Differential evolution optimization of intertwining logistic map-DNA based image encryption technique

被引:39
作者
Dua, Mohit [1 ]
Wesanekar, Aishwarya [1 ]
Gupta, Vishwas [1 ]
Bhola, Mayank [1 ]
Dua, Shelza [2 ]
机构
[1] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
[2] Natl Inst Technol, Dept Elect & Commun Engn, Kurukshetra, Haryana, India
关键词
ILM; DE; DNA; Image encryption; HYBRID GENETIC ALGORITHM; SEQUENCE OPERATION; CHAOTIC MAP; CRYPTANALYSIS; CIPHERS; PERMUTATION; MODEL;
D O I
10.1007/s12652-019-01580-z
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Differential evolution (DE) is a powerful evolutionary algorithms, widely applied in different fields of science and engineering for solving the problem of optimization. Since image encryption has been viewed as an interesting research topic by many experts and innumerable methods to encrypt images have emerged, currently, the focus is on obtaining optimized images. The paper presents a novel image encryption scheme that uses intertwining logistic map (ILM), DNA encoding and DE optimization. The proposed approach is based on three phases: permutation involving ILM, diffusion engaging DNA and optimization using DE. Parameters like entropy, key sensitivity, secret key space, unified average change in intensity (UACI), correlation coefficient -vertical, horizontal and diagonal, and number of pixel change rate have been evaluated to test the efficiency of the proposed method. The paper also compares this performance with that of the genetic algorithms (GA), used previously for optimization. The significance of this approach is enhancing entropy, the essential characteristic of randomness, resisting against numerous statistical and differential attacks and generating good experimental results. The main contribution of this paper is to present the efficiency of DE in image optimization and exhibit how DE is better than GA.
引用
收藏
页码:3771 / 3786
页数:16
相关论文
共 61 条
[1]   A hybrid genetic algorithm and chaotic function model for image encryption [J].
Abdullah, Abdul Hanan ;
Enayatifar, Rasul ;
Lee, Malrey .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2012, 66 (10) :806-816
[2]   MOLECULAR COMPUTATION OF SOLUTIONS TO COMBINATORIAL PROBLEMS [J].
ADLEMAN, LM .
SCIENCE, 1994, 266 (5187) :1021-1024
[3]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[4]  
Bisht A, 2019, J INTELL SYST
[5]  
Bisht A, 2018, IEEE INT C INV RES C, P676
[6]   A novel approach to encrypt multiple images using multiple chaotic maps and chaotic discrete fractional random transform [J].
Bisht, Ankita ;
Dua, Mohit ;
Dua, Shelza .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (09) :3519-3531
[7]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[8]   A Modified Chaos-Based Joint Compression and Encryption Scheme [J].
Chen, Jianyong ;
Zhou, Junwei ;
Wong, Kwok-Wo .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2011, 58 (02) :110-114
[9]   Data hiding method for AMBTC compressed images [J].
Chen Y.-Y. ;
Hsia C.-H. ;
Jhong S.-Y. ;
Lin H.-J. .
Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (11) :14785-14793
[10]   Image encryption using a synchronous permutation-diffusion technique [J].
Enayatifar, Rasul ;
Abdullah, Abdul Hanan ;
Isnin, Ismail Fauzi ;
Altameem, Ayman ;
Lee, Malrey .
OPTICS AND LASERS IN ENGINEERING, 2017, 90 :146-154