Abstract
Due to its inherent properties such as sensitivity to initial condition, ergodicity and systematic parametrization chaos systems have been extensively used in image encryption. However, one needs to optimize the chaos for each image being encrypted to provide high quality encryption. Features such as high entropy or low pixel correlation are measures of interest in image encryption. In this paper, we propose a novel technique to optimize a chaos based image encryption algorithm. The image is confused using logistic map as chaos function and diffused by modified Knuth shuffling algorithm. We use the logistic map parameters as encryption key. We then harness TLBO and GSA evolutionary algorithms to speed up the optimization process of these parameters. The optimization method yields parameters that lead to lowest correlation among adjacent pixels or highest entropy. We compare the quality and security of our cryptosystem with some famous image encryption methods in the literature.
Similar content being viewed by others
References
Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU Int J Electron Commun 66(10):806–816
Alligood KT, Sauer TD, Yorke JA (1997) Chaos. In: Chaos. Springer, Berlin, pp 105–147
Bani Younes MA, Jantan A (2008) Image encrytion using block based transformation algorithm. IAENG Int J Comput Sci 35:1
Belkhouche F, Qidwai U (2003) Binary image encoding using 1D chaotic maps. In: 2003 Annual technical conference on IEEE region 5. IEEE, pp 39–43
Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761
Enayatifar R (2011) Image encryption via logistic map function and heap tree. Int J Phys Sci 6(2):221–228
Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93
Fard EB, Atani RE (2013) A novel image encryption method based on chaotic maps. In: 2013 3th international conference on computer and knowledge engineering (ICCKE). IEEE, pp 190–195
Guan ZH, Huang F, Guan W (2005) Chaos-based image encryption algorithm. Phys Lett A 346(1):153–157
Jolfaei A, Mirghadri A (2010) A new approach to measure quality of image encryption. Int J Comput Netw Secur 2(8):38–44
Kamali SH, Shakerian R, Hedayati M, Rahmani M (2010) A new modified version of advanced encryption standard based algorithm for image encryption. In: 2010 International conference on electronics and information engineering (ICEIE), vol 1. IEEE, pp V1-141
Khan J, Ahmad J, Hwang SO (2015) An efficient image encryption scheme based on: Henon map, skew tent map and S-Box. In: 2015 6th international conference on modeling, simulation, and applied optimization (ICMSAO). IEEE, pp 1–6
Knuth DE (1998) The art of computer programming: sorting and searching, vol. 3. Pearson Education, London
Lafe O (1996) Data compression and encryption using cellular automata transforms. In: IEEE international joint symposia on intelligence and systems, 1996. IEEE, pp 234–241
Li C, Li S, Chen G, Chen G, Hu L (2005) Cryptanalysis of a new signal security system for multimedia data transmission. EURASIP J Adv Signal Process 2005 (8):1–12
Lian S, Sun J, Wang Z (2005) A block cipher based on a suitable use of the chaotic standard map. Chaos, Solitons Fractals 26(1):117–129
Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90(9):2714–2722
Maniccam SS, Bourbakis NG (2004) Image and video encryption using SCAN patterns. Pattern Recogn 37(4):725–737
Mitra A, Rao YS, Prasanna SRM (2006) A new image encryption approach using combinational permutation techniques. Int J Comput Sci 1(2):127–131
Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimedia Tools Appl 71(3):1469–1497
Rao RV, Savsani VJ, Vakharia DP (2011) Teaching–learning-based optimization: a novel method for constrained mechanical design optimization problems. Comput Aided Des 43(3):303–315
Rao RV, Savsani VJ, Vakharia DP (2012) Teaching–learning-based optimization: an optimization method for continuous non-linear large scale problems. Inf Sci 183 (1):1–15
Rashedi E, Nezamabadi-Pour H, Saryazdi S (2009) GSA: a gravitational search algorithm. Inf Sci 179(13):2232–2248
Sabri NM, Puteh M, Mahmood MR (2013) A review of gravitational search algorithm. Int J Advance Soft Comput Appl 5(3):1–39
Sinha A, Singh K (2003) A technique for image encryption using digital signature. Opt Commun 218(4):229–234
Sreelaja NK, Pai GV (2012) Stream cipher for binary image encryption using Ant Colony Optimization based key generation. Appl Soft Comput 12(9):2879–2895
Van Droogenbroeck M, Benedett R (2002) Techniques for a selective encryption of uncompressed and compressed images. In: ACIVS advanced concepts for intelligent vision systems, proceedings, pp 90–97
Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514–522
Wang W, Tan H, Pang Y, Li Z, Ran P, Wu J (2016) A novel digital image encryption algorithm based on wavelet transform and multi chaos. J Sensors 2016: Article ID 2646205
Wang W, Si M, Pang Y, Ran P, Wang H, Jiang X, Liu Y, Wu J, Wu W, Chilamkurti N, Jeon G (2017) An encryption algorithm based on combined chaos in body area networks. J Comput Electric Eng Available online 18
Zefreh EZ, Rajaee S, Farivary M (2011) Image security system using recursive Cellular automata substitution and its parallelization. In: 2011 CSI international symposium on computer science and software engineering (CSSE). IEEE, pp 77–86
Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775–2780
Zhang Y, Xiao D (2014) Self-adaptive permutation and combined global diffusion for chaotic color image encryption. AEU Int J Electron Commun 68(4):361–368
Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52(11):2028–2035
Zhou Y, Panetta K, Agaian S, Chen CP (2013) (n, k, p)-Gray code for image systems. IEEE Trans Cybern 43(2):515–529
Zhou Y, Bao L, Chen CP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182
Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Noshadian, S., Ebrahimzade, A. & Kazemitabar, S.J. Optimizing chaos based image encryption. Multimed Tools Appl 77, 25569–25590 (2018). https://doi.org/10.1007/s11042-018-5807-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-5807-x