17
Views
0
CrossRef citations to date
0
Altmetric
Research Article

V-Net architecture based advanced visually meaningful image encryption technique

, , &

References

  • Gonzalez, Rafael C. Digital image processing. Pearson Education India, 2009.
  • Charif, Khalid, and Zine El Abidine Guennoun. “A novel image encryption algorithm based on chaotic billiards.” Journal of Discrete Mathematical Sciences and Cryptography 24.1 (2021): 129-154. doi: 10.1080/09720529.2019.1675302
  • Kumar, Sarvesh, et al. “Chaos based image encryption security in cloud computing.” Journal of Discrete Mathematical Sciences and Cryptography (2022): 1-11. doi: 10.1080/09720529.2021.1961905
  • Boudali, Asmaa, Naima Hadj Said, and Adda Ali-Pacha. “A new symmetrical cryptosystem based cellular automata and chaotic map function.” Journal of Discrete Mathematical Sciences and Cryptography (2022): 1-21.
  • De, Supriyo, and Jaydeb Bhaumik. “TBLT-AES: A Robust Image Encryption Scheme.” Journal of Discrete Mathematical Sciences and Cryptography 17.3 (2014): 273-288. doi: 10.1080/09720529.2014.927645
  • Kadhim, Inas Jawad, et al. “Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research.” Neurocomputing 335 (2019): 299-326. doi: 10.1016/j.neucom.2018.06.075
  • Bao, Long, and Yicong Zhou. “Image encryption: Generating visually meaningful encrypted images.” Information Sciences 324 (2015): 197-207. doi: 10.1016/j.ins.2015.06.049
  • Kaur, Manjit, and Vijay Kumar. “A comprehensive review on image encryption techniques.” Archives of Computational Methods in Engineering 27.1 (2020): 15-43. doi: 10.1007/s11831-018-9298-8
  • Kanso, Ali, and Mohammad Ghebleh. “An algorithm for encryption of secret images into meaningful images.” Optics and lasers in engineering 90 (2017): 196-208. doi: 10.1016/j.optlaseng.2016.10.009
  • Yang, Yu-Guang, et al. “Visually meaningful image encryption based on universal embedding model.” Information Sciences 562 (2021): 304-324. doi: 10.1016/j.ins.2021.01.041
  • Dong, Youxia, Xiaoling Huang, and Guodong Ye. “Visually meaningful image encryption scheme based on DWT and schur decomposition.” Security and Communication Networks 2021 (2021).
  • Chai, Xiuli, et al. “An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding.” Optics and Lasers in Engineering 124 (2020): 105837. doi: 10.1016/j.optlaseng.2019.105837
  • Ponuma, R., et al. “Visually meaningful image encryption using data hiding and chaotic compressive sensing.” Multimedia Tools and Applications 78.18 (2019): 25707-25729. doi: 10.1007/s11042-019-07808-6
  • Chai, Xiuli, et al. “A visually secure image encryption scheme based on compressive sensing.” Signal Processing 134 (2017): 35-51. doi: 10.1016/j.sigpro.2016.11.016
  • Wang, Hui, et al. “A visually secure image encryption scheme based on parallel compressive sensing.” Signal Processing 155 (2019): 218-232. doi: 10.1016/j.sigpro.2018.10.001
  • Huang, Xiaoling, et al. “Visually asymmetric image encryption algorithm based on SHA-3 and compressive sensing by embedding encrypted image.” Alexandria Engineering Journal 61.10 (2022): 7637-7647. doi: 10.1016/j.aej.2022.01.015
  • Wang, Kunshu, et al. “Optimized visually meaningful image embedding strategy based on compressive sensing and 2D DWT-SVD.” Multimedia Tools and Applications (2022): 1-25.
  • Yang, Yu-Guang, et al. “A visually meaningful image encryption algorithm based on adaptive 2D compressive sensing and chaotic system.” Multimedia Tools and Applications (2022): 1-30.
  • Baluja, Shumeet. “Hiding images within images.” IEEE transactions on pattern analysis and machine intelligence 42.7 (2019): 1685-1697. doi: 10.1109/TPAMI.2019.2901877
  • Telli, Mounir, Mohamed Othmani, and Hela Ltifi. An improved image steganography model based on Deep Convolutional Neural Networks. No. 7705. EasyChair, 2022.
  • Fang, Dejian, and Shuliang Sun. “A new secure image encryption algorithm based on a 5D hyperchaotic map.” Plos one 15.11 (2020): e0242110. doi: 10.1371/journal.pone.0242110
  • Albawi, Saad, Tareq Abed Mohammed, and Saad Al-Zawi. “Understanding of a convolutional neural network.” 2017 international conference on engineering and technology (ICET). Ieee, 2017.
  • Milletari, Fausto, Nassir Navab, and Seyed-Ahmad Ahmadi. “V-net: Fully convolutional neural networks for volumetric medical image segmentation.” 2016 fourth international conference on 3D vision (3DV). IEEE, 2016.
  • Li, Yujian, et al. “A concatenating framework of shortcut convolutional neural networks.” arXiv preprint arXiv:1710.00974 (2017).
  • [Online]. Available: https://knowyourdata-tfds.withgoogle.com/#tab=STATS&dataset=places365_small
  • Kingma, Diederik P., and Jimmy Ba. “Adam: A method for stochastic optimization.” arXiv preprint arXiv:1412.6980 (2014).
  • Ahmad, Jawad, and Fawad Ahmed. “Efficiency analysis and security evaluation of image encryption schemes.” computing 23 (2010): 25.
  • Hore, Alain, and Djemel Ziou. “Image quality metrics: PSNR vs. SSIM.” 2010 20th international conference on pattern recognition. IEEE, 2010.
  • Setiadi, De Rosal Igantius Moses. “PSNR vs SSIM: imperceptibility quality assessment for image steganography.” Multimedia Tools and Applications 80.6 (2021): 8423-8444. doi: 10.1007/s11042-020-10035-z
  • Pradhan, Anita, et al. “Performance evaluation parameters of image steganography techniques.” 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS). IEEE, 2016.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.