4.2 Article

Images encryption by the use of evolutionary algorithms

Journal

Publisher

SPRINGER
DOI: 10.1007/s10470-011-9627-4

Keywords

Encryption; Ciphering; Differential attack; Exhaustive attack; Statistical attack; Session key; Evolutionary algorithms

Ask authors/readers for more resources

Increasing information transmission in public networks raises a significant number of questions. For example, the security, the confidentiality, the integrity and the authenticity of the data during its transmission are very problematical. So, encryption of the transmitted data is one of the most promising solutions. In our work, we focus on the security of image data, which are considered as specific data because of their big size and their information which are of two-dimensional nature and also redundant. These data characteristics make the developed algorithms in the literature unavailable in their classical forms, because of the speed and the possible risk of information loss. In this paper, we develop an original images encryption'' algorithm based on evolutionary algorithms. The appropriateness of the proposed scheme is demonstrated by the sensitivity to images, the key and the resistibility to various advanced attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.2
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available