses chaotic sequences to calculate weights. DNN extracts features from images automatically. This effectively uses information from neighboring pixels to convolutionally downsample the image and then use the prediction layer at the end. As a result, it is more accurate.
Step 3: At this point, the image is encrypted with the logistic map algorithm. To protect itself from plain text attacks, a logistic map generates smooth image histograms [30]. Figure 6 shows the DNN neural structure Fig. 7.
Image encryption using discrete memristorbased logistic map with DNN
As shown in Fig. 8, the suggested encryption scheme encrypts images using chaos and deep neural networks. There are two groups of images to be encrypted. 80% of the original images are used for pattern training, with the remaining 20% for pattern testing. Each pattern is normalized because the pixel values are relatively high. This can be accomplished with the MATLAB Signal Processing Toolbox’s “mapminmax” function. Two chaotic logic graphs are used in the proposed algorithm to achieve image encryption. Divide the image to be encrypted 𝐼 𝑚×𝑛 into four nonoverlapping subimages \({A}_{m^{\prime } Xn}\). The suggested encryption method employs a diffusion and substitution mechanism. This section aims to generate matrix codes from ordinary images for the first step of the broadcast operation. The weights wi are added to the DNN using a discrete memristorbased logistic map generator. Chaotic systems exhibit largescale emergence in unpredictable but deterministic ways. Common patterns can emerge when the exact location is unreliable and caused by a highly sensitive dependence on the system's initial conditions. Image encryption is appropriate for chaotic systems because of their high sensitivity to initial needs, randomness, unpredictability, and topological mixing.
Results and discussion
The effectiveness of the encryption schemes described in Section 3 is compared using the following metrics: correlation coefficient, histogram analysis, encryption entropy, differential measure, and encryption speed.
Figure 9 depicts the output of the color images used to evaluate the suggested encryption method. The evaluation was performed on various realtime test images with resolutions ranging from 1080 × 1080 to 4320 × 4320.
Histogram analysis
Histogram analysis demonstrates encryption algorithms' superior substitution and diffusion properties. We examine the histograms of several simple images and the ciphertext images obtained using the abovementioned method. Figure 10a, b depicts a histogram analysis of the proposed image encryption method. The encrypted image histogram's uniform distribution indicates the method's high quality.
Correlation coefficient
Statistical analyses, such as correlation coefficients, quantify the relation among adjacent pixels in an image. The correlation between two adjacent pixels in a standard image is always high in the horizontal, vertical, or diagonal direction, as calculated by the equation
Where x and y are two adjacent grayscale values in the image, E(x) and D(x) are the desired intensity and variance, respectively. The plain image's correlation coefficient is typically high (almost 1). Table 1 displays the results of the proposed methods discussed above using realtime standard grayscale grayscale images. The logistics generated by the DNN method generate more variations compared to the other two methodologies, as shown in the table. Figure 11 depicts the correlation graphs of the original and encrypted images.
Differential measures
To defend against differential attacks, any change to the plaintext image causes the encrypted image to change significantly. This is accomplished through the use of two commonly used measures. NPCR and UACI, to be specific. When only onepixel changes in the raw image, NPCR represents the rate of change in the number of pixels in the ciphertext. Uniform average variation intensity (UACI) calculates the average intensity of the difference between standard and encrypted images. The NPCR value must always be in the 99% range, and the UACI value must always be in the 33% range, indicating the algorithm’s sensitivity.
When simple variations to the plaintext image can significantly alter the cypher image, differential attacks become ineffective. Significantly greater NPCR values are needed for a perfect encryption scheme. NPCR plots for various encryption methods are shown in Fig. 12. These values are compared in Tables 2 and 3. As these tables show, all the compared techniques are up to date and thus resistant to various differential attacks. Figure 13 depicts the UACI graph for different encryption methods.
Encryption entropy
Shannon developed the concept of information entropy. It has numerous applications, including lossless compression, statistical inference, and encryption algorithms. It has recently been used in many subfields, such as machine learning, physics, and biology. Information entropy is a measure of ambiguity related to a random event that describes how much information is in the event. The greater the uncertainty or randomness of an event, the greater its information entropy. The information source X has a length of L.
Where p(x_{i}) is the probability that it will occur, x emits 2^{8} symbols with the same chance for a truly random data source, \(p\left({x}_i\right)=\frac{1}{2^8}\), i.e., 𝑋 = (𝑥0, 𝑥1, …, 𝑥2^{8}). i.e., X = (x0, x1,..., x28).
Using Eq. (14), we calculate the information entropy and get H.X. = 8. Because the database rarely produces random messages, its entropy value is usually less than 8. When data are encrypted, they should ideally have an entropy of 8. If the data entropy of the symbols generated by the image encryption system is less than 8, there is predictability, which poses a security risk to the system.
The entropy values for the algorithms in the discussion are shown in Table 4. The theoretical entropy for a 256level grayscale grayscale image is 8 bits. However, in practice, achieving this ideal value is impossible. Encryption algorithms are acceptable up to the nearest value of 8. Table 4 shows that the DNN method's discrete Memristorbased logistic map outperforms the other methods. Figure 14 shows the entropy analysis of the three different encryption methods.
Encryption speed
The time it takes to encrypt an image is another helpful tool for evaluating an algorithm’s efficiency. The execution time in this survey will be measured in realtime in CPU cycles. Table 5 shows the algorithm’s execution time for comparing standard Lena images of size 512 × 512. The discrete memristorbased logistic map using the DNN method requires less processing time. Figure 15 depicts the encryption speed graph for various encryption methods.
Error metric analysis
A set of test photos is subjected to the technique, which produces encrypted versions, which are subsequently decrypted, as part of an error matrix study for the “an efficient image encryption algorithm using discrete memristorbased logistic map with deep neural network”. to evaluate true positives, true negatives, false positives, and false negatives—a measure of algorithm performance—a confusion matrix is made. In addition to the visual evaluation of decrypted images, performance metrics like accuracy, precision, recall, and F1score are measured. Through this process, the encryption and decryption capabilities of the method are assessed and could result in more optimization Table 6.
Performance comparison analysis
The entropy, NPCR, and UACI values of the suggested encryption method are compared with those of other current algorithms available in the literature [31,32,33,34,35,36,37,38]. Table 7 lists the estimated values. It is clear from the evaluated values that the suggested encryption scheme is resistant to both statistical and differential assaults.
Randomness validation
The unique way our performance analysis assesses the effectiveness and security of our suggested picture encryption technique makes it stand out. We understand how critical it is to place our findings in the perspective of the most recent developments in the area. Our method is unique in that it uses a deep neural network (DNN) for picture encryption along with a discrete memristorbased logistic map (DMLM). We are sure that this combination offers unique advantages in terms of security, adaptability, and computational efficiency—strengths that our comparative analysis will make clear. We want to highlight our approach’s amazing benefits and contributions by comparing it to these recent articles and proving how effective it is at protecting sensitive image data in a range of application scenarios (Table 8).
Discussion
In this study, we have presented an efficient image encryption algorithm that combines a discrete memristorbased logistic map with a deep neural network (DNN). Our research addresses the pressing need for robust image encryption methods in an era where data security is paramount. The algorithm’s core methodology involves the discrete memristorbased logistic map, which introduces a unique chaotic element to the encryption process and the integration of a DNN to enhance its capabilities. Our experimental results have demonstrated the algorithm's effectiveness, emphasizing its robust security, highquality image preservation, and computational efficiency. We have rigorously evaluated its performance, utilizing statistical analyses such as entropy, correlation coefficients, and error metrics like MSE and PSNR. Notably, this algorithm showcases resistance to various attack scenarios, which is a pivotal characteristic in protecting sensitive image data.
Moreover, our algorithm’s distinctive feature lies in the fusion of the discrete memristorbased logistic map and the deep neural network, significantly enhancing its efficiency and security. This amalgamation of innovative technologies underscores its unique contribution to image encryption. Our work has practical implications for securing various applications, including medical image transmission, confidential data storage, and secure communication channels. However, we acknowledge that there may be further areas for refinement and improvement, which opens doors to future research avenues. In conclusion, our research underscores the importance of image encryption and offers a novel and efficient solution that holds promise in safeguarding digital images across various domains.
Several limitations should be noted in our paper on the “efficient image encryption algorithm using discrete memristorbased logistic map with deep neural network.” Utilizing a deep neural network adds computational overhead, and our method might require hardware. More research is needed to determine the algorithm's resilience to future assaults, key distribution and administration, flexibility to handle various data kinds, and applicability for contexts with limited resources. Furthermore, in realworld applications, userfriendliness, legal compliance, and generalizability to different image kinds should be given consideration.
Conclusions
The suggested system employs a novel algorithm to perform image security using DNNs. The objective is to obligate the encryption technique to manipulate the trapdoor function in the cryptosystem. Discrete memristorbased logic maps are designed as an application based on primitive, chaotic maps and discrete memristors. This paper compares the proposed algorithm’s performance to three other image encryption algorithms. Performance metrics such as NPCR, UACI, correlation coefficient, differential metrics, entropy, and encryption speed are evaluated using standard test images. By combining these properties, the proposed cryptosystem avoids all of the cryptographic weaknesses of previous chaosbased cryptosystems. Various security analyses are performed on the new algorithm, and the simulation results show that the encryption and decryption effects are excellent and the algorithm has good security and robustness.
Availability of data and materials
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.
