An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps Image encryption

被引:73
作者
Gupta, Anvita [1 ]
Singh, Dilbag [2 ]
Kaur, Manjit [3 ]
机构
[1] Chandigarh Univ, Univ Inst Engn, Dept Comp Sci & Engn, Gharuan, Punjab, India
[2] Manipal Univ Jaipur, Sch Comp & Informat Technol, Dept Comp Sci & Engn, Jaipur, Rajasthan, India
[3] Manipal Univ Jaipur, Sch Comp & Informat Technol, Dept Comp & Commun Engn, Jaipur, Rajasthan, India
关键词
Image encryption; 4-D chaotic map; NSGA-III; Security evaluation;
D O I
10.1007/s12652-019-01493-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Chaotic maps are extensively utilized in the field of image encryption to generate secret keys. However, these maps suffer from hyper-parameters tuning issues. These parameters are generally selected on hit and trial basis. However, inappropriate selection of these parameters may reduce the performance of chaotic maps. Also, these hyper-parameters are not sensitive to input images. Therefore, in this paper, to handle these issues, a non-dominated sorting genetic algorithm-III (NSGA) based 4-D chaotic map is designed. Additionally, to improve the computational speed of the proposed approach, we have designed a novel master-slave model for image encryption. Initially, computationally expensive operations such as mutation and crossover of NSGA-III are identified. Thereafter, NSGA-III parameters are split among two jobs, i.e., master and slave jobs. For communication between master and slave nodes, the message passing interface is used. Extensive experimental results reveal that the proposed image encryption technique outperforms the existing techniques in terms of various performance measures.
引用
收藏
页码:1309 / 1324
页数:16
相关论文
共 45 条
[1]  
Afarin R, 2013, IRAN CONF MACH, P441, DOI 10.1109/IranianMVIP.2013.6780026
[2]  
[Anonymous], 2021, IMAGE PROCESS VCIP
[3]  
[Anonymous], MOL BIOL INT
[4]   A novel image encryption scheme based on substitution-permutation network and chaos [J].
Belazi, Akram ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
SIGNAL PROCESSING, 2016, 128 :155-170
[5]  
Chatterjee A., 2018, AUSTR U POW ENG C AU, P1, DOI [DOI 10.1109/FIE.2018.8659278, DOI 10.1109/ISGT-ASIA.2017.8378470]
[6]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[7]   Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images [J].
Chuman, Tatsuya ;
Sirichotedumrong, Warit ;
Kiya, Hitoshi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (06) :1515-1525
[8]   A NSGA-II and NSGA-III comparison for solving an open shop scheduling problem with resource constraints [J].
Ciro, Guillermo Campos ;
Dugardin, Frederic ;
Yalaoui, Farouk ;
Kelly, Russell .
IFAC PAPERSONLINE, 2016, 49 (12) :1272-1277
[9]  
Das R, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), P748, DOI 10.1109/ICPCSI.2017.8391813
[10]   Enhanced double random phase encryption of quantum images [J].
Du, Shiping ;
Qiu, Daowen ;
Mateus, Paulo ;
Gruska, Jozef .
RESULTS IN PHYSICS, 2019, 13