Skip to main content

2015 | OriginalPaper | Buchkapitel

Multiple-Image Encryption Using Genetic Algorithm

verfasst von : Subhajit Das, SatyendraNath Mandal, Nabin Ghoshal

Erschienen in: Intelligent Computing and Applications

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Multiple images have to be sent some time for different purposes. Those images encrypt individually before their sending through non-secure channel. This process is painful and also time-consuming. In this paper, multiple images are encrypted using genetic algorithm. Here, a set of crossover points and a set of values are used to diffuse and encrypt the images. These two sets are computed from a key sequence. The original images have been diffused by genetic algorithm. Bitwise XOR operation has been applied between key set and diffuse images to get encrypted images. The effectiveness of the algorithm has been tested by number of statistical tests like histogram analysis, correlation, and entropy test. A comparison is made between the proposed algorithm and other genetic-based encryption algorithm. Finally, it has been observed that the proposed algorithm is given better result in all tests with less execution time.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wang, X., Luan, D.: A novel image encryption algorithm using chaos and reversible cellular automata. Commun. Nonlinear Sci. Numer. Simul. 1, 3075–3085 (2013)CrossRefMathSciNet Wang, X., Luan, D.: A novel image encryption algorithm using chaos and reversible cellular automata. Commun. Nonlinear Sci. Numer. Simul. 1, 3075–3085 (2013)CrossRefMathSciNet
2.
Zurück zum Zitat Zeghid, M., Machhout, M., Khriji, L., Baganne, A., Tourki, R.: A modified AES based algorithm for image encryption. Int. J. Comput. Inf. Syst. Control Eng. 1(3), 735–740 (2007) Zeghid, M., Machhout, M., Khriji, L., Baganne, A., Tourki, R.: A modified AES based algorithm for image encryption. Int. J. Comput. Inf. Syst. Control Eng. 1(3), 735–740 (2007)
3.
Zurück zum Zitat Younes, M.A, Jantan, A.: Image encryption using block based transformation algorithm. Int. J. Comput. Sci. 35, 1 (2008) (9 pages) Younes, M.A, Jantan, A.: Image encryption using block based transformation algorithm. Int. J. Comput. Sci. 35, 1 (2008) (9 pages)
4.
Zurück zum Zitat Yadav, R.S., Beg, R., Tripathi, M.M.: Image encryption technique: a critical comparison. Int. J. Comput. Sci. Eng. Inf. Technol. Res. (IJCSEITR) 3(1), 67–74 (2013) Yadav, R.S., Beg, R., Tripathi, M.M.: Image encryption technique: a critical comparison. Int. J. Comput. Sci. Eng. Inf. Technol. Res. (IJCSEITR) 3(1), 67–74 (2013)
5.
Zurück zum Zitat Yen, J.-C., Guo, J.-I.: A new chaotic key-based design for image encryption and decryption. IEEE Int. Conf. Circuits Syst. 4, 49–52 (2000) Yen, J.-C., Guo, J.-I.: A new chaotic key-based design for image encryption and decryption. IEEE Int. Conf. Circuits Syst. 4, 49–52 (2000)
6.
Zurück zum Zitat Socek, D., Li, S., Magliveras, S.S., Furht, B.: Enhanced 1-D chaotic key-based algorithm for image encryption. In: IEEE/CreateNet SecureComm, pp. 406–408. Athens, Greece, 5–9 Sept 2005 Socek, D., Li, S., Magliveras, S.S., Furht, B.: Enhanced 1-D chaotic key-based algorithm for image encryption. In: IEEE/CreateNet SecureComm, pp. 406–408. Athens, Greece, 5–9 Sept 2005
7.
Zurück zum Zitat Al-Husainy, M.A.F: Image encryption using genetic algorithm. Inf. Technol. J. 5, 516–519 (2006) (Asian Network For Scientific Information) Al-Husainy, M.A.F: Image encryption using genetic algorithm. Inf. Technol. J. 5, 516–519 (2006) (Asian Network For Scientific Information)
8.
Zurück zum Zitat Soni, A., Agrawal, S.: Using genetic algorithm for symmetric key generation in image encryption. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 1(10), 137–140 (2012). ISSN: 2278–1323 Soni, A., Agrawal, S.: Using genetic algorithm for symmetric key generation in image encryption. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 1(10), 137–140 (2012). ISSN: 2278–1323
9.
Zurück zum Zitat Guanghui, C., Kai, H., Yizhi, Z., Jun, Z., Xing, Z.: Chaotic image encryption based on running-key related to plaintext. Sci. World J. Article id 490179, p. 9 (2014) Guanghui, C., Kai, H., Yizhi, Z., Jun, Z., Xing, Z.: Chaotic image encryption based on running-key related to plaintext. Sci. World J. Article id 490179, p. 9 (2014)
10.
Zurück zum Zitat Bhatnagar, G., JonathanWu, Q.M.: A novel chaotic encryption framework for securing palmprint data. In: The 3rd International Conference on Ambient Systems, Networks and Technologies, pp. 442–449. Elsevier (2012) Bhatnagar, G., JonathanWu, Q.M.: A novel chaotic encryption framework for securing palmprint data. In: The 3rd International Conference on Ambient Systems, Networks and Technologies, pp. 442–449. Elsevier (2012)
11.
Zurück zum Zitat Jolfaei, A., Mirghadri, A.: A novel image encryption scheme using pixel shuffler and A5/1. In: International Conference on Artificial Intelligence and Computational Intelligence, pp. 369–373 (2010) Jolfaei, A., Mirghadri, A.: A novel image encryption scheme using pixel shuffler and A5/1. In: International Conference on Artificial Intelligence and Computational Intelligence, pp. 369–373 (2010)
12.
Zurück zum Zitat Das, S., Mandal, S.N., Ghoshal, N.: Diffusion of encryption of digital image using genetic algorithm. FICTA 2014 Advances in Intelligent Systems and Computing, vol. 327, pp. 729–736. Springer (2015) Das, S., Mandal, S.N., Ghoshal, N.: Diffusion of encryption of digital image using genetic algorithm. FICTA 2014 Advances in Intelligent Systems and Computing, vol. 327, pp. 729–736. Springer (2015)
Metadaten
Titel
Multiple-Image Encryption Using Genetic Algorithm
verfasst von
Subhajit Das
SatyendraNath Mandal
Nabin Ghoshal
Copyright-Jahr
2015
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2268-2_16