Adaptive Differential Evolution-Based Lorenz Chaotic System for Image Encryption

The main challenge for Lorenz chaotic system-based image encryption techniques is parameter sensitivity and resistance against attacks. To resolve these issues, a modified image encryption technique based on secure hash algorithm (SHA-3) and adaptive differential evolution (ADE) is proposed. In the proposed technique, ADE is used to optimize the input parameters of Lorenz chaotic system. SHA-3 is used to generate secret key based on the input image. The optimized parameters and external secret keys are used to generate initial values for Lorenz chaotic system that make it sensitive toward input image and provide resistance against both known-plaintext and known-ciphertext attacks. The proposed technique is compared with five well-known image encryption techniques over four color images. The experimental results reveal that the proposed technique outperforms existing techniques in terms of security and quality measures. The noise and enhancement attacks are also applied to test the robustness of proposed technique.

[1]  Jie Gao,et al.  The Design and Its Application in Secure Communication and Image Encryption of a New Lorenz-Like System with Varying Parameter , 2016 .

[2]  Xiaoling Huang,et al.  A novel block chaotic encryption scheme for remote sensing image , 2015, Multimedia Tools and Applications.

[3]  Guanghui Sun,et al.  Design and circuit simulation of the new Lorenz chaotic system , 2010, 2010 3rd International Symposium on Systems and Control in Aeronautics and Astronautics.

[4]  Bhaskar Mondal,et al.  A light weight secure image encryption scheme based on chaos & DNA computing , 2017, J. King Saud Univ. Comput. Inf. Sci..

[5]  Xiaoyun Wang,et al.  Finding Collisions in the Full SHA-1 , 2005, CRYPTO.

[6]  Vijay Kumar,et al.  Colour image encryption technique using differential evolution in non-subsampled contourlet transform domain , 2018, IET Image Process..

[7]  Malrey Lee,et al.  A hybrid genetic algorithm and chaotic function model for image encryption , 2012 .

[8]  Kwok-Wo Wong,et al.  An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion , 2013, Commun. Nonlinear Sci. Numer. Simul..

[9]  Safya Belghith,et al.  A novel image encryption scheme based on substitution-permutation network and chaos , 2016, Signal Process..

[10]  Shilong Ma,et al.  Remote-sensing image encryption in hybrid domains , 2012 .

[11]  Muhammad Khurram Khan,et al.  Chaos-based secure satellite imagery cryptosystem , 2010, Comput. Math. Appl..

[12]  M Kaur,et al.  Efficient image encryption method based on improved Lorenz chaotic system , 2018 .

[13]  G. A. Vijayalakshmi Pai,et al.  Stream cipher for binary image encryption using Ant Colony Optimization based key generation , 2012, Appl. Soft Comput..

[14]  Mehrzad Khaki Jamei,et al.  A secure image encryption method based on dynamic harmony search (DHS) combined with chaotic map , 2016 .

[15]  Byoung-Ho Kim,et al.  Fast digital image encryption based on compressive sensing using structurally random matrices and Arnold transform technique , 2016 .

[16]  Ou Xie,et al.  Compression and encryption for remote sensing image using chaotic system , 2015, Secur. Commun. Networks.

[17]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[18]  Manjit Kaur,et al.  Fourier-Mellin moment-based intertwining map for image encryption , 2018 .

[19]  Mohammad Reza Mosavi,et al.  A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process , 2012, Multimedia Tools and Applications.

[20]  Qiuzhen Lin,et al.  A novel micro-population immune multiobjective optimization algorithm , 2013, Comput. Oper. Res..

[21]  Kalyanmoy Deb,et al.  A fast and elitist multiobjective genetic algorithm: NSGA-II , 2002, IEEE Trans. Evol. Comput..

[22]  Ye Zhang,et al.  A novel image compression–encryption hybrid algorithm based on the analysis sparse representation , 2017 .

[23]  Hassan N. Noura,et al.  An image encryption scheme based on irregularly decimated chaotic maps , 2014, Signal Process. Image Commun..

[24]  Ziba Eslami,et al.  An authenticated image encryption scheme based on chaotic maps and memory cellular automata , 2013 .

[25]  Abdul Hanan Abdullah,et al.  A weighted discrete imperialist competitive algorithm (WDICA) combined with chaotic map for image encryption , 2013 .

[26]  R. Venkatesan,et al.  A Novel Image Encryption Using Calligraphy Based Scan Method and Random Number , 2015, KSII Trans. Internet Inf. Syst..

[27]  Neha Sharma,et al.  Phase-Image Encryption Based on 3D-Lorenz Chaotic System and Double Random Phase Encoding , 2017 .

[28]  Xuesong Wang,et al.  Image Encryption Based on a Genetic Algorithm and a Chaotic System , 2015, IEICE Trans. Commun..

[29]  Chengqing Li,et al.  Cracking a hierarchical chaotic image encryption algorithm based on permutation , 2015, Signal Process..

[30]  Musheer Ahmad,et al.  Secure Satellite Images Transmission Scheme Based on Chaos and Discrete Wavelet Transform , 2011, HPAGC.

[31]  Abdul Hanan Abdullah,et al.  Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence , 2014 .

[32]  Kyung Sup Kwak,et al.  Preamble-based improved channel estimation for multiband UWB system in presence of interferences , 2013, Telecommun. Syst..

[33]  Wenying Wen,et al.  Security analysis of a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order CNN against chosen-plaintext attack , 2015, Multimedia Tools and Applications.

[34]  Fahad Bin Muhaya,et al.  Chaotic and AES cryptosystem for satellite imagery , 2013, Telecommun. Syst..

[35]  E. Lorenz Deterministic nonperiodic flow , 1963 .

[36]  Leilei Cao,et al.  Study on the Control Strategy of Shifting Time Involving Multigroup Clutches , 2016 .

[37]  Qiuzhen Lin,et al.  A novel hybrid multi-objective immune algorithm with adaptive differential evolution , 2015, Comput. Oper. Res..

[38]  Kwok-Wo Wong,et al.  Chosen-plaintext attack of an image encryption scheme based on modified permutation–diffusion structure , 2015, ArXiv.

[39]  Fathi E. Abd El-Samie,et al.  Image Encryption: A Communication Perspective , 2013 .