Random Color Image Encryption Using the Genetic Algorithm

Authors

  • Hanan Abbas Salman Department of Computer System Techniques, Technical Institute of Najaf, Al-Furat Al-Awsat Technical University, Najaf, Iraq
  • Duha Amer Mahdi Department of Computer System Techniques, Technical Institute of Najaf, Al-Furat Al-Awsat Technical University, Najaf, Iraq

DOI:

https://doi.org/10.11113/mjfas.v19n3.2907

Keywords:

Cryptography, encryption, decryption, random key, genetic algorithm

Abstract

This paper implements a combined pseudo-random sequence generator based on neural networks and chaotic, random variable color images based on an algorithm for chaotic encryption, secure image storage, and transmission. The generator that controls the operation of the encryption algorithm: the arrangement of pixel positions, the use of random color images of the AES algorithm to achieve encryption, creation algorithms, and neural networks by dynamically updating control parameters and numbers to increase the generated chaotic sequence randomness by using simulation MATLAB for getting output. The chaotic function's iteration of the neural networks. The experimental results are presented in the form of a pixel correlation coefficient and security analysis to prove the security and effectiveness of the proposed chaos-based ANN encryption.

References

Ahmad, S., Alam, K. M. R., Rahman, H., & Tamura, S. (2015, January). A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets. 2015 International Conference on Networking Systems and Security (NSysS) (pp. 1-5). IEEE.

Al-Husainy, M. A. F. (2012). A novel encryption method for image security. International Journal of Security and Its Applications, 6(1), 1-8.

Auyporn, W., & Vongpradhip, S. (2015). A robust image encryption method based on bit plane decomposition and multiple chaotic maps. Int. J. Signal Process. Syst, 3(1), 8-13.

Bani, M. A., & Jantan, A. (2008). Image encryption using block-based transformation algorithm. IJCSNS International Journal of Computer Science and Network Security, 8(4), 191-197.

Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23 (pp. 506-522). Springer Berlin Heidelberg.

Chang, C. C., Hwang, M. S., & Chen, T. S. (2001). A new encryption algorithm for image cryptosystems. Journal of Systems and Software, 58(2), 83-91.

Delfs, H., Knebl, H., Delfs, H., & Knebl, H. (2007). Symmetric-key encryption. Introduction to Cryptography: Principles and Applications, 11-31.

Guo, J., Ling, S., Rechberger, C., & Wang, H. (2010). Advanced meet-in-the-middle preimage attacks: First results on full Tiger, and improved results on MD4 and SHA-2. Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings 16 (pp. 56-75). Springer Berlin Heidelberg.

Hathot, S. F., Jubier, N. J., Hassani, R. H., & Salim, A. A. (2021). Physical and elastic properties of TeO2-Gd2O3 glasses: Role of zinc oxide contents variation. Optik, 247, 167941.

Khudhair, K. T., Kadhim, O. N., Najjar, F. H., Abedi, F., Jamaluddin, A. N., & Al-Kharsan, I. H. (2022, May). Soft edge detection by mamdani fuzzy inference of color image. 2022 5th International Conference on Engineering Technology and its Applications (IICETA) (pp. 379-383). IEEE.

Salim, A. A., Ghoshal, S. K., & Bakhtiar, H. (2021). Tailored morphology, absorption and bactericidal traits of cinnamon nanocrystallites made via PLAL method: Role of altering laser fluence and solvent. Optik, 226, 165879.

Sivakumar, T., & Venkatesan, R. (2013). A novel image encryption approach using matrix reordering. WSEAS Transactions on Computers, 12(11), 407-418.

Waheed, S. R., Rahim, M. S. M., Suaib, N. M., & Salim, A. A. (2023). CNN deep learning-based image to vector depiction. Multimedia Tools and Applications, 1-20.

Salim, A. A., Ghoshal, S. K., & Bakhtiar, H. (2021). Growth mechanism and optical characteristics of Nd: YAG laser ablated amorphous cinnamon nanoparticles produced in ethanol: Influence of accumulative pulse irradiation time variation. Photonics and Nanostructures-Fundamentals and Applications, 43, 100889.

Huang, F., & Qu, X. (2011). Design of image security system based on chaotic maps group. Journal of multimedia, 6(6), 510.

Sivakumar, T., & Venkatesan, R. (2014). A novel approach for image encryption using dynamic SCAN pattern. IAENG International Journal of Computer Science, 41(2), 91-101.

Najjar, F. H., Khudhair, K. T., Khaleq, A. H. A., Kadhim, O. N., Abedi, F., & Al-Kharsan, I. H. (2022, May). Histogram Features Extraction for Edge Detection Approach. 2022 5th International Conference on Engineering Technology and its Applications (IICETA) (pp. 373-378). IEEE.

Downloads

Published

26-05-2023

Issue

Section

Article