Fuzzy-Ga Combined Approach in Image Encryption

Authors

  • Das S NayagramBaniBidyapith, Nayagram, India
  • Mandal S Kalyani Govt. EnggCollege,Dept.of Information Tech. Kalyani,Nadia,India
  • Karforma S Burdwan University,Dept of Computer Science, Burdwan,India

Keywords:

Fuzzy Logic, Genetic Algorithm, Selective Cross Over, Diffused Image, Compression Rule

Abstract

Many algorithms have been developed to encrypt digital image. In this paper Fuzzy set theory in combination with genetic algorithm has been applied to encrypt the image. Genetic algorithm is used for key generation and fuzzy set theory has been used to diffuse original image .The encrypted image is obtained after logical operation between the key set and diffused image. A number of tests have been applied on encrypted image to check the security level of the proposed algorithm.

References

Nidhal K. El Abbadi, 2Adil Mohamad and 2Mohammed Abdul-Hameed, “Image Encryption Based on Singular Value Decomposition”, Journal of Computer Science, 10 (7),Page No(1222-1230) 2014.

HaojiangGao ,Yisheng Zhang, Shuyun Liang, Dequn Li, “A new chaotic algorithm for image encryption” , Chaos,Solitons and Fractals ,ELSEVIER Page No.393-399,2006.

RozaAfarin ,SaeedMozaffari, “Image Encryption Using Genetic Algorithm and Binary Pattern”.

Jalesh Kumar and S Nirmala, “Encryption of Images Based on Genetic Algorithm-A New Approach”, Advances in Computer Science, Eng. & Appl., AISC 167.© Springer-Verlag Berlin Heidelberg, Page No 783–791 , 2012.

Rasul Enayatifar , Abdul Hanan Abdullah, Ismail FauziIsnin, ” Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence”,Optics and Laser in Engineering 56 ELSEVIER, Page No-83-93,2014.

Ravindu Madanayake, NikilaPeiris, GayanRanaweera and UthpalaJayathilake, “Advanced Encryption Algorithm Using Fuzzy Logic”, International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) ACSIT Press, Singapore,2012.

KantaVekaria and Chris Clack, “Selective Crossover in Genetic Algorithms: An Empirical Study”.

Cao Guanghui,Hu Kai, Zhang Yizhi, Zhou Jun, and Zhang Xing:Chaotic Image Encryption Based on Running-Key Related to Plaintext, Scientific World Journal Volume 2014, Article ID 490179, 9 pages.

M. El-lskandarani, S. Darwish, and S. Abuguba :A robust and secure scheme for image transmission over wireless channels in Security Technology,2008.ICCST 2008.42nd Annual IEEE International Carnahan Conference on. IEEE, ,Page No 51–55, 2008.

Downloads

Published

2025-11-11

How to Cite

[1]
S. Das, S. Mandal, and S. Karforma, “Fuzzy-Ga Combined Approach in Image Encryption”, Int. J. Comp. Sci. Eng., vol. 4, no. 6, pp. 137–142, Nov. 2025.