Abstract

An image encryption technique has been proposed using deoxyribonucleic acid (DNA) operations and chaotic map in this scheme. First, initial conditions of row encryption and column encryption are calculated. Then, a two-dimensional sine iterative chaotic map with infinite collapse (ICMIC) modulation map (2D-SIMM) is adopted to produce chaotic sequences. Extended exclusive OR (XOR) is executed to enhance security. A mask matrix is produced by 2D-SIMM. It performs XOR operation with the DNA-encoded matrix. Finally, the revised DNA-encoded matrix is performed two-by-two DNA complementary rules and executed DNA decoding to obtain the cipher image. Experiment results prove that the proposed scheme is secure enough and can resist various attacks.

Highlights

  • Many image encryption methods have been proposed

  • Chen et al.4 put forward an image encryption algorithm based on gray code

  • Liu et al.6 proposed a double image encryption method based on random pixel exchanging and phase encoding in gyrator domains

Read more

Summary

Introduction

Many image encryption methods have been proposed. The diffusion and confusion operations that are proposed by Shannon in cryptography are used in image encryption. Chen et al. put forward an image encryption algorithm based on gray code The chaotic map is highly sensitive to initial values and system parameters, unpredictable, pseudorandom, and ergodic.5 It is very suitable for an image encryption system. Liu et al. proposed a double image encryption method based on random pixel exchanging and phase encoding in gyrator domains. Mao et al. presented a fast image encryption method, which was based on three-dimensional chaotic baker maps. Wang et al. presented an efficient image encryption scheme using a two-step phase-shifting interference method, in fractional Fourier transform and random mixed encoding. Zhen et al. presented an image encryption scheme based on chaotic sequence, DNA encoding, and entropy. Rehman et al. proposed a method that was based on chaos and DNA complementary rules for gray images.

Two-Dimensional Sine ICMIC Modulation Map
Random Number Generation
Deoxyribonucleic Acid Operations
Improved Expanded XOR Operation
Secret Key and Random Number Generation
Row encryption
Column encryption
DNA-Level Encryption
Simulation Results
Key Space and Sensitivity Analysis
Histogram Analysis
Correlation Analysis
Information Entropy
Differential Attack
Noise Attack
Known-Plaintext and Chosen-Plaintext Attacks
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.