Development of Efficient Color Image Encryption Techniques Using Evolutionary Approaches

Loading...
Thumbnail Image

Journal Title

Journal ISSN

Volume Title

Publisher

Abstract

The advancements in multimedia applications are rapidly increasing nowadays. A number of confidential images are transferred over the public networks day-by-day. Therefore, secure transmission of images has become a significant research area. Several image encryption techniques have been designed to achieve the particular necessities raised by different users. The image encryption techniques convert confidential image into a noisy image using secret key. The actual image is recovered if and only if the receiver has an authenticated secret key. Various techniques such as chaotic maps, evolutionary, DNA, cellular automata, etc. have been used to encrypt the images. Image encryption differs from text encryption as a result of few numbers of inherent characteristics such as huge size and redundancy. The traditional text encryption techniques fail to handle huge size and redundancy of images. The main challenges of image encryption are robustness against attacks, keyspace, key sensitivity, and diffusion. The chaotic maps are extensively utilized in the field of image encryption to generate the secret keys. However, these maps suffer from parameter tuning problem. Recent studies have shown that the improper selection of parameter values makes secret keys generated from chaotic system vulnerable. Therefore, many meta-heuristic techniques have been introduced in the literature for image encryption to improve the selection of chaotic system’s parameters. However, these techniques suffer from poor computational speed. Also, designing an efficient multi-objective fitness function is still a challenging issue. To overcome these issues, meta-heuristic based image encryption techniques are proposed in this thesis. An efficient image encryption technique in nonsubsampled contourlet transform using genetic algorithm (IGN) is proposed. Initially, nonsubsampled contourlet transform is utilized to decompose the input image into sub-bands. The beta chaotic map is used to develop a pseudo-random key that encrypts the coefficients of sub-bands. A multi-objective fitness function is designed to find the optimal parameters for beta chaotic map. Inverse nonsubsampled contourlet transform is performed to obtain an encrypted image. The performance of IGN is compared with well-known meta-heuristic based image encryption techniques. Experimental results reveal that IGN provides better computational speed and high encryption intensity. However, genetic algorithm may suffers from local optima and premature convergence issues. To deal with these issues, an image encryption technique using differential evolution in nonsubsampled contourlet transform (so called IDN) is proposed. In this technique, two new concepts are utilized to encrypt the images in an efficient manner. The first one is Arnold transform, which is used to permute the pixel position of an input image to generate a scrambled image. The second one is differential evolution, which is used to tune the parameters required by a beta chaotic map. The entropy of an encrypted image is used as a fitness function. IDN is compared with seven well-known image encryption techniques over five well-known benchmark test images. The experimental results reveal that IDN outperforms the existing techniques in terms of security and better visual quality. To improve the local search ability of IDN, the initial conditions of an intertwining logistic map are generated by utilizing memetic differential evolution and Arnold transform (IIMA). It utilizes local chaotic search to improve the search ability of standard differential evolution. Initially, the color image is decomposed into red, green, and blue channels. Arnold transform is used to shuffle the pixel position of all three channels to develop the shuffled channels. Afterward, memetic differential evolution is used to optimize the parameters required by intertwining logistic map. The correlation coefficient and entropy are used as a fitness function. The intertwining map generates the secret keys to encrypt the shuffled color channels. The encrypted color channels are combined to obtain the encrypted image. Extensive experiments are carried out by considering IIMA and the existing competitive image encryption techniques. Experimental results reveal that IIMA provides higher efficiency and security as compared to the existing image encryption techniques. To secure the secret key, an efficient Image encryption technique based on Secure hash algorithm (SHA-3), adaptive differential evolution, and Lorenz-like chaotic system known as ISAL is designed. ISAL utilizes SHA-3 along with adaptive differential evolution to reduce the issues associated with Lorenz-like chaotic system. In ISAL, adaptive differential evolution is used to optimize the input parameters for Lorenz-like chaotic system. SHA-3 is used to generate a secret key based on the input image. The optimized parameters and external secret keys are used to generate the initial values for Lorenz-like chaotic system that make it sensitive to an input image and provide resistance against both known-plaintext and known-ciphertext attacks. ISAL is compared with five well-known image encryption techniques over four color benchmark test images. The experimental results reveal that ISAL outperforms the existing techniques in terms of security and quality measures. The noise and enhancement attacks are also applied to test the robustness of ISAL. Although, IGN, IDN, IIMA, and ISAL provide better encryption results than the existing techniques. But, they suffer from poor computational speed especially in case of highresolution images. Therefore, an Image encryption technique based on Fourier-Mellin moments and intertwining logistic map (IFIM) is proposed. It uses multi-objective nondominated sorting genetic algorithm based on reinforcement learning (MNSGA-RL) to optimize the required parameters of intertwining logistic map. Fourier-Mellin moments are used to make the secret keys more secure. Thereafter, permutation and diffusion operations are carried out on the input image using secret keys. The performance of IFIM is evaluated on five well-known benchmark images and also compared with seven well-known existing encryption techniques. The experimental results reveal that IFIM outperforms the others in terms of entropy, correlation analysis, unified average changing intensity, and number of pixel change rate. The simulation results reveal that IFIM provides a high level of security and robustness against various types of attacks. To improve the computational speed, IFIM is implemented in a parallel fashion using master-slave environment. The run time analysis has been done to determine the computationally expensive operations. Thereafter, IFIM operations are divided into master and slave jobs. Message passing interface (MPI) is used for intercommunication between master and slave nodes. The simulation results show that parallel IFIM provides a significant improvement in computational speed as compared to the existing techniques and sequential IFIM. The proposed techniques (i.e., IGN, IDN, IIMA, ISAL, and IFIM) satisfy the various statistical parameters and offer tangible resistance to differential, occlusion, and chosen plaintext attacks on gray as well as color images. The proposed techniques achieve not only a desirable level of security, but, also high efficiency and better computational speed. Therefore, the designed techniques are well suitable for real-life applications.

Description

Citation

Endorsement

Review

Supplemented By

Referenced By