Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2017, Article ID 3675459, 12 pages
https://doi.org/10.1155/2017/3675459
Research Article

Batch Image Encryption Using Generated Deep Features Based on Stacked Autoencoder Network

1School of Computer and Information Science, Southwest University, Chongqing, China
2Network Centre, Chongqing University of Education, Chongqing, China

Correspondence should be addressed to Fei Hu; moc.361@1zte

Received 8 November 2016; Accepted 30 January 2017; Published 28 February 2017

Academic Editor: Maria L. Gandarias

Copyright © 2017 Fei Hu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Li, G. Chen, and X. Zheng, “Chaos-based encryption for digital images and videos,” in Multimedia Security Handbook, Kirovski, Ed., vol. 4, CRC Press, 2004. View at Google Scholar
  2. S. Zhou, Q. Zhang, X. Wei, and C. Zhou, “A summarization on image encryption,” IETE Technical Review, vol. 27, no. 6, pp. 503–510, 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. E. Inzunza-González and C. Cruz-Hernández, “Double hyperchaotic encryption for security in biometrie systems,” Nonlinear Dynamics and Systems Theory, vol. 13, no. 1, pp. 55–68, 2013. View at Google Scholar · View at Scopus
  4. H. Liu and X. Wang, “Color image encryption based on one-time keys and robust chaotic maps,” Computers and Mathematics with Applications, vol. 59, no. 10, pp. 3320–3327, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  5. K.-W. Wong, B. S.-H. Kwok, and W.-S. Law, “A fast image encryption scheme based on chaotic standard map,” Physics Letters A, vol. 372, no. 15, pp. 2645–2652, 2008. View at Publisher · View at Google Scholar · View at Scopus
  6. M. Usama, M. K. Khan, K. Alghathbar, and C. Lee, “Chaos-based secure satellite imagery cryptosystem,” Computers & Mathematics with Applications, vol. 60, no. 2, pp. 326–337, 2010. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic maps,” International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, vol. 8, no. 6, pp. 1259–1284, 1998. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  8. Z.-L. Zhu, W. Zhang, K.-W. Wong, and H. Yu, “A chaos-based symmetric image encryption scheme using a bit-level permutation,” Information Sciences, vol. 181, no. 6, pp. 1171–1186, 2011. View at Publisher · View at Google Scholar · View at Scopus
  9. C. Fu, B.-B. Lin, Y.-S. Miao, X. Liu, and J.-J. Chen, “A novel chaos-based bit-level permutation scheme for digital image encryption,” Optics Communications, vol. 284, no. 23, pp. 5415–5423, 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. W. Zhang, K.-W. Wong, H. Yu, and Z.-L. Zhu, “A symmetric color image encryption algorithm using the intrinsic features of bit distributions,” Communications in Nonlinear Science & Numerical Simulation, vol. 18, no. 3, pp. 584–600, 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. X. Wang and D. Luan, “A novel image encryption algorithm using chaos and reversible cellular automata,” Communications in Nonlinear Science & Numerical Simulation, vol. 18, no. 11, pp. 3075–3085, 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. Y. Zhang and D. Xiao, “An image encryption scheme based on rotation matrix bit-level permutation and block diffusion,” Communications in Nonlinear Science & Numerical Simulation, vol. 19, no. 1, pp. 74–82, 2014. View at Publisher · View at Google Scholar · View at Scopus
  13. Y. Mao, G. Chen, and S. Lian, “A novel fast image encryption scheme based on 3D chaotic baker maps,” International Journal of Bifurcation & Chaos, vol. 14, no. 10, pp. 3613–3624, 2004. View at Publisher · View at Google Scholar · View at Scopus
