An image encryption approach based on chaotic maps and genetic operations
- PDF / 2,618,633 Bytes
- 21 Pages / 439.37 x 666.142 pts Page_size
- 17 Downloads / 217 Views
An image encryption approach based on chaotic maps and genetic operations Ying Niu 1 & Zheng Zhou 2 & Xuncai Zhang 2 Received: 20 December 2018 / Revised: 21 May 2020 / Accepted: 24 June 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract
This paper puts forward an image encryption approach using chaotic maps and genetic operations. First, the Keccak algorithm is employed to compute the hash values of a plain-image as the initial values for chaotic map. The sensitivity and pseudo randomness of chaotic map used for the initial conditions allows for pseudorandom sequences to be obtained by iterative logistic map to shuffle and permute the pixel positions and values of the image. Second, in combination with the Hénon map and the DNA coding technique, genetic operations at the bit level are used to achieve pixel selection, crossover and mutation, as well as further completion of pixel diffusion and scrambling, which significantly increases the difficulty of deciphering the algorithm. Finally, the diffusion and confusion features of the algorithm are further strengthened by bidirectional exclusive OR operations with chaotic sequences. The theoretical analysis and simulation results indicate that the algorithm is sensitive to keys and can effectively defend statistical and differential attacks, indicating that it has good security and application potential. Keywords Image encryption . Chaotic map . Genetic operation . DNA code . Nucleotide sequences database
1 Introduction With the boom in the Internet and improvement of people’s living demands, the text-oriented era has gradually moved toward images. As a practical information carrier, images are characterized by a large amount of data and high redundancy, yet people have abundant and efficient image
* Xuncai Zhang [email protected]
1
School of Architecture Environment Engineering, Zhengzhou University of Light Industry, Zhengzhou 450002, China
2
School of Electrical and Information Engineering, Zhengzhou University of Light Industry, Zhengzhou 450002, China
Multimedia Tools and Applications
perception. Special needs involving security and privacy require secure image storage or transmission in areas such as the military, government, trade secrets and personal security. The vast openness of the Internet makes it easy to intercept and capture transmitted data. Therefore, image encryption has gradually become a focus of academic research. Due to the large data demands and high correlation between adjacent pixels in an image, the traditional data encryption methods such as Advanced Encryption Standard (AES) and International Data Encryption Algorithm (IDEA) are not efficient [38]. To this end, researchers are dedicated to searching for image encryption methods that meet the requirements of confusion and diffusion. Compared with traditional encryption systems, chaotic systems have stronger advantages. The nonperiodicity of motion trajectories and extreme sensitivity to initial conditions, nonlinearity, ergodicity, unpredictability
Data Loading...