{"title":"使用遗传算法进行图像加密","authors":"Roza Afarin, S. Mozaffari","doi":"10.1109/IRANIANMVIP.2013.6780026","DOIUrl":null,"url":null,"abstract":"This paper presents a new method for image encryption using Genetic algorithm (GA). First, rows and columns of the input image are dislocated randomly. Then, the obtained image is divided into four equal sized sub-images. After selecting one of these sub-images accidentally, two pixels are chosen from it as GA initial population. Cross-over and mutation operations are applied on the binary values of the selected pixels. Then the image is reconstructed in the reverse manner. If entropy of the result image increases, the current sub-image is utilized for the next step. Otherwise, another sub-images is chosen randomly and the same process is applied. Randomness of the encrypted image is measured by entropy, correlation coefficients and histogram analysis. Experimental results show that the proposed method can be used effectively for image encryption.","PeriodicalId":297204,"journal":{"name":"2013 8th Iranian Conference on Machine Vision and Image Processing (MVIP)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"29","resultStr":"{\"title\":\"Image encryption using genetic algorithm\",\"authors\":\"Roza Afarin, S. Mozaffari\",\"doi\":\"10.1109/IRANIANMVIP.2013.6780026\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a new method for image encryption using Genetic algorithm (GA). First, rows and columns of the input image are dislocated randomly. Then, the obtained image is divided into four equal sized sub-images. After selecting one of these sub-images accidentally, two pixels are chosen from it as GA initial population. Cross-over and mutation operations are applied on the binary values of the selected pixels. Then the image is reconstructed in the reverse manner. If entropy of the result image increases, the current sub-image is utilized for the next step. Otherwise, another sub-images is chosen randomly and the same process is applied. Randomness of the encrypted image is measured by entropy, correlation coefficients and histogram analysis. Experimental results show that the proposed method can be used effectively for image encryption.\",\"PeriodicalId\":297204,\"journal\":{\"name\":\"2013 8th Iranian Conference on Machine Vision and Image Processing (MVIP)\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"29\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 8th Iranian Conference on Machine Vision and Image Processing (MVIP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IRANIANMVIP.2013.6780026\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 8th Iranian Conference on Machine Vision and Image Processing (MVIP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IRANIANMVIP.2013.6780026","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper presents a new method for image encryption using Genetic algorithm (GA). First, rows and columns of the input image are dislocated randomly. Then, the obtained image is divided into four equal sized sub-images. After selecting one of these sub-images accidentally, two pixels are chosen from it as GA initial population. Cross-over and mutation operations are applied on the binary values of the selected pixels. Then the image is reconstructed in the reverse manner. If entropy of the result image increases, the current sub-image is utilized for the next step. Otherwise, another sub-images is chosen randomly and the same process is applied. Randomness of the encrypted image is measured by entropy, correlation coefficients and histogram analysis. Experimental results show that the proposed method can be used effectively for image encryption.