Transactions on Machine Intelligence

Transactions on Machine Intelligence

Image Encryption Using the TLBO Algorithm and Image Hash

Document Type : Original Article

Authors
1 Department of Computer Engineering, Faculty of Engineering, Shahid Bahonar University, Kerman, Iran
2 Assistant Professor, Department of Computer Engineering, Shahid Bahonar University, Kerman, Iran
Abstract
An effective encryption algorithm must not only provide fast encryption but also be resistant to various attacks. Chaotic mappings are widely used in image encryption. Furthermore, since the hash of an image produces a distinct output for each image and changes drastically with even a single bit alteration, it can be an ideal candidate for the initial values in chaotic mappings. This paper explores the encryption of images inspired by the Teaching-Learning-Based Optimization (TLBO) algorithm, which is a metaheuristic algorithm. Initially, the image hash is computed using the SHA-512 hash function, and numbers between 0 and 1 are generated based on the obtained hash. The image is then divided into 16 equal parts. In the next step, the pixels of the image are permuted using a specific variant of the standard map proposed in this paper. In each iteration, the part with the best entropy is selected as the teacher. Among the generated values, the one that improves the entropy of that part is chosen, and other parts follow this value. Finally, the pixels of each part are altered using the logistic map. This algorithm offers both adequate execution time and high security.  
Keywords

  • Li, S., Wang, X., Zhang, J., & Shum, H. (2007). On the design of perceptual MPEG-video encryption algorithms. IEEE Transactions on Circuits and Systems for Video Technology, 17(2), 214-223. https://doi.org/10.1109/TCSVT.2006.888840
  • Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(8), 2129-2151. https://doi.org/10.1142/S0218127406015970
  • Abdullah, A. H., Enayatifar, R., & Lee, M. (2012). A hybrid genetic algorithm and chaotic function model for image encryption. AEU - International Journal of Electronics and Communications, 66(10), 806-816. https://doi.org/10.1016/j.aeue.2012.01.015
  • Noshadian, S., Ebrahimzade, A., & Kazemitabar, S. J. (2018). Optimizing chaos based image encryption. Multimedia Tools and Applications, 77(19), 25569-25590. https://doi.org/10.1007/s11042-018-5807-x
  • Glabb, R., Imbert, L., Jullien, G., Tisserand, A., & Veyrat-Charvillon, N. (2007). Multi-mode operator for SHA-2 hash functions. Journal of Systems Architecture. https://doi.org/10.1016/j.sysarc.2006.09.006
  • Chirikov, B. V. (1979). A universal instability of many-dimensional oscillator systems. Physics Reports. https://doi.org/10.1016/0370-1573(79)90023-1
  • May, R. M. (1976). Simple mathematical models with very complicated dynamics. Nature. https://doi.org/10.1038/261459a0
  • Rao, R. V., Savsani, V. J., & Vakharia, D. P. (2011). Teaching-learning-based optimization: A novel method for constrained mechanical design optimization problems. Computer-Aided Design. https://doi.org/10.1016/j.cad.2010.12.015
  • Guesmi, R., & Farah, M. A. B. (2021). A new efficient medical image cipher based on hybrid chaotic map and DNA code. Multimedia Tools and Applications, 80(2), 1925-1944. https://doi.org/10.1007/s11042-020-09672-1
  • Naz, F., Shah, T., Din, Z., Shah, A., & Qaisar, S. M. (2020). An ASCII based effective and multi-operation image encryption method. Multimedia Tools and Applications, 79(31-32), 22107-22129. https://doi.org/10.1007/s11042-020-08897-4
  • Abbasi, A. A., Mazinani, M., & Hosseini, R. (2020). Evolutionary-based image encryption using biomolecules operators and non-coupled map lattice. Optik. https://doi.org/10.1016/j.ijleo.2020.164949
Volume 4, Issue 2
Spring 2021
Pages 100-108

  • Receive Date 22 February 2021
  • Revise Date 11 April 2021
  • Accept Date 26 June 2021