Skip to main content
Log in

Color image encryption approach based on memetic differential evolution

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

In this paper, the initial conditions of an intertwining logistic map are generated by utilizing the memetic differential evolution. Initially, the color image is decomposed into red, green, and blue channels. Arnold map is used to shuffle the pixels position of all three channels to develop the shuffled channels. Afterward, memetic differential evolution is implemented to optimize the parameters required by intertwining logistic map. The correlation coefficient and entropy are used as a fitness function. The intertwining map generates the secret keys to encrypt the shuffled color channels. The encrypted color channels are combined to obtain the encrypted image. Extensive experiments are carried out by considering the memetic differential evolution-based image encryption and existing competitive image encryption approaches over five benchmark images. Experimental results show that the proposed approach provides higher efficiency and security as compared to the existing image encryption approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput Appl 26(5):1137–1148

    Article  Google Scholar 

  2. Khan M, Shah T (2014) A novel image encryption technique based on hénon chaotic map and s 8 symmetric group. Neural Comput Appl 25(7–8):1717–1722

    Article  Google Scholar 

  3. Ahmad J, Khan MA, Ahmed F, Khan JS (2017) A novel image encryption scheme based on orthogonal matrix, skew tent map, and xor operation. Neural Comput Appl. https://doi.org/10.1007/s00521-017-2970-3

    Article  Google Scholar 

  4. Chai X, Gan Z, Yuan K, Chen Y, Liu X (2017) A novel image encryption scheme based on dna sequence operations and chaotic systems. Neural Comput Appl. https://doi.org/10.1007/s00521-017-2993-9

    Article  Google Scholar 

  5. Sivakumar T, Venkatesan R (2015) A novel image encryption using calligraphy based scan method and random number. KSII Trans Internet Inf Syst 9(6):2317–2337

    Google Scholar 

  6. Reyad O, Mofaddel M, Abd-Elhafiez W, Fathy M (2017) A novel image encryption scheme based on different block sizes for grayscale and color images. In: Computer engineering and systems (ICCES), 2017 12th international conference on, IEEE, pp 455–461

  7. Chai X, Gan Z, Yang K, Chen Y, Liu X (2017) An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process Image Commun 52:6–19

    Article  Google Scholar 

  8. Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimedia Tools Appl 71(3):1469–1497

    Article  Google Scholar 

  9. Ghebleh M, Kanso A (2017) A novel efficient image encryption scheme based on chained skew tent maps. Neural Comput Appl. https://doi.org/10.1007/s00521-017-3199-x

    Article  Google Scholar 

  10. Usama M, Khan MK, Alghathbar K, Lee C (2010) Chaos-based secure satellite imagery cryptosystem. Comput Math Appl 60(2):326–337

    Article  MathSciNet  Google Scholar 

  11. Wen W (2016) Security analysis of a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order cnn against chosen-plaintext attack. Multimedia Tools Appl 75(6):3553–3560

    Article  Google Scholar 

  12. Zhu Z-L, Zhang W, Wong K-W, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186

    Article  Google Scholar 

  13. Zhang Y-Q, Wang X-Y (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn 77(3):687–698

    Article  Google Scholar 

  14. Li C (2016) Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process 118:203–210

    Article  Google Scholar 

  15. Zhang X, Zhu G, Ma S (2012) Remote-sensing image encryption in hybrid domains. Opt Commun 285(7):1736–1743

    Article  Google Scholar 

  16. Wang X, Yin YL, Yu H (2005) Finding collisions in the full sha-1. In: Crypto, vol. 3621, Springer, pp 17–36

  17. Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18

    Article  Google Scholar 

  18. Zhang W, Yu H, Zhao Y-L, Zhu Z-L (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36–50

    Article  Google Scholar 

  19. Wu J, Liao X, Yang B (2018) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process 142:292–300

    Article  Google Scholar 

  20. Kumar M, Iqbal A, Kumar P (2016) A new rgb image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography. Signal Process 125:187–202

    Article  Google Scholar 

  21. Akhavan A, Samsudin A, Akhshani A (2017) Cryptanalysis of an image encryption algorithm based on dna encoding. Opt Laser Technol 95:94–99

