1. Introduction
The number of active Internet users across the world is 4.66 billion, which constitutes 59.57 percent of the world’s population. Many images and videos are being produced on social media of which nearly 50 percent are not authentic. Lots of images and videos are being tampered with for financial and other gains [
1,
2,
3]. Anyone can make extremely believable fake images utilizing software tools that are readily available online [
4]. Satellite lane images are also being tampered with, which causes a lot of trouble for researchers and scientists to use them in their predictions. Hence, there is a need for classifying and preserving the satellite lane images for utilizing them in further predictions.
There are various models such as Random Forest, VGG-19, and robust hashing for the classification of lane images as fake or authentic. Moreover, there are models such as YOLO, which is an autoencoder for lane image detection. However, these models are not efficient when compared with the proposed solution. The accuracy is also low and the training time required for the above models is high. To overcome the hurdles discussed above, a real-time solution is proposed. The proposed methodology makes use of the ANN algorithm for the classification of an image as fake or genuine. An ANN algorithm allows backpropagation, which helps in increasing the accuracy. The U-Net algorithm is used in the detection of lane images. The proxy re-encryption (PRE) technique is used in the encryption process for enhancing security [
5].
1.1. Problem Statement and Motivation
There are some machine learning algorithms involved in the classification and detection of satellite images such as Random Forest, Naïve Bayes, RCNN, and Support Vector Machine (SVM). However, these achieved less accuracy and are also computationally very expensive. Machine learning algorithms involving convolutional neural networks (CNN), artificial neural networks (ANN), and U-Net, which are used in the proposed methodology, can achieve better accuracy when compared with the above algorithms [
6]. Security plays a vital role in daily life. Heavy-weight encryption algorithms such as AES-112 and RSA-118 require high computational memory when compared with lightweight encryption algorithms such as RC4, RC6, ECC, etc. [
7,
8]. Ensuring the non-sharing of secret keys in the encryption process is a preliminary task which strengthens the encryption algorithm. The main motivation of PRE techniques is to prevent the sharing of secret keys and it can be defined through the following equation:
is the public key of user A, with which encryption is performed at one end.
depicts the proxy re-encryption technique which decrypts the cipher data and re-encrypts the original message with the help of user B’s public key.
is the secret key of user B, with which decryption is performed at the other end.
1.2. Research Contributions in the Proposed Work
Provided an overview of the security mechanisms and challenges faced in securing satellite lane images.
Performed a literature survey on various security mechanisms such as proxy re-encryption techniques for securing the data.
Reviewing the state-of-the-art, we have identified that proxy re-encryption has not been implemented practically, which points out the novelty in our paper.
Identified that the proxy re-encryption technique has better performance and can survive various security threats.
Researched many classification algorithms and compared those classification algorithms with the proposed classification algorithm (ANN).
Various models, and security mechanisms are analyzed and the key features of the proposed methodology are compared against them.
1.3. Outline of the Paper
The structure of the paper is described as follows. Related works are discussed in
Section 2. The proposed methodology is discussed in
Section 3.
Section 4 gives a detailed overview of the Results and Analysis. Conclusion and future work are discussed in
Section 5 and
Section 6, respectively.
2. Related Works
Ahmed Elmogy et al. developed a cipher for text messages [
9]. In the proposed methodology, the encryption of the characters is linked with the previous characters, enhancing security. The encryption can be performed on letters, numbers and symbols based on their ASCII codes. The encryption formula is stated as follows:
where
is the cipher value and
,
are the ASCII codes for the corresponding characters. A disadvantage is that the encryption can be performed only on the character data and it does not apply to image data and the architecture is also complex. The main contribution of the author is to propose an encryption scheme with less computation and processing power, which made us to perform a survey in this area.
Ahmad et al. proposed a multi-chaos computationally efficient encryption for digital images [
10]. In the proposed solution, the original image is converted using lifting wavelet transform (LWT) and the quarter part of the image that is transformed in the previous step is encrypted using lightweight Chebyshev and intertwining maps. In this model, the LWT and SHA-512 algorithms are used to generate a hash value. Encryption standards are increased to an extent with the help of this algorithm and it also achieves integrity which became a motivation for the survey process. The process is complicated as the key size is larger and contains a greater number of computations. The contour mapping of nuclear radiation is simulated in this work [
11,
12] as part of two scenarios for nuclear radiation detection using numerous UAVs. There are several limitations in the current methodologies. The dataset utilized is minimal as it cannot deal with huge amounts of data. The extracted features are not accurate as well when compared with the characteristics of human visual attention. The methodology consumes a large amount of processing power.
