IMAGE ENCIPHERMENT USING GENETIC ALGORITHM

– Cryptography gets an essential role for secure the information’s. In Every second, Enormous data is swap over through the communication channel, at this level the information security is required to digital data transaction. Without using the cryptography technique, the data sharing is inadequate. However, crypto method is extremely essential rather than the transaction speed. Even data as encrypted format, that data may steal in-between the communication. The embezzle technique has been threatening in mounting technology world. Security needs unbreakable cryptography mechanism better than the convention. Genetic algorithm is the powerful impartial optimization method and helps to encrypt the information in elegant way, which has some properties like selection, crossover, and mutation. The novel encryption method called image en-cipherment using genetic algorithm (IEGA). Which provides data security and it is propagated by the combination of cryptography and genetic algorithm. The images are encrypted and decrypted using IEGA method and results were compared in this paper by using some existing methods. The quality metrics such as SNR, PSNR, and MSE is used to justify the quality of our proposed IEGA methodology.


II. LITERATURE SURVEY
The following literature review, consist of methods applied by the research worldwide and recent developments.
In author xinyuvan-Dahaixupresented the new image encryption method generated by genetic algorithm properties which is based on the recent cryptography from the phase of genetic mechanism. Through the logistic map of intertwining method has been used to propagate the chaotic sequences remaining its advantages. Every pixel of the image takes as an "individual" each bits of its gene. In selection phase, the Monte Carlo method used to arbitrarily pick two individuals according to the chaotic sequences, cross, swap their genes using the particular crossover operator in the second phase. Selection and Crossover operations are help to perplex the image and to diffuse the image using the mutation operator. Finally modify the genes of individual arbitrarily for the mutation. The logistic map of intertwining is analyzed from the phase of the allotment of the sequences and Lyapunov exponents compared it with logistic map. The result of the intertwining logistic map could overcome the inadequacy of logistic map. Security and experiment analysis shows the new structure fully satisfies the functional requirement of modern cryptography [1].
In authors "RasulEnayatifar, Abdul Hanan Abdulla" presented the chaotic function is used for create the hybrid model of the genetic algorithm and image encryption also predictable formation. This method helps to build the various numbers of encrypted images from the original input and encrypted images are employed as the initial population for initiating the operation of the genetic algorithm. Outcomes are obtained for correlation coefficients and the entropies of the images also prove the high effectiveness of this method, compared with other methods in image encryption. Moreover, this method has a higher stability in the face of attacks common in this area [2].
In authors "Girish R. Naik and Poornima G. Naik [3]" presented the en-cipherment of a text file using symmetric key and genetic operation techniques. In this method made an attempt to exploit the randomness involved crossover and mutation process for generating a secure single time secret key encryption and decryption message. The number of crossover points and mutation points, both are used to transmit the measurement lengthwise of the secret key and hence the strength of the algorithm and emphasis by create it complicated to break by permutation the secret key. A permutation of predefined factor agreed upon by both the dispatcher, intended receiver. The arbitrariness together with incarnation makes the algorithm; it might strong and hard to break. This methodology is common, which can apply any text file for secure transmission of the data [3].
In authors "Rosa Afrain" presented a novel method for image encryption which has completed by genetic algorithm. The input image of the rows and columns are dislocated randomly and acquired images are divided into four equal size sub-images. After that one of these sub-image is selected accidentally. Two pixels are chosen from that sub-image as genetic algorithm initial population. Both, the mutation and crossover operations are applied in the binary value of the chosen pixel value. Then reconstruct the image in reverse manner. Even the image entropy is increased that the current sub-images is utilized for the next procedure. Entropy, correlation, coefficient and histogram analysis is used to measure the randomness of an encrypted image. This accession is sensitive to the keys and small warp in them [4].
In author "ShubhanginiP.Nichat" presented the chaotic and secret key methods are used to create the different number of encrypted images. Algorithm of genetic moreover used to get the optimal result and in the last stage finest cipher image is selected as best; cipher image is protected on computation of the co-relation, co-efficient and entropy. The image has lowest correlation coefficient and maximum entropy is selected as the best cipher image [5].

B. IEGA method steps
In this paper new image encryption method is proposed based on improved genetic algorithm and also uses symmetric key encryption   V. CONCLUSION Data security is most essential to transfer the tenable data in the network system. Every day, new innovations have been inventing till now by the cryptography mechanism. But it's requirement is needed to be in recent trends of technology and even the data gets more security to data transfer rather than process of data security has also more significant. For that reason the novel approach has derived for image encryption, which is called Image En-cipherment using Genetic Algorithm (IEGA). This method extracts the RGB value from the original input image and converts it into the binary value. Various types of images and its resolutions have taken as the input values. Based on the experimental result this method is reduced the time complexity of image encryption.