Abstract

The image encryption schemes combining chaotic maps, DNA coding, and DNA sequence operation can effectively protect the image. In this paper, a double-layer image encryption scheme is proposed by combining chaotic maps with DNA strand displacement (DSD). Chaotic maps are used to generate pseudorandom sequences and perform routine scrambling and diffusion operations on the plaintext image. We propose three DSD-based encryption rules according to the diversity of DNA strand displacement, and these three encryption rules are used to encrypt the image at the DNA sequence level. The plaintext image can be transformed into the cipher image, which is difficult to be recognized without the correct keys through the double-layer encryption at the level of chaotic maps and DNA. Simulation results and security analysis show that the proposed encryption scheme can effectively protect image information and resist conventional information attacks.

Highlights

  • When DNA strand displacement (DSD)-Figure 3(a) is chosen for encryption, the DNA substrate involved in the reaction can be used as the key, but not all sequences on the substrate can be chosen at random to be the key

  • Scheme Description. e encryption scheme is divided into two parts: encryption at the level of chaotic maps and encryption at the level of DNA strand displacement (DSD)

  • A 256 × 256 gray image “Lena” is the plaintext image, and the above chaotic maps and DSD-based encryption rules are used to encrypt it. e initial values x0, y0, z0, and w0 of Lorenz hyperchaotic map are set to 1.1, 2.2, 3.3, and 4.4, and x0, y0, z0 of Lorenz chaotic map are set to 10, 1, and 0. e simulation results are realized by MATLAB R2014a; the operating system of computer is Windows 10, as shown in Figure 8. e encryption steps are reversible

Read more

Summary

Introduction

When DSD-Figure 3(a) is chosen for encryption, the DNA substrate involved in the reaction can be used as the key, but not all sequences on the substrate can be chosen at random to be the key. Due to the pseudorandom of chaotic sequences, we use the matrices Lym and Lzm in Step 4 to generate the keys required by DSD-based encryption rules.

Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call