Authenticated Public Key Elliptic Curve Based on Deep Convolutional Neural Network for Cybersecurity Image Encryption Application

The demand for cybersecurity is growing to safeguard information flow and enhance data privacy. This essay suggests a novel authenticated public key elliptic curve based on a deep convolutional neural network (APK-EC-DCNN) for cybersecurity image encryption application. The public key elliptic curve discrete logarithmic problem (EC-DLP) is used for elliptic curve Diffie–Hellman key exchange (EC-DHKE) in order to generate a shared session key, which is used as the chaotic system’s beginning conditions and control parameters. In addition, the authenticity and confidentiality can be archived based on ECC to share the EC parameters between two parties by using the EC-DHKE algorithm. Moreover, the 3D Quantum Chaotic Logistic Map (3D QCLM) has an extremely chaotic behavior of the bifurcation diagram and high Lyapunov exponent, which can be used in high-level security. In addition, in order to achieve the authentication property, the secure hash function uses the output sequence of the DCNN and the output sequence of the 3D QCLM in the proposed authenticated expansion diffusion matrix (AEDM). Finally, partial frequency domain encryption (PFDE) technique is achieved by using the discrete wavelet transform in order to satisfy the robustness and fast encryption process. Simulation results and security analysis demonstrate that the proposed encryption algorithm achieved the performance of the state-of-the-art techniques in terms of quality, security, and robustness against noise- and signal-processing attacks.


Introduction
The security of the data, infrastructure, and applications used to store, process, and transmit information falls under the name of cybersecurity, which is the method used to respond, monitor, and protect transmitted data and information. Through a cybersecurity perspective, the focus is on the secure exchange of information. However, current encryption methods are not reliable for effective image encryption [1]. To achieve the security requirements, we use the sensitivity property of the initial condition and control parameters inherent in chaotic methods. Based on the propagation and confusion properties of Shannon's diffusion, the security of the image ciphering algorithm is estimated. Chaotic maps are classified into two types: one-dimensional chaotic maps and higher-dimensional chaotic maps. One-dimensional chaotic maps with a single variable spanning discrete time steps include logistic maps, tent maps, and sine maps [2,3]. It is important to note that the chaotic maps have numerous flaws, including their small chaotic ranges and ease of conversion to the periodic map. We also point out that one of the flaws is the lack of sufficient control parameters [4][5][6][7]. On the other hand, chaotic maps with higher dimensions contain at mechanism that transforms the image pixels into a set of points on elliptical curves over a finite field, GF (p). The collected points are then subjected to elliptic curve (EC) operations, which improve the security of the encryption system and result in higher performance. EC over the finite field GF (p) is the foundation of an image encryption technique proposed in [31]. Using the public key to encrypt the obtained points, the mapping table's index value ranges from 0 to 255 while accounting for the image's pixels and pixel positions.
To our knowledge, the proposed method is among the earliest publications to employ public key elliptic curve cryptography incorporations with deep CNN to achieve the authentication properties and integrity. Moreover, instead of using the privet hey for both block and stream cipher for designing the privet key generator, this work presents a new research direction for using the proposed APK-EC-DCNN to automatically realize private and public key generator and satisfy the authentication properties with a high-security level. The key contributions of the proposed method are summarized as follow: (i) The DCNN is used with the public key elliptic cryptosystem in order to generate authenticated public key. (ii) A new Quantum Chaotic authenticated PK-EC Deep CNN generator is introduced. (iii) A robust APK-EC-DCNN partial image encryption based on the frequency domain is suggested.
The rest of this paper is organized as follows: in Section 2, the preliminaries that contain the PK-Elliptic curve cryptosystem and 3D Quantum Chaotic Logistic Map are discussed. In Section 3, the proposed PK-ECC-DCNN partial image encryption is introduced and discussed in detail. The simulation results and security assessments are displayed in Section 4. The proposed study's conclusion is then provided in Section 5.

Deep-Learning Networks
Since complex functions can be effectively expressed by using a multi-layer network structure, deep learning has emerged as a recent trend in scientific research and is used in a variety of applications (such as image processing, image classification [32,33], object detection [34,35], and image segmentation [36,37]). One of the subfields of deep learning is the Generative Adversarial Network (GAN) [38], which consists of the generator and the discriminator. The generator must keep track of the distribution of the sample data, while the discriminator must identify whether the input is real data or a manufactured sample. An alternative to the stream cypher generator is the deep-learning model, which has a large number of parameters, a complex network architecture, and a random training process.
In [39], a new algorithm based on a deep convolutional generated adversarial network (SCGANs) was introduced for chaotic block image encryption, and the Feistel network was improved. A new system combined with a deep and hyperchaotic convolutional adversarial network has also been proposed. The major goal was to deliver a key stream of random numbers that was more complex and unpredictable. A deep-learning-based streaming cypher generator and a stream cypher generator that produces the private key required to encrypt and decrypt medical images were also introduced by the researchers in [40]. Lately, work has been done to introduce the chaotic algorithm-based key generation and deep convolutional neural network-based picture encryption technique [41].
Recently, in the industry 5.0 technology, a new secure SIELNet encryption technique for color images has been introduced [42]. In order to encrypt color images in the first place, the authors provided a novel three-dimensional chaotic map, which produces cypher images that are related to the original images and this chaotic map has a good chaotic behavior. Second, the authors tackle the restricted super-resolution problem by reconstructing a lossy image from a compressed, encrypted image using a tailored residual dense spatial network.

