Latin Square and Machine Learning Techniques Combined Algorithm for Image Encryption

被引:5
作者
Patel, Sakshi [1 ]
Thanikaiselvan, V. [1 ]
机构
[1] Vellore Inst Technol VIT, Sch Elect Engn, Vellore 632014, India
关键词
Image encryption; Neural network; Pseudorandom number generator; Latin square; Genetic algorithm; Machine learning techniques; GENETIC ALGORITHM; MAP;
D O I
10.1007/s00034-023-02427-x
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Multimedia data is crucial in the military, medical, forensics, social, etc., to transmit a large amount of data. Security of this sensitive information is the primary issue. This paper uses Latin square and machine learning techniques such as neural networks and genetic algorithm to design an image encryption algorithm. A new neural network-based pseudorandom number generator is proposed to generate a chaotic sequence for various applications. Encryption key images are designed using Latin squares in the finite field. Further, the Latin squares are XOR with the input matrix to get the encrypted images. The proposed algorithm is iterated a finite number of times to generate a cipher image population. Randomly two parents are chosen from the generated population, and row and column arrangements produce offspring. A genetic algorithm is the optimization technique used for the best encrypted image search. The pixel correlation value serves as a fitness function. Finally, the least correlated cipher image is obtained from the genetic algorithm applied to the parent and offspring of the population generated from the encryption algorithm. The simulation results from the proposed image encryption model surpass many communication channel attacks and perform better when compared to existing image security algorithms.
引用
收藏
页码:6829 / 6853
页数:25
相关论文
共 39 条
  • [1] A New Image Encryption and Decryption Technique using Genetic Algorithm and Residual Numbers
    Agbedemnab, Peter Awon-natemi
    Baagyere, Edward Yellakuor
    Daabo, Mohammed Ibrahim
    [J]. 2019 IEEE AFRICON, 2019,
  • [2] A new chaos based color image encryption algorithm using permutation substitution and Boolean operation
    Ali, Tahir Sajjad
    Ali, Rashid
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (27-28) : 19853 - 19873
  • [3] [Anonymous], 2010, Cryptography and Network Security: Principles and Practice
  • [4] Double layered Fridrich structure to conserve medical data privacy using quantum cryptosystem
    Aparna, H.
    Bhumijaa, B.
    Santhiyadevi, R.
    Vaishanavi, K.
    Sathanarayanan, M.
    Rengarajan, Amirtharajan
    Praveenkumar, Padmapriya
    Abd El-Latif, Ahmed A.
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63
  • [5] VLSI Implementation of Optimized 2D SIMM Chaotic Map for Image Encryption
    Balaji, M. Sundar Prakash
    Vijaykumar, V. R.
    Subramaniam, Kamalraj
    Kannan, M.
    Pillai, V. Ayyem
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 35 (03) : 3155 - 3168
  • [6] Bassham, 2010, STAT TEST SUITE RAND
  • [7] Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption
    Chai, Xiuli
    Zhi, Xiangcheng
    Gan, Zhihua
    Zhang, Yushu
    Chen, Yiran
    Fu, Jiangyu
    [J]. SIGNAL PROCESSING, 2021, 183
  • [8] Medical image encryption algorithm based on Latin square and memristive chaotic system
    Chai, Xiuli
    Zhang, Jitong
    Gan, Zhihua
    Zhang, Yushu
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (24) : 35419 - 35453
  • [9] Secure Surveillance Systems Using Partial-Regeneration-Based Non-Dominated Optimization and 5D-Chaotic Map
    Ghosh, Gopal
    Kavita
    Anand, Divya
    Verma, Sahil
    Rawat, Danda B.
    Shafi, Jana
    Marszalek, Zbigniew
    Wozniak, Marcin
    [J]. SYMMETRY-BASEL, 2021, 13 (08):
  • [10] Holland JH., 1992, ADAPTATION NATURAL A, DOI [10.7551/mitpress/1090.001.0001, DOI 10.7551/MITPRESS/1090.001.0001]