4.6 Article

A novel image encryption scheme based on DNA sequence operations and chaotic systems

Journal

NEURAL COMPUTING & APPLICATIONS
Volume 31, Issue 1, Pages 219-237

Publisher

SPRINGER LONDON LTD
DOI: