Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution

With the emergence of new information technology fields and various usages of internet applications, securing massive amounts and multiple varieties of multimedia data has become a significant challenge. Hence, it is essential to investigate and develop new cryptographic algorithms to ensure the pro...

Full description

Saved in:
Bibliographic Details
Main Authors: Nawal Shaltout, Ahmed A.Abd El-Latif, Waleed M. Al-Adrousy, Samir Elmougy
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10003194/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849737201637654528
author Nawal Shaltout
Ahmed A.Abd El-Latif
Waleed M. Al-Adrousy
Samir Elmougy
author_facet Nawal Shaltout
Ahmed A.Abd El-Latif
Waleed M. Al-Adrousy
Samir Elmougy
author_sort Nawal Shaltout
collection DOAJ
description With the emergence of new information technology fields and various usages of internet applications, securing massive amounts and multiple varieties of multimedia data has become a significant challenge. Hence, it is essential to investigate and develop new cryptographic algorithms to ensure the protection and privacy of multimedia data at rest and during transmission through the communication channel while attempting to overcome the limitations of traditional cryptographic methods. This paper suggests a novel image encryption and decryption technique based on a computational genetic approach and self-adaptive chaotic substitution. The proposed encryption method depends mainly on four steps: sequence generation, diffusion, confusion, and optimization. The USC-SIPI image dataset is being utilized to prove the correctness and effectiveness of our approach in defending against different attack types. Furthermore, the proposed technique could be capable of withstanding attacks while achieving an information entropy of 7. 999, Number of Pixel Change Rate of 99.62%, and a Unified Average Change in Intensity of 33.54%, respectively. The results of security testing and analysis revealed that our image security method is strongly recommended for modern communications security applications.
format Article
id doaj-art-83ceeb2523114e54b8ac2c7af6d34dfd
institution DOAJ
issn 2169-3536
language English
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-83ceeb2523114e54b8ac2c7af6d34dfd2025-08-20T03:07:00ZengIEEEIEEE Access2169-35362023-01-01112303231710.1109/ACCESS.2022.323332110003194Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive SubstitutionNawal Shaltout0https://orcid.org/0000-0002-9510-1060Ahmed A.Abd El-Latif1https://orcid.org/0000-0002-5068-2033Waleed M. Al-Adrousy2Samir Elmougy3https://orcid.org/0000-0002-0765-5355Department of Computer Science, Faculty of Computers and Information, Mansoura University, Mansoura, EgyptEIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Riyadh, Saudi ArabiaDepartment of Computer Science, Faculty of Computers and Information, Mansoura University, Mansoura, EgyptDepartment of Computer Science, Faculty of Computers and Information, Mansoura University, Mansoura, EgyptWith the emergence of new information technology fields and various usages of internet applications, securing massive amounts and multiple varieties of multimedia data has become a significant challenge. Hence, it is essential to investigate and develop new cryptographic algorithms to ensure the protection and privacy of multimedia data at rest and during transmission through the communication channel while attempting to overcome the limitations of traditional cryptographic methods. This paper suggests a novel image encryption and decryption technique based on a computational genetic approach and self-adaptive chaotic substitution. The proposed encryption method depends mainly on four steps: sequence generation, diffusion, confusion, and optimization. The USC-SIPI image dataset is being utilized to prove the correctness and effectiveness of our approach in defending against different attack types. Furthermore, the proposed technique could be capable of withstanding attacks while achieving an information entropy of 7. 999, Number of Pixel Change Rate of 99.62%, and a Unified Average Change in Intensity of 33.54%, respectively. The results of security testing and analysis revealed that our image security method is strongly recommended for modern communications security applications.https://ieeexplore.ieee.org/document/10003194/Image securitychaotic systemscomputational methodsgenetic algorithm
spellingShingle Nawal Shaltout
Ahmed A.Abd El-Latif
Waleed M. Al-Adrousy
Samir Elmougy
Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution
IEEE Access
Image security
chaotic systems
computational methods
genetic algorithm
title Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution
title_full Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution
title_fullStr Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution
title_full_unstemmed Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution
title_short Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution
title_sort applicable image security based on computational genetic approach and self adaptive substitution
topic Image security
chaotic systems
computational methods
genetic algorithm
url https://ieeexplore.ieee.org/document/10003194/
work_keys_str_mv AT nawalshaltout applicableimagesecuritybasedoncomputationalgeneticapproachandselfadaptivesubstitution
AT ahmedaabdellatif applicableimagesecuritybasedoncomputationalgeneticapproachandselfadaptivesubstitution
AT waleedmaladrousy applicableimagesecuritybasedoncomputationalgeneticapproachandselfadaptivesubstitution
AT samirelmougy applicableimagesecuritybasedoncomputationalgeneticapproachandselfadaptivesubstitution