scholarly journals Image Encryption Algorithm Based on DNA Encoding and Chaotic Maps

2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Jian Zhang ◽  
DongXin Fang ◽  
Honge Ren

We propose a new image encryption algorithm based on DNA sequences combined with chaotic maps. This algorithm has two innovations: (1) it diffuses the pixels by transforming the nucleotides into corresponding base pairs a random number of times and (2) it confuses the pixels by a chaotic index based on a chaotic map. For any size of the original grayscale image, the rows and columns are fist exchanged by the arrays generated by a logistic chaotic map. Secondly, each pixel that has been confused is encoded into four nucleotides according to the DNA coding. Thirdly, each nucleotide is transformed into the corresponding base pair a random number of time(s) by a series of iterative computations based on Chebyshev’s chaotic map. Experimental results indicate that the key account of this algorithm is 1.536 × 10127, the correlation coefficient of a 256 × 256 Lena image between, before, and after the encryption processes was 0.0028, and the information entropy of the encrypted image was 7.9854. These simulation results and security analysis show that the proposed algorithm not only has good encryption effect, but also has the ability to repel exhaustive, statistical, differential, and noise attacks.

2017 ◽  
Vol 2017 ◽  
pp. 1-11 ◽  
Author(s):  
Xuncai Zhang ◽  
Feng Han ◽  
Ying Niu

With the help of the fact that chaos is sensitive to initial conditions and pseudorandomness, combined with the spatial configurations in the DNA molecule’s inherent and unique information processing ability, a novel image encryption algorithm based on bit permutation and dynamic DNA encoding is proposed here. The algorithm first uses Keccak to calculate the hash value for a given DNA sequence as the initial value of a chaotic map; second, it uses a chaotic sequence to scramble the image pixel locations, and the butterfly network is used to implement the bit permutation. Then, the image is coded into a DNA matrix dynamic, and an algebraic operation is performed with the DNA sequence to realize the substitution of the pixels, which further improves the security of the encryption. Finally, the confusion and diffusion properties of the algorithm are further enhanced by the operation of the DNA sequence and the ciphertext feedback. The results of the experiment and security analysis show that the algorithm not only has a large key space and strong sensitivity to the key but can also effectively resist attack operations such as statistical analysis and exhaustive analysis.


2012 ◽  
Vol 2012 ◽  
pp. 1-10 ◽  
Author(s):  
Qiang Zhang ◽  
Xianglian Xue ◽  
Xiaopeng Wei

We present a novel image encryption algorithm based on DNA subsequence operation. Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image. The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.


2021 ◽  
Vol 2021 ◽  
pp. 1-18
Author(s):  
Liang-Jia Tong ◽  
Nan-Run Zhou ◽  
Zhi-Jing Huang ◽  
Xin-Wen Xie ◽  
Ya-Ru Liang

A nonlinear multi-image encryption scheme is proposed by combining the reality-preserving discrete fractional angular transform with the deoxyribonucleic acid sequence operations. Four approximation coefficients of the four images are extracted by performing the two-dimensional lifting wavelet transform. Then, the four approximation coefficients are synthesized to generate a real-valued output with the reality-preserving discrete fractional angular transform. Finally, based on the deoxyribonucleic acid operation and the Logistic-sine system, the real-valued intermedium output will be encrypted to yield the final ciphertext image. To enhance the security of the image encryption algorithm, the initial value of the chaotic system is calculated by the 256-bit binary sequence, which is obtained by taking the statistics information of the plaintext images as the input of SHA-256. Deoxyribonucleic acid sequence operations, as nonlinear processes, could help to improve the robustness of the cryptosystem. Simulation results and security analysis demonstrate the effectiveness of the image encryption algorithm and the capability of withstanding various common attacks.


2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
S. S. Askar ◽  
A. A. Karawia ◽  
Ahmad Alshamrani

In literature, chaotic economic systems have got much attention because of their complex dynamic behaviors such as bifurcation and chaos. Recently, a few researches on the usage of these systems in cryptographic algorithms have been conducted. In this paper, a new image encryption algorithm based on a chaotic economic map is proposed. An implementation of the proposed algorithm on a plain image based on the chaotic map is performed. The obtained results show that the proposed algorithm can successfully encrypt and decrypt the images with the same security keys. The security analysis is encouraging and shows that the encrypted images have good information entropy and very low correlation coefficients and the distribution of the gray values of the encrypted image has random-like behavior.


2019 ◽  
Vol 33 (22) ◽  
pp. 1950263 ◽  
Author(s):  
Xingyuan Wang ◽  
Hongyu Zhao ◽  
Yutao Hou ◽  
Chao Luo ◽  
Yingqian Zhang ◽  
...  

In this paper, a new chaotic image encryption algorithm based on pseudo-random bit sequence and DNA plane is proposed. The coupled map lattice (CML) is applied to design a pseudo-random bit sequence generation (PBSG) system and use the system to generate the random sequence needed in the encryption process. The initial values and parameters of the system are generated by the SHA-256 hash algorithm combined with given keys. Firstly, the plane image is decomposed into four DNA planes in combination with the DNA encoding rules, and then the four DNA planes are subjected to row circular permutation and column circular permutation. After that, the diffusion operation on each DNA plane is performed. Finally, the four DNA planes are decoded and then combined into a pixel matrix, that is, the final cipher image is obtained. Throughout the encryption process, the choice of DNA encoding and decoding rules is determined by the PBSG system. Simulation results and security analysis show that the algorithm not only has good encryption effect, but also can resist various classic attacks, and has excellent security performance.


2014 ◽  
Vol 2014 ◽  
pp. 1-7 ◽  
Author(s):  
Jian Zhang ◽  
Yutong Zhang

Image encryption technology has been applied in many fields and is becoming the main way of protecting the image information security. There are also many ways of image encryption. However, the existing encryption algorithms, in order to obtain a better effect of encryption, always need encrypting several times. There is not an effective method to decide the number of encryption times, generally determined by the human eyes. The paper proposes an image encryption algorithm based on chaos and simultaneously proposes a balanced pixel algorithm to determine the times of image encryption. Many simulation experiments have been done including encryption effect and security analysis. Experimental results show that the proposed method is feasible and effective.


2014 ◽  
Vol 2014 ◽  
pp. 1-7 ◽  
Author(s):  
Yuping Hu ◽  
Congxu Zhu ◽  
Zhijian Wang

An image encryption algorithm based on improved piecewise linear chaotic map (MPWLCM) model was proposed. The algorithm uses the MPWLCM to permute and diffuse plain image simultaneously. Due to the sensitivity to initial key values, system parameters, and ergodicity in chaotic system, two pseudorandom sequences are designed and used in the processes of permutation and diffusion. The order of processing pixels is not in accordance with the index of pixels, but it is from beginning or end alternately. The cipher feedback was introduced in diffusion process. Test results and security analysis show that not only the scheme can achieve good encryption results but also its key space is large enough to resist against brute attack.


2014 ◽  
Vol 76 (4) ◽  
pp. 1989-2004 ◽  
Author(s):  
Akram Belazi ◽  
Houcemeddine Hermassi ◽  
Rhouma Rhouma ◽  
Safya Belghith

Sign in / Sign up

Export Citation Format

Share Document