  14. O. Mirzaei, M. Yaghoobi, and H. Irani, “A new image encryption method: parallel sub-image encryption with hyper chaos,” Nonlinear Dynamics, vol. 67, no. 1, pp. 557–566, 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. W. Zhang, K.-W. Wong, H. Yu, and Z.-L. Zhu, “An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion,” Communications in Nonlinear Science & Numerical Simulation, vol. 18, no. 8, pp. 2066–2080, 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. C. Fu, J.-J. Chen, H. Zou, W.-H. Meng, Y.-F. Zhan, and Y.-W. Yu, “A chaos-based digital image encryption scheme with an improved diffusion strategy,” Optics Express, vol. 20, no. 3, pp. 2363–2378, 2012. View at Publisher · View at Google Scholar · View at Scopus
  17. C. Zhu, “A novel image encryption scheme based on improved hyperchaotic sequences,” Optics Communications, vol. 285, no. 1, pp. 29–37, 2012. View at Publisher · View at Google Scholar · View at Scopus
  18. M. Saberikamarposhti, D. Mohammad, M. S. M. Rahim, and M. Yaghobi, “Using 3-cell chaotic map for image encryption based on biological operations,” Nonlinear Dynamics, vol. 75, no. 3, pp. 407–416, 2014. View at Publisher · View at Google Scholar · View at Scopus
  19. Y. Wang, K.-W. Wong, X. Liao, T. Xiang, and G. Chen, “A chaos-based image encryption algorithm with variable control parameters,” Chaos, Solitons & Fractals, vol. 41, no. 4, pp. 1773–1783, 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. J.-X. Chen, Z.-L. Zhu, C. Fu, and H. Yu, “An improved permutation-diffusion type image cipher with a chaotic orbit perturbing mechanism,” Optics Express, vol. 21, no. 23, pp. 27873–27890, 2013. View at Publisher · View at Google Scholar · View at Scopus
  21. Y. Zhang, D. Xiao, Y. Shu, and J. Li, “A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations,” Signal Processing: Image Communication, vol. 28, no. 3, pp. 292–300, 2013. View at Publisher · View at Google Scholar · View at Scopus
  22. Q. Ding, Z.-M. Lu, and X.-J. Sun, “Image encryption based on neural network cipher,” Acta Electronica Sinica, vol. 32, no. 4, pp. 677–679, 2004. View at Google Scholar · View at Scopus
  23. S. Lian, “A block cipher based on chaotic neural networks,” Neurocomputing, vol. 72, no. 4–6, pp. 1296–1301, 2009. View at Publisher · View at Google Scholar · View at Scopus
  24. N. Bigdeli, Y. Farid, and K. Afshar, “A robust hybrid method for image encryption based on Hopfield neural network,” Computers and Electrical Engineering, vol. 38, no. 2, pp. 356–369, 2012. View at Publisher · View at Google Scholar · View at Scopus
  25. W. Jian, “The research of neural network mixed with image encryption based on chaotic encryption technology,” Advances in Information Sciences and Service Sciences, vol. 4, no. 9, pp. 1–8, 2012. View at Publisher · View at Google Scholar · View at Scopus
  26. A. Fischer and C. Igel, “Training restricted Boltzmann machines: an introduction,” Pattern Recognition, vol. 47, no. 1, pp. 25–39, 2014. View at Publisher · View at Google Scholar · View at Scopus
  27. P. P. Sarangi, A. Sahu, and M. Panda, “A hybrid differential evolution and back-propagation algorithm for feedforward neural network training,” International Journal of Computer Applications, vol. 84, no. 14, pp. 1–9, 2013. View at Google Scholar
  28. G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitons and Fractals, vol. 21, no. 3, pp. 749–761, 2004. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  29. H. S. Kwok and W. K. S. Tang, “A fast image encryption system based on chaotic maps with finite precision representation,” Chaos, Solitons & Fractals, vol. 32, no. 4, pp. 1518–1529, 2007. View at Publisher · View at Google Scholar · View at Scopus
  30. J. Peng, D. Zhang, and X. Liao, “A digital image encryption algorithm based on hyper-chaotic cellular neural network,” Fundamenta Informaticae, vol. 90, no. 3, pp. 269–282, 2009. View at Publisher · View at Google Scholar · View at Scopus
  31. N. K. Pareek, V. Patidar, and K. K. Sud, “Image encryption using chaotic logistic map,” Image and Vision Computing, vol. 24, no. 9, pp. 926–934, 2006. View at Publisher · View at Google Scholar · View at Scopus