Skip to main content

Advertisement

Log in

An evolutionary image encryption system with chaos theory and DNA encoding

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This article proposes a novel evolutionary image encryption approach based on an elitist genetic algorithm, a modified logistic map, and DNA encoding. The initial population comprises the DNA masks which are formed using the DNA sequences and modified logistic map. The elitist genetic algorithm determines the optimal mask depending on the value of the information entropy which is used as the objective function. The simple elitist genetic algorithm is used to get the optimal DNA mask to keep the process simple and reduce the computational burden. The proposed approach can significantly improve the performance of the encryption process by determining the optimal mask which is suitable for a certain image. The experimental outcomes and their analysis establish that the proposed approach produces excellent results and is resilient against different types of attacks. A detailed and comprehensive analysis of the overall system will certainly help adapt the proposed approach to make real-life image communications secure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Data availability

All data generated or analysed during this study are included in this published article.

References

  1. Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU - Int J Electron Commun 66:806–816. https://doi.org/10.1016/j.aeue.2012.01.015

    Article  Google Scholar 

  2. Akkasaligar PT, Biradar S (2020) Selective medical image encryption using DNA cryptography. Inf Secur J 29:91–101

    Google Scholar 

  3. Boyd D, Crawford K (2012) Critical questions for big data: provocations for a cultural, technological, and scholarly phenomenon. Inf Commun Soc 15:662–679. https://doi.org/10.1080/1369118X.2012.678878

    Article  Google Scholar 

  4. Chakraborty S (2020) An advanced approach to detect edges of digital images for image segmentation. In: Chakraborty S, Mali K (eds) Applications of advanced machine intelligence in computer vision and object recognition: emerging research and opportunities. IGI GLobal

  5. Chakraborty S, Bhowmik S (2013) Job shop scheduling using simulated annealing. In: First International Conference on Computation and Communication Advancement. McGrawHill Publication, pp. 69–73

  6. Chakraborty S, Bhowmik S (2015) Blending roulette wheel selection with simulated annealing for job shop scheduling problem. In: Michael Faraday IET International Summit 2015. Institution of Engineering and Technology, pp 100 (7 .)-100 (7 .)

  7. Chakraborty S, Mali K (2022) SUFEMO: a superpixel based fuzzy image segmentation method for COVID-19 radiological image elucidation. Appl soft Comput 109625. https://doi.org/10.1016/J.ASOC.2022.109625

  8. Chakraborty S, Mali K (2022) Fuzzy modified cuckoo search for biomedical image segmentation. Knowl Inf Syst 2022:1–40. https://doi.org/10.1007/S10115-022-01659-8

    Article  Google Scholar 

  9. Chakraborty S, Seal A, Roy M (2015) An elitist model for obtaining alignment of multiple sequences using genetic algorithm. In: 2nd National Conference NCETAS 2015. International Journal of Innovative Research in Science, Engineering and Technology, pp. 61–67

  10. Chakraborty S, Seal A, Roy M, Mali K (2016) A novel lossless image encryption method using DNA substitution and chaotic logistic map. Int J Secur its Appl 10:205–216. https://doi.org/10.14257/ijsia.2016.10.2.19

  11. Chakraborty S, Seal A, Roy M, Mali K (2016) A novel lossless image encryption method using DNA substitution and chaotic logistic map. Int J Secur its Appl 10. https://doi.org/10.14257/ijsia.2016.10.2.19

  12. Chakraborty S, Chatterjee S, Dey N, et al (2017) Modified cuckoo search algorithm in microscopic image segmentation of hippocampus Microsc Res Tech 80. https://doi.org/10.1002/jemt.22900

  13. Chakraborty S, Chatterjee S, Ashour AS et al (2020) Intelligent computing in medical imaging: a study. In: research anthology on multi-industry uses of genetic programming and algorithms. IGI Global, p 17

    Google Scholar 

  14. Chakraborty S, Roy M, Chatterjee S, Mali K, Banerjee S (2022) Detection of HIV-1 progression phases from transcriptional profiles in ex vivo CD4+ and CD8+ T cells using meta-heuristic supported artificial neural network. Multimed tools Appl 2022 8111 81:15103–15126. https://doi.org/10.1007/S11042-022-12534-7

