Skip to main content

Advertisement

Log in

Image encryption using genetic operators and intertwining logistic map

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

In this paper, we try to propose a new “Selection–Crossover–Mutation” architecture which is based on the modern cryptography from the aspect of genetic mechanisms, mainly draws on the design of the genetic operators. The intertwining logistic map has been used to generate the chaotic sequences owing to its advantages. We take each pixel as an “individual,” each bit of it as a gene, first, the “Selection” phrase, use Monte Carlo method to randomly select two individuals according to the chaotic sequences, cross them, swap their genes using the specified crossover operator in the second phrase, and then finally, change the genes of the individuals randomly for the mutation phrase. Experiments and security analysis show that the indicators of the algorithm are good and can resist common kinds of attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Flores-Carapia, R., Silva-Garcia, V.M., Renteria-Marquez, C.: Des block of 96 bits: an application to image encryption. Int. J. Res. Rev. Appl. Sci. 14(1), 58–63 (2013)

    MathSciNet  Google Scholar 

  2. Coppersmith, D.: The Data Encryption Standard (DES) and its strength against attacks. IBM J. Res. Dev. 38(3), 243–250 (1994)

    Article  MATH  MathSciNet  Google Scholar 

  3. Williams, H.C.: A modification of the rsa public-key encryption procedure. IEEE Trans. Inf. Theory 26(6), 726–729 (1980)

    Article  MATH  Google Scholar 

  4. Deng, C., Luo, Y.: An optimized RSA digital image encryption algorithm and the analysis of its security. Manuf. Autom. 32(8), 40–43 (2010)

    Google Scholar 

  5. Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656 (1949)

    Article  MATH  MathSciNet  Google Scholar 

  6. Ye, G.D., Kwok-Wo, W.: An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dyn. 69(4), 2079–2087 (2012)

    Article  Google Scholar 

  7. Ye, R.S., Chen, Y.H.: A novel image encryption scheme based on the ergodicity of baker map. In: Guo, H., Ding, Q. (eds.) 2012 International Workshop on Image Processing and Optical Engineering, vol. 8335. Proceedings of SPIE. Spie-Int Soc Optical Engineering, Bellingham (2012)

  8. Elshamy, A.M., Rashed, A.N.Z., Mohamed, A.A., Faragalla, O.S., Mu, Y., Alshebeili, S.A., Abd El-Samie, F.E.: Optical image encryption based on chaotic baker map and double random phase encoding. J. Lightwave Technol. 31(15), 2533–2539 (2013)

    Article  Google Scholar 

  9. Tafti, A.P., Janosepah, S.: Digital images encryption in frequency domain based on DCT and one dimensional cellular automata. In: Abd Manaf, A., Zeki, A., Zamani, M., Chuprat, S., El Qawasmeh, E. (eds.) Informatics Engineering and Information Science, Pt I. Communications in Computer and Information Science, vol. 251, pp. 421–427. Springer, Berlin (2011)

    Chapter  Google Scholar 

  10. Abd El-Latif, A.A., Niu, X.M., Wang, N.: Chaotic image encryption using Bezier Curve in DCT domain scrambling. In: Ariwa, E., El Qawasmeh, E. (eds.) Digital Enterprise and Information Systems, Communications in Computer and Information Science, pp. 30–41. Springer, Berlin (2011)

    Google Scholar 

  11. Guan, Z.H., Huang, F.J., Guan, W.J.: Chaos-based image encryption algorithm. Phys. Lett. A 346(1–3), 153–157 (2005)

    Article  MATH  Google Scholar 

  12. Sun, F.Y., Liu, S.T., Li, Z.Q., Lu, Z.W.: A novel image encryption scheme based on spatial chaos map. Chaos Solitons Fractals 38(3), 631–640 (2008)

    Article  MATH  MathSciNet  Google Scholar 

  13. Gao, T.G., Chen, Z.Q.: A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(4), 394–400 (2008)

    Article  MATH  MathSciNet  Google Scholar 

  14. Zhang, Y.S., Xiao, D.: An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun. Nonlinear Sci. Numer. Simul. 19(1), 74–82 (2014)

    Article  MathSciNet  Google Scholar 

  15. May, R.M.: simple mathematical-models with very complicated dynamics. Nature 261(5560), 459–467 (1976)

    Article  Google Scholar 

  16. Ma, T.D., Fu, J.: On the exponential synchronization of stochastic impulsive chaotic delayed neural networks. Neurocomputing 74(5), 857–862 (2011)

    Article  Google Scholar 

  17. Ma, T.D., Fu, J.: Global exponential synchronization between Lü system and Chen system with unknown parameters and channel time-delay. Chin. Phys. B 20(5), 050511 (2011)

    Article  Google Scholar 

Download references

Acknowledgments

This research is supported by the National Natural Science Foundation of China (Nos: 61370145, 61173183, and 60973152), the Doctoral Program Foundation of Institution of Higher Education of China (No: 20070141014), Program for Liaoning Excellent Talents in University (No: LR2012003), the National Natural Science Foundation of Liaoning province (No: 20082165) and the Fundamental Research Funds for the Central Universities (No: DUT12JB06).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Xingyuan Wang or Dahai Xu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, X., Xu, D. Image encryption using genetic operators and intertwining logistic map. Nonlinear Dyn 78, 2975–2984 (2014). https://doi.org/10.1007/s11071-014-1639-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-014-1639-z

Keywords

Navigation