5 CONCLUSIONS AND FUTURE
SCOPES
The potential of GAN-based encryption extends
beyond traditional use cases, with opportunities for
integration into real-time systems and cross-modal
encryption tasks. Future research can focus on
developing specialized GAN architectures tailored
for encryption, optimizing real-time performance,
and expanding the scope of encryption to other data
modalities such as video and audio. By addressing
these directions, GANs can revolutionize secure
communication systems, ensuring the confidentiality
and integrity of data in an increasingly interconnected
digital world. The adaptability and learning
capabilities of GANs make them a promising avenue
for advancing encryption methodologies and
overcoming the challenges posed by emerging cyber
threats.
REFERENCES
Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B.,
Warde-Farley, D., Ozair, S., ... & Bengio, Y. (2014).
Generative adversarial nets. Advances in neural
information processing systems, 27.
Cao, W., Mao, Y., & Zhou, Y. (2020). Designing a 2D
infinite collapse map for image encryption. Signal
Processing, 171, 107457.
Wang, X., Zhu, X., & Zhang, Y. (2018). An image
encryption algorithm based on Josephus traversing and
mixed chaotic map. IEEE Access, 6, 23733-23746.
Singh, M., Baranwal, N., Singh, K. N., & Singh, A. K.
(2023). Using GAN-based encryption to secure digital
images with reconstruction through customized super
resolution network. IEEE Transactions on Consumer
Electronics, 70(1), 3977-3984.
Li, Q., Wang, X., Wang, X., Ma, B., Wang, C., Xian, Y., &
Shi, Y. (2020). A novel grayscale image steganography
scheme based on chaos encryption and generative
adversarial networks. IEEE Access, 8, 168166-168176.
Zahmoul, R., & Zaied, M. (2016, October). Toward new
family beta maps for chaotic image encryption. In 2016
IEEE International Conference on Systems, Man, and
Cybernetics (SMC) (pp. 004052-004057). IEEE.
Zhang, Y., Jia, R., Pei, H., Wang, W., Li, B., & Song, D.
(2020). The secret revealer: Generative model-
inversion attacks against deep neural networks. In
Proceedings of the IEEE/CVF conference on computer
vision and pattern recognition (pp. 253-261).
Zhang, R., Isola, P., Efros, A. A., Shechtman, E., & Wang,
O. (2018). The unreasonable effectiveness of deep
features as a perceptual metric. In Proceedings of the
IEEE conference on computer vision and pattern
recognition (pp. 586-595).
Zhao, D., Zhu, X., Liu, B., Ren, J., Zhu, X., Mao, Y., ... &
Ullah, R. (2022). High-security and low-complexity
OCDM transmission scheme based on GAN enhanced
chaotic encryption. Optics Express, 30(19), 34898-
34907.
Li, X., & Li, X. (2019, July). A novel block image
encryption algorithm based on DNA dynamic encoding
and chaotic system. In 2019 IEEE 4th international
conference on signal and image processing (ICSIP) (pp.
901-906). IEEE.
Bhat, R., & Nanjundegowda, R. (2025). A Review on
Comparative Analysis of Generative Adversarial
Networks’ Architectures and Applications. Journal of
Robotics and Control (JRC), 6(1), 53-64.
Chen, W. H., Luo, S., & Zheng, W. X. (2016). Impulsive
synchronization of reaction–diffusion neural networks
with mixed delays and its application to image
encryption. IEEE transactions on neural networks and
learning systems, 27(12), 2696-2710.
Dridi, M., Hajjaji, M. A., Bouallegue, B., & Mtibaa, A.
(2016). Cryptography of medical images based on a
combination between chaotic and neural network. IET
Image Processing, 10(11), 830-839.
Hu, F., Wang, J., Xu, X., Pu, C., & Peng, T. (2017). Batch
image encryption using generated deep features based
on stacked autoencoder network. Mathematical
Problems in Engineering, 2017(1), 3675459.
Hu, D., Wang, L., Jiang, W., Zheng, S., & Li, B. (2018). A
novel image steganography method via deep
convolutional generative adversarial networks. IEEE
access, 6, 38303-38314.
Li, X., Jiang, Y., Chen, M., & Li, F. (2018). Research on
iris image encryption based on deep
learning. EURASIP Journal on Image and Video
Processing, 2018, 1-10.
Debiasi, L., & Uhl, A. (2015, March). Techniques for a
forensic analysis of the casia-iris v4 database. In 3rd
International Workshop on Biometrics and Forensics
(IWBF 2015) (pp. 1-6). IEEE.
Ding, Y., Wu, G., Chen, D., Zhang, N., Gong, L., Cao, M.,
& Qin, Z. (2020). DeepEDN: A deep-learning-based
image encryption and decryption network for internet
of medical things. IEEE Internet of Things
Journal
, 8(3), 1504-1518.
Jaeger, S., Candemir, S., Antani, S., Wáng, Y. X. J., Lu, P.
X., & Thoma, G. (2014). Two public chest X-ray
datasets for computer-aided screening of pulmonary
diseases. Quantitative imaging in medicine and surgery,
4(6), 475.
Jin, J., & Kim, K. (2020). 3D CUBE algorithm for the key
generation method: Applying deep neural network
learning-based. IEEE Access, 8, 33689-33702.
Maniyath, S. R., & Thanikaiselvan, V. (2020). An efficient
image encryption using deep neural network and
chaotic map. Microprocessors and Microsystems, 77,
103134.
Erkan, U., Toktas, A., Enginoğlu, S., Akbacak, E., &
Thanh, D. N. (2022). An image encryption scheme
based on chaotic logarithmic map and key generation