Abstract
In this paper, the initial conditions of an intertwining logistic map are generated by utilizing the memetic differential evolution. Initially, the color image is decomposed into red, green, and blue channels. Arnold map is used to shuffle the pixels position of all three channels to develop the shuffled channels. Afterward, memetic differential evolution is implemented to optimize the parameters required by intertwining logistic map. The correlation coefficient and entropy are used as a fitness function. The intertwining map generates the secret keys to encrypt the shuffled color channels. The encrypted color channels are combined to obtain the encrypted image. Extensive experiments are carried out by considering the memetic differential evolution-based image encryption and existing competitive image encryption approaches over five benchmark images. Experimental results show that the proposed approach provides higher efficiency and security as compared to the existing image encryption approaches.





Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput Appl 26(5):1137–1148
Khan M, Shah T (2014) A novel image encryption technique based on hénon chaotic map and s 8 symmetric group. Neural Comput Appl 25(7–8):1717–1722
Ahmad J, Khan MA, Ahmed F, Khan JS (2017) A novel image encryption scheme based on orthogonal matrix, skew tent map, and xor operation. Neural Comput Appl. https://doi.org/10.1007/s00521-017-2970-3
Chai X, Gan Z, Yuan K, Chen Y, Liu X (2017) A novel image encryption scheme based on dna sequence operations and chaotic systems. Neural Comput Appl. https://doi.org/10.1007/s00521-017-2993-9
Sivakumar T, Venkatesan R (2015) A novel image encryption using calligraphy based scan method and random number. KSII Trans Internet Inf Syst 9(6):2317–2337
Reyad O, Mofaddel M, Abd-Elhafiez W, Fathy M (2017) A novel image encryption scheme based on different block sizes for grayscale and color images. In: Computer engineering and systems (ICCES), 2017 12th international conference on, IEEE, pp 455–461
Chai X, Gan Z, Yang K, Chen Y, Liu X (2017) An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process Image Commun 52:6–19
Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimedia Tools Appl 71(3):1469–1497
Ghebleh M, Kanso A (2017) A novel efficient image encryption scheme based on chained skew tent maps. Neural Comput Appl. https://doi.org/10.1007/s00521-017-3199-x
Usama M, Khan MK, Alghathbar K, Lee C (2010) Chaos-based secure satellite imagery cryptosystem. Comput Math Appl 60(2):326–337
Wen W (2016) Security analysis of a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order cnn against chosen-plaintext attack. Multimedia Tools Appl 75(6):3553–3560
Zhu Z-L, Zhang W, Wong K-W, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186
Zhang Y-Q, Wang X-Y (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn 77(3):687–698
Li C (2016) Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process 118:203–210
Zhang X, Zhu G, Ma S (2012) Remote-sensing image encryption in hybrid domains. Opt Commun 285(7):1736–1743
Wang X, Yin YL, Yu H (2005) Finding collisions in the full sha-1. In: Crypto, vol. 3621, Springer, pp 17–36
Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18
Zhang W, Yu H, Zhao Y-L, Zhu Z-L (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36–50
Wu J, Liao X, Yang B (2018) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process 142:292–300
Kumar M, Iqbal A, Kumar P (2016) A new rgb image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography. Signal Process 125:187–202
Akhavan A, Samsudin A, Akhshani A (2017) Cryptanalysis of an image encryption algorithm based on dna encoding. Opt Laser Technol 95:94–99
Zhou G, Zhang D, Liu Y, Yuan Y, Liu Q (2015) A novel image encryption algorithm based on chaos and line map. Neurocomputing 169:150–157
Chen L, Ma B, Zhao X, Wang S (2017) Differential cryptanalysis of a novel image encryption algorithm based on chaos and line map. Nonlinear Dyn 87(3):1797–1807
Sreelaja N, Pai GV (2012) Stream cipher for binary image encryption using ant colony optimization based key generation. Appl Soft Comput 12(9):2879–2895
Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU Int J Electron Commun 66(10):806–816
Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93
Zhang X, Wang X, Cheng Y (2015) Image encryption based on a genetic algorithm and a chaotic system. IEICE Trans Commun 98(5):824–833
Talarposhti KM, Jamei MK (2016) A secure image encryption method based on dynamic harmony search (DHS) combined with chaotic map. Opt Lasers Eng 81:21–34
Kaur M, Kumar V (2018) Fourier-Mellin moment-based intertwining map for image encryption. Mod Phys Lett B 32(09):1850115
Kaur M, Kumar V (2018) Colour image encryption technique using differential evolution in non-subsampled contourlet transform domain. IET Image Process 12:1273–1283
Jia D, Zheng G, Khan MK (2011) An effective memetic differential evolution algorithm based on chaotic local search. Inf Sci 181(15):3175–3187
Sam IS, Devaraj P, Bhuvaneswaran R (2012) An intertwining chaotic maps based image encryption scheme. Nonlinear Dyn 69(4):1995–2007
Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29(2):393–399
Wang X, Liu C, Xu D, Liu C (2016) Image encryption scheme using chaos and simulated annealing algorithm. Nonlinear Dyn 84(3):1417–1429
Farwa S, Muhammad N, Shah T, Ahmad S (2017) A novel image encryption based on algebraic s-box and Arnold transform. 3D Res 8(3):26
Zhang W, Wong K-W, Yu H, Zhu Z-L (2013) An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun Nonlinear Sci Numer Simul 18(8):2066–2080
El-Samie F E A, Ahmed H E H, Elashry I F, Shahieen M H, Faragallah O S, El-Rabaie E-S M, Alshebeili S A (2013) Image encryption: a communication perspective. CRC Press, Boca Raton
The USC-SIPI image database (2017) Signal and Image Processing Institute. http://sipi.usc.edu/database/
Luo Y, Du M, Liu J (2015) A symmetrical image encryption scheme in wavelet and time domain. Commun Nonlinear Sci Numer Simul 20(2):447–460
Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image encryption scheme using 2d dwt and 6d hyperchaotic system. Inf Sci 349:137–153
Kanso A, Ghebleh M (2017) An algorithm for encryption of secret images into meaningful images. Opt Lasers Eng 90:196–208
Ahmad J, Hwang SO (2016) A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools Appl 75(21):13951–13976
Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution–permutation network and chaos. Signal Process 128:155–170
Rawat N, Kim B, Kumar R (2016) Fast digital image encryption based on compressive sensing using structurally random matrices and arnold transform technique. Opt Int J Light Electron Opt 127(4):2282–2286
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kaur, M., Kumar, V. & Li, L. Color image encryption approach based on memetic differential evolution. Neural Comput & Applic 31, 7975–7987 (2019). https://doi.org/10.1007/s00521-018-3642-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-018-3642-7