Medical image security enhancement using two dimensional chaotic mapping optimized by self-adaptive grey wolf algorithm

The development of encryption and decryption plays a vital role in the field of security. Recently, Chaos-based security has suggested the reliable and efficient way of securing the images. In this paper, Self-Adaptive Grey Wolf Optimization (GWO) is proposed for optimizing 2-dimensional Logistic Chaotic Mapping (2DCM). Further, the security analysis of the proposed method is performed using different comparison such as key sensitivity, histogram analysis, adjacent pixel autocorrelation, information entropy, attacks, quality of encryption, Chi square test etc. Moreover, analytical outcomes are compared with the conventional algorithms like standard encryption and decryption, Genetic Algorithm (GA) and GWO. The experimental result stated that the proposed method is key sensitive and opposed to the general attacks during the encryption and decryption of images.

[1]  He Lei,et al.  Novel quantum image encryption using one-dimensional quantum cellular automata , 2016, Inf. Sci..

[2]  Ninu Preetha Nirmala Sreedharan,et al.  Grey Wolf optimisation-based feature selection and classification for facial emotion recognition , 2018, IET Biom..

[3]  Malrey Lee,et al.  A hybrid genetic algorithm and chaotic function model for image encryption , 2012 .

[4]  Zhihong Zhou,et al.  Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing , 2016 .

[5]  M. Hwang,et al.  Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .

[6]  Abdul Hanan Abdullah,et al.  Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence , 2014 .

[7]  Safya Belghith,et al.  A novel image encryption scheme based on substitution-permutation network and chaos , 2016, Signal Process..

[8]  Yushu Zhang,et al.  Exploiting random convolution and random subsampling for image encryption and compression , 2015 .

[9]  Vinod Patidar,et al.  Medical image protection using genetic algorithm operations , 2014, Soft Computing.

[10]  Andrew Lewis,et al.  Grey Wolf Optimizer , 2014, Adv. Eng. Softw..

[11]  Andreas Uhl,et al.  Identifying deficits of visual security metrics for images , 2016, Signal Process. Image Commun..

[12]  T. S. Subashini,et al.  Detection of Heart Muscle Damage from Automated Analysis of Echocardiogram Video , 2015 .

[13]  M Iyapparaja,et al.  Security policy speculation of user uploaded images on content sharing sites , 2017 .

[14]  Kartik Shankar,et al.  An Efficient Image Encryption Technique Based on Optimized Key Generation in ECC Using Genetic Algorithm , 2016 .

[15]  Krishna Mohan Buddhiraju,et al.  Secure Dissemination and Protection of Multispectral Images Using Crypto-Watermarking , 2015, IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing.

[16]  Yuan Yan Tang,et al.  Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation , 2014, IEEE Transactions on Information Forensics and Security.

[17]  Xiaobo Li,et al.  Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..

[18]  K. Murali,et al.  Chaos based spread spectrum image steganography , 2004, IEEE Transactions on Consumer Electronics.

[19]  Anish Philip A Generalized Pseudo-Knight?s Tour Algorithm for Encryption of an Image , 2013, IEEE Potentials.

[20]  Dinghui Zhang,et al.  Chaotic encryption and decryption of JPEG image , 2014 .

[21]  Subramania Sudharsanan Shared key encryption of JPEG color images , 2005, IEEE Transactions on Consumer Electronics.

[22]  T. Senthil Murugan,et al.  Cluster head selection for energy efficient and delay-less routing in wireless sensor network , 2017, Wireless Networks.

[23]  Salwa K. Abd-El-Hafiz,et al.  A fractal-based image encryption system , 2014, IET Image Process..

[24]  Xiaoling Huang,et al.  An Image Encryption Algorithm Based on Autoblocking and Electrocardiography , 2016, IEEE MultiMedia.

[25]  A. S. Manjunath,et al.  Improved entropy encoding for high efficient video coding standard , 2016 .

[26]  Saroj Kumar Lenka,et al.  Adaptive circular queue image steganography with RSA cryptosystem , 2016 .

[27]  Chi-Wai Chow,et al.  Light Encryption Scheme Using Light-Emitting Diode and Camera Image Sensor , 2016, IEEE Photonics Journal.

[28]  Nasharuddin Zainal,et al.  Decomposition by binary codes-based speedy image encryption algorithm for multiple applications , 2015, IET Image Process..

[29]  Nabin Ghoshal,et al.  Multiple-Image Encryption Using Genetic Algorithm , 2015 .

[30]  B. Bala Krishna,et al.  Impact of tamanu oil-diesel blend on combustion, performance and emissions of diesel engine and its prediction methodology , 2017 .

[31]  Shital S. Bramhe,et al.  Glass Shaped Antenna with Defected Ground Structure for Cognitive Radio Application , 2015, 2015 International Conference on Computing Communication Control and Automation.

[32]  Niloy K. Dutta,et al.  High-speed all-optical encryption and decryption based on two-photon absorption in semiconductor optical amplifiers , 2015, IEEE/OSA Journal of Optical Communications and Networking.

[33]  Hui Liu,et al.  Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map , 2013, IET Inf. Secur..

[34]  Xing-yuan Wang,et al.  Image encryption using genetic operators and intertwining logistic map , 2014, Nonlinear Dynamics.

[35]  Analysis of the stability domain for the Hénon map , 1993 .

[36]  Yuncai Wang,et al.  Enhancing the Brightness of Quantum Dot Light-Emitting Diodes by Multilayer Heterostructures , 2016, IEEE Photonics Journal.

[37]  Weiming Zhang,et al.  Reversible Data Hiding in Encrypted Images by Reversible Image Transformation , 2016, IEEE Transactions on Multimedia.

[38]  Yicong Zhou,et al.  2D Sine Logistic modulation map for image encryption , 2015, Inf. Sci..

[39]  Y. Mu,et al.  Optical Image Encryption Based on Chaotic Baker Map and Double Random Phase Encoding , 2013, Journal of Lightwave Technology.

[40]  Xin-Wen Wu,et al.  On the Security of Permutation-Only Image Encryption Schemes , 2016, IEEE Transactions on Information Forensics and Security.

[41]  Mariusz Dzwonkowski,et al.  A New Quaternion-Based Encryption Method for DICOM Images , 2015, IEEE Transactions on Image Processing.

[42]  Manoj Kumar,et al.  Encryption of color images using MSVD in DCST domain , 2017 .

[43]  Ammasai Gounden Nanjappa Gounder,et al.  Image encryption scheme based on block-based confusion and multiple levels of diffusion , 2016, IET Comput. Vis..

[44]  Paul M. Chau,et al.  Image encryption for secure Internet multimedia applications , 2000, 2000 Digest of Technical Papers. International Conference on Consumer Electronics. Nineteenth in the Series (Cat. No.00CH37102).

[45]  N. Bourbakis,et al.  Data-image-video encryption , 2004, IEEE Potentials.

[46]  Dawei Wang,et al.  A novel lossless color image encryption scheme using 2 D DWT and 6 D hyperchaotic system , 2016 .

[47]  Magno T. M. Silva,et al.  Do chaos-based communication systems really transmit chaotic signals? , 2015, Signal Process..

[48]  Shuliang Sun,et al.  A novel edge based image steganography with 2k correction and Huffman encoding , 2016, Inf. Process. Lett..

[49]  Lina Chen,et al.  Image compression and encryption scheme using fractal dictionary and Julia set , 2015, IET Image Process..

[50]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[51]  Kavita Bhatnagar,et al.  Extending the Neural Model to Study the Impact of Effective Area of Optical Fiber on Laser Intensity , 2017 .

[52]  Chen Tang,et al.  Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map , 2017 .

[53]  Satish R. Todmal,et al.  Eyelids, Eyelashes Detection Algorithm and Hough Transform Method for Noise Removal in Iris Recognition , 2015 .

[54]  Yu-Chee Tseng,et al.  A secure data hiding scheme for binary images , 2002, IEEE Trans. Commun..

[55]  Rui Zhang,et al.  Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme , 2013, IEEE Transactions on Parallel and Distributed Systems.

[56]  Kehui Sun,et al.  A fast image encryption algorithm based on chaotic map , 2016 .