Image Security Acquisition and Efficient Transmission Algorithm Based on Deep Learning and Neural Network

Authors

  • Jianwei Ma Guizhou Power Grid Co., Ltd
  • Jing Luo Guizhou Power Grid Co., Ltd
  • Zhongqiang Zhou Guizhou Power Grid Co., Ltd
  • Yusong Huang Guizhou Power Grid Co., Ltd
  • Ling Liang Guizhou Power Grid Co., Ltd
  • Chan Wang Guizhou Power Grid Co., Ltd
  • Zhencheng Li Guizhou Power Grid Co., Ltd

DOI:

https://doi.org/10.4108/eetsis.8413

Keywords:

Image Encryption, Generative Adversarial Network, Convolutional Neural Network, Image Compression, Image Restoration

Abstract

INTRODUCTION: Image encryption algorithms of a traditional nature exhibit high computational complexity which in turn creates bottlenecks in performance due to encrypted image operations in real-time image acquisition systems, adversely impacting real-time performance as well as processing efficiency.

OBJECTIVES: To this end, this paper applies an image security acquisition and efficient transmission algorithm based on GAN (Generative Adversarial Network) and CNN (Convolutional Neural Network).

METHODS: First, a GAN is used for image encryption. By training the generator and discriminator, the generator encrypts the image into an invisible form, and the discriminator ensures that the encrypted image is significantly different from the original image, thereby enhancing the image security. Secondly, CNN is used for image compression. By designing an autoencoder structure, CNN extracts high-level features of the image and compresses it, which reduces bandwidth requirements while ensuring image quality.

RESULT: For packet loss or noise pollution that may occur during transmission, the CNN-based image restoration network effectively repairs the missing image part, and the restoration process improves the image restoration quality through multi-level feature extraction and reconstruction technology.

CONCLUSION: Experiments show that the model has good real-time performance for large-size images; the SSIM (Structural Similarity Index) is higher than 0.9 in packet loss environments; the transmission delay is less than 0.5 seconds under different compression ratios.

References

[1] Paul RK, Misra D, Sen S, Chandran S. Optimization of microscopy image compression using convolutional neural networks and removal of artifacts by deep generative adversarial networks. Multimedia Tools and Applications. 2024;83(20):58961–58980.

[2] Wang Y, Wang F, Liu F, Zhang M. Securing content-based image retrieval on the cloud using generative models. Multimedia Tools and Applications. 2022;81(22):31219–31243.

[3] Liu Z, Xue R. Visual image encryption based on compressed sensing and Cycle-GAN. The Visual Computer. 2024;40(8):5857–5870.

[4] Neela KL, Kavitha V. Blockchain based chaotic deep GAN encryption scheme for securing medical images in a cloud environment. Applied Intelligence. 2023;53(4):4733–4747.

[5] Chai X, Tian Y, Gan Z, Chen Y. A robust compressed sensing image encryption algorithm based on GAN and CNN. Journal of Modern Optics. 2022;69(2):103–120.

[6] Fang P, Liu H, Wu C, Zhang Y. A block image encryption algorithm based on a hyperchaotic system and generative adversarial networks. Multimedia Tools and Applications. 2022;81(15):21811–21857.

[7] Bao Z, Xue R, Jin Y. Image scrambling adversarial autoencoder based on the asymmetric encryption. Multimedia Tools and Applications. 2021;80(18):28265–28301.

[8] Wu J, Xia W, Zhu G, Zhang X. Image encryption based on adversarial neural cryptography and SHA controlled chaos. Journal of Modern Optics. 2021;68(8):409–418.

[9] Nagarajan H, Alagarsundaram P, Sitaraman SR, Alanda A. Enhanced RDH in encrypted image with high embedding efficiency using MSB prediction, matrix encoding, and separable CDM for non-volatile memory cloud services. International Journal of Advances in Computer Science & Engineering Research. 2025;1(1).

[10] Xu C, Sun W, Li M. DTT: A dual-domain transformer model for network intrusion detection. EAI Endorsed Transactions on Scalable Information Systems. 2024;11(6).

[11] Bhurani K, Dogra A, Agarwal P, Shrivastava P, Singh TP, Bhandwal M. Smart contracts for ensuring data integrity in cloud storage with blockchain. EAI Endorsed Transactions on Scalable Information Systems. 2024;11(6).

[12] Yin J, Hong W, Wang H, Cao J, Miao Y, Zhang Y. A compact vulnerability knowledge graph for risk assessment. ACM Transactions on Knowledge Discovery from Data. 2024;18(8):1–17.

[13] Ge YF, Wang H, Bertino E, Cao J, Zhang Y. Multiobjective privacy-preserving task assignment in spatial crowdsourcing. IEEE Transactions on Cybernetics. 2025.

[14] Liu X, Meng X, Wang Y, Zhang Y. Known-plaintext cryptanalysis for a computational-ghost-imaging cryptosystem via the Pix2Pix generative adversarial network. Optics Express. 2021;29(26):43860–43874.

[15] Li Z, Zhang M, Liu J. Robust image steganography framework based on generative adversarial network. Journal of Electronic Imaging. 2021;30(2):023006.

[16] Li J, Li Y, Li J, Zhang Y. Single-pixel compressive optical image hiding based on conditional generative adversarial network. Optics Express. 2020;28(15):22992–23002.

[17] Chun D, Kim TS, Lee K, Kim CS. Compressed video restoration using a generative adversarial network for subjective quality enhancement. IEIE Transactions on Smart Processing & Computing. 2020;9(1):1–6.

[18] Goudjil A, Benyoucef A, Hamadouche MH, Riahla MA. Efficient DNA-based logistic mapping algorithm for color image encryption. EAI Endorsed Transactions on Scalable Information Systems. 2025;12(2).

[19] Chai X, Tian Y, Gan Z, Lu Y, Wu XJ, Long G. A robust compressed sensing image encryption algorithm based on GAN and CNN. Journal of Modern Optics. 2022;69(2):103–120.

[20] Cheng J, Wu J, Leng C, Wang Y, Hu Q. Quantized CNN: A unified approach to accelerate and compress convolutional networks. IEEE Transactions on Neural Networks and Learning Systems. 2017;29(10):4730–4743.

[21] Cheng J, Wu J, Leng C, Wang Y, Hu Q. Quantized CNN: A unified approach to accelerate and compress convolutional networks. IEEE Transactions on Neural Networks and Learning Systems. 2017;29(10):4730–4743.

[22] Mallick B, Parida P, Nayak C, Ali N, Panda MK, Prasad B, Palai G. Secure real-time transmission of multi-spectral satellite images inducing a 6D hyper-chaotic system and BB84 QKD protocol. Alexandria Engineering Journal. 2025;122:364–384.

[23] Khan PW, Byun Y. A blockchain-based secure image encryption scheme for the industrial Internet of Things. Entropy. 2020;22(2):175.

Downloads

Published

07-01-2026

How to Cite

1.
Ma J, Luo J, Zhou Z, Huang Y, Liang L, Wang C, et al. Image Security Acquisition and Efficient Transmission Algorithm Based on Deep Learning and Neural Network. EAI Endorsed Scal Inf Syst [Internet]. 2026 Jan. 7 [cited 2026 Jan. 8];12(6). Available from: https://publications.eai.eu/index.php/sis/article/view/8413