Skip to main content

Advertisement

Log in

Hyper-chaotic Feeded GA (HFGA): a reversible optimization technique for robust and sensitive image encryption

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In recent years, due to their straightforward structure and efficiency, the chaos-based cryptographic algorithms have become a good candidate for image encryption. However, they still suffer from many weaknesses, such as insensitivity to the plain image, weak key streams, small key space, non-resistance to some attacks and failure to meet some security criteria. For this purpose in this paper, a novel hybrid image encryption algorithm named Hyper-chaotic Feeded GA (HFGA) is proposed to fill the gaps in two stages; initial encryption by using a hyper-chaotic system, and then outputs reinforcement by employing a customized Genetic Algorithm (GA). By applying an innovative technique, called gene-labelling, the proposed algorithm not only optimizes the preliminary encrypted images in terms of security criteria but also allows the legal receiver to easily and securely decrypt the optimized cipher image. In fact, in the first stage, besides unpredictable random sequences generated by a hyper-chaotic system, a new sensitive diffusion function is proposed which makes the algorithm resistant to differential attacks. In the second stage, the generated cipher images, which are labeled in a special way, will be used as the initial population of a GA which enhances randomness of the cipher images. The results of several experiments and statistical analysis show that the proposed image encryption scheme provides an efficient and secure way for fast image encrypting as well as providing robustness against some well-known statistical attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU-Int J Electron Commun 66:806–816

    Article  Google Scholar 

  2. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcation Chaos 16:2129–2151

    Article  MathSciNet  MATH  Google Scholar 

  3. Alvarez G, Li S (2009) Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption. Commun Nonlinear Sci Numer Simul 14:3743–3749

    Article  Google Scholar 

  4. Alvarez G, Amigo JM, Arroyo D, Li S (2011) Lessons learnt from the cryptanalysis of chaos-based ciphers. Chaos-Based Cryptogr 10:257–295

    Article  MATH  Google Scholar 

  5. Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2016) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76(18):18451–18472

  6. Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons Fractals 35:408–419

    Article  MathSciNet  MATH  Google Scholar 

  7. Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–170

    Article  Google Scholar 

  8. Chai X (2017) An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimed Tools Appl 76:1159–1175

    Article  Google Scholar 

  9. Chai X, Chen Y, Broyde L (2017a) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197–213

    Article  Google Scholar 

  10. Chai X, Yang K, Gan Z (2017b) A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimed Tools Appl 76:9907–9927

    Article  Google Scholar 

  11. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21:749–761

    Article  MathSciNet  MATH  Google Scholar 

  12. Chen JX, Zhu ZI, Fu C, Yu H, Zhang LB (2015a) An efficient image encryption scheme using gray code based permutation approach. Opt Lasers Eng 67:191–204

    Article  Google Scholar 

  13. Chen JX, Zhu ZL, Fu C, Yu H, Zhang Y (2015b) Reusing the permutation matrix dynamically for efficient image cryptographic algorithm. Signal Process 111:294–307

    Article  Google Scholar 

  14. Das S, Mandal SN, Ghoshal N (2015) Diffusion and encryption of digital image using genetic algorithm. Proceedings of the 3rd international conference on frontiers of intelligent computing 729–736

  15. El-Samie FEA et al. (2013) Image encryption: a communication perspective. CRC Press, Boca Raton

  16. Enayatifar R, Abdullah AH, Isnin IF, Altameem A, Lee M (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146–154

    Article  Google Scholar 

  17. Eslami Z, Bakhshandeh A (2013) An improvement over an image encryption method based on total shuffling. Opt Commun 286:51–55

    Article  Google Scholar 

  18. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8:1259–1284

    Article  MathSciNet  MATH  Google Scholar 

  19. Fu Z, Huang F, Sun X, Vasilakos A, Yang CN (2016) Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Serv Comput. https://doi.org/10.1109/TSC.2016.2622697

  20. Furht B, Kirovski D (2004) Multimedia security handbook. CRC Press, Boca Raton

    Book  Google Scholar 

  21. Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos, Solitons Fractals 29:393–399

    Article  MATH  Google Scholar 

  22. Ghebleh M, Kanso A, Stevanović D (2017) A novel image encryption algorithm based on piecewise linear chaotic maps and least squares approximation. Multimed Tools Appl. https://doi.org/10.1007/s11042-017-4634-9

  23. Guesmi R, Farah MAB, Kachouri A, Samet M (2016a) Hash key-based image encryption using crossover operator and chaos. Multimed tools Appl 75:4753–4769

    Article  MATH  Google Scholar 

  24. Guesmi R, Farah M, Kachouri A, Samet M (2016b) A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dyn 83:1123–1136

