Professional Documents
Culture Documents
ABSTRACT
In the Digital world, information security becomes a main concern. Encryption algorithms have emerged as
practical tools for ownership authentication and copyright protection. Digital images play a vital role in our daily
lives as a big source of information and a lots of algorithms have been proposed for digital image encryption.
Among them, Genetic algorithm (GA) has been used often in conjunction with well-established cryptography
strategies or in a stand-alone fashion. There are many different image encryption methods, in this paper we will
introduce the method that is called Genetic Algorithms (GA) are used to produce a new encryption method
(Crossover and Mutation). Excellent results show that the proposed method can be used effectively for image
encryption
Keywords: genetic algorithm; Crossover; Mutation; Symmetric Key.
1. INTRODUCTION
Encryption is a common technique to uphold image security. Image and video encryption have applications in various
fields including internet communication, multimedia systems, medical imaging, Tele-medicine and military
communication .Zeghid, Machhout et al. (2007)
The encryption function is the mechanism used to provide a confidentiality service. This function enables the
modification of a string of bytes in order to make it incomprehensible to anyone who is not authorized to know its
content. Encryption is done using two types of algorithm: symmetrical or secret‐key algorithms and asymmetrical or
public key algorithms. Perez (2014)
Also we use the term "Cryptography”, The word cryptography is derived from the Greek words kryptos, meaning
“hidden,” and grafein, meaning “to write.” Throughout history, cryptography has been used to hide messages inside
traditional means of communication that might otherwise be intercepted. Doing so is accomplished by concealing the
contents of the message from all except who has the key to unlock it. In modern times, cryptographic techniques are
used to protect e-mail messages, information transmitted over the internet, credit card information, and data on
corporate networks. Edge and O’Donnell (2016).
3. GENETIC ALGORITHM
GA, proposed first by John Holland at 1975, is one of the most famous evolutionary algorithms which is inspired from
human evolution process. Genetic algorithm (GA) has been used frequently to solve different optimization
problems.
Genetic algorithm is population based algorithm which starts with an initial population of individual usually randomly
generated. These individuals are selected for reproduction based on probability proportional to its fitness. In other
words, the fitter the chromosome, the more times it is likely to be selected to reproduce. Then, mutation and crossover
operations are applied to the individuals to produce offspring .Afarin and Mozaffari (2013).
The rates of mutation and crossover rely on the application. Crossover operator randomly chooses a locus, specific
position in the chromosome, and exchanges the subsequences before and after that locus between two chromosomes to
create two offspring. Mutation operator randomly alters some of the bits in a chromosome. To overcome local minima
problem, mutation is usually used with a very low probability.
Genetic algorithm is a randomized search and optimization technique guided by the principle of natural selection
systems. Three basic operators used in Genetic algorithms contain: selection, crossover and mutation. The GA goes
through the following cycle: Evaluate, select, mate, and mutate until some stopping criteria are reached. Reproduction
and crossover together give genetic algorithms most of their searching power. Soni and Agrawal (2012).
3.1 Selection
It is quantitative criterion based on fitness value to choose the chromosomes from population which are going to
reproduce.
3.2 Crossover
In crossover operation two chromosomes are taken and a new is generated by taking some attributes of first
chromosome and the rest from second chromosome. For example, the strings 11001011 to 01101010 could be crossed
over after the third locus in each to produce the two offspring 11001010 to 01101011.
There are three type of crossover operation Single Point Crossover, Two Point Crossover, Uniform Crossover. Figure 3
showed the working of crossover operator. Figure (a) illustrates the bits contained in two strings. Figure (b) both the
strings are detached from their third locus.
1 1 0 0 1 0 1 1
0 1 1 0 1 0 1 0
Figure 3 - (a) Working of Crossover Operator
1 1 0 0 1 0 1 1
0 1 1 0 1 0 1 0
1 1 0 0 1 0 1 1
0 1 1 0 1 0 1 0
Figure 3 - (c) new population after crossover operation.
