A modified method for image encryption based on chaotic map and genetic algorithm

  • PDF / 4,088,619 Bytes
  • 24 Pages / 439.37 x 666.142 pts Page_size
  • 24 Downloads / 213 Views

DOWNLOAD

REPORT


A modified method for image encryption based on chaotic map and genetic algorithm Mahdieh Ghazvini 1

1

& Mojdeh Mirzadi & Negin Parvar

2

Received: 23 May 2019 / Revised: 1 May 2020 / Accepted: 8 May 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract

The security of digital data has been attending more than past, spatially image data security. In this study, a hybrid image encryption method has been proposed based on genetic algorithm and chaos. Encryption process consists of three main steps: confusion phase, diffusion phase, and improvement phase using a genetic algorithm. At first, Chen’s chaotic map is used in the confusion phase to generate a scrambled image by shuffling plain-image pixels, and in the diffusion step, Logistic-Sine map alters those pixels gray-level values. It produces some of encrypted images which were considered as the initial population for the genetic algorithm. Then, by using the genetic algorithm, the encrypted images are optimized as much as possible. Finally, the best encrypted image is the final cipher image. The experimental results and several security analyses show that the proposed modified method provides an efficient scheme for image encryption and good robustness against frequent statistical and security attacks. Keywords Image encryption . Chaotic map . Security . Genetic algorithm

1 Introduction Nowadays, with the rapid development in digital technology and communication networks, digital data and information are store and transmit more and more, over the networks. Thus,

* Mahdieh Ghazvini [email protected] Mojdeh Mirzadi [email protected] Negin Parvar [email protected]

1

Department of Computer Engineering, Faculty of Engineering, Shahid Bahonar University of Kerman, Kerman, Iran

2

Department of Computer Engineering, Islamic Azad University, Kerman Branch, Kerman, Iran

Multimedia Tools and Applications

developing techniques for maintaining the security of storing and transmitting digital data has been more and more interested. Digital images and videos carrying a large amount of essential information for many applications, thus image data protection against unauthorized users has become an important issue for searches [19, 20]. One of the methods of protecting information is to use encryption algorithms. By image encryption techniques, the original image converted to an encrypted image that is not easy to understand. On one hand, different kinds of image encryption methods based on different technologies have been presenting that, among them, chaos-based techniques are more interested in recent years. The chaotic encryption was characterized by high sensitivity to initial situations and parameters, pseudo-random behavior, non-periodicity, the simplicity of implementation in hardware & software, and mixing property. Therefore, it is widely attractive to image encryption [8, 18, 21, 37]. On the other hand, one of the most frequently used optimization algorithms is a genetic algorithm (GA), and it also has some applications in cr