PK-Elliptic Curve Cryptosystem
In image encryption algorithms, there are two commonly used cryptosystems: stream cipher and block cipher. Stream ciphers generally have a higher level of security than block ciphers like the Advanced Encryption Standard, International Data Encryption Algorithm, and Data Encryption Standard (AES), and they are also faster in terms of encryption and decryption speeds. They have low error propagation and better synchronization, and are cheaper to implement [43,44]. Linear feedback shift registers [45], nonlinear feedback shift registers [46], finite automation [47], linear congruence generators [48], and chaotic systems [49] are popular stream cypher generators. Public key encryption is more robust than the stream and block cipher. The elliptic curve discrete logarithm problem is the best algorithm now available for tackling the underlying mathematical problem of ECC, and it requires full exponential time. On the other hand, RSA and DSA rely on subexponentiallytemporal techniques to solve the discrete logarithm and integer factorization problems [50]. This suggests that, compared to methods for integer factorization and discrete logarithm issues, techniques for addressing the elliptic curve discrete logarithm problem become infeasible considerably more quickly as the problem size increases. Due to the muchreduced key size, ECC provides security levels comparable to RSA and DSA [50].
In this section, an overview of the ECC in data security was presented in [51]. In [52], the concept of the Kobltiz technology, which encodes and decodes visual data to the points of an elliptical curve, was introduced. The approach in [53] alters the dimensions of the input images first by using the k parameter. In [54], a matrix-based image coding strategy was presented using a fast-mapping technique. Alphanumeric character values are converted into (x, y) coordinates for elliptic curves utilizing various matrix characteristics, an elliptical curve, and a non-singular matrix. The mapping technology employed in the plan ensures the confidentiality of the encrypted data, enhancing the encryption system's security. ECC and its use in data security are surveyed by the authors in [54]. The authors compare the ECC-based encryption scheme to the current asymmetric key ciphering protocol and examine the ramifications of each. The ECC scheme's security weaknesses are also described.
The author compared the ECC-based encryption system to other asymmetric key cryptography methods in use today, such as RSA, and evaluated its drawbacks. The authors demonstrated how the ECC system has security issues. The majority of systems have limited key spaces and lengthy execution times. With the cubic equation, an elliptic curve EC over a finite field Fp is defined [51]: where p is a large prime number and a, b are two integers which are smaller than p and satisfies the following condition: In the above equations, each value of a, b p provides a different elliptic curve EC p,a,b where a, b, and p are the parameters of the elliptic curve. The PK-EC Diffie-Hellman Key Exchange [40] can be discussed as: Le G is a base point of an EC, P A and P B can be computed as [39]: where P A , P B are the sender's and receiver's public keys, and n A , n B are the respective private keys. The transmitter and receiver calculate the shared key as n A P B and n B P A , respectively. Sk = n A P B = n A n B G = n B n A G = n B P A For a specific point G on the EC of elliptic curve EC p (a, b), the private key n is exponentially complex to solve, where P u = nG, G is a base point, while n is a random integer. It is impossible to determine the discrete logarithm of P u with respect to a widely known base G. The elliptic curve discrete logarithmic problem (ECDLP) is significantly more secure than other encryption techniques that rely on the integer factorization problem for a certain key size [51].

3D Quantum Chaotic Logistic Map
An excellent example of a complex chaotic map that results from nonlinear dynamical equations is the quantum logistic map, which is generated by the classical logistic system and is a quantized version of a classical chaotic system [55][56][57][58]. While chaotic maps in higher dimensions, such as the one used in the proposed scheme, can result in an expansion of the key space range, they are overly complex, highly random, and highly sensitive to initial conditions and control parameters, as opposed to classical chaotic maps, which have low control parameters and, as a result, a small chaotic range. Therefore, using the quantum logistic system as the seed system in an encryption method is appropriate [59]. A quantum chaotic map was presented in [55], which is defined as: The main parameters used in the quantum chaotic map are the control parameter, the parameter, and the x 0 , y 0 , z 0 . respectively. The advantages of the quantum logistic map are its huge capacity, natural parallelism, and straightforward structure. Additionally, the chaotic patterns produced are more pseudorandom. For various control parameters, the quantum map's bifurcation diagram and Lyapunov exponent are provided in [55]. When r ≥ 3.99 and β ≥ 6, the quantum chaotic map can exhibit better chaotic behavior, as shown in Figures 1 and 2.

3D Quantum Chaotic Logistic Map
An excellent example of a complex chaotic map that results from nonlin ical equations is the quantum logistic map, which is generated by the class system and is a quantized version of a classical chaotic system [55][56][57][58]. While ch in higher dimensions, such as the one used in the proposed scheme, can resu pansion of the key space range, they are overly complex, highly random, and sitive to initial conditions and control parameters, as opposed to classical ch which have low control parameters and, as a result, a small chaotic range. Ther the quantum logistic system as the seed system in an encryption method is [59]. A quantum chaotic map was presented in [55], which is defined as: The main parameters used in the quantum chaotic map are the control the parameter, and the 0 , 0 , 0 respectively. The advantages of the quant map are its huge capacity, natural parallelism, and straightforward structure ally, the chaotic patterns produced are more pseudorandom. For various cont ters, the quantum map's bifurcation diagram and Lyapunov exponent are p [55]. When r ≥ 3.99 and β ≥ 6, the quantum chaotic map can exhibit better chaot as shown in Figures 1 and 2.

Proposed PK-ECC-DCNN Cryptosystem
In this section, the proposed PK-ECC-DCNN cryptosystem and its application in image encryption and authentication will be discussed. In the proposed image encryption cryptosystem, the PK-ECC Diffie-Hellman Key Exchange is used as a key exchange model based on the difficulty of the discrete logarithmic problem. The secret 3D quantum chaotic logistic map initial condition values and the control parameters will be extracted from the PK-ECC key exchange, which stuffy the authentication property. Based on the PK-ECC key exchange and the authentication property, the proposed authenticated chaotic DCNN key generator design is investigated. The outputs of the 3D quantum chaotic logistic map and the secure hash function are used to produce the proposed authenticated expansion diffusion matrix and the permutation confusion matrix. In the proposed cryptosystem, the partial image encryption can be achieved by using the discrete wavelet frequency domain transform.

Public Key Deep CNN Generator (PK-DCNNG)
In this section a public key is generated using Convolutional Neural Networks (CNNs). The pre-trained ResNet-18 convolutional neural network was used. This network is 18 layers deep [60], and it has been trained on more than 1-million images from the ImageNet database. This pre-trained network can categorize images into 1000 object categories, such as pencil, mouse, keyboard, and many more animal images. Thus, the network got acquainted with a lot of features for a large group of images. It is often much easier and faster to use transfer learning via pre-trained networks than to train a designed convolutional network from scratch. The proposed network model architecture is illustrated in Figure 3. The network contains 18 layers, 3 × 3 filters are used in convolutional layers, and the network is set up to ensure the number of filters is the same as the number of layers, if the output feature map is of the same size. However, when the output feature map is split in half, the filters are doubled in layers. By means of the convolutional layers by stride of 2, the down sampling is performed. The residual shortcut connections are inserted between layers throughout the network [61]. There are two types of connections. The first type is indicated by solid lines and is used when the input and output dimensions

Proposed PK-ECC-DCNN Cryptosystem
In this section, the proposed PK-ECC-DCNN cryptosystem and its application in image encryption and authentication will be discussed. In the proposed image encryption cryptosystem, the PK-ECC Diffie-Hellman Key Exchange is used as a key exchange model based on the difficulty of the discrete logarithmic problem. The secret 3D quantum chaotic logistic map initial condition values and the control parameters will be extracted from the PK-ECC key exchange, which stuffy the authentication property. Based on the PK-ECC key exchange and the authentication property, the proposed authenticated chaotic DCNN key generator design is investigated. The outputs of the 3D quantum chaotic logistic map and the secure hash function are used to produce the proposed authenticated expansion diffusion matrix and the permutation confusion matrix. In the proposed cryptosystem, the partial image encryption can be achieved by using the discrete wavelet frequency domain transform.

Public Key Deep CNN Generator (PK-DCNNG)
In this section a public key is generated using Convolutional Neural Networks (CNNs). The pre-trained ResNet-18 convolutional neural network was used. This network is 18 layers deep [60], and it has been trained on more than 1-million images from the Ima-geNet database. This pre-trained network can categorize images into 1000 object categories, such as pencil, mouse, keyboard, and many more animal images. Thus, the network got acquainted with a lot of features for a large group of images. It is often much easier and faster to use transfer learning via pre-trained networks than to train a designed convolutional network from scratch. The proposed network model architecture is illustrated in Figure 3. The network contains 18 layers, 3 × 3 filters are used in convolutional layers, and the network is set up to ensure the number of filters is the same as the number of layers, if the output feature map is of the same size. However, when the output feature map is split in half, the filters are doubled in layers. By means of the convolutional layers by stride of 2, the down sampling is performed. The residual shortcut connections are inserted between layers throughout the network [61]. There are two types of connections. The first type is indicated by solid lines and is used when the input and output dimensions are the same.
While the other type is used when increasing the dimensions, this type is referred to as the dotted lines. Identity mapping has been performed by this type of connection but with zeros padding with a stride of 2 for increased dimensions. are the same. While the other type is used when increasing the dimensions, this type is referred to as the dotted lines. Identity mapping has been performed by this type of connection but with zeros padding with a stride of 2 for increased dimensions. The input photos are presented hierarchically by the network. Higher-level features that were acquired utilizing the lower-level features of the preceding layers are found in deeper layers. Through the use of activations on the global pooling layer, also known as "pool5," we can acquire feature representations of training and test data at the conclusion of the network. In total, we obtain 512 features by aggregating the input features throughout all spatial areas by means of the global pooling layer. Through these image features, we obtain a value between 0 and 1. Finally, these values are converted to binary by comparing them with 0.5. If these values are less than 0.5, they will be 0. Otherwise, they will be 1.

Authenticated PK-Chaotic DCNN Key Generator
In this section, authenticated chaotic DCNN Key Generator (APK-C-DCNN-KG) has been investigated. Figures 4 and 5 show a block diagram of the proposed chaotic DCNN-AKG. The proposed structure chaotic DCNN-AKG consists of the proposed chaotic map, the DCNN, secure hash function (SHA-1) with output length 8 × 32-bit words, and the authentication expansion diffusion Matrix (AEDM). The SHA-1 has two concatenated inputs. The first input is the output of the DCNN, and the second is the variable chaotic secret values and lengths obtained from the proposed chaotic map, which can be vary from 128 × 32-bit words to 512 × 32-bit words. The SHA-1 is used for key authentication for both DCNN output and the variable chaotic secret values and lengths. The AEDM inputs are the 8 32-bit words output of the SHA-1 and second output of the proposed chaotic map of length varies from 64 32-bit words to 256 × 32-bit words. Figure 4 depicts the proposed AEDM's block diagram and the final output of the proposed AEDM is 2048 × 32-bit word. The proposed AEDM ultimate result can be converted to 256 × 256 × 8 bits, and then converted to 256 × 256 pixel as the size of the original image for the diffusion encryption step. The first and second variable chaotic secret lengths from the proposed chaotic map, which can be used as an input to the SHA-1 and the proposed AEDM, are The input photos are presented hierarchically by the network. Higher-level features that were acquired utilizing the lower-level features of the preceding layers are found in deeper layers. Through the use of activations on the global pooling layer, also known as "pool5," we can acquire feature representations of training and test data at the conclusion of the network. In total, we obtain 512 features by aggregating the input features throughout all spatial areas by means of the global pooling layer. Through these image features, we obtain a value between 0 and 1. Finally, these values are converted to binary by comparing them with 0.5. If these values are less than 0.5, they will be 0. Otherwise, they will be 1.