Joslin et al. [
13] came up with a methodology to detect the fake images that are created using GANs. The analysis and attribution of fake images in the proposed model are performed by considering two datasets of real images and four GAN models that were trained. The methodology first takes a known GAN model and performs fast Fourier Transform on the images in the network. The main achievement of this work is to utilize GAN for the creation of tampered images which aid in the selection of datasets. The model does not work for the detection of fake images that are created using other modification techniques.
The main idea of the proposed model in [
14] is to provide the navigation in automatic vehicles. Gaussian filter layers are used for the removal of noise from the given input aerial images. The model used five layers of CNN. The five layers are ReLu, pooling, fully connected, convolution and loss layers. The proposed approach fails for blurred images and it can accept only coloured images. The efficiency of the model is majorly affected by lights, barriers and reflections of lights. Liu et al. proposed a solution for lane detection with shadow interference [
15]. An Inverse Perspective Mapping (IPM) technique is used for the top view generation of the lane image, and it is pre-processed to remove the unused features from the IPM map. They also used wavelet decomposition canny edge detection technique. Removal of unused features using the model is the main advantage, which became a reason for performing the survey. The limitation of the model is that the model is not built for working with satellite or aerial landscape images. It just describes the theoretical approach.
The authors in [
16] came up with a reliable way of detecting and tracking roadways, which facilitates the safety of highways. The methodology includes capturing the image, calibration of the camera, canny edge detection, choosing ROI, Hough transformation, and outdoor fitting. This methodology achieves an efficient way of detecting lines on the roads, with the help of relevant algorithms such as canny edge detection and Hough transformation. The proposed model suffers from the disadvantage that it shows the lines on the roads rather than the roads and it fails in detecting the lanes.
Agyekum et al. proposed a proxy re-encryption scheme to perform data sharing in devices in the Internet of Things securely using blockchain technology [
17,
18]. In the proposed method, a blockchain and edge devices are added for more secure storage and transmission of data. Before granting access to data, the user must be validated using SHA-512. The main contribution of the author is to perform encryption efficiently using complex blockchain technology which became a motive for survey. Once the data are stored in the blockchain, they are immutable and consume more processing power which is not practical.
Khashan et al. proposed a unique parallel PRE workload allocation technique to dynamically route the massive data re-encryption operation into the fog network [
19]. It also employs lightweight asymmetric encryption to ensure end-to-end security for users sharing large amounts of data. The proxy will use the generated key to send the encrypted data to the cloud. The data are re-encrypted at the fog nodes to send to the authorized person. The theoretical approach in the methodology of the paper helped us to gain insights about the practical implementation of proxy re-encryption. This work is not implemented on real platforms, so it cannot be considered practical. It also includes more complexities in implementation.
Ali et al. proposed a model to transfer medical data securely using fog technology [
20]. The medical data are securely transferred after two encryption algorithms, namely Rivest–Shamir–Adleman (RSA) and Advanced Encryption Standards (AES). The AES and RSA algorithms are used for the encryption of data, and the algorithms are embedded inside a Raspberry PI and also used fog computing technology. The main contribution of the work is securing medical data in the IoT equipment with the help of efficient algorithms such as AES and RSA. This survey helped in the encryption process of our proposed methodology. The system suffers from limitations as it is time-consuming and using Raspberry PI is not completely secure. This method also fails in computing huge amounts of data. The related works are summarized in
Table 1.
3. Proposed Methodology
The input of the proposed methodology is a lane image. Features are extracted from the input lane images (
) and are classified as fake or authentic with the help of the ANN model. This image is given as input to the U-Net model. The U-Net model consists of encoders and decoders which help in identifying lanes of the input image (
) Further, a genuine lane-detected image is secured with the help of a proxy re-encryption technique over the fog (H(
)). Lightweight encryption algorithm such as Rivest–Shamir–Adleman (RSA) is used in the encryption of the lane-identified authentic image (
). Elliptic Curve Cryptography (ECC) is used to re-encrypt the bona fide image over the proxy server. Decryption is performed and integrity is verified at the receiver side [
32].
Figure 1 gives an overview structure of the proposed methodology.