Abbreviations
 DNN:

Deep neural networks
 ANN:

Artificial neural network
 NPCR:

Number of pixels changing rate
 ACM:

Arnold cat map algorithm
 DM:

Discrete memristor
References
Kalpana V, Vijaya Kishore V, Satyanarayana RVS (2023) MRI and SPECT brain image analysis using image fusion. In: Marriwala, N., Tripathi, C., Jain, S., Kumar, D. (eds) Mobile radio communications and 5G networks. Lecture notes in networks and systems, vol 588. Springer, Singapore. https://doi.org/10.1007/9789811979828_48
Vijaya Kishore V, Kalpana V (2020) Effect of Noise on Segmentation Evaluation Parameters. In: Pant, M., Kumar Sharma, T., Arya, R., Sahana, B., Zolfagharinia, H. (eds) Soft computing: Theories and applications. Advances in intelligent systems and computing, vol 1154. Springer, Singapore. https://doi.org/10.1007/9789811540325_41
Vijaya Kishore V, Kalpana V (2020) ROI segmentation and detection of neoplasm based on morphology using segmentation operators. In: Hitendra Sarma, T., Sankar, V., Shaik, R. (eds) Emerging trends in electrical, communications, and information technologies. Lecture notes in electrical engineering, vol 569. Springer, Singapore. https://doi.org/10.1007/9789811389429_41
Stallings W (2010) Cryptography and network security: principles and practice, vol 998. Prentice Hall
David VARS, Govinda E, Ganapriya K, Dhanapal R, Manikandan A (2023) An automatic brain tumors detection and classification using deep convolutional neural network with VGG19," 2023 2nd International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation (ICAECA). Coimbatore, India. pp. 1–5. https://doi.org/10.1109/ICAECA56562.2023.10200949
Lian S, Liu Z, Ren Z, Wang H (2006) Secure advanced video coding based on selective encryption algorithms. IEEE Trans Consum Electron 52(2):621–629
Xue X, Palanisamy S, A M, Selvaraj D, Khalaf OI, Abdulsahib GM (2023 ) A Novel partial sequence technique based Chaotic biogeography optimization for PAPR reduction in eneralized frequency division multiplexing waveform. Heliyon 9(9):e19451. https://doi.org/10.1016/j.heliyon.2023.e19451
Cheng H, Li X (2000) Partial encryption of compressed images and videos. EEE Trans Signal Process 48(8):2439–2451
Lian S (2008) Multimedia content encryption: techniques and applications. Auerbach Publications
Rodrigues J, Puech W, Bors A (2006) Selective encryption of human skin in jpeg images. In: In 2006 International conference on image processing. IEEE, pp 1981–1984
Ali R, Manikandan A, Xu J (2023) A novel framework of adaptive fuzzyGLCM segmentation and Fuzzy with capsules network (FCapsNet) classification. Neural Comput Applic. https://doi.org/10.1007/s0052102308666y
Karpagalakshmi R, Tensing D, Kalpana A (2016) Image localization using deformable model and its application in healthinformatics. J Med Imaging Health Inform 6:19721976. https://doi.org/10.1166/jmihi.2016.1959
Balasubramani A, Kalaivanan K, Karpagalakshmi RC, Monikandan R (2008) Automatic facial expression recognition system. 2008 International Conference on Computing, Communication and Networking, Karur, India. pp. 15. https://doi.org/10.1109/ICCCNET.2008.4787749
Yoon JH, Zhang J, Lin P, Upadhyay N, Yan P, Liu Y, Xia Q, Yang JJ (2020) A lowcurrent and analog memristor with Ru as mobile species. Adv Mater 32:e1904599
Zhang Y, Ping Y, Zhang Z, Zhao G (2021) Recent advances in dimensionality reduction modeling and multistability reconstitution of memristive circuit. Complex 2021:1–18
Dai W, Xu X, Song X, Li G (2022) Audio encryption algorithm based on chen memristor chaotic system. Symmetry 14:17
Kalaiarasan D, Ahilan A, Ramalingam S (2023) A Harris Hawk optimization with chaotic map based image encryption for multimedia application. 11035 – 11057
Manikandan A, Ponni M (2022) An early prediction of tumor in heart by cardiac masses classification in echocardiogram images using robust back propagation neural network classifier. Braz Arch Biol Tech 65. https://doi.org/10.1590/167843242022210316
Maniyath SR, Thanikaiselvan V (2020) An efficient image encryption using deep neural network and chaotic map. Microprocess Microsyst 77:103134. https://doi.org/10.1016/j.micpro.2020.103134
Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput. 24(9):926–934
Annamalai M, Ponni Bala M (2023) Intracardiac mass detection and classification using double convolutional neural network classifier. J Eng Res 11(2A):272–280. https://doi.org/10.36909/jer.12237
