Preserving Privacy of Classified Authentic Satellite Lane Imagery Using Proxy Re-Encryption and UAV Technologies
<p>Proposed architecture.</p> "> Figure 2
<p>ANN network model.</p> "> Figure 3
<p>U-Net Model System Architecture.</p> "> Figure 4
<p>Fake image.</p> "> Figure 5
<p>Authentic image.</p> "> Figure 6
<p>Proxy re-encryption-based cipher image.</p> "> Figure 7
<p>Lane-predicted image.</p> "> Figure 8
<p>Parameters used in the ANN model.</p> "> Figure 9
<p>Confusion matrix of ANN model.</p> "> Figure 10
<p>Loss curves.</p> "> Figure 11
<p>Training gist curves.</p> "> Figure 12
<p>Comparison of encryption times.</p> "> Figure 13
<p>Comparison analysis for various image formats.</p> ">
Abstract
:1. Introduction
1.1. Problem Statement and Motivation
1.2. Research Contributions in the Proposed Work
- Provided an overview of the security mechanisms and challenges faced in securing satellite lane images.
- Performed a literature survey on various security mechanisms such as proxy re-encryption techniques for securing the data.
- Reviewing the state-of-the-art, we have identified that proxy re-encryption has not been implemented practically, which points out the novelty in our paper.
- Identified that the proxy re-encryption technique has better performance and can survive various security threats.
- Researched many classification algorithms and compared those classification algorithms with the proposed classification algorithm (ANN).
- Various models, and security mechanisms are analyzed and the key features of the proposed methodology are compared against them.
1.3. Outline of the Paper
2. Related Works
3. Proposed Methodology
3.1. Demonstration of ANN Model
3.1.1. Datasets and Requirement Analysis
3.1.2. Data Acquisition and Processing
- Step 1: Reading the input lane image = read
- Step 2: Resizing the image data / 255.0
- Step 3: Conversion of image data to array data is described as follows:
3.1.3. Performance of Error Level Analysis (ELA)
- Step 1: Assigning input image to ELA for the functioning of ELA:
- Step 2: The difference between the original and RGB image is computed as follows:
- Step 3: Common range for the above image data is generated as follows:
- Step 4: Enhancement of image with the help of ELA is performed as follows:
3.1.4. Generation of ANN Model
- Step 1: The model consists of many convergent, max pool layers for extracting features model.add(Conv, Maxpool)
- Step 2: 80% of train and 20% of test dataset is passed through the model:
- Step 3: The model consists of output layers whose sigmoid function is as below:
- Step 4: Confidence for the above model is computed as follows:
3.2. Lane Detection Using U-Net Model
3.2.1. Construction of U-Net Model
- Step 1: The number of filters considered for the U-Net model is defined as follows:
- Step 2: The Conv2D in the encoder path is applied as follows for every value in :and
- Step 3: TFor each increment the max pooling is applied as follows:y = MaxPooling2D((2,2))(x) and y=DropOut( )(x)
- Step 4: The Conv2DTranspose is applied on the layers obtained from the encoder path in decreasing order of the filters which eventually gives the original size of an image.
- If , are the previous layers in which the transpose function is performed, concatenate function is applied as follows:and z=Dropout( )(z)
3.2.2. Predicting Lanes Using Constructed Model
- The input image is resized as follows: Img=read(imagepath),shape = and
- The image is reshaped into shape as shown below:
- The image is transformed into a numerical array using the NumPy module and lanes are detected as follows:
3.3. Secure Fog Computation with Proxy Re-Encryption Technique
3.3.1. RSA-Based Encryption and Hash Generation
- Step 1: RSA key generation is done by performing operations after generating two random prime numbers p, q as follows:
- Step 2: The is formed by encoding the lane-detected authentic image into ASCII format. Encryption of image using RSA algorithm is performed as below:
- Step 3: The hash value of the original image is generated using the SHA-256 algorithm as:
3.3.2. Proxy Re-Encryption and Integrity Verification
- Step 1: is decrypted on the proxy-side using
- Step 2: New hash value is generated using SHA-256 to the image obtained after decryption using the RSA algorithm.
