Image Encryption Method based on Chaotic Logistic Map and JAYA Algorithm
Author(s) - Jaspreet Kaur, Puneet Jain, Sarabjeet Kaur, Ajay Kumar
Original Article | Open Access
The Chaotic logistic map is the most preferred algorithm for image security. The security of it depends on its parameter values. In the literature, metaheuristic algorithm such as grasshopper optimization algorithm is successfully applied for determined optimal parameter values. However, this algorithm required a number of parameters which increases algorithm complexity. To overcome this limitation, we have used the JAYA algorithm for determining the optimal parameter value of the chaotic logistic map algorithm. JAYA algorithm is not required parameter tuning over other algorithms. Thus, we have selected for the proposed method. Entropy is taken as objective function in the JAYA algorithm. After determining the optimal parameter value, the image is encrypted using chaotic logistic map algorithm. The simulation results are performed in MATLAB for standard dataset images. Further, subjective and objective analysis is done. The result shows the proposed method provides better encryption and superior results over existing methods.
1Research Scholar, Electronics and Communication Engineering Dept., Adesh Institute of Engineering & Technology, Faridkot, Punjab, India. jaspreetkaur161192@gmail.com
2Assistant Professor, Electrical Engineering Dept., Adesh Institute of Engineering & Technology, Faridkot, Punjab, India. puneetjain988@gmail.com
3Assistant Professor, Computer Science Engineering Dept., Adesh Institute of Engineering & Technology, Faridkot, Punjab, India. sarb7316@gmail.com
4Research Scholar, Electronics and Communication Engineering Dept., Thapar Institute of Engineering & Technology, Patiala, Punjab, India. er.ajay.thapar@gmail.com https://orcid.org/0000-0002-6061-1626
Chaotic Logistic Map Algorithm, Digital Communication, Image Security, JAYA Algorithm
[1] Kaur, M., Singh, S. and Kaur, M., 2021. Computational image encryption techniques: a comprehensive review. Mathematical Problems in Engineering, 2021.
[2] Xie, Y., Yu, J., Guo, S., Ding, Q. and Wang, E., 2019. Image encryption scheme with compressed sensing based on new three-dimensional chaotic system. Entropy, 21(9), p.819.
[3] Kaur, M. and Kumar, V., 2020. A comprehensive review on image encryption techniques. Archives of Computational Methods in Engineering, 27(1), pp.15-43.
[4] Belazi, A., Abd El-Latif, A.A. and Belghith, S., 2016. A novel image encryption scheme based on substitution-permutation network and chaos. Signal Processing, 128, pp.155-170.
[5] Kaur, M. and Kumar, V., 2018. Adaptive differential evolution-based lorenz chaotic system for image encryption. Arabian Journal for Science and Engineering, 43(12), pp.8127-8144.
[6] Kaur, M. and Kumar, V., 2018. Beta chaotic map based image encryption using genetic algorithm. International Journal of Bifurcation and Chaos, 28(11), p.1850132.
[7] Kaur, M., Singh, D., Sun, K. and Rawat, U., 2020. Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map. Future Generation Computer Systems, 107, pp.333-350.
[8] Wang, X. and Luan, D., 2013. A novel image encryption algorithm using chaos and reversible cellular automata. Communications in Nonlinear Science and Numerical Simulation, 18(11), pp.3075-3085.
[9] Ghazvini, M., Mirzadi, M. and Parvar, N., 2020. A modified method for image encryption based on chaotic map and genetic algorithm. Multimedia Tools and Applications, 79(37), pp.26927-26950.
[10] Luo, Y., Ouyang, X., Liu, J., Cao, L. and Zou, Y., 2022. An image encryption scheme based on particle swarm optimization algorithm and hyperchaotic system. Soft Computing, 26(11), pp.5409-5435.
[11] Khaitan, S., Sagar, S. and Agarwal, R., 2022. Chaos cryptosystem with optimal key selection for image encryption. Multimedia Tools and Applications, pp.1-16.
[12] Zhou, Y., Wang, E., Song, X. and Shi, M., 2022. Image Encryption Algorithm Based on Artificial Bee Colony Algorithm and Chaotic System. Security and Communication Networks, 2022.
[13] Khalaf, K.S., Sharif, M.A. and Wahhab, M.S., 2022. Digital communication based on image security using grasshopper optimization and chaotic map.
[14] Liu, W., Sun, K. and Zhu, C., 2016. A fast image encryption algorithm based on chaotic map. Optics and Lasers in Engineering, 84, pp.26-36.
[15] Hua, Z. and Zhou, Y., 2016. Image encryption using 2D Logistic-adjusted-Sine map. Information Sciences, 339, pp.237-253.
[16] Pareek, N.K., Patidar, V. and Sud, K.K., 2006. Image encryption using chaotic logistic map. Image and vision computing, 24(9), pp.926-934.
[17] Hassan, M.A.S. and Abuhaiba, I.S.I., 2011. Image encryption using differential evolution approach in frequency domain. arXiv preprint arXiv:1103.5783.
[18] Rao, R., 2016. Jaya: A simple and new optimization algorithm for solving constrained and unconstrained optimization problems. International Journal of Industrial Engineering Computations, 7(1), pp.19-34.
[19] Wadood, A., Farkoush, S.G., Khurshaid, T., Yu, J.T., Kim, C.H. and Rhee, S.B., 2019. Application of the jaya algorithm in solving the problem of the optimal coordination of overcurrent relays in single-and multi-loop distribution systems. Complexity, 2019.
[20] Wang, X. and Li, Y., 2021. Chaotic image encryption algorithm based on hybrid multi-objective particle swarm optimization and DNA sequence. Optics and Lasers in Engineering, 137, p.106393.
Jaspreet Kaur, Puneet Jain, Sarabjeet Kaur, Ajay Kumar. (2022). Image Encryption Method based on Chaotic Logistic Map and JAYA Algorithm. International Research Journal of Electrical & Electronics Engineering (IRJEEE), Vol.1 Issue 1, pp 21-29. https://doi.org/10.55083/cct.irjeee.2022.v01i01007