Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30663
Gray Level Image Encryption

Authors: Roza Afarin, Saeed Mozaffari


The aim of this paper is image encryption using Genetic Algorithm (GA). The proposed encryption method consists of two phases. In modification phase, pixels locations are altered to reduce correlation among adjacent pixels. Then, pixels values are changed in the diffusion phase to encrypt the input image. Both phases are performed by GA with binary chromosomes. For modification phase, these binary patterns are generated by Local Binary Pattern (LBP) operator while for diffusion phase binary chromosomes are obtained by Bit Plane Slicing (BPS). Initial population in GA includes rows and columns of the input image. Instead of subjective selection of parents from this initial population, a random generator with predefined key is utilized. It is necessary to decrypt the coded image and reconstruct the initial input image. Fitness function is defined as average of transition from 0 to 1 in LBP image and histogram uniformity in modification and diffusion phases, respectively. Randomness of the encrypted image is measured by entropy, correlation coefficients and histogram analysis. Experimental results show that the proposed method is fast enough and can be used effectively for image encryption.

Keywords: Genetic Algorithm, Image Encryption, correlation coefficients, image entropy

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1896


[1] ShigueLian, Multimedia Content Encryption, CRC press, AUERBACH publication, 2009.
[2] OdedGoldreich, "Cryptography and cryptographic protocols”, Distributed Computing, vol. 16, pp. 177-199, 2003.
[3] Komal D Patel, SonalBelani, "Image encryption using different techniques: a review”, International Journal of Emerging Technology and Advanced Engineering, vol. 1, pp. 30-34, 2011.
[4] Monish Sharma, Manoj Kumar Kowar, "Image encryption techniques using chaotic schemes: a Review”, International Journal of Engineering Science and Technology, vol. 2, pp. 2359-2363, 2010.
[5] RasulEnayatifar, Abdul Hanan Abdullah, "Image security via Genetic algorithm”, International Conference on Computer and Software Modeling,vol. 14, pp. 221-226, 2011.
[6] Abdul Hanan Abdullah, Malrey Lee, "A hybrid Genetic algorithm and Chaotic function model for image encryption”, International Journal of Electronics and Communication, in press.
[7] V.Srikanth, UditAsati, Viswajit Natarajan, T.Pavan Kumar, Teja Mullapudi, N.CH.S.N.Iyengar, "Bit-Level encryption of image using Genetic algorithm”, International Journal of Computing Science and Communication Technologies, vol. 3, pp. 546-550, 2010.
[8] Ibrahim S I Abduhaiba, Maaly A S Hassan, "Image encryption using differential evolution approach in frequency domain”, Signal & Image Processing, vol. 2, pp. 51-69, 2011.
[9] Aleksey Gorodilov, Vladimir Morozenko, "Genetic algorithm for finding the key’s length and cryptanalysis of the permutation cipher”, International Journal Information Theories & Applications, vol. 15, pp. 94-99, 2008.
[10] Sandeep Bhowmik, SriyankarAcharyya, "Image cryptography: the Genetic algorithm approach”, IEEE, vol. 3, pp. 223-227, 2011.
[11] Mohammed A.F. Al-Husainy, "Image encryption using Genetic algorithm”, Information Technology Journal, vol. 3, pp. 516-519. 2006.
[12] Anil Kumar, M. K. Ghose, "Overview of information security using Genetic algorithm and Chaos”, Information Security Journal: A Global Perspective, vol. 18, pp. 306-315, 2012.
[13] Ankita Agarwal, "Secret encryption algorithm using Genetic algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, pp. 216-218, 2012.
[14] Dr. Mohammed Abbas Fadhil Al-Husainy, "Genetic algorithm: tool to encrypt image”, International Journal of Advanced Research in Computer Science,vol. 3, pp. 36-42,2012.
[15] Gove NitinkumarRajendra, Bedi Rajneesh Kaur, "A new approach for data encryption using Genetic algorithm and Brain Mu Waves”, International Journal of Scientific and Engineering Research, vol. 2, pp. 1-4, 2011.
[16] K.S.Tang, K.F.Man, S.Kwong, "Genetic algorithm and their applications”, IEEE Signal Processing Magazine, pp. 22-37, 1996.
[17] Mitchell Melanie, An Introduction to Genetic Algorithm, MIT press, 1999.
[18] Michael D. Vose, "A linear algorithm for generating random number with a given distribution”, IEEE Transaction on Software Engineering, vol. 17, pp. 972-975, 1991.
[19] TimoAhonen, AbdenourHadid, MattiPietikainen, "Face recognition with Local Binary Pattern”, Springer, pp. 469-481, 2004.