{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T04:29:13Z","timestamp":1741753753219,"version":"3.38.0"},"reference-count":40,"publisher":"SAGE Publications","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IDT"],"published-print":{"date-parts":[[2024,6,7]]},"abstract":"<jats:p>In today\u2019s digital era, the security of sensitive data, particularly in the realm of multimedia, is of paramount importance. Image encryption serves as a vital shield against unauthorized access and ensures the confidentiality and integrity of visual information. As such, the continuous pursuit of robust and efficient encryption techniques remains a pressing concern. This research introduces a Temper Wolf Hunt Optimization enabled Generative Adversarial Network Encryption model (TWHO-GAN), designed to address the challenges of image encryption in the modern digital landscape. TWHO, inspired by the collective hunting behavior of wolf and coyote packs, is employed to generate highly secure encryption keys. This algorithm excels in exploring complex solution spaces, creating robust, attack-resistant keys. In TWHO-GAN model, GANs are employed to create encrypted images that are virtually indistinguishable from their original counterparts, adding a layer of security by generating complex encryption keys and ensuring robust protection against attacks. The GAN component reconstructs the encrypted images to their original form when decrypted with the correct keys, ensuring data integrity while maintaining confidentiality. Further, the significance of the proposed model relies on the TWHO algorithm formulated by the integration of the adaptability and coordinated hunting strategies to optimize the chaotic map generation in image encryption protecting the sensitive visual information from unauthorized access as well as potential threats. Through extensive experimentation and comparative analysis, TWHO-GAN demonstrates superior performance in image encryption, surpassing former methods in terms of Cs, \ud835\udc3b\ud835\udc56\ud835\udc60C, MSE, PSNR, RMSE, and SSIM attaining values of 0.93, 94.19, 3.274, 59.70\u00a0dB, 1.8095, and 0.940\u00a0respectively for 5\u00a0numbers of images. Moreover, the TWHO-GAN approach attained the values of 0.91,92.22, 2.03, 49.74\u00a0dB, 1.42, and 0.88 for Cs, HisC, MSE, PSNR, RMSE, and SSIM respectively utilizing the Airplanes dataset. The model exhibits robust resistance to various attacks, making it a compelling choice for secure image transmission and storage.<\/jats:p>","DOI":"10.3233\/idt-230547","type":"journal-article","created":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T17:58:11Z","timestamp":1712080691000},"page":"1233-1258","source":"Crossref","is-referenced-by-count":0,"title":["Temper wolf hunt optimization enabled GAN for robust image encryption"],"prefix":"10.1177","volume":"18","author":[{"given":"Parvathraj","family":"K M M","sequence":"first","affiliation":[]},{"given":"Anoop","family":"B K","sequence":"additional","affiliation":[]}],"member":"179","reference":[{"issue":"3","key":"10.3233\/IDT-230547_ref1","doi-asserted-by":"crossref","first-page":"2556","DOI":"10.1007\/s10489-021-02508-x","article-title":"An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function","volume":"52","author":"Kumar","year":"2022","journal-title":"Applied Intelligence"},{"key":"10.3233\/IDT-230547_ref2","doi-asserted-by":"crossref","first-page":"6191","DOI":"10.1007\/s11042-018-6326-5","article-title":"Color image encryption algorithm based on customized globally coupled map lattices","volume":"78","author":"Wang","year":"2019","journal-title":"Multimedia Tools and Applications"},{"issue":"11","key":"10.3233\/IDT-230547_ref3","doi-asserted-by":"crossref","first-page":"2903","DOI":"10.1515\/nanoph-2021-0259","article-title":"Non-orthogonal polarization multiplexed metasurfaces for tri-channel polychromatic image displays and information encryption","volume":"10","author":"Ren","year":"2021","journal-title":"Nanophotonics"},{"issue":"5","key":"10.3233\/IDT-230547_ref4","first-page":"872","article-title":"An efficient and secure cipher-text retrieval scheme based on mixed homomorphic encryption and multi-attribute sorting method","volume":"20","author":"Teng","year":"2018","journal-title":"Int J Netw Secur"},{"key":"10.3233\/IDT-230547_ref5","doi-asserted-by":"crossref","unstructured":"Hu WW, Zhou RG, Luo J, Jiang SX, Luo GF. Quantum image encryption algorithm based on Arnold scrambling and wavelet transforms. Quantum Information Processing. 2020; 19: 1-29.","DOI":"10.1007\/s11128-020-2579-9"},{"issue":"3","key":"10.3233\/IDT-230547_ref6","first-page":"59","article-title":"Im-MobiShare: An improved privacy preserving scheme based on asymmetric encryption and bloom filter for users location sharing in social network","volume":"30","author":"Lin Teng","year":"2019","journal-title":"Journal of Computers"},{"key":"10.3233\/IDT-230547_ref7","doi-asserted-by":"crossref","first-page":"7227","DOI":"10.1007\/s11042-019-08226-4","article-title":"An image encryption algorithm based on 3-D DNA level permutation and substitution scheme","volume":"79","author":"Zhu","year":"2020","journal-title":"Multimedia Tools and Applications"},{"key":"10.3233\/IDT-230547_ref8","doi-asserted-by":"crossref","first-page":"111318","DOI":"10.1016\/j.chaos.2021.111318","article-title":"Double image encryption algorithm based on neural network and chaos","volume":"152","author":"Man","year":"2021","journal-title":"Chaos, Solitons and Fractals"},{"issue":"1","key":"10.3233\/IDT-230547_ref9","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1080\/01611194.2010.533253","article-title":"Review of cryptography and network security: Principles and practice","volume":"35","author":"Christensen","year":"2010","journal-title":"Cryptologia"},{"key":"10.3233\/IDT-230547_ref10","doi-asserted-by":"crossref","first-page":"76707","DOI":"10.1109\/ACCESS.2022.3192970","article-title":"Comparative analysis of energy costs of asymmetric vs symmetric encryption-based security applications","volume":"10","author":"Halak","year":"2022","journal-title":"IEEE Access"},{"key":"10.3233\/IDT-230547_ref11","doi-asserted-by":"crossref","first-page":"1587","DOI":"10.1007\/s11071-019-05378-8","article-title":"Colour light field image encryption based on DNA sequences and chaotic systems","volume":"99","author":"Wen","year":"2020","journal-title":"Nonlinear Dynamics"},{"key":"10.3233\/IDT-230547_ref12","doi-asserted-by":"crossref","unstructured":"Zheng P, Huang J. Efficient encrypted images filtering and transform coding with walsh-hadamard transform and parallelization. IEEE Transactions on Image Processing. 2018; 27(5): 2541-56.","DOI":"10.1109\/TIP.2018.2802199"},{"issue":"1","key":"10.3233\/IDT-230547_ref13","doi-asserted-by":"crossref","first-page":"013014","DOI":"10.1117\/1.JEI.21.1.013014","article-title":"Image encryption using the two-dimensional logistic chaotic map","volume":"21","author":"Wu","year":"2012","journal-title":"Journal of Electronic Imaging"},{"key":"10.3233\/IDT-230547_ref14","doi-asserted-by":"crossref","unstructured":"Li X, Xie Z, Wu J, Li T. Image encryption based on dynamic filtering and bit cuboid operations. Complexity. 2019.","DOI":"10.1155\/2019\/7485621"},{"key":"10.3233\/IDT-230547_ref15","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.ins.2019.08.041","article-title":"Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory","volume":"507","author":"Wang","year":"2020","journal-title":"Information sciences"},{"key":"10.3233\/IDT-230547_ref16","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.ins.2019.02.049","article-title":"Fast image encryption algorithm based on parallel computing system","volume":"486","author":"Wang","year":"2019","journal-title":"Information Sciences"},{"issue":"3","key":"10.3233\/IDT-230547_ref17","doi-asserted-by":"crossref","first-page":"319","DOI":"10.3390\/e21030319","article-title":"Image