Skip to main content

Encryption of Images Based on Genetic Algorithm – A New Approach

  • Conference paper
Advances in Computer Science, Engineering & Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AINSC,volume 167))

Abstract

The security of digital images has become increasingly more important in today’s highly computerized and interconnected world. In this work a new image encryption technique is proposed which is based on genetic algorithm. The method comprises three stages. The first stage is selection of key sequence. Linear congruential pseudo random generator is used for key sequence generation. The crossover operation is performed in the second stage. In third stage, mutation operation is performed on the result obtained from the previous stage. The proposed method combines both transposition and substitution techniques to secure the data. The results obtained are analyzed through histograms. Performance of the proposed algorithm is measured in terms of correlation coefficient. The analysis carried out reveals that the proposed algorithm works successfully for all types of images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Kumar, A., Ghose, M.K.: Overview of Information Security Using Genetic Algorithm and Chaos. Information Security Journal: A Global Perspective, 306–315 (2009)

    Google Scholar 

  2. Kumar, A., Rajpal, N.: Application of Genetic Algorithm in the Field of Steganography. Journal of Information Technology 2(1), 12–15 (2004)

    Google Scholar 

  3. Kumar, A., Rajpal, N., Tayal, A.: New Signal Security System for Multimedia Data Transmission Using Genetic Algorithms. In: NCC 2005, IIT Kharagpur, January 28-20, pp. 579–583 (2005)

    Google Scholar 

  4. Tragha, A., Omary, F., Kriouile, A.: Genetic Algorithms Inspired Cryptography. In: A.M.S.E Association for the Advancement of Modeling & Simulation Techniques in Enterprises. Series D: Computer Science and Statistics (November 2005)

    Google Scholar 

  5. Tragha, A., Omary, F., Mouloudi, A.: ICIGA: Improved Cryptography Inspired by Genetic Algorithms. In: International Conference on Hybrid Information Technology, ICHIT 2006 (2006)

    Google Scholar 

  6. Omary, F., Tragha, A., Bellaachia, A., Mouloudi, A.: Design and Evaluation of Two Symmetrical Evolutionist-Based Ciphering Algorithms. IJCSNS International Journal of Computer Science and Network Security 7(2), 181–190 (2007)

    Google Scholar 

  7. Yen, J.-C., Guo, J.-I.: A new image encryption algorithm and its VLSI architecture. In: IEEE Workshop Signal Processing Systems, pp. 430–437 (1999)

    Google Scholar 

  8. Liand, S., Zheng, X.: On The Security of An Image Encryption Method. In: IEEE International Conference on Image Processing (ICIP 2002), Rochester, New York. Proceedings of ICIP 2002, vol. 2, pp. 925–928 (September 2002)

    Google Scholar 

  9. Husainy, M.: Image Encryption using Genetic Algorithm. Information Technology Journal 5(3), 516–519 (2006)

    Article  Google Scholar 

  10. Srikanth, V., Asati, U., Natarajan, V., Pavan Kumar, T., Mullapudi, T., Iyengar, N.C.S.N.: Bit Level Encryption of Images using Genetic Algorithm. TECHNIA-International Journal of Computing Science and Communication Technologies 3(1) (July 2010) ISSN 0974-3375

    Google Scholar 

  11. Abuhaiba, I.S.I., Hassan, M.A.S.: Image Encryption using differential evolution approach in frequency domain. Singal & Image Processing: An International Journal (SIPIJ) 2(1) (March 2011)

    Google Scholar 

  12. El-Wahed, M.A., Mesbah, S., Shoukry, A.: Efficiency and Security of Some Image Encryption Algorithms. In: Proceedings of the World Congress on Engineering, WCE 2008, London, U.K, July 2-4, vol. I (2008)

    Google Scholar 

  13. Stallings, W.: Cryptography and Network Security Principles and Practices, 3rd edn. Pearson Education (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jalesh Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag GmbH Berlin Heidelberg

About this paper

Cite this paper

Kumar, J., Nirmala, S. (2012). Encryption of Images Based on Genetic Algorithm – A New Approach. In: Wyld, D., Zizka, J., Nagamalai, D. (eds) Advances in Computer Science, Engineering & Applications. Advances in Intelligent Systems and Computing, vol 167. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30111-7_75

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30111-7_75

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30110-0

  • Online ISBN: 978-3-642-30111-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics