Abstract

With the rapid development of information technology, huge amounts of images stored in cloud-based CCTV systems. How to protect the transmitted image efficiently and reducing the storage cost for the system become to critical research issues. The concept of DNA computing has been intrigued researchers in recent years. It has many potentials, for example, the high density and low cost storage provided by a double stranded DNA; or a realization of low cost parallel computation to solve non-deterministic polynomial time problem using replication of DNA strands. As a result, a vast number of theoretical studies of the application of DNA computing on information security, which require extensive computation power, has been published. In this paper we study DNA computation based image encryption scheme which applies to cloud CCTV system. In many different image encryption research the artifact hyperchaotic map was used. We proposed an image encryption algorithm based on DNA coding and hyperchaotic map which utilizes the chaotic property of the hyperchaotic map on top of DNA computing. Experiment showed that our algorithm is more secure and more computation efficient than some of the recent similar works.

Highlights

  • Consider a cloud-based closed-circuit television (CCTV) system shown in Fig. 1 which is used to perform surveillance recordings and provide digital data for forensics

  • In this paper we will present a deoxyribonucleic acid (DNA) coding base image encryption algorithm that an digital image or a frame in a video would be encrypted and encoded by DNA coding. We assume this part is computed by individual IoT camera and the encrypted content will be streamed to the cloud server

  • We propose an image encryption algorithm based on hyperchaotic map and DNA coding

Read more

Summary

A DNA Computation-Based Image Encryption Scheme for Cloud CCTV Systems

TSU-YANG WU 1,2, XIAONING FAN3, KING-HANG WANG4, CHIN-FENG LAI 5, (Senior Member, IEEE), NAIXUE XIONG 6, AND JIMMY MING-TAI WU 7.

INTRODUCTION
PROPOSED ALGORITHM Our proposed encryption algorithm consists of seven phases
PSEUDO-RANDOM SEQUENCE GENERATION
PERMUTATION VECTOR GENERATION
SECURITY AGAINST DIFFERENTIAL ATTACKS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call