Color image encryption using minimax differential evolution-based 7D hyper-chaotic map
- PDF / 9,133,049 Bytes
- 19 Pages / 595.276 x 790.866 pts Page_size
- 22 Downloads / 195 Views
Color image encryption using minimax differential evolution‑based 7D hyper‑chaotic map Manjit Kaur1 · Dilbag Singh1 · Vijay Kumar2 Received: 24 September 2019 / Accepted: 25 June 2020 © Springer-Verlag GmbH Germany, part of Springer Nature 2020
Abstract Hyperchaotic maps are generally used in the encryption to generate the secret keys. The number of hyperchaotic maps has been implemented so far. These maps involve a large number of state and control parameters. The major concern is the estimation of these parameters. Because the estimation requires extensive computational search. In this paper, a 7D hyperchaotic map is used to produce the secret keys for image encryption. As this hyperchaotic map require a large number of initial parameters, the manual estimation is computationally extensive. Therefore, minimax differential evolution is utilized to provide the optimal parameters to the hyperchaotic map. The fitness of the parameters is evaluated using correlation coefficient and entropy. The secrets keys are then produced by the proposed hyperchaotic map. These keys are further used to perform the diffusion operation on the input image to generate the encrypted images. Extensive experiments are conducted to investigate the performance of the proposed approach considering the well-known measures. The comparative results show that the proposed approach performs significantly better as compared to the competitive approaches.
1 Introduction In the last few decades, encryption approaches play a vital role to conceal the sensitive information transmitted over wireless or wired networks. The unauthorized persons are unable to reveal the secret message from the encrypted data. The encryption approaches have been widely used in various engineering fields such as medical, military, remote-sensing etc. [1]. The protection of sensitive data is a foremost requirement of the above-mentioned applications. Due to this, a number of encryption approaches have been developed in the last few years. The foremost concepts behind the encryption approaches are large key space and resistance against the security attacks [2, 3]. The encryption approaches try to break the statistical pattern after the encryption process. However, most of these approaches have frailer in the substitution process and attackers can easily break the encrypted data. These approaches become * Dilbag Singh [email protected] 1
Computer Science Engineering, School of Engineering and Applied Sciences, Bennett University, Greater Noida 201310, India
Department of Computer Science and Engineering, NIT Hamirpur, Hamirpur, India
2
ineffective as these are unable to resist the traditional image processing attacks [4, 5]. The conventional approaches such as RSA, AES, DES, etc. were also utilized in the encryption process [6]. But, they do not produce the optimal encryption results due to high redundancy and correlation present in the image [7]. Recently, the chaos has been used to encrypt the image to resolve the above-mentioned problems. The chaotic maps are sens
Data Loading...