Skip to main content

Application of GA in Key Generation for Image Transposition Cipher Algorithm

  • Conference paper
Computer Networks and Intelligent Computing (ICIP 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 157))

Included in the following conference series:

Abstract

With the increasing use of digital techniques for transmitting and storing images, the fundamental issue of protecting image data against unauthorized access, chaos-based encryption has enjoined a superb know-how to deal with the problem of fast and highly-secured image encryption. The effectiveness of the transposition cipher algorithm profusely depends on the trait of the key. If a key is badly designed or poorly selected, then the protection fails to provide proper security and improper access can be gained on the sensitive information. This work focuses on the application of a crucial Artificial Intelligence approach in block-based image transposition cipher generation. Here, Genetic Algorithm has been applied to search for effective keys to encrypt images through permutation of the pixel locations. This work also statistically analyses the effect of applying varied sizes of keys in block- based image transposition algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bourbakis, N., Alexopoulos, C.: Picture Data Encryption using Scan Patterns. Pattern Recognition 25(6), 567–581 (1992)

    Article  Google Scholar 

  2. Shannon, C.E.: Communication Theory of Secrecy System. Bell System Technical Journal 28, 656–715 (1949)

    Article  MathSciNet  MATH  Google Scholar 

  3. Holland, J.H.: Adaptation in Natural and Artificial Systems, 2nd edn. MIT Press, Cambridge (1992)

    Google Scholar 

  4. Al-Tabtabai, H., Alex, P.: Using Genetic Algorithms to solve Optimization Problems in Construction. Engineering, Construction and Architectural Management 6(2), 121–132 (1999)

    Article  Google Scholar 

  5. Man, Z., Wei, T., Xiang, L., Lishan, K.: Research on Multi-Project Scheduling Problem Based on Hybrid Genetic Algorithm. In: International Conference on Computer Science and Software Engineering, vol. 1, pp. 390–394 (2008)

    Google Scholar 

  6. Kumar, A.: A Novel Genetic Algorithm Approach to Solve Map Colour Problem. In: Emerging Trends in Engineering and Technology, ICETET, pp. 288–291 (2008)

    Google Scholar 

  7. Pichler, F., Scharinger, J.: Efficient Image Encryption based on Chaotic Maps. In: Workshop of the AAPR, Pattern Recognition, pp. 159–170. Oldenbourg, Munchen (1996)

    Google Scholar 

  8. Fridrich, J.: Image Encryption based on Chaotic Maps. In: IEEE Conf. on Systems, Man, and Cybernetics, Orlando, Florida, pp. 1105–1110 (1997)

    Google Scholar 

  9. Fridrich, J.: Symmetric Ciphers based on Two-Dimensional Chaotic Maps. International Journal of Bifurcation and Chaos 8(6), 1259–1284 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  10. Yen, J.C., Guo, J.I.: A New Chaotic Mirror-Like Image Encryption Algorithm and its VLSI Architecture. Pattern Recognition and Image Analysis 10(2), 236–247 (2000)

    Google Scholar 

  11. Younes, M.A.B., Jantan, A.: Image Encryption using Block-Based Transformation Algorithm. IAENG International Journal of Computer Science 35(1) (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bhowmik, S., Acharyya, S. (2011). Application of GA in Key Generation for Image Transposition Cipher Algorithm. In: Venugopal, K.R., Patnaik, L.M. (eds) Computer Networks and Intelligent Computing. ICIP 2011. Communications in Computer and Information Science, vol 157. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22786-8_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22786-8_43

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22785-1

  • Online ISBN: 978-3-642-22786-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics