Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution
With the emergence of new information technology fields and various usages of internet applications, securing massive amounts and multiple varieties of multimedia data has become a significant challenge. Hence, it is essential to investigate and develop new cryptographic algorithms to ensure the pro...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2023-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10003194/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849737201637654528 |
|---|---|
| author | Nawal Shaltout Ahmed A.Abd El-Latif Waleed M. Al-Adrousy Samir Elmougy |
| author_facet | Nawal Shaltout Ahmed A.Abd El-Latif Waleed M. Al-Adrousy Samir Elmougy |
| author_sort | Nawal Shaltout |
| collection | DOAJ |
| description | With the emergence of new information technology fields and various usages of internet applications, securing massive amounts and multiple varieties of multimedia data has become a significant challenge. Hence, it is essential to investigate and develop new cryptographic algorithms to ensure the protection and privacy of multimedia data at rest and during transmission through the communication channel while attempting to overcome the limitations of traditional cryptographic methods. This paper suggests a novel image encryption and decryption technique based on a computational genetic approach and self-adaptive chaotic substitution. The proposed encryption method depends mainly on four steps: sequence generation, diffusion, confusion, and optimization. The USC-SIPI image dataset is being utilized to prove the correctness and effectiveness of our approach in defending against different attack types. Furthermore, the proposed technique could be capable of withstanding attacks while achieving an information entropy of 7. 999, Number of Pixel Change Rate of 99.62%, and a Unified Average Change in Intensity of 33.54%, respectively. The results of security testing and analysis revealed that our image security method is strongly recommended for modern communications security applications. |
| format | Article |
| id | doaj-art-83ceeb2523114e54b8ac2c7af6d34dfd |
| institution | DOAJ |
| issn | 2169-3536 |
| language | English |
| publishDate | 2023-01-01 |
| publisher | IEEE |
| record_format | Article |
| series | IEEE Access |
| spelling | doaj-art-83ceeb2523114e54b8ac2c7af6d34dfd2025-08-20T03:07:00ZengIEEEIEEE Access2169-35362023-01-01112303231710.1109/ACCESS.2022.323332110003194Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive SubstitutionNawal Shaltout0https://orcid.org/0000-0002-9510-1060Ahmed A.Abd El-Latif1https://orcid.org/0000-0002-5068-2033Waleed M. Al-Adrousy2Samir Elmougy3https://orcid.org/0000-0002-0765-5355Department of Computer Science, Faculty of Computers and Information, Mansoura University, Mansoura, EgyptEIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Riyadh, Saudi ArabiaDepartment of Computer Science, Faculty of Computers and Information, Mansoura University, Mansoura, EgyptDepartment of Computer Science, Faculty of Computers and Information, Mansoura University, Mansoura, EgyptWith the emergence of new information technology fields and various usages of internet applications, securing massive amounts and multiple varieties of multimedia data has become a significant challenge. Hence, it is essential to investigate and develop new cryptographic algorithms to ensure the protection and privacy of multimedia data at rest and during transmission through the communication channel while attempting to overcome the limitations of traditional cryptographic methods. This paper suggests a novel image encryption and decryption technique based on a computational genetic approach and self-adaptive chaotic substitution. The proposed encryption method depends mainly on four steps: sequence generation, diffusion, confusion, and optimization. The USC-SIPI image dataset is being utilized to prove the correctness and effectiveness of our approach in defending against different attack types. Furthermore, the proposed technique could be capable of withstanding attacks while achieving an information entropy of 7. 999, Number of Pixel Change Rate of 99.62%, and a Unified Average Change in Intensity of 33.54%, respectively. The results of security testing and analysis revealed that our image security method is strongly recommended for modern communications security applications.https://ieeexplore.ieee.org/document/10003194/Image securitychaotic systemscomputational methodsgenetic algorithm |
| spellingShingle | Nawal Shaltout Ahmed A.Abd El-Latif Waleed M. Al-Adrousy Samir Elmougy Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution IEEE Access Image security chaotic systems computational methods genetic algorithm |
| title | Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution |
| title_full | Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution |
| title_fullStr | Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution |
| title_full_unstemmed | Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution |
| title_short | Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution |
| title_sort | applicable image security based on computational genetic approach and self adaptive substitution |
| topic | Image security chaotic systems computational methods genetic algorithm |
| url | https://ieeexplore.ieee.org/document/10003194/ |
| work_keys_str_mv | AT nawalshaltout applicableimagesecuritybasedoncomputationalgeneticapproachandselfadaptivesubstitution AT ahmedaabdellatif applicableimagesecuritybasedoncomputationalgeneticapproachandselfadaptivesubstitution AT waleedmaladrousy applicableimagesecuritybasedoncomputationalgeneticapproachandselfadaptivesubstitution AT samirelmougy applicableimagesecuritybasedoncomputationalgeneticapproachandselfadaptivesubstitution |