Skip to main content

Advertisement

Log in

An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps

Image encryption

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Chaotic maps are extensively utilized in the field of image encryption to generate secret keys. However, these maps suffer from hyper-parameters tuning issues. These parameters are generally selected on hit and trial basis. However, inappropriate selection of these parameters may reduce the performance of chaotic maps. Also, these hyper-parameters are not sensitive to input images. Therefore, in this paper, to handle these issues, a non-dominated sorting genetic algorithm-III (NSGA) based 4-D chaotic map is designed. Additionally, to improve the computational speed of the proposed approach, we have designed a novel master-slave model for image encryption. Initially, computationally expensive operations such as mutation and crossover of NSGA-III are identified. Thereafter, NSGA-III parameters are split among two jobs, i.e., master and slave jobs. For communication between master and slave nodes, the message passing interface is used. Extensive experimental results reveal that the proposed image encryption technique outperforms the existing techniques in terms of various performance measures.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  • Afarin R, Mozaffari S (2013) Image encryption using genetic algorithm. In: 2013 8th Iranian conference on machine vision and image processing (MVIP), IEEE, pp 441–445

  • Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–170

    Article  Google Scholar 

  • Chatterjee A, Dhanotia J, Bhatia V, Rana S, Prakash S (2017) Optical image encryption using fringe projection profilometry, Fourier Fringe analysis, and RSA algorithm. In: 2017 14th IEEE India council international conference (INDICON), IEEE, pp 1–5

  • Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos Solitons Fractals 21(3):749–761

    Article  MathSciNet  Google Scholar 

  • Chuman T, Sirichotedumrong W, Kiya H (2019) Encryption-then-compression systems using grayscale-based image encryption for JPEG images. IEEE Trans Inf Forensics Secur 14(6):1515–1525

    Article  Google Scholar 

  • Ciro GC, Dugardin F, Yalaoui F, Kelly R (2016) A nsga-ii and nsga-iii comparison for solving an open shop scheduling problem with resource constraints. IFAC-PapersOnLine 49(12):1272–1277

    Article  Google Scholar 

  • Das R, Manna S, Dutta S (2017) Cumulative image encryption approach based on user defined operation, character repositioning, text key and image key encryption technique and secret sharing scheme. In: 2017 IEEE international conference on power, control, signals and instrumentation engineering (ICPCSI), IEEE, pp 748–753

  • Du S, Qiu D, Mateus P, Gruska J (2019) Enhanced double random phase encryption of quantum images. Results Phys 13:102161

    Article  Google Scholar 

  • El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144–157

    Article  Google Scholar 

  • Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29(2):393–399

    Article  Google Scholar 

  • Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372(4):394–400

    Article  Google Scholar 

  • Hua Z, Zhou Y (2016) Image encryption using 2d logistic-adjusted-sine map. Inf Sci 339:237–253

    Article  Google Scholar 

  • Kaur M, Kumar V (2018a) Adaptive differential evolution-based lorenz chaotic system for image encryption. Arab J Sci Eng 43(12):8127–8144

    Article  Google Scholar 

  • Kaur M, Kumar V (2018b) Beta chaotic map based image encryption using genetic algorithm. Int J Bifurc Chaos 28(11):1850132

    Article  MathSciNet  Google Scholar 

  • Kaur M, Kumar V (2018c) Colour image encryption technique using differential evolution in non-subsampled contourlet transform domain. IET Image Process 12(7):1273–1283

    Article  Google Scholar 

  • Kaur M, Kumar V (2018d) A comprehensive review on image encryption techniques. Arch Comput Methods Eng. https://doi.org/10.1007/s11831-018-9298-8

    Article  Google Scholar 

  • Kaur M, Kumar V (2018e) Fourier-mellin moment-based intertwining map for image encryption. Mod Phys Lett B 32(09):1850115

    Article  MathSciNet  Google Scholar 

  • Kaur M, Kumar V (2018f) Parallel non-dominated sorting genetic algorithm-II-based image encryption technique. Imaging Sci J 66(8):453–462

    Article  Google Scholar 

  • Kaur M, Kumar V, Li L (2018) Color image encryption approach based on memetic differential evolution. Neural Comput Appl. https://doi.org/10.1007/s00521-018-3642-7

    Article  Google Scholar 

  • Ke L, Yi Z, Ren Y (2015) Improved broadcast encryption schemes with enhanced security. J Ambient Intell Humaniz Comput 6(1):121–129

    Article  Google Scholar 

  • Lang J (2012) The reality-preserving multiple-parameter fractional fourier transform and its application to image encryption. In: 2012 5th international congress on image and signal processing, IEEE, pp 1153–1157

  • Lei Z, Li L, Xianwei G (2011) Design and realization of image encryption system based on sms4 commercial cipher algorithm. In: 2011 4th international congress on image and signal processing, IEEE, vol 2, pp 741–744

  • Li C (2016) Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process 118:203–210

    Article  Google Scholar 

  • Li X, Zhang G, Zhang X (2015) Image encryption algorithm with compound chaotic maps. J Ambient Intell Humaniz Comput 6(5):563–570

    Article  MathSciNet  Google Scholar 

  • Lin J, Luo Y, Liu J, Bi J, Qiu S, Cen M, Liao Z (2018) An image compression-encryption algorithm based on cellular neural network and compressive sensing. In: 2018 IEEE 3rd international conference on image, vision and computing (ICIVC), IEEE, pp 673–677

  • Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26–36

    Article  Google Scholar 

  • Mondal B, Mandal T (2017) A light weight secure image encryption scheme based on chaos and DNA computing. J King Saud Univ Comput Inf Sci 29(4):499–504

    Google Scholar 

  • Pak C, Huang L (2017) A new color image encryption using combination of the 1d chaotic map. Signal Process 138:129–137

    Article  Google Scholar 

  • Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934

    Article  Google Scholar 

  • Ramaraju P, Raju GN, Krishna PR (2016) Image encryption after hiding (IEAH) technique for color images. In: 2016 international conference on signal processing, communication, power and embedded system (SCOPES), IEEE, pp 1202–1207

  • Saini JK, Verma HK (2013) A hybrid approach for image security by combining encryption and steganography. In: 2013 IEEE second international conference on image information processing (ICIIP-2013), IEEE, pp 607–611

  • Sambas A, Mamat M, Viadyanathan S, Mohamed MA, Sanjaya WM (2018) A new 4-d chaotic system with hidden attractor and its circuit implementation. Int J Eng Technol 7(3):1245–1250

    Article  Google Scholar 

  • Shaheen AM, Sheltami TR, Al-Kharoubi TM, Shakshuki E (2018) Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-0850-z

    Article  Google Scholar 

  • Shankar K, Elhoseny M, Kumar RS, Lakshmanaprabu S, Yuan X (2018) Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-1161-0

    Article  Google Scholar 

  • Shao Z, Wu J, Coatrieux JL, Coatrieux G, Shu H (2013) Quaternion gyrator transform and its application to color image encryption. In: 2013 IEEE international conference on image processing, IEEE, pp 4579–4582

  • Singh PK, Singh RS, Rai KN (2015) An image encryption algorithm based on XOR operation with approximation component in wavelet transform. In: 2015 Fifth national conference on computer vision, pattern recognition, image processing and graphics (NCVPRIPG), IEEE, pp 1–4

  • Sneha P, Sankar S, Kumar AS (2019) A chaotic colour image encryption scheme combining Walsh–Hadamard transform and Arnold–Tent maps. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-019-01385-0

    Article  Google Scholar 

  • Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using dna sequence operations. Opt Lasers Eng 73:53–61

    Article  Google Scholar 

  • Wen W, Zhang Y, Fang Y, Fang Z (2016) A novel selective image encryption method based on saliency detection. In: 2016 visual communications and image processing (VCIP), IEEE, pp 1–4

  • Wolf A, Swift JB, Swinney HL, Vastano JA (1985) Determining Lyapunov exponents from a time series. Phys D Nonlinear Phenom 16(3):285–317

    Article  MathSciNet  Google Scholar 

  • Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25

    Article  Google Scholar 

  • Xu Y, Wu S, Wang M, Zou Y (2018) Design and implementation of distributed RSA algorithm based on Hadoop. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-1021-y

    Article  Google Scholar 

  • Ye G (2010) Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recognit Lett 31(5):347–354

    Article  Google Scholar 

  • Yi JH, Deb S, Dong J, Alavi AH, Wang GG (2018) An improved NSGA-III algorithm with adaptive mutation operator for big data optimization problems. Future Gener Comput Syst 88:571–585

    Article  Google Scholar 

  • Zhou Y, Agaian S (2011) Image encryption using the image steganography concept and plip model. In: Proceedings 2011 international conference on system science and engineering, IEEE, pp 699–703

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anvita Gupta.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gupta, A., Singh, D. & Kaur, M. An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps. J Ambient Intell Human Comput 11, 1309–1324 (2020). https://doi.org/10.1007/s12652-019-01493-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-019-01493-x

Keywords

Navigation