Back to Search Start Over

Chaotic image encryption algorithm with improved bonobo optimizer and DNA coding for enhanced security

Authors :
Ahmed S. Almasoud
Bayan Alabduallah
Hamed Alqahtani
Sumayh S. Aljameel
Saud S. Alotaibi
Abdullah Mohamed
Source :
Heliyon, Vol 10, Iss 3, Pp e25257- (2024)
Publication Year :
2024
Publisher :
Elsevier, 2024.

Abstract

Image encryption involves applying cryptographic approaches to convert the content of an image into an illegible or encrypted format, reassuring that illegal users cannot simply interpret or access the actual visual details. Commonly employed models comprise symmetric key algorithms for the encryption of the image data, necessitating a secret key for decryption. This study introduces a new Chaotic Image Encryption Algorithm with an Improved Bonobo Optimizer and DNA Coding (CIEAIBO-DNAC) for enhanced security. The presented CIEAIBO-DNAC technique involves different processes such as initial value generation, substitution, diffusion, and decryption. Primarily, the key is related to the input image pixel values by the MD5 hash function, and the hash value produced by the input image can be utilized as a primary value of the chaotic model to boost key sensitivity. Besides, the CIEAIBO-DNAC technique uses the Improved Bonobo Optimizer (IBO) algorithm for scrambling the pixel position in the block and the scrambling process among the blocks takes place. Moreover, in the diffusion stage, DNA encoding, obfuscation, and decoding process were carried out to attain encrypted images. Extensive experimental evaluations and security analyses are conducted to assess the outcome of the CIEAIBO-DNAC technique. The simulation outcome demonstrates excellent security properties, including resistance against several attacks, ensuring it can be applied to real-time image encryption scenarios.

Details

Language :
English
ISSN :
24058440
Volume :
10
Issue :
3
Database :
Directory of Open Access Journals
Journal :
Heliyon
Publication Type :
Academic Journal
Accession number :
edsdoj.59c88506281d46a58ba737fa6e38c61f
Document Type :
article
Full Text :
https://doi.org/10.1016/j.heliyon.2024.e25257