Image Encryption Model based on Chaotic Henon Map and Termite Alate Optimization Algorithm

Authors

  • Naveen Kumar Department of Electronics and Communication Engineering, RIMT University, Mandi Gobindgarh, Punjab
  • Satish Saini Department of Electronics and Communication Engineering, RIMT University, Mandi Gobindgarh, Punjab

Keywords:

Chaotic Map, Encryption, Henon Map, Metaheuristic, Security, TAO

Abstract

In the present era, data communication in the form of multimedia images is increasing on the internet. To secure it, an image encryption model is designed in this paper. To accomplish this goal, multimedia images are encrypted using random keys. The random keys are generated using the chaotic Henon map algorithm.It is a two-dimensional signal. Hence, 2-D key generation is possible from it. The chaotic henon map is sensitive to input parameters, and the determination of its optimal value generates a completely random key. However, it is a complex process to search the values in the lower and upper bounds of the parameter value. To accomplish this goal, metaheuristic algorithms are used in the literature. Metaheuristics is a field of optimization. Thus, these algorithms, based on a given problem, find the optimal solution. In this paper, we have used a recent termite alate optimization algorithm based on the photoactivity of the termites that is characterized according to the requirements in the proposed model. After key generation, exclusive-OR and permutation steps are performed for final encryption. The simulation evaluation of the proposed model is based on the different gray-scale images. Further, subjective, and objective parameters are determined for it. The result shows that the proposed model achieves high entropy near 8 values, a low correlation coefficient near 0 values, and a low PSNR.

Downloads

Download data is not yet available.

References

John, S. and Kumar, S.N., 2023. IoT based medical image encryption using linear feedback shift register–Towards ensuring security for teleradiology applications. Measurement: Sensors, 25, p.100676.

X.-W. Li, I.-K. Lee, Robust copyright protection using multiple ownership watermarks, Optics Express 23 (3) (2015) 3035–3046.

L. Y. Zhang, Y. Liu, F. Pareschi, Y. Zhang, K.-W. Wong, R. Rovatti, G. Setti, On the security of a class of diffusion mechanisms for image encryption, IEEE Transactions on Cybernetics, DOI: 10.1109/TCYB.2017.2682561.

X. Wang, Q. Wang, Y. Zhang, A fast image algorithm based on rows and columns switch, Nonlinear Dynamics 79 (2) (2015) 1141–1149.

W. Liu, K. Sun, C. Zhu, A fast image encryption algorithm based on chaotic map, Optics and Lasers in Engineering 84 (2016) 26–36.

G. Ye, X. Huang, L. Y. Zhang, Z.-X. Wang, A self-cited pixel summation based image encryption algorithm, Chinese Physics B 26 (1) (2017) Article ID. 010501.

X. Li, D. Xiao, Q.-H. Wang, Error-free holographic frames encryption with ca pixel-permutation encoding algorithm, Optics and Lasers in Engineering 100 (2018) 200–207.

Z. Hua, S. Yi, Y. Zhou, Medical image encryption using high-speed scrambling and pixel adaptive diffusion, Signal Processing 144 (2018) 134–144.

FIPS PUB 46, Data encryption standard (DES) (1999).

Subashini, A. and Raju, P.K., 2023. Hybrid AES model with elliptic curve and ID based key generation for IOT in telemedicine. Measurement: Sensors, p.100824.

Y. Zhang, D. Xiao, An image encryption scheme based on rotation matrix bit-level permutation and block diffusion, Communications in Nonlinear Science and Numerical Simulation 19 (1) (2014) 74–82.

Y. Zhang, D. Xiao, Y. Shu, J. Li, A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations, Signal Processing: Image Communication 28 (3) (2013) 292–300.

C. Fu, J. Chen, H. Zou, W. Meng, Y. Zhan, Y. Yu, A chaos-based digital image encryption scheme with an improved diffusion strategy, Optics 385 Express 20 (3) (2012) 2363–2378.

G. Ye, X. Huang, Spatial image encryption algorithm based on chaotic map and pixel frequency, Science China-Information SciencesDOI: 10.1007/s11432-017-9191-x, to be published.

Y.-Q. Zhang, X.-Y. Wang, A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice, Information Sciences 273 (2014) 329–351.

Y.-Q. Zhang, X.-Y. Wang, A new image encryption algorithm based on non-adjacent coupled map lattices, Applied Soft Computing 26 (2015) 10–20.

R. Enayatifar, H. J. Sadaei, A. H. Abdullah, M. Lee, I. F. Isnin, A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata, Optics and Lasers in Engineering 71 (2015) 33–41.

