Randomness Evaluation of a Genetic Algorithm for Image Encryption: A
Signal Processing Approach
- URL: http://arxiv.org/abs/2008.03681v1
- Date: Sun, 9 Aug 2020 07:50:29 GMT
- Title: Randomness Evaluation of a Genetic Algorithm for Image Encryption: A
Signal Processing Approach
- Authors: Zoubir Hamici
- Abstract summary: The GFHT cipher is a genetic algorithm that combines gene fusion (GF) and horizontal gene transfer (HGT) both inspired from antibiotic resistance in bacteria.
The encryption starts by a GF of the principal key-agent in a single block, then HGT performs obfuscation where the genes are pixels and the chromosomes are the rows and columns.
- Score: 7.310043452300736
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In this paper a randomness evaluation of a block cipher for secure image
communication is presented. The GFHT cipher is a genetic algorithm, that
combines gene fusion (GF) and horizontal gene transfer (HGT) both inspired from
antibiotic resistance in bacteria. The symmetric encryption key is generated by
four pairs of chromosomes with multi-layer random sequences. The encryption
starts by a GF of the principal key-agent in a single block, then HGT performs
obfuscation where the genes are pixels and the chromosomes are the rows and
columns. A Salt extracted from the image hash-value is used to implement
one-time pad (OTP) scheme, hence a modification of one pixel generates a
different encryption key without changing the main passphrase or key.
Therefore, an extreme avalanche effect of 99% is achieved. Randomness
evaluation based on random matrix theory, power spectral density, avalanche
effect, 2D auto-correlation, pixels randomness tests and chi-square hypotheses
testing show that encrypted images adopt the statistical behavior of uniform
white noise; hence validating the theoretical model by experimental results.
Moreover, performance comparison with chaos-genetic ciphers shows the merit of
the GFHT algorithm.
Related papers
- Deep Learning and Chaos: A combined Approach To Image Encryption and Decryption [1.8749305679160366]
We introduce a novel image encryption and decryption algorithm using hyperchaotic signals from the novel 3D hyperchaotic map, 2D memristor map, Convolutional Neural Network (CNN)
The robustness of the encryption algorithm is shown by key sensitivity analysis, i.e., the average sensitivity of the algorithm to key elements.
arXiv Detail & Related papers (2024-06-24T16:56:22Z) - An Effective Approach to Scramble Multiple Diagnostic Imageries Using Chaos-Based Cryptography [0.0]
We provide a chaotic system-based medical picture encryption method.
The permutation based on plain image and chaotic keys is offered to shuffle the plain picture's pixels to other rows and columns.
We analyze the chaotic behavior of the proposed system using various techniques and tests such as bifurcation plots, Lyapunov exponents, MSE, PSNR tests, and histogram analysis.
arXiv Detail & Related papers (2024-05-02T05:18:46Z) - PermutEx: Feature-Extraction-Based Permutation -- A New Diffusion Scheme for Image Encryption Algorithms [2.2351927942921366]
This paper introduces PermutEx, a feature-extraction-based permutation method that scrambles pixels effectively.
The method effectively disrupts the correlation in information-rich areas within the image resulting in a correlation value of 0.000062.
arXiv Detail & Related papers (2023-11-05T23:46:25Z) - Noise-Crypt: Image Encryption with Non-linear Noise, Hybrid Chaotic Maps, and Hashing [0.8205507411993582]
Noise-Crypt is an image encryption algorithm that integrates non-linear random noise, hybrid chaotic maps, and SHA-256 hashing algorithm.
The proposed scheme has been evaluated for several security parameters, such as differential attacks, entropy, correlation, etc.
Results of the security analysis validate the potency of the proposed scheme in achieving robust image encryption.
arXiv Detail & Related papers (2023-09-20T17:11:35Z) - Towards Better Multi-modal Keyphrase Generation via Visual Entity
Enhancement and Multi-granularity Image Noise Filtering [79.44443231700201]
Multi-modal keyphrase generation aims to produce a set of keyphrases that represent the core points of the input text-image pair.
The input text and image are often not perfectly matched, and thus the image may introduce noise into the model.
We propose a novel multi-modal keyphrase generation model, which not only enriches the model input with external knowledge, but also effectively filters image noise.
arXiv Detail & Related papers (2023-09-09T09:41:36Z) - Publicly-Verifiable Deletion via Target-Collapsing Functions [81.13800728941818]
We show that targetcollapsing enables publiclyverifiable deletion (PVD)
We build on this framework to obtain a variety of primitives supporting publiclyverifiable deletion from weak cryptographic assumptions.
arXiv Detail & Related papers (2023-03-15T15:00:20Z) - Hierarchical Forgery Classifier On Multi-modality Face Forgery Clues [61.37306431455152]
We propose a novel Hierarchical Forgery for Multi-modality Face Forgery Detection (HFC-MFFD)
The HFC-MFFD learns robust patches-based hybrid representation to enhance forgery authentication in multiple-modality scenarios.
The specific hierarchical face forgery is proposed to alleviate the class imbalance problem and further boost detection performance.
arXiv Detail & Related papers (2022-12-30T10:54:29Z) - A novel conservative chaos driven dynamic DNA coding for image
encryption [0.0]
The proposed image encryption algorithm is a dynamic DNA coding algorithm.
The results are promising and prove the robustness of the algorithm against various common cryptanalytic attacks.
arXiv Detail & Related papers (2022-07-12T11:40:09Z) - A Variational Quantum Attack for AES-like Symmetric Cryptography [69.80357450216633]
We propose a variational quantum attack algorithm (VQAA) for classical AES-like symmetric cryptography.
In the VQAA, the known ciphertext is encoded as the ground state of a Hamiltonian that is constructed through a regular graph.
arXiv Detail & Related papers (2022-05-07T03:15:15Z) - Syfer: Neural Obfuscation for Private Data Release [58.490998583666276]
We develop Syfer, a neural obfuscation method to protect against re-identification attacks.
Syfer composes trained layers with random neural networks to encode the original data.
It maintains the ability to predict diagnoses from the encoded data.
arXiv Detail & Related papers (2022-01-28T20:32:04Z) - DVG-Face: Dual Variational Generation for Heterogeneous Face Recognition [85.94331736287765]
We formulate HFR as a dual generation problem, and tackle it via a novel Dual Variational Generation (DVG-Face) framework.
We integrate abundant identity information of large-scale visible data into the joint distribution.
Massive new diverse paired heterogeneous images with the same identity can be generated from noises.
arXiv Detail & Related papers (2020-09-20T09:48:24Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.