An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic mapsImage encryption

被引:0
|
作者
Anvita Gupta
Dilbag Singh
Manjit Kaur
机构
[1] University Institute of Engineering,Department of Computer Science and Engineering
[2] Chandigarh University,Department of Computer Science and Engineering, School of Computing and Information Technology
[3] Manipal University Jaipur,Department of Computer and Communication Engineering, School of Computing and Information Technology
[4] Manipal University Jaipur,undefined
来源
Journal of Ambient Intelligence and Humanized Computing | 2020年 / 11卷
关键词
Image encryption; 4-D chaotic map; NSGA-III; Security evaluation;
D O I
暂无
中图分类号
学科分类号
摘要
Chaotic maps are extensively utilized in the field of image encryption to generate secret keys. However, these maps suffer from hyper-parameters tuning issues. These parameters are generally selected on hit and trial basis. However, inappropriate selection of these parameters may reduce the performance of chaotic maps. Also, these hyper-parameters are not sensitive to input images. Therefore, in this paper, to handle these issues, a non-dominated sorting genetic algorithm-III (NSGA) based 4-D chaotic map is designed. Additionally, to improve the computational speed of the proposed approach, we have designed a novel master-slave model for image encryption. Initially, computationally expensive operations such as mutation and crossover of NSGA-III are identified. Thereafter, NSGA-III parameters are split among two jobs, i.e., master and slave jobs. For communication between master and slave nodes, the message passing interface is used. Extensive experimental results reveal that the proposed image encryption technique outperforms the existing techniques in terms of various performance measures.
引用
收藏
页码:1309 / 1324
页数:15
相关论文
共 50 条
  • [21] Image encryption algorithm based on genetic operations and chaotic DNA encoding
    Qobbi, Younes
    Jarjar, Abdeltif
    Essaid, Mohamed
    Benazzi, Abdelhamid
    SOFT COMPUTING, 2022, 26 (12) : 5823 - 5832
  • [22] An efficient chaotic image encryption algorithm based on a generalized Arnold map
    Guodong Ye
    Kwok-Wo Wong
    Nonlinear Dynamics, 2012, 69 : 2079 - 2087
  • [23] A modified method for image encryption based on chaotic map and genetic algorithm
    Mahdieh Ghazvini
    Mojdeh Mirzadi
    Negin Parvar
    Multimedia Tools and Applications, 2020, 79 : 26927 - 26950
  • [24] Image encryption algorithm based on Hilbert sorting vector and new spatiotemporal chaotic system
    Zhang, Hangming
    Hu, Hanping
    Ding, Weiping
    OPTICS AND LASER TECHNOLOGY, 2023, 167
  • [25] Non-dominated Sorting Genetic Algorithm (NSGA-III) for effective resource allocation in cloud
    A. Jemshia Miriam
    R. Saminathan
    S. Chakaravarthi
    Evolutionary Intelligence, 2021, 14 : 759 - 765
  • [26] GPU-accelerated non-dominated sorting genetic algorithm III for maximizing protein production
    Kim, Donghyeon
    Kim, Jinsung
    ELECTRONIC RESEARCH ARCHIVE, 2024, 32 (04): : 2514 - 2540
  • [27] Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption
    Tsafack, Nestor
    Kengne, Jacques
    Abd-El-Atty, Bassem
    Iliyasu, Abdullah M.
    Hirota, Kaoru
    Abd El-Latif, Ahmed A.
    INFORMATION SCIENCES, 2020, 515 : 191 - 217
  • [28] Non-dominated Sorting Genetic Algorithm (NSGA-III) for effective resource allocation in cloud
    Miriam, A. Jemshia
    Saminathan, R.
    Chakaravarthi, S.
    EVOLUTIONARY INTELLIGENCE, 2021, 14 (02) : 759 - 765
  • [29] An Efficient Image Encryption Algorithm Based on Three-dimensional Chaotic Map
    Ye, Guodong
    Huang, Xiaoling
    Pan, Chen
    ICAIP 2018: 2018 THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN IMAGE PROCESSING, 2018, : 78 - 82
  • [30] A Colour Byte Scrambling Technique for Efficient Image Encryption Based on Combined Chaotic Map Image Encryption Using Combined Chaotic Map
    Parvees, M. Y. Mohamed
    Samath, J. Abdul
    Raj, I. Kaspar
    Bose, B. Parameswaran
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1067 - 1072