The main motive of this research is to design an efficient image encryption method. To achieve this goal, the chaotic tent map algorithm is taken into consideration for secret key generation. In the tent map algorithm, the control parameter μ plays an important role for key generation. Therefore, the optimal value of μ parameter is determined using the JAYA algorithm. JAYA is a metaheuristic algorithm that determines the optimal value by putting the random value of μ parameter in the tent map algorithm based on the objective function. The beauty of the JAYA algorithm is that it does not require any parameter tuning, is simpler, and provides a better convergence rate to find the optimal solution. After determining the optimal parameter value, a secret key is generated. Further, exclusive-OR and circular shifting are performed for image encryption. The performance analysis is performed on different images. The subjective analysis provides a better noisy image, and the objective analysis shows a low PSNR, a high correlation coefficient, a high value of entropy, a maximum deviation, and a mean square error.

1.
Kaur
,
M.
,
Singh
,
S.
&
Kaur
,
M.
(
2021
)
Computational image encryption techniques: A comprehensive review
.
Mathematical Problems in Engineering
, 2021,
1
17
.
2.
Kaur
,
M.
&
Kumar
,
V.
(
2020
)
A comprehensive review on image encryption techniques
.
Archives of Computational Methods in Engineering
,
27
,
15
43
.
3.
Patel
,
K.D.
&
Belani
,
S.
(
2011
)
Image encryption using different techniques: A review
.
International Journal of Emerging Technology and Advanced Engineering
,
1
,
30
34
.
4.
Dahiya
,
S.
&
Garg
,
M.
(
2020
) Unmanned aerial vehicles: Vulnerability to cyber attacks. In:
Proceedings of the UASG 2019: Unmanned Aerial System in Geomatics 1
.
Springer International Publishing
, pp.
201
211
.
5.
Foster
,
I.D.
,
Larson
,
J.
,
Masich
,
M.
,
Snoeren
,
A.C.
,
Savage
,
S.
&
Levchenko
,
K.
(
2015
)
Security by any other name: On the effectiveness of provider based email security
. In:
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
, pp.
450
464
.
6.
Confidentiality, integrity, availability, authenticity, and non-repudiation (n.d
.).
Confidentiality, Integrity, Availability, Authenticity, and Non-Repudiation.
Viewed <https://www.linkedin.com/pulse/confidentiality-integrity-availability-authenticity-albert-kolbach>.
7.
Brindha
,
M.
(
2018
)
Confidentiality, integrity and authentication of DICOM medical images
.
In: 2nd International Conference on Inventive Systems and Control. (ICISC)
, Vol.
2018
, pp.
71
75
.
8.
Biswas
,
C.
,
Gupta
,
U.D.
&
Haque
,
M.M.
(
2019
)
An efficient algorithm for confidentiality, integrity and authentication using hybrid cryptography and steganography
.
In: international conference on electrical, computer and communication engineering (ECCE)
, pp.
1
5
.
9.
Xue
,
X.
,
Zhou
,
D.
&
Zhou
,
C.
(
2020
)
New insights into the existing image encryption algorithms based on DNA coding
.
PLOS ONE
,
15
,
e0241184
.
10.
Alexan
,
W.
ElBeltagy
,
M.
and
Aboshousha
,
A.
, “
Lightweight image encryption: Cellular automata and the lorenz system
,” in
2021 International Conference on Microelectronics (ICM)
, (pp.
34
39
) (
2021
).
11.
Elkandoz
,
M.T.
&
Alexan
,
W.
(
2022
)
Image encryption based on a combination of multiple chaotic maps
.
Multimedia Tools and Applications
,
81
,
25497
25518
.
12.
Muthu
,
J.S.
&
Murali
,
P.
(
2021
)
Review of chaos detection techniques performed on chaotic maps and systems in image encryption
.
SN Computer Science
,
2
,
1
24
.
13.
Kumar
,
A.
(
2022
)
Improved Chaotic Logistic Map Algorithm based on Bio-Inspired Algorithm for Image Encryption
.
Tobacco Regulatory Science (TRS)
,
1915
-
1928
.
14.
Sheela
,
S.J.
,
Suresh
,
K.V.
&
Tandur
,
D.
(
2018
)
Image encryption based on modified Henon map using hybrid chaotic shift transform
.
Multimedia Tools and Applications
,
77
,
25223
25251
.
15.
Mondal
,
B.
,
Singh
,
S.
&
Kumar
,
P.
(
2019
)
A secure image encryption scheme based on cellular automata and chaotic skew tent map
.
Journal of Information Security and Applications
,
45
,
117
130
.
16.
Hua
,
Z.
&
Zhou
,
Y.
(
2016
)
Image encryption using 2D Logistic-adjusted-Sine map
.
Information Sciences
,
339
,
237
253
.
17.
Kaur
,
M.
,
Singh
,
S.
,
Kaur
,
M.
,
Singh
,
A.
&
Singh
,
D.
(
2021
)
A systematic review of metaheuristic-based image encryption techniques
.
Archives of Computational Methods in Engineering
,
1
15
.
18.
Li
,
C.
,
Luo
,
G.
,
Qin
,
K.
&
Li
,
C.
(
2017
)
An image encryption scheme based on chaotic tent map
.
Nonlinear Dynamics
,
87
,
127
133
.
19.
Zitar
,
R.A.
,
Al-Betar
,
M.A.
,
Awadallah
,
M.A.
,
Doush
,
I.A.
&
Assaleh
,
K.
(
2022
)
An intensive and comprehensive overview of JAYA algorithm, its versions and applications
.
Archives of Computational Methods in Engineering: State of the Art Reviews
,
29
,
763
792
.
20.
Kumar
,
A.
,
Karmakar
,
A.
&
Agarwal
,
A.
(
2021
)
Privacy-preserving method for public health surveillance data using image steganography
.
Tobacco Regulatory Science
,
7
,
6814
6830
.
This content is only available via PDF.
You do not currently have access to this content.