- Step 3: Verify integrity by comparing values. If both values are equal integrity is verified otherwise, is tampered with before reaching proxy.
- Step 4: After integrity checking, the is re-encrypted using ECC algorithm.
- Step 5: Generally, an elliptic curve is represented as and elliptic curve with parameters and where q is a prime number. G is a point on an elliptic curve.
- Step 6: The public key and Secret key .
- Step 7: Encryption is performed after encoding as follows:
3.3.3. ECC Decryption and Integrity Verification on Receiver’s Side
- Step 1: ECC-based decryption is performed as follows:
- Step 2: New hash value is generated using SHA-256 to the image obtained after decryption using the ECC algorithm.
- Verify integrity by comparing and values. If both values are equal integrity is verified otherwise, is tampered with before reaching the receiver.
3.3.4. Secure Communication with Fog Authentication
- User A request authentication from AS:
- Authentication of User A by AS:
- Secure transfer of encrypted data from User A to proxy server
- User B request authentication from AS:
- Authentication of User B by AS:
- Verification and decryption of the message
4. Results and Analysis
4.1. Predictions of ANN Model
Outcome of U-Net Model
4.2. Performance Analysis
4.2.1. Confusion Matrix/Error Matrix
4.2.2. Accuracy and Precision
4.2.3. Training and Validation Curves
4.2.4. Comparison of Relevant Models
4.2.5. Analysis of RSME Test
4.2.6. Encryption Time Analysis
4.3. Security Audit
4.3.1. Cipher Text Only Attacks
4.3.2. Brute Force Attacks
4.3.3. Timing Attacks
5. Conclusion
6. Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Sample Availability
Abbreviations
MDPI | Multidisciplinary Digital Publishing Institute |
DOAJ | Directory of open access journals |
TLA | Three letter acronym |
LD | Linear dichroism |
References
- Rupa, C.; Harshita, M.; Srivastava, G.; Gadekallu, T.R.; Maddikunta, P.K.R. Securing Multimedia using a Deep Learning based Chaotic Logistic Map. IEEE J. Biomed. Health Inform. 2022. early access. [Google Scholar] [CrossRef] [PubMed]
- Rehman, M.U.; Shafique, A.; Ghadi, Y.Y.; Boulila, W.; Jan, S.U.; Gadekallu, T.R.; Driss, M.; Ahmad, J. A Novel Chaos-Based Privacy-Preserving Deep Learning Model for Cancer Diagnosis. IEEE Trans. Netw. Sci. Eng. 2022, 9, 4322–4337. [Google Scholar] [CrossRef]
- Javed, A.R.; Jalil, Z.; Zehra, W.; Gadekallu, T.R.; Suh, D.Y.; Piran, M.J. A comprehensive survey on digital video forensics: Taxonomy, challenges, and future directions. Eng. Appl. Artif. Intell. 2021, 106, 104456. [Google Scholar] [CrossRef]
- Verdoliva, L. Media forensics and deepfakes: An overview. IEEE J. Sel. Top. Signal Process. 2020, 14, 910–932. [Google Scholar] [CrossRef]
- Kumar, P.; Kumar, R.; Srivastava, G.; Gupta, G.P.; Tripathi, R.; Gadekallu, T.R.; Xiong, N.N. PPSF: A privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Trans. Netw. Sci. Eng. 2021, 8, 2326–2341. [Google Scholar] [CrossRef]
- Rajyalakshmi, V.; Lakshmanna, K. A review on smart city-IoT and deep learning algorithms, challenges. Int. J. Eng. Syst. Model. Simul. 2022, 13, 3–26. [Google Scholar] [CrossRef]
- Kavitha, A.; Reddy, V.B.; Singh, N.; Gunjan, V.K.; Lakshmanna, K.; Khan, A.A.; Wechtaisong, C. Security in IoT Mesh Networks based on Trust Similarity. IEEE Access 2022, 10, 121712–121724. [Google Scholar] [CrossRef]
