Abstract
In this work, we will propose a new color image encryption technique using chaotic maps and based on an improved Feistel scheme. This scheme is reinforced by two genetic operators adapted to cryptography. After putting the original image into a single vector, a genetic mutation is applied. Then, a subdivision into sub-blocks of pseudo-random size is performed. Feistel's technique is applied using new confusion and diffusion functions. A genetic crossover is installed at the output and is controlled by a pseudo-random crossover table. Simulations carried out on a large sample of images of various sizes demonstrate that our method is resilient against all known attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Khan, M.F., Ahmed, A., Saleem, K., Shah, T.: A novel design of cryptographic sp-network based on gold sequences and chaotic logistic tent system. IEEE Access 7, 84980–84991 (2019). https://doi.org/10.1109/ACCESS.2019.2925081
Tutueva, A.V., Nepomuceno, E.G., Karimov, A.I., Andreev, V.S., Butusov, D.N.: Adaptive chaotic maps and their application to pseudo-random numbers generation. Chaos Solitons Fractals 133, 109615 (2020). https://doi.org/10.1016/j.chaos.2020.109615
Jamal, S.S., Anees, A., Ahmad, M., Khan, M.F., Hussain, I.: Construction of cryptographic S-boxes based on mobius transformation and chaotic tent-sine system. IEEE Access 7, 173273–173285 (2019). https://doi.org/10.1109/ACCESS.2019.2956385
Teh, J.S., Alawida, M., Sii, Y.C.: Implementation and practical problems of chaos-based cryptography revisited. J. Inf. Secur. Appl. 50, 102421 (2020). https://doi.org/10.1016/j.jisa.2019.102421
JarJar, A.: Improvement of Feistel method and the new encryption scheme. Optik 157, 1319–1324 (2018)
Lallemand, V., Minier, M., Rouquette, L.: Automatic search of rectangle attacks on feistel ciphers: application to WARP. IACR Trans. Symm. Cryptol. 113‑140 (2022). https://doi.org/10.46586/tosc.v2022.i2.113-140
Al-Bahrani, E.A., Kadhum, R.N.: A new cipher based on Feistel structure and chaotic maps. Baghdad Sci. J. 16(1), 270–280 (2019). https://doi.org/10.21123/bsj.2019.16.1(Suppl.).0270
Abd Ali, S.M., Hasan, H.F.: Novel encryption algorithm for securing sensitive information based on feistel cipher. Test Eng. Manag. 19(80), 10–16 (2019)
Ito, G., Iwata, T.: Quantum distinguishing attacks against type-1 generalized feistel ciphers (2019). Consulté le: 25 avril 2023. https://eprint.iacr.org/2019/327
Qobbi, Y., Jarjar, A., Essaid, M., Benazzi, A.: Image encryption algorithm based on genetic operations and chaotic DNA encoding. Soft Comput. 26(12), 5823–5832 (2022). https://doi.org/10.1007/s00500-021-06567-7
Lambora, A., Gupta, K., Chopra, K.: Genetic algorithm- a literature review. In: 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon), pp. 380‑384 (2019). https://doi.org/10.1109/COMITCon.2019.8862255
Zhou, Y., et al.: Hybrid genetic algorithm method for efficient and robust evaluation of remaining useful life of supercapacitors. Appl. Energy 260, 114169 (2020). https://doi.org/10.1016/j.apenergy.2019.114169
Ahmad, M., et al.: An image encryption algorithm based on new generalized fusion fractal structure. Inf. Sci. 592, 1–20 (2022). https://doi.org/10.1016/j.ins.2022.01.042
Hraoui, S., JarJar, A.: Single Feistel lapse acting on reduced ASCII codes followed by a genetic crossover. SN Appl. Sci. 4(4), 1–18 (2022)
Kang, M., Wang, M.: New genetic operators for developing S-boxes with low boomerang uniformity. IEEE Access 10, 10898–10906 (2022). https://doi.org/10.1109/ACCESS.2022.3144458
Feng, W., Qin, Z., Zhang, J., Ahmad, M.: Cryptanalysis and improvement of the image encryption scheme based on feistel network and dynamic DNA encoding. IEEE Access 9, 145459–145470 (2021). https://doi.org/10.1109/ACCESS.2021.3123571
Manihira, N.R., Dauda, A.K.: Image encryption using chaotic maps and DNA encoding. Int. J. Eng. Res. Technol. 10(11), 1–5 (2022). https://doi.org/10.17577/IJERTCONV10IS11137
Ghoul, S., Sulaiman, R., Shukur, Z.: A review on security techniques in image steganography. Int. J. Adv. Comput. Sci. Appl. 14(6), 1–25 (2023). https://doi.org/10.14569/IJACSA.2023.0140640
Zhang, M., Li, Y., Song, H., Wang, B., Zhao, Y., Zhang, J.: Security analysis of quantum noise stream cipher under fast correlation attack. In: Optical Fiber Communication Conference (OFC) 2021 (2021), paper Th1A.5, p. Th1A.5. Optica Publishing Group (2021). https://doi.org/10.1364/OFC.2021.Th1A.5
Ghazvini, M., Mirzadi, M., Parvar, N.: A modified method for image encryption based on chaotic map and genetic algorithm. Multimedia Tools Appl. 79, 26927–26950 (2020). https://doi.org/10.1007/s11042-020-09058-3
Essaid, M., Akharraz, I., Saaidi, A.: Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps. J. Inf. Secur. Appl. 47, 173–187 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Rrghout, H. et al. (2024). Combination of an Improved Feistel Scheme and Genetic Operators for Chaotic Image Encryption. In: GarcÃa Márquez, F.P., Jamil, A., Ramirez, I.S., Eken, S., Hameed, A.A. (eds) Computing, Internet of Things and Data Analytics. ICCIDA 2023. Studies in Computational Intelligence, vol 1145. Springer, Cham. https://doi.org/10.1007/978-3-031-53717-2_8
Download citation
DOI: https://doi.org/10.1007/978-3-031-53717-2_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-53716-5
Online ISBN: 978-3-031-53717-2
eBook Packages: EngineeringEngineering (R0)