{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T03:38:28Z","timestamp":1776310708793,"version":"3.50.1"},"reference-count":37,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T00:00:00Z","timestamp":1741305600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2023YFF0905000"],"award-info":[{"award-number":["2023YFF0905000"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62172280 and U20B2051"],"award-info":[{"award-number":["62172280 and U20B2051"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Natural Science Foundation of Shanghai","award":["21ZR1444600"],"award-info":[{"award-number":["21ZR1444600"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2025,3,31]]},"abstract":"<jats:p>Designing an end-to-end encryption method for images using the non-linear properties of deep neural networks (DNNs) has gradually attracted the attention of researchers. In this article, we introduce a new framework for DNN-based image encryption that embeds a plaintext image as a secret message into a random noise to obtain a ciphertext image. Based on this, we propose an end-to-end robust image encryption method based on the invertible neural network (INN), which can realize secure encryption and resistance to common image processing attacks. Specifically, the INN is exploited as the shared-parameter encoder and decoder to achieve end-to-end encryption and decryption. The ciphertext image can be obtained through the forward process of the INN by inputting the plaintext image and the key, while the decrypted image can be obtained through the backward process of the INN by inputting the ciphertext image and the key. To enhance the security of our method, we design an information reinforcement module to guarantee the encryption effect and the sensitivity of the key. In addition, to improve the robustness of our method, an attack layer is employed for noise simulation training. Experimental results show that our method not only can realize secure encryption but also can achieve the robustness such as resisting JPEG compression, Gaussian noise, scaling, mean filtering, and Gaussian blurring effectively.<\/jats:p>","DOI":"10.1145\/3712601","type":"journal-article","created":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T16:33:41Z","timestamp":1737131621000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["New Framework of Robust Image Encryption"],"prefix":"10.1145","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9024-9840","authenticated-orcid":false,"given":"Lin","family":"Huang","sequence":"first","affiliation":[{"name":"School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0370-4623","authenticated-orcid":false,"given":"Chuan","family":"Qin","sequence":"additional","affiliation":[{"name":"School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8249-2608","authenticated-orcid":false,"given":"Guorui","family":"Feng","sequence":"additional","affiliation":[{"name":"School of Communication and Information Engineering, Shanghai University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3225-4649","authenticated-orcid":false,"given":"Xiangyang","family":"Luo","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5867-1315","authenticated-orcid":false,"given":"Xinpeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Communication and Information Engineering, Shanghai University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2025,3,7]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3570165"},{"key":"e_1_3_1_3_2","volume-title":"Data Encryption Standard (DES)","author":"Biryukov Alex","year":"2005","unstructured":"Alex Biryukov and Christophe De Canni\u00e8re. 2005. Data Encryption Standard (DES). Wiley."},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2024.3351702"},{"issue":"2","key":"e_1_3_1_5_2","first-page":"780","article-title":"Secure-international data encryption algorithm","volume":"2","author":"Singh Harivans Pratap","year":"2013","unstructured":"Harivans Pratap Singh, Verma Shweta, and Mishra Shailendra. 2013. Secure-international data encryption algorithm. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 2, 2 (2013), 780\u2013792.","journal-title":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2020.02.008"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3062754"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3012452"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","unstructured":"Laurent Dinh David Krueger and Yoshua Bengio. 2014. Nice: Non-linear independent components estimation. arXiv:1410.8516 9124\u20139134. DOI: 10.48550\/arXiv.1410.8516","DOI":"10.48550\/arXiv.1410.8516"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11803-1"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3141725"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3310002"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.03.010"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-021-06472-6"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.09.032"},{"key":"e_1_3_1_16_2","unstructured":"Diederik P. Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv:1412.6980. Retrieved from https:\/\/arxiv.org\/abs\/1412.6980"},{"key":"e_1_3_1_17_2","first-page":"10236","article-title":"Glow: Generative flow with invertible 1x1 convolutions","volume":"31","author":"Kingma Durk P.","year":"2018","unstructured":"Durk P. Kingma and Prafulla Dhariwal. 2018. Glow: Generative flow with invertible 1x1 convolutions. In Advances in Neural Information Processing Systems, Vol. 31, 10236\u201310245.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3332228"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119923"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3686156"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2023.1226154"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.11.089"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2022.3148591"},{"key":"e_1_3_1_25_2","first-page":"1","volume-title":"Proceedings of Federal Information Processing Standards Publications, National Institute of Standards and Technology","volume":"19","author":"Rijmen Vincent","year":"2001","unstructured":"Vincent Rijmen and Joan Daemen. 2001. Advanced encryption standard. Proceedings of Federal Information Processing Standards Publications, National Institute of Standards and Technology 19, 22 (2001), 1\u20138."},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2023.03.037"},{"key":"e_1_3_1_27_2","first-page":"1","article-title":"Jpeg-resistant adversarial images","volume":"1","author":"Shin Richard","year":"2017","unstructured":"Richard Shin and Dawn Song. 2017. Jpeg-resistant adversarial images. In NIPS 2017 Workshop on Machine Learning and Computer Security, Vol. 1, 1\u20138.","journal-title":"In NIPS 2017 Workshop on Machine Learning and Computer Security"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-14000-w"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3238383"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2022.3171099"},{"key":"e_1_3_1_31_2","first-page":"63","volume-title":"European Conference on Computer Vision (ECCV) Workshops","author":"Wang Xintao","year":"2018","unstructured":"Xintao Wang, Ke Yu, Shixiang Wu, Jinjin Gu, Yihao Liu, Chao Dong, Yu Qiao, and Chen Change Loy. 2018. ESRGAN: Enhanced super-resolution generative adversarial networks. In European Conference on Computer Vision (ECCV) Workshops, 63\u201379."},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-023-08230-2"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-021-07131-6"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2023.104367"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3643887"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.112380"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1364\/AO.469155"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3712601","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3712601","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:37Z","timestamp":1750295917000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3712601"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,7]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,3,31]]}},"alternative-id":["10.1145\/3712601"],"URL":"https:\/\/doi.org\/10.1145\/3712601","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,7]]},"assertion":[{"value":"2024-08-18","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-22","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}