Skip to main content
Log in

Enhancing security for document exchange using authentication and GAN encryption

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The real threat to the privacy of a plain document exchanged over insecure channels is content manipulation or eavesdropping by unauthorized parties. To protect a transferred document, the architecture proposed in this paper offers encryption, authentication, and scrambling GAN with shuffle confusion (EAGAN) comprehensively with a relatively rapid execution time average of 2s for each colored document. The EAGAN encrypts and signs the document content at the origin point (sender side) and then decrypts and verifies the cipher document at the receiver side, achieving two verification levels and three levels of confidentiality, reinforced with two keys of chaos and equal document content. Each document has a unique hash value (signature or identity) with a QR code watermark to detect forgery, even when the change is small (even by one bit), without depending on any third party. If case the intermediate encrypted document, the neural network model (Decoder-Key), the cipher document, or the initial values of the Chaos Key are leaked, an unauthorized person won’t be able to retrieve the document. As proven by the experiments in this paper, EAGAN has characteristics that make it more resistant to security threats.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Algorithm 2
Algorithm 3
Fig. 8
Algorithm 4
Fig. 9
Fig. 10
Algorithm 5
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

Data Availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study. We used color documents for the available datasets are UIT-DODV-1440 color documents with a size of 700*700*3 pixels link: (https://github.com/nguyenvd-uit/uit-together-dataset/blob/main/UIT-DODV.md) and the Corel-1000 [30] in our method.

Abbreviations

GAN:

Generative Adversarial Network

EAGAN:

Encryption, Authentication, and Scrambling GAN

DNNs:

Deep Neural Networks

QR Code:

Quick Response Code

SHA:

The Secure Hash Algorithm

IED:

Intermediate Encrypted Image

MSE:

Mean Square Error

PSNR:

Peak Signal to Noise Ratio

MS-SSIM:

Multi-Scale Structural Similarity

SSIM:

Structural Similarity Index

References

  1. Fang P, Liu H, Wu C (2020) A novel chaotic block image encryption algorithm based on deep convolutional generative adversarial networks. IEEE Access 9(18):497–18,517

  2. Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. Advances in neural information processing systems 27

  3. AprilPyone M, Sirichotedumrong W, Kiya H (2019) Adversarial test on learnable image encryption. In: 2019 IEEE 8th global conference on consumer electronics (GCCE). IEEE, pp 667–669

  4. Ding Y, Wu G, Chen D, Zhang N, Gong L, Cao M, Qin Z (2020) DeepEDN: a deep-learning-based image encryption and decryption network for internet of medical things. IEEE Internet Things J 8(3):1504–1518

    Article  Google Scholar 

  5. Sirichotedumrong W, Kiya H (2020) A GAN-based image transformation scheme for privacy-preserving deep neural networks. In: 2020 28th European signal processing conference (EUSIPCO). IEEE, pp 745–749

  6. Bao Z, Xue R, Jin Y (2021) Image scrambling adversarial autoencoder based on the asymmetric encryption. Multimed Tools Appl 80(18):28,265-28,301

    Article  Google Scholar 

  7. Fang P, Liu H, Wu C, Liu M (2021) A secure chaotic block image encryption algorithm using generative adversarial networks and DNA sequence coding. Math Probl Eng 2021:1–26

    MathSciNet  Google Scholar 

  8. Man Z, Li J, Di X, Liu X, Zhou J, Wang J, Zhang X (2021) A novel image encryption algorithm based on least squares generative adversarial network random number generator. Multimed Tools Appl 80:27,445-27,469

    Article  Google Scholar 

  9. Ye J, Deng X, Zhang A, Yu H (2022) A novel image encryption algorithm based on improved Arnold transform and chaotic pulse-coupled neural network. Entropy 24(8):1103

    Article  ADS  MathSciNet  PubMed  PubMed Central  Google Scholar 

  10. Neela K, Kavitha V (2023) Blockchain based chaotic deep GAN encryption scheme for securing medical images in a cloud environment. Appl Intell 53(4):4733–4747

    Article  Google Scholar 

  11. Zenati A, Ouarda W, Alimi AM (2020) CDISS-BEMOS: a new color document image steganography system based on beta elliptic modeling of the online signature. In: Risks and security of internet and systems: 14th international conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019. Proceedings. Springer 2020, pp 293–307

  12. Jimale MA, Z’aba MR, Kiah MLBM, Idris MYI, Jamil N, Mohamad MS, Rohmad MS (2022) Authenticated encryption schemes: a systematic review. IEEE Access 10:14,739-14,766

    Article  Google Scholar 

  13. Zenati A, Ouarda W, Alimi AM (2021) A new digital steganography system based on hiding online signature within document image data in YUV color space. Multimed Tools Appl 80:18,653-18,676

    Article  Google Scholar 

  14. Suman RR, Mondal B, Mandal T (2022) A secure encryption scheme using a composite logistic sine map (CLSM) and SHA-256. Multimed Tools Appl 81(19):27,089-27,110

