Role of Machine Learning in Enhancing Image Encryption Techniques for Cybersecurity

Authors

  • D. A. Kiran Kumar, Megha Chauhan, Mrinal Gaurav, Nishank Sudhakar Pimple, Rajesh Vyankatesh Argiddi, Afrin Shikalgar

Keywords:

Hybrid encryption, Traditional cryptographic techniques, Machine learning algorithms, Security, Performance, Cybersecurity, Encryption framework

Abstract

In the context of cybersecurity, ensuring the privacy of the content of images, filled with potentially sensitive data, is crucial. Kosheen et al. , have used conventional approaches to encrypt images to protect it from unauthorized access; it has been noted that conventional methods have high risk of being defeated by new forms of threats. The following paper aims to understand how to apply machine learning (ML) in strengthening image encryption approaches to improve safety mechanisms. First, we introduce a brief explanation of what image encryption is and explain why traditional approaches are not completely effective. Furthermore, we are going to describe the appeared ML in the field of cybersecurity and correlated fields and analyze the possibilities of using it in image encryption. Explaining the detailed method of optimization of a broad encryption process, this paper outlines the correlation between machine learning algorithms such as neural network and deep learning techniques on the process of data encryption for optimum security and efficiency. Moreover, we introduce the benefits resulting from the combination of ML with encryption such as the increased resistance against attacks and the flexibility to respond to current threats. Yet there are concerns including interpretability of the models and the presence of adversarial examples. Last of all, we introduce the knowledge gaps that should be filled in future studies within the given domain. In conclusion, this paper emphasizes on the relevance of ML as an evolving tool towards the development of image encryption and enhancement of cybersecurity mechanisms in the rapidly evolving digital world.

Downloads

Download data is not yet available.

References

Y. Wang, Z. Sun, and Z. Jin, "Adversarial Attacks and Defenses in Images, Graphs and Text: A Review," arXiv preprint arXiv:1902.07285, 2019.

D. Sculley, G. Holt, D. Golovin, E. Davydov, and T. Phillips, "Hidden technical debt in machine learning systems," in Advances in Neural Information Processing Systems, 2018, pp. 2503-2514.

Y. Liu, Z. Chen, Y. Liu, and L. Tong, "A Survey on Deep Learning for Cyber Security: Threat Detection, Vulnerability Detection, and Attack Prediction," IEEE Access, vol. 8, pp. 10349-10368, 2020.

M. Saha, A. Garg, and S. Nandi, "Deep Learning Based Image Encryption Techniques: A Comprehensive Survey," IEEE Access, vol. 9, pp. 22915-22933, 2021.

X. Chen, H. Yao, Y. Wang, and H. Zhou, "A Machine Learning Based Encryption Algorithm for Image Security," in 2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), 2020, pp. 323-326.

Y. Li, H. Yang, and W. Xie, Deep Learning for Image Encryption: A Comprehensive Survey," IEEE Transactions on Multimedia, vol. 23, pp. 253-268, 2021.

A. K. Singh and A. Verma, "An Overview of Image Encryption Techniques Using Machine Learning," International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol. 8, no. 12, pp. 635-639, 2019.

X. Sun, X. Jiang, Y. Zhang, and Y. Fang, "Image Encryption Based on Modified Gabor Filters and BP Neural Network," in 2020 International Conference on Intelligent Computing and Signal Processing (ICSP), 2020, pp. 63-67.

Y. Zhang and R. Guo, "A Review on Deep Learning Techniques Applied to Image Encryption," Journal of Image and Graphics, vol. 7, no. 10, pp. 717-722, 2019.

A. Krizhevsky, "Learning Multiple Layers of Features from Tiny Images," University of Toronto, 2009.

I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning, MIT Press, 2016.

European Parliament and Council of the European Union, "Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation)," Official Journal of the European Union, 2016. [Online]. Available: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32016R0679

D. T. Nguyen, S. Lee, H. Kim, and K. R. Park, "Image encryption using deep neural networks," Computers & Electrical Engineering, vol. 81, p. 106496, 2020.

Z. Liu, X. Zhang, C. Chang, and F. E. Alsaadi, "Deep learning for image steganalysis: A review," Neurocomputing, vol. 337, pp. 17-26, 2019.

X. Wang, B. Li, X. Zhang, and Y. Liu, "Quantum-Secure Image Encryption Algorithm Based on Chaos and Hyperchaos," IEEE Access, vol. 9, pp. 11543-11555, 2021.

S. Khan, O. Maqbool, M. Ahmed, and A. Rehman, "Evolutionary algorithms based approach for optimizing encryption parameters in IoT security," in 2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), 2018, pp. 1-6.

A. Gupta, S. Dutta, A. Biswas, and D. Deb, "A Novel Image Encryption Technique Based on Deep Learning and Chaos Theory," in 2021 Fourth International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), 2021, pp. 36-41.

H. Yu, Z. Li, and H. Sun, "Recurrent neural networks for image encryption with applications to digital images," Multimedia Tools and Applications, vol. 78, no. 6, pp. 6885-6905, 2019. [Online]. Available: https://doi.org/10.1007/s11042-018-6642-4

H. Zhou, Q. Wang, S. Li, and Y. Zhang, "A hybrid encryption framework combining traditional cryptographic techniques with machine learning algorithms," Journal of Cybersecurity, vol. 5, no. 2, pp. 201-215, 2020.

Downloads

Published

26.03.2024

How to Cite

D. A. Kiran Kumar. (2024). Role of Machine Learning in Enhancing Image Encryption Techniques for Cybersecurity. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 3904 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6162

Issue

Section

Research Article