TY - JOUR
T1 - Evolutionary-based image encryption using RNA codons truth table
AU - Mahmud, Maqsood
AU - Atta-ur-Rahman, Kiran
AU - Lee, Malrey
AU - Choi, Jae-Young
PY - 2019/9/16
Y1 - 2019/9/16
N2 - Symmetric image cryptography is a mechanism in which image pixels are encrypted into some meaningless format called cipher image. Only authorized users have access to the secret code for symmetric key encryption. In this paper a new symmetric image encryption method has been proposed using the concepts of ribonucleic acid (RNA) sequence and genetic algorithm (GA), called RNA-GA. The proposed method starts by generating specified number of initial cipher images using logistic map function. Then, the initial cipher images are converted to the corresponding one-dimensional binary sequences and relevant codons array using codons truth table. The codons array are then updated using encryption key and encryption RNA tables to form the initial population of genetic algorithm. Next, genetic algorithm optimizes the population using selection, crossover, and mutation operators. The results approve high resistance of the proposed method against well-known attacks and entropy of 7.9987 regarding standard image of size 256 X 256
after 30 repetitions.
AB - Symmetric image cryptography is a mechanism in which image pixels are encrypted into some meaningless format called cipher image. Only authorized users have access to the secret code for symmetric key encryption. In this paper a new symmetric image encryption method has been proposed using the concepts of ribonucleic acid (RNA) sequence and genetic algorithm (GA), called RNA-GA. The proposed method starts by generating specified number of initial cipher images using logistic map function. Then, the initial cipher images are converted to the corresponding one-dimensional binary sequences and relevant codons array using codons truth table. The codons array are then updated using encryption key and encryption RNA tables to form the initial population of genetic algorithm. Next, genetic algorithm optimizes the population using selection, crossover, and mutation operators. The results approve high resistance of the proposed method against well-known attacks and entropy of 7.9987 regarding standard image of size 256 X 256
after 30 repetitions.
UR - http://dx.doi.org/10.1016/j.optlastec.2019.105818
U2 - 10.1016/j.optlastec.2019.105818
DO - 10.1016/j.optlastec.2019.105818
M3 - Article
SN - 0030-3992
JO - Optics and Laser Technology
JF - Optics and Laser Technology
ER -