3.1. Demonstration of ANN Model
ANN model construction takes place with the help of three subsections. The first subsection deals with data acquisition and processing. In the second subsection, a brief description of the performance of ELA is mentioned. The final subsection deals with the construction of the ANN model.
3.1.1. Datasets and Requirement Analysis
The datasets utilized in the proposed methodology are taken from Kaggle. The CASIA dataset is utilized for feature extraction which is made up of 15K files. Satellite landscape images are applied to the U-Net model for training purposes. The total size of the datasets required for both feature extraction and lane detection constitutes 7.58 GB where 3.58 GB is the size of the CASIA dataset and 4 GB is the size of the landscape image dataset. The configurations required for the proposed methodology are given below in detail. The the proposed methodology requires Windows 7 as a minimum for performing its functionality. The development environment utilized here is Google Colab and Python programming language, a minimum of 4 GB RAM and hard disk space with 5 GB as a minimum are considered.
Table 2 provides all acronyms used in the article.
3.1.2. Data Acquisition and Processing
This subsection deals with the processing of satellite lane images. The satellite lane images are normalized and transformed into a particular size of 128*128*3. The images are further processed and converted to NumPy arrays for maintaining compatibility. The entire process for data preparation and processing is demonstrated in the below steps.
Step 1: Reading the input lane image = read
Step 2: Resizing the image data / 255.0
Step 3: Conversion of image data to array data is described as follows:
3.1.3. Performance of Error Level Analysis (ELA)
This subsection deals with the functioning of Error Level Analysis (ELA). ELA helps in the identification of tampered regions in a given input image. ELA differentiates tampered and authentic images by creating white and bright regions over the input image.
Step 1: Assigning input image to ELA for the functioning of ELA:
Step 2: The difference between the original and RGB image is computed as follows:
Step 3: Common range for the above image data is generated as follows:
Step 4: Enhancement of image with the help of ELA is performed as follows:
3.1.4. Generation of ANN Model
This subsection discusses the steps for constructing the ANN model. The ANN helps in the classification of satellite lane images as fake or authentic.
Step 1: The model consists of many convergent, max pool layers for extracting features model.add(Conv, Maxpool)
Step 2: 80% of train and 20% of test dataset is passed through the model:
Step 3: The model consists of output layers whose sigmoid function is as below:
Step 4: Confidence for the above model is computed as follows:
Figure 2 gives a detailed description of the ANN network model. The architecture of the ANN model consists of various convergent (Conv2D) and max pooling layers for the extraction of features from the input image. Classification of satellite lane images as fake or authentic is performed with the help of the softmax function.
3.2. Lane Detection Using U-Net Model
Lane detection from genuine satellite images using U-Net model construction happens in mainly two steps. The steps include a loading of the image data along with their respective mask images and the construction of the U-Net model.
3.2.1. Construction of U-Net Model
The U-Net architecture has an encoder path and a decoder path. In the encoder path, the number of filters increases from 16 to 256 exponentially to obtain various layers in the model. The input image is passed into various numbers of filters by using the Conv2D method in the Tensor flow library. Every time batch normalization is performed after applying the Conv2D method followed by the application of the ReLu activation function. After every increment of the number of filters, max pooling, followed by dropout functions is applied to the obtained results. As a result of the operations in the encoder path, the size of the result is decreased. In the decoder path, Conv2DTranspose along with concatenation followed by dropout functions are performed which increases the final result size to the original size.
Step 1: The number of filters considered for the U-Net model is defined as follows:
Step 2: The Conv2D in the encoder path is applied as follows for every value in :
and
Step 3: TFor each increment the max pooling is applied as follows:
y = MaxPooling2D((2,2))(x) and y=DropOut( )(x)
Step 4: The Conv2DTranspose is applied on the layers obtained from the encoder path in decreasing order of the filters which eventually gives the original size of an image.
If , are the previous layers in which the transpose function is performed, concatenate function is applied as follows:
and z=Dropout( )(z)
3.2.2. Predicting Lanes Using Constructed Model
The input images are read from the user; resizing, and reshaping followed by conversion into NumPy array is performed. The transformed images are passed into the generated U-Net model as follows:
The input image is resized as follows: Img=read(imagepath),
shape = and
The image is reshaped into shape as shown below:
The image is transformed into a numerical array using the NumPy module and lanes are detected as follows:
Figure 3 shows the detailed procedure of the U-Net model construction through various layers. The architecture shows the output produced in each layer after applying various operations such as max pooling, batch normalization, and dropout. In the figure, Maxpooling refers to the max pooling operation followed by dropout whereas CONV2D refers the Conv2D function followed by batch normalization.
