Abstract
In this paper, we try to propose a new “Selection–Crossover–Mutation” architecture which is based on the modern cryptography from the aspect of genetic mechanisms, mainly draws on the design of the genetic operators. The intertwining logistic map has been used to generate the chaotic sequences owing to its advantages. We take each pixel as an “individual,” each bit of it as a gene, first, the “Selection” phrase, use Monte Carlo method to randomly select two individuals according to the chaotic sequences, cross them, swap their genes using the specified crossover operator in the second phrase, and then finally, change the genes of the individuals randomly for the mutation phrase. Experiments and security analysis show that the indicators of the algorithm are good and can resist common kinds of attacks.
Similar content being viewed by others
References
Flores-Carapia, R., Silva-Garcia, V.M., Renteria-Marquez, C.: Des block of 96 bits: an application to image encryption. Int. J. Res. Rev. Appl. Sci. 14(1), 58–63 (2013)
Coppersmith, D.: The Data Encryption Standard (DES) and its strength against attacks. IBM J. Res. Dev. 38(3), 243–250 (1994)
Williams, H.C.: A modification of the rsa public-key encryption procedure. IEEE Trans. Inf. Theory 26(6), 726–729 (1980)
Deng, C., Luo, Y.: An optimized RSA digital image encryption algorithm and the analysis of its security. Manuf. Autom. 32(8), 40–43 (2010)
Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656 (1949)
Ye, G.D., Kwok-Wo, W.: An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dyn. 69(4), 2079–2087 (2012)
Ye, R.S., Chen, Y.H.: A novel image encryption scheme based on the ergodicity of baker map. In: Guo, H., Ding, Q. (eds.) 2012 International Workshop on Image Processing and Optical Engineering, vol. 8335. Proceedings of SPIE. Spie-Int Soc Optical Engineering, Bellingham (2012)
Elshamy, A.M., Rashed, A.N.Z., Mohamed, A.A., Faragalla, O.S., Mu, Y., Alshebeili, S.A., Abd El-Samie, F.E.: Optical image encryption based on chaotic baker map and double random phase encoding. J. Lightwave Technol. 31(15), 2533–2539 (2013)
Tafti, A.P., Janosepah, S.: Digital images encryption in frequency domain based on DCT and one dimensional cellular automata. In: Abd Manaf, A., Zeki, A., Zamani, M., Chuprat, S., El Qawasmeh, E. (eds.) Informatics Engineering and Information Science, Pt I. Communications in Computer and Information Science, vol. 251, pp. 421–427. Springer, Berlin (2011)
Abd El-Latif, A.A., Niu, X.M., Wang, N.: Chaotic image encryption using Bezier Curve in DCT domain scrambling. In: Ariwa, E., El Qawasmeh, E. (eds.) Digital Enterprise and Information Systems, Communications in Computer and Information Science, pp. 30–41. Springer, Berlin (2011)
Guan, Z.H., Huang, F.J., Guan, W.J.: Chaos-based image encryption algorithm. Phys. Lett. A 346(1–3), 153–157 (2005)
Sun, F.Y., Liu, S.T., Li, Z.Q., Lu, Z.W.: A novel image encryption scheme based on spatial chaos map. Chaos Solitons Fractals 38(3), 631–640 (2008)
Gao, T.G., Chen, Z.Q.: A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(4), 394–400 (2008)
Zhang, Y.S., Xiao, D.: An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun. Nonlinear Sci. Numer. Simul. 19(1), 74–82 (2014)
May, R.M.: simple mathematical-models with very complicated dynamics. Nature 261(5560), 459–467 (1976)
Ma, T.D., Fu, J.: On the exponential synchronization of stochastic impulsive chaotic delayed neural networks. Neurocomputing 74(5), 857–862 (2011)
Ma, T.D., Fu, J.: Global exponential synchronization between Lü system and Chen system with unknown parameters and channel time-delay. Chin. Phys. B 20(5), 050511 (2011)
Acknowledgments
This research is supported by the National Natural Science Foundation of China (Nos: 61370145, 61173183, and 60973152), the Doctoral Program Foundation of Institution of Higher Education of China (No: 20070141014), Program for Liaoning Excellent Talents in University (No: LR2012003), the National Natural Science Foundation of Liaoning province (No: 20082165) and the Fundamental Research Funds for the Central Universities (No: DUT12JB06).
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Wang, X., Xu, D. Image encryption using genetic operators and intertwining logistic map. Nonlinear Dyn 78, 2975–2984 (2014). https://doi.org/10.1007/s11071-014-1639-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-014-1639-z