    Article  Google Scholar 

  22. Zhou G, Zhang D, Liu Y, Yuan Y, Liu Q (2015) A novel image encryption algorithm based on chaos and line map. Neurocomputing 169:150–157

    Article  Google Scholar 

  23. Chen L, Ma B, Zhao X, Wang S (2017) Differential cryptanalysis of a novel image encryption algorithm based on chaos and line map. Nonlinear Dyn 87(3):1797–1807

    Article  Google Scholar 

  24. Sreelaja N, Pai GV (2012) Stream cipher for binary image encryption using ant colony optimization based key generation. Appl Soft Comput 12(9):2879–2895

    Article  Google Scholar 

  25. Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU Int J Electron Commun 66(10):806–816

    Article  Google Scholar 

  26. Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93

    Article  Google Scholar 

  27. Zhang X, Wang X, Cheng Y (2015) Image encryption based on a genetic algorithm and a chaotic system. IEICE Trans Commun 98(5):824–833

    Article  Google Scholar 

  28. Talarposhti KM, Jamei MK (2016) A secure image encryption method based on dynamic harmony search (DHS) combined with chaotic map. Opt Lasers Eng 81:21–34

    Article  Google Scholar 

  29. Kaur M, Kumar V (2018) Fourier-Mellin moment-based intertwining map for image encryption. Mod Phys Lett B 32(09):1850115

    Article  MathSciNet  Google Scholar 

  30. Kaur M, Kumar V (2018) Colour image encryption technique using differential evolution in non-subsampled contourlet transform domain. IET Image Process 12:1273–1283

    Article  Google Scholar 

  31. Jia D, Zheng G, Khan MK (2011) An effective memetic differential evolution algorithm based on chaotic local search. Inf Sci 181(15):3175–3187

    Article  Google Scholar 

  32. Sam IS, Devaraj P, Bhuvaneswaran R (2012) An intertwining chaotic maps based image encryption scheme. Nonlinear Dyn 69(4):1995–2007

    Article  MathSciNet  Google Scholar 

  33. Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29(2):393–399

    Article  Google Scholar 

  34. Wang X, Liu C, Xu D, Liu C (2016) Image encryption scheme using chaos and simulated annealing algorithm. Nonlinear Dyn 84(3):1417–1429

    Article  MathSciNet  Google Scholar 

  35. Farwa S, Muhammad N, Shah T, Ahmad S (2017) A novel image encryption based on algebraic s-box and Arnold transform. 3D Res 8(3):26

    Article  Google Scholar 

  36. Zhang W, Wong K-W, Yu H, Zhu Z-L (2013) An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun Nonlinear Sci Numer Simul 18(8):2066–2080

    Article  MathSciNet  Google Scholar 

  37. El-Samie F E A, Ahmed H E H, Elashry I F, Shahieen M H, Faragallah O S, El-Rabaie E-S M, Alshebeili S A (2013) Image encryption: a communication perspective. CRC Press, Boca Raton

    Book  Google Scholar 

  38. The USC-SIPI image database (2017) Signal and Image Processing Institute. http://sipi.usc.edu/database/

  39. Luo Y, Du M, Liu J (2015) A symmetrical image encryption scheme in wavelet and time domain. Commun Nonlinear Sci Numer Simul 20(2):447–460

    Article  Google Scholar 

  40. Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image encryption scheme using 2d dwt and 6d hyperchaotic system. Inf Sci 349:137–153

    Article  Google Scholar 

  41. Kanso A, Ghebleh M (2017) An algorithm for encryption of secret images into meaningful images. Opt Lasers Eng 90:196–208

    Article  Google Scholar 

  42. Ahmad J, Hwang SO (2016) A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools Appl 75(21):13951–13976

    Article  Google Scholar 

  43. Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution–permutation network and chaos. Signal Process 128:155–170

    Article  Google Scholar 

  44. Rawat N, Kim B, Kumar R (2016) Fast digital image encryption based on compressive sensing using structurally random matrices and arnold transform technique. Opt Int J Light Electron Opt 127(4):2282–2286

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manjit Kaur.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kaur, M., Kumar, V. & Li, L. Color image encryption approach based on memetic differential evolution. Neural Comput & Applic 31, 7975–7987 (2019). https://doi.org/10.1007/s00521-018-3642-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-018-3642-7

Keywords

Navigation