- Ch, R.; Srivastava, G.; Gadekallu, T.R.; Maddikunta, P.K.R.; Bhattacharya, S. Security and privacy of UAV data using blockchain technology. J. Inf. Secur. Appl. 2020, 55, 102670. [Google Scholar] [CrossRef]
- Elmogy, A.; Bouteraa, Y.; Alshabanat, R.; Alghaslan, W. A New Cryptography Algorithm Based on ASCII Code. In Proceedings of the 2019 19th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA), Sousse, Tunisia, 24–26 March 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 626–631. [Google Scholar]
- Ahmad, J.; Tahir, A.; Khan, J.S.; Khan, M.A.; Khan, F.A.; Habib, Z. A partial ligt-weight image encryption scheme. In Proceedings of the 2019 UK/China Emerging Technologies (UCET), Glasgow, UK, 21–22 August 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–3. [Google Scholar]
- Han, J.; Xu, Y.; Di, L.; Chen, Y. Low-cost multi-UAV technologies for contour mapping of nuclear radiation field. J. Intell. Robot. Syst. 2013, 70, 401–410. [Google Scholar] [CrossRef]
- Vacanas, Y.; Themistocleous, K.; Agapiou, A.; Hadjimitsis, D. Building Information Modelling (BIM) and Unmanned Aerial Vehicle (UAV) technologies in infrastructure construction project management and delay and disruption analysis. In Proceedings of the Third International Conference on Remote Sensing and Geoinformation of the Environment (RSCy2015), Paphos, Cyprus, 16–19 March 2015; SPIE: Bellingham, WA, USA, 2015; Volume 9535, pp. 93–103. [Google Scholar]
- Joslin, M.; Hao, S. Attributing and Detecting Fake Images Generated by Known GANs. In Proceedings of the 2020 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, 21 May 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 8–14. [Google Scholar]
- Dubey, G. Segmentation and Detection of Road Region in Aerial Images using Hybrid CNN-Random Field Algorithm. In Proceedings of the 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 29–31 January 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 502–506. [Google Scholar]
- Liu, W.; Gong, J.; Ma, B. Research on lane detection method with shadow interference. In Proceedings of the 2019 Chinese Control Conference (CCC), Guangzhou, China, 27–30 July 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 7704–7709. [Google Scholar]
- Barua, B.; Biswas, S.; Deb, K. An Efficient Method of Lane Detection and Tracking for Highway Safety. In Proceedings of the 2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT), Dhaka, Bangladesh, 3–5 May 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–6. [Google Scholar]
- Govada, K.A.; Jonnalagadda, H.P.; Kapavarapu, P.; Alavala, S.; Vani, K.S. Road Deformation Detection. In Proceedings of the 2020 7th International Conference on Smart Structures and Systems (ICSSS), Chennai, India, 23–24 July 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–5. [Google Scholar]
- Agyekum, K.O.B.O.; Xia, Q.; Sifah, E.B.; Cobblah, C.N.A.; Xia, H.; Gao, J. A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain. IEEE Syst. J. 2021, 16, 1685–1696. [Google Scholar] [CrossRef]
- Khashan, O.A. Parallel Proxy Re-Encryption Workload Distribution for Efficient Big Data Sharing in Cloud Computing. In Proceedings of the 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), Virtual, 27–30 January 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 554–559. [Google Scholar]
- Ali, A.B.R.; Alagumariappan, P.; Vijayalakshmi, S.; Gughan, N.; Bhaskar, K. Analysis of Secure Transfer of Healthcare Data using Fog Computing. In Proceedings of the 2020 International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, 10–12 September 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 529–531. [Google Scholar]
- Tanaka, M.; Kiya, H. Fake-image detection with Robust Hashing. In Proceedings of the 2021 IEEE 3rd Global Conference on Life Sciences and Technologies (LifeTech), Nara, Japan, 9–11 March 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 40–43. [Google Scholar]
- Kunbaz, A.; Saghir, S.; Arar, M.; Sönmez, E.B. Fake Image Detection Using DCT and Local Binary Pattern. In Proceedings of the 2019 Ninth International Conference on Image Processing Theory, Tools and Applications (IPTA), Istanbul, Turkey, 6–9 November 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–6. [Google Scholar]
- Khashan, O.A. Hybrid lightweight proxy re-encryption scheme for secure fog-to-things environment. IEEE Access 2020, 8, 66878–66887. [Google Scholar] [CrossRef]
- Nida, N.; Irtaza, A.; Ilyas, N. Forged Face Detection using ELA and Deep Learning Techniques. In Proceedings of the 2021 International Bhurban Conference on Applied Sciences and Technologies (IBCAST), Islamabad, Pakistan, 12–16 January 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 271–275. [Google Scholar]
- Lian, Z.; Su, M.; Fu, A.; Wang, H.; Zhou, C. Proxy re-encryption scheme for complicated access control factors description in hybrid cloud. In Proceedings of the ICC 2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–6. [Google Scholar]
- Ghanem, S.; Kanungo, P.; Panda, G.; Satapathy, S.C.; Sharma, R. Lane detection under artificial colored light in tunnels and on highways: An IoT-based framework for smart city infrastructure. Complex Intell. Syst. 2021, 1–12. [Google Scholar] [CrossRef]
- Hu, Y.; Xiang, Q.J.; Liu, Z.H.; Conrad, Z.J.; Cao, J.N.; Zhang, X.P. Hovering efficiency optimization of the ducted propeller with weight penalty taken into account. Aerosp. Sci. Technol. 2021, 117, 106937. [Google Scholar] [CrossRef]
- Zheng, W.; Liu, X.; Yin, L. Sentence representation method based on multi-layer semantic network. Appl. Sci. 2021, 11, 1316. [Google Scholar] [CrossRef]
- Ban, Y.; Liu, M.; Wu, P.; Yang, B.; Liu, S.; Yin, L.; Zheng, W. Depth estimation method for monocular camera defocus images in microscopic scenes. Electronics 2022, 11, 2012. [Google Scholar] [CrossRef]
- Zhou, G.; Bao, X.; Ye, S.; Wang, H.; Yan, H. Selection of optimal building facade texture images from UAV-based multiple oblique image flows. IEEE Trans. Geosci. Remote Sens. 2020, 59, 1534–1552. [Google Scholar] [CrossRef]
- Zhou, G.; Long, S.; Xu, J.; Zhou, X.; Song, B.; Deng, R.; Wang, C. Comparison analysis of five waveform decomposition algorithms for the airborne LiDAR echo signal. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 2021, 14, 7869–7880. [Google Scholar] [CrossRef]
- Polyakov, Y.; Rohloff, K.; Sahu, G.; Vaikuntanathan, V. Fast proxy re-encryption for publish/subscribe systems. ACM Trans. Priv. Secur. (TOPS) 2017, 20, 1–31. [Google Scholar] [CrossRef]