Authenticated PK-Chaotic DCNN Key Generator
In this section, authenticated chaotic DCNN Key Generator (APK-C-DCNN-KG) has been investigated. Figures 4 and 5 show a block diagram of the proposed chaotic DCNN-AKG. The proposed structure chaotic DCNN-AKG consists of the proposed chaotic map, the DCNN, secure hash function (SHA-1) with output length 8 × 32-bit words, and the authentication expansion diffusion Matrix (AEDM). The SHA-1 has two concatenated inputs. The first input is the output of the DCNN, and the second is the variable chaotic secret values and lengths obtained from the proposed chaotic map, which can be vary from 128 × 32-bit words to 512 × 32-bit words. The SHA-1 is used for key authentication for both DCNN output and the variable chaotic secret values and lengths. The AEDM inputs are the 8 32-bit words output of the SHA-1 and second output of the proposed chaotic map of length varies from 64 32-bit words to 256 × 32-bit words. Figure 4 depicts the proposed AEDM's block diagram and the final output of the proposed AEDM is 2048 × 32-bit word. The proposed AEDM ultimate result can be converted to 256 × 256 × 8 bits, and then converted to 256 × 256 pixel as the size of the original image for the diffusion encryption step. The first and second variable chaotic secret lengths from the proposed chaotic map, which can be used as an input to the SHA-1 and the proposed AEDM, are provided from the PK-EC Diffie-Hellman Key Exchange and the proposed 3D QCLM. The expanded diffusion values W 17 to W L are provided by: where "t" is the index parameter started from 17 to L; σ 1 , σ 2 , σ 3 , σ 4 are provided by: In addition, the operations "+" is mod 2 32 addition, "R n " is right shift by "n" bits, and "⊕" is the XOR operation.
provided from the PK-EC Diffie-Hellman Key Exchange and the proposed 3D QCLM. The expanded diffusion values 17 to are provided by: where "t" is the index parameter started from 17 to L; 1 , 2 , 3 , 4 are provided by: In addition, the operations "+" is mod 2 32 addition, " " is right shift by "n" bits, and "⊕" is the XOR operation.
The block diagram of the proposed authenticated public key generation is shown in Figure 4. Figure 4 shows that the proposed authenticated public key generator depends on the proposed deep convolutional neural network and the proposed authentication expansion diffusion Matrix in order to achieve the authentication strategy. The proposed Authenticated Expansion Diffusion Matrix (AECM) design is shown in Figure 5.

Proposed APK-EC-DCNN Partial Image Encryption
This study proposes a new scheme for partial image encryption. A new authenticated public key deep convolutional neural network was proposed in order to authenticate the public key generated by the Deep Convolutional Neural Network. In addition, the en-  The block diagram of the proposed authenticated public key generation is shown in Figure 4. Figure 4 shows that the proposed authenticated public key generator depends on the proposed deep convolutional neural network and the proposed authentication expansion diffusion Matrix in order to achieve the authentication strategy. The proposed Authenticated Expansion Diffusion Matrix (AECM) design is shown in Figure 5.

Proposed APK-EC-DCNN Partial Image Encryption
This study proposes a new scheme for partial image encryption. A new authenticated public key deep convolutional neural network was proposed in order to authenticate the public key generated by the Deep Convolutional Neural Network. In addition, the encrypted key exchanged scheme is based on the public key elliptic curve Diffie-Hellman key exchange protocol. This encrypted key exchange depends on how challenging the discrete logarithmic problem is to solve. The block diagram of Proposed PK-EC-APK-DCNN partial image encryption/decryption algorithm is shown in Figure 6.

