To ensure the security of image transmission, this paper presents a new image encryption algorithm based on a genetic algorithm (GA) and a piecewise linear chaotic map (PWLCM), which adopts the classical diffusion-substitution architecture. The GA is used to identify and output the optimal encrypted image that has the highest entropy value, the lowest correlation coefficient among adjacent pixels and the strongest ability to resist differential attack. The PWLCM is used to scramble pixel positions and change pixel values. Experiments and analyses show that the new algorithm possesses a large key space and resists brute-force, statistical and differential attacks. Meanwhile, the comparative analysis also indicates the superiority of our proposed algorithm over a similar, recently published, algorithm.
Xiaoqiang ZHANG
China University of Mining and Technology
Xuesong WANG
China University of Mining and Technology
Yuhu CHENG
China University of Mining and Technology
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Xiaoqiang ZHANG, Xuesong WANG, Yuhu CHENG, "Image Encryption Based on a Genetic Algorithm and a Chaotic System" in IEICE TRANSACTIONS on Communications,
vol. E98-B, no. 5, pp. 824-833, May 2015, doi: 10.1587/transcom.E98.B.824.
Abstract: To ensure the security of image transmission, this paper presents a new image encryption algorithm based on a genetic algorithm (GA) and a piecewise linear chaotic map (PWLCM), which adopts the classical diffusion-substitution architecture. The GA is used to identify and output the optimal encrypted image that has the highest entropy value, the lowest correlation coefficient among adjacent pixels and the strongest ability to resist differential attack. The PWLCM is used to scramble pixel positions and change pixel values. Experiments and analyses show that the new algorithm possesses a large key space and resists brute-force, statistical and differential attacks. Meanwhile, the comparative analysis also indicates the superiority of our proposed algorithm over a similar, recently published, algorithm.
URL: https://global.ieice.org/en_transactions/communications/10.1587/transcom.E98.B.824/_p
Copy
@ARTICLE{e98-b_5_824,
author={Xiaoqiang ZHANG, Xuesong WANG, Yuhu CHENG, },
journal={IEICE TRANSACTIONS on Communications},
title={Image Encryption Based on a Genetic Algorithm and a Chaotic System},
year={2015},
volume={E98-B},
number={5},
pages={824-833},
abstract={To ensure the security of image transmission, this paper presents a new image encryption algorithm based on a genetic algorithm (GA) and a piecewise linear chaotic map (PWLCM), which adopts the classical diffusion-substitution architecture. The GA is used to identify and output the optimal encrypted image that has the highest entropy value, the lowest correlation coefficient among adjacent pixels and the strongest ability to resist differential attack. The PWLCM is used to scramble pixel positions and change pixel values. Experiments and analyses show that the new algorithm possesses a large key space and resists brute-force, statistical and differential attacks. Meanwhile, the comparative analysis also indicates the superiority of our proposed algorithm over a similar, recently published, algorithm.},
keywords={},
doi={10.1587/transcom.E98.B.824},
ISSN={1745-1345},
month={May},}
Copy
TY - JOUR
TI - Image Encryption Based on a Genetic Algorithm and a Chaotic System
T2 - IEICE TRANSACTIONS on Communications
SP - 824
EP - 833
AU - Xiaoqiang ZHANG
AU - Xuesong WANG
AU - Yuhu CHENG
PY - 2015
DO - 10.1587/transcom.E98.B.824
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E98-B
IS - 5
JA - IEICE TRANSACTIONS on Communications
Y1 - May 2015
AB - To ensure the security of image transmission, this paper presents a new image encryption algorithm based on a genetic algorithm (GA) and a piecewise linear chaotic map (PWLCM), which adopts the classical diffusion-substitution architecture. The GA is used to identify and output the optimal encrypted image that has the highest entropy value, the lowest correlation coefficient among adjacent pixels and the strongest ability to resist differential attack. The PWLCM is used to scramble pixel positions and change pixel values. Experiments and analyses show that the new algorithm possesses a large key space and resists brute-force, statistical and differential attacks. Meanwhile, the comparative analysis also indicates the superiority of our proposed algorithm over a similar, recently published, algorithm.
ER -