Encryption of Images Based on Genetic Algorithm – A New Approach

Part of the Advances in Intelligent Systems and Computing book series (volume 167)


The security of digital images has become increasingly more important in today’s highly computerized and interconnected world. In this work a new image encryption technique is proposed which is based on genetic algorithm. The method comprises three stages. The first stage is selection of key sequence. Linear congruential pseudo random generator is used for key sequence generation. The crossover operation is performed in the second stage. In third stage, mutation operation is performed on the result obtained from the previous stage. The proposed method combines both transposition and substitution techniques to secure the data. The results obtained are analyzed through histograms. Performance of the proposed algorithm is measured in terms of correlation coefficient. The analysis carried out reveals that the proposed algorithm works successfully for all types of images.


Image encryption Genetic algorithm Selection Crossover Mutation 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Kumar, A., Ghose, M.K.: Overview of Information Security Using Genetic Algorithm and Chaos. Information Security Journal: A Global Perspective, 306–315 (2009)Google Scholar
  2. 2.
    Kumar, A., Rajpal, N.: Application of Genetic Algorithm in the Field of Steganography. Journal of Information Technology 2(1), 12–15 (2004)Google Scholar
  3. 3.
    Kumar, A., Rajpal, N., Tayal, A.: New Signal Security System for Multimedia Data Transmission Using Genetic Algorithms. In: NCC 2005, IIT Kharagpur, January 28-20, pp. 579–583 (2005)Google Scholar
  4. 4.
    Tragha, A., Omary, F., Kriouile, A.: Genetic Algorithms Inspired Cryptography. In: A.M.S.E Association for the Advancement of Modeling & Simulation Techniques in Enterprises. Series D: Computer Science and Statistics (November 2005)Google Scholar
  5. 5.
    Tragha, A., Omary, F., Mouloudi, A.: ICIGA: Improved Cryptography Inspired by Genetic Algorithms. In: International Conference on Hybrid Information Technology, ICHIT 2006 (2006)Google Scholar
  6. 6.
    Omary, F., Tragha, A., Bellaachia, A., Mouloudi, A.: Design and Evaluation of Two Symmetrical Evolutionist-Based Ciphering Algorithms. IJCSNS International Journal of Computer Science and Network Security 7(2), 181–190 (2007)Google Scholar
  7. 7.
    Yen, J.-C., Guo, J.-I.: A new image encryption algorithm and its VLSI architecture. In: IEEE Workshop Signal Processing Systems, pp. 430–437 (1999)Google Scholar
  8. 8.
    Liand, S., Zheng, X.: On The Security of An Image Encryption Method. In: IEEE International Conference on Image Processing (ICIP 2002), Rochester, New York. Proceedings of ICIP 2002, vol. 2, pp. 925–928 (September 2002)Google Scholar
  9. 9.
    Husainy, M.: Image Encryption using Genetic Algorithm. Information Technology Journal 5(3), 516–519 (2006)CrossRefGoogle Scholar
  10. 10.
    Srikanth, V., Asati, U., Natarajan, V., Pavan Kumar, T., Mullapudi, T., Iyengar, N.C.S.N.: Bit Level Encryption of Images using Genetic Algorithm. TECHNIA-International Journal of Computing Science and Communication Technologies 3(1) (July 2010) ISSN 0974-3375Google Scholar
  11. 11.
    Abuhaiba, I.S.I., Hassan, M.A.S.: Image Encryption using differential evolution approach in frequency domain. Singal & Image Processing: An International Journal (SIPIJ) 2(1) (March 2011)Google Scholar
  12. 12.
    El-Wahed, M.A., Mesbah, S., Shoukry, A.: Efficiency and Security of Some Image Encryption Algorithms. In: Proceedings of the World Congress on Engineering, WCE 2008, London, U.K, July 2-4, vol. I (2008)Google Scholar
  13. 13.
    Stallings, W.: Cryptography and Network Security Principles and Practices, 3rd edn. Pearson Education (2003)Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringJ.N.N.C.E.ShimogaIndia
  2. 2.Department of Information Science and EngineeringJ.N.N.C.E.ShimogaIndia

Personalised recommendations