Abstract
This chapter introduces the concept of decryption of chaotically encrypted information. Five evolutionary algorithms have been used for chaos synchronization here: differential evolution, self-organizing migrating algorithm, genetic algorithm, simulated annealing and evolutionary strategies in a total of 15 versions. The main aim was to ascertain if evolutionary algorithms are able to identify the “key” (control parameter) of the chaotic system, which was used to encrypt information. The proposed scheme is based on the extended map of Clifford strange attractor, where each dimension has a specific role in the encryption process. Investigation consists of one case study. All the algorithms was 100 times repeated in order to show and check robustness of the proposed methods and experiment configurations. All data were processed in order to get summarized results and graphs.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Asim, M., Jeoti, V.: On Improving an Image Encryption Scheme based on Chaotic Logistic Map. In: ICIAS (2007)
Asim, M., Jeoti, V.: Hybrid Chaotic Image Encryption Scheme based on S-box and Ciphertext Feedback. In: ICIAS (2007)
Beyer, H.-G.: Theory of Evolution Strategies. Springer, New York (2001)
Cerny, V.: Thermodynamical approach to the traveling salesman problem: An efficient simulation algorithm. J. Opt. Theory Appl. 45(1), 41–51 (1985)
Fu, C., Zhang, Z., Cao, Y.: An Improved Image Encryption Algorithm Based on Chaotic Maps. In: ICNC (2007)
Fu, C., Zhang, Z., Chen, Z., Wang, X.: An Improved Chaos-Based Image Encryption Scheme. In: ICCS 2007. Springer, Berlin (2007)
Gao, T., Chen, Z.: A new image encryption algorithm based on hyper-chaos. Science Direct (2007)
Giesl, J., Vlcek, K.: Audio signal encryption in wavelet domain based on chaotic maps. In: Mendel 2008, Brno (2008)
Giesl, J., Vlcek, K.: Image Encryption Based on Strange Attractor. ICGST-GVIP Journal 9(2), 19–26 (2009)
Gu, G., Han, G.: An Enhanced Chaos Based Image Encryption Algorithm. In: ICICIC (2006)
He, X., Zhu, Q., Gu, P.: A New Chaos-Based Encryption Method for Color Image. Springer, Berlin (2006)
Holland, J.: Adaptation in Natural and Artificial Systems. Univ. Michigan Press, Ann Arbor (1975)
Kirkpatrick, S., Gelatt, C., Vecchi, M.: Optimization by simulated annealing. Science 220(4598), 671–680 (1983)
Mao, Y., Chen, G.: Chaos-Based Image Encryption. Springer, Berlin (2003)
Price, K.: An Introduction to Differential Evolution. In: Corne, D., Dorigo, M., Glover, F. (nteds.) New Ideas in Optimization, pp. 79–108. McGraw-Hill, London (1999)
Seo, Y.-H., Kim, D.-W., Yoo, J.-S., Dey, S., Agrawal, A.: Wavelet Domain Image Encryption by Subband Selection and Data Bit Selection. Springer, Berlin (2003)
Wong, K., Kwok, B., Law, W.-S.: A Fast Image Encryption Scheme based on Chaotic Standard Map. Springer, Berlin (2006)
Zelinka, I.: SOMA — Self Organizing Migrating Algorithm. In: Babu, B., Onwubolu, G. (nteds.) New Optimization Techniques in Engineering, pp. 167–218. Springer, New York (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Zelinka, I., Jasek, R. (2010). Evolutionary Decryption of Chaotically Encrypted Information. In: Zelinka, I., Celikovsky, S., Richter, H., Chen, G. (eds) Evolutionary Algorithms and Chaotic Systems. Studies in Computational Intelligence, vol 267. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10707-8_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-10707-8_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10706-1
Online ISBN: 978-3-642-10707-8
eBook Packages: EngineeringEngineering (R0)