encryption based on pixel-level diffusion with dynamic filtering and DNA-level permutation with 3D Latin cubes","volume":"21","author":"Li","year":"2019","journal-title":"Entropy"},{"key":"10.3233\/IDT-230547_ref18","doi-asserted-by":"crossref","first-page":"7279","DOI":"10.1007\/s11042-019-08342-1","article-title":"A novel color image encryption algorithm based on substitution box and hyper-chaotic system with fractal keys","volume":"79","author":"Hasanzadeh","year":"2020","journal-title":"Multimedia Tools and Applications"},{"key":"10.3233\/IDT-230547_ref19","doi-asserted-by":"crossref","first-page":"25664","DOI":"10.1109\/ACCESS.2020.2970806","article-title":"An efficient image encryption scheme based on the LSS chaotic map and single S-box","volume":"8","author":"Lu","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/IDT-230547_ref20","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1016\/j.chaos.2016.12.018","article-title":"Secure image encryption algorithm design using a novel chaos based S-Box","volume":"95","author":"\u00c7avu\u015fo\u011flu","year":"2017","journal-title":"Chaos, Solitons and Fractals"},{"issue":"21","key":"10.3233\/IDT-230547_ref21","doi-asserted-by":"crossref","first-page":"14533","DOI":"10.1007\/s00521-021-06096-2","article-title":"Colour image encryption based on customized neural network and DNA encoding","volume":"33","author":"Patel","year":"2021","journal-title":"Neural Computing and Applications"},{"key":"10.3233\/IDT-230547_ref22","first-page":"1","article-title":"A new V-net convolutional neural network based on four-dimensional hyperchaotic system for medical image encryption","author":"Wang","year":"2022","journal-title":"Security and Communication Networks"},{"key":"10.3233\/IDT-230547_ref23","doi-asserted-by":"crossref","unstructured":"Ghadirli HM, Nodehi A, Enayatifar R. An overview of encryption algorithms in color images. Signal Processing. 2019; 164: 163-85.","DOI":"10.1016\/j.sigpro.2019.06.010"},{"issue":"12","key":"10.3233\/IDT-230547_ref24","doi-asserted-by":"crossref","first-page":"4440","DOI":"10.1109\/TCSVT.2019.2960507","article-title":"Image description with polar harmonic Fourier moments","volume":"30","author":"Wang","year":"2019","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"3","key":"10.3233\/IDT-230547_ref25","first-page":"244","article-title":"A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation","volume":"68","author":"Das","year":"2014","journal-title":"AEU-International Journal of Electronics and Communications"},{"issue":"06","key":"10.3233\/IDT-230547_ref26","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","article-title":"Symmetric ciphers based on two-dimensional chaotic maps","volume":"8","author":"Fridrich","year":"1998","journal-title":"International Journal of Bifurcation and chaos"},{"issue":"3","key":"10.3233\/IDT-230547_ref27","doi-asserted-by":"crossref","first-page":"1504","DOI":"10.1109\/JIOT.2020.3012452","article-title":"DeepEDN: A deep-learning-based image encryption and decryption network for internet of medical things","volume":"8","author":"Ding","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/IDT-230547_ref28","doi-asserted-by":"crossref","first-page":"14284","DOI":"10.1109\/ACCESS.2021.3052161","article-title":"New DNA coded fuzzy based (DNAFZ) S-boxes: Application to robust image encryption using hyper chaotic maps","volume":"9","author":"Mohamed","year":"2021","journal-title":"IEEE Access"},{"issue":"5","key":"10.3233\/IDT-230547_ref29","doi-asserted-by":"crossref","first-page":"7365","DOI":"10.1007\/s11042-021-11803-1","article-title":"An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN","volume":"81","author":"Erkan","year":"2022","journal-title":"Multimedia Tools and Applications"},{"key":"10.3233\/IDT-230547_ref30","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1016\/j.ins.2022.11.089","article-title":"Research