Proposed APK-EC-DCNN Partial Image Encryption
This study proposes a new scheme for partial image encryption. A new authenticated public key deep convolutional neural network was proposed in order to authenticate the public key generated by the Deep Convolutional Neural Network. In addition, the encrypted key exchanged scheme is based on the public key elliptic curve Diffie-Hellman key exchange protocol. This encrypted key exchange depends on how challenging the discrete logarithmic problem is to solve. The block diagram of Proposed PK-EC-APK-DCNN partial image encryption/decryption algorithm is shown in Figure 6. In addition, in order to achieve real-time processing, the partial encryption technique based on the discrete wavelet transforms where only a quarter part of all images will be encrypted so it can save computational time and cost. The two-dimensional (2D DWT) is used to achieve real-time processing. Each level of decomposition in 2D DWT yields four bands of data, one of which corresponds to the low pass band (LL), and the other three to the high pass bands (horizontal (HL), vertical (LH), and diagonal (HH)). Figure 7 shows the one-level wavelet decomposition of Lena and its corresponding wavelet decomposition sub-band mod. As illustrated in Figure 7, the 2-D DWT can be built utilizing two digital channel filters and a collection of down samplers. A Low-Pass Filter (LPF) and a High-Pass Filter (HPF) are the digital filters that are utilized. The image is subjected to a first-level (1-L) 2-D DWT to produce four distinct sub-images. In addition, in this paper, we used the Haar filter, which is a popular filter in the wavelet family. In addition, in order to achieve real-time processing, the partial encryption technique based on the discrete wavelet transforms where only a quarter part of all images will be encrypted so it can save computational time and cost. The two-dimensional (2D DWT) is used to achieve real-time processing. Each level of decomposition in 2D DWT yields four bands of data, one of which corresponds to the low pass band (LL), and the other three to the high pass bands (horizontal (HL), vertical (LH), and diagonal (HH)). Figure 7 shows the one-level wavelet decomposition of Lena and its corresponding wavelet decomposition sub-band mod. As illustrated in Figure 7, the 2-D DWT can be built utilizing two digital channel filters and a collection of down samplers. A Low-Pass Filter (LPF) and a High-Pass Filter (HPF) are the digital filters that are utilized. The image is subjected to a first-level (1-L) 2-D DWT to produce four distinct sub-images. In addition, in this paper, we used the Haar filter, which is a popular filter in the wavelet family. Authenticated Key Generation, confusion, and diffusion process are three steps used in the suggested partial encryption scheme. The Authenticated Key Generation is discussed in Section 3.2 in Algorithm 1. The confusion process is performed based on the Authenticated Key Generation, confusion, and diffusion process are three steps used in the suggested partial encryption scheme. The Authenticated Key Generation is discussed in Section 3.2 in Algorithm 1. The confusion process is performed based on the third output of the 3D QCLM, in which a high degree of scrambling and randomization can be achieved. In addition, the diffusion process is used to change the image pixel values for cryptographic process. The authentication property can be achieved as follows: 1. Authenticated public key elliptic curve based on deep convolutional neural network has been introduced in the paper. 2. The public key elliptic curve cryptography incorporates with deep CNN is used to achieve authentication properties and integrity. 3. Authenticated expansion diffusion matrix (AEDM) is designed in this paper based on the secure hash function (SHA), which uses the output sequence of the DCNN and the output sequence of the robust chaotic map in order to satisfy the authentication property.

Deep CNN step
Step 1 Read the multi-image matrixes with the same size in Concatenated Structure A, B Step 2 Use the multi-image matrixes with the same size in concatenated structure as input to the DCNN to generate 512 output bits (C) Step 3 Extract the initial conditions and the control parameters from the PK-EC Diffie-Hellman Key Exchange (PK EC DHKE) for the 3D QCLM Step 4 Run the 3D QCLM and concatenate the 5120 bits from the 'x' (the first dimension) output with the output of DCNN 512 bits to get the 5632 bits (L) 1.2 SHA-1 and AEDM Step 5 Use the 5632 bits (L) as input to the SHA-1 to produce authenticated 256 bits (S) Step 6 Run the 3D QCLM and concatenate the 5120 bits from the 'y' (the second dimension) output and concatenated with the authenticated 256 bits (S) Step 7 The AEDM algorithm used the concatenated (y||S) bit vector of 5632-bit length in order to produce the diffusion matrix "D" of length 256 × 256 × 8-bit vector by using Equations (12)- (16) Step 8 Convert the diffusion matrix "D" to 256 × 256 pixel (the original image size) Step 9 The chaotic sequences of the third dimension "z" output of the 3D QCLM output is obtained after a predetermined number of iterations is used to generate the permutation index matrix of length 128 × 128 sorted values based on the "z" output of the 3D QCLM as: Z = sort (z) (13) Here, the function sort (.) returns a random index vector with the ascending order

Encryption Process
Step 1: Applying DWT to the image "I" yields the approximation matrices LL, diagonal HH, horizontal HL, and vertical LH.
Step 2: The permutation step is done in the frequency domain (the approximation LL' matrix), by using the sort function indicated in Equation (13); this will cut down on calculation time and cost.
Step 4: Based on the authenticated diffusion matrix, the diffusion process can be achieved by using the exoring operation between the output of the IDWT step with the output of the authenticated encrypted diffusion matrix (D).
Step 5: The second user uses the same keys and secret same parameters to generate the authenticated encryption diffusion matrix and the permutation index matrix.

Decryption Process
Step 1: Based on the PK-EC Diffie-Hellman Key Exchange, the initial conditions and control parameters for the 3D QCLM can be generated.
Step 2: The second generates the same keys and the secret same parameters to generate the authenticated encryption diffusion matrix and the permutation index matrix.
Step 3: The first step in the decryption process is exoring operation the encrypted image with the output of the authenticated encrypted diffusion matrix (D).
Step 4: The second step in the decryption process started by applying DWT to the encrypted image yields the approximation matrices "LL," diagonal "HH," horizontal "HL," and vertical "LH." Step 5: Applying the de-permutation on the (sub-band) approximation matrices "LL" to obtain the de-permutation sub-band "LL." Step 6: Applying the IDWT to the all-sub-bands ("LL," "HH," "HL," "LH") to generate the decrypted image.

Simulation Results and Security Analysis
The parameters selected for EC in 64-bit in this study are p = 113, a = −1, b = 17, and G = (52,61). The proposed method will be used for grayscale images and Lena images for results comparison. By measuring the resistance of a cipher system to various attacks (such as statistical attack, known plaintext attack, differential attack, various brute force attack, and ciphertext attack), the robustness of the cipher system is evaluated. In order to evaluate the proposed scheme, a safety analysis was conducted on it by discussing entropy, histograms, correlation coefficient NPCR, UACI, MSE, and the NIST and randomness tests.

Randomness Test
The proposed AC-DCNN-KG randomization was tested using the 16 statistical tests that made up the NIST test suite. By means of these tests, it is possible to determine whether or not the generated sequence is random. Among these tests, the probability value (the p-value) is mainly relied upon. The boundary between the region of rejection or non-rejection is the comparison of the p-value to the level of significance. In Nest, the significant level is 0.01. When the value of P is less than 0.01, it means that the order is not arbitrary and, therefore, rejected. The order is reasonable and arbitrary when the p value is bigger than 0.01, though. The proposed authentication expansion diffusion matrix's binary sequence of 10 6 bits is tested using SP800-22 [62,63], and the results are shown in Table 1.

