Skip to main content
Top
Published in: Wireless Personal Communications 4/2022

20-01-2022

An Approach of Secret Sharing Technique Based on Convolution Neural Network and DNA Sequence for Data Security in Wireless Communication

Authors: Anirban Bhowmik, Sunil Karforma

Published in: Wireless Personal Communications | Issue 4/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Now-a-days the information security is the prime factor in wireless communication. One of the major and fruitful security techniques in cryptography is data encryption with keys. The efficiency of the encryption depends on the resistance ability of the encryption key and the encryption algorithm. Threshold cryptography is one type of cryptographic technique where the information (message and encryption key) is divied into some specific number of shares and on the contrary the information can only be reconstructed by accumulating an allowable set of shares. In this paper we have presented convolution neural network with DNA sequence based (n, n) threshold cryptographic technique. Convolutional Neural Network is one of the important deep neural networks and it has multiple layers. Here pooling layer is used for key generation purposes. We have used maxpooling operation and average pooling operation for encryption key generation and authentication purpose. A new mask generation algorithm is introduced for ‘n’ numbers of share. This mask generation algorithm is based on unit matrix of order. n x n, AND operation and OR operation between plain text and key. This threshold value is also necessary for reconstraction of information. DNA sequence is used for imposing the nonlinearity in cipher text. Different types of experimental results and its analysis prove that the scheme has great potential and ability to achieve the authenticity and confidentiality in any data security platform.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Stallings, W. (2015). Cryptography and network security (pp. 111–155). Pearson Education Service. Stallings, W. (2015). Cryptography and network security (pp. 111–155). Pearson Education Service.
2.
go back to reference Asmuth, C., & Bloom, J. (1983). A modular to key safeguarding. IEEE Transaction on Information Theory, 29(2), 208–210.MathSciNetCrossRef Asmuth, C., & Bloom, J. (1983). A modular to key safeguarding. IEEE Transaction on Information Theory, 29(2), 208–210.MathSciNetCrossRef
3.
go back to reference Blakley, G. R. (1979). Safeguarding cryptographic keys. In Proceedings of AFIPS International Worhshop on Managing Requirements Knowledge, pp. 313. Blakley, G. R. (1979). Safeguarding cryptographic keys. In Proceedings of AFIPS International Worhshop on Managing Requirements Knowledge, pp. 313.
4.
go back to reference Huang, H. F., & Chang, C. C. (2006). A novel efficient (t, n) threshold proxy signature scheme. Information Sciences, 176(10), 1338–1349.MathSciNetCrossRef Huang, H. F., & Chang, C. C. (2006). A novel efficient (t, n) threshold proxy signature scheme. Information Sciences, 176(10), 1338–1349.MathSciNetCrossRef
5.
go back to reference De Santis, A., Desmedt, Y., Frankel, Y., & Yung, M. (1994). How to share a function securely. In Proceedings of the twenty-sixth annual ACM symposium on Theory of computing (pp. 522-533). De Santis, A., Desmedt, Y., Frankel, Y., & Yung, M. (1994). How to share a function securely. In Proceedings of the twenty-sixth annual ACM symposium on Theory of computing (pp. 522-533).
6.
go back to reference Dong, J., Wang, H., Yang, Y., & Liu, L. (2017). Learning and transferring convolutional neural network knowledge to ocean front recognition. IEEE Geoscience and Remote Sensing Letters, 14(3), 354–358.CrossRef Dong, J., Wang, H., Yang, Y., & Liu, L. (2017). Learning and transferring convolutional neural network knowledge to ocean front recognition. IEEE Geoscience and Remote Sensing Letters, 14(3), 354–358.CrossRef
7.
go back to reference Naskar, P. K., Khan, H. N., Chaudhuri, A., & Chaudhuri, A. (2011). Ultra secured and authentic key distribution protocol using a novel secret sharing technique. International Journal of Computer Applications, 19(7), 12–15.CrossRef Naskar, P. K., Khan, H. N., Chaudhuri, A., & Chaudhuri, A. (2011). Ultra secured and authentic key distribution protocol using a novel secret sharing technique. International Journal of Computer Applications, 19(7), 12–15.CrossRef
8.
go back to reference Sushma, L., & Lakshmi, K. P. (2020). An analysis of convolution neural network for image classification using different models. In International Journal of Engineering Research and Technology (IJERT) Volume 09, Issue 10 (October 2020), Sushma, L., & Lakshmi, K. P. (2020). An analysis of convolution neural network for image classification using different models. In International Journal of Engineering Research and Technology (IJERT) Volume 09, Issue 10 (October 2020),
10.
go back to reference Zeiler, M. D., & Fergus, R. (2014). Visualizing and understanding convolutional networks. European Conference on Computer Vision (pp. 818–833). Cham: Springer. Zeiler, M. D., & Fergus, R. (2014). Visualizing and understanding convolutional networks. European Conference on Computer Vision (pp. 818–833). Cham: Springer.
11.
go back to reference Sakshi, I., et al. (2018) Conceptual understanding of convolutional neural network—A deep learning approach. In Proceedings of the International Conference on Computational Intelligence and Data Science (ICCIDS 2018), 132 (2018) 679–688. Sakshi, I., et al. (2018) Conceptual understanding of convolutional neural network—A deep learning approach. In Proceedings of the International Conference on Computational Intelligence and Data Science (ICCIDS 2018), 132 (2018) 679–688.
12.
go back to reference Kari, L., Seki, S., & Sosk, P. (2012). DNA computing—Foundations and implications. Handbook of Natural Computing. Berlin: Springer. Kari, L., Seki, S., & Sosk, P. (2012). DNA computing—Foundations and implications. Handbook of Natural Computing. Berlin: Springer.
14.
go back to reference Chen, L., Peng, BoYan, Gan, W., & Liu, Y. (2020). Plaintext attack on joint transforms correlation encryption system by convolutional neural network. Optics Express, 28(19), 28154–28163.CrossRef Chen, L., Peng, BoYan, Gan, W., & Liu, Y. (2020). Plaintext attack on joint transforms correlation encryption system by convolutional neural network. Optics Express, 28(19), 28154–28163.CrossRef
16.
go back to reference Lee, K. B., Cheon, S., & Kim, C. O. (2017). A convolutional neural network for fault classification and diagnosis in semiconductor manufacturing processes. IEEE Transactions on Semiconductor Manufacturing, 30(2), 135–142.CrossRef Lee, K. B., Cheon, S., & Kim, C. O. (2017). A convolutional neural network for fault classification and diagnosis in semiconductor manufacturing processes. IEEE Transactions on Semiconductor Manufacturing, 30(2), 135–142.CrossRef
18.
go back to reference Desmedt, Y. (1997). Some recent research aspects of threshold Cryptography. Proceeding of ISW‟97 1st International Information Security Workshop vol. 1196 of LNCS (pp. 158–173). Springer. Desmedt, Y. (1997). Some recent research aspects of threshold Cryptography. Proceeding of ISW‟97 1st International Information Security Workshop vol. 1196 of LNCS (pp. 158–173). Springer.
19.
go back to reference Zheng, F., Tian, X. J., Song, J. Y., & Li, X. Y. (2008). Pseudo-random sequence generator based on the generalized henon map. The Journal of China Universities of Posts and Telecommunications, 15(3), 64–68.CrossRef Zheng, F., Tian, X. J., Song, J. Y., & Li, X. Y. (2008). Pseudo-random sequence generator based on the generalized henon map. The Journal of China Universities of Posts and Telecommunications, 15(3), 64–68.CrossRef
20.
go back to reference Desmedt, Y. (1997). Some recent research aspects of threshold cryptography. Proc of ISW’97 1st International information security workshop, vol 1196 of LNCS paper (pp. 158–173). Springer-Verlag. Desmedt, Y. (1997). Some recent research aspects of threshold cryptography. Proc of ISW’97 1st International information security workshop, vol 1196 of LNCS paper (pp. 158–173). Springer-Verlag.
21.
go back to reference Mandal, B. K., Bhattacharyya, D., & Bandyopadhyay, S. K. (2013). Designing and performance analysis of a proposed symmetric cryptography algorithm In Proceedings of the International Conference on Communication Systems and Network Technologies (CSNT 2013), April 6–8 2013, Gwalior, India, pp. 453–461. Mandal, B. K., Bhattacharyya, D., & Bandyopadhyay, S. K. (2013). Designing and performance analysis of a proposed symmetric cryptography algorithm In Proceedings of the International Conference on Communication Systems and Network Technologies (CSNT 2013), April 6–8 2013, Gwalior, India, pp. 453–461.
22.
go back to reference Bhowmik, A., et al. (2020) Fuzzy-based session key as restorative power of symmetric key encryption for secured wireless communication. In Proceedings of the 2nd International Conference on Communication, Devices and Computing, Lecture Notes in Electrical Engineering 602. © Springer Nature Singapore Pte Ltd.2020. pp.171–184. Bhowmik, A., et al. (2020) Fuzzy-based session key as restorative power of symmetric key encryption for secured wireless communication. In Proceedings of the 2nd International Conference on Communication, Devices and Computing, Lecture Notes in Electrical Engineering 602. © Springer Nature Singapore Pte Ltd.2020. pp.171–184.
23.
go back to reference Kakkad, V., Patel, M., & Shah, M. (2019). Biometric authentication and image encryption for image security in cloudframework. Multiscale and Multidisciplinary Modeling, Experiments and Design, 2(4), 233–248.CrossRef Kakkad, V., Patel, M., & Shah, M. (2019). Biometric authentication and image encryption for image security in cloudframework. Multiscale and Multidisciplinary Modeling, Experiments and Design, 2(4), 233–248.CrossRef
24.
go back to reference Khatri, S., Mathur, A., & Sharma, S. (2016). Parallel implementation of cryptographic algorithm for image encryption. International Journal for Technological Research in Engineering, 4(2), 424–426. Khatri, S., Mathur, A., & Sharma, S. (2016). Parallel implementation of cryptographic algorithm for image encryption. International Journal for Technological Research in Engineering, 4(2), 424–426.
25.
go back to reference Abdullah, H. N., Hreshee, S. S., & Jawad, A. K. (2015). Design of efficient noise reduction scheme for secure speech masked by chaotic signals. Journal of American Science, 11(7), 49–55. Abdullah, H. N., Hreshee, S. S., & Jawad, A. K. (2015). Design of efficient noise reduction scheme for secure speech masked by chaotic signals. Journal of American Science, 11(7), 49–55.
27.
go back to reference Blakley, G. R. (1979). Safeguarding cryptographic keys. In International Workshop on Managing Requirements Knowledge (pp. 313-313). Blakley, G. R. (1979). Safeguarding cryptographic keys. In International Workshop on Managing Requirements Knowledge (pp. 313-313).
28.
go back to reference Guan, M., Yang, X., & Hu, W. (2019). Chaotic image encryption algorithm using frequency-domain DNA encoding. IET Image Process, 13, 1535–1539.CrossRef Guan, M., Yang, X., & Hu, W. (2019). Chaotic image encryption algorithm using frequency-domain DNA encoding. IET Image Process, 13, 1535–1539.CrossRef
29.
go back to reference Abd Elzaher, M. F., Shalaby, M., & El Ramly, S. H. (2016). Securing modern voice communication systems using multilevel chaotic approach. International Journal of Computer Applications, 135(9), 17–21.CrossRef Abd Elzaher, M. F., Shalaby, M., & El Ramly, S. H. (2016). Securing modern voice communication systems using multilevel chaotic approach. International Journal of Computer Applications, 135(9), 17–21.CrossRef
30.
