{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T22:55:11Z","timestamp":1770677711914,"version":"3.49.0"},"reference-count":25,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2023,5,4]],"date-time":"2023-05-04T00:00:00Z","timestamp":1683158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>The cloud provides on-demand, high-quality services to its users without the burden of managing hardware and software. Though the users benefit from the remote services provided by the cloud, they do not have their personal data in their physical possession. This certainly poses new security threats for personal and confidential data, bringing the focus back on trusting the use of the cloud for sensitive data. The benefits of the cloud outweigh the concerns raised earlier, and with an increase in cloud usage, it becomes more important for security services to evolve in order to address the ever-changing threat landscape. Advanced encryption standard (AES), being one of the most widely used encryption techniques, has inherent disadvantages related to the secret key that is shared, and predictable patterns in subkey generation. In addition, since cloud storage involves data transfer over a wireless channel, it is important to address the effect of noise and multipath propagation on the transmitted data. Catering to this problem, we propose a new approach\u2014the secure and reliable neural cryptcoding (SARNC) technique\u2014which provides a superior algorithm, dealing with better encryption techniques combined with channel coding. A chain is as strong as the weakest link and, in the case of symmetric key encryption, the weakest link is the shared key. In order to overcome this limitation, we propose an approach wherein the key used for cryptographic purposes is different from the key shared between the sender and the receiver. The shared key is used to derive the secret private key, which is generated by the neural key exchange protocol. In addition, the proposed approach emphasizes strengthening the sub-key generation process and integrating advanced encryption standard (AES) with low-density parity check (LDPC) codes to provide end-to-end security and reliability over wireless channels. The proposed technique was tested against research done in related areas. A comparative study shows a significant improvement in PSNR, MSE, and the structural similarity index (SSIM). The key strength analysis was carried out to understand the strength and weaknesses of the keys generated.<\/jats:p>","DOI":"10.3390\/cryptography7020023","type":"journal-article","created":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T02:08:42Z","timestamp":1683252522000},"page":"23","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Neural Crypto-Coding Based Approach to Enhance the Security of Images over the Untrusted Cloud Environment"],"prefix":"10.3390","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6607-6361","authenticated-orcid":false,"given":"Pallavi","family":"Kulkarni","sequence":"first","affiliation":[{"name":"Department of Electronics and Communication Engineering, KLE Dr. MSSCET, Belgaum 590008, India"}]},{"given":"Rajashri","family":"Khanai","sequence":"additional","affiliation":[{"name":"Department of Computer Science Engineering, KLE Dr. MSSCET, Belgaum 590008, India"}]},{"given":"Dattaprasad","family":"Torse","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, KLE Dr. MSSCET, Belgaum 590008, India"}]},{"given":"Nalini","family":"Iyer","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, KLE Technological University, Hubli 580031, India"}]},{"given":"Gururaj","family":"Bindagi","sequence":"additional","affiliation":[{"name":"Platform Architect, Novartis, Hyderabad 500081, India"}]}],"member":"1968","published-online":{"date-parts":[[2023,5,4]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"3727","DOI":"10.1007\/s10586-018-2240-x","article-title":"Secure and efficient data forwarding in untrusted cloud environment","volume":"22","author":"Ramachandran","year":"2019","journal-title":"Clust. Comput."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/MCOM.2014.6766088","article-title":"Security protection between users and the mobile media cloud","volume":"52","author":"Wang","year":"2014","journal-title":"IEEE Commun. Mag."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Kaur, J., and Sharma, S. (2018, January 14\u201315). HESSIS: Hybrid Encryption Scheme for Secure Image Sharing in a Cloud Environment. Proceedings of the International Conference on Advanced Informatics for Computing Research, Shimla, India.","DOI":"10.1007\/978-981-13-3143-5_18"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.jnca.2015.11.023","article-title":"An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing","volume":"64","author":"Pasupuleti","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"9802475","DOI":"10.1155\/2018\/9802475","article-title":"RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys","volume":"2018","author":"Saha","year":"2018","journal-title":"Secur. Commun. Netw."},{"key":"ref_6","first-page":"70","article-title":"A modified AES based algorithm for image encryption","volume":"1","author":"Zeghid","year":"2007","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"8863345","DOI":"10.1155\/2020\/8863345","article-title":"Secure framework enhancing AES algorithm in cloud computing","volume":"2020","author":"Awan","year":"2020","journal-title":"Secur. Commun. Netw."},{"key":"ref_8","first-page":"3140","article-title":"Vectorized neural key exchange using tree parity machine","volume":"8","author":"Chourasia","year":"2019","journal-title":"Compusoft"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"6359","DOI":"10.1007\/s10586-018-2134-y","article-title":"Research on the application of LDPC code in chaotic sequence image encryption","volume":"22","author":"Wang","year":"2019","journal-title":"Clust. Comput."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"12183","DOI":"10.1007\/s11042-019-08454-8","article-title":"Single secret image sharing scheme using neural cryptography","volume":"79","author":"Gupta","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/CC.2014.6825260","article-title":"A joint encryption and error correction method used in satellite communications","volume":"11","author":"Li","year":"2014","journal-title":"China Commun."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"8","DOI":"10.5815\/ijigsp.2014.12.02","article-title":"Combination of Hybrid Chaotic Encryption and LDPC for Secure Transmission of Images over Wireless Networks","volume":"6","author":"Mursi","year":"2014","journal-title":"Int. J. Image Graph. Signal Process."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Pisek, E., Abu-Surra, S., Taori, R., Dunham, J., and Rajan, D. (2015, January 6\u201310). Enhanced cryptcoding: Joint security and advanced dual-step quasi-cyclic LDPC coding. Proceedings of the 2015 IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA.","DOI":"10.1109\/GLOCOM.2015.7417284"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"3189601","DOI":"10.1155\/2020\/3189601","article-title":"Cryptographic strength evaluation of key schedule algorithms","volume":"2020","author":"Afzal","year":"2020","journal-title":"Secur. Commun. Netw."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"26073","DOI":"10.1007\/s11042-019-07766-z","article-title":"An image encryption method based on selective AES coding of wavelet transform and chaotic pixel shuffling","volume":"78","author":"Shakir","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1007\/s11071-018-4250-x","article-title":"A joint encryption and error correction scheme based on chaos and LDPC","volume":"93","author":"Liu","year":"2018","journal-title":"Nonlinear Dyn."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"6663","DOI":"10.1007\/s11227-019-02878-7","article-title":"An image encryption method based on chaos system and AES algorithm","volume":"75","author":"Arab","year":"2019","journal-title":"J. Supercomput."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Rahman, Z., Yi, X., Billah, M., Sumi, M., and Anwar, A. (2022). Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home. Electronics, 11.","DOI":"10.3390\/electronics11071083"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"6671","DOI":"10.1007\/s00521-020-05447-9","article-title":"Neural-assisted image-dependent encryption scheme for medical image cloud storage","volume":"33","author":"Lakshmi","year":"2021","journal-title":"Neural Comput. Appl."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/s41939-019-00049-y","article-title":"Biometric authentication and image encryption for image security in cloud framework","volume":"2","author":"Kakkad","year":"2019","journal-title":"Multiscale Multidiscip. Model. Exp. Des."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1109\/TSC.2011.24","article-title":"Toward Secure and Dependable Storage Services in Cloud Computing","volume":"5","author":"Wang","year":"2011","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1831","DOI":"10.1016\/j.jnca.2012.07.007","article-title":"A combined approach to ensure data security in cloud computing","volume":"35","author":"Sood","year":"2012","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"20596","DOI":"10.1109\/ACCESS.2018.2817615","article-title":"Secure medical data transmission model for IoT-based healthcare systems","volume":"6","author":"Elhoseny","year":"2018","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/s12046-018-1013-9","article-title":"Joint medical image compression\u2013encryption in the cloud using multiscale transform-based image compression encoding techniques","volume":"44","author":"Raja","year":"2019","journal-title":"S\u0101dhan\u0101"},{"key":"ref_25","first-page":"499","article-title":"A light weight secure image encryption scheme based on chaos & DNA computing","volume":"29","author":"Mondal","year":"2017","journal-title":"J. King Saud Univ. Comput. Inf. Sci."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/7\/2\/23\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:29:05Z","timestamp":1760124545000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/7\/2\/23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,4]]},"references-count":25,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,6]]}},"alternative-id":["cryptography7020023"],"URL":"https:\/\/doi.org\/10.3390\/cryptography7020023","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,4]]}}}