Skip to main content

Advertisement

Log in

Genetic and chaotic signatures in offspring – an encrypted generation of image family

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the rapid escalation of information technology and the internet, the digital image has turned out to be a vital medium for communication. Hence, there is an increasing demand to protect these digital images as they are transmitted over the insecure medium such as the Internet. This paper proposes the Genetic Algorithm influenced image encryption scheme. Both crossover and mutation operations were performed to enhance the statistical measures of the grayscale cipher images. Intra-pixel bit manipulation improved the diffusion property during mutation. Crossover accomplished the generation of offspring with the confluence of image intensities and keys. The chaotic Logistic and Tent maps provided improvement in keyspace through their role in the generation of initial seeds. Noticeably, the initial seeds were generated from the features of input image such as minimum & maximum number of occurrences of intensity and minimum & maximum intensity levels. In this regard, every image will accompany a unique key sequence as a session key which needs to be shared with the intended receiver for the distortion-free recovery of original images. Besides, the multi-point genetic crossover was employed for diffusion which resulted in the production of a couple of offspring. The Fitness test which decides the number of generations was executed by performing correlation and entropy analyses at a threshold of 0.01 and 7.99 for the former and later respectively. The investigational consequences authenticate that the proposed scheme not only reveals simple and optimised encryption, it is also defending against various distinctive attacks. The proposed image security solutions can be incorporated in banking, medical insurances, e-healthcare, and e-governance sectors for document confidentiality and integrity checking mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Chai X, Gan Z-H, Lu Y, Zhang M-H, Chen Y-R (2016) A novel color image encryption algorithm based on genetic recombination and the four-dimensional memristive hyperchaotic system. Chin Phys B 25:100503(1-13). https://doi.org/10.1088/1674-1056/25/10/100503

    Article  Google Scholar 

  2. Chandrasekaran J, Thiruvengadam SJ (2017) A hybrid chaotic and number theoretic approach for securing DICOM images. Secur Commun Netw 2017:1–12. https://doi.org/10.1155/2017/6729896

    Article  Google Scholar 

  3. Chidambaram N, Raj P, Karruppuswamy T, Amirtharajan R (2020) An advanced framework for highly secure and cloud-based storage of colour images. IET Image Process. https://doi.org/10.1049/iet-ipr.2018.5654

  4. Dagadu JC, Li J-P (2019) Addo, PC, (2019) an image cryptosystem based on pseudorandomly enhanced chaotic DNA and random permutation. Multimed Tools Appl 78:24979–25000. https://doi.org/10.1007/s11042-019-7693-2

    Article  Google Scholar 

  5. Diaconu A-V (2016) Circular inter–intra pixels bit-level permutation and chaos-based image encryption. Inf Sci (NY) 355-356:314–327. https://doi.org/10.1016/j.ins.2015.10.027

    Article  Google Scholar 

  6. Enayatifar R, Hanan A, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93. https://doi.org/10.1016/j.optlaseng.2013.12.003

    Article  Google Scholar 

  7. Farah MAB, Farah A, Farah T (2020) An image encryption scheme based on a new hybrid chaotic map and optimised substitution box. Nonlinear Dyn 99(4):3041–3064. https://doi.org/10.1007/s11071-019-05413-8

    Article  Google Scholar 

  8. Hanan A, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption, AEUE - Int. J Electron Commun 66:806–816. https://doi.org/10.1016/j.aeue.2012.01.015

    Article  Google Scholar 

  9. Hu B, Guan Z, Xiong N, Chao H (2018) Intelligent impulsive synchronization of nonlinear interconnected neural networks for image protection. IEEE Trans Ind Inf 14(8):3775–3787. https://doi.org/10.1109/TII.2018.2808966

    Article  Google Scholar 

  10. Khan M, Masood FA (2019) Novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed Tools Appl 78:26203–26222. https://doi.org/10.1007/s11042-019-07818-4

    Article  Google Scholar 

  11. Kumar J, Nirmala S (2012) Encryption of images based on genetic algorithm – a new approach. In: Wyld D, Zizka J, Nagamalai D (eds) Advances in computer science, Engineering & Applications. Advances in intelligent systems and computing, vol 167. Springer, Berlin. https://doi.org/10.1007/978-3-642-30111-7_75

  12. Lakshmi C, Thenmozhi K, Rayappan JBB, Amirtharajan R (2018) Encryption and watermark-treated medical image against hacking disease—an immune convention in spatial and frequency domains. Comput Methods Prog Biomed 159:11–21. https://doi.org/10.1016/j.cmpb.2018.02.021

    Article  Google Scholar 

  13. Lakshmi C, Thenmozhi K, Rayappan JBB, Amirtharajan R (2020) Hopfield attractor-trusted neural network: an attack-resistant image encryption. Neural Comput & Applic 32:11477–11489. https://doi.org/10.1007/s00521-019-04637-4

    Article  Google Scholar 

  14. Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156. https://doi.org/10.1016/j.image.2017.07.006

    Article  Google Scholar 

  15. Liao X, Yu Y, Li B, Member S (2019) A new payload partition strategy in color image steganography. Trans Circ Syst Video 8215:1–14. https://doi.org/10.1109/TCSVT.2019.2896270

    Article  Google Scholar 

  16. Liu H, Zhao B, Huang L (2019) A novel quantum image encryption algorithm based on crossover operation and mutation operation. Multimed Tools Appl 78:20465–20483. https://doi.org/10.1007/s11042-019-7186-3