Chi-Squared (Histogram) Analysis
We can spread the image's pixel intensities by plotting the histogram. For effective encryption, the histogram of the encrypted image must be flat and homogeneous. As a result, there is no connection between the original image and the encrypted image, and no data that could be used to decode the original image. Figure 8 shows the histogram of satellite images sat1, sat2, and sat3. In addition, Figure 8d-f indicates the histogram of (a-c); (g-i) encrypted images of (a-c); (j-l) histograms of (g-i). Finally, as seen in Figure 8, the histogram of the encrypted image is regular and notably different from the histogram of the original image as a result of the diffusion and confusion used in the suggested approach. Thus, it is protected from statistical assaults.
The chi-squared test (χ 2 ), created by renowned statistician Pearson is used to compare two frequencies: the expected frequency and the observed frequency from the experiment [64]. This test is crucial in determining how resilient an encryption is against statistical assault in image encryption. The histogram of an image's distinctive pattern should be able to be changed by the encryption method into a straight line-like no-pattern known as a uniform distributed histogram. In a conventional image, each grey level has a different frequency, whereas in an encrypted image, each grey level must have the same frequency. Using Equation (14), the Chi-squared test calculated the difference in frequency between the plain image and the encrypted image [64].
In the above-mentioned Equation (14), where M × N/256 is the predicted frequency and U k represents the observed frequency of each grey level (0-255) for an original image, the difference between the two frequencies must be small in order for the test to be considered successful. When the Chi-square value is equal to α = 0.05, the critical Chi-square value χ 2 0.05 (255) = 293.2478. (d-f) Histogram of (a,c,d); (gi) encrypted images of (a-c); (j-l) histograms of (g-i).
In order to use the 2 test, we prepere differents encrypted images by changing 1bit of a pixel at a time different in original images. The Chi-square value score of different encrypted images is listed in Table 2, which proves that the proposed cryptosystem uniformly distributed the pixel values from 0 to 255. In Table 3, the Chi-square results test for 100 encrypted Lena images under α = 0:05 is studied and compared with recent researches. (d-f) Histogram of (a,c,d); (g-i) encrypted images of (a-c); (j-l) histograms of (g-i).
In order to use the χ 2 test, we prepere differents encrypted images by changing 1-bit of a pixel at a time different in original images. The Chi-square value score of different encrypted images is listed in Table 2, which proves that the proposed cryptosystem uniformly distributed the pixel values from 0 to 255. In Table 3, the Chi-square results test for 100 encrypted Lena images under α = 0:05 is studied and compared with recent researches. Ref. [64] 252. 53 5 Ref. [65] 264.83 -

Correlation Coefficient
Each pixel in the original image has a strong correlation with its surrounding pixels. There is no correlation between neighboring pixels in the vertical, horizontal, or diagonal directions thanks to the strong encrypted system, which minimizes this correlation to the lowest feasible value. The correlation between neighboring pixels of the satellite image is shown in Figure 9a-c, and its cypher image correlation is also obtained in Figure 9d-f in the horizontal, vertical, and diagonal directions. In an image, the correlation coefficient C r from Equation (15) is calculated between each pair of neighboring pixels. The correlation value should be close to zero [41]. The estimated correlation coefficients for each plain image and its associated cypher image are compared in Table 4 for each image. The correlation coefficients of the encrypted images, which were close to zero while the correlation coefficients of the original images were close to one, clearly show that the proposed technique is very robust to statistical attacks. The C r values of the ciphered images are very near to zero. As a result, the suggested encryption system has good confusion and diffusion properties and can withstand statistical attacks.  [11] Lena −0.0084 -0.0017 −0.0019 Ref. [12] Lena −0.0042 0.0004 −0.0036

Information Entropy
Entropy, which indicates uncertainty in the cypher image, is used to calculate the unpredictability of the received image. Strong randomness and confidentiality are indicators of a high entropy for the encoded image [65][66][67]. According to one definition, the information system's entropy is specified as:

Information Entropy
Entropy, which indicates uncertainty in the cypher image, is used to calculate the unpredictability of the received image. Strong randomness and confidentiality are indicators of a high entropy for the encoded image [65][66][67]. According to one definition, the information system's entropy is specified as: where "m" is the source of information, N total number of bits represents the symbol m i , p (m i ) probability of symbol m i , the best value of the information entropy close to the value 8. According to Table 5, which shows the information entropy of the ciphered image created by our algorithm to be close to 8, the suggested cryptosystem has a low probability that an attacker will be able to decode a cypher image.

Key Space Analysis
The collection of all keys used in an image encryption system is known as key space. This key set should be sufficiently big to fend off a brute force attack and produce a successful strategy. This scheme can be evaluated by measuring the sensitivity of the key and the number of keys. In the proposed scheme, assuming that the double-precision binary floating-point IEEE 754 format is employed as 10 −15 , the 3D QCLM has different five secret parameters (x 0 , y 0 , z 0 , r, β) with 10 16×5 = 10 80 . The SHA output is 256 bits, so it has a key space of 2 256 . In addition, the keys will be exchanged by means of a 256-bit elliptic curve parameter using ECC. The raw parameters of the logistic map are derived to generate a 256-bit sequence using secretly shared elliptic curve point nG. The recipient receives the shared key nG as encrypted data P u . It is extremely hard to extract nG from P u , which necessitates knowing the private key n. Note that ECC has a little key size if compared with RSA [30]. In addition, the 256-bit key is used to generate the key matrix. The total key space of the proposed cryptosystem is 2 924 . It is known that the minimum key space necessary to resist brute-force attacks is 2 100 , so the entire key space for the proposed cryptosystem is very large. Table 6 provides a comparison of key space with current designs.