3.3 Mutation
Mutation is used to maintain genetic diversity from one generation of population to the next. It is similar to biological
mutation. GAs involves string-based modifications to the elements of a candidate solution. These include bit-reversal in
bit-string GAs. This operator randomly flips some of the bits in a chromosome. For example, the string 00000100
might be mutated in its second position to yield 01000100. The basic GA Cycle has been showed in fig4.
4. Proposed method
Step(1): Consider an image I(WxH) ,such that W and H are the width and height of I. Split the image I to a set of N
vectors of Length L(L=64 bytes in this work).
Step(4):For i=0…N-1,perform Step(5) and Step(6) for each vector Vi from the set of N vectors. Note that both values in
Vi (CrossoverIndex) and Vi (MutationIndex) are not participate in the crossover and mutation operation.
Step(5):(crossover operation):
Set Crossover Index of vector Vi as new start value of the adopted random number generation algorithm.
For J from 0 to Crossover Iteration of vector Vi, generate two random numbers N1 and N2 with values between
(0..L-1), then perform Vi(N1) Vi(N2)
Step (6) :(mutation operation)
Set MutationIndex of vector Vi as a new start value of the adopted random number generation algorithm.
For j from 0 to Mutation Iteration of vector Vi, generate one random number N1 with values between (0..L-1),
then perform Vi(N1)=255-Vi(N1).
Step (7): Construct an encrypted image from the set of N encrypted vectors that are produced from the Step (4). Then
hide the values R1 and R2 in the encrypted image.
Certainly, the proposed decryption method is done in the reverse from of the above encryption method.
5. Conclusion
This paper proposes suggested method for data security (Genetic Algorithm), by using Genetic algorithm we will
increase the efficiency of the algorithm in terms of computation time required and complexity to attack the message. It
uses the concept of crossover and mutation to extend the complexness of key by increasing the irregularity of the key.
And also the encryption method will fulfill the requirements that should be in any image encryption technique.
References
[1] Afarin, R. and S. Mozaffari (2013). Image encryption using genetic algorithm. Machine Vision and Image
Processing (MVIP), 2013 8th Iranian Conference on, IEEE.
[2] Al-Husainy, M. A. (2006). "Image encryption using genetic algorithm." Information Technology Journal 5(3):
516-519.
[3] Al-Riyami, S. S. and K. G. Paterson (2003). Certificateless public key cryptography. International Conference on
the Theory and Application of Cryptology and Information Security, Springer.
[4] Chandra, S., et al. (2014). A comparative survey of symmetric and asymmetric key cryptography. Electronics,
Communication and Computational Engineering (ICECCE), 2014 International Conference on, IEEE.
[5] Edge, C. and D. O’Donnell (2016). Introduction to Cryptography. Enterprise Mac Security, Springer: 497-499.
[6] Kumar, A. (2013). "Asymmetric Key Cryptography."
[7] Perez, A. (2014). "Introduction to Cryptography." Network Security: 1-26.
[8] Reddaway, S. (1974). Pseudo-random number generators, Google Patents.
[9] Soni, A. and S. Agrawal (2012). "Using genetic algorithm for symmetric key generation in image encryption."
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 1(10): pp: 137-
140.
[10] Zeghid, M., et al. (2007). "A modified AES based algorithm for image encryption." International Journal of
Computer Science and Engineering 1(1): 70-75.
AUTHOR
Dr. Alsadig Abdallah received the B.S. and M.S and PHD degrees in Information Technology from AL NEELAIN UNIVERSITY.
He was a Head of Information Technology Department on ALGADRIF UNIVERSITY in Sudan, and now working as Assistant
Professor on Al-Imam Mohammad ibn Saud Islamic University in Saudi Arabia. He has scientific papers related with Encryption
and Cloud Computing.
Dr. Mandour M. Ibrahim is working as Assistant Professor at Al-Imam Mohammad ibn Saud Islamic University college of
computer science and information system,