go back to reference Chai, X., Chen, Y., & Broyde, L. (2017). A novel chaos-based image encryption algorithm using DNA sequence operations. Optics and Lasers in Engineering, 88, 197–213.CrossRef Chai, X., Chen, Y., & Broyde, L. (2017). A novel chaos-based image encryption algorithm using DNA sequence operations. Optics and Lasers in Engineering, 88, 197–213.CrossRef
31.
go back to reference Singh, P., et al. (2014). Symmetric key cryptography: Current trends. International Journal of Computer Science and Mobile Computing, 3(12), 410–415. Singh, P., et al. (2014). Symmetric key cryptography: Current trends. International Journal of Computer Science and Mobile Computing, 3(12), 410–415.
32.
go back to reference Li, D., Deng, L., Gupta, B. B., Wang, H., & Choi, C. (2019). A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Information Sciences, 479, 432–447.CrossRef Li, D., Deng, L., Gupta, B. B., Wang, H., & Choi, C. (2019). A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Information Sciences, 479, 432–447.CrossRef
33.
go back to reference He, K., Gkioxari, G., Dollár, P., & Girshick, R. (2017). Mask R-CNN. In Proceedings of the IEEE International Conference on Computer Vision (pp. 2961–2969). He, K., Gkioxari, G., Dollár, P., & Girshick, R. (2017). Mask R-CNN. In Proceedings of the IEEE International Conference on Computer Vision (pp. 2961–2969).
34.
go back to reference Peinado, A., Munilla, J., & Fúster-Sabater, A. (2014). EPCGen2 pseudorandom number generators: analysis of J3Gen. Sensors, 14(4), 6500–6515.CrossRef Peinado, A., Munilla, J., & Fúster-Sabater, A. (2014). EPCGen2 pseudorandom number generators: analysis of J3Gen. Sensors, 14(4), 6500–6515.CrossRef
35.
go back to reference Sathishkumar, G. A., & Bhoopathy Bagan, K. (2011). A novel image encryption algorithm using pixel shuffling and BASE 64 encoding based chaotic block cipher. WSEAS Transactions on Computers, 10(6), 169–178. Sathishkumar, G. A., & Bhoopathy Bagan, K. (2011). A novel image encryption algorithm using pixel shuffling and BASE 64 encoding based chaotic block cipher. WSEAS Transactions on Computers, 10(6), 169–178.
36.
go back to reference Loukhaoukha, K., Chouinard, J.-Y., & Berdai, A. (2011). A secure image encryption algorithm based on Rubik’s cube principle. Journal of Electrical and Computer Engineering, 20(12), 113.MATH Loukhaoukha, K., Chouinard, J.-Y., & Berdai, A. (2011). A secure image encryption algorithm based on Rubik’s cube principle. Journal of Electrical and Computer Engineering, 20(12), 113.MATH
37.
go back to reference Huang, C. K., Liao, C. W., Hsu, S. L., & Jeng, Y. C. (2013). Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommunication Systems, 52, 563–571.CrossRef Huang, C. K., Liao, C. W., Hsu, S. L., & Jeng, Y. C. (2013). Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommunication Systems, 52, 563–571.CrossRef
38.
go back to reference Sivakumar, T., & Venkatesan, R. (2014) Image encryption based on pixel shuffling and random key stream International Journal of Computer and Information Technology, volume 3- issue 06, pp.102-114 Sivakumar, T., & Venkatesan, R. (2014) Image encryption based on pixel shuffling and random key stream International Journal of Computer and Information Technology, volume 3- issue 06, pp.102-114
Metadata
Title
An Approach of Secret Sharing Technique Based on Convolution Neural Network and DNA Sequence for Data Security in Wireless Communication
Authors
Anirban Bhowmik
Sunil Karforma
Publication date
20-01-2022
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2022
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-09519-y

Other articles of this Issue 4/2022

Wireless Personal Communications 4/2022 Go to the issue