Genetic Algorithm and Chaotic Maps based Visually Meaningful Image Encryption

The security of data is the main challenge these days. The more robust and efficient encryption algorithm is a need for the emerging technology. The combination of a genetic algorithm and chaotic maps are used in this work to encrypt the digital image. The best encrypted image among generations in this algorithm is created by the genetic algorithm. It is the one optimized with lowest correlation coefficient. This image is hidden into a reference image using DWT(Discrete Wavelet Transform) transform creating a visually meaningful encrypted image. This is an unique way that genetic algorithm is used in generating an encrypted image and making it a visually meaningful encrypted image. The genetic algorithm has given a better security analysis results to the proposed algorithm. It has given high resistance to the attacks and does not allow the data accessible to the unauthorized people. This makes the proposed method useful to transmit data or store data in a more secure way. The results for statistical analysis and differential analysis are evaluated and excellent performance of these parameters for the algorithm can be seen.

[1]  Abdennaceur Kachouri,et al.  A novel design of Chaos based S-Boxes using genetic algorithm techniques , 2014, 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA).

[2]  X. Liao,et al.  An image encryption approach based on chaotic maps , 2005 .

[3]  Yicong Zhou,et al.  Image encryption: Generating visually meaningful encrypted images , 2015, Inf. Sci..

[4]  Shahram Etemadi Borujeni,et al.  Image Encryption Using Random Bit Sequence Based on Chaotic Maps , 2013, Arabian Journal for Science and Engineering.

[5]  Shubhangini P. Nichat Image Encryption using Hybrid Genetic Algorithm , 2013 .

[6]  Deeksha Nandur,et al.  Visually Meaningful Encrypted Images using Arnold Transform and Other Transforms , 2018, 2018 International Conference on Computing, Power and Communication Technologies (GUCON).

[7]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[8]  Randy L. Haupt,et al.  Practical Genetic Algorithms , 1998 .