Abstract

We present a novel image encryption algorithm based on DNA subsequence operation. Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image. The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.

Highlights

  • Nowadays, the computer network has changed the mode of people’s communication

  • Based on the above DNA subsequence expression, we described the following five kinds of DNA subsequence operation; they are elongation operation, truncation operation, deletion operation, insertion operation, and transformation operation

  • A novel image encryption algorithm based on DNA subsequence operation is proposed in this paper

Read more

Summary

A Novel Image Encryption Algorithm Based on DNA Subsequence Operation

Key Laboratory of Advanced Design and Intelligent Computing, Ministry of Education of Dalian University, Dalian 116622, China. We present a novel image encryption algorithm based on DNA subsequence operation. Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image. The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key’s space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack

Introduction
Basic Theory of the Proposed Algorithm
DNA Sequence Encryption
Algorithm Description
Generation of DNA Subsequences
Deletion Operation
Transformation Operation
Simulation Result and Security Analysis
Statistical Analysis
Method
Comparison with Other Encryption Algorithms
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.