Abstract
The security of digital images has become increasingly more important in today’s highly computerized and interconnected world. In this work a new image encryption technique is proposed which is based on genetic algorithm. The method comprises three stages. The first stage is selection of key sequence. Linear congruential pseudo random generator is used for key sequence generation. The crossover operation is performed in the second stage. In third stage, mutation operation is performed on the result obtained from the previous stage. The proposed method combines both transposition and substitution techniques to secure the data. The results obtained are analyzed through histograms. Performance of the proposed algorithm is measured in terms of correlation coefficient. The analysis carried out reveals that the proposed algorithm works successfully for all types of images.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kumar, A., Ghose, M.K.: Overview of Information Security Using Genetic Algorithm and Chaos. Information Security Journal: A Global Perspective, 306–315 (2009)
Kumar, A., Rajpal, N.: Application of Genetic Algorithm in the Field of Steganography. Journal of Information Technology 2(1), 12–15 (2004)
Kumar, A., Rajpal, N., Tayal, A.: New Signal Security System for Multimedia Data Transmission Using Genetic Algorithms. In: NCC 2005, IIT Kharagpur, January 28-20, pp. 579–583 (2005)
Tragha, A., Omary, F., Kriouile, A.: Genetic Algorithms Inspired Cryptography. In: A.M.S.E Association for the Advancement of Modeling & Simulation Techniques in Enterprises. Series D: Computer Science and Statistics (November 2005)
Tragha, A., Omary, F., Mouloudi, A.: ICIGA: Improved Cryptography Inspired by Genetic Algorithms. In: International Conference on Hybrid Information Technology, ICHIT 2006 (2006)
Omary, F., Tragha, A., Bellaachia, A., Mouloudi, A.: Design and Evaluation of Two Symmetrical Evolutionist-Based Ciphering Algorithms. IJCSNS International Journal of Computer Science and Network Security 7(2), 181–190 (2007)
Yen, J.-C., Guo, J.-I.: A new image encryption algorithm and its VLSI architecture. In: IEEE Workshop Signal Processing Systems, pp. 430–437 (1999)
Liand, S., Zheng, X.: On The Security of An Image Encryption Method. In: IEEE International Conference on Image Processing (ICIP 2002), Rochester, New York. Proceedings of ICIP 2002, vol. 2, pp. 925–928 (September 2002)
Husainy, M.: Image Encryption using Genetic Algorithm. Information Technology Journal 5(3), 516–519 (2006)
Srikanth, V., Asati, U., Natarajan, V., Pavan Kumar, T., Mullapudi, T., Iyengar, N.C.S.N.: Bit Level Encryption of Images using Genetic Algorithm. TECHNIA-International Journal of Computing Science and Communication Technologies 3(1) (July 2010) ISSN 0974-3375
Abuhaiba, I.S.I., Hassan, M.A.S.: Image Encryption using differential evolution approach in frequency domain. Singal & Image Processing: An International Journal (SIPIJ) 2(1) (March 2011)
El-Wahed, M.A., Mesbah, S., Shoukry, A.: Efficiency and Security of Some Image Encryption Algorithms. In: Proceedings of the World Congress on Engineering, WCE 2008, London, U.K, July 2-4, vol. I (2008)
Stallings, W.: Cryptography and Network Security Principles and Practices, 3rd edn. Pearson Education (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag GmbH Berlin Heidelberg
About this paper
Cite this paper
Kumar, J., Nirmala, S. (2012). Encryption of Images Based on Genetic Algorithm – A New Approach. In: Wyld, D., Zizka, J., Nagamalai, D. (eds) Advances in Computer Science, Engineering & Applications. Advances in Intelligent Systems and Computing, vol 167. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30111-7_75
Download citation
DOI: https://doi.org/10.1007/978-3-642-30111-7_75
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30110-0
Online ISBN: 978-3-642-30111-7
eBook Packages: EngineeringEngineering (R0)