  17. Luo Y, Yu J, Lai W, Liu L (2019) A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimed Tools Appl 78:22023–22043. https://doi.org/10.1007/s11042-019-7453-3

    Article  Google Scholar 

  18. Pareek NK, Patidar V (2016) Medical image protection using genetic algorithm operations. Soft Comput 20:763–772. https://doi.org/10.1007/s00500-014-1539-7

    Article  Google Scholar 

  19. Rajagopalan S, Rethinam S, Arumugham S, Upadhyay HN, Rayappan JBB, Amirtharajan R (2018) Networked hardware assisted key image and chaotic attractors for secure RGB image communication. Multimed Tools Appl 77:23449–23482. https://doi.org/10.1007/s11042-017-5566-0

    Article  Google Scholar 

  20. Rajagopalan S, Sharma S, Arumugham S, Upadhyay HN, Rayappan JBB, Amirtharajan R (2019) YRBS coding with logistic map – a novel Sanskrit aphorism and chaos for image encryption. Multimed Tools Appl 78:10513–10541. https://doi.org/10.1007/s11042-018-6574-4

    Article  Google Scholar 

  21. Ratan R (2014) Applications of genetic algorithms in cryptology. In: Pant M, Deep K, Nagar A, Bansal J (eds) Proceedings of the third international conference on soft computing for problem solving. Advances in intelligent systems and computing, vol 258. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1771-8_71

    Chapter  Google Scholar 

  22. Sengul D (2016) A new data hiding method based on chaos embedded genetic algorithm for color image. Artif Intell Rev 129–143. https://doi.org/10.1007/s10462-016-9459-9.

  23. Suri S, Vijay R (2017) A bi-objective genetic algorithm optimisation of Chaos-DNA based hybrid approach. J Intell Syst 28(2):333–346. https://doi.org/10.1515/jisys-2017-0069

    Article  Google Scholar 

  24. Wang J (2016) Digital image encryption algorithm design based on genetic Hyperchaos. Int J Optoelectron 2016:1–14. https://doi.org/10.1155/2016/2053724

    Article  Google Scholar 

  25. Wang XY, Li ZM (2019) A color image encryption algorithm based on Hopfield chaotic neural network. Opt Lasers Eng 115:107–118. https://doi.org/10.1016/j.optlaseng.2018.11.010

    Article  Google Scholar 

  26. Wang T, Wang M-H (2020) Hyperchaotic image encryption algorithm based on bit-level permutation and DNA encoding. Opt Laser Technol 132:Art. No. 106355. https://doi.org/10.1016/j.optlastec.2020.106355

    Article  Google Scholar 

  27. Wang X, Xu D (2014) Image encryption using genetic operators and intertwining logistic map. Nonlinear Dyn 78:2975–2984. https://doi.org/10.1007/s11071-014-1639-z

    Article  MathSciNet  Google Scholar 

  28. Wang X, Zhang HA (2016) Novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dyn 83:333–346. https://doi.org/10.1007/s11071-015-2330-8

    Article  MathSciNet  Google Scholar 

  29. Wang B, Xie Y, Zhou C, Zhou S, Zheng X (2016) Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps. Opt Int J Light Electron Opt 127:3541–3545. https://doi.org/10.1016/j.ijleo.2016.01.015

    Article  Google Scholar 

  30. Wang C, Zhang X, Zheng Z (2017) An efficient image encryption algorithm based on a novel chaotic map. Multimed Tools Appl 76:24251–24280. https://doi.org/10.1007/s11042-016-4102-y

    Article  Google Scholar 

  31. Wang X, Wang Y, Zhu X, Unar S (2019) Image encryption scheme based on Chaos and DNA plane operations. Multimed Tools Appl 78:26111–26128. https://doi.org/10.1007/s11042-019-07794-9

    Article  Google Scholar 

  32. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber Journals Multidiscip J Sci Technol J Sel Areas Telecommun:31–38. http://www.cyberjournals.com/Papers/Apr2011/05.pdf

  33. Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci (NY) 222:323–342. https://doi.org/10.1016/j.ins.2012.07.049

    Article  MathSciNet  MATH  Google Scholar 

  34. Yu W, Liu Y, Gong L, Tian M, Tu L (2019) Double-image encryption based on spatiotemporal chaos and DNA operations. Multimed Tools Appl 78:20037–20064. https://doi.org/10.1007/s11042-018-7110-2

    Article  Google Scholar 

  35. Zhang J, Huo D (2019) Image encryption algorithm based on quantum chaotic map and DNA coding. Multimed Tools Appl 78:15605–15621. https://doi.org/10.1007/s11042-018-6973-6

    Article  Google Scholar 

Download references

Acknowledgments

Authors thank Department of Science & Technology, New Delhi for the FIST funding (SR/FST/ET-II/2018/221). Also, Authors wish to thank the Intrusion Detection Lab at School of Electrical & Electronics Engineering, SASTRA Deemed University for providing infrastructural support to carry out this research work and also wish to thank Dr. R. Sundraraman, Sridevi Arumugam, Dhivya Ravichandran, Sivaraman Rethinam and Information Security Research Group / SEEE/ SASTRA Deemed University for their Time and Linguistic support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rengarajan Amirtharajan.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lakshmi, C., Thenmozhi, K., Rayappan, J.B.B. et al. Genetic and chaotic signatures in offspring – an encrypted generation of image family. Multimed Tools Appl 80, 8581–8609 (2021). https://doi.org/10.1007/s11042-020-09978-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09978-0

Keywords

Navigation