Skip to main content
Log in

A secure image encryption scheme based on genetic operations and a new hybrid pseudo random number generator

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents an encryption scheme based on genetic operations and a new hybrid pseudo random number generator (HPRNG). The new HPRNG is designed based on linear feedback shift register (LFSR), chaotic asymmetric tent map and chaotic logistic map. The scheme uses XOR and genetic operations (mutation, and multipoint crossover) to encrypt the image blocks. The first block of the plain image is encrypted with the help of a pseudo-random bit sequence generated by the HPRNG. The subsequent blocks are based on the previous cipher block and the XOR operator. The scheme can be extended to encrypt color images and text as well. The cipher images produced have very low correlation with their corresponding plain images and have high values of entropy, making it unpredictable and difficult to detect redundancies in the image pixel values. More over the scheme is compared with some existing schemes and found that the proposed scheme is comparatively secure and efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Bassham LE III, Rukhin AL, Soto J, Nechvatal JR, Smid ME, Barker EB, Leigh SD, Levenson M, Vangel M, Banks DL, Heckert NA, Dray JF, Vo S (2010) Sp 800-22 rev. 1a. a statistical test suite for random and pseudorandom number generators for cryptographic applications. Tech. rep., Gaithersburg, MD, United States

  2. Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–170. https://doi.org/10.1016/j.sigpro.2016.03.021. http://www.sciencedirect.com/science/article/pii/S0165168416300147

    Article  Google Scholar 

  3. Biswas K, Muthukkumarasamy V, Singh K (2015) An encryption scheme using chaotic map and genetic operations for wireless sensor networks. Sensors J IEEE 15(5):2801–2809. https://doi.org/10.1109/JSEN.2014.2380816

    Article  Google Scholar 

  4. Boeing G (2016) Visual analysis of nonlinear dynamical systems: chaos, fractals, self-similarity and the limits of prediction. Systems, 4(4). https://doi.org/10.3390/systems4040037, http://www.mdpi.com/2079-8954/4/4/37

  5. Fu C, bin Lin B, sheng Miao Y, Liu X, jie Chen J (2011) A novel chaos-based bit-level permutation scheme for digital image encryption. Opt Commun 284(23):5415–5423. https://doi.org/10.1016/j.optcom.2011.08.013. http://www.sciencedirect.com/science/article/pii/S0030401811008431

    Article  Google Scholar 

  6. Jolfaei A, Wu X, Muthukkumarasamy V (2016) On the security of permutation-only image encryption schemes. IEEE Trans Inf Forens Secur 11(2):235–246. https://doi.org/10.1109/TIFS.2015.2489178

    Article  Google Scholar 

  7. Li C, Zhang LY, Ou R, Wong KW, Shu S (2012) Breaking a novel colour image encryption algorithm based on chaos. Nonlin Dyn 70(4):2383–2388. https://doi.org/10.1007/s11071-012-0626-5

    Article  MathSciNet  Google Scholar 

  8. Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238–246. https://doi.org/10.1016/j.optlaseng.2016.10.020. http://www.sciencedirect.com/science/article/pii/S0143816616303517

    Article  Google Scholar 

  9. Mondal B, Mandal T (2017) A light weight secure image encryption scheme based on chaos & dna computing. J King Saud Univ- Comput Inf Sci 29 (4):499–504. https://doi.org/10.1016/j.jksuci.2016.02.003. http://www.sciencedirect.com/science/article/pii/S1319157816300027

    Article  Google Scholar 

  10. Mondal B, Biswas N, Mandal T (2017) A comparative study on cryptographic image scrambling. In: Proceedings of the second international conference on research in intelligent and computing in engineering, annals of computer science and information systems, vol 10. PTI, pp 261–268, DOI https://doi.org/10.15439/2017R47

  11. Mondal B, Kumar P, Singh S (2018) A chaotic permutation and diffusion based image encryption algorithm for secure communications. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-018-6214-z https://doi.org/10.1007/s11042-018-6214-z

  12. Nechvatal J, Barker E, Bassham L, Burr W, Dworkin M, Foti J, Roback E (2001) Report on the development of the advanced encryption standard (aes). J Res Nat Instit Standards Technol 106(3):511

    Article  Google Scholar 

  13. Parvin Z, Seyedarabi H, Shamsi M (2014) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed Tools Appl 75(17):10631–10648. https://doi.org/10.1007/s11042-014-2115-y

    Article  Google Scholar 

  14. Tong X-J, Wang Z, Zhang M, Liu Y (2013) A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. Nonlin Dyn 72(1-2):229–241. https://doi.org/10.1007/s11071-012-0707-5

    Article  MathSciNet  Google Scholar 

  15. Wang LT, McCluskey EJ (1988) Linear feedback shift register design using cyclic codes. IEEE Trans Comput 37(10):1302–1306. https://doi.org/10.1109/12.5994

    Article  Google Scholar 

  16. Wang X, Wang Q (2014) A novel image encryption algorithm based on dynamic s-boxes constructed by chaos. Nonlin Dyn 75(3):567–576. https://doi.org/10.1007/s11071-013-1086-2

    Article  Google Scholar 

  17. Zhou N, Zhang A, Zheng F, Gong L (2014) Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt Laser Technol 62(2):152–160. https://doi.org/10.1007/s11433-009-0032-2

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bhaskar Mondal.

Ethics declarations

This study was carried out at National Institute of Technology Jamshedpur. The research work/ study was not funded by any body or organization.

Conflict of interests

Author Dr. Bhaskar Mondal declares that he has no conflict of interest. Author Dr. Tarni Mandal declares that he/she has no conflict of interest.

Additional information

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed Consent

Informed consent was obtained from all individual participants included in the study.

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mondal, B., Mandal, T. A secure image encryption scheme based on genetic operations and a new hybrid pseudo random number generator. Multimed Tools Appl 79, 17497–17520 (2020). https://doi.org/10.1007/s11042-019-08352-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08352-z

Keywords

Navigation