Encryption of Images Based on Genetic Algorithm – A New Approach
The security of digital images has become increasingly more important in today’s highly computerized and interconnected world. In this work a new image encryption technique is proposed which is based on genetic algorithm. The method comprises three stages. The first stage is selection of key sequence. Linear congruential pseudo random generator is used for key sequence generation. The crossover operation is performed in the second stage. In third stage, mutation operation is performed on the result obtained from the previous stage. The proposed method combines both transposition and substitution techniques to secure the data. The results obtained are analyzed through histograms. Performance of the proposed algorithm is measured in terms of correlation coefficient. The analysis carried out reveals that the proposed algorithm works successfully for all types of images.
KeywordsImage encryption Genetic algorithm Selection Crossover Mutation
Unable to display preview. Download preview PDF.
- 1.Kumar, A., Ghose, M.K.: Overview of Information Security Using Genetic Algorithm and Chaos. Information Security Journal: A Global Perspective, 306–315 (2009)Google Scholar
- 2.Kumar, A., Rajpal, N.: Application of Genetic Algorithm in the Field of Steganography. Journal of Information Technology 2(1), 12–15 (2004)Google Scholar
- 3.Kumar, A., Rajpal, N., Tayal, A.: New Signal Security System for Multimedia Data Transmission Using Genetic Algorithms. In: NCC 2005, IIT Kharagpur, January 28-20, pp. 579–583 (2005)Google Scholar
- 4.Tragha, A., Omary, F., Kriouile, A.: Genetic Algorithms Inspired Cryptography. In: A.M.S.E Association for the Advancement of Modeling & Simulation Techniques in Enterprises. Series D: Computer Science and Statistics (November 2005)Google Scholar
- 5.Tragha, A., Omary, F., Mouloudi, A.: ICIGA: Improved Cryptography Inspired by Genetic Algorithms. In: International Conference on Hybrid Information Technology, ICHIT 2006 (2006)Google Scholar
- 6.Omary, F., Tragha, A., Bellaachia, A., Mouloudi, A.: Design and Evaluation of Two Symmetrical Evolutionist-Based Ciphering Algorithms. IJCSNS International Journal of Computer Science and Network Security 7(2), 181–190 (2007)Google Scholar
- 7.Yen, J.-C., Guo, J.-I.: A new image encryption algorithm and its VLSI architecture. In: IEEE Workshop Signal Processing Systems, pp. 430–437 (1999)Google Scholar
- 8.Liand, S., Zheng, X.: On The Security of An Image Encryption Method. In: IEEE International Conference on Image Processing (ICIP 2002), Rochester, New York. Proceedings of ICIP 2002, vol. 2, pp. 925–928 (September 2002)Google Scholar
- 10.Srikanth, V., Asati, U., Natarajan, V., Pavan Kumar, T., Mullapudi, T., Iyengar, N.C.S.N.: Bit Level Encryption of Images using Genetic Algorithm. TECHNIA-International Journal of Computing Science and Communication Technologies 3(1) (July 2010) ISSN 0974-3375Google Scholar
- 11.Abuhaiba, I.S.I., Hassan, M.A.S.: Image Encryption using differential evolution approach in frequency domain. Singal & Image Processing: An International Journal (SIPIJ) 2(1) (March 2011)Google Scholar
- 12.El-Wahed, M.A., Mesbah, S., Shoukry, A.: Efficiency and Security of Some Image Encryption Algorithms. In: Proceedings of the World Congress on Engineering, WCE 2008, London, U.K, July 2-4, vol. I (2008)Google Scholar
- 13.Stallings, W.: Cryptography and Network Security Principles and Practices, 3rd edn. Pearson Education (2003)Google Scholar