Skip to main content
Top
Published in: Soft Computing 7/2021

05-01-2021 | Methodologies and Application

A hybrid chaotic map with coefficient improved whale optimization-based parameter tuning for enhanced image encryption

Authors: S. Saravanan, M. Sivabalakrishnan

Published in: Soft Computing | Issue 7/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The security of the data becomes the main concern due to the quick rise in the exchange of data over the open networks and the Internet. The cryptographic techniques based on chaos theory reveal some novel and effectual orders to develop secure image encryption approaches. Images are the most attractive kinds of data in the encryption domain. In current years, the chaos-based cryptographic techniques have provided an efficient way to expand secure image encryption frameworks. This proposal temps to develop an optimized HCM for promoting novel image encryption. The proposed image encryption model involves 4 steps, such as image pre-processing, key generation, image encryption using optimized HCM, and image decryption. In the pre-processing, the RGB image is converted into a grayscale image, and the key is generated by the SHA-256 cryptographic hash algorithm. Further, the encryption of the image is performed by HCM with the integration of 2DLCM, and PWLCM. While hybridizing the two chaotic maps for image encryption, parameter tuning or optimization is performed for improving its performance. Moreover, Information entropy is considered as the objective model that has to be maximized while tuning the parameters, and the maximum value of information entropy will mean the best performance. An improvement in the well-known optimization algorithms termed as CI-WOA is adopted for performing the parameter optimization of HCM. Hence, the optimized HCM-based image encryption can be confirmed as an efficient and secure way for all types of image transmissions.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Abhishek S, George N, Deepthi PP (2013) PWLCM based image encryption through compressive sensing. In: IEEE recent advances in intelligent computational systems (RAICS), Trivandrum, pp 48–52 Abhishek S, George N, Deepthi PP (2013) PWLCM based image encryption through compressive sensing. In: IEEE recent advances in intelligent computational systems (RAICS), Trivandrum, pp 48–52
go back to reference Algredo-Badillo I, Feregrino-Uribe C, Cumplido R, Morales-Sandoval M (2013) FPGA-based implementation alternatives for the inner loop of the Secure Hash Algorithm SHA-256. Microprocess Microsyst 37(6–7):750–757CrossRef Algredo-Badillo I, Feregrino-Uribe C, Cumplido R, Morales-Sandoval M (2013) FPGA-based implementation alternatives for the inner loop of the Secure Hash Algorithm SHA-256. Microprocess Microsyst 37(6–7):750–757CrossRef
go back to reference Ben Farah MA, Guesmi R, Kachouri A, Samet M (2020) A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt Laser Technol 121:1MATH Ben Farah MA, Guesmi R, Kachouri A, Samet M (2020) A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt Laser Technol 121:1MATH
go back to reference Cao W, Mao Y, Zhou Y (2020) Designing a 2D infinite collapse map for image encryption. Sig Process 171:1CrossRef Cao W, Mao Y, Zhou Y (2020) Designing a 2D infinite collapse map for image encryption. Sig Process 171:1CrossRef
go back to reference Chen LF, Chang GJ, He BY (2017) Optical image conversion and encryption by diffraction, phase retrieval algorithm and incoherent superposition. Opt Lasers Eng 88:221–232CrossRef Chen LF, Chang GJ, He BY (2017) Optical image conversion and encryption by diffraction, phase retrieval algorithm and incoherent superposition. Opt Lasers Eng 88:221–232CrossRef
go back to reference Chen C, Sun K, He S (2019) An improved image encryption algorithm with finite computing precision. Signal Processing Chen C, Sun K, He S (2019) An improved image encryption algorithm with finite computing precision. Signal Processing
go back to reference Chen J, Li XW, Wang Q-H (2019b) Deep learning for improving the robustness of image encryption. IEEE Access 7:181083–181091CrossRef Chen J, Li XW, Wang Q-H (2019b) Deep learning for improving the robustness of image encryption. IEEE Access 7:181083–181091CrossRef
go back to reference Darwish SM, Noori ZH (2019) Secure image compression approach based on fusion of 3D chaotic maps and arithmetic coding. IET Signal Proc 13(3):286–295CrossRef Darwish SM, Noori ZH (2019) Secure image compression approach based on fusion of 3D chaotic maps and arithmetic coding. IET Signal Proc 13(3):286–295CrossRef
go back to reference Etem T, Kaya T (2019) A novel true random bit generator design for image encryption. Phys A: Stat Mech Appl Etem T, Kaya T (2019) A novel true random bit generator design for image encryption. Phys A: Stat Mech Appl
go back to reference Frauel Y, Castro A, Naughton T, Javidi B (2007) Resistance of the double random phase encryption against various attacks. Opt Express 15:10253–10265CrossRef Frauel Y, Castro A, Naughton T, Javidi B (2007) Resistance of the double random phase encryption against various attacks. Opt Express 15:10253–10265CrossRef
go back to reference Gupta A, Singh D, Kaur M (2020) An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps. J Ambient Intell Hum Comput 11:1309–1324CrossRef Gupta A, Singh D, Kaur M (2020) An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps. J Ambient Intell Hum Comput 11:1309–1324CrossRef
go back to reference Hu Y, Zhu C, Wang Z (2014) An improved piecewise linear chaotic map based image encryption algorithm. Sci World J Hu Y, Zhu C, Wang Z (2014) An improved piecewise linear chaotic map based image encryption algorithm. Sci World J
go back to reference Hua Z, Zhou B, Zhou Y (2018) Sine-transform-based Chaotic system with FPGA implementation. IEEE Multimedia 65(3):1 Hua Z, Zhou B, Zhou Y (2018) Sine-transform-based Chaotic system with FPGA implementation. IEEE Multimedia 65(3):1
go back to reference John FB, Alejandro MA, Roberto T (2014) Experimental QR code optical encryption: noise-free data recovering. Opt Lett 39(10):3074–3077CrossRef John FB, Alejandro MA, Roberto T (2014) Experimental QR code optical encryption: noise-free data recovering. Opt Lett 39(10):3074–3077CrossRef
go back to reference Kang Y, Zhang LH, Zhang DW (2018) Optical encryption based on ghost imaging and public key cryptography. Opt Lasers Eng 111:58–64CrossRef Kang Y, Zhang LH, Zhang DW (2018) Optical encryption based on ghost imaging and public key cryptography. Opt Lasers Eng 111:58–64CrossRef
go back to reference Kaur M, Kumar V (2018b) Parallel non-dominated sorting genetic algorithm-II-based image encryption technique. Imaging Sci J 66(8):453–462CrossRef Kaur M, Kumar V (2018b) Parallel non-dominated sorting genetic algorithm-II-based image encryption technique. Imaging Sci J 66(8):453–462CrossRef
go back to reference Kaur M, Kumar V, Li L (2019) Color image encryption approach based on memetic differential evolution. Neural Comput Appl 31:7975–7987CrossRef Kaur M, Kumar V, Li L (2019) Color image encryption approach based on memetic differential evolution. Neural Comput Appl 31:7975–7987CrossRef
go back to reference Kaur M, Singh D, Sun K, Rawat U (2020) Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map. Fut Gen Comput Syst 107:333–350CrossRef Kaur M, Singh D, Sun K, Rawat U (2020) Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map. Fut Gen Comput Syst 107:333–350CrossRef
go back to reference Khan J, Khan M, Ahmad J, Hwang S, Ahmed W (2017) An improved image encryption scheme based on a non-linear Chaotic algorithm and substitution boxes. Informatica 28:629–649CrossRef Khan J, Khan M, Ahmad J, Hwang S, Ahmed W (2017) An improved image encryption scheme based on a non-linear Chaotic algorithm and substitution boxes. Informatica 28:629–649CrossRef
go back to reference Koppu S, Madhu Viswanatham V (2018) Medical image security enhancement using two dimensional chaotic mapping optimized by self-adaptive grey wolf algorithm. Evol Intel 11(1–2):53–71CrossRef Koppu S, Madhu Viswanatham V (2018) Medical image security enhancement using two dimensional chaotic mapping optimized by self-adaptive grey wolf algorithm. Evol Intel 11(1–2):53–71CrossRef
go back to reference Kumar P, Fatima A, Nishchal NK (2019) Image encryption using phase-encoded exclusive-OR operations with incoherent illumination. J Opt 21:065701CrossRef Kumar P, Fatima A, Nishchal NK (2019) Image encryption using phase-encoded exclusive-OR operations with incoherent illumination. J Opt 21:065701CrossRef
go back to reference Li X, Mou Y, Cai Z Ji, Zhang J (2003) On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision. Comput Phys Commun 153(1):52–58MathSciNetMATHCrossRef Li X, Mou Y, Cai Z Ji, Zhang J (2003) On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision. Comput Phys Commun 153(1):52–58MathSciNetMATHCrossRef
go back to reference Lin L, Shen M, So H, Chang C (2012) Convergence analysis for initial condition estimation in coupled map lattice systems. IEEE Trans Signal Process 60(8):4426–4432MathSciNetMATHCrossRef Lin L, Shen M, So H, Chang C (2012) Convergence analysis for initial condition estimation in coupled map lattice systems. IEEE Trans Signal Process 60(8):4426–4432MathSciNetMATHCrossRef
go back to reference Maniyath SR, Thanikaiselvan V (2020) An efficient image encryption using deep neural network and chaotic Map. Microprocess Microsyst 77:1CrossRef Maniyath SR, Thanikaiselvan V (2020) An efficient image encryption using deep neural network and chaotic Map. Microprocess Microsyst 77:1CrossRef
go back to reference Mirjalili S, Lewis A (2016) The Whale optimization algorithm. Adv Eng Softw 95:51–67CrossRef Mirjalili S, Lewis A (2016) The Whale optimization algorithm. Adv Eng Softw 95:51–67CrossRef
go back to reference Mirjalili S, Mirjalili SM, Lewis A (2014) Grey Wolf optimizer. Adv Eng Softw 69:46–61CrossRef Mirjalili S, Mirjalili SM, Lewis A (2014) Grey Wolf optimizer. Adv Eng Softw 69:46–61CrossRef
go back to reference Muniraj I, Guo CL, Malallah R (2017) Low photon count based digital holography for quadratic phase cryptography. Opt Lett 42(14):2774–2777CrossRef Muniraj I, Guo CL, Malallah R (2017) Low photon count based digital holography for quadratic phase cryptography. Opt Lett 42(14):2774–2777CrossRef
go back to reference Nematzadeh H, Enayatifar R, Yadollahi M, Lee M, Jeong G (2019) Binary Search Tree Image encryption with DNA. Optik Nematzadeh H, Enayatifar R, Yadollahi M, Lee M, Jeong G (2019) Binary Search Tree Image encryption with DNA. Optik
go back to reference Oteko Tresor L, Sumbwanyambe M (2019) A selective image encryption scheme based on 2D DWT, Henon map and 4D Qi hyper-Chaos. IEEE Access 7:103463–103472CrossRef Oteko Tresor L, Sumbwanyambe M (2019) A selective image encryption scheme based on 2D DWT, Henon map and 4D Qi hyper-Chaos. IEEE Access 7:103463–103472CrossRef
go back to reference Patro AK, Acharya B (2019) An efficient colour image encryption scheme based on 1-D chaotic maps. J Inf Secur Appl 46:23–41 Patro AK, Acharya B (2019) An efficient colour image encryption scheme based on 1-D chaotic maps. J Inf Secur Appl 46:23–41
go back to reference Qin W, Peng X (2010) Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Lett 35(2):118–120CrossRef Qin W, Peng X (2010) Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Lett 35(2):118–120CrossRef
go back to reference Singh N, Sinha A (2009) Gyrator transform-based optical image encryption using chaos. Opt Lett 47:539–546 Singh N, Sinha A (2009) Gyrator transform-based optical image encryption using chaos. Opt Lett 47:539–546
go back to reference Wang Y, Quan C, Tay CJ (2014) Nonlinear multiple-image encryption based on mixture retrieval algorithm in Fresnel domain. Opt Commun 330(1):9198 Wang Y, Quan C, Tay CJ (2014) Nonlinear multiple-image encryption based on mixture retrieval algorithm in Fresnel domain. Opt Commun 330(1):9198
go back to reference Wu Y, Noonan JP, Yang G, Jin H (2012) Image encryption using the two-dimensional logistic chaotic map. J Electron Imaging 21(1):1CrossRef Wu Y, Noonan JP, Yang G, Jin H (2012) Image encryption using the two-dimensional logistic chaotic map. J Electron Imaging 21(1):1CrossRef
go back to reference Xiao B, Luo J, Bi X, Li W, Chen B (2020) Fractional discrete Tchebyshev moments and their applications in image encryption and watermarking. Inf Sci 516:545–559MathSciNetCrossRef Xiao B, Luo J, Bi X, Li W, Chen B (2020) Fractional discrete Tchebyshev moments and their applications in image encryption and watermarking. Inf Sci 516:545–559MathSciNetCrossRef
go back to reference Yao S, Chen L, Zhong Y (2019) An encryption system for color image based on compressive sensing. Opt Laser Technol 120:1CrossRef Yao S, Chen L, Zhong Y (2019) An encryption system for color image based on compressive sensing. Opt Laser Technol 120:1CrossRef
go back to reference Zhang X, Wang L, Zhou Z, Niu Y (2019) A Chaos-based image encryption technique utilizing Hilbert curves and H-fractals. IEEE Access 7:74734–74746CrossRef Zhang X, Wang L, Zhou Z, Niu Y (2019) A Chaos-based image encryption technique utilizing Hilbert curves and H-fractals. IEEE Access 7:74734–74746CrossRef
go back to reference Zhou Y, Bao L, Chen C (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182CrossRef Zhou Y, Bao L, Chen C (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182CrossRef
go back to reference Zhu C, Sun K (2018) Cryptanalyzing and improving a novel color image encryption algorithm using RT-enhanced Chaotic tent maps. IEEE Access 6:18759–18770CrossRef Zhu C, Sun K (2018) Cryptanalyzing and improving a novel color image encryption algorithm using RT-enhanced Chaotic tent maps. IEEE Access 6:18759–18770CrossRef
go back to reference Zhu C, Liao C, Deng X (2013) Breaking and improving an image encryption scheme based on total shufing scheme. Nonlinear Dyn 71(12):2534 Zhu C, Liao C, Deng X (2013) Breaking and improving an image encryption scheme based on total shufing scheme. Nonlinear Dyn 71(12):2534
go back to reference Zhu C, Wang G, Sun K (2018) Improved cryptanalysis and enhancements of an image encryption scheme using combined 1D Chaotic maps. Entropy 20(11):843CrossRef Zhu C, Wang G, Sun K (2018) Improved cryptanalysis and enhancements of an image encryption scheme using combined 1D Chaotic maps. Entropy 20(11):843CrossRef
go back to reference Zhu H, Zhao Y, Song Y (2019) 2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption. IEEE Access 7:14081–14098CrossRef Zhu H, Zhao Y, Song Y (2019) 2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption. IEEE Access 7:14081–14098CrossRef
Metadata
Title
A hybrid chaotic map with coefficient improved whale optimization-based parameter tuning for enhanced image encryption
Authors
S. Saravanan
M. Sivabalakrishnan
Publication date
05-01-2021
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 7/2021
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-020-05528-w

Other articles of this Issue 7/2021

Soft Computing 7/2021 Go to the issue

Premium Partner