Colour image encryption technique using differential evolution in non-subsampled contourlet transform domain

被引:34
作者
Kaur, Manjit [1 ]
Kumar, Vijay [1 ]
机构
[1] Thapar Inst Engn & Technol, Comp Sci & Engn Dept, Patiala, Punjab, India
关键词
transforms; cryptography; image colour analysis; evolutionary computation; colour image encryption technique; differential evolution; scrambled image; existing techniques; nonsubsampled contourlet transform domain; beta chaotic map; Arnold transform; parameter tuning; HYBRID GENETIC ALGORITHM; CHAOTIC MAP; ARNOLD TRANSFORM; S-BOX; SCHEME; WATERMARKING; NETWORK; DESIGN; CIPHER; DWT;
D O I
10.1049/iet-ipr.2017.1016
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The main challenges of image encryption are robustness against attacks, key space, key sensitivity, and diffusion. To deal with these challenges, a differential evolution-based image encryption technique is proposed. In the proposed technique, two concepts are utilised to encrypt the images in an efficient manner. The first one is Arnold transform, which is utilised to permute the pixels position of an input image to generate a scrambled image. The second one is differential evolution, which is used to tune the parameters required by a beta chaotic map. Since the beta chaotic map suffers from parameter tuning issue. The entropy of an encrypted image is used as a fitness function. The proposed technique is compared with seven well-known image encryption techniques over five well-known images. The experimental results reveal that the proposed technique outperforms the other existing techniques in terms of security and better visual quality.
引用
收藏
页码:1273 / 1283
页数:11
相关论文
共 60 条
[1]   A hybrid genetic algorithm and chaotic function model for image encryption [J].
Abdullah, Abdul Hanan ;
Enayatifar, Rasul ;
Lee, Malrey .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2012, 66 (10) :806-816
[2]   Multi-scale local structure patterns histogram for describing visual contents in social image retrieval systems [J].
Ahmad, Jamil ;
Sajjad, Muhammad ;
Rho, Seungmin ;
Baik, Sung Wook .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (20) :12669-12692
[3]   Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys [J].
Al-Hazaimeh, Obaida M. ;
Al-Jamal, Mohammad F. ;
Alhindawi, Nouh ;
Omari, Abedalkareem .
NEURAL COMPUTING & APPLICATIONS, 2019, 31 (07) :2395-2405
[4]  
[Anonymous], 2018, NEURAL COMPUT APPL, DOI DOI 10.1007/S00521-017-2970-3
[5]  
[Anonymous], 2014, 3D RES
[6]  
[Anonymous], IEEE T EVOL COMPUT
[7]  
[Anonymous], USC SIPI IM DAT
[8]   A novel image encryption scheme based on substitution-permutation network and chaos [J].
Belazi, Akram ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
SIGNAL PROCESSING, 2016, 128 :155-170
[9]   A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map [J].
Cao, Chun ;
Sun, Kehui ;
Liu, Wenhao .
SIGNAL PROCESSING, 2018, 143 :122-133
[10]   A novel image encryption scheme based on DNA sequence operations and chaotic systems [J].
Chai, Xiuli ;
Gan, Zhihua ;
Yuan, Ke ;
Chen, Yiran ;
Liu, Xianxing .
NEURAL COMPUTING & APPLICATIONS, 2019, 31 (01) :219-237