An effective encryption algorithm must not only provide fast encryption but also be resistant to various attacks. Chaotic mappings are widely used in image encryption. Furthermore, since the hash of an image produces a distinct output for each image and changes drastically with even a single bit alteration, it can be an ideal candidate for the initial values in chaotic mappings. This paper explores the encryption of images inspired by the Teaching-Learning-Based Optimization (TLBO) algorithm, which is a metaheuristic algorithm. Initially, the image hash is computed using the SHA-512 hash function, and numbers between 0 and 1 are generated based on the obtained hash. The image is then divided into 16 equal parts. In the next step, the pixels of the image are permuted using a specific variant of the standard map proposed in this paper. In each iteration, the part with the best entropy is selected as the teacher. Among the generated values, the one that improves the entropy of that part is chosen, and other parts follow this value. Finally, the pixels of each part are altered using the logistic map. This algorithm offers both adequate execution time and high security.
Li, S., Wang, X., Zhang, J., & Shum, H. (2007). On the design of perceptual MPEG-video encryption algorithms. IEEE Transactions on Circuits and Systems for Video Technology, 17(2), 214-223. https://doi.org/10.1109/TCSVT.2006.888840
Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(8), 2129-2151. https://doi.org/10.1142/S0218127406015970
Abdullah, A. H., Enayatifar, R., & Lee, M. (2012). A hybrid genetic algorithm and chaotic function model for image encryption. AEU - International Journal of Electronics and Communications, 66(10), 806-816. https://doi.org/10.1016/j.aeue.2012.01.015
Noshadian, S., Ebrahimzade, A., & Kazemitabar, S. J. (2018). Optimizing chaos based image encryption. Multimedia Tools and Applications, 77(19), 25569-25590. https://doi.org/10.1007/s11042-018-5807-x
Glabb, R., Imbert, L., Jullien, G., Tisserand, A., & Veyrat-Charvillon, N. (2007). Multi-mode operator for SHA-2 hash functions. Journal of Systems Architecture. https://doi.org/10.1016/j.sysarc.2006.09.006
Chirikov, B. V. (1979). A universal instability of many-dimensional oscillator systems. Physics Reports. https://doi.org/10.1016/0370-1573(79)90023-1
May, R. M. (1976). Simple mathematical models with very complicated dynamics. Nature. https://doi.org/10.1038/261459a0
Rao, R. V., Savsani, V. J., & Vakharia, D. P. (2011). Teaching-learning-based optimization: A novel method for constrained mechanical design optimization problems. Computer-Aided Design. https://doi.org/10.1016/j.cad.2010.12.015
Guesmi, R., & Farah, M. A. B. (2021). A new efficient medical image cipher based on hybrid chaotic map and DNA code. Multimedia Tools and Applications, 80(2), 1925-1944. https://doi.org/10.1007/s11042-020-09672-1
Naz, F., Shah, T., Din, Z., Shah, A., & Qaisar, S. M. (2020). An ASCII based effective and multi-operation image encryption method. Multimedia Tools and Applications, 79(31-32), 22107-22129. https://doi.org/10.1007/s11042-020-08897-4
Abbasi, A. A., Mazinani, M., & Hosseini, R. (2020). Evolutionary-based image encryption using biomolecules operators and non-coupled map lattice. Optik. https://doi.org/10.1016/j.ijleo.2020.164949
Abedzadeh,M. and Rostami,M. J. (2021). Image Encryption Using the TLBO Algorithm and Image Hash. Transactions on Machine Intelligence, 4(2), 100-108. doi: 10.47176/TMI.2021.100
MLA
Abedzadeh,M. , and Rostami,M. J. . "Image Encryption Using the TLBO Algorithm and Image Hash", Transactions on Machine Intelligence, 4, 2, 2021, 100-108. doi: 10.47176/TMI.2021.100
HARVARD
Abedzadeh M., Rostami M. J. (2021). 'Image Encryption Using the TLBO Algorithm and Image Hash', Transactions on Machine Intelligence, 4(2), pp. 100-108. doi: 10.47176/TMI.2021.100
CHICAGO
M. Abedzadeh and M. J. Rostami, "Image Encryption Using the TLBO Algorithm and Image Hash," Transactions on Machine Intelligence, 4 2 (2021): 100-108, doi: 10.47176/TMI.2021.100
VANCOUVER
Abedzadeh M., Rostami M. J. Image Encryption Using the TLBO Algorithm and Image Hash. Trans. Mach. Intell., 2021; 4(2): 100-108. doi: 10.47176/TMI.2021.100