Cangea O, Paraschiv N (2018) Chaosbased cryptography for color images. In: 2018 22nd International Conference on System Theory, Control and Computing (ICSTCC), pp 510–515. https://doi.org/10.1109/ICSTCC.2018.8540650
Balamurugan D, Seshadri A, Reddy P, Rupani A, Manikandan A (2022) Multiview objects recognition using deep learningbased wrapCNN with voting scheme. Neural Process Lett 54:127. https://doi.org/10.1007/s11063021106794
Chen M, Ma G, Tang C, Lei Z (2020) Generalized optical encryption framework based on shearlets for medical image. Opt Lasers Eng 128:106026
Mishra Z, Acharya B (2020) High throughput and low area architectures of secure IoT algorithm for medical image encryption. J Inf Secure Appl 53:102533
Manikandan A, Madhu GC, Flora GD et al (2023) Hybrid advisory weight based dynamic scheduling framework to ensure effective communication using acknowledgement during encounter strategy in Adhoc network. Int J Inf. tecnol. https://doi.org/10.1007/s41870023014215
Chandramohan K, Manikandan A, Ramalingam S, Dhanapal R (2023) Performance evaluation of VANET using directional location aided routing (DLAR) protocol with sleep scheduling algorithm. Ain Shams Eng J 102458. https://doi.org/10.1016/j.asej.2023.102458
Gopalan SH, Ashok J, Manikandan A et al (2023) Data dissemination protocol for VANETs to optimize the routing path using hybrid particle swarm optimization with sequential variable neighbourhood search. Telecommun Syst. https://doi.org/10.1007/s11235023010402
Reka R, Manikandan A, Venkataramanan C et al (2023) An energy efficient clustering with enhanced chicken swarm optimization algorithm with adaptive position routing protocol in mobile adhoc network. Telecommun Syst. https://doi.org/10.1007/s11235023010411
Venkataramanan C, Ramalingam S, Manikandan A (2021) LWBA: Lévywalk bat algorithm based data prediction for precision agriculture in wireless sensor networks. J Intell Fuzzy Syst 41:2891–2904. https://doi.org/10.3233/JIFS202953
Venkataramanan C, Sarojini R, Porchelvi N, VMSN PK, Ramalingam S (2022) Dualband MicroStrip Antenna using Split Ring Resonators for ISM Bands," 2022 International Conference on Augmented Intelligence and Sustainable Systems (ICAISS). Trichy, India. pp. 1424–1429. https://doi.org/10.1109/ICAISS55157.2022.10010915
Karpagalakshmi RC, Vijayalakshmi P, Gowsic K et al (2021) An effective traffic management system using connected dominating set forwarding (CDSF) framework for reducing traffic congestion in high density VANETs. Wireless Pers Commun 119:2725–2754. https://doi.org/10.1007/s1127702108361y
Banu SA, AlAlawi AI, Padmaa M, Priya PS, Thanikaiselvan V, Amirtharajan R (2023) Healthcare with datacare—a triangular DNA security. Multimed Tools Appl:1–18
Nilabar Nisha U, Manikandan A, Venkataramanan C, Dhanapal R (2023) A score based link delay aware routing protocol to improve energy optimization in wireless sensor network. J Eng Res. https://doi.org/10.1016/j.jer.2023.100115
Mahalingam H, Velupillai Meikandan P, Thenmozhi K, Moria KM, Lakshmi C, Chidambaram N, Amirtharajan R (2023) Neural attractorbased adaptive key generator with DNAcoded security and privacy framework for multimedia data in cloud environments. Mathematics 11(8):1769
Manikandan V, Amirtharajan R (2022) A simple embedover encryption scheme for DICOM images using Bülban Map. Med Biol Eng Comput 60(3):701–717
Thenmozhi K, Rayappan JBB, Amirtharajan R, Praveenkumar P (2021) MUX induced ring oscillators for encrypted nano communication via quantum dot cellular automata. Nano Commun Netw 27:100338
Devi RS, Thenmozhi K, Rayappan JBB, Amirtharajan R, Praveenkumar P (2019) Entropyinfluenced RNA diffused quantum chaos to conserve medical data privacy. Int J Theor Phys 58:1937–1956
Acknowledgements
Not applicable.
Funding
No funding was received by any government or private concern.
Author information
Authors and Affiliations
Contributions
BSK wrote the original draft and worked on the software. RR worked on the software. BSK defined the methodology, and reviewed and edited the manuscript. RR supervised the work. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated in a credit line to the data.
About this article
Cite this article
Kumar, B.S., Revathi, R. An efficient image encryption algorithm using a discrete memorybased logistic map with deep neural network. J. Eng. Appl. Sci. 71, 41 (2024). https://doi.org/10.1186/s44147023003498
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s44147023003498