3.3. Secure Fog Computation with Proxy Re-Encryption Technique
Apart from checking the authenticity of the satellite landscape images before performing lane detection furthermore, there is an imperative need to provide confidentiality and integrity to the processed image. To provide confidentiality, the proxy re-encryption technique is used in the proposed system. In the proxy re-encryption technique, the sender performs encryption of lane-detected authentic images on their side using the RSA algorithm. To ensure integrity, the hash value of the image is generated on the sender’s side. The RSA encrypted cipher image along with generated hash value is uploaded to the proxy. In proxy, the cipher image is decrypted and integrity is verified. Later, re-encryption is performed using the ECC algorithm. The ECC-based cipher is sent to the receiver. The receiver performs decryption using the ECC algorithm and verifies integrity.
3.3.1. RSA-Based Encryption and Hash Generation
Encryption using the RSA algorithm and hash value generation using SHA-256 is performed as follows on the sender’s side:
Step 1: RSA key generation is done by performing operations after generating two random prime numbers p, q as follows:
Step 2: The is formed by encoding the lane-detected authentic image into ASCII format. Encryption of image using RSA algorithm is performed as below:
Step 3: The hash value of the original image is generated using the SHA-256 algorithm as:
3.3.2. Proxy Re-Encryption and Integrity Verification
The decryption of the cipher image is performed on the proxy side using the RSA algorithm and integrity is verified.
Step 1: is decrypted on the proxy-side using
Step 2: New hash value is generated using SHA-256 to the image obtained after decryption using the RSA algorithm.
Step 3: Verify integrity by comparing values. If both values are equal integrity is verified otherwise, is tampered with before reaching proxy.
Step 4: After integrity checking, the is re-encrypted using ECC algorithm.
Step 5: Generally, an elliptic curve is represented as and elliptic curve with parameters and where q is a prime number. G is a point on an elliptic curve.
Step 6: The public key and Secret key .
Step 7: Encryption is performed after encoding as follows:
3.3.3. ECC Decryption and Integrity Verification on Receiver’s Side
The proxy re-encrypted image received by the receiver is decrypted using the ECC algorithm [
33] and integrity is verified to find any traces of modifications on
.
Step 1: ECC-based decryption is performed as follows:
Step 2: New hash value is generated using SHA-256 to the image obtained after decryption using the ECC algorithm.
Verify integrity by comparing and values. If both values are equal integrity is verified otherwise, is tampered with before reaching the receiver.
3.3.4. Secure Communication with Fog Authentication
Secure communication between the users is achieved with the help of fog as follows [
34]. Each step discussed below gives a brief description of the secure communication between users and the proxy. It is carried out in three phases. In the first phase, authentication is verified. In the second phase, the encrypted lane image is transferred securely to Proxy-Server. In the third phase, the Proxy-Server helps in the conversion of a secret key with which User B can decrypt the image securely after successful authentication.
User A request authentication from AS:
Authentication of User A by AS:
Secure transfer of encrypted data from User A to proxy server
User B request authentication from AS:
Authentication of User B by AS:
Verification and decryption of the message
The detailed process of authentic communication between the users and the proxy server in the proposed system is as follows. The initial level of communication deals with authentication. User A authenticates with the Proxy-Server for achieving secure communication. In the later phase, auth is generated which acts as a token between User A and Proxy-Server. After successful authentication User A transfers the image encrypted using RSA to the Proxy-Server. Proxy-Server here converts the secret key of User A to the secret key of User B, allowing decryption at User B’s side. During re-encryption, the ECC algorithm is used by the Proxy-Server, enhancing security.
5. Conclusion
The proposed model performs efficiently to identify the authenticity of satellite landscape images using an artificial neural network model. The U-Net algorithm helps in discovering lanes from authenticated images with good accuracy. In the later phase, secure communication is achieved through fog computation along with the proxy re-encryption technique. To enhance security and avoid Man in the Middle attacks,, a hash value is generated and verified at each phase of the proposed methodology. This infers that the proposed model provides authenticity, confidentiality, and integrity of the system which gives better performance.