Enhancing reservoir computing for secure digital image encryption using finance model forecasting
DOI:
https://doi.org/10.47264/idea.nasij/4.2.4Keywords:
Reservoir computing, digital image encryption, hyper-chaotic finance models, forecasting, machine learning, financial timeAbstract
New research is changing the face of financial forecasting by combining reservoir computing with digital image encryption at a time when data security is of the utmost importance. This groundbreaking study combines digital image encryption with reservoir computing to suggest a novel method for financial forecasting. This creative method uses a reservoir network to encrypt digital photos securely, increasing their resistance to attacks and demonstrating the power of reservoir computing, a well-known machine learning concept. This approach significantly improves financial time series data forecasting accuracy and reliability using hyper-clusteratic models. When reservoir computing and hyper-chaotic models are tightly integrated, outcome is improved financial decision-making. Empirical tests have validated the technology's effectiveness and efficiency, showcasing its potential practical applications in financial forecasting and image encryption. The study examines numerical simulations in a dynamic reservoir framework that demonstrate encryption and decryption powers of reservoir computing, demonstrating its ability to comprehend input signals and generate answers that are desired. Critical phases include assessing the approach's effectiveness using metrics for encryption quality, attack resilience, and computing efficiency. Preparing picture representations for processing is also crucial. It is necessary to train the readout layer to translate reservoir states to encrypted picture pixels differently.
References
Alabdullah, B., Beloff, N., & White, M. (2021). E-ART: A new encryption algorithm based on the reflection of binary search tree. Cryptography, 5(1), 4. https://doi.org/10.3390/cryptography5010004 DOI: https://doi.org/10.3390/cryptography5010004
Chan, H.-T., & Chang, C. C. (2023, May). Decryption of deterministic phase-encoded digital holography using convolutional neural networks. Photonics, 10(6), 612. https://doi.org/10.3390/photonics10060612 DOI: https://doi.org/10.3390/photonics10060612
Crihan, G., Cr?ciun, M., & Dumitriu, L. (2023). A comparative assessment of homomorphic encryption algorithms applied to biometric information. Inventions, 8(4), 102. https://doi.org/10.3390/inventions8040102 DOI: https://doi.org/10.3390/inventions8040102
El Assad, S. (2022). Cryptography and its applications in information security. MDPI. DOI: https://doi.org/10.3390/app12052588
Fetteha, M. A., Sayed, W. S., & Said, L. A. (2023). A lightweight image encryption scheme using dna coding and chaos. Electronics, 12(24), 4895. https://doi.org/10.3390/electronics12244895 DOI: https://doi.org/10.3390/electronics12244895
Lawnik, M., Moysis, L., & Volos, C. (2022). Chaos-based cryptography: Text encryption using image algorithms. Electronics, 11(19), 3156. https://doi.org/10.3390/electronics11193156 DOI: https://doi.org/10.3390/electronics11193156
Qin, Y., & Zhang, B. (2023). Privacy-preserving biometrics image encryption and digital signature technique using Arnold and ElGamal. Applied Sciences, 13(14), 8117. https://doi.org/10.3390/app13148117 DOI: https://doi.org/10.3390/app13148117
Shahzad, K., Zia, T., & Qazi, E. U. H. (2022). A review of functional encryption in IoT applications. Sensors, 22(19), 7567.https://doi.org/10.3390/s22197567 DOI: https://doi.org/10.3390/s22197567
Sheng, Y., Li, J., Di, X., Li, X., & Xu, R. (2022). An image encryption algorithm based on complex network scrambling and multi-directional diffusion. Entropy, 24(9), 1247. https://doi.org/10.3390/e24091247 DOI: https://doi.org/10.3390/e24091247
Ulybyshev, D., Rogers, M., Kholodilo, V., & Northern, B. (2023). End-to-end database software security. Software, 2(2), 163-176. https://doi.org/10.3390/software2020007 DOI: https://doi.org/10.3390/software2020007
Wu, X., & Sun, W. (2014). Extended capabilities for XOR-based visual cryptography. IEEE Transactions on Information Forensics and Security, 9(10), 1592-1605. https://doi.org/10.3390/engproc2023055065 DOI: https://doi.org/10.1109/TIFS.2014.2346014
Wu, J., Zhang, J., Liu, D., & Wang, X. (2023). A multiple-medical-image encryption method based on SHA-256 and DNA Encoding. Entropy, 25(6), 898. https://doi.org/10.3390/e25060898 DOI: https://doi.org/10.3390/e25060898
Wang, Z., Yao, Y., Tong, X., Luo, Q., & Chen, X. (2019). Dynamically reconfigurable encryption and decryption system design for the Internet of Things information security. Sensors, 19(1), 143. http://dx.doi.org/10.3390/s19010143 DOI: https://doi.org/10.3390/s19010143
Zhang, X., & Wang, X. (2018). Remote-sensing image encryption algorithm using the advanced encryption standard. Applied Sciences, 8(9), 1540. 1540.https://doi.org/10.3390/app8091540 DOI: https://doi.org/10.3390/app8091540
Downloads
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2023 Muhammad Aoun, Shafiq Ur Rehman, Rawal Javed
This work is licensed under a Creative Commons Attribution 4.0 International License.
Licensing & Copyright Policies
Since July 2023, the manuscripts in NASIJ-IDEA are open-access content published under the Creative Commons Attribution 4.0 (CC BY 4.0) International License http://creativecommons.org/licenses/by/4.0/. This license permits use, distribution, and reproduction in any medium, provided the original work and source are properly cited.
The copyright policy of NASIJ-IDEA is based on a non-exclusive publishing agreement, according to which the journal retains the right of first publication, but the author(s) are free to publish their work subsequently. The copyright of all work rests with the author(s).
The users may use, reproduce, disseminate or display the article(s) provided that the author(s) are attributed as the original creators. The authors of NASIJ-IDEA are encouraged to familiarise themselves with the various Creative Commons licenses.
Readers of NASIJ-IDEA are advised to consult the licensing information embedded in each published work to ensure they are familiar with the terms of use that apply.