At the pixel level, several chaos-based image encryption and decryption models have been developed throughout the years. However, due to long-haul, privacy, and security considerations, it has a number of drawbacks, including increased network complexity and low scalability, and actual text cracking avoidance is more challenging. In this study, we have proposed a novel approach for image encryption and decryption. The confusion and diffusion process is performed using fractional-order chaotic maps with the hybrid radiation heat transfer algorithm based sunflower optimization (HRHT-SO) algorithm. The proposed method works for both color and grayscale images. The HRHT-SO algorithm is the combination of both heat transfer search (HTS) and sunflower optimization (SO) algorithms. During the search process, the SO algorithm improves the radiation stage of the HTS model. Further, the DNA sequence improves the performance of image encryption and decryption using fractional-order chaotic maps with the HRHT-SO algorithm. The experimental investigations are carried out by using various parameters such as key sensitivity analysis, keyspace analysis, histogram analysis, correlation coefficient analysis, entropy analysis, PSNR, NPCR, and UACI analysis thereby analyzing the efficiency and complexity of the encryption scheme.Hence, the proposed method outperforms superior performances in all the experiments.
K E Y W O R D Sconfusion and diffusion process, DNA sequence, hybrid radiation heat transfer algorithm based sunflower optimization algorithm, image encryption and decryption
INTRODUCTIONThe rapid expansion of computer networks frequently leads to cases of information leakage as a result of infinite storage and network transmission activities. In multimedia communication, the major concern is secured digital image transmission and storage. 1 The communication network transports multimedia information and must be protected against unauthorized access. The diffusion and confusion techniques ensure data protection in cryptography. Image security is provided by using image encryption, which is one of the most important cryptography schemes. 2When utilizing a cryptosystem to encrypt an image, numerous image attributes are taken into account, including strong adjacent pixel correlation, increased redundancy, and larger size. For these reasons, conventional asymmetric and symmetric methods for image encryption (IE) are ineffective.