Skip to main content

Combination of an Improved Feistel Scheme and Genetic Operators for Chaotic Image Encryption

  • Conference paper
  • First Online:
Computing, Internet of Things and Data Analytics (ICCIDA 2023)

Abstract

In this work, we will propose a new color image encryption technique using chaotic maps and based on an improved Feistel scheme. This scheme is reinforced by two genetic operators adapted to cryptography. After putting the original image into a single vector, a genetic mutation is applied. Then, a subdivision into sub-blocks of pseudo-random size is performed. Feistel's technique is applied using new confusion and diffusion functions. A genetic crossover is installed at the output and is controlled by a pseudo-random crossover table. Simulations carried out on a large sample of images of various sizes demonstrate that our method is resilient against all known attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Khan, M.F., Ahmed, A., Saleem, K., Shah, T.: A novel design of cryptographic sp-network based on gold sequences and chaotic logistic tent system. IEEE Access 7, 84980–84991 (2019). https://doi.org/10.1109/ACCESS.2019.2925081

    Article  Google Scholar 

  2. Tutueva, A.V., Nepomuceno, E.G., Karimov, A.I., Andreev, V.S., Butusov, D.N.: Adaptive chaotic maps and their application to pseudo-random numbers generation. Chaos Solitons Fractals 133, 109615 (2020). https://doi.org/10.1016/j.chaos.2020.109615

    Article  MathSciNet  Google Scholar 

  3. Jamal, S.S., Anees, A., Ahmad, M., Khan, M.F., Hussain, I.: Construction of cryptographic S-boxes based on mobius transformation and chaotic tent-sine system. IEEE Access 7, 173273–173285 (2019). https://doi.org/10.1109/ACCESS.2019.2956385

    Article  Google Scholar 

  4. Teh, J.S., Alawida, M., Sii, Y.C.: Implementation and practical problems of chaos-based cryptography revisited. J. Inf. Secur. Appl. 50, 102421 (2020). https://doi.org/10.1016/j.jisa.2019.102421

    Article  Google Scholar 

  5. JarJar, A.: Improvement of Feistel method and the new encryption scheme. Optik 157, 1319–1324 (2018)

    Article  Google Scholar 

  6. Lallemand, V., Minier, M., Rouquette, L.: Automatic search of rectangle attacks on feistel ciphers: application to WARP. IACR Trans. Symm. Cryptol. 113‑140 (2022). https://doi.org/10.46586/tosc.v2022.i2.113-140

  7. Al-Bahrani, E.A., Kadhum, R.N.: A new cipher based on Feistel structure and chaotic maps. Baghdad Sci. J. 16(1), 270–280 (2019). https://doi.org/10.21123/bsj.2019.16.1(Suppl.).0270

  8. Abd Ali, S.M., Hasan, H.F.: Novel encryption algorithm for securing sensitive information based on feistel cipher. Test Eng. Manag. 19(80), 10–16 (2019)

    Google Scholar 

  9. Ito, G., Iwata, T.: Quantum distinguishing attacks against type-1 generalized feistel ciphers (2019). Consulté le: 25 avril 2023. https://eprint.iacr.org/2019/327

  10. Qobbi, Y., Jarjar, A., Essaid, M., Benazzi, A.: Image encryption algorithm based on genetic operations and chaotic DNA encoding. Soft Comput. 26(12), 5823–5832 (2022). https://doi.org/10.1007/s00500-021-06567-7

    Article  Google Scholar 

  11. Lambora, A., Gupta, K., Chopra, K.: Genetic algorithm- a literature review. In: 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon), pp. 380‑384 (2019). https://doi.org/10.1109/COMITCon.2019.8862255

  12. Zhou, Y., et al.: Hybrid genetic algorithm method for efficient and robust evaluation of remaining useful life of supercapacitors. Appl. Energy 260, 114169 (2020). https://doi.org/10.1016/j.apenergy.2019.114169

    Article  Google Scholar 

  13. Ahmad, M., et al.: An image encryption algorithm based on new generalized fusion fractal structure. Inf. Sci. 592, 1–20 (2022). https://doi.org/10.1016/j.ins.2022.01.042

    Article  Google Scholar 

  14. Hraoui, S., JarJar, A.: Single Feistel lapse acting on reduced ASCII codes followed by a genetic crossover. SN Appl. Sci. 4(4), 1–18 (2022)

    Article  Google Scholar 

  15. Kang, M., Wang, M.: New genetic operators for developing S-boxes with low boomerang uniformity. IEEE Access 10, 10898–10906 (2022). https://doi.org/10.1109/ACCESS.2022.3144458

    Article  Google Scholar 

  16. Feng, W., Qin, Z., Zhang, J., Ahmad, M.: Cryptanalysis and improvement of the image encryption scheme based on feistel network and dynamic DNA encoding. IEEE Access 9, 145459–145470 (2021). https://doi.org/10.1109/ACCESS.2021.3123571

    Article  Google Scholar 

  17. Manihira, N.R., Dauda, A.K.: Image encryption using chaotic maps and DNA encoding. Int. J. Eng. Res. Technol. 10(11), 1–5 (2022). https://doi.org/10.17577/IJERTCONV10IS11137

    Article  Google Scholar 

  18. Ghoul, S., Sulaiman, R., Shukur, Z.: A review on security techniques in image steganography. Int. J. Adv. Comput. Sci. Appl. 14(6), 1–25 (2023). https://doi.org/10.14569/IJACSA.2023.0140640

  19. Zhang, M., Li, Y., Song, H., Wang, B., Zhao, Y., Zhang, J.: Security analysis of quantum noise stream cipher under fast correlation attack. In: Optical Fiber Communication Conference (OFC) 2021 (2021), paper Th1A.5, p. Th1A.5. Optica Publishing Group (2021). https://doi.org/10.1364/OFC.2021.Th1A.5

  20. Ghazvini, M., Mirzadi, M., Parvar, N.: A modified method for image encryption based on chaotic map and genetic algorithm. Multimedia Tools Appl. 79, 26927–26950 (2020). https://doi.org/10.1007/s11042-020-09058-3

    Article  Google Scholar 

  21. Essaid, M., Akharraz, I., Saaidi, A.: Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps. J. Inf. Secur. Appl. 47, 173–187 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hicham Rrghout .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rrghout, H. et al. (2024). Combination of an Improved Feistel Scheme and Genetic Operators for Chaotic Image Encryption. In: García Márquez, F.P., Jamil, A., Ramirez, I.S., Eken, S., Hameed, A.A. (eds) Computing, Internet of Things and Data Analytics. ICCIDA 2023. Studies in Computational Intelligence, vol 1145. Springer, Cham. https://doi.org/10.1007/978-3-031-53717-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-53717-2_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-53716-5

  • Online ISBN: 978-3-031-53717-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics