Welcome to Acta Armamentarii ! Today is

Acta Armamentarii ›› 2022, Vol. 43 ›› Issue (2): 337-344.doi: 10.3969/j.issn.1000-1093.2022.02.011

• Paper • Previous Articles     Next Articles

Key Generation Method Based on Generative Adversarial Network and Its Application in Low-light-level Image Encryption

LI Jinqing1,2, LIU Zefei1,2, MAN Zhenlong1,2   

  1. (1.School of Computer Science and Technology, Changchun University of Science and Technology, Changchun 130022, Jilin, China;2.Jilin Key Laboratory of Network and Information Security, Changchun 130022, Jilin China)
  • Received:2021-03-02 Revised:2021-03-02 Accepted:2021-03-02 Online:2022-03-28

Abstract: Generative adversarial network (GAN) is a deep learning model, which is one of the most promising methods for unsupervised learning in complex distributed environment in recent years. The random numbers generated by GAN and chaotic systems have many similar advantages, such as randomness and sensitivity. But at the same time,the random numbers generated by GAN have the features that the random numbers generated by chaotic systems do not have, such as non-reproducibility.The random number generated by GAN training shows its rapidity and higher security in the encryption of low-light-level images with low signal-to-noise ratio and few gray levels. GAN is introduced into the random key generation. The pseudo-random number generated by quantum cellular neural network (QCNN) system is used as the training set of GAN, and a completely random key pool is obtained through GAN to learn and train the random key generated by hyperchaotic system. For the application of the proposed key generation method in low-light-level image encryption, a new low-light-level image encryption algorithm is proposed, which uses a 2D-pointer related to the plaintext to randomly select two phase masks in the key pool to achieve the security of low-light-level images. The results show that the encryption key generated by the learning key generation scheme can pass all the random tests of The National Institute of Standards and Technology, and the scheme can resist differential attacks by cryptanalysts, known/chosen plaintext attacks, and various statistical analyses. The performance comparison with other similar algorithms also shows the superiority of the proposed cryptosystem.

Key words: keygeneration, generativeadversarialnetwork, deeplearning, low-light-levelimage, encryptionalgorithm

CLC Number: