Skip to main content

Advertisement

Log in

A novel quantum image encryption algorithm based on crossover operation and mutation operation

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a new algorithm of image encryption based on random selection of crossover operation and mutation operation is proposed. Crossover operation and mutation operation come from genetic algorithm that gets high-quality solutions to optimization. First, quantum chaos sequence and two-dimensional logistic sequence are XORed with plain-image. And then, adjacent pixels of the image are carried out bit-level crossover operation and crossover bits rely heavily on chaotic maps for chaotic property. Finally, two different bits of each pixel are employed to perform mutation for high randomness. In order to obtain the high complexity and unpredictability further, quantum chaotic map is coupled with nearest-neighboring coupled-map lattices (NCML). Computer simulations and statistical analyses show that the proposed algorithm has more than 1045 bits key space, low correlation closed to 0, ideal information entropy closed to 8, acceptable speed performance 4.7081Mbt/s and resistance to various attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig.3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Akhshani A, Akhavan A, Mobaraki A (2014) Pseudo random number generator based on quantum chaotic map[J]. Commun Nonlinear Sci Numer Simul 19(1):101–111

    Article  MATH  Google Scholar 

  2. Alassaf N, Gutub A, Parah SA, Ghamdi MA et al (2018) Enhancing speed of SIMON: a light-weight-cryptographic algorithm for IoT applications[J]. Multimed Tools Appl 11(5):1–25

    Google Scholar 

  3. Beg AH, Islam MZ (2016) Novel crossover and mutation operation in genetic algorithm for clustering[C]. IEEE Congress on Evolutionary Computation. IEEE, p 2114–2121

  4. Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations[J]. Opt Lasers Eng 88(10):197–213

    Article  Google Scholar 

  5. Chen J, Zhu ZL, Zhang LB (2018) Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption[J]. Signal Process 142:340–353

    Article  Google Scholar 

  6. Chuan Q, Wei Z, Fang C et al (2018) Separable reversible data hiding in encrypted images via adaptive embedding strategy with block celection[J]. Signal Process 153(12):109–122

    Google Scholar 

  7. Friedrich T, Kotzing T, Krejca MS (2017) The compact genetic algorithm is efficient under extreme gaussian noise[J]. IEEE Trans Evol Comput 21(3):477–490

    Google Scholar 

  8. Guesmi R, Farah M, Kachouri A (2016) Hash key-based image encryption using crossover operator and chaos[J]. Multimed Tools Appl 75(8):4753–4769

    Article  MATH  Google Scholar 

  9. Guo J, Riyono D, Prasetyo H (2018) Improved Beta chaotic image encryption for multiple secret sharing[J]. IEEE Access 6:46297–46321

    Article  Google Scholar 

  10. Hamza R, Muhammad K, Nachiappan A, et al (2017) Hash based encryption for keyframes of diagnostic hysteroscopy[J]. IEEE Access PP(99):1–18

  11. Hossein N, Rasul E, Homayun M et al (2018) Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices[J]. Opt Lasers Eng 111:24–32

    Google Scholar 

  12. Hua Z, Wang Y, Zhou Y (2016) Image cipher using a new Interactive two-dimensional chaotic map[C]. IEEE International Conference on Systems, Man, and Cybernetics. IEEE, p 1804–1808

  13. Jain A, Rajpal N (2016) A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps[J]. Multimed Tools Appl 75(10):5455–5472

    Article  Google Scholar 

  14. Jha Y, Kaur K, Pradhan C (2016) Improving image encryption using two-dimensional logistic map and AES[C]. International Conference on Communication and Signal Processing. IEEE, p 0177–0180

  15. Khan M, Shah T (2014) A novel statistical analysis of chaotic S-box in image encryption[J]. 3D Res 5(3):1–8

    Google Scholar 

  16. Kulsoom A, Xiao D, Aqeel-Ur-Rehman (2016) An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules[J]. Multimed Tools Appl 75(1):1–23

    Article  Google Scholar 

  17. Kumar J, Nirmala S (2018) Random selection of crossover operation with mutation for image encryption-a new approach[J]. Advanced Computing and Communication Technologies 256(8):63–72

    Article  Google Scholar 

  18. Li J (2016) Hybrid color and grayscale images encryption scheme based on quaternion Hartley transform and logistic map in gyrator domain[J]. J Opt Soc Korea 20(1):42–54

    Article  Google Scholar 

  19. Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation[J]. Opt Lasers Eng 90(3):238–246

