Abstract
The recent advancement in multimedia technology has undoubtedly made the transmission of objects of information efficiently. Interestingly, images are the prominent and frequent representations communicated across the defence, social, private and aerospace networks. Image ciphering or image encryption is adopted as a secure medium of the confidential image. The utility of soft computing for encryption looks to offer an uncompromising impact in enhancing the metrics. Aligning with neural networks, a Hopfield attractor-based encryption scheme has proposed in this work. The parameter sensitivity, random similarity and learning ability have been instrumental in choosing this attractor for performing confusion and diffusion. The uniqueness of this scheme is the achievement of average entropy of 7.997, average correlation of 0.0047, average NPCR of 99.62 and UACI of 33.43 without using any other chaotic maps, thus proposing attack-resistant image encryption against attackable chaotic maps.
Similar content being viewed by others
References
Kohonen T (1988) An introduction to neural computing. Neural Netw 1:3–16. https://doi.org/10.1016/0893-6080(88)90020-2
Aguilar J, Molina C (2013) The multilayer random neural network. Neural Process Lett 37:111–133. https://doi.org/10.1007/s11063-012-9237-x
Chen Tingting, Zhong Sheng (2009) Privacy-preserving backpropagation neural network learning. IEEE Trans Neural Netw 20:1554–1564. https://doi.org/10.1109/tnn.2009.2026902
Al Azawee H, Husien S, Yunus MAM (2016) Encryption function on artificial neural network. Neural Comput Appl 27:2601–2604. https://doi.org/10.1007/s00521-015-2028-3
Diaconu A-V (2016) Circular inter–intra pixels bit-level permutation and chaos-based image encryption. Inf Sci 355–356:314–327. https://doi.org/10.1016/j.ins.2015.10.027
Fu C, Meng W-H, Zhang Y-F et al (2013) An efficient and secure medical image protection scheme based on chaotic map. Comput Biol Med. https://doi.org/10.1016/j.compbiomed.2013.05.005
Chandrasekaran J, Thiruvengadam SJ (2017) A hybrid chaotic and number theoretic approach for securing DICOM images. Secur Commun Netw. https://doi.org/10.1155/2017/6729896
El AssadS, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144–157. https://doi.org/10.1016/j.image.2015.10.004
Xue H, Du J, Li S, Ma W (2018) Region of interest encryption for color images based on a hyperchaotic system with three positive Lyapunov exponets. Opt Laser Technol 106:506–516. https://doi.org/10.1016/j.optlastec.2018.04.030
Silva-garcía VM, Flores-carapia R, Rentería-márquez C, Luna-benoso B (2018) Substitution box generation using chaos: an image encryption application. Appl Math Comput 332:123–135. https://doi.org/10.1016/j.amc.2018.03.019
Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic S-Box. Inf Sci 450:361–377. https://doi.org/10.1016/j.ins.2018.03.055
Dhall S, Pal SK, Sharma K (2018) Cryptanalysis of image encryption scheme based on a new 1D chaotic system. Signal Process 146:22–32. https://doi.org/10.1016/j.sigpro.2017.12.021
Ozkaynak F, Ozer AB, Yavuz S (2017) Security analysis of an image encryption algorithm based on chaos and DNA encoding. Comput Sci 95:1–4. https://doi.org/10.1109/siu.2013.6531597
Qin K (2017) On chaotic neural network design: a new framework. Neural Process Lett 45:243–261. https://doi.org/10.1007/s11063-016-9525-y
Chen W, Huang Y, Ren S (2018) Passivity and synchronization of coupled reaction–diffusion Cohen–Grossberg neural networks with state coupling and spatial diffusion coupling. Neurocomputing 275:1208–1218. https://doi.org/10.1016/j.neucom.2017.09.063
Dror G, Tsodyks M (2000) Chaos in neural networks with dynamic synapses. Neurocomputing 32–33:365–370. https://doi.org/10.1016/S0925-2312(00)00187-9
Tang H, Li H, Yan R (2010) Memory dynamics in attractor networks with saliency weights. Neural Comput 22:1899–1926. https://doi.org/10.1162/neco.2010.07-09-1050
Yu W, Cao J (2006) Cryptography based on delayed chaotic neural networks. Phys Lett Sect A Gen At Solid State Phys 356:333–338. https://doi.org/10.1016/j.physleta.2006.03.069
Gao T, Gu Q, Emmanuel S (2009) A novel image authentication scheme based on hyper-chaotic cell neural network. Chaos Solitons Fract 42:548–553. https://doi.org/10.1016/j.chaos.2009.01.017
Lian S (2009) A block cipher based on chaotic neural networks. Neurocomputing 72:1296–1301. https://doi.org/10.1016/j.neucom.2008.11.005
Shi X, Duan S, Wang L et al (2015) A novel memristive electronic synapse-based Hermite chaotic neural network with application in cryptography. Neurocomputing 166:487–495. https://doi.org/10.1016/j.neucom.2015.03.018
Kassem A, Al Haj Hassan H, Harkouss Y, Assaf R (2014) Efficient neural chaotic generator for image encryption. Digit Signal Process A Rev J 25:266–274. https://doi.org/10.1016/j.dsp.2013.11.004
Norouzi B, Mirzakuchaki S, Norouzi P (2017) Breaking an image encryption technique based on neural chaotic generator. Optik 140:946–952. https://doi.org/10.1016/j.ijleo.2017.04.103
Hopfield JJ (1982) Neural networks and physical systems with emergent collective computational abilities (associative memory/parallel processing/categorization/content-addressable memory/fail-soft devices). Biophysics 79:2554–2558
Li Q, Yang X-S, Yang F (2005) Hyperchaos in Hopfield-type neural networks. Neurocomputing 67:275–280. https://doi.org/10.1016/j.neucom.2005.02.009
Bigdeli N, Farid Y, Afshar K (2012) A robust hybrid method for image encryption based on Hopfield neural network. Comput Electron Eng 38:356–369. https://doi.org/10.1016/j.compeleceng.2011.11.019
Wang XY, Li ZM (2019) A color image encryption algorithm based on Hopfield chaotic neural network. Opt Lasers Eng 115:107–118. https://doi.org/10.1016/j.optlaseng.2018.11.010
Wu Y, Zhou Y, Saveriades G et al (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci 222:323–342. https://doi.org/10.1016/j.ins.2012.07.049
Acknowledgements
The authors wish to acknowledge SASTRA Deemed University, Thanjavur, India, for extending infrastructural support to carry out this work.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Lakshmi, C., Thenmozhi, K., Rayappan, J.B.B. et al. Hopfield attractor-trusted neural network: an attack-resistant image encryption. Neural Comput & Applic 32, 11477–11489 (2020). https://doi.org/10.1007/s00521-019-04637-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-019-04637-4