Skip to main content
Erschienen in: Soft Computing 7/2021

05.01.2021 | Methodologies and Application

A hybrid chaotic map with coefficient improved whale optimization-based parameter tuning for enhanced image encryption

verfasst von: S. Saravanan, M. Sivabalakrishnan

Erschienen in: Soft Computing | Ausgabe 7/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The security of the data becomes the main concern due to the quick rise in the exchange of data over the open networks and the Internet. The cryptographic techniques based on chaos theory reveal some novel and effectual orders to develop secure image encryption approaches. Images are the most attractive kinds of data in the encryption domain. In current years, the chaos-based cryptographic techniques have provided an efficient way to expand secure image encryption frameworks. This proposal temps to develop an optimized HCM for promoting novel image encryption. The proposed image encryption model involves 4 steps, such as image pre-processing, key generation, image encryption using optimized HCM, and image decryption. In the pre-processing, the RGB image is converted into a grayscale image, and the key is generated by the SHA-256 cryptographic hash algorithm. Further, the encryption of the image is performed by HCM with the integration of 2DLCM, and PWLCM. While hybridizing the two chaotic maps for image encryption, parameter tuning or optimization is performed for improving its performance. Moreover, Information entropy is considered as the objective model that has to be maximized while tuning the parameters, and the maximum value of information entropy will mean the best performance. An improvement in the well-known optimization algorithms termed as CI-WOA is adopted for performing the parameter optimization of HCM. Hence, the optimized HCM-based image encryption can be confirmed as an efficient and secure way for all types of image transmissions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abhishek S, George N, Deepthi PP (2013) PWLCM based image encryption through compressive sensing. In: IEEE recent advances in intelligent computational systems (RAICS), Trivandrum, pp 48–52 Abhishek S, George N, Deepthi PP (2013) PWLCM based image encryption through compressive sensing. In: IEEE recent advances in intelligent computational systems (RAICS), Trivandrum, pp 48–52
Zurück zum Zitat Algredo-Badillo I, Feregrino-Uribe C, Cumplido R, Morales-Sandoval M (2013) FPGA-based implementation alternatives for the inner loop of the Secure Hash Algorithm SHA-256. Microprocess Microsyst 37(6–7):750–757CrossRef Algredo-Badillo I, Feregrino-Uribe C, Cumplido R, Morales-Sandoval M (2013) FPGA-based implementation alternatives for the inner loop of the Secure Hash Algorithm SHA-256. Microprocess Microsyst 37(6–7):750–757CrossRef
Zurück zum Zitat Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16(8):21292151MathSciNetMATHCrossRef Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16(8):21292151MathSciNetMATHCrossRef
Zurück zum Zitat Ben Farah MA, Guesmi R, Kachouri A, Samet M (2020) A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt Laser Technol 121:1MATH Ben Farah MA, Guesmi R, Kachouri A, Samet M (2020) A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt Laser Technol 121:1MATH
Zurück zum Zitat Cao W, Mao Y, Zhou Y (2020) Designing a 2D infinite collapse map for image encryption. Sig Process 171:1CrossRef Cao W, Mao Y, Zhou Y (2020) Designing a 2D infinite collapse map for image encryption. Sig Process 171:1CrossRef
Zurück zum Zitat Chen LF, Chang GJ, He BY (2017) Optical image conversion and encryption by diffraction, phase retrieval algorithm and incoherent superposition. Opt Lasers Eng 88:221–232CrossRef Chen LF, Chang GJ, He BY (2017) Optical image conversion and encryption by diffraction, phase retrieval algorithm and incoherent superposition. Opt Lasers Eng 88:221–232CrossRef
Zurück zum Zitat Chen C, Sun K, He S (2019) An improved image encryption algorithm with finite computing precision. Signal Processing Chen C, Sun K, He S (2019) An improved image encryption algorithm with finite computing precision. Signal Processing
Zurück zum Zitat Chen J, Li XW, Wang Q-H (2019b) Deep learning for improving the robustness of image encryption. IEEE Access 7:181083–181091CrossRef Chen J, Li XW, Wang Q-H (2019b) Deep learning for improving the robustness of image encryption. IEEE Access 7:181083–181091CrossRef
Zurück zum Zitat Darwish SM, Noori ZH (2019) Secure image compression approach based on fusion of 3D chaotic maps and arithmetic coding. IET Signal Proc 13(3):286–295CrossRef Darwish SM, Noori ZH (2019) Secure image compression approach based on fusion of 3D chaotic maps and arithmetic coding. IET Signal Proc 13(3):286–295CrossRef
Zurück zum Zitat Etem T, Kaya T (2019) A novel true random bit generator design for image encryption. Phys A: Stat Mech Appl Etem T, Kaya T (2019) A novel true random bit generator design for image encryption. Phys A: Stat Mech Appl
Zurück zum Zitat Frauel Y, Castro A, Naughton T, Javidi B (2007) Resistance of the double random phase encryption against various attacks. Opt Express 15:10253–10265CrossRef Frauel Y, Castro A, Naughton T, Javidi B (2007) Resistance of the double random phase encryption against various attacks. Opt Express 15:10253–10265CrossRef
Zurück zum Zitat Gupta A, Singh D, Kaur M (2020) An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps. J Ambient Intell Hum Comput 11:1309–1324CrossRef Gupta A, Singh D, Kaur M (2020) An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps. J Ambient Intell Hum Comput 11:1309–1324CrossRef
Zurück zum Zitat Hu Y, Zhu C, Wang Z (2014) An improved piecewise linear chaotic map based image encryption algorithm. Sci World J Hu Y, Zhu C, Wang Z (2014) An improved piecewise linear chaotic map based image encryption algorithm. Sci World J
Zurück zum Zitat Hua Z, Zhou B, Zhou Y (2018) Sine-transform-based Chaotic system with FPGA implementation. IEEE Multimedia 65(3):1 Hua Z, Zhou B, Zhou Y (2018) Sine-transform-based Chaotic system with FPGA implementation. IEEE Multimedia 65(3):1
Zurück zum Zitat John FB, Alejandro MA, Roberto T (2014) Experimental QR code optical encryption: noise-free data recovering. Opt Lett 39(10):3074–3077CrossRef John FB, Alejandro MA, Roberto T (2014) Experimental QR code optical encryption: noise-free data recovering. Opt Lett 39(10):3074–3077CrossRef
Zurück zum Zitat Kang Y, Zhang LH, Zhang DW (2018) Optical encryption based on ghost imaging and public key cryptography. Opt Lasers Eng 111:58–64CrossRef Kang Y, Zhang LH, Zhang DW (2018) Optical encryption based on ghost imaging and public key cryptography. Opt Lasers Eng 111:58–64CrossRef
Zurück zum Zitat Kaur M, Kumar V (2018b) Parallel non-dominated sorting genetic algorithm-II-based image encryption technique. Imaging Sci J 66(8):453–462CrossRef Kaur M, Kumar V (2018b) Parallel non-dominated sorting genetic algorithm-II-based image encryption technique. Imaging Sci J 66(8):453–462CrossRef
Zurück zum Zitat Kaur M, Kumar V, Li L (2019) Color image encryption approach based on memetic differential evolution. Neural Comput Appl 31:7975–7987CrossRef Kaur M, Kumar V, Li L (2019) Color image encryption approach based on memetic differential evolution. Neural Comput Appl 31:7975–7987CrossRef
Zurück zum Zitat Kaur M, Singh D, Sun K, Rawat U (2020) Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map. Fut Gen Comput Syst 107:333–350CrossRef Kaur M, Singh D, Sun K, Rawat U (2020) Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map. Fut Gen Comput Syst 107:333–350CrossRef
Zurück zum Zitat Khan J, Khan M, Ahmad J, Hwang S, Ahmed W (2017) An improved image encryption scheme based on a non-linear Chaotic algorithm and substitution boxes. Informatica 28:629–649CrossRef Khan J, Khan M, Ahmad J, Hwang S, Ahmed W (2017) An improved image encryption scheme based on a non-linear Chaotic algorithm and substitution boxes. Informatica 28:629–649CrossRef
Zurück zum Zitat Koppu S, Madhu Viswanatham V (2018) Medical image security enhancement using two dimensional chaotic mapping optimized by self-adaptive grey wolf algorithm. Evol Intel 11(1–2):53–71CrossRef Koppu S, Madhu Viswanatham V (2018) Medical image security enhancement using two dimensional chaotic mapping optimized by self-adaptive grey wolf algorithm. Evol Intel 11(1–2):53–71CrossRef
Zurück zum Zitat Kumar P, Fatima A, Nishchal NK (2019) Image encryption using phase-encoded exclusive-OR operations with incoherent illumination. J Opt 21:065701CrossRef Kumar P, Fatima A, Nishchal NK (2019) Image encryption using phase-encoded exclusive-OR operations with incoherent illumination. J Opt 21:065701CrossRef
Zurück zum Zitat Li X, Mou Y, Cai Z Ji, Zhang J (2003) On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision. Comput Phys Commun 153(1):52–58MathSciNetMATHCrossRef Li X, Mou Y, Cai Z Ji, Zhang J (2003) On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision. Comput Phys Commun 153(1):52–58MathSciNetMATHCrossRef
Zurück zum Zitat Lin L, Shen M, So H, Chang C (2012) Convergence analysis for initial condition estimation in coupled map lattice systems. IEEE Trans Signal Process 60(8):4426–4432MathSciNetMATHCrossRef Lin L, Shen M, So H, Chang C (2012) Convergence analysis for initial condition estimation in coupled map lattice systems. IEEE Trans Signal Process 60(8):4426–4432MathSciNetMATHCrossRef
Zurück zum Zitat Maniyath SR, Thanikaiselvan V (2020) An efficient image encryption using deep neural network and chaotic Map. Microprocess Microsyst 77:1CrossRef Maniyath SR, Thanikaiselvan V (2020) An efficient image encryption using deep neural network and chaotic Map. Microprocess Microsyst 77:1CrossRef
Zurück zum Zitat Mirjalili S, Lewis A (2016) The Whale optimization algorithm. Adv Eng Softw 95:51–67CrossRef Mirjalili S, Lewis A (2016) The Whale optimization algorithm. Adv Eng Softw 95:51–67CrossRef
Zurück zum Zitat Mirjalili S, Mirjalili SM, Lewis A (2014) Grey Wolf optimizer. Adv Eng Softw 69:46–61CrossRef Mirjalili S, Mirjalili SM, Lewis A (2014) Grey Wolf optimizer. Adv Eng Softw 69:46–61CrossRef
Zurück zum Zitat Muniraj I, Guo CL, Malallah R (2017) Low photon count based digital holography for quadratic phase cryptography. Opt Lett 42(14):2774–2777CrossRef Muniraj I, Guo CL, Malallah R (2017) Low photon count based digital holography for quadratic phase cryptography. Opt Lett 42(14):2774–2777CrossRef
Zurück zum Zitat Nematzadeh H, Enayatifar R, Yadollahi M, Lee M, Jeong G (2019) Binary Search Tree Image encryption with DNA. Optik Nematzadeh H, Enayatifar R, Yadollahi M, Lee M, Jeong G (2019) Binary Search Tree Image encryption with DNA. Optik
Zurück zum Zitat Oteko Tresor L, Sumbwanyambe M (2019) A selective image encryption scheme based on 2D DWT, Henon map and 4D Qi hyper-Chaos. IEEE Access 7:103463–103472CrossRef Oteko Tresor L, Sumbwanyambe M (2019) A selective image encryption scheme based on 2D DWT, Henon map and 4D Qi hyper-Chaos. IEEE Access 7:103463–103472CrossRef
Zurück zum Zitat Patro AK, Acharya B (2019) An efficient colour image encryption scheme based on 1-D chaotic maps. J Inf Secur Appl 46:23–41 Patro AK, Acharya B (2019) An efficient colour image encryption scheme based on 1-D chaotic maps. J Inf Secur Appl 46:23–41
Zurück zum Zitat Qin W, Peng X (2010) Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Lett 35(2):118–120CrossRef Qin W, Peng X (2010) Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Lett 35(2):118–120CrossRef
Zurück zum Zitat Singh N, Sinha A (2009) Gyrator transform-based optical image encryption using chaos. Opt Lett 47:539–546 Singh N, Sinha A (2009) Gyrator transform-based optical image encryption using chaos. Opt Lett 47:539–546
Zurück zum Zitat Wang X-Y, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62(3):615621MathSciNetMATHCrossRef Wang X-Y, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62(3):615621MathSciNetMATHCrossRef
Zurück zum Zitat Wang Y, Quan C, Tay CJ (2014) Nonlinear multiple-image encryption based on mixture retrieval algorithm in Fresnel domain. Opt Commun 330(1):9198 Wang Y, Quan C, Tay CJ (2014) Nonlinear multiple-image encryption based on mixture retrieval algorithm in Fresnel domain. Opt Commun 330(1):9198
Zurück zum Zitat Wu Y, Noonan JP, Yang G, Jin H (2012) Image encryption using the two-dimensional logistic chaotic map. J Electron Imaging 21(1):1CrossRef Wu Y, Noonan JP, Yang G, Jin H (2012) Image encryption using the two-dimensional logistic chaotic map. J Electron Imaging 21(1):1CrossRef
Zurück zum Zitat Xiao B, Luo J, Bi X, Li W, Chen B (2020) Fractional discrete Tchebyshev moments and their applications in image encryption and watermarking. Inf Sci 516:545–559MathSciNetCrossRef Xiao B, Luo J, Bi X, Li W, Chen B (2020) Fractional discrete Tchebyshev moments and their applications in image encryption and watermarking. Inf Sci 516:545–559MathSciNetCrossRef
Zurück zum Zitat Yao S, Chen L, Zhong Y (2019) An encryption system for color image based on compressive sensing. Opt Laser Technol 120:1CrossRef Yao S, Chen L, Zhong Y (2019) An encryption system for color image based on compressive sensing. Opt Laser Technol 120:1CrossRef
Zurück zum Zitat Zhang X, Wang L, Zhou Z, Niu Y (2019) A Chaos-based image encryption technique utilizing Hilbert curves and H-fractals. IEEE Access 7:74734–74746CrossRef Zhang X, Wang L, Zhou Z, Niu Y (2019) A Chaos-based image encryption technique utilizing Hilbert curves and H-fractals. IEEE Access 7:74734–74746CrossRef
Zurück zum Zitat Zhou Y, Bao L, Chen C (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182CrossRef Zhou Y, Bao L, Chen C (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182CrossRef
Zurück zum Zitat Zhu C, Sun K (2018) Cryptanalyzing and improving a novel color image encryption algorithm using RT-enhanced Chaotic tent maps. IEEE Access 6:18759–18770CrossRef Zhu C, Sun K (2018) Cryptanalyzing and improving a novel color image encryption algorithm using RT-enhanced Chaotic tent maps. IEEE Access 6:18759–18770CrossRef
Zurück zum Zitat Zhu C, Liao C, Deng X (2013) Breaking and improving an image encryption scheme based on total shufing scheme. Nonlinear Dyn 71(12):2534 Zhu C, Liao C, Deng X (2013) Breaking and improving an image encryption scheme based on total shufing scheme. Nonlinear Dyn 71(12):2534
Zurück zum Zitat Zhu C, Wang G, Sun K (2018) Improved cryptanalysis and enhancements of an image encryption scheme using combined 1D Chaotic maps. Entropy 20(11):843CrossRef Zhu C, Wang G, Sun K (2018) Improved cryptanalysis and enhancements of an image encryption scheme using combined 1D Chaotic maps. Entropy 20(11):843CrossRef
Zurück zum Zitat Zhu H, Zhao Y, Song Y (2019) 2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption. IEEE Access 7:14081–14098CrossRef Zhu H, Zhao Y, Song Y (2019) 2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption. IEEE Access 7:14081–14098CrossRef
Metadaten
Titel
A hybrid chaotic map with coefficient improved whale optimization-based parameter tuning for enhanced image encryption
verfasst von
S. Saravanan
M. Sivabalakrishnan
Publikationsdatum
05.01.2021
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 7/2021
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-020-05528-w

Weitere Artikel der Ausgabe 7/2021

Soft Computing 7/2021 Zur Ausgabe

Premium Partner