  15. CVG - UGR - Image database (n.d.) http://decsai.ugr.es/cvg/dbimagenes/g512.php. Accessed 15 Aug 2019

  16. Dagadu JC, Li J, Aboagye EO, Deynu FK (2019) Medical image encryption scheme based on multiple Chaos and DNA coding. Int J Netw Secur 21:83–90. https://doi.org/10.6633/IJNS.201901

    Article  Google Scholar 

  17. Dai C, Luan H, Yu Q et al (2020) Change-encryption: encryption using spatiotemporal information as a function model. In: 2020 7th IEEE international conference on cyber security and cloud computing (CSCloud)/2020 6th IEEE international conference on edge computing and scalable cloud (EdgeCom). IEEE, pp 281–287

  18. De S, Bhaumik J, Giri D (2021) A secure image encryption scheme based on three different chaotic maps. Multimed tools Appl 2021 814 81:5485–5514. 81:5485–5514. https://doi.org/10.1007/S11042-021-11696-0

  19. Duan CF, Zhou J, Gong LH, Wu JY, Zhou NR (2022) New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method. Opt Lasers Eng 150:106881. https://doi.org/10.1016/J.OPTLASENG.2021.106881

    Article  Google Scholar 

  20. Eisham ZK, Haque MM, Rahman MS, Nishat MM, Faisal F, Islam MR (2022) Chimp optimization algorithm in multilevel image thresholding and image clustering. Evol Syst 2022:1–44. https://doi.org/10.1007/S12530-022-09443-3

    Article  Google Scholar 

  21. ElKamchouchi DH, Mohamed HG, Moussa KH (2020) A bijective image encryption system based on hybrid chaotic map diffusion and DNA confusion. Entropy 22:180. https://doi.org/10.3390/e22020180

    Article  MathSciNet  Google Scholar 

  22. Enayatifar R, Abdullah AH, Lee M (2013) A weighted discrete imperialist competitive algorithm (WDICA) combined with chaotic map for image encryption. Opt Lasers Eng 51:1066–1077. https://doi.org/10.1016/j.optlaseng.2013.03.010

    Article  Google Scholar 

  23. Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93. https://doi.org/10.1016/j.optlaseng.2013.12.003

    Article  Google Scholar 

  24. Farah MAB, Guesmi R, Kachouri A, Samet M (2020) A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt Laser Technol 121:105777. https://doi.org/10.1016/j.optlastec.2019.105777

    Article  MATH  Google Scholar 

  25. Feistel H (1973) Cryptography and computer privacy. Sci Am 228:15–23. https://doi.org/10.1038/SCIENTIFICAMERICAN0573-15

    Article  Google Scholar 

  26. Grangetto M, Magli E, Olmo G (2006) Multimedia selective encryption by means of randomized arithmetic coding. IEEE Trans Multimed 8:905–917. https://doi.org/10.1109/TMM.2006.879919

  27. Hammad BT, Sagheer AM, Ahmed IT, Jamil N (2020) A comparative review on symmetric and asymmetric DNA-based cryptography. Bull Electr Eng informatics 9:2484–2491. https://doi.org/10.11591/eei.v9i6.2470

  28. Han C (2019) An image encryption algorithm based on modified logistic chaotic map. Optik (Stuttg) 181:779–785. https://doi.org/10.1016/j.ijleo.2018.12.178

    Article  Google Scholar 

  29. Hore S, Chakraborty S, Chatterjee S et al (2016) An integrated interactive technique for image segmentation using stack based seeded region growing and thresholding. Int J Electr Comput Eng 6:2773–2780. https://doi.org/10.11591/ijece.v6i6.11801

  30. Hua Z, Zhou Y, Pun C-M, Chen CLP (2015) 2D sine logistic modulation map for image encryption. Inf Sci (Ny) 297:80–94. https://doi.org/10.1016/J.INS.2014.11.018

    Article  Google Scholar 

  31. Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci (Ny) 480:403–419. https://doi.org/10.1016/J.INS.2018.12.048

    Article  Google Scholar 

  32. Indrasena Reddy M, Siva Kumar AP, Subba Reddy K (2020) A secured cryptographic system based on DNA and a hybrid key generation approach. BioSystems 197:104207. https://doi.org/10.1016/j.biosystems.2020.104207

    Article  Google Scholar 

  33. Jithin KC, Sankar S (2020) Colour image encryption algorithm combining, Arnold map, DNA sequence operation, and a Mandelbrot set. J Inf Secur Appl 50:102428. https://doi.org/10.1016/j.jisa.2019.102428

    Article  Google Scholar 

  34. Kumar M, Saxena A, Vuppala SS (2020) A survey on chaos based image encryption techniques. In: Studies in Computational Intelligence. Springer, pp. 1–26

  35. Kumar M, Saxena A, Vuppala SS (2020) A survey on chaos based image encryption techniques. In: Studies in Computational Intelligence. Springer, pp. 1–26

  36. Li S, Chen G, Cheung A, Bhargava B, Lo KT (2007) On the design of perceptual MPEG-video encryption algorithms. IEEE Trans Circuits Syst Video Technol 17:214–223. https://doi.org/10.1109/TCSVT.2006.888840

    Article  Google Scholar 

  37. Li S, Chen G, Zheng X (2019) Chaos-based encryption for digital images and videos. In: Multimedia Security Handbook. CRC Press, pp. 133–167

  38. Liu L, Wei ZX, Xiang H (2022) A novel image encryption algorithm based on compound-coupled logistic chaotic map. Multimed tools Appl 81:19999–20019. https://doi.org/10.1007/S11042-022-12765-8

    Article  Google Scholar 

  39. Liu X, Tong X, Wang Z, Zhang M (2022) A novel hyperchaotic encryption algorithm for color image utilizing DNA dynamic encoding and self-adapting permutation. Multimed tools Appl 81:21779–21810. https://doi.org/10.1007/S11042-022-12472-4

    Article  Google Scholar 

  40. Mali K, Chakraborty S, Seal A, Roy M (2015) An efficient image cryptographic algorithm based on frequency domain using Haar wavelet transform. Int J Secur its Appl 9:279–288. https://doi.org/10.14257/ijsia.2015.9.12.26

  41. Mali K, Chakraborty S, Roy M (2015) A study on statistical analysis and security evaluation parameters in image encryption. IJSRD-International J Sci Res Dev 3:2321–0613

    Google Scholar 

  42. Mohamed HG, ElKamchouchi DH, Moussa KH (2020) A novel color image encryption algorithm based on Hyperchaotic maps and mitochondrial DNA sequences. Entropy 22:158. https://doi.org/10.3390/e22020158

    Article  MathSciNet  Google Scholar 

  43. Ouyang X, Luo Y, Liu J et al (2020) A color image encryption method based on memristive hyperchaotic system and DNA encryption Int J Mod Phys B 34. https://doi.org/10.1142/S0217979220500149

  44. Patro KAK, Acharya B, Nath V (2020) Secure, lossless, and noise-resistive image encryption using Chaos, hyper-chaos, and DNA sequence operation. IETE Tech Rev (Institution Electron Telecommun Eng India) 37:223–245. https://doi.org/10.1080/02564602.2019.1595751

    Article  Google Scholar 

  45. Ratheesh Kumar R, Mathew J (2020) Image encryption:traditional methods vs alternative methods. In: proceedings of the 4th international conference on computing methodologies and communication, ICCMC 2020. Institute of Electrical and Electronics Engineers Inc

  46. Rodríguez-Esparza E, Zanella-Calzada LA, Oliva D, Heidari AA, Zaldivar D, Pérez-Cisneros M, Foong LK (2020) An efficient Harris hawks-inspired image segmentation method. Expert Syst Appl 155:113428. https://doi.org/10.1016/J.ESWA.2020.113428

    Article  Google Scholar 

  47. Roy M, Chakraborty S, Mali K et al (2019) A dual layer image encryption using polymerase chain reaction amplification and dna encryption. In: 2019 International conference on Opto-electronics and applied optics, Optronix 2019. Institute of Electrical and Electronics Engineers Inc

  48. Roy M, Mali K, Chatterjee S et al (2019) A study on the applications of the biomedical image encryption methods for secured computer aided diagnostics. In: 2019 Amity International conference on artificial intelligence (AICAI). IEEE, pp 881–886

  49. Roy M, Chakraborty S, Mali K et al (2020) Biomedical image security using matrix manipulation and DNA encryption

  50. Roy M, Chakraborty S, Mali K et al (2020) Biomedical image security using matrix manipulation and DNA encryption. In: Advances in Intelligent Systems and Computing. Springer, pp. 49–60

  51. Roy M, Chakraborty S, Mali K et al (2020) Data security techniques based on DNA encryption. In: Advances in Intelligent Systems and Computing. Springer, pp. 239–249

  52. Roy M, Chakraborty S, Mali K (2020) A robust image encryption method using chaotic skew-tent map. In: Chakraborty S, Mali K (eds) Applications of Advanced Machine Intelligence in Computer Vision and Object Recognition: Emerging Research and Opportunities

  53. Roy M, Chakraborty S, Mali K et al (2020) Data security techniques based on DNA encryption

  54. Roy S, Shrivastava M, Pandey CV, Nayak SK, Rawat U (2020) IEVCA: an efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata. Multimed tools Appl 2020 8021 80:31529–31567. 80:31529–31567. https://doi.org/10.1007/S11042-020-09880-9

  55. Roy M, Chakraborty S, Mali K, Roy D (2021) Utilization of Hyperchaotic environment and DNA sequences for digital image security. Springer, Singapore, pp 289–297

    Google Scholar 

  56. Roy M, Chakraborty S, Mali K et al (2021) An image security method based on low dimensional chaotic environment and DNA encoding. Springer, Singapore, pp 267–277

    Google Scholar 

  57. Roy M, Chakraborty S, Mali K (2021) A chaotic framework and its application in image encryption. Multimed tools Appl 1–42. https://doi.org/10.1007/s11042-021-10839-7

  58. Roy M, Chakraborty S, Mali K, Roy D, Chatterjee S (2021) A robust image encryption framework based on DNA computing and chaotic environment. Microsyst Technol 1–11. https://doi.org/10.1007/s00542-020-05120-0, 27, 3617, 3627

  59. Roy M, Chakraborty S, Mali K (2021) The MSK: a simple and robust image encryption method. Multimed tools Appl 1–31. https://doi.org/10.1007/s11042-021-10761-y

  60. Seal A, Chakraborty S, Mali K (2017) A new and resilient image encryption technique based on pixel manipulation, value transformation and visual transformation utilizing single–level haar wavelet transform

  61. Singh L, Singh AK, Singh PK (2020) Secure data hiding techniques: a survey. Multimed Tools Appl 79:15901–15921. https://doi.org/10.1007/s11042-018-6407-5

    Article  Google Scholar 

  62. Suri S, Vijay R (2020) A coupled map lattice-based image encryption approach using DNA and bi-objective genetic algorithm. Int J Inf Comput Secur 12:199–216. https://doi.org/10.1504/IJICS.2020.105156

    Article  Google Scholar 

  63. Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput J 11:514–522. https://doi.org/10.1016/j.asoc.2009.12.011

    Article  Google Scholar 

  64. Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18. https://doi.org/10.1016/J.OPTLASENG.2014.08.005

    Article  Google Scholar 

  65. Wang X, Wang Y, Zhu X, Luo C (2020) A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level. Opt Lasers Eng 125:105851. https://doi.org/10.1016/j.optlaseng.2019.105851

    Article  Google Scholar 

  66. Wei X, Guo L, Zhang Q et al (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. In: Journal of Systems and Software. Elsevier, pp. 290–299

  67. Wu Y, Zhou Y, Noonan JP, Agaian S (2014) Design of image cipher using latin squares. Inf Sci (Ny) 264:317–339. https://doi.org/10.1016/J.INS.2013.11.027

    Article  MathSciNet  MATH  Google Scholar 

  68. Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inf Sci (Ny) 349–350:137–153. https://doi.org/10.1016/J.INS.2016.02.041

    Article  Google Scholar 

  69. Wu J, Shi J, Li T (2019) A novel image encryption approach based on a Hyperchaotic system, pixel-level filtering with variable kernels, and DNA-level diffusion. Entropy 22:5. https://doi.org/10.3390/e22010005

    Article  MathSciNet  Google Scholar 

  70. Xian Y, Wang X (2021) Fractal sorting matrix and its application on chaotic image encryption. Inf Sci (Ny) 547:1154–1169. https://doi.org/10.1016/j.ins.2020.09.055

    Article  MathSciNet  MATH  Google Scholar 

  71. Xian Y, Wang X, Zhang Y, Yan X, Leng Z (2022) A novel chaotic image encryption with FSV based global bit-level chaotic permutation. Multimed Tools Appl 2022:1–20. https://doi.org/10.1007/S11042-022-13280-6

    Article  Google Scholar 

  72. Xu M, Tian Z (2019) A novel image cipher based on 3D bit matrix and latin cubes. Inf Sci (Ny) 478:1–14. https://doi.org/10.1016/J.INS.2018.11.010

    Article  Google Scholar 

  73. Yaghouti Niyat A, Moattar MH (2020) Color image encryption based on hybrid chaotic system and DNA sequences. Multimed Tools Appl 79:1497–1518. https://doi.org/10.1007/s11042-019-08247-z

    Article  Google Scholar 

  74. Yu SS, Zhou NR, Gong LH, Nie Z (2020) Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system. Opt Lasers Eng 124:105816. https://doi.org/10.1016/J.OPTLASENG.2019.105816

    Article  Google Scholar 

  75. Zahmoul R, Ejbali R, Zaied M (2017) Image encryption based on new Beta chaotic maps. Opt Lasers Eng 96:39–49. https://doi.org/10.1016/J.OPTLASENG.2017.04.009

    Article  Google Scholar 

  76. Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic S-box. Inf Sci (Ny) 450:361–377. https://doi.org/10.1016/J.INS.2018.03.055

    Article  MathSciNet  MATH  Google Scholar 

  77. Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284:2775–2780. https://doi.org/10.1016/j.optcom.2011.02.039

    Article  Google Scholar 

  78. Zhang W, Yu H, Zhao Y, Zhu Z (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36–50. https://doi.org/10.1016/J.SIGPRO.2015.06.008

    Article  Google Scholar 

  79. Zheng J, Liu L (2020) Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map. IET Image Process 14:2310–2320. https://doi.org/10.1049/iet-ipr.2019.1340

    Article  Google Scholar 

  80. Zhou Y, Panetta K, Agaian S, Chen CLP (2013) (n, k, p)-gray code for image systems. IEEE Trans Cybern 43:515–529. https://doi.org/10.1109/TSMCB.2012.2210706

    Article  Google Scholar 

  81. Zhou Y, Cao W, Philip Chen CL (2014) Image encryption using binary bitplane. Signal Process 100:197–207. https://doi.org/10.1016/J.SIGPRO.2014.01.020

    Article  Google Scholar 

  82. Zhu Z, Zhang W, Wong K, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci (Ny) 181:1171–1186. https://doi.org/10.1016/J.INS.2010.11.009

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to express their gratitude and thank the anonymous reviewers and referees for their precious comments and suggestions which are helpful in further improvement of the research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shouvik Chakraborty.

Ethics declarations

Competing interests

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Roy, M., Chakraborty, S. & Mali, K. An evolutionary image encryption system with chaos theory and DNA encoding. Multimed Tools Appl 82, 33607–33635 (2023). https://doi.org/10.1007/s11042-023-14948-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14948-3

Keywords

Navigation