on cloud data encryption algorithm based on bidirectional activation neural network","volume":"622","author":"Man","year":"2023","journal-title":"Information Sciences"},{"issue":"8","key":"10.3233\/IDT-230547_ref31","doi-asserted-by":"crossref","first-page":"1103","DOI":"10.3390\/e24081103","article-title":"A novel image encryption algorithm based on improved arnold transform and chaotic pulse-coupled neural network","volume":"24","author":"Ye","year":"2022","journal-title":"Entropy"},{"issue":"24","key":"10.3233\/IDT-230547_ref32","doi-asserted-by":"crossref","first-page":"6590","DOI":"10.1016\/j.ijleo.2013.05.092","article-title":"Optical image encryption technique based on compressed sensing and Arnold transformation","volume":"124","author":"Liu","year":"2013","journal-title":"Optik"},{"issue":"1","key":"10.3233\/IDT-230547_ref33","doi-asserted-by":"crossref","first-page":"49","DOI":"10.5121\/ijcis.2012.2105","article-title":"Image encryption using block based uniform scrambling and chaotic logistic mapping","volume":"2","author":"Rakesh","year":"2012","journal-title":"International Journal on Cryptography and Information Security (IJCIS)"},{"key":"10.3233\/IDT-230547_ref34","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/s00521-017-3272-5","article-title":"Grey wolf optimizer: a review of recent variants and applications","volume":"30","author":"Faris","year":"2018","journal-title":"Neural computing and applications"},{"key":"10.3233\/IDT-230547_ref35","first-page":"1","article-title":"Coyote optimization algorithm: a new metaheuristic for global optimization problems","author":"Pierezan","year":"2018","journal-title":"In 2018 IEEE congress on evolutionary computation (CEC)"},{"issue":"5","key":"10.3233\/IDT-230547_ref37","doi-asserted-by":"crossref","first-page":"7621","DOI":"10.1007\/s11042-022-13727-w","article-title":"Improved affine encryption algorithm for color images using LFSR and XOR encryption","volume":"82","author":"Ihsan","year":"2023","journal-title":"Multimedia Tools and Applications"},{"key":"10.3233\/IDT-230547_ref38","doi-asserted-by":"crossref","first-page":"2807","DOI":"10.1007\/s11071-021-06422-2","article-title":"Quantum logistic image encryption algorithm based on SHA-3 and RSA","volume":"104","author":"Ye","year":"2021","journal-title":"Nonlinear Dynamics"},{"key":"10.3233\/IDT-230547_ref39","doi-asserted-by":"crossref","first-page":"13792","DOI":"10.1109\/ACCESS.2020.2966264","article-title":"Image encryption algorithm based on logistic and two-dimensional lorenz","volume":"8","author":"Li","year":"2020","journal-title":"Ieee Access"},{"issue":"4","key":"10.3233\/IDT-230547_ref40","doi-asserted-by":"crossref","first-page":"3041","DOI":"10.1007\/s11071-019-05413-8","article-title":"An image encryption scheme based on a new hybrid chaotic map and optimized substitution box","volume":"99","author":"Farah","year":"2020","journal-title":"Nonlinear Dynamics"},{"key":"10.3233\/IDT-230547_ref41","doi-asserted-by":"crossref","first-page":"25911","DOI":"10.1109\/ACCESS.2021.3056037","article-title":"Fast reaching finite time synchronization approach for chaotic systems with application in medical image encryption","volume":"9","author":"Vaseghi","year":"2021","journal-title":"Ieee Access"}],"container-title":["Intelligent Decision Technologies"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/IDT-230547","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T09:19:07Z","timestamp":1741684747000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/IDT-230547"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,7]]},"references-count":40,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.3233\/idt-230547","relation":{},"ISSN":["1872-4981","1875-8843"],"issn-type":[{"type":"print","value":"1872-4981"},{"type":"electronic","value":"1875-8843"}],"subject":[],"published":{"date-parts":[[2024,6,7]]}}}