An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps

Chaotic maps are extensively utilized in the field of image encryption to generate secret keys. However, these maps suffer from hyper-parameters tuning issues. These parameters are generally selected on hit and trial basis. However, inappropriate selection of these parameters may reduce the performance of chaotic maps. Also, these hyper-parameters are not sensitive to input images. Therefore, in this paper, to handle these issues, a non-dominated sorting genetic algorithm-III (NSGA) based 4-D chaotic map is designed. Additionally, to improve the computational speed of the proposed approach, we have designed a novel master-slave model for image encryption. Initially, computationally expensive operations such as mutation and crossover of NSGA-III are identified. Thereafter, NSGA-III parameters are split among two jobs, i.e., master and slave jobs. For communication between master and slave nodes, the message passing interface is used. Extensive experimental results reveal that the proposed image encryption technique outperforms the existing techniques in terms of various performance measures.

[1]  Lilian Huang,et al.  A new color image encryption using combination of the 1D chaotic map , 2017, Signal Process..

[2]  Manjit Kaur,et al.  A Comprehensive Review on Image Encryption Techniques , 2018, Archives of Computational Methods in Engineering.

[3]  Zengqiang Chen,et al.  A new image encryption algorithm based on hyper-chaos , 2008 .

[4]  S. Mozaffari,et al.  Image encryption using genetic algorithm , 2013, Iranian Conference on Machine Vision and Image Processing.

[5]  Hitoshi Kiya,et al.  Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images , 2018, IEEE Transactions on Information Forensics and Security.

[6]  Amir Hossein Alavi,et al.  An improved NSGA-III algorithm with adaptive mutation operator for Big Data optimization problems , 2018, Future Gener. Comput. Syst..

[7]  Jozef Gruska,et al.  Enhanced double random phase encryption of quantum images , 2019, Results in Physics.

[8]  Safwan El Assad,et al.  A new chaos-based image encryption system , 2016, Signal Process. Image Commun..

[9]  Guodong Ye,et al.  Image scrambling encryption algorithm of pixel bit based on chaos map , 2010, Pattern Recognit. Lett..

[10]  Harsh K. Verma,et al.  A hybrid approach for image security by combining encryption and steganography , 2013, 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).

[11]  Lu Xu,et al.  A novel bit-level image encryption algorithm based on chaotic maps , 2016 .

[12]  Kehui Sun,et al.  A fast image encryption algorithm based on chaotic map , 2016 .

[13]  A. Wolf,et al.  Determining Lyapunov exponents from a time series , 1985 .

[14]  Manjit Kaur,et al.  Color image encryption approach based on memetic differential evolution , 2018, Neural Computing and Applications.

[15]  Syam Sankar,et al.  A chaotic colour image encryption scheme combining Walsh–Hadamard transform and Arnold–Tent maps , 2019, Journal of Ambient Intelligence and Humanized Computing.

[16]  Vimal Bhatia,et al.  Optical Image Encryption using Fringe Projection Profilometry, Fourier Fringe Analysis, and RSA Algorithm , 2017, 2017 14th IEEE India Council International Conference (INDICON).

[17]  Ravi Shankar Singh,et al.  An image encryption algorithm based on XOR operation with approximation component in wavelet transform , 2015, 2015 Fifth National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG).

[18]  Bhaskar Mondal,et al.  A light weight secure image encryption scheme based on chaos & DNA computing , 2017, J. King Saud Univ. Comput. Inf. Sci..

[19]  Xin Zhang,et al.  A new chaotic algorithm for image encryption , 2006 .

[20]  Yan Ren,et al.  Improved broadcast encryption schemes with enhanced security , 2015, J. Ambient Intell. Humaniz. Comput..

[21]  Farouk Yalaoui,et al.  A NSGA-II and NSGA-III comparison for solving an open shop scheduling problem with resource constraints , 2016 .

[22]  Shaofei Wu,et al.  Design and implementation of distributed RSA algorithm based on Hadoop , 2018, J. Ambient Intell. Humaniz. Comput..

[23]  Vijay Kumar,et al.  Parallel non-dominated sorting genetic algorithm-II-based image encryption technique , 2018, The Imaging Science Journal.

[24]  Vijay Kumar,et al.  Colour image encryption technique using differential evolution in non-subsampled contourlet transform domain , 2018, IET Image Process..

[25]  Aceng Sambas,et al.  A New 4-D Chaotic System with Hidden Attractor and its Circuit Implementation , 2018 .

[26]  Jun Lang,et al.  The reality-preserving multiple-parameter fractional fourier transform and its application to image encryption , 2012, 2012 5th International Congress on Image and Signal Processing.

[27]  Junxiu Liu,et al.  An Image Compression-Encryption Algorithm Based on Cellular Neural Network and Compressive Sensing , 2018, 2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC).

[28]  G. Naga Raju,et al.  Image encryption after hiding (IEAH) technique for color images , 2016, 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES).

[29]  Mohamed Elhoseny,et al.  Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique , 2018, Journal of Ambient Intelligence and Humanized Computing.

[30]  Xuan Li,et al.  Image encryption algorithm with compound chaotic maps , 2014, Journal of Ambient Intelligence and Humanized Computing.

[31]  Xingyuan Wang,et al.  A novel chaotic image encryption scheme using DNA sequence operations , 2015 .

[32]  Safya Belghith,et al.  A novel image encryption scheme based on substitution-permutation network and chaos , 2016, Signal Process..

[33]  Tarek R. Sheltami,et al.  Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT , 2019, J. Ambient Intell. Humaniz. Comput..

[34]  Yicong Zhou,et al.  Image encryption using the image steganography concept and PLIP model , 2011, Proceedings 2011 International Conference on System Science and Engineering.

[35]  Li Li,et al.  Design and realization of image encryption system based on SMS4 commercial cipher algorithm , 2011, 2011 4th International Congress on Image and Signal Processing.

[36]  Yicong Zhou,et al.  Image encryption using 2D Logistic-adjusted-Sine map , 2016, Inf. Sci..

[37]  Ramkrishna Das,et al.  Cumulative image encryption approach based on user defined operation, character repositioning, text key and image key encryption technique and secret sharing scheme , 2017, 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI).

[38]  Vijay Kumar,et al.  Beta Chaotic Map Based Image Encryption Using Genetic Algorithm , 2018, Int. J. Bifurc. Chaos.

[39]  Manjit Kaur,et al.  Fourier-Mellin moment-based intertwining map for image encryption , 2018 .

[40]  Yushu Zhang,et al.  A novel selective image encryption method based on saliency detection , 2016, 2016 Visual Communications and Image Processing (VCIP).

[41]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[42]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[43]  Manjit Kaur,et al.  Adaptive Differential Evolution-Based Lorenz Chaotic System for Image Encryption , 2018, Arabian Journal for Science and Engineering.

[44]  Chengqing Li,et al.  Cracking a hierarchical chaotic image encryption algorithm based on permutation , 2015, Signal Process..

[45]  Jiasong Wu,et al.  Quaternion gyrator transform and its application to color image encryption , 2013, 2013 IEEE International Conference on Image Processing.