Image Encryption Based on Arnold Cat Map and GA Operator

  • Subhajit Das
  • Satyendra Nath Mondal
  • Manas Kumar Sanyal
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 695)

Abstract

In this paper, three steps of encryption technique are used to encrypt image. At first, crossover and mutation operators of genetic algorithm are applied on each pixel of image to make modified image. The crossover points are decided from a random sequence generated by logistic map. Second, pixels of modified image are shuffled like transposition cipher based on Arnold cat map. Finally, the encryption image is obtained by performing logical operation between modified image and random sequence produced by logistic map. Some important tests have been performed on encrypted images to check security level of proposed algorithm. It has been observed that the proposed algorithm is able to resist various attacks and provide sufficient security, and it is giving better result among some of the published algorithms.

Keywords

Logistic map Arnold cat map Crossover and mutation Entropy analysis Histogram analysis and correlation analysis 

References

  1. 1.
    Shujun, L., Xuanqin, M., Yuanlong, C.: Pseudo-random bit generator based on couple chaotic systems and its application sin stream-cipher cryptography. In: Progress in Cryptology—INDOCRYPT 2001, vol. 2247 of Lecture Notes in Computer Science, pp. 316–329 (2001)MATHGoogle Scholar
  2. 2.
    Guan, Z., Huang, F., Guan, W.: Chaos-based image encryption algorithm. Phys. Lett. A: Gen. Atomic Solid State Phys. 346(1–3), 153–157 (2005)CrossRefGoogle Scholar
  3. 3.
    Fu, C., Lin, B., Miao, Y., Liu, X., Chen, J.: A novel chaos-based bit-level permutation scheme for digital image encryption. Opt. Commun. 284(23), 5415–5423 (2011)CrossRefGoogle Scholar
  4. 4.
    Soleymani, A., Nordin, M.J., Sundararajan1, E.: A chaotic cryptosystem for images based on henon and Arnold cat map. Sci. World J. 2014, 21. (Article ID 536930)Google Scholar
  5. 5.
    Das, S., Mandal, S.N., Ghoshal, N.: Diffusion and encryption of digital image using genetic algorithm. In: Ficta 2014 Bhubaneswar. AISC Springer. vol 327 pp. 729–736Google Scholar
  6. 6.
    Sethi, N., Vijay, S.: Comparative image encryption method analysis using new transformed—mapped technique. In: Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013), pp. 46–50Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Subhajit Das
    • 1
  • Satyendra Nath Mondal
    • 2
  • Manas Kumar Sanyal
    • 3
  1. 1.Nayagram Bani Bidypith NayagramNayagramIndia
  2. 2.Department of Information TechnologyKalyani Government Engineering CollegeKalyaniIndia
  3. 3.Department of Business AdministrationUniversity of KalyaniKalyaniIndia

Personalised recommendations