Optimization of control parameters for genetic algorithms
IEEE Transactions on Systems, Man and Cybernetics
Adapting operator probabilities in genetic algorithms
Proceedings of the third international conference on Genetic algorithms
Genetic programming (videotape): the movie
Genetic programming (videotape): the movie
Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
On the generality of parameter tuning in evolutionary planning
Proceedings of the 12th annual conference on Genetic and evolutionary computation
Performance prediction and automated tuning of randomized and parametric algorithms
CP'06 Proceedings of the 12th international conference on Principles and Practice of Constraint Programming
Hi-index | 0.00 |
Increasing information transmission in public networks raises a significant number of questions. For example, the security, the confidentiality, the integrity and the authenticity of the data during its transmission are very problematical. So, encryption of the transmitted data is one of the most promising solutions. In our work, we focus on the security of image data, which are considered as specific data because of their big size and their information which are of two-dimensional nature and also redundant. These data characteristics make the developed algorithms in the literature unavailable in their classical forms, because of the speed and the possible risk of information loss. In this paper, we develop an original "images encryption" algorithm based on evolutionary algorithms. The appropriateness of the proposed scheme is demonstrated by the sensitivity to images, the key and the resistibility to various advanced attacks.