    Article  Google Scholar 

  15. El-Meligy NE, Diab TO, Mohra AS, Hassan AY, El-Sobky WI (2022) A novel dynamic mathematical model applied in hash function based on DNA algorithm and chaotic maps. Mathematics 10(8):1333

    Article  Google Scholar 

  16. Wang J, Liu G, Chen Y, Wang S (2021) Construction and analysis of SHA-256 compression function based on chaos S-box. IEEE Access 9:61,768-61,777

    Article  Google Scholar 

  17. Hussan M, Parah SA, Jan A, Qureshi G (2022) Hash-based image watermarking technique for tamper detection and localization. Heal Technol 12(2):385–400

    Article  Google Scholar 

  18. Liu H, Kadir A, Ma C, Xu C (2020) Constructing keyed hash algorithm using enhanced chaotic map with varying parameter. Mathematical Problems in Engineering 2020

  19. Ilaiyaraja R, Vanitha M (2017) Secured message transfer through QR code process for document authentication systems. International Journal of Emerging Technology in Computer Science and Electronics (IJETCSE) ISSN, pp 0976–1353

  20. Benyoucef A, Hamaouche M (2023) Region-based medical image watermarking approach for secure EPR transmission applied to e-Health. Arabian Journal for Science and Engineering, pp 1–13

  21. Tariq S, Khan M, Alghafis A, Amin M (2020) A novel hybrid encryption scheme based on chaotic Lorenz system and logarithmic key generation. Multimed Tools Appl 79:23,507-23,529

    Article  Google Scholar 

  22. Sanivarapu PV, Rajesh KN, Hosny KM, Fouda MM (2022) Digital watermarking system for copyright protection and authentication of images using cryptographic techniques. Appl Sci 12(17):8724

    Article  CAS  Google Scholar 

  23. Purswani J, Rajagopal R, Khandelwal R, Singh A (2020) Chaos theory on generative adversarial networks for encryption and decryption of data. In: Advances in bioinformatics, multimedia, and electronics circuits and signals: Proceedings of GUCON 2019. Springer, pp 251–260

  24. Abadi M, Andersen DG (2016) Learning to protect communications with adversarial neural cryptography. arXiv:1610.06918

  25. Zhu JY, Park T, Isola P, Efros AA (2017) Unpaired image-to-image translation using cycle-consistent adversarial networks. Proceedings of the IEEE international conference on computer vision, pp 2223–2232

  26. Al-Maadeed TA, Hussain I, Anees A, Mustafa MT (2021) A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes. Multimed Tools Appl 80:24,801-24,822

    Article  Google Scholar 

  27. Alexan W, Elkandoz M, Mashaly M, Azab E, Aboshousha A (2023) Color image encryption through chaos and KAA Map. IEEE Access 11:11,541-11,554

    Article  Google Scholar 

  28. Teh JS, Tan K, Alawida M (2019) A chaos-based keyed hash function based on fixed point representation. Clust Comput 22:649–660

    Article  Google Scholar 

  29. Zenati A, Ouarda W, Alimi AM (2020) SSDIS-BEM: a new signature steganography document image system based on beta elliptic modeling. Eng Sci Technol Int J 23(3):470–482

    Google Scholar 

  30. Feng L, Wu J, Liu S, Zhang H (2015) Global correlation descriptor: a novel image representation for image retrieval. J Vis Commun Image Represent 33:104–114

    Article  Google Scholar 

  31. Yinka-Banjo C, Ugot OA (2020) A review of generative adversarial networks and its application in cybersecurity. Artif Intell Rev 53:1721–1736

    Article  Google Scholar 

Download references

Acknowledgements

The research leading to these results has received funding from the Ministry of Higher Education and Scientific Research of Tunisia under the grant agreement number LR11ES48.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arkan M. Radhi.

Ethics declarations

Conflicts of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendix A: The Lorenz maps

This appendix section is dedicated to the Lorenz maps’ equations, producing three entirely different paths, as shown in Fig. 18

Fig. 18
figure 18

The chaotic dynamics of the Lorenz system

Fig. 19
figure 19

Structure of QR code

Each path has a group from randomness values with color document length (700*700*3) and (700*811*3).

Appendix B: The structure of the QR code

The structure of the QR code consists of many components, as shown in Fig. 19. the version info utilized in the markers. Format info is about the data mask pattern and error correction methods.

Finder helps with the correct code detection and orientation. Data and error correction codes store encoded information and fix errors. Alignment helps in reading QR code distortion. Timing is a horizontal and vertical line that helps determine the size of the data matrix by the scanner. A space surrounds the QR code in the quiet zone.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Radhi, A.M., Hamdani, T.M., Chabchoub, H. et al. Enhancing security for document exchange using authentication and GAN encryption. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18393-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11042-024-18393-8

Keywords

Navigation