Abstract
With the increasing use of digital techniques for transmitting and storing images, the fundamental issue of protecting image data against unauthorized access, chaos-based encryption has enjoined a superb know-how to deal with the problem of fast and highly-secured image encryption. The effectiveness of the transposition cipher algorithm profusely depends on the trait of the key. If a key is badly designed or poorly selected, then the protection fails to provide proper security and improper access can be gained on the sensitive information. This work focuses on the application of a crucial Artificial Intelligence approach in block-based image transposition cipher generation. Here, Genetic Algorithm has been applied to search for effective keys to encrypt images through permutation of the pixel locations. This work also statistically analyses the effect of applying varied sizes of keys in block- based image transposition algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bourbakis, N., Alexopoulos, C.: Picture Data Encryption using Scan Patterns. Pattern Recognition 25(6), 567–581 (1992)
Shannon, C.E.: Communication Theory of Secrecy System. Bell System Technical Journal 28, 656–715 (1949)
Holland, J.H.: Adaptation in Natural and Artificial Systems, 2nd edn. MIT Press, Cambridge (1992)
Al-Tabtabai, H., Alex, P.: Using Genetic Algorithms to solve Optimization Problems in Construction. Engineering, Construction and Architectural Management 6(2), 121–132 (1999)
Man, Z., Wei, T., Xiang, L., Lishan, K.: Research on Multi-Project Scheduling Problem Based on Hybrid Genetic Algorithm. In: International Conference on Computer Science and Software Engineering, vol. 1, pp. 390–394 (2008)
Kumar, A.: A Novel Genetic Algorithm Approach to Solve Map Colour Problem. In: Emerging Trends in Engineering and Technology, ICETET, pp. 288–291 (2008)
Pichler, F., Scharinger, J.: Efficient Image Encryption based on Chaotic Maps. In: Workshop of the AAPR, Pattern Recognition, pp. 159–170. Oldenbourg, Munchen (1996)
Fridrich, J.: Image Encryption based on Chaotic Maps. In: IEEE Conf. on Systems, Man, and Cybernetics, Orlando, Florida, pp. 1105–1110 (1997)
Fridrich, J.: Symmetric Ciphers based on Two-Dimensional Chaotic Maps. International Journal of Bifurcation and Chaos 8(6), 1259–1284 (1998)
Yen, J.C., Guo, J.I.: A New Chaotic Mirror-Like Image Encryption Algorithm and its VLSI Architecture. Pattern Recognition and Image Analysis 10(2), 236–247 (2000)
Younes, M.A.B., Jantan, A.: Image Encryption using Block-Based Transformation Algorithm. IAENG International Journal of Computer Science 35(1) (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bhowmik, S., Acharyya, S. (2011). Application of GA in Key Generation for Image Transposition Cipher Algorithm. In: Venugopal, K.R., Patnaik, L.M. (eds) Computer Networks and Intelligent Computing. ICIP 2011. Communications in Computer and Information Science, vol 157. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22786-8_43
Download citation
DOI: https://doi.org/10.1007/978-3-642-22786-8_43
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22785-1
Online ISBN: 978-3-642-22786-8
eBook Packages: Computer ScienceComputer Science (R0)