2023
DOI: 10.3390/s23031415
|View full text |Cite
|
Sign up to set email alerts
|

Face Image Encryption Based on Feature with Optimization Using Secure Crypto General Adversarial Neural Network and Optical Chaotic Map

Abstract: Demand for data security is increasing as information technology advances. Encryption technology based on biometrics has advanced significantly to meet more convenient and secure needs. Because of the stability of face traits and the difficulty of counterfeiting, the iris method has become an essential research object in data security research. This study proposes a revolutionary face feature encryption technique that combines picture optimization with cryptography and deep learning (DL) architectures. To impr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…In [170], Alsafyani et al proposed an advanced face feature encryption method that combines image optimization, cryptography, and deep learning. Their approach integrates an optical chaotic map to bolster key security within a 5D conservative chaotic method.…”
Section: A Adversarial Neural Network With Chaosmentioning
confidence: 99%
“…In [170], Alsafyani et al proposed an advanced face feature encryption method that combines image optimization, cryptography, and deep learning. Their approach integrates an optical chaotic map to bolster key security within a 5D conservative chaotic method.…”
Section: A Adversarial Neural Network With Chaosmentioning
confidence: 99%
“…Compared to traditional image quality measures, SSIM is more in line with the human eye's judgement of images. Given two signals x and y, the structural similarity between the two is defined [37,38,39,40,41] as shown in Equation 5and Equation 6.…”
Section: Information Entropy and Ssimmentioning
confidence: 99%
“…To enhance the security and efficiency of chaos-based image encryption algorithms, researchers have put forth various methodologies [17,18]. This has led to the integration of chaotic image encryption with diverse technologies, including matrix semi-tensor products [19,20], Boolean networks [21,22], neural networks [23][24][25], DNA encoding [26][27][28], elliptic curves [29,30], and quantum encryption 2. Designed chaotic system 2.1.…”
Section: Introductionmentioning
confidence: 99%