Key Sensitivity Analysis
A robust encryption technique has high-key sensitivity across the board. As a result, a slight modification to the key results in the production of a completely different cypher image. Additionally, a small modification to the decryption key prevents the recovery of the original sound [28]. By encrypting the various images with the proper key as shown in Figure 10, the suggested approach tests the sensitivity of the key in different three satellite images (sat1, sat2, sat3) (a, b, c). The encrypted image in Figure 10g-l is decrypted using a working different key with a very small changes in the correct key. A slightly different key than the one used to encrypt the original image is used in Figure 10m-o. These significant discrepancies demonstrate that the suggested approach has a high raw key sensitivity and, as a result, a robust resistance against statistical attacks.

Differential Attack Analysis
Diffusion performance is one metric used to gauge an image encryption system's strength. That implies that the plain image's pixels have a significant influence on the cypher image's pixels. This time, the resistance to the differential attack can be assessed by altering the plain image by one bit and comparing the variations in the cypher images; as

Differential Attack Analysis
Diffusion performance is one metric used to gauge an image encryption system's strength. That implies that the plain image's pixels have a significant influence on the cypher image's pixels. This time, the resistance to the differential attack can be assessed by altering the plain image by one bit and comparing the variations in the cypher images; as a result, a whole different cypher image must be provided. The image coding scheme is secured using two quantitative measures against differential attack, the two measures are the average intensity of uniform change and the rate of pixel change (NPCR) [66].
where M and N are the width and height of the plain image, respectively, and C 1 (i, j) and C 2 (i, j) are the values of the pixels in the position (i, j) of the two cypher pictures. The number of grey levels is 255; C 1 and C 2 are the plain image before and after changing one bit; and D (i, j) is specified as follows: The conceptual values of NPCR = 99.61% and U ACI = 33.46. When the NPCR and UACI values are greater than or equal to these theoretical values, a better and more secure coding system is obtained. The value of one randomly chosen pixel was changed for the suggested technique, and the cypher images of the original image and the modified image, C 1 and C 2 , were then calculated respectively, and NPCR and UACI were calculated for the different images. The result is shown in Table 7.

Noise Attack Analysis
A data loss attack occurs when a potential intruder intentionally removes pixels from a specific area of an encrypted image or loses some of the image as it is being transmitted over the internet. If a cryptosystem recovers the crucial data from the encrypted image, which loses the data, it is flawless. Images often contain information, but during transmission, some noise contaminates the image [65,66]. The original information in the image can be missed if noise appears. (e.g., the sound of pepper and salt). This article examines the impact of our encryption system on the image of Lena, and different salt and pepper noise ratios serve as indicators of the intensity of the attack. Gaussian noise, salt and pepper, speckle noise, and the filtering attack are studied for the noise attack analysis [65,66]. In this section, we added the ciphertext image with the noise before decryption step. The PSNR is used to evaluate the degree to which the proposed technique obscures the image encrypted in order to show its efficacy. The lowest possible PSNR value is ideal for the highest level of encryption. Using the following mathematical formula, PSNR is determined [65,66]: where I (i, j) is the pixel value in plane image at pixel point (i, j), and C (i, j) is the pixel value in cipher image at pixel point (i, j). Figure 10 displays the decrypted image with various noise levels. Table 8 shows the PSNR for different encrypted images, and it concluded that the PSNR possesses a very small value, which means that the proposed cryptosystem has a robust encryption algorithm.  Tables 9 and 10 show the Gaussian noise, salt and pepper, speckle noise, and filtering attack effects on the decrypted Lena images and its PSNR values. These tables demonstrate that the proposed technique can withstand noise attacks by showing that when the noise reaches different level values, the decryption result can also be detected with the human eye.

Computational Complexty
The relationship between complexity and cryptography is very important in encryption algorithm designs. The encryption algorithms consist of the key generation step and the image encryption step. In the key generation step, the time complexity of generation chaotic sequence with × length is ( × ). In addition, the image encryption step, pixel permutation, and diffusion are both linear operations in which the time complexity of permutation is ( × ) and the time complexity of diffusion is the time complexity of permutation. Finally, the total time complexity of the image encryption step is (2 × × ) [67].
In the proposed cryptosystem, using DWT in the image encryption, only the approximation matrix LL is permuted in the frequency domain. Therefore, the time complexity

Computational Complexty
The relationship between complexity and cryptography is very important in encryption algorithm designs. The encryption algorithms consist of the key generation step and the image encryption step. In the key generation step, the time complexity of generation chaotic sequence with × length is ( × ). In addition, the image encryption step, pixel permutation, and diffusion are both linear operations in which the time complexity of permutation is ( × ) and the time complexity of diffusion is the time complexity of permutation. Finally, the total time complexity of the image encryption step is (2 × × ) [67].
In the proposed cryptosystem, using DWT in the image encryption, only the approximation matrix LL is permuted in the frequency domain. Therefore, the time complexity

Computational Complexty
The relationship between complexity and cryptography is very important in encryption algorithm designs. The encryption algorithms consist of the key generation step and the image encryption step. In the key generation step, the time complexity of generation chaotic sequence with × length is ( × ). In addition, the image encryption step, pixel permutation, and diffusion are both linear operations in which the time complexity of permutation is ( × ) and the time complexity of diffusion is the time complexity of permutation. Finally, the total time complexity of the image encryption step is (2 × × ) [67].
In the proposed cryptosystem, using DWT in the image encryption, only the approximation matrix LL is permuted in the frequency domain. Therefore, the time complexity

