Abstract
The image encryption schemes combining chaotic maps, DNA coding, and DNA sequence operation can effectively protect the image. In this paper, a double-layer image encryption scheme is proposed by combining chaotic maps with DNA strand displacement (DSD). Chaotic maps are used to generate pseudorandom sequences and perform routine scrambling and diffusion operations on the plaintext image. We propose three DSD-based encryption rules according to the diversity of DNA strand displacement, and these three encryption rules are used to encrypt the image at the DNA sequence level. The plaintext image can be transformed into the cipher image, which is difficult to be recognized without the correct keys through the double-layer encryption at the level of chaotic maps and DNA. Simulation results and security analysis show that the proposed encryption scheme can effectively protect image information and resist conventional information attacks.
Highlights
When DNA strand displacement (DSD)-Figure 3(a) is chosen for encryption, the DNA substrate involved in the reaction can be used as the key, but not all sequences on the substrate can be chosen at random to be the key
Scheme Description. e encryption scheme is divided into two parts: encryption at the level of chaotic maps and encryption at the level of DNA strand displacement (DSD)
A 256 × 256 gray image “Lena” is the plaintext image, and the above chaotic maps and DSD-based encryption rules are used to encrypt it. e initial values x0, y0, z0, and w0 of Lorenz hyperchaotic map are set to 1.1, 2.2, 3.3, and 4.4, and x0, y0, z0 of Lorenz chaotic map are set to 10, 1, and 0. e simulation results are realized by MATLAB R2014a; the operating system of computer is Windows 10, as shown in Figure 8. e encryption steps are reversible
Summary
When DSD-Figure 3(a) is chosen for encryption, the DNA substrate involved in the reaction can be used as the key, but not all sequences on the substrate can be chosen at random to be the key. Due to the pseudorandom of chaotic sequences, we use the matrices Lym and Lzm in Step 4 to generate the keys required by DSD-based encryption rules.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.