- Chen, J.; Liu, Y.; Xiang, Y.; Sood, K. RPPTD: Robust privacy-preserving truth discovery scheme. IEEE Syst. J. 2021, 16, 4525–4531. [Google Scholar] [CrossRef]
- Wang, W.; Lin, H.; Wang, J. CNN based lane detection with instance segmentation in edge-cloud computing. J. Cloud Comput. 2020, 9, 1–10. [Google Scholar] [CrossRef]
- Meiliasari, R.P.; Syalim, A.; Yazid, S. Performance analysis of the symmetric proxy re-encryption scheme. In Proceedings of the 2019 International Workshop on Big Data and Information Security (IWBIS), Bali, Indonesia, 11 October 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 91–96. [Google Scholar]
- Singh, B.; Sharma, D.K. Predicting image credibility in fake news over social media using multi-modal approach. Neural Comput. Appl. 2021, 34, 21503–21517. [Google Scholar] [CrossRef] [PubMed]
- El-Latif, A.; Eman, I.; Taha, A.; Zayed, H.H. A passive approach for detecting image splicing based on deep learning and wavelet transform. Arab. J. Sci. Eng. 2020, 45, 3379–3386. [Google Scholar] [CrossRef]
- Varona, B.; Monteserin, A.; Teyseyre, A. A deep learning approach to automatic road surface monitoring and pothole detection. Pers. Ubiquitous Comput. 2020, 24, 519–534. [Google Scholar] [CrossRef]
- Shi, Y.; Xu, X.; Xi, J.; Hu, X.; Hu, D.; Xu, K. Learning to detect 3D symmetry from single-view RGB-D images with weak supervision. IEEE Trans. Pattern Anal. Mach. Intell. 2022. early access. [Google Scholar] [CrossRef]
- Zhou, W.; Liu, J.; Lei, J.; Yu, L.; Hwang, J.N. GMNet: Graded-feature multilabel-learning network for RGB-thermal urban scene semantic segmentation. IEEE Trans. Image Process. 2021, 30, 7790–7802. [Google Scholar] [CrossRef]
- Yin, M.; Zhu, Y.; Yin, G.; Fu, G.; Xie, L. Deep Feature Interaction Network for Point Cloud Registration, With Applications to Optical Measurement of Blade Profiles. IEEE Trans. Ind. Inform. 2022. early access. [Google Scholar] [CrossRef]
- Zhang, Y.; Luo, J.; Li, J.; Mao, D.; Zhang, Y.; Huang, Y.; Yang, J. Fast inverse-scattering reconstruction for airborne high-squint radar imagery based on Doppler centroid compensation. IEEE Trans. Geosci. Remote. Sens. 2021, 60, 5205517. [Google Scholar] [CrossRef]
- Lu, H.; Zhu, Y.; Yin, M.; Yin, G.; Xie, L. Multimodal Fusion Convolutional Neural Network with Cross-attention Mechanism for Internal Defect Detection of Magnetic Tile. IEEE Access 2022, 10, 60876–60886. [Google Scholar] [CrossRef]
Ref | Model | Security Approach | Integrity Check | Proxy Re-Encryption | Storage | Application |
---|---|---|---|---|---|---|
[21] | GAN model | Hashing mechanism | Yes | Not applicable | Not specific | General image data |
[22] | Support vector Machine (SVM) | Digital Watermark | Yes | Not applicable | Not specific | Social media image data |
[23] | Not applicable | ECC | Yes | Applicable | Fog | IoT data |
[24] | CNN model | Not applicable | No | Not applicable | Not specific | General image data |
[25] | Not applicable | Ex-OR encryption | Yes | Applicable | Cloud | Cloud data |
[26,27,28,29,30,31] | FPGA based dual-stage lane detection (DSLD) | Not applicable | No | Not applicable | Cloud | Lane line image data |
Acronym | Illustartion |
---|---|
p, q | Random prime numbers |
Private key generated by RSA algorithm | |
Public key generated by RSA algorithm | |
