An Enhanced Color Visual Cryptography Technique Using Generated Adversarial Network (GANs)

Authors

  • Dyala Ibrahim, Omar Isam Al Mrayat, Malik Jawarneh

Keywords:

— cryptography, encryption, security, privacy, network

Abstract

Hundreds of millions of people around the globe use different computing devices and services, like smartphones, laptops, and messaging apps. Visual cryptography (VC) is widely regarded as a highly secure way to encrypt images, making it essential for various important applications, such as maintaining the integrity of voting, protecting online transactions, and ensuring privacy. The core of VC involves turning secret images into several digital shares, which makes it impossible for anyone to reveal the original image from just one share. However, there are challenges in current VC implementations, such as issues with pixelation, high computational overhead, and diminished decryption fidelity, significantly impact its efficacy. To tackle these challenges, we enhance a new color visual cryptography technique using        generated adversarial networks to generate secure encrypted shares. Notably, our scheme maintains non-expandability by preserving equal dimensions between the original secret image and its shares, thus reducing memory requirements while improving image fidelity. We test the proposed technique using a variety of standard benchmark images and apply established metrics to assess its resistance to cryptanalytic attacks, correlation strength, histogram characteristics, and overall encryption quality. Our findings show that the suggested technique provides improved image quality, more effective encryption, and almost ideal statistical features compared to current methods.

Downloads

Download data is not yet available.

References

Mohammad, O. F., Rahim, M. S. M., Zeebaree, S. R. M., & Ahmed, F. Y. (2017). A survey and analysis of the image encryption methods. International Journal of Applied Engineering Research, 12(23), 13265-13280.‏

Subramanian, N., Cheheb, I., Elharrouss, O., Al-Maadeed, S., & Bouridane, A. (2021). End-to-end image steganography using deep convolutional autoencoders. IEEE Access, 9, 135585-135593.‏

Naor, M., & Shamir, A. (1994, May). Visual cryptography. In Workshop on the Theory and Application of of Cryptographic Techniques (pp. 1-12). Springer, Berlin, Heidelberg.‏

Chen, Y. H., & Juan, J. S. T. (2022). XOR-Based (n, n) Visual Cryptography Schemes for Grayscale or Color Images with Meaningful Shares. Applied Sciences, 12(19), 10096.‏

Shankar, K., & Eswaran, P. (2015). Sharing a secret image with encapsulated shares in visual cryptography. Procedia Computer Science, 70, 462-468.‏

Shankar, K., & Eswaran, P. (2017). RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications, 14(2), 118-130.‏

Al-Khalid, R. I., Al-Dallah, R. A., Al-Anani, A. M., Barham, R. M., & Hajir, S. I. (2017). A secure visual cryptography scheme using private key with invariant share sizes. Journal of Software Engineering and Applications, 10(01), 1.‏

Shankar, K., & Lakshmanaprabu, S. K. (2018). Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. International Journal of Engineering & Technology, 7(9), 22-27.‏

Sherine, A., Peter, G., Stonier, A. A., Praghash, K., & Ganji, V. (2022). CMY color spaced-based visual cryptography scheme for secret Sharing of data. Wireless Communications and Mobile Computing, 2022.‏

Shi, H., Li, Y., Hu, B., Chen, M., & Ren, Y. (2022). A robust and secure zero-watermarking copyright authentication scheme based on visual cryptography and block GH feature. Multimedia Tools and Applications, 81(26), 38019-38051.‏

Manoj, I. V. S., & Tech, B. (2010). Cryptography and steganography. International Journal of Computer Applications, 1(12), 63-68.‏

Saraireh, S. (2013). A secure data communication system using cryptography and steganography. International Journal of Computer Networks & Communications (IJCNC) Vol, 5.‏

Saxena, A. K., Sinha, S., & Shukla, P. (2018). Design and development of image security technique by using cryptography and steganography: a combine approach. International Journal of Image, Graphics and Signal Processing, 10(4).

Hou, Y. C. (2003). Visual cryptography for color images. Pattern recognition, 36(7), 1619-1629.‏

Goodfellow, I. J., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., ... & Bengio, Y. (2020). Generative adversarial networks. Commun. Acm, 63(11), 139-144.‏

Dutta, I. K., Ghosh, B., Carlson, A., Totaro, M., & Bayoumi, M. (2020, October). Generative adversarial networks in security: a survey. In 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) (pp. 0399-0405). IEEE.‏

Yinka-Banjo, C., & Ugot, O. A. (2020). A review of generative adversarial networks and its application in cybersecurity. Artificial Intelligence Review, 53, 1721-1736.‏

Aggarwal, A., Mittal, M., & Battineni, G. (2021). Generative adversarial network: An overview of theory and applications. International Journal of Information Management Data Insights, 1(1), 100004.‏

Gui, J., Sun, Z., Wen, Y., Tao, D., & Ye, J. (2021). A review on generative adversarial networks: Algorithms, theory, and applications. IEEE transactions on knowledge and data engineering.‏

Chhetri, S. R., Lopez, A. B., Wan, J., & Al Faruque, M. A. (2019, March). Gan-sec: Generative adversarial network modeling for the security analysis of cyber-physical production systems. In 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE) (pp. 770-775). IEEE.‏

Wang, J., Li, X., & Yang, J. (2018). Stacked conditional generative adversarial networks for jointly learning shadow detection and shadow removal. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 1788-1797).‏

Ibrahim, D. R., Abdullah, R., & Teh, J. S. (2022). An enhanced color visual cryptography scheme based on the binary dragonfly algorithm. International Journal of Computers and Applications, 44(7), 623-632.‏

Ibrahim, D., Sihwail, R., Arrifin, K. A. Z., Abuthawabeh, A., & Mizher, M. (2023). A novel color visual cryptography approach based on Harris Hawks Optimization Algorithm. Symmetry, 15(7), 1305.‏

Downloads

Published

06.08.2024

How to Cite

Dyala Ibrahim. (2024). An Enhanced Color Visual Cryptography Technique Using Generated Adversarial Network (GANs). International Journal of Intelligent Systems and Applications in Engineering, 12(23s), 1073–1080. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7125

Issue

Section

Research Article