    Article  Google Scholar 

  20. Liu H, Jin C (2017) A novel color image encryption algorithm based on quantum chaos sequence[J]. 3D Res 8(1):63–76

    Google Scholar 

  21. Liu H, Jin C (2017) A color image encryption scheme based on Arnold scrambling and quantum chaotic[J]. Inter J Network Secur 19(3):347–357

    Google Scholar 

  22. Liu Y, Tong X, Ma J (2016) Image encryption algorithm based on hyper-chaotic system and dynamic S-box[J]. Multimed Tools Appl 75(13):7739–7759

    Article  Google Scholar 

  23. Metawa N, Hassan MK, Elhoseny M (2017) Genetic algorithm based model for optimizing bank lending decisions[J]. Expert Syst Appl 80(10):75–82

    Article  Google Scholar 

  24. Muhammad K, Hamza R, Ahmad J et al (2018) Secure surveillance framework for IoT systems using probabilistic image encryption[J]. IEEE T Ind Inform 14(8):3679–3689

    Article  Google Scholar 

  25. Nkapkop JDD, Effa J, Borda M (2017) Chaotic encryption scheme based on a fast permutation and diffusion structure[J]. Int Arab J Inf Techn 14(6):812–819

    Google Scholar 

  26. Parvaz R, Zarebnia M (2018) A combination chaotic system and application in color image encryption[J]. Opt Laser Technol 101:30–41

    Article  Google Scholar 

  27. Parvin Z, Seyedarabi H, Shamsi M (2016) A new secure and sensitive image encryption scheme based on new substitution with chaotic function[J]. Multimed Tools Appl 75(17):10631–10648

    Article  Google Scholar 

  28. Patidar V, Pareek NK, Purohit G (2017) A novel quasigroup substitution scheme for chaos based image encryption[J]. J Applied Nonlinear Dynam 2017(6):1–3

    MATH  Google Scholar 

  29. Patro K, Acharya B (2018) Secure multi-level permutation operation based multiple colour image encryption[J]. Int J Inf Secur 40(2018):111–133

    Google Scholar 

  30. Rehman AU, Khan JS, Ahmad J (2016) A new image encryption scheme based on dynamic S-boxes and chaotic maps[J]. 3D Res 7(1):1–8

    Article  Google Scholar 

  31. Seyedzadeh SM, Norouzi B, Mosavi MR (2015) A novel color image encryption algorithm based on spatial permutation and quantum chaotic map[J]. Nonlinear Dynam 81(1–2):1–19

  32. Teng L, Wang X, Meng J (2017) A chaotic color image encryption using integrated bit-level permutation[J]. Multimed Tools Appl 10:1–14

    Google Scholar 

  33. Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos[J]. Signal Process 92(4):1101–1108

    Article  MathSciNet  Google Scholar 

  34. Wang W, Tan HY, Pang Y et al (2016) A novel encryption algorithm based on DWT and multichaos mapping[J]. J Sensors 12(6):1–8

    Google Scholar 

  35. Wei W, Miaomiao S, Yu P et al (2018) An encryption algorithm based on combined chaos in body area networks[J]. Comput Electr Eng 65:282–291

    Article  Google Scholar 

  36. Wu J, Liao X, Yang B (2017) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation[J]. Signal Process 148(10):292–300

    Google Scholar 

  37. Xiao D, Wang L, Xiang T (2017) Multi-focus image fusion and robust encryption algorithm based on compressive sensing[J]. Opt Laser Technol 91(8):212–225

    Article  Google Scholar 

  38. Yu C, Li J, Li X et al (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram[J]. Multimed Tools Appl 77(4):4585–4608

    Article  Google Scholar 

  39. Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice[J]. Inf Sci 273(8):329–351

    Article  Google Scholar 

  40. Zheng Q, Wang X, Khan MK, et al (2018) A lightweight authenticated encryption scheme based on chaotic SCML for railway cloud service[J]. IEEE Access, PP(99):1–1

Download references

Acknowledgments

The work is supported by the National Key Basic Research Program of China (973 Program) (No.2014CB340600) and the Wuhan Frontier Program of Application Foundation (No.2018010401011295).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bo Zhao.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, H., Zhao, B. & Huang, L. A novel quantum image encryption algorithm based on crossover operation and mutation operation. Multimed Tools Appl 78, 20465–20483 (2019). https://doi.org/10.1007/s11042-019-7186-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7186-3

Keywords

Navigation