4.7 Article

Multiple-image encryption algorithm based on the 3D scrambling model and dynamic DNA coding

Journal

OPTICS AND LASER TECHNOLOGY
Volume 141, Issue -, Pages -

Publisher

ELSEVIER SCI LTD
DOI: 10.1016/j.optlastec.2021.107073

Keywords

Scrambling model; Zigzag transformation; Chaotic system; DNA; Multiple-image encryption (MIE)

Funding

  1. Assistance Program for Future Outstanding Talents of China University of Mining and Technology [2020WLJCRCZL025]
  2. Postgraduate Research & Practice Innovation Program of Jiangsu Province [SJCX20_0812]

Ask authors/readers for more resources

The paper proposed a multiple-image encryption algorithm based on a three-dimensional scrambling model and dynamic DNA coding. Experimental results showed that the algorithm has advantages such as large encryption capacity, high encryption efficiency, and strong ability to resist attacks.
Lots of digital images from different fields distributed in Internet are exposed to various risks, such as the content leakage, illegal access and use. To solve the problems of weak security, insufficient encryption capacity and low encryption efficiency, this paper proposes a multiple-image encryption (MIE) algorithm based on the threedimensional (3D) scrambling model and dynamic DNA coding. Firstly, this paper designs a generalized Zigzag transformation and establishes the 3D scrambling model based on the dimensionality reduction; secondly, multiple plain images are combined into 3D image cube, and the scrambled images can be obtained by the established 3D scrambling model; thirdly, the chaotic sequences are used to perform the dynamic DNA coding and DNA operations on the scrambled images; finally, dynamic DNA decoding operation is performed to obtain the final encryption image. Experimental results and algorithm analyses show that the proposed algorithm has the advantages of large encryption capacity, high encryption efficiency, large key space, high key sensitivity, strong ability to resist the statistical attack, the brute-force attack, the chosen-plaintext attack, etc. Therefore, the proposed algorithm can play a great role in the security of batch image data with high security requirements and large data volume.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available