GPU-Accelerated implementation of a genetically optimized image encryption algorithm

被引:4
作者
Bharadwaj, Brijgopal [1 ]
Banu, J. Saira [1 ]
Madiajagan, M. [1 ]
Ghalib, Muhammad Rukunuddin [1 ]
Castillo, Oscar [2 ]
Shankar, Achyut [3 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci Engn, Vellore, Tamil Nadu, India
[2] Tijuana Inst Technol, Div Grad Studies & Res, Tijuana, Mexico
[3] Amity Univ, Dept Comp Sci & Engn, ASET, Noida, India
关键词
Pseudo-random generator; GPU; CUDA programming; Symmetric key; Image encryption; Genetic optimization; RANDOM NUMBER GENERATORS;
D O I
10.1007/s00500-021-06225-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a GPU-accelerated implementation of an image encryption algorithm. The algorithm uses the concepts of a modified XOR cipher to encrypt and decrypt the images, with an encryption pad, generated using the shared secret key and some initialization vectors. It uses a genetically optimized pseudo-random generator that outputs a stream of random bytes of the specified length. The proposed algorithm is subjected to a number of theoretical, experimental, and mathematical analyses, to examine its performance and security against a number of possible attacks, using the following metrics - histogram analysis, correlation analysis, information entropy analysis, NPCR and UACI. The performance analysis carried out shows an average speedup-ratio of 3.489 for encryption, and 4.055 for decryption operation, between the serial and parallel implementations using GPU. The algorithm aims to provide better performance benchmarks, which can significantly improve the experience in the relevant use-cases, like real-time media applications.
引用
收藏
页码:14413 / 14428
页数:16
相关论文
共 32 条
[1]   A hybrid genetic algorithm and chaotic function model for image encryption [J].
Abdullah, Abdul Hanan ;
Enayatifar, Rasul ;
Lee, Malrey .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2012, 66 (10) :806-816
[2]  
Affenzeller M, 2009, NUMER INSIGHT, P1, DOI 10.1201/9781420011326
[3]   A lightweight and efficient digital image encryption using hybrid chaotic systems for wireless network applications [J].
Almalkawi, Islam T. ;
Halloush, Rami ;
Alsarhan, Ayoub ;
Al-Dubai, Ahmed ;
Al-karaki, Jamal N. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 49
[4]   A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite [J].
Altigani, Abdelrahman ;
Hasan, Shafaatunnur ;
Shamsuddin, Siti Mariyam ;
Barry, Bazara .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 46 :210-221
[5]  
[Anonymous], 2011, NVIDIA CUDA C Programming Guide
[6]  
Antwerpen D., 2011, P ACM SIGGRAPH S HIG, P41, DOI [10.1145/2018323.2018330, DOI 10.1145/2018323.2018330]
[7]  
Armin J, 2016, ADV SCI TECH SEC APP, P135, DOI 10.1007/978-3-319-38930-1_8
[8]  
Bharadwaj B., 2020, 2020 INT C EMERGING, P1, DOI DOI 10.1109/IC-ETITE47903.2020.094
[9]  
Boritz J.E., 2005, Journal of Accounting and Public Policy, V24, P11
[10]  
Buck I, 2007, ACM SIGGRAPH 2007 CO