A hybrid genetic algorithm and chaotic function model for image encryption

被引:163
作者
Abdullah, Abdul Hanan [1 ]
Enayatifar, Rasul [1 ]
Lee, Malrey [1 ]
机构
[1] ChonBuk Natl Univ, Sch Elect & Informat Engn, Res Ctr Adv Image & Informat Technol, Jeonju 561756, Chonbuk, South Korea
基金
新加坡国家研究基金会;
关键词
Image encryption; Genetic algorithm; Chaotic function; SECURITY SYSTEM; SCHEME;
D O I
10.1016/j.aeue.2012.01.015
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The security of digital images has attracted much attention recently. In this study, a new method based on a hybrid model is proposed for image encryption. The hybrid model is composed of a genetic algorithm and a chaotic function. In the first stage of the proposed method, a number of encrypted images are constructed using the original image and the chaotic function. In the next stage, these encrypted images are used as the initial population for the genetic algorithm. In each stage of the genetic algorithm, the answer obtained from the previous iteration is optimized to produce the best-encrypted image. The best-encrypted image is defined as the image with the highest entropy and the lowest correlation coefficient among adjacent pixels. The use of genetic algorithms in image encryption has been attempted for the first time in this paper. Analyzing the results from the performed experiments, a high level of resistance of the proposed method against brute-force and statistical invasions is obviously illustrated. The obtained entropy and correlation coefficients of the method are approximately 7.9978 and -0.0009, respectively. (C) 2012 Elsevier GmbH. All rights reserved.
引用
收藏
页码:806 / 816
页数:11
相关论文
共 29 条
[1]   A novel scheme for image encryption based on 2D piecewise chaotic maps [J].
Akhshani, A. ;
Behnia, S. ;
Akhavan, A. ;
Abu Hassan, H. ;
Hassan, Z. .
OPTICS COMMUNICATIONS, 2010, 283 (17) :3259-3266
[2]   Image encryption using progressive cellular automata substitution and SCAN [J].
Chen, RJ ;
Lu, WK ;
Lai, JL .
2005 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), VOLS 1-6, CONFERENCE PROCEEDINGS, 2005, :1690-1693
[3]   Image security system using recursive cellular automata substitution [J].
Chen, Rong-Jian ;
Lai, Jui-Lin .
PATTERN RECOGNITION, 2007, 40 (05) :1621-1631
[4]   Novel SCAN-CA-based image security system using SCAN and 2-D von Neumann cellular automata [J].
Chen, Rong-Jian ;
Horng, Shi-Jinn .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2010, 25 (06) :413-426
[5]   Partial encryption of compressed images and videos [J].
Cheng, H ;
Li, XB .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2000, 48 (08) :2439-2451
[6]  
Kelber K, 2005, INT S NONL THEOR ITS, P465
[7]   Comparison of nearest point algorithms by genetic algorithms [J].
Koljonen, Janne .
EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (08) :10303-10311
[8]   A fast image encryption system based on chaotic maps with finite precision representation [J].
Kwok, H. S. ;
Tang, Wallace K. S. .
CHAOS SOLITONS & FRACTALS, 2007, 32 (04) :1518-1529
[9]   Data compression and encryption using cellular automata transforms [J].
Lafe, O .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 1997, 10 (06) :581-591
[10]   Cryptanalysis of a new signal security system for multimedia data transmission [J].
Li, CQ ;
Li, SJ ;
Chen, GR ;
Chen, G ;
Hu, L .
EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2005, 2005 (08) :1277-1288