Differential evolution optimization of intertwining logistic map-DNA based image encryption technique

  • PDF / 3,130,928 Bytes
  • 16 Pages / 595.276 x 790.866 pts Page_size
  • 19 Downloads / 183 Views

DOWNLOAD

REPORT


ORIGINAL RESEARCH

Differential evolution optimization of intertwining logistic map‑DNA based image encryption technique Mohit Dua1   · Aishwarya Wesanekar1 · Vishwas Gupta1 · Mayank Bhola1 · Shelza Dua2 Received: 14 January 2019 / Accepted: 12 November 2019 © Springer-Verlag GmbH Germany, part of Springer Nature 2019

Abstract Differential evolution (DE) is a powerful evolutionary algorithms, widely applied in different fields of science and engineering for solving the problem of optimization. Since image encryption has been viewed as an interesting research topic by many experts and innumerable methods to encrypt images have emerged, currently, the focus is on obtaining optimized images. The paper presents a novel image encryption scheme that uses intertwining logistic map (ILM), DNA encoding and DE optimization. The proposed approach is based on three phases: permutation involving ILM, diffusion engaging DNA and optimization using DE. Parameters like entropy, key sensitivity, secret key space, unified average change in intensity (UACI), correlation coefficient —vertical, horizontal and diagonal, and number of pixel change rate have been evaluated to test the efficiency of the proposed method. The paper also compares this performance with that of the genetic algorithms (GA), used previously for optimization. The significance of this approach is enhancing entropy, the essential characteristic of randomness, resisting against numerous statistical and differential attacks and generating good experimental results. The main contribution of this paper is to present the efficiency of DE in image optimization and exhibit how DE is better than GA. Keywords  ILM · DE · DNA · Image encryption

1 Introduction Due to the fast development of network-related technologies in the last few decades, there has been a heavy usage of digital data for the purpose of information exchange (Chen et al. 2018; Suneja et al. 2019). Digital image, being an important integral component of this data, has different security concerns associated with it. For this, a number of image * Mohit Dua [email protected] Aishwarya Wesanekar [email protected] Vishwas Gupta [email protected] Mayank Bhola [email protected] Shelza Dua [email protected] 1



Department of Computer Engineering, National Institute of Technology, Kurukshetra, India



Department of Electronics and Communication Engineering, National Institute of Technology, Kurukshetra, India

2

encryption algorithms have been proposed, the conventional being—Rivest–Shamir–Adleman (RSA), international data encryption algorithm (IDEA) and data encryption standard (DES). However, the intrinsic properties of images such as strong redundancy, high correlations among pixels, and bulky data capacity have led to the outmoding of the aforementioned standard encryption schemes (Enayatifar et al. 2017; Li et al. 2007; Solak et al. 2010; Solak and Çokal 2011; Wang et al. 2015a, b, c). A colossal interest has emerged in the study of chaotic systems for image encryption as these types