    Article  MathSciNet  MATH  Google Scholar 

  25. Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, Hershey

    Book  Google Scholar 

  26. Hua Z, Zhou Y (2016) Image encryption using 2D logistic-adjusted-sine map. Inf Sci 339:237–253

    Article  Google Scholar 

  27. Kahan W (1996) IEEE standard 754 for binary floating-point arithmetic. Lect Notes Status IEEE 754:11–12

    Google Scholar 

  28. Li C (2016) Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process 118:203–210

    Article  Google Scholar 

  29. Li J, Yu C, Gupta B, Ren X (2017) Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed Tools Appl. https://doi.org/10.1007/s11042-017-4452-0

  30. Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90:2714–2722

    Article  MATH  Google Scholar 

  31. Liu Z et al (2010) Double-image encryption based on the affine transform and the gyrator transform. J Opt 12:35–47

    Google Scholar 

  32. Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26–36

    Article  Google Scholar 

  33. Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67:557–566

    Article  MathSciNet  Google Scholar 

  34. Murugan B, Gounder A (2016) Image encryption scheme based on block-based confusion and multiple levels of diffusion. IET Comput Vis 10:593–602

    Article  Google Scholar 

  35. Norouzi B, Mirzakuchaki S (2017) Breaking a novel image encryption scheme based on an improper fractional order chaotic system. Multimed Tools Appl 76:1817–1826

    Article  Google Scholar 

  36. Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2014a) A novel image encryption based on hash function with only two-round diffusion process. Multimedia Systems 20:45–64

    Article  Google Scholar 

  37. Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014b) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71:1469–1497

    Article  Google Scholar 

  38. Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2015) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed Tools Appl 74:781–811

    Article  Google Scholar 

  39. Parvin Z, Seyedarabi H, Shamsi M (2016) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed Tools Appl 75:10631–10648

    Article  Google Scholar 

  40. Patidar V, Pareek N, Sud K (2009) A new substitution–diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14:3056–3075

    Article  Google Scholar 

  41. Ping P, Xu F, Wang ZJ (2014) Image encryption based on non-affine and balanced cellular automata. Signal Process 105:419–429

    Article  Google Scholar 

  42. Stinson DR (2005) Cryptography: theory and practice. CRC press, Boca Raton

    MATH  Google Scholar 

  43. Su Y, Tang C, Chen X, Li B, Xu W, Lei Z (2017) Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map. Opt Lasers Eng 88:20–27

    Article  Google Scholar 

  44. Teng L, Wang X, Meng J (2017) A chaotic color image encryption using integrated bit-level permutation. Multimed Tools Appl. https://doi.org/10.1007/s11042-017-4605-1

  45. Wang X, Zhang HI (2016) A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dyn 83:333–346

    Article  MathSciNet  Google Scholar 

  46. Wang K, Zou L, Song A, He Z (2005) On the security of 3D cat map based symmetric image encryption scheme. Phys Lett A 343:432–439

    Article  MATH  Google Scholar 

  47. Wang Y, Liao X, Xiang T, Wong KW, Yang D (2007) Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map. Phys Lett A 363:277–281

    Article  MATH  Google Scholar 

  48. Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62:615–621

    Article  MATH  Google Scholar 

  49. Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18

    Article  Google Scholar 

  50. Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85:290–299

    Article  Google Scholar 

  51. Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 75:1947–1962

    Article  Google Scholar 

  52. Xiang T, Liao X, Tang G, Chen Y, Wong KW (2006) A novel block cryptosystem based on iterating a chaotic map. Phys Lett A 349:109–115

    Article  MATH  Google Scholar 

  53. Xie EY, Li C, Yu S, Lu J (2017) On the cryptanalysis of Fridrich's chaotic image encryption scheme. Signal Process 132:150–154

    Article  Google Scholar 

  54. Yu C, Li J, Li X, Ren X, Gupta B (2017) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl. https://doi.org/10.1007/s11042-017-4637-6

  55. Yuan C, Xia Z, Sun X (2017) Coverless image steganography based on SIFT and BOF. Internet Technol 18:435–442

    Google Scholar 

  56. Yujun N, Xingyuan W, Mingjun W, Huaguang Z (2010) A new hyperchaotic system and its circuit implementation. Commun Nonlinear Sci Numer Simul 15:3518–3524

    Article  Google Scholar 

  57. Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284:2775–2780

    Article  Google Scholar 

  58. Zhang Y, Li C, Li Q, Zhang D, Shu S (2012) Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 69:1091–1096

    Article  MathSciNet  MATH  Google Scholar 

  59. Zhang YQ, Wang XY, Liu J, Chi ZL (2016) An image encryption scheme based on the MLNCML system using DNA sequences. Opt Lasers Eng 82:95–103

    Article  Google Scholar 

  60. Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285:29–37

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hadi Shahriar Shahhoseini.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pashakolaee, P.G., Shahhoseini, H.S. & Mollajafari, M. Hyper-chaotic Feeded GA (HFGA): a reversible optimization technique for robust and sensitive image encryption. Multimed Tools Appl 77, 20385–20414 (2018). https://doi.org/10.1007/s11042-017-5461-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-5461-8

Keywords

Navigation