Role of Machine Learning in Enhancing Image Encryption Techniques for Cybersecurity
Keywords:
Hybrid encryption, Traditional cryptographic techniques, Machine learning algorithms, Security, Performance, Cybersecurity, Encryption frameworkAbstract
In the context of cybersecurity, ensuring the privacy of the content of images, filled with potentially sensitive data, is crucial. Kosheen et al. , have used conventional approaches to encrypt images to protect it from unauthorized access; it has been noted that conventional methods have high risk of being defeated by new forms of threats. The following paper aims to understand how to apply machine learning (ML) in strengthening image encryption approaches to improve safety mechanisms. First, we introduce a brief explanation of what image encryption is and explain why traditional approaches are not completely effective. Furthermore, we are going to describe the appeared ML in the field of cybersecurity and correlated fields and analyze the possibilities of using it in image encryption. Explaining the detailed method of optimization of a broad encryption process, this paper outlines the correlation between machine learning algorithms such as neural network and deep learning techniques on the process of data encryption for optimum security and efficiency. Moreover, we introduce the benefits resulting from the combination of ML with encryption such as the increased resistance against attacks and the flexibility to respond to current threats. Yet there are concerns including interpretability of the models and the presence of adversarial examples. Last of all, we introduce the knowledge gaps that should be filled in future studies within the given domain. In conclusion, this paper emphasizes on the relevance of ML as an evolving tool towards the development of image encryption and enhancement of cybersecurity mechanisms in the rapidly evolving digital world.
Downloads
References
Y. Wang, Z. Sun, and Z. Jin, "Adversarial Attacks and Defenses in Images, Graphs and Text: A Review," arXiv preprint arXiv:1902.07285, 2019.
D. Sculley, G. Holt, D. Golovin, E. Davydov, and T. Phillips, "Hidden technical debt in machine learning systems," in Advances in Neural Information Processing Systems, 2018, pp. 2503-2514.
Y. Liu, Z. Chen, Y. Liu, and L. Tong, "A Survey on Deep Learning for Cyber Security: Threat Detection, Vulnerability Detection, and Attack Prediction," IEEE Access, vol. 8, pp. 10349-10368, 2020.
M. Saha, A. Garg, and S. Nandi, "Deep Learning Based Image Encryption Techniques: A Comprehensive Survey," IEEE Access, vol. 9, pp. 22915-22933, 2021.
X. Chen, H. Yao, Y. Wang, and H. Zhou, "A Machine Learning Based Encryption Algorithm for Image Security," in 2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), 2020, pp. 323-326.
Y. Li, H. Yang, and W. Xie, Deep Learning for Image Encryption: A Comprehensive Survey," IEEE Transactions on Multimedia, vol. 23, pp. 253-268, 2021.
A. K. Singh and A. Verma, "An Overview of Image Encryption Techniques Using Machine Learning," International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol. 8, no. 12, pp. 635-639, 2019.
X. Sun, X. Jiang, Y. Zhang, and Y. Fang, "Image Encryption Based on Modified Gabor Filters and BP Neural Network," in 2020 International Conference on Intelligent Computing and Signal Processing (ICSP), 2020, pp. 63-67.
Y. Zhang and R. Guo, "A Review on Deep Learning Techniques Applied to Image Encryption," Journal of Image and Graphics, vol. 7, no. 10, pp. 717-722, 2019.
A. Krizhevsky, "Learning Multiple Layers of Features from Tiny Images," University of Toronto, 2009.
I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning, MIT Press, 2016.
European Parliament and Council of the European Union, "Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation)," Official Journal of the European Union, 2016. [Online]. Available: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32016R0679
D. T. Nguyen, S. Lee, H. Kim, and K. R. Park, "Image encryption using deep neural networks," Computers & Electrical Engineering, vol. 81, p. 106496, 2020.
Z. Liu, X. Zhang, C. Chang, and F. E. Alsaadi, "Deep learning for image steganalysis: A review," Neurocomputing, vol. 337, pp. 17-26, 2019.
X. Wang, B. Li, X. Zhang, and Y. Liu, "Quantum-Secure Image Encryption Algorithm Based on Chaos and Hyperchaos," IEEE Access, vol. 9, pp. 11543-11555, 2021.
S. Khan, O. Maqbool, M. Ahmed, and A. Rehman, "Evolutionary algorithms based approach for optimizing encryption parameters in IoT security," in 2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), 2018, pp. 1-6.
A. Gupta, S. Dutta, A. Biswas, and D. Deb, "A Novel Image Encryption Technique Based on Deep Learning and Chaos Theory," in 2021 Fourth International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), 2021, pp. 36-41.
H. Yu, Z. Li, and H. Sun, "Recurrent neural networks for image encryption with applications to digital images," Multimedia Tools and Applications, vol. 78, no. 6, pp. 6885-6905, 2019. [Online]. Available: https://doi.org/10.1007/s11042-018-6642-4
H. Zhou, Q. Wang, S. Li, and Y. Zhang, "A hybrid encryption framework combining traditional cryptographic techniques with machine learning algorithms," Journal of Cybersecurity, vol. 5, no. 2, pp. 201-215, 2020.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.