An Enhanced Color Visual Cryptography Technique Using Generated Adversarial Network (GANs)
Keywords:
— cryptography, encryption, security, privacy, networkAbstract
Hundreds of millions of people around the globe use different computing devices and services, like smartphones, laptops, and messaging apps. Visual cryptography (VC) is widely regarded as a highly secure way to encrypt images, making it essential for various important applications, such as maintaining the integrity of voting, protecting online transactions, and ensuring privacy. The core of VC involves turning secret images into several digital shares, which makes it impossible for anyone to reveal the original image from just one share. However, there are challenges in current VC implementations, such as issues with pixelation, high computational overhead, and diminished decryption fidelity, significantly impact its efficacy. To tackle these challenges, we enhance a new color visual cryptography technique using generated adversarial networks to generate secure encrypted shares. Notably, our scheme maintains non-expandability by preserving equal dimensions between the original secret image and its shares, thus reducing memory requirements while improving image fidelity. We test the proposed technique using a variety of standard benchmark images and apply established metrics to assess its resistance to cryptanalytic attacks, correlation strength, histogram characteristics, and overall encryption quality. Our findings show that the suggested technique provides improved image quality, more effective encryption, and almost ideal statistical features compared to current methods.
Downloads
References
Mohammad, O. F., Rahim, M. S. M., Zeebaree, S. R. M., & Ahmed, F. Y. (2017). A survey and analysis of the image encryption methods. International Journal of Applied Engineering Research, 12(23), 13265-13280.
Subramanian, N., Cheheb, I., Elharrouss, O., Al-Maadeed, S., & Bouridane, A. (2021). End-to-end image steganography using deep convolutional autoencoders. IEEE Access, 9, 135585-135593.
Naor, M., & Shamir, A. (1994, May). Visual cryptography. In Workshop on the Theory and Application of of Cryptographic Techniques (pp. 1-12). Springer, Berlin, Heidelberg.
Chen, Y. H., & Juan, J. S. T. (2022). XOR-Based (n, n) Visual Cryptography Schemes for Grayscale or Color Images with Meaningful Shares. Applied Sciences, 12(19), 10096.
Shankar, K., & Eswaran, P. (2015). Sharing a secret image with encapsulated shares in visual cryptography. Procedia Computer Science, 70, 462-468.
Shankar, K., & Eswaran, P. (2017). RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications, 14(2), 118-130.
Al-Khalid, R. I., Al-Dallah, R. A., Al-Anani, A. M., Barham, R. M., & Hajir, S. I. (2017). A secure visual cryptography scheme using private key with invariant share sizes. Journal of Software Engineering and Applications, 10(01), 1.
Shankar, K., & Lakshmanaprabu, S. K. (2018). Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. International Journal of Engineering & Technology, 7(9), 22-27.
Sherine, A., Peter, G., Stonier, A. A., Praghash, K., & Ganji, V. (2022). CMY color spaced-based visual cryptography scheme for secret Sharing of data. Wireless Communications and Mobile Computing, 2022.
Shi, H., Li, Y., Hu, B., Chen, M., & Ren, Y. (2022). A robust and secure zero-watermarking copyright authentication scheme based on visual cryptography and block GH feature. Multimedia Tools and Applications, 81(26), 38019-38051.
Manoj, I. V. S., & Tech, B. (2010). Cryptography and steganography. International Journal of Computer Applications, 1(12), 63-68.
Saraireh, S. (2013). A secure data communication system using cryptography and steganography. International Journal of Computer Networks & Communications (IJCNC) Vol, 5.
Saxena, A. K., Sinha, S., & Shukla, P. (2018). Design and development of image security technique by using cryptography and steganography: a combine approach. International Journal of Image, Graphics and Signal Processing, 10(4).
Hou, Y. C. (2003). Visual cryptography for color images. Pattern recognition, 36(7), 1619-1629.
Goodfellow, I. J., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., ... & Bengio, Y. (2020). Generative adversarial networks. Commun. Acm, 63(11), 139-144.
Dutta, I. K., Ghosh, B., Carlson, A., Totaro, M., & Bayoumi, M. (2020, October). Generative adversarial networks in security: a survey. In 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) (pp. 0399-0405). IEEE.
Yinka-Banjo, C., & Ugot, O. A. (2020). A review of generative adversarial networks and its application in cybersecurity. Artificial Intelligence Review, 53, 1721-1736.
Aggarwal, A., Mittal, M., & Battineni, G. (2021). Generative adversarial network: An overview of theory and applications. International Journal of Information Management Data Insights, 1(1), 100004.
Gui, J., Sun, Z., Wen, Y., Tao, D., & Ye, J. (2021). A review on generative adversarial networks: Algorithms, theory, and applications. IEEE transactions on knowledge and data engineering.
Chhetri, S. R., Lopez, A. B., Wan, J., & Al Faruque, M. A. (2019, March). Gan-sec: Generative adversarial network modeling for the security analysis of cyber-physical production systems. In 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE) (pp. 770-775). IEEE.
Wang, J., Li, X., & Yang, J. (2018). Stacked conditional generative adversarial networks for jointly learning shadow detection and shadow removal. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 1788-1797).
Ibrahim, D. R., Abdullah, R., & Teh, J. S. (2022). An enhanced color visual cryptography scheme based on the binary dragonfly algorithm. International Journal of Computers and Applications, 44(7), 623-632.
Ibrahim, D., Sihwail, R., Arrifin, K. A. Z., Abuthawabeh, A., & Mizher, M. (2023). A novel color visual cryptography approach based on Harris Hawks Optimization Algorithm. Symmetry, 15(7), 1305.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.