Abstract
Based on Restricted Boltzmann machines, an improved pseudo-stochastic sequential cipher generator is proposed. It is effective and efficient because of the two advantages: this generator includes a stochastic neural network that can perform the calculation in parallel, that is to say, all elements are calculated simultaneously; unlimited number of sequential ciphers can be generated simultaneously for multiple encryption schemas. The periodicity and the correlation of the output sequential ciphers meet requirements for the design of encrypting sequential data. In the experiment, the generated sequential cipher is used to encrypt images, and better performance is achieved in terms of the key space analysis, the correlation analysis, the sensitivity analysis and the differential attack. To evaluate the efficiency of our method, a comparative study is performed with a prevalent method called “logistic map.” Our approach achieves a better performance on running time estimation. The experimental results are promising as the proposed method could promote the development of image protection in computer security.
Similar content being viewed by others
References
Lee MT, Chang HT (2010) Copyright protection scheme for still images based on an image pinned field. Opt Eng 49(9):097005
Kokolakis I, Andreadis I, Tsalides Ph (1997) Comparison between cellular automata and linear feedback shift registers based pseudo-random number generators. Microprocess Microsyst 20(10):643–658
Schneier B (2007) Applied cryptography: protocols, algorithms, and source code in C. Wiley, New York
Luo Y, Zhang Z (1998) Neural network models for design of block cipher system. J Syst Sci Math Sci (English series) 2:008
Ding Q, Lu ZM, Sun XJ (2004) The image encryption based on neural network cipher. Acta Electron Sin 32(4):677–679
Lian S (2009) A block cipher based on chaotic neural networks. Neurocomputing 72(4):1296–1301
Bigdeli N, Farid Y, Afshar K (2012) A robust hybrid method for image encryption based on hopfield neural network. Comput Electr Eng 38(2):356–369
Wang J (2012) The research of neural network mixed with image encryption based on chaotic encryption technology. Adv Inform Sci Servi Sci 4(9):1–8
Fischer A, Igel C (2012) An introduction to restricted boltzmann machines. In: Alvarez L, Mejail M, Gomez L, Jacobo J (eds) Progress in pattern recognition, image analysis, computer vision, and applications. Springer, pp 14–36
Hinton GE, Salakhutdinov RR (2006) Reducing the dimensionality of data with neural networks. Science 313(5786):504–507
Hinton GE (2002) Training products of experts by minimizing contrastive divergence. Neural Comput 14(8):1771–1800
Hussain F, Jeong J (2015) Exploiting deep neural networks for digital image compression. In: 2015 2nd world symposium on web applications and networking (WSWAN), pp 1–6
Hussain F, Jeong J (2016) Efficient deep neural network for digital image compression employing rectified linear neurons. J Sens 2016:1–7
Chhotaray A, Biswas S, Chhotaray SK, Rath GS (2016) An image encryption technique using orthonormal matrices and chaotic maps. In: Proceedings of 3rd international conference on advanced computing, networking and informatics, pp 355–362. Springer
Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos Solitons Fractals 21(3):749–761
Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos Solitons Fractals 32(4):1518–1529
Peng J, Zhang D, Liao X (2009) A digital image encryption algorithm based on hyper-chaotic cellular neural network. Fundam Inform 90(3):269–282
Luo Y, Du M, Liu J (2015) A symmetrical image encryption scheme in wavelet and time domain. Commun Nonlinear Sci Numer Simul 20(2):447–460
Fu C, Chen J, Zou H, Meng W, Zhan Y, Yu Y (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363–2378
Kar M, Mandal MK, Nandi D, Kumar A, Banik S (2016) Bit-plane encrypted image cryptosystem using chaotic, quadratic, and cubic maps. In: IETE technical review, pp 1–11
Wong K-W, Kwok BS-H, Law W-S (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372(15):2645–2652
Tang Y, Wang Z, Fang J (2010) Image encryption using chaotic coupled map lattices with time-varying delays. Commun Nonlinear Sci Numer Simul 15(9):2456–2468
Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3d chaotic map. Commun Nonlinear Sci Numer Simul 17(7):2943–2959
Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320–3327
Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on dna sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299
Guesmi R, Farah MAB, Kachouri A, Samet M (2016) Hash key-based image encryption using crossover operator and chaos. Multimed Tools Appl 75(8):4753–4769
Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using dna sequence operation and secure hash algorithm sha-2. Nonlinear Dyn 83(3):1123–1136
Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934
Acknowledgements
This work was supported by Scientific and Technological Research Program of Chongqing Municipal Education Commission (Nos. KJ1501405, KJ1501409); Scientific and Technological Research Program of Chongqing University of Education (Nos. KY201522B, KY201520B); Fundamental Research Funds for the Central Universities (No. XDJK2016E068); Natural Science Foundation of China (No. 61170192) and National High-tech R&D Program (No. 2013AA013801).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Rights and permissions
About this article
Cite this article
Hu, F., Xu, X., Peng, T. et al. A fast pseudo-stochastic sequential cipher generator based on RBMs. Neural Comput & Applic 30, 1277–1287 (2018). https://doi.org/10.1007/s00521-016-2753-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-016-2753-2