IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v11y2023i8p1769-d1118299.html
   My bibliography  Save this article

Neural Attractor-Based Adaptive Key Generator with DNA-Coded Security and Privacy Framework for Multimedia Data in Cloud Environments

Author

Listed:
  • Hemalatha Mahalingam

    (Department of Electrical and Computer Engineering, Faculty of Engineering, King Abdulaziz University, Jeddah 22254, Saudi Arabia)

  • Padmapriya Velupillai Meikandan

    (Department of Computer Sciences, Marquette University, Milwaukee, WI 53233, USA)

  • Karuppuswamy Thenmozhi

    (School of Electrical & Electronics Engineering, SASTRA Deemed University, Thanjavur 613401, India)

  • Kawthar Mostafa Moria

    (Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 22254, Saudi Arabia)

  • Chandrasekaran Lakshmi

    (School of Electrical & Electronics Engineering, SASTRA Deemed University, Thanjavur 613401, India)

  • Nithya Chidambaram

    (School of Electrical & Electronics Engineering, SASTRA Deemed University, Thanjavur 613401, India)

  • Rengarajan Amirtharajan

    (School of Electrical & Electronics Engineering, SASTRA Deemed University, Thanjavur 613401, India)

Abstract

Cloud services offer doctors and data scientists access to medical data from multiple locations using different devices (laptops, desktops, tablets, smartphones, etc.). Therefore, cyber threats to medical data at rest, in transit and when used by applications need to be pinpointed and prevented preemptively through a host of proven cryptographical solutions. The presented work integrates adaptive key generation, neural-based confusion and non-XOR, namely DNA diffusion, which offers a more extensive and unique key, adaptive confusion and unpredictable diffusion algorithm. Only authenticated users can store this encrypted image in cloud storage. The proposed security framework uses logistics, tent maps and adaptive key generation modules. The adaptive key is generated using a multilayer and nonlinear neural network from every input plain image. The Hopfield neural network (HNN) is a recurrent temporal network that updates learning with every plain image. We have taken Amazon Web Services (AWS) and Simple Storage Service (S3) to store encrypted images. Using benchmark evolution metrics, the ability of image encryption is validated against brute force and statistical attacks, and encryption quality analysis is also made. Thus, it is proved that the proposed scheme is well suited for hosting cloud storage for secure images.

Suggested Citation

  • Hemalatha Mahalingam & Padmapriya Velupillai Meikandan & Karuppuswamy Thenmozhi & Kawthar Mostafa Moria & Chandrasekaran Lakshmi & Nithya Chidambaram & Rengarajan Amirtharajan, 2023. "Neural Attractor-Based Adaptive Key Generator with DNA-Coded Security and Privacy Framework for Multimedia Data in Cloud Environments," Mathematics, MDPI, vol. 11(8), pages 1-23, April.
  • Handle: RePEc:gam:jmathe:v:11:y:2023:i:8:p:1769-:d:1118299
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/11/8/1769/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/11/8/1769/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Sungwook Eom & Jun-Ho Huh, 2018. "The Opening Capability for Security against Privacy Infringements in the Smart Grid Environment," Mathematics, MDPI, vol. 6(10), pages 1-14, October.
    2. Shaista Mansoor & Parsa Sarosh & Shabir A. Parah & Habib Ullah & Mohammad Hijji & Khan Muhammad, 2022. "Adaptive Color Image Encryption Scheme Based on Multiple Distinct Chaotic Maps and DNA Computing," Mathematics, MDPI, vol. 10(12), pages 1-20, June.
    3. Shenli Zhu & Xiaoheng Deng & Wendong Zhang & Congxu Zhu, 2023. "Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding," Mathematics, MDPI, vol. 11(1), pages 1-22, January.
    4. Huiyan Zhong & Guodong Li & Xiangliang Xu & Xiaoming Song, 2022. "Image Encryption Algorithm Based on a Novel Wide-Range Discrete Hyperchaotic Map," Mathematics, MDPI, vol. 10(15), pages 1-23, July.
    5. Xianhua Song & Guanglong Chen & Ahmed A. Abd El-Latif, 2022. "Quantum Color Image Encryption Scheme Based on Geometric Transformation and Intensity Channel Diffusion," Mathematics, MDPI, vol. 10(17), pages 1-23, August.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Xiaoqiang Zhang & Mi Liu & Xiaochang Yang, 2023. "Color Image Encryption Algorithm Based on Cross-Spiral Transformation and Zone Diffusion," Mathematics, MDPI, vol. 11(14), pages 1-28, July.
    2. Ziqi Zhou & Xuemei Xu & Zhaohui Jiang & Kehui Sun, 2023. "Multiple-Image Encryption Scheme Based on an N-Dimensional Chaotic Modular Model and Overlapping Block Permutation–Diffusion Using Newly Defined Operation," Mathematics, MDPI, vol. 11(15), pages 1-27, August.
    3. Mengyao Li & Xianwen Fang & Asimeng Ernest, 2023. "A Color Image Encryption Method Based on Dynamic Selection Chaotic System and Singular Value Decomposition," Mathematics, MDPI, vol. 11(15), pages 1-27, July.
    4. Zou, Chengye & Wang, Lin, 2023. "A visual DNA compilation of Rössler system and its application in color image encryption," Chaos, Solitons & Fractals, Elsevier, vol. 174(C).
    5. Wu, Xin & Shi, Hang & Ji’e, Musha & Duan, Shukai & Wang, Lidan, 2023. "A novel image compression and encryption scheme based on conservative chaotic system and DNA method," Chaos, Solitons & Fractals, Elsevier, vol. 172(C).
    6. Ye, Guodong & Wu, Huishan & Liu, Min & Huang, Xiaoling, 2023. "Reversible image-hiding algorithm based on singular value sampling and compressive sensing," Chaos, Solitons & Fractals, Elsevier, vol. 171(C).
    7. Ernesto Moya-Albor & Andrés Romero-Arellano & Jorge Brieva & Sandra L. Gomez-Coronel, 2023. "Color Image Encryption Algorithm Based on a Chaotic Model Using the Modular Discrete Derivative and Langton’s Ant," Mathematics, MDPI, vol. 11(10), pages 1-35, May.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:11:y:2023:i:8:p:1769-:d:1118299. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.