Abstract

One of the important application of image encryption is storing confidential and important images on a local device or a database in such a way that only the authorized party can view or perceive it. The current image encryption technique employs the genetic algorithm to increase confusion in the image, but compromises in time and space complexity. The other method employs chaos or pseudo random number generating systems which have fast and highly sensitive keys but fails to make the image sufficiently noisy and is risky due to its deterministic nature. We propose a technique which employs the non-deterministic, optimizing power of genetic algorithm and the space efficiency and key sensitivity of chaotic systems into a unified, efficient algorithm which will retain the merits of both the methods whereas tries to minimize their demerits in a software system. The encryption process proceeds in two steps, generating two keys. First, an encryption sequence is generated using Lorenz Chaotic system of differential equation. The seed values used are the user’s actual key having key sensitivity of 10-14. Second, the encrypted image’s genetic encryption sequence is generated which will result in an encrypted image with entropy value greater than 7.999 thus ensuring the image is very noisy. Proposed technique uses variations of Lorenz system seed sets to generate all random mutations and candidate solutions in Genetic encryption. Since only the seed sets leading to desired solution is stored, space efficiency is higher compared to storing the entire sequences. Using this image encryption technique we will ensure that the images are hidden securely under two layers of security, one chaotic and other non-deterministic.

Highlights

  • Nowadays, the concern of information security is gaining immense importance, the security of confidential information and data in the field of Computer Science is crucial

  • If we change the value of dt during the decryption process by adding 10−14 and try to decrypt the image: the proposed system has demonstrated the high sensitivity of the user key and decryption process to the initial parameters

  • Technique first utilizes Lorenz chaotic system of differential equation to generate a random sequence of integers ranging from 0 to 255 which are highly dependent on the initial values, time step and control parameters which form a key that generates sequence Kc to achieve the first level of encryption and a noisy image

Read more

Summary

Introduction

The concern of information security is gaining immense importance, the security of confidential information and data in the field of Computer Science is crucial. In the 21th century, images have become an integral part of digital information maintaining the integrity, access control and confidentiality of image data from unauthorized users are essential. Cryptography is a vital tool for guarding such information in computer systems. It refers to secure information and communication techniques that descended from mathematical concepts along with a set of algorithms to reconstruct messages in ways that are hard to decipher. Image encryption plays a crucial role in the field of information security and makes the information in the image unreadable. A lot of research has been made into refining algorithms

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call