An efficient image system-based grey wolf optimiser method for multimedia image security using reduced entropy-based 3D chaotic map

Author(s):  
Srinivas Koppu ◽  
V. Madhu Viswanatham
2011 ◽  
Vol 216 ◽  
pp. 297-300
Author(s):  
Feng Huang ◽  
Zhong Ming Pan

Sensors are used more and more widely today. It can get valuable images through multi-sensor fusion technology. The paper designs an image security method for multi-sensor fused image. It includes keys generation, permutation, diffusion and decryption. Using six decimal numbers it can get three keys in keys generation part. The process of permutation used a new chaotic map to shuffle positions of image pixels. The process of diffusion used classic chaotic map to flat the histogram of the ciphered image. Decryption process is the reverse process of encryption process. The results prove its validity. It also show it can be used in real-time information protect for fused image.


2017 ◽  
Vol 5 (4) ◽  
pp. 458-472 ◽  
Author(s):  
Mehak Kohli ◽  
Sankalap Arora

Abstract The Grey Wolf Optimizer (GWO) algorithm is a novel meta-heuristic, inspired from the social hunting behavior of grey wolves. This paper introduces the chaos theory into the GWO algorithm with the aim of accelerating its global convergence speed. Firstly, detailed studies are carried out on thirteen standard constrained benchmark problems with ten different chaotic maps to find out the most efficient one. Then, the chaotic GWO is compared with the traditional GWO and some other popular meta-heuristics viz. Firefly Algorithm, Flower Pollination Algorithm and Particle Swarm Optimization algorithm. The performance of the CGWO algorithm is also validated using five constrained engineering design problems. The results showed that with an appropriate chaotic map, CGWO can clearly outperform standard GWO, with very good performance in comparison with other algorithms and in application to constrained optimization problems. Highlights Chaos has been introduced to the GWO to develop Chaotic GWO for global optimization. Ten chaotic maps have been investigated to tune the key parameter ‘a’, of GWO. Effectiveness of the algorithm is tested on many constrained benchmark functions. Results show CGWO's better performance over other nature-inspired optimization methods. The proposed CGWO is also used for some engineering design applications.


2012 ◽  
Vol 468-471 ◽  
pp. 2908-2911
Author(s):  
Yu Chen

Information security in Electronic commerce is a very important, and image is one of the important information. Classic image encryption algorithms include Arnold cat transformation, magic square transformation, Hilbert transformation, and the Arnold cat transformation is widely applied and has the best scrambling effect effectively. It puts forward an algorithm of image encryption based on Arnold cat and chaotic map. The experiment results show that the key quantities and scrambling effect are improved obviously, and it is rapid and security.


2019 ◽  
Vol 75 ◽  
pp. 84-105 ◽  
Author(s):  
Akash Saxena ◽  
Rajesh Kumar ◽  
Swagatam Das

Entropy ◽  
2020 ◽  
Vol 22 (3) ◽  
pp. 274 ◽  
Author(s):  
Fawad Masood ◽  
Jawad Ahmad ◽  
Syed Aziz Shah ◽  
Sajjad Shaukat Jamal ◽  
Iqtadar Hussain

Chaos-based encryption schemes have attracted many researchers around the world in the digital image security domain. Digital images can be secured using existing chaotic maps, multiple chaotic maps, and several other hybrid dynamic systems that enhance the non-linearity of digital images. The combined property of confusion and diffusion was introduced by Claude Shannon which can be employed for digital image security. In this paper, we proposed a novel system that is computationally less expensive and provided a higher level of security. The system is based on a shuffling process with fractals key along with three-dimensional Lorenz chaotic map. The shuffling process added the confusion property and the pixels of the standard image is shuffled. Three-dimensional Lorenz chaotic map is used for a diffusion process which distorted all pixels of the image. In the statistical security test, means square error (MSE) evaluated error value was greater than the average value of 10000 for all standard images. The value of peak signal to noise (PSNR) was 7.69(dB) for the test image. Moreover, the calculated correlation coefficient values for each direction of the encrypted images was less than zero with a number of pixel change rate (NPCR) higher than 99%. During the security test, the entropy values were more than 7.9 for each grey channel which is almost equal to the ideal value of 8 for an 8-bit system. Numerous security tests and low computational complexity tests validate the security, robustness, and real-time implementation of the presented scheme.


2020 ◽  
Vol 9 (3) ◽  
pp. 980-987
Author(s):  
Ajib Susanto ◽  
De Rosal Ignatius Moses Setiadi ◽  
Eko Hari Rachmawanto ◽  
Ibnu Utomo Wahyu Mulyono ◽  
Christy Atika Sari ◽  
...  

One popular image security technique is image encryption. This research proposes an image encryption technique that consists of three encryption layers, i.e. bit-shift encryption, chaos-based encryption, and stream encryption. The chaos algorithm used is Arnold's chaotic map, while the stream cipher algorithm used is RC4. Each layer has different cryptology characteristics in order to obtain safer image encryption. The characteristics of cryptology are permutation, confusion, diffusion, and substitution. The combination of the proposed encryption method aims to secure images against various attacks, especially attacks on statistics and differentials. The encryption method testing is done by various measuring instruments such as statistical analysis, i.e. entropy information, avalanche effect, and histogram, differential analysis, i.e. UACI and NPCR, visual analysis using PSNR and SSIM, and bit error ratio. Based on the results of experiments that the encryption method that we propose can work excellently based on various measurement instruments. The decryption process can also work perfectly this is evidenced by the ∞ value based on PSNR, and zero value based on SSIM and BER.


Sign in / Sign up

Export Citation Format

Share Document