Original bona fide lane detected image | |
Cipher bona fide lane detected image on sender’s side | |
Public key generated by ECC algorithm | |
Private key generated by ECC algorithm | |
Secret key generated by ECC algorithm | |
Cipher bona fide lane detected image on proxy side | |
AS | Authentication server |
Public key of user A | |
Proxy re-encryption technique | |
Time stamp between User A and AS | |
Auth. key between AS and User A | |
Identity of User B | |
Time stamp between AS and User A | |
Encrypted message | |
Time stamp between AS and User A | |
Secret key of User A | |
Time stamp between User B and AS | |
Auth. key between AS and User B | |
Conversion of Secret key of User A to B |
Actual Values (Positive (+)) | Actual Values (Negative (−)) | |
---|---|---|
Predicted Values (Positive (+)) | True Positives (TP) TPR = 92% | False Positives (FP) FPR = 7% |
Predicted Values (Negative (−)) | False Negatives (FN) FNR = 9% | True Negatives (TN) TNR = 92.43% |
[35,36,37,38,39,40] | [7,25,41] | [32,35] | [36,42,43] | Proposed Methodology | |
---|---|---|---|---|---|
Model used | Multi-modal | N/A | N/A | CNN | ANN, U-Net |
Accuracy | 85.3% | N/A | N/A | 91% | 93% |
Encryption algorithm | N/A | Decisional Bilinear Diffie–Hellman | (RLWE) key switching | N/A | RSA, ECC |
Throughput | N/A | N/A | 6809.95 Kbps | N/A | 3240 Kbps |
Time complexity | N/A | O(T1+3T2) | N/A | N/A | O(log(n)) |
Processing time | N/A | 14 ms/frame | 12.74 ms/frame | N/A | 7 ms/frame |
S. No. | Size of Input Image (KB/MB) | Results Inferred from RMSE |
---|---|---|
1. | 200 KB | 0.0 |
2. | 500 KB | 0.0 |
3. | 1 MB | 0.0 |
4. | 10 MB | 0.0 |
5. | 20 MB | 0.0 |
S. No. | Image Size (JPG) | Encryption Time for RSA (sec) | Encryption Time for ECC (sec) |
---|---|---|---|
1. | 500 KB | 0.338 | 0.124 |
2. | 51 MB | 1.102 | 0.231 |
3. | 3 MB | 2.346 | 1.983 |
4. | 5 MB | 4.795 | 3.901 |
5. | 10 MB | 11.097 | 10.257 |
S. No. | Image Format (2 MB) | Encryption Time for RSA (sec) | Encryption Time for ECC (sec) |
---|---|---|---|
1. | JPG | 2.578 | 1.924 |
2. | PNG | 2.193 | 1.873 |
3. | TIFF | 2.515 | 1.846 |
4. | BMP | 2.829 | 2.013 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Nagasree, Y.; Rupa, C.; Akshitha, P.; Srivastava, G.; Gadekallu, T.R.; Lakshmanna, K. Preserving Privacy of Classified Authentic Satellite Lane Imagery Using Proxy Re-Encryption and UAV Technologies. Drones 2023, 7, 53. https://doi.org/10.3390/drones7010053
Nagasree Y, Rupa C, Akshitha P, Srivastava G, Gadekallu TR, Lakshmanna K. Preserving Privacy of Classified Authentic Satellite Lane Imagery Using Proxy Re-Encryption and UAV Technologies. Drones. 2023; 7(1):53. https://doi.org/10.3390/drones7010053
Chicago/Turabian StyleNagasree, Yarajarla, Chiramdasu Rupa, Ponugumati Akshitha, Gautam Srivastava, Thippa Reddy Gadekallu, and Kuruva Lakshmanna. 2023. "Preserving Privacy of Classified Authentic Satellite Lane Imagery Using Proxy Re-Encryption and UAV Technologies" Drones 7, no. 1: 53. https://doi.org/10.3390/drones7010053
APA StyleNagasree, Y., Rupa, C., Akshitha, P., Srivastava, G., Gadekallu, T. R., & Lakshmanna, K. (2023). Preserving Privacy of Classified Authentic Satellite Lane Imagery Using Proxy Re-Encryption and UAV Technologies. Drones, 7(1), 53. https://doi.org/10.3390/drones7010053