The aim of this paper is image encryption using Genetic Algorithm (GA). The proposed encryption method consists of two phases. In modification phase, pixels locations are altered to reduce correlation among adjacent pixels. Then, pixels values are changed in the diffusion phase to encrypt the input image. Both phases are performed by GA with binary chromosomes. For modification phase, these binary patterns are generated by Local Binary Pattern (LBP) operator while for diffusion phase binary chromosomes are obtained by Bit Plane Slicing (BPS). Initial population in GA includes rows and columns of the input image. Instead of subjective selection of parents from this initial population, a random generator with predefined key is utilized. It is necessary to decrypt the coded image and reconstruct the initial input image. Fitness function is defined as average of transition from 0 to 1 in LBP image and histogram uniformity in modification and diffusion phases, respectively. Randomness of the encrypted image is measured by entropy, correlation coefficients and histogram analysis. Experimental results show that the proposed method is fast enough and can be used effectively for image encryption.<\/p>\r\n","references":"[1]\tShigueLian, Multimedia Content Encryption, CRC press, AUERBACH publication, 2009. \r\n[2]\tOdedGoldreich, \"Cryptography and cryptographic protocols\u201d, Distributed Computing, vol. 16, pp. 177-199, 2003.\r\n[3]\tKomal D Patel, SonalBelani, \"Image encryption using different techniques: a review\u201d, International Journal of Emerging Technology and Advanced Engineering, vol. 1, pp. 30-34, 2011.\r\n[4]\tMonish Sharma, Manoj Kumar Kowar, \"Image encryption techniques using chaotic schemes: a Review\u201d, International Journal of Engineering Science and Technology, vol. 2, pp. 2359-2363, 2010.\r\n[5]\tRasulEnayatifar, Abdul Hanan Abdullah, \"Image security via Genetic algorithm\u201d, International Conference on Computer and Software Modeling,vol. 14, pp. 221-226, 2011.\r\n[6]\tAbdul Hanan Abdullah, Malrey Lee, \"A hybrid Genetic algorithm and Chaotic function model for image encryption\u201d, International Journal of Electronics and Communication, in press.\r\n[7]\tV.Srikanth, UditAsati, Viswajit Natarajan, T.Pavan Kumar, Teja Mullapudi, N.CH.S.N.Iyengar, \"Bit-Level encryption of image using Genetic algorithm\u201d, International Journal of Computing Science and Communication Technologies, vol. 3, pp. 546-550, 2010.\r\n[8]\tIbrahim S I Abduhaiba, Maaly A S Hassan, \"Image encryption using differential evolution approach in frequency domain\u201d, Signal & Image Processing, vol. 2, pp. 51-69, 2011.\r\n[9]\tAleksey Gorodilov, Vladimir Morozenko, \"Genetic algorithm for finding the key\u2019s length and cryptanalysis of the permutation cipher\u201d, International Journal Information Theories & Applications, vol. 15, pp. 94-99, 2008.\r\n[10]\tSandeep Bhowmik, SriyankarAcharyya, \"Image cryptography: the Genetic algorithm approach\u201d, IEEE, vol. 3, pp. 223-227, 2011.\r\n[11]\tMohammed A.F. Al-Husainy, \"Image encryption using Genetic algorithm\u201d, Information Technology Journal, vol. 3, pp. 516-519. 2006.\r\n[12]\tAnil Kumar, M. K. Ghose, \"Overview of information security using Genetic algorithm and Chaos\u201d, Information Security Journal: A Global Perspective, vol. 18, pp. 306-315, 2012.\r\n[13]\tAnkita Agarwal, \"Secret encryption algorithm using Genetic algorithm\u201d, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, pp. 216-218, 2012.\r\n[14]\tDr. Mohammed Abbas Fadhil Al-Husainy, \"Genetic algorithm: tool to encrypt image\u201d, International Journal of Advanced Research in Computer Science,vol. 3, pp. 36-42,2012.\r\n[15]\tGove NitinkumarRajendra, Bedi Rajneesh Kaur, \"A new approach for data encryption using Genetic algorithm and Brain Mu Waves\u201d, International Journal of Scientific and Engineering Research, vol. 2, pp. 1-4, 2011.\r\n[16]\tK.S.Tang, K.F.Man, S.Kwong, \"Genetic algorithm and their applications\u201d, IEEE Signal Processing Magazine, pp. 22-37, 1996.\r\n[17]\tMitchell Melanie, An Introduction to Genetic Algorithm, MIT press, 1999.\r\n[18]\tMichael D. Vose, \"A linear algorithm for generating random number with a given distribution\u201d, IEEE Transaction on Software Engineering, vol. 17, pp. 972-975, 1991.\r\n[19]\tTimoAhonen, AbdenourHadid, MattiPietikainen, \"Face recognition with Local Binary Pattern\u201d, Springer, pp. 469-481, 2004.\r\n","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 90, 2014"}