Abstract
Multiple images have to be sent some time for different purposes. Those images encrypt individually before their sending through non-secure channel. This process is painful and also time-consuming. In this paper, multiple images are encrypted using genetic algorithm. Here, a set of crossover points and a set of values are used to diffuse and encrypt the images. These two sets are computed from a key sequence. The original images have been diffused by genetic algorithm. Bitwise XOR operation has been applied between key set and diffuse images to get encrypted images. The effectiveness of the algorithm has been tested by number of statistical tests like histogram analysis, correlation, and entropy test. A comparison is made between the proposed algorithm and other genetic-based encryption algorithm. Finally, it has been observed that the proposed algorithm is given better result in all tests with less execution time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wang, X., Luan, D.: A novel image encryption algorithm using chaos and reversible cellular automata. Commun. Nonlinear Sci. Numer. Simul. 1, 3075–3085 (2013)
Zeghid, M., Machhout, M., Khriji, L., Baganne, A., Tourki, R.: A modified AES based algorithm for image encryption. Int. J. Comput. Inf. Syst. Control Eng. 1(3), 735–740 (2007)
Younes, M.A, Jantan, A.: Image encryption using block based transformation algorithm. Int. J. Comput. Sci. 35, 1 (2008) (9 pages)
Yadav, R.S., Beg, R., Tripathi, M.M.: Image encryption technique: a critical comparison. Int. J. Comput. Sci. Eng. Inf. Technol. Res. (IJCSEITR) 3(1), 67–74 (2013)
Yen, J.-C., Guo, J.-I.: A new chaotic key-based design for image encryption and decryption. IEEE Int. Conf. Circuits Syst. 4, 49–52 (2000)
Socek, D., Li, S., Magliveras, S.S., Furht, B.: Enhanced 1-D chaotic key-based algorithm for image encryption. In: IEEE/CreateNet SecureComm, pp. 406–408. Athens, Greece, 5–9 Sept 2005
Al-Husainy, M.A.F: Image encryption using genetic algorithm. Inf. Technol. J. 5, 516–519 (2006) (Asian Network For Scientific Information)
Soni, A., Agrawal, S.: Using genetic algorithm for symmetric key generation in image encryption. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 1(10), 137–140 (2012). ISSN: 2278–1323
Guanghui, C., Kai, H., Yizhi, Z., Jun, Z., Xing, Z.: Chaotic image encryption based on running-key related to plaintext. Sci. World J. Article id 490179, p. 9 (2014)
Bhatnagar, G., JonathanWu, Q.M.: A novel chaotic encryption framework for securing palmprint data. In: The 3rd International Conference on Ambient Systems, Networks and Technologies, pp. 442–449. Elsevier (2012)
Jolfaei, A., Mirghadri, A.: A novel image encryption scheme using pixel shuffler and A5/1. In: International Conference on Artificial Intelligence and Computational Intelligence, pp. 369–373 (2010)
Das, S., Mandal, S.N., Ghoshal, N.: Diffusion of encryption of digital image using genetic algorithm. FICTA 2014 Advances in Intelligent Systems and Computing, vol. 327, pp. 729–736. Springer (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Das, S., Mandal, S., Ghoshal, N. (2015). Multiple-Image Encryption Using Genetic Algorithm. In: Mandal, D., Kar, R., Das, S., Panigrahi, B. (eds) Intelligent Computing and Applications. Advances in Intelligent Systems and Computing, vol 343. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2268-2_16
Download citation
DOI: https://doi.org/10.1007/978-81-322-2268-2_16
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2267-5
Online ISBN: 978-81-322-2268-2
eBook Packages: EngineeringEngineering (R0)