Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 14, pp 20465–20483 | Cite as

A novel quantum image encryption algorithm based on crossover operation and mutation operation

  • Liu Hui 
  • Bo ZhaoEmail author
  • Linquan Huang
Article
  • 89 Downloads

Abstract

In this paper, a new algorithm of image encryption based on random selection of crossover operation and mutation operation is proposed. Crossover operation and mutation operation come from genetic algorithm that gets high-quality solutions to optimization. First, quantum chaos sequence and two-dimensional logistic sequence are XORed with plain-image. And then, adjacent pixels of the image are carried out bit-level crossover operation and crossover bits rely heavily on chaotic maps for chaotic property. Finally, two different bits of each pixel are employed to perform mutation for high randomness. In order to obtain the high complexity and unpredictability further, quantum chaotic map is coupled with nearest-neighboring coupled-map lattices (NCML). Computer simulations and statistical analyses show that the proposed algorithm has more than 1045 bits key space, low correlation closed to 0, ideal information entropy closed to 8, acceptable speed performance 4.7081Mbt/s and resistance to various attacks.

Keywords

Crossover operation Mutation operation Quantum chaos sequence Two-dimensional logistic map Nearest-neighboring coupled-map lattices 

Notes

Acknowledgments

The work is supported by the National Key Basic Research Program of China (973 Program) (No.2014CB340600) and the Wuhan Frontier Program of Application Foundation (No.2018010401011295).

References

  1. 1.
    Akhshani A, Akhavan A, Mobaraki A (2014) Pseudo random number generator based on quantum chaotic map[J]. Commun Nonlinear Sci Numer Simul 19(1):101–111zbMATHGoogle Scholar
  2. 2.
    Alassaf N, Gutub A, Parah SA, Ghamdi MA et al (2018) Enhancing speed of SIMON: a light-weight-cryptographic algorithm for IoT applications[J]. Multimed Tools Appl 11(5):1–25Google Scholar
  3. 3.
    Beg AH, Islam MZ (2016) Novel crossover and mutation operation in genetic algorithm for clustering[C]. IEEE Congress on Evolutionary Computation. IEEE, p 2114–2121Google Scholar
  4. 4.
    Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations[J]. Opt Lasers Eng 88(10):197–213Google Scholar
  5. 5.
    Chen J, Zhu ZL, Zhang LB (2018) Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption[J]. Signal Process 142:340–353Google Scholar
  6. 6.
    Chuan Q, Wei Z, Fang C et al (2018) Separable reversible data hiding in encrypted images via adaptive embedding strategy with block celection[J]. Signal Process 153(12):109–122Google Scholar
  7. 7.
    Friedrich T, Kotzing T, Krejca MS (2017) The compact genetic algorithm is efficient under extreme gaussian noise[J]. IEEE Trans Evol Comput 21(3):477–490Google Scholar
  8. 8.
    Guesmi R, Farah M, Kachouri A (2016) Hash key-based image encryption using crossover operator and chaos[J]. Multimed Tools Appl 75(8):4753–4769zbMATHGoogle Scholar
  9. 9.
    Guo J, Riyono D, Prasetyo H (2018) Improved Beta chaotic image encryption for multiple secret sharing[J]. IEEE Access 6:46297–46321Google Scholar
  10. 10.
    Hamza R, Muhammad K, Nachiappan A, et al (2017) Hash based encryption for keyframes of diagnostic hysteroscopy[J]. IEEE Access PP(99):1–18Google Scholar
  11. 11.
    Hossein N, Rasul E, Homayun M et al (2018) Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices[J]. Opt Lasers Eng 111:24–32Google Scholar
  12. 12.
    Hua Z, Wang Y, Zhou Y (2016) Image cipher using a new Interactive two-dimensional chaotic map[C]. IEEE International Conference on Systems, Man, and Cybernetics. IEEE, p 1804–1808Google Scholar
  13. 13.
    Jain A, Rajpal N (2016) A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps[J]. Multimed Tools Appl 75(10):5455–5472Google Scholar
  14. 14.
    Jha Y, Kaur K, Pradhan C (2016) Improving image encryption using two-dimensional logistic map and AES[C]. International Conference on Communication and Signal Processing. IEEE, p 0177–0180Google Scholar
  15. 15.
    Khan M, Shah T (2014) A novel statistical analysis of chaotic S-box in image encryption[J]. 3D Res 5(3):1–8Google Scholar
  16. 16.
    Kulsoom A, Xiao D, Aqeel-Ur-Rehman (2016) An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules[J]. Multimed Tools Appl 75(1):1–23Google Scholar
  17. 17.
    Kumar J, Nirmala S (2018) Random selection of crossover operation with mutation for image encryption-a new approach[J]. Advanced Computing and Communication Technologies 256(8):63–72Google Scholar
  18. 18.
    Li J (2016) Hybrid color and grayscale images encryption scheme based on quaternion Hartley transform and logistic map in gyrator domain[J]. J Opt Soc Korea 20(1):42–54Google Scholar
  19. 19.
    Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation[J]. Opt Lasers Eng 90(3):238–246Google Scholar
  20. 20.
    Liu H, Jin C (2017) A novel color image encryption algorithm based on quantum chaos sequence[J]. 3D Res 8(1):63–76Google Scholar
  21. 21.
    Liu H, Jin C (2017) A color image encryption scheme based on Arnold scrambling and quantum chaotic[J]. Inter J Network Secur 19(3):347–357Google Scholar
  22. 22.
    Liu Y, Tong X, Ma J (2016) Image encryption algorithm based on hyper-chaotic system and dynamic S-box[J]. Multimed Tools Appl 75(13):7739–7759Google Scholar
  23. 23.
    Metawa N, Hassan MK, Elhoseny M (2017) Genetic algorithm based model for optimizing bank lending decisions[J]. Expert Syst Appl 80(10):75–82Google Scholar
  24. 24.
    Muhammad K, Hamza R, Ahmad J et al (2018) Secure surveillance framework for IoT systems using probabilistic image encryption[J]. IEEE T Ind Inform 14(8):3679–3689Google Scholar
  25. 25.
    Nkapkop JDD, Effa J, Borda M (2017) Chaotic encryption scheme based on a fast permutation and diffusion structure[J]. Int Arab J Inf Techn 14(6):812–819Google Scholar
  26. 26.
    Parvaz R, Zarebnia M (2018) A combination chaotic system and application in color image encryption[J]. Opt Laser Technol 101:30–41Google Scholar
  27. 27.
    Parvin Z, Seyedarabi H, Shamsi M (2016) A new secure and sensitive image encryption scheme based on new substitution with chaotic function[J]. Multimed Tools Appl 75(17):10631–10648Google Scholar
  28. 28.
    Patidar V, Pareek NK, Purohit G (2017) A novel quasigroup substitution scheme for chaos based image encryption[J]. J Applied Nonlinear Dynam 2017(6):1–3zbMATHGoogle Scholar
  29. 29.
    Patro K, Acharya B (2018) Secure multi-level permutation operation based multiple colour image encryption[J]. Int J Inf Secur 40(2018):111–133Google Scholar
  30. 30.
    Rehman AU, Khan JS, Ahmad J (2016) A new image encryption scheme based on dynamic S-boxes and chaotic maps[J]. 3D Res 7(1):1–8Google Scholar
  31. 31.
    Seyedzadeh SM, Norouzi B, Mosavi MR (2015) A novel color image encryption algorithm based on spatial permutation and quantum chaotic map[J]. Nonlinear Dynam 81(1–2):1–19Google Scholar
  32. 32.
    Teng L, Wang X, Meng J (2017) A chaotic color image encryption using integrated bit-level permutation[J]. Multimed Tools Appl 10:1–14Google Scholar
  33. 33.
    Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos[J]. Signal Process 92(4):1101–1108MathSciNetGoogle Scholar
  34. 34.
    Wang W, Tan HY, Pang Y et al (2016) A novel encryption algorithm based on DWT and multichaos mapping[J]. J Sensors 12(6):1–8Google Scholar
  35. 35.
    Wei W, Miaomiao S, Yu P et al (2018) An encryption algorithm based on combined chaos in body area networks[J]. Comput Electr Eng 65:282–291Google Scholar
  36. 36.
    Wu J, Liao X, Yang B (2017) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation[J]. Signal Process 148(10):292–300Google Scholar
  37. 37.
    Xiao D, Wang L, Xiang T (2017) Multi-focus image fusion and robust encryption algorithm based on compressive sensing[J]. Opt Laser Technol 91(8):212–225Google Scholar
  38. 38.
    Yu C, Li J, Li X et al (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram[J]. Multimed Tools Appl 77(4):4585–4608Google Scholar
  39. 39.
    Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice[J]. Inf Sci 273(8):329–351Google Scholar
  40. 40.
    Zheng Q, Wang X, Khan MK, et al (2018) A lightweight authenticated encryption scheme based on chaotic SCML for railway cloud service[J]. IEEE Access, PP(99):1–1Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and EngineeringWuhan UniversityWuhanChina
  2. 2.School of Computer Science and TechnologyHankou UniversityWuhanChina

Personalised recommendations