4.6 Article

A Dynamic DNA Color Image Encryption Method Based on SHA-512

Journal

ENTROPY
Volume 22, Issue 10, Pages -

Publisher

MDPI
DOI: 10.3390/e22101091

Keywords

color image encryption; DNA coding; two rounds of permutation– diffusion; SHA-512

Funding

  1. National Key R&D Program of China [2018YFC0910500]
  2. National Natural Science Foundation of China [61425002, 61751203, 61772100, 61972266, 61802040, 61672121, 61572093]
  3. Program for Changjiang Scholars and Innovative Research Team in University [IRT_15R07]
  4. Program for Liaoning Innovative Research Team in University [LT2017012]
  5. Natural Science Foundation of Liaoning Province [20180551241, 2019-ZD-0567]
  6. High-level Talent Innovation Support Program of Dalian City [2017RQ060, 2018RQ75]
  7. Dalian Outstanding Young Science and Technology Talent Support Program [2017RJ08]
  8. Scientific Research Fund of Liaoning Provincial Education Department [JYT19051]

Ask authors/readers for more resources

This paper presents a dynamic deoxyribonucleic acid (DNA) image encryption based on Secure Hash Algorithm-512 (SHA-512), having the structure of two rounds of permutation-diffusion, by employing two chaotic systems, dynamic DNA coding, DNA sequencing operations, and conditional shifting. We employed the SHA-512 algorithm to generate a 512-bit hash value and later utilized this value with the natural DNA sequence to calculate the initial values for the chaotic systems and the eight intermittent parameters. We implemented a two-dimensional rectangular transform (2D-RT) on the permutation. We used four-wing chaotic systems and Lorentz systems to generate chaotic sequences and recombined three channel matrices and chaotic matrices with intermittent parameters. We calculated hamming distances of DNA matrices, updated the initial values of two chaotic systems, and generated the corresponding chaotic matrices to complete the diffusion operation. After diffusion, we decoded and decomposed the DNA matrices, and then scrambled and merged these matrices into an encrypted image. According to experiments, the encryption method in this paper not only was able to withstand statistical attacks, plaintext attacks, brute-force attacks, and a host of other attacks, but also could reduce the complexity of the algorithm because it adopted DNA sequencing operations that were different from traditional DNA sequencing operations.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available