Abstract

Hundreds of image encryption algorithms have been developed for the security and integrity of images through the combination of DNA computing and chaotic maps. This combination of the two instruments is not sufficient enough to thwart the potential threats from the cryptanalysis community as the literature review suggests. To inject more robustness and security stuff, a novel image encryption scheme has been written in this research by fusing the chaotic system, DNA computing and Castle—a chess piece. As the plain image is input, its pixels are shifted to the scrambled image at the randomly chosen pixel addresses. This scrambling has been realized through the routine called Image Scrambler using Castle (ISUC). Castle randomly moves on the hypothetical large chessboard. Pixels taken from the plain image are shifted to the addresses of the scrambled image, where Castle lands in each iteration. After the plain image is scrambled, it is DNA encoded. Two mask images are also DNA encoded. Then to throw the diffusion effects in the cipher, DNA Addition and DNA XOR operations between the DNA encoded pixels data and the DNA encoded mask images have been conducted. Next, the pixels data are converted back into their decimal equivalents. Four dimensional chaotic system has been used to get the chaotic vectors. The hash codes given by the SHA-256 function have been used in the cipher to introduce the plaintext sensitivity in its design. We got an information entropy of 7.9974. Simulation carried out through the machine, and the thorough security analyses demonstrate the good security effects, defiance to the varied attacks from the cryptanalysis community, and the bright prospects for some real world application of the proposed image cipher.

Highlights

  • T HE science and art of cryptography is as old as the human civilization itself

  • To ignite the chaotic system for the generation of the streams of random numbers, these system parameters and initial values have been given to it: x0 = 17, y0 = 25, z0 = 118, w0 = 5, a = −10, b = 3, c = −1, d = −2, b1 = 1, b2 = −1, b3 = 1 and b4 = 1

  • The plain images have been successfully retrieved after applying the decryption algorithm over the the encrypted images

Read more

Summary

INTRODUCTION

T HE science and art of cryptography is as old as the human civilization itself. As the societies grew, tribes of human beings started to be organized into different kingdoms. The results showed that their scheme was secured enough to avert the varied attacks An another algorithm for the images encryption based on fractional Fourier transformation, chaotic map and DNA was given by [20]. Scheme given in [30] was cracked by the chosen-plaintext attack [31] Cause of this breakage was that the chaotic vectors produced were independent of the input plain image for encryption. In an other cryptanalysis work [34], an image cipher consisting of chaotic system and DNA technology [35] was broken This scheme was again cracked by the chosen plaintext attack over it. The DNA encoding rules have been dynamically applied over the pixels These rules have been figured out from the pixels data instead of the random vectors given by the chaotic map.

BUILDING BLOCKS
CASTLE
SIMULATION RESULTS
PERFORMANCE AND SECURITY ANALYSES
KEY SPACE
KEY SENSITIVITY
STATISTICAL ANALYSIS
INFORMATION ENTROPY ANALYSIS
LOCAL SHANNON ENTROPY
Result
PSNR ANALYSIS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call