Abstract
The real threat to the privacy of a plain document exchanged over insecure channels is content manipulation or eavesdropping by unauthorized parties. To protect a transferred document, the architecture proposed in this paper offers encryption, authentication, and scrambling GAN with shuffle confusion (EAGAN) comprehensively with a relatively rapid execution time average of 2s for each colored document. The EAGAN encrypts and signs the document content at the origin point (sender side) and then decrypts and verifies the cipher document at the receiver side, achieving two verification levels and three levels of confidentiality, reinforced with two keys of chaos and equal document content. Each document has a unique hash value (signature or identity) with a QR code watermark to detect forgery, even when the change is small (even by one bit), without depending on any third party. If case the intermediate encrypted document, the neural network model (Decoder-Key), the cipher document, or the initial values of the Chaos Key are leaked, an unauthorized person won’t be able to retrieve the document. As proven by the experiments in this paper, EAGAN has characteristics that make it more resistant to security threats.
Similar content being viewed by others
Data Availability
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study. We used color documents for the available datasets are UIT-DODV-1440 color documents with a size of 700*700*3 pixels link: (https://github.com/nguyenvd-uit/uit-together-dataset/blob/main/UIT-DODV.md) and the Corel-1000 [30] in our method.
Abbreviations
- GAN:
-
Generative Adversarial Network
- EAGAN:
-
Encryption, Authentication, and Scrambling GAN
- DNNs:
-
Deep Neural Networks
- QR Code:
-
Quick Response Code
- SHA:
-
The Secure Hash Algorithm
- IED:
-
Intermediate Encrypted Image
- MSE:
-
Mean Square Error
- PSNR:
-
Peak Signal to Noise Ratio
- MS-SSIM:
-
Multi-Scale Structural Similarity
- SSIM:
-
Structural Similarity Index
References
Fang P, Liu H, Wu C (2020) A novel chaotic block image encryption algorithm based on deep convolutional generative adversarial networks. IEEE Access 9(18):497–18,517
Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. Advances in neural information processing systems 27
AprilPyone M, Sirichotedumrong W, Kiya H (2019) Adversarial test on learnable image encryption. In: 2019 IEEE 8th global conference on consumer electronics (GCCE). IEEE, pp 667–669
Ding Y, Wu G, Chen D, Zhang N, Gong L, Cao M, Qin Z (2020) DeepEDN: a deep-learning-based image encryption and decryption network for internet of medical things. IEEE Internet Things J 8(3):1504–1518
Sirichotedumrong W, Kiya H (2020) A GAN-based image transformation scheme for privacy-preserving deep neural networks. In: 2020 28th European signal processing conference (EUSIPCO). IEEE, pp 745–749
Bao Z, Xue R, Jin Y (2021) Image scrambling adversarial autoencoder based on the asymmetric encryption. Multimed Tools Appl 80(18):28,265-28,301
Fang P, Liu H, Wu C, Liu M (2021) A secure chaotic block image encryption algorithm using generative adversarial networks and DNA sequence coding. Math Probl Eng 2021:1–26
Man Z, Li J, Di X, Liu X, Zhou J, Wang J, Zhang X (2021) A novel image encryption algorithm based on least squares generative adversarial network random number generator. Multimed Tools Appl 80:27,445-27,469
Ye J, Deng X, Zhang A, Yu H (2022) A novel image encryption algorithm based on improved Arnold transform and chaotic pulse-coupled neural network. Entropy 24(8):1103
Neela K, Kavitha V (2023) Blockchain based chaotic deep GAN encryption scheme for securing medical images in a cloud environment. Appl Intell 53(4):4733–4747
Zenati A, Ouarda W, Alimi AM (2020) CDISS-BEMOS: a new color document image steganography system based on beta elliptic modeling of the online signature. In: Risks and security of internet and systems: 14th international conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019. Proceedings. Springer 2020, pp 293–307
Jimale MA, Z’aba MR, Kiah MLBM, Idris MYI, Jamil N, Mohamad MS, Rohmad MS (2022) Authenticated encryption schemes: a systematic review. IEEE Access 10:14,739-14,766
Zenati A, Ouarda W, Alimi AM (2021) A new digital steganography system based on hiding online signature within document image data in YUV color space. Multimed Tools Appl 80:18,653-18,676
Suman RR, Mondal B, Mandal T (2022) A secure encryption scheme using a composite logistic sine map (CLSM) and SHA-256. Multimed Tools Appl 81(19):27,089-27,110
El-Meligy NE, Diab TO, Mohra AS, Hassan AY, El-Sobky WI (2022) A novel dynamic mathematical model applied in hash function based on DNA algorithm and chaotic maps. Mathematics 10(8):1333
Wang J, Liu G, Chen Y, Wang S (2021) Construction and analysis of SHA-256 compression function based on chaos S-box. IEEE Access 9:61,768-61,777
Hussan M, Parah SA, Jan A, Qureshi G (2022) Hash-based image watermarking technique for tamper detection and localization. Heal Technol 12(2):385–400
Liu H, Kadir A, Ma C, Xu C (2020) Constructing keyed hash algorithm using enhanced chaotic map with varying parameter. Mathematical Problems in Engineering 2020
Ilaiyaraja R, Vanitha M (2017) Secured message transfer through QR code process for document authentication systems. International Journal of Emerging Technology in Computer Science and Electronics (IJETCSE) ISSN, pp 0976–1353
Benyoucef A, Hamaouche M (2023) Region-based medical image watermarking approach for secure EPR transmission applied to e-Health. Arabian Journal for Science and Engineering, pp 1–13
Tariq S, Khan M, Alghafis A, Amin M (2020) A novel hybrid encryption scheme based on chaotic Lorenz system and logarithmic key generation. Multimed Tools Appl 79:23,507-23,529
Sanivarapu PV, Rajesh KN, Hosny KM, Fouda MM (2022) Digital watermarking system for copyright protection and authentication of images using cryptographic techniques. Appl Sci 12(17):8724
Purswani J, Rajagopal R, Khandelwal R, Singh A (2020) Chaos theory on generative adversarial networks for encryption and decryption of data. In: Advances in bioinformatics, multimedia, and electronics circuits and signals: Proceedings of GUCON 2019. Springer, pp 251–260
Abadi M, Andersen DG (2016) Learning to protect communications with adversarial neural cryptography. arXiv:1610.06918
Zhu JY, Park T, Isola P, Efros AA (2017) Unpaired image-to-image translation using cycle-consistent adversarial networks. Proceedings of the IEEE international conference on computer vision, pp 2223–2232
Al-Maadeed TA, Hussain I, Anees A, Mustafa MT (2021) A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes. Multimed Tools Appl 80:24,801-24,822
Alexan W, Elkandoz M, Mashaly M, Azab E, Aboshousha A (2023) Color image encryption through chaos and KAA Map. IEEE Access 11:11,541-11,554
Teh JS, Tan K, Alawida M (2019) A chaos-based keyed hash function based on fixed point representation. Clust Comput 22:649–660
Zenati A, Ouarda W, Alimi AM (2020) SSDIS-BEM: a new signature steganography document image system based on beta elliptic modeling. Eng Sci Technol Int J 23(3):470–482
Feng L, Wu J, Liu S, Zhang H (2015) Global correlation descriptor: a novel image representation for image retrieval. J Vis Commun Image Represent 33:104–114
Yinka-Banjo C, Ugot OA (2020) A review of generative adversarial networks and its application in cybersecurity. Artif Intell Rev 53:1721–1736
Acknowledgements
The research leading to these results has received funding from the Ministry of Higher Education and Scientific Research of Tunisia under the grant agreement number LR11ES48.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix A: The Lorenz maps
This appendix section is dedicated to the Lorenz maps’ equations, producing three entirely different paths, as shown in Fig. 18
Each path has a group from randomness values with color document length (700*700*3) and (700*811*3).
Appendix B: The structure of the QR code
The structure of the QR code consists of many components, as shown in Fig. 19. the version info utilized in the markers. Format info is about the data mask pattern and error correction methods.
Finder helps with the correct code detection and orientation. Data and error correction codes store encoded information and fix errors. Alignment helps in reading QR code distortion. Timing is a horizontal and vertical line that helps determine the size of the data matrix by the scanner. A space surrounds the QR code in the quiet zone.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Radhi, A.M., Hamdani, T.M., Chabchoub, H. et al. Enhancing security for document exchange using authentication and GAN encryption. Multimed Tools Appl 83, 71203–71233 (2024). https://doi.org/10.1007/s11042-024-18393-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-024-18393-8