A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm

被引:0
作者
Sanjay Kumar
Deepmala Sharma
机构
[1] National Institute of Technology Raipur,Department of Mathematics
来源
Artificial Intelligence Review | / 57卷
关键词
Image encryption; Chaotic map; Elliptic curve cryptography; Genetic algorithm;
D O I
暂无
中图分类号
学科分类号
摘要
In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting sensitive visual data from unauthorized access drives the pursuit of advanced image encryption methods. This paper proposes a novel approach to enhance image encryption by combining the power of a chaotic map, elliptic curve cryptography, and genetic algorithm. The chaotic map, specifically Arnold’s cat map, is employed to introduce chaos and randomness into the encryption process. The proposed image encryption process involves applying Arnold’s cat map for shuffling the pixel positions, followed by elliptic curve cryptography for encrypting the pixel values using public and private keys. Additionally, a genetic algorithm is employed to optimize the key generation process, enhancing the security of the encryption scheme. The combined utilization of these techniques aims to achieve a high level of confidentiality and robustness in image encryption. The algorithm underwent thorough analysis. It achieved a maximum entropy score of 7.99, indicating a high level of randomness and unpredictability in the encrypted data. Additionally, it exhibited near-zero correlation, which suggests strong resistance against statistical attacks. Moreover, the cryptographic range of possible keys was found to be 2511\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{511}$$\end{document}. This extensive key space makes the algorithm highly resilient against brute force attacks. It took only 0.5634 s to encrypt a moderately sized 512×512\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$512\times 512$$\end{document} pixel image with an 8-bit image on a standard desktop computer with a 2.3 GHz processor and 16 GB of RAM. The experimental findings confirm that the proposed approach is highly effective and efficient in safeguarding sensitive image data from unauthorized access and potential attacks. This scheme has the benefit of allowing us to protect our private image data while it’s being transmitted.
引用
收藏
相关论文
共 173 条
[1]  
Abdullah AH(2012)A hybrid genetic algorithm and chaotic function model for image encryption AEU-Int J Electron Commun 66 806-816
[2]  
Enayatifar R(2022)Image encryption using anti-synchronisation and bogdanov transformation map Int J Comput Sci Math 15 43-59
[3]  
Lee M(2022)A novel image encryption technique based on cyclic codes over Galois field Comput Intell Neurosci 2022 1-9
[4]  
Al-Hazaimeh OM(2020)An improved chaotic cryptosystem for image encryption and digital watermarking Wirel Pers Commun 110 1429-1442
[5]  
Al-Jamal MF(2023)Healthcare with datacare-a triangular DNA security Multimed Tools Appl 82 1-18
[6]  
Alomari A(2012)Period of the discrete arnold cat map and general cat map Nonlinear Dyn 70 1365-1375
[7]  
Asif M(2017)Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms Opt Lasers Eng 88 37-50
[8]  
Asamoah JKK(2003)Medical image security in a HIPAA mandated PACS environment Comput Med Imaging Gr 27 185-196
[9]  
Hazzazi MM(2019)A novel parallel image encryption algorithm based on chaos Clust Comput 22 1211-1223
[10]  
Alharbi AR(2019)A novel image encryption scheme based on DNA sequence operations and chaotic systems Neural Comput Appl 31 219-237