Open Access   Article Go Back

Fuzzy-Ga Combined Approach in Image Encryption

Subhajit Das1 , SatyendraNath Mandal2 , Sunil Karforma3

Section:Review Paper, Product Type: Journal Paper
Volume-04 , Issue-06 , Page no. 137-142, Aug-2016

Online published on Sep 03, 2016

Copyright © Subhajit Das, SatyendraNath Mandal, Sunil Karforma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Subhajit Das, SatyendraNath Mandal, Sunil Karforma, “Fuzzy-Ga Combined Approach in Image Encryption,” International Journal of Computer Sciences and Engineering, Vol.04, Issue.06, pp.137-142, 2016.

MLA Style Citation: Subhajit Das, SatyendraNath Mandal, Sunil Karforma "Fuzzy-Ga Combined Approach in Image Encryption." International Journal of Computer Sciences and Engineering 04.06 (2016): 137-142.

APA Style Citation: Subhajit Das, SatyendraNath Mandal, Sunil Karforma, (2016). Fuzzy-Ga Combined Approach in Image Encryption. International Journal of Computer Sciences and Engineering, 04(06), 137-142.

BibTex Style Citation:
@article{Das_2016,
author = {Subhajit Das, SatyendraNath Mandal, Sunil Karforma},
title = {Fuzzy-Ga Combined Approach in Image Encryption},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2016},
volume = {04},
Issue = {06},
month = {8},
year = {2016},
issn = {2347-2693},
pages = {137-142},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=139},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=139
TI - Fuzzy-Ga Combined Approach in Image Encryption
T2 - International Journal of Computer Sciences and Engineering
AU - Subhajit Das, SatyendraNath Mandal, Sunil Karforma
PY - 2016
DA - 2016/09/03
PB - IJCSE, Indore, INDIA
SP - 137-142
IS - 06
VL - 04
SN - 2347-2693
ER -

           

Abstract

Many algorithms have been developed to encrypt digital image. In this paper Fuzzy set theory in combination with genetic algorithm has been applied to encrypt the image. Genetic algorithm is used for key generation and fuzzy set theory has been used to diffuse original image .The encrypted image is obtained after logical operation between the key set and diffused image. A number of tests have been applied on encrypted image to check the security level of the proposed algorithm.

Key-Words / Index Term

Fuzzy Logic, Genetic Algorithm, Selective Cross Over, Diffused Image, Compression Rule

References

[1] Nidhal K. El Abbadi, 2Adil Mohamad and 2Mohammed Abdul-Hameed, “Image Encryption Based on Singular Value Decomposition”, Journal of Computer Science, 10 (7),Page No(1222-1230) 2014.
[2] HaojiangGao ,Yisheng Zhang, Shuyun Liang, Dequn Li, “A new chaotic algorithm for image encryption” , Chaos,Solitons and Fractals ,ELSEVIER Page No.393-399,2006.
[3] RozaAfarin ,SaeedMozaffari, “Image Encryption Using Genetic Algorithm and Binary Pattern”.
[4] Jalesh Kumar and S Nirmala, “Encryption of Images Based on Genetic Algorithm-A New Approach”, Advances in Computer Science, Eng. & Appl., AISC 167.© Springer-Verlag Berlin Heidelberg, Page No 783–791 , 2012.
[5] Rasul Enayatifar , Abdul Hanan Abdullah, Ismail FauziIsnin, ” Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence”,Optics and Laser in Engineering 56 ELSEVIER, Page No-83-93,2014.
[6] Ravindu Madanayake, NikilaPeiris, GayanRanaweera and UthpalaJayathilake, “Advanced Encryption Algorithm Using Fuzzy Logic”, International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) ACSIT Press, Singapore,2012.
[7] KantaVekaria and Chris Clack, “Selective Crossover in Genetic Algorithms: An Empirical Study”.
[8] Cao Guanghui,Hu Kai, Zhang Yizhi, Zhou Jun, and Zhang Xing:Chaotic Image Encryption Based on Running-Key Related to Plaintext, Scientific World Journal Volume 2014, Article ID 490179, 9 pages.
[9] M. El-lskandarani, S. Darwish, and S. Abuguba :A robust and secure scheme for image transmission over wireless channels in Security Technology,2008.ICCST 2008.42nd Annual IEEE International Carnahan Conference on. IEEE, ,Page No 51–55, 2008.