Computational Complexty
The relationship between complexity and cryptography is very important in encryption algorithm designs. The encryption algorithms consist of the key generation step and the image encryption step. In the key generation step, the time complexity of generation chaotic sequence with × length is ( × ). In addition, the image encryption step, pixel permutation, and diffusion are both linear operations in which the time complexity of permutation is ( × ) and the time complexity of diffusion is the time complexity of permutation. Finally, the total time complexity of the image encryption step is (2 × × ) [67].
In the proposed cryptosystem, using DWT in the image encryption, only the approximation matrix LL is permuted in the frequency domain. Therefore, the time complexity

Computational Complexty
The relationship between complexity and cryptography is very important in encryption algorithm designs. The encryption algorithms consist of the key generation step and the image encryption step. In the key generation step, the time complexity of generation chaotic sequence with × length is ( × ). In addition, the image encryption step, pixel permutation, and diffusion are both linear operations in which the time complexity of permutation is ( × ) and the time complexity of diffusion is the time complexity of permutation. Finally, the total time complexity of the image encryption step is (2 × × ) [67].

Computational Complexty
The relationship between complexity and cryptography is very important in encryption algorithm designs. The encryption algorithms consist of the key generation step and the image encryption step. In the key generation step, the time complexity of generation chaotic sequence with × length is ( × ). In addition, the image encryption step, pixel permutation, and diffusion are both linear operations in which the time complexity of permutation is ( × ) and the time complexity of diffusion is the time complexity of permutation. Finally, the total time complexity of the image encryption step is (2 × × ) [67,68].

Computational Complexty
The relationship between complexity and cryptography is very important in encryption algorithm designs. The encryption algorithms consist of the key generation step and the image encryption step. In the key generation step, the time complexity of generation chaotic sequence with × length is ( × ). In addition, the image encryption step, pixel permutation, and diffusion are both linear operations in which the time complexity of permutation is ( × ) and the time complexity of diffusion is the time complexity of permutation. Finally, the total time complexity of the image encryption step is (2 × × ) [67,68].

Computational Complexty
The relationship between complexity and cryptography is very important in encryption algorithm designs. The encryption algorithms consist of the key generation step and the image encryption step. In the key generation step, the time complexity of generation chaotic sequence with × length is ( × ). In addition, the image encryption step, pixel permutation, and diffusion are both linear operations in which the time complexity of permutation is ( × ) and the time complexity of diffusion is the time complexity of permutation. Finally, the total time complexity of the image encryption step is (2 × × ) [

Computational Complexty
The relationship between complexity and cryptography is very important in encryption algorithm designs. The encryption algorithms consist of the key generation step and the image encryption step. In the key generation step, the time complexity of generation chaotic sequence with M × N length is O(M × N). In addition, the image encryption step, pixel permutation, and diffusion are both linear operations in which the time complexity of permutation is O(M × N) and the time complexity of diffusion is the time complexity of permutation. Finally, the total time complexity of the image encryption step is O(2 × M × N) [67,68].
In the proposed cryptosystem, using DWT in the image encryption, only the approximation matrix LL is permuted in the frequency domain. Therefore, the time complexity of permutation can be obtained by O(M × N/4). The diffusion process is applied after using the IDWT for to the four sub-bands (LL, HH, HL, LH). Then, the time complexity of the encryption process is O(M × N).  N). Therefore, the time complexity is 81920, and computational complexity saving is 37.5% compared with any full encryption scheme. For images with a size of M × N where M × N are (512 ×512) and (1024 ×1024), the computational complexity saving will be increased.

Conclusions
A new elliptic curve with public key authentication based on deep convolutional neural network (APK-EC-DCNN) for cybersecurity image encryption application is suggested. The public key elliptic curve cryptography, incorporated with deep CNN, is used to achieve the authentication properties and integrity. In addition, an authenticated expansion diffusion matrix (AEDM) is designed in this paper based on the secure hash function, which uses the output sequence of the DCNN and the output sequence of the robust chaotic map in order to satisfy the authentication property. The experimental analysis shows that the proposed APK-EC-DCNN cryptosystem satisfies a very competitive encryption performance and can resist common attacks. In addition, the results indicate that the proposed cryptosystem has large key space, pseudo-randomness, one-time pad, and highly sensitive to change. In addition, the deep-learning mechanism is used in the encryption process, which considered a new direction of the encryption cryptosystems. The robustness of the encryption system is assessed by testing the resistance of the proposed system to numerous attacks. A safety analysis was done on the suggested method to evaluate it, and it included discussions of the histogram, entropy, correlation coefficient, NPCR, UACI, and NIST randomness tests.
This work contributes to the existing literature by further exploring the weaknesses of using the deep CNN as a feature extraction of an images as a secret key, which is used in recent works on image encryption. Moreover, the proposed cryptosystem introduces the use of public key elliptic curve cryptosystem in order to generate authenticated public key. In addition, an authenticated chaotic DCNN key generator is designed in order to achieved the authentication property. Moreover, the partial image encryption based on the frequency domain is used the discrete wavelet transform. The PK-EC Diffie-Hellman Key Exchange is used to share and extract the initial conditions and the control parameters for the 3D QCLM.
In future work, we will suggest a new deep CNN suitable for generating a digital signature in order to satisfy the identity property. In addition, the integration of the digital signature with the encryption can be designed as a digital deep CNN signcryption scheme. In addition, future research could focus on stream video encryption/decryption, watermarking, data hiding in encrypted images. Moreover, a compression-encryption system based on a new Deep Convolutional Neural Network will be suggested.