Skip to main content

Multiple-Image Encryption Using Genetic Algorithm

  • Conference paper
  • First Online:
Intelligent Computing and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 343))

Abstract

Multiple images have to be sent some time for different purposes. Those images encrypt individually before their sending through non-secure channel. This process is painful and also time-consuming. In this paper, multiple images are encrypted using genetic algorithm. Here, a set of crossover points and a set of values are used to diffuse and encrypt the images. These two sets are computed from a key sequence. The original images have been diffused by genetic algorithm. Bitwise XOR operation has been applied between key set and diffuse images to get encrypted images. The effectiveness of the algorithm has been tested by number of statistical tests like histogram analysis, correlation, and entropy test. A comparison is made between the proposed algorithm and other genetic-based encryption algorithm. Finally, it has been observed that the proposed algorithm is given better result in all tests with less execution time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang, X., Luan, D.: A novel image encryption algorithm using chaos and reversible cellular automata. Commun. Nonlinear Sci. Numer. Simul. 1, 3075–3085 (2013)

    Article  MathSciNet  Google Scholar 

  2. Zeghid, M., Machhout, M., Khriji, L., Baganne, A., Tourki, R.: A modified AES based algorithm for image encryption. Int. J. Comput. Inf. Syst. Control Eng. 1(3), 735–740 (2007)

    Google Scholar 

  3. Younes, M.A, Jantan, A.: Image encryption using block based transformation algorithm. Int. J. Comput. Sci. 35, 1 (2008) (9 pages)

    Google Scholar 

  4. Yadav, R.S., Beg, R., Tripathi, M.M.: Image encryption technique: a critical comparison. Int. J. Comput. Sci. Eng. Inf. Technol. Res. (IJCSEITR) 3(1), 67–74 (2013)

    Google Scholar 

  5. Yen, J.-C., Guo, J.-I.: A new chaotic key-based design for image encryption and decryption. IEEE Int. Conf. Circuits Syst. 4, 49–52 (2000)

    Google Scholar 

  6. Socek, D., Li, S., Magliveras, S.S., Furht, B.: Enhanced 1-D chaotic key-based algorithm for image encryption. In: IEEE/CreateNet SecureComm, pp. 406–408. Athens, Greece, 5–9 Sept 2005

    Google Scholar 

  7. Al-Husainy, M.A.F: Image encryption using genetic algorithm. Inf. Technol. J. 5, 516–519 (2006) (Asian Network For Scientific Information)

    Google Scholar 

  8. Soni, A., Agrawal, S.: Using genetic algorithm for symmetric key generation in image encryption. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 1(10), 137–140 (2012). ISSN: 2278–1323

    Google Scholar 

  9. Guanghui, C., Kai, H., Yizhi, Z., Jun, Z., Xing, Z.: Chaotic image encryption based on running-key related to plaintext. Sci. World J. Article id 490179, p. 9 (2014)

    Google Scholar 

  10. Bhatnagar, G., JonathanWu, Q.M.: A novel chaotic encryption framework for securing palmprint data. In: The 3rd International Conference on Ambient Systems, Networks and Technologies, pp. 442–449. Elsevier (2012)

    Google Scholar 

  11. Jolfaei, A., Mirghadri, A.: A novel image encryption scheme using pixel shuffler and A5/1. In: International Conference on Artificial Intelligence and Computational Intelligence, pp. 369–373 (2010)

    Google Scholar 

  12. Das, S., Mandal, S.N., Ghoshal, N.: Diffusion of encryption of digital image using genetic algorithm. FICTA 2014 Advances in Intelligent Systems and Computing, vol. 327, pp. 729–736. Springer (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Subhajit Das .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Das, S., Mandal, S., Ghoshal, N. (2015). Multiple-Image Encryption Using Genetic Algorithm. In: Mandal, D., Kar, R., Das, S., Panigrahi, B. (eds) Intelligent Computing and Applications. Advances in Intelligent Systems and Computing, vol 343. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2268-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2268-2_16

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2267-5

  • Online ISBN: 978-81-322-2268-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics