2021
DOI: 10.1364/ao.428203
|View full text |Cite
|
Sign up to set email alerts
|

Research on the avalanche effect of image encryption based on the Cycle-GAN

Abstract: Aiming at the problem of the weak avalanche effect in the recently proposed deep learning image encryption algorithm, this paper analyzes the causes of weak avalanche effect in the neural network of Cycle-GAN step-by-step process and proposes an image encryption algorithm combining the traditional diffusion algorithm and deep learning neural network. In this paper, first, the neural network is used for image scrambling and slight diffusion, and then the traditional diffusion algor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 34 publications
0
8
0
Order By: Relevance
“…As we can see in Table 2, the end-to-end deep learning image algorithm in Ref. 54 has better values in correlation coefficients and NPCR than the other two traditional image encryption methods. Furthermore, in other indexes, the deep learning method also has a similar value to the other two methods.…”
Section: Image Encryptionmentioning
confidence: 93%
“…As we can see in Table 2, the end-to-end deep learning image algorithm in Ref. 54 has better values in correlation coefficients and NPCR than the other two traditional image encryption methods. Furthermore, in other indexes, the deep learning method also has a similar value to the other two methods.…”
Section: Image Encryptionmentioning
confidence: 93%
“…A user, a cloud, and a trusted third party make up this computer architecture, and the trusted third party is in charge of distributing random compressed sensing keys. In [ 19 ], a machine learning technique was used for an issue involving health, commercial, or other sorts of sensitive data, which necessitates not only precise estimates. Because the cloud does not have access to keys required to decrypt the data, encryption assures that it remains private.…”
Section: Related Workmentioning
confidence: 99%
“…As shown in Table 6 which displays the comparative results assessing our proposed system with older systems due to their NPCR and UACI values, from the following analysis, it has been proved that the proposed scheme is robust and can withstand the differential assaults. [35] 0.9961 0.3357 Ding et al [23] 0.9959 0.2319 Bao and Xue [39] 0.9964 0.3349…”
Section: Resistance To Differential Attack Attackersmentioning
confidence: 99%
“…Thus, the results confirm that our new suggested scheme can be able to effectively counteroffensive the information entropy. [35] 7.9944 Ding et al [23] 7.9986 Bao and Xue [39] 7.9972…”
Section: 𝐿 𝑖=0mentioning
confidence: 99%