J. Chen, Z.-L. Zhu, L.-B. Zhang, Y. Zhang, B.-Q. Yang, Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure 395 and efficient image encryption, Signal Processing 142 (2018) 340–353.

D. Jiang, Y. Chen, X. Gu, L. Xie, L. Chen, Efficient and universal quantum key distribution based on chaos and middleware, International Journal of Modern Physics B 31 (2) (2017) 1650264.

N. Zhou, Y. Hu, L. Gong, G. Li, Quantum image encryption scheme with iterative generalized Arnold transforms and quantum image cycle shift operations, Quantum Information Processing 16 (6) (2017) 164.

Zhou, N., Pan, S., Cheng, S. and Zhou, Z., 2016. Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing. Optics & Laser Technology, 82, pp.121-133.

Chai, X., Gan, Z., Chen, Y. and Zhang, Y., 2017. A visually secure image encryption scheme based on compressive sensing. Signal Processing, 134, pp.35-51.

Zhou, Y., Panetta, K., Agaian, S. and Chen, C.P., 2012. Image encryption using P-Fibonacci transform and decomposition. Optics Communications, 285(5), pp.594-608.

Hua, Z. and Zhou, Y., 2017. Design of image cipher using block-based scrambling and image filtering. Information sciences, 396, pp.97-113.

Zhang, B. and Liu, L., 2023. Chaos-Based Image Encryption: Review, Application, and Challenges. Mathematics, 11(11), p.2585.

Özkaynak, F., 2018. Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dynamics, 92(2), pp.305-313.

Sharma, B. and Singh, J., 2022. Chaos Based Image Encryption Techniques: A Review. International Research Journal of Engineering and Technology.

Kari, A.P., Navin, A.H., Bidgoli, A.M. and Mirnia, M., 2022. Image cryptosystem based on plain image correlation rate and selective chaotic maps. Multimedia Tools and Applications, 81(15), pp.20483-20508.

Pourjabbar Kari, A., Habibizad Navin, A., Bidgoli, A.M. and Mirnia, M., 2021. A new image encryption scheme based on hybrid chaotic maps. Multimedia Tools and Applications, 80, pp.2753-2772.

Wang, X. and Chen, S., 2023. An image encryption algorithm based on pixel bit operation and nonlinear chaotic system. The Visual Computer, 39(7), pp.3123-3144.

Kumar, N. and Jain, S., A Review of Performance Comparison on Chaos Based Image Encryption Technique.

Kanwal, S., Inam, S., Othman, M.T.B., Waqar, A., Ibrahim, M., Nawaz, F., Nawaz, Z. and Hamam, H., 2022. An effective color image encryption based on Henon map, tent chaotic map, and orthogonal matrices. Sensors, 22(12), p.4359.

Rezaei, B., Ghanbari, H. and Enayatifar, R., 2023. An image encryption approach using tuned Henon chaotic map and evolutionary algorithm. Nonlinear Dynamics, 111(10), pp.9629-9647.

Wang, J., Song, X. and El-Latif, A.A.A., 2022. Single-objective particle swarm optimization-based chaotic image encryption scheme. Electronics, 11(16), p.2628.

Kumar, A., 2022. Improved Chaotic Logistic Map Algorithm based on Bio-Inspired Algorithm for Image Encryption. Tobacco Regulatory Science (TRS), pp.1915-1928.

Majumder, A., 2023. Termite alate optimization algorithm: a swarm-based nature inspired algorithm for optimization problems. Evolutionary Intelligence, 16(3), pp.997-1017.

Kaur, G., Saini, S. and Sehgal, A., 2022. Introduction to Artificial Intelligence. In Artificial Intelligence (pp. 1-20). Chapman and Hall/CRC.

Kaur, G., Saini, S. and Sehgal, A., 2022. Machine Learning–Principles and Algorithms. In Artificial Intelligence (pp. 21-54). Chapman and Hall/CRC.

Kaur, G., Saini, S. and Sehgal, A., 2022. Applications of Machine Learning and Deep Learning. In Artificial Intelligence (pp. 55-70). Chapman and Hall/CRC.

Alghamdi, Y., Munir, A. and Ahmad, J., 2022. A lightweight image encryption algorithm based on chaotic map and random substitution. Entropy, 24(10), p.1344.

Zia, U., McCartney, M., Scotney, B., Martinez, J., AbuTair, M., Memon, J. and Sajjad, A., 2022. Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains. International Journal of Information Security, 21(4), pp.917-935.

Downloads

Published

24.03.2024

How to Cite

Kumar, N. ., & Saini, S. . (2024). Image Encryption Model based on Chaotic Henon Map and Termite Alate Optimization Algorithm. International Journal of Intelligent Systems and Applications in Engineering, 12(18s), 428–436. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4987

Issue

Section

Research Article