Differential evolution optimization of intertwining logistic map-DNA based image encryption technique

被引:37
作者
Dua, Mohit [1 ]
Wesanekar, Aishwarya [1 ]
Gupta, Vishwas [1 ]
Bhola, Mayank [1 ]
Dua, Shelza [2 ]
机构
[1] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
[2] Natl Inst Technol, Dept Elect & Commun Engn, Kurukshetra, Haryana, India
关键词
ILM; DE; DNA; Image encryption; HYBRID GENETIC ALGORITHM; SEQUENCE OPERATION; CHAOTIC MAP; CRYPTANALYSIS; CIPHERS; PERMUTATION; MODEL;
D O I
10.1007/s12652-019-01580-z
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Differential evolution (DE) is a powerful evolutionary algorithms, widely applied in different fields of science and engineering for solving the problem of optimization. Since image encryption has been viewed as an interesting research topic by many experts and innumerable methods to encrypt images have emerged, currently, the focus is on obtaining optimized images. The paper presents a novel image encryption scheme that uses intertwining logistic map (ILM), DNA encoding and DE optimization. The proposed approach is based on three phases: permutation involving ILM, diffusion engaging DNA and optimization using DE. Parameters like entropy, key sensitivity, secret key space, unified average change in intensity (UACI), correlation coefficient -vertical, horizontal and diagonal, and number of pixel change rate have been evaluated to test the efficiency of the proposed method. The paper also compares this performance with that of the genetic algorithms (GA), used previously for optimization. The significance of this approach is enhancing entropy, the essential characteristic of randomness, resisting against numerous statistical and differential attacks and generating good experimental results. The main contribution of this paper is to present the efficiency of DE in image optimization and exhibit how DE is better than GA.
引用
收藏
页码:3771 / 3786
页数:16
相关论文
共 61 条
  • [1] A hybrid genetic algorithm and chaotic function model for image encryption
    Abdullah, Abdul Hanan
    Enayatifar, Rasul
    Lee, Malrey
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2012, 66 (10) : 806 - 816
  • [2] MOLECULAR COMPUTATION OF SOLUTIONS TO COMBINATORIAL PROBLEMS
    ADLEMAN, LM
    [J]. SCIENCE, 1994, 266 (5187) : 1021 - 1024
  • [3] Some basic cryptographic requirements for chaos-based cryptosystems
    Alvarez, Gonzalo
    Li, Shujun
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08): : 2129 - 2151
  • [4] Bisht A, 2019, J INTELL SYST
  • [5] Bisht A, 2018, IEEE INT C INV RES C, P676
  • [6] A novel approach to encrypt multiple images using multiple chaotic maps and chaotic discrete fractional random transform
    Bisht, Ankita
    Dua, Mohit
    Dua, Shelza
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (09) : 3519 - 3531
  • [7] A symmetric image encryption scheme based on 3D chaotic cat maps
    Chen, GR
    Mao, YB
    Chui, CK
    [J]. CHAOS SOLITONS & FRACTALS, 2004, 21 (03) : 749 - 761
  • [8] A Modified Chaos-Based Joint Compression and Encryption Scheme
    Chen, Jianyong
    Zhou, Junwei
    Wong, Kwok-Wo
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2011, 58 (02) : 110 - 114
  • [9] Data hiding method for AMBTC compressed images
    Chen Y.-Y.
    Hsia C.-H.
    Jhong S.-Y.
    Lin H.-J.
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (11) : 14785 - 14793
  • [10] Image encryption using a synchronous permutation-diffusion technique
    Enayatifar, Rasul
    Abdullah, Abdul Hanan
    Isnin, Ismail Fauzi
    Altameem, Ayman
    Lee, Malrey
    [J]. OPTICS AND LASERS IN ENGINEERING, 2017, 90 : 146 - 154