Skip to main content
Erschienen in: Neural Computing and Applications 11/2019

19.07.2018 | Original Article

Color image encryption approach based on memetic differential evolution

verfasst von: Manjit Kaur, Vijay Kumar, Li Li

Erschienen in: Neural Computing and Applications | Ausgabe 11/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, the initial conditions of an intertwining logistic map are generated by utilizing the memetic differential evolution. Initially, the color image is decomposed into red, green, and blue channels. Arnold map is used to shuffle the pixels position of all three channels to develop the shuffled channels. Afterward, memetic differential evolution is implemented to optimize the parameters required by intertwining logistic map. The correlation coefficient and entropy are used as a fitness function. The intertwining map generates the secret keys to encrypt the shuffled color channels. The encrypted color channels are combined to obtain the encrypted image. Extensive experiments are carried out by considering the memetic differential evolution-based image encryption and existing competitive image encryption approaches over five benchmark images. Experimental results show that the proposed approach provides higher efficiency and security as compared to the existing image encryption approaches.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput Appl 26(5):1137–1148CrossRef Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput Appl 26(5):1137–1148CrossRef
2.
Zurück zum Zitat Khan M, Shah T (2014) A novel image encryption technique based on hénon chaotic map and s 8 symmetric group. Neural Comput Appl 25(7–8):1717–1722CrossRef Khan M, Shah T (2014) A novel image encryption technique based on hénon chaotic map and s 8 symmetric group. Neural Comput Appl 25(7–8):1717–1722CrossRef
5.
Zurück zum Zitat Sivakumar T, Venkatesan R (2015) A novel image encryption using calligraphy based scan method and random number. KSII Trans Internet Inf Syst 9(6):2317–2337 Sivakumar T, Venkatesan R (2015) A novel image encryption using calligraphy based scan method and random number. KSII Trans Internet Inf Syst 9(6):2317–2337
6.
Zurück zum Zitat Reyad O, Mofaddel M, Abd-Elhafiez W, Fathy M (2017) A novel image encryption scheme based on different block sizes for grayscale and color images. In: Computer engineering and systems (ICCES), 2017 12th international conference on, IEEE, pp 455–461 Reyad O, Mofaddel M, Abd-Elhafiez W, Fathy M (2017) A novel image encryption scheme based on different block sizes for grayscale and color images. In: Computer engineering and systems (ICCES), 2017 12th international conference on, IEEE, pp 455–461
7.
Zurück zum Zitat Chai X, Gan Z, Yang K, Chen Y, Liu X (2017) An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process Image Commun 52:6–19CrossRef Chai X, Gan Z, Yang K, Chen Y, Liu X (2017) An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process Image Commun 52:6–19CrossRef
8.
Zurück zum Zitat Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimedia Tools Appl 71(3):1469–1497CrossRef Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimedia Tools Appl 71(3):1469–1497CrossRef
10.
Zurück zum Zitat Usama M, Khan MK, Alghathbar K, Lee C (2010) Chaos-based secure satellite imagery cryptosystem. Comput Math Appl 60(2):326–337MathSciNetCrossRef Usama M, Khan MK, Alghathbar K, Lee C (2010) Chaos-based secure satellite imagery cryptosystem. Comput Math Appl 60(2):326–337MathSciNetCrossRef
11.
Zurück zum Zitat Wen W (2016) Security analysis of a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order cnn against chosen-plaintext attack. Multimedia Tools Appl 75(6):3553–3560CrossRef Wen W (2016) Security analysis of a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order cnn against chosen-plaintext attack. Multimedia Tools Appl 75(6):3553–3560CrossRef
12.
Zurück zum Zitat Zhu Z-L, Zhang W, Wong K-W, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186CrossRef Zhu Z-L, Zhang W, Wong K-W, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186CrossRef
13.
Zurück zum Zitat Zhang Y-Q, Wang X-Y (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn 77(3):687–698CrossRef Zhang Y-Q, Wang X-Y (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn 77(3):687–698CrossRef
14.
Zurück zum Zitat Li C (2016) Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process 118:203–210CrossRef Li C (2016) Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process 118:203–210CrossRef
15.
Zurück zum Zitat Zhang X, Zhu G, Ma S (2012) Remote-sensing image encryption in hybrid domains. Opt Commun 285(7):1736–1743CrossRef Zhang X, Zhu G, Ma S (2012) Remote-sensing image encryption in hybrid domains. Opt Commun 285(7):1736–1743CrossRef
16.
Zurück zum Zitat Wang X, Yin YL, Yu H (2005) Finding collisions in the full sha-1. In: Crypto, vol. 3621, Springer, pp 17–36 Wang X, Yin YL, Yu H (2005) Finding collisions in the full sha-1. In: Crypto, vol. 3621, Springer, pp 17–36
17.
Zurück zum Zitat Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18CrossRef Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18CrossRef
18.
Zurück zum Zitat Zhang W, Yu H, Zhao Y-L, Zhu Z-L (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36–50CrossRef Zhang W, Yu H, Zhao Y-L, Zhu Z-L (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36–50CrossRef
19.
Zurück zum Zitat Wu J, Liao X, Yang B (2018) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process 142:292–300CrossRef Wu J, Liao X, Yang B (2018) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process 142:292–300CrossRef
20.
Zurück zum Zitat Kumar M, Iqbal A, Kumar P (2016) A new rgb image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography. Signal Process 125:187–202CrossRef Kumar M, Iqbal A, Kumar P (2016) A new rgb image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography. Signal Process 125:187–202CrossRef
21.
Zurück zum Zitat Akhavan A, Samsudin A, Akhshani A (2017) Cryptanalysis of an image encryption algorithm based on dna encoding. Opt Laser Technol 95:94–99CrossRef Akhavan A, Samsudin A, Akhshani A (2017) Cryptanalysis of an image encryption algorithm based on dna encoding. Opt Laser Technol 95:94–99CrossRef
22.
Zurück zum Zitat Zhou G, Zhang D, Liu Y, Yuan Y, Liu Q (2015) A novel image encryption algorithm based on chaos and line map. Neurocomputing 169:150–157CrossRef Zhou G, Zhang D, Liu Y, Yuan Y, Liu Q (2015) A novel image encryption algorithm based on chaos and line map. Neurocomputing 169:150–157CrossRef
23.
Zurück zum Zitat Chen L, Ma B, Zhao X, Wang S (2017) Differential cryptanalysis of a novel image encryption algorithm based on chaos and line map. Nonlinear Dyn 87(3):1797–1807CrossRef Chen L, Ma B, Zhao X, Wang S (2017) Differential cryptanalysis of a novel image encryption algorithm based on chaos and line map. Nonlinear Dyn 87(3):1797–1807CrossRef
24.
Zurück zum Zitat Sreelaja N, Pai GV (2012) Stream cipher for binary image encryption using ant colony optimization based key generation. Appl Soft Comput 12(9):2879–2895CrossRef Sreelaja N, Pai GV (2012) Stream cipher for binary image encryption using ant colony optimization based key generation. Appl Soft Comput 12(9):2879–2895CrossRef
25.
Zurück zum Zitat Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU Int J Electron Commun 66(10):806–816CrossRef Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU Int J Electron Commun 66(10):806–816CrossRef
26.
Zurück zum Zitat Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93CrossRef Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93CrossRef
27.
Zurück zum Zitat Zhang X, Wang X, Cheng Y (2015) Image encryption based on a genetic algorithm and a chaotic system. IEICE Trans Commun 98(5):824–833CrossRef Zhang X, Wang X, Cheng Y (2015) Image encryption based on a genetic algorithm and a chaotic system. IEICE Trans Commun 98(5):824–833CrossRef
28.
Zurück zum Zitat Talarposhti KM, Jamei MK (2016) A secure image encryption method based on dynamic harmony search (DHS) combined with chaotic map. Opt Lasers Eng 81:21–34CrossRef Talarposhti KM, Jamei MK (2016) A secure image encryption method based on dynamic harmony search (DHS) combined with chaotic map. Opt Lasers Eng 81:21–34CrossRef
29.
Zurück zum Zitat Kaur M, Kumar V (2018) Fourier-Mellin moment-based intertwining map for image encryption. Mod Phys Lett B 32(09):1850115MathSciNetCrossRef Kaur M, Kumar V (2018) Fourier-Mellin moment-based intertwining map for image encryption. Mod Phys Lett B 32(09):1850115MathSciNetCrossRef
30.
Zurück zum Zitat Kaur M, Kumar V (2018) Colour image encryption technique using differential evolution in non-subsampled contourlet transform domain. IET Image Process 12:1273–1283CrossRef Kaur M, Kumar V (2018) Colour image encryption technique using differential evolution in non-subsampled contourlet transform domain. IET Image Process 12:1273–1283CrossRef
31.
Zurück zum Zitat Jia D, Zheng G, Khan MK (2011) An effective memetic differential evolution algorithm based on chaotic local search. Inf Sci 181(15):3175–3187CrossRef Jia D, Zheng G, Khan MK (2011) An effective memetic differential evolution algorithm based on chaotic local search. Inf Sci 181(15):3175–3187CrossRef
32.
Zurück zum Zitat Sam IS, Devaraj P, Bhuvaneswaran R (2012) An intertwining chaotic maps based image encryption scheme. Nonlinear Dyn 69(4):1995–2007MathSciNetCrossRef Sam IS, Devaraj P, Bhuvaneswaran R (2012) An intertwining chaotic maps based image encryption scheme. Nonlinear Dyn 69(4):1995–2007MathSciNetCrossRef
33.
Zurück zum Zitat Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29(2):393–399CrossRef Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29(2):393–399CrossRef
34.
Zurück zum Zitat Wang X, Liu C, Xu D, Liu C (2016) Image encryption scheme using chaos and simulated annealing algorithm. Nonlinear Dyn 84(3):1417–1429MathSciNetCrossRef Wang X, Liu C, Xu D, Liu C (2016) Image encryption scheme using chaos and simulated annealing algorithm. Nonlinear Dyn 84(3):1417–1429MathSciNetCrossRef
35.
Zurück zum Zitat Farwa S, Muhammad N, Shah T, Ahmad S (2017) A novel image encryption based on algebraic s-box and Arnold transform. 3D Res 8(3):26CrossRef Farwa S, Muhammad N, Shah T, Ahmad S (2017) A novel image encryption based on algebraic s-box and Arnold transform. 3D Res 8(3):26CrossRef
36.
Zurück zum Zitat Zhang W, Wong K-W, Yu H, Zhu Z-L (2013) An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun Nonlinear Sci Numer Simul 18(8):2066–2080MathSciNetCrossRef Zhang W, Wong K-W, Yu H, Zhu Z-L (2013) An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun Nonlinear Sci Numer Simul 18(8):2066–2080MathSciNetCrossRef
37.
Zurück zum Zitat El-Samie F E A, Ahmed H E H, Elashry I F, Shahieen M H, Faragallah O S, El-Rabaie E-S M, Alshebeili S A (2013) Image encryption: a communication perspective. CRC Press, Boca RatonCrossRef El-Samie F E A, Ahmed H E H, Elashry I F, Shahieen M H, Faragallah O S, El-Rabaie E-S M, Alshebeili S A (2013) Image encryption: a communication perspective. CRC Press, Boca RatonCrossRef
39.
Zurück zum Zitat Luo Y, Du M, Liu J (2015) A symmetrical image encryption scheme in wavelet and time domain. Commun Nonlinear Sci Numer Simul 20(2):447–460CrossRef Luo Y, Du M, Liu J (2015) A symmetrical image encryption scheme in wavelet and time domain. Commun Nonlinear Sci Numer Simul 20(2):447–460CrossRef
40.
Zurück zum Zitat Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image encryption scheme using 2d dwt and 6d hyperchaotic system. Inf Sci 349:137–153CrossRef Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image encryption scheme using 2d dwt and 6d hyperchaotic system. Inf Sci 349:137–153CrossRef
41.
Zurück zum Zitat Kanso A, Ghebleh M (2017) An algorithm for encryption of secret images into meaningful images. Opt Lasers Eng 90:196–208CrossRef Kanso A, Ghebleh M (2017) An algorithm for encryption of secret images into meaningful images. Opt Lasers Eng 90:196–208CrossRef
42.
Zurück zum Zitat Ahmad J, Hwang SO (2016) A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools Appl 75(21):13951–13976CrossRef Ahmad J, Hwang SO (2016) A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools Appl 75(21):13951–13976CrossRef
43.
Zurück zum Zitat Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution–permutation network and chaos. Signal Process 128:155–170CrossRef Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution–permutation network and chaos. Signal Process 128:155–170CrossRef
44.
Zurück zum Zitat Rawat N, Kim B, Kumar R (2016) Fast digital image encryption based on compressive sensing using structurally random matrices and arnold transform technique. Opt Int J Light Electron Opt 127(4):2282–2286CrossRef Rawat N, Kim B, Kumar R (2016) Fast digital image encryption based on compressive sensing using structurally random matrices and arnold transform technique. Opt Int J Light Electron Opt 127(4):2282–2286CrossRef
Metadaten
Titel
Color image encryption approach based on memetic differential evolution
verfasst von
Manjit Kaur
Vijay Kumar
Li Li
Publikationsdatum
19.07.2018
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 11/2019
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-018-3642-7

Weitere Artikel der Ausgabe 11/2019

Neural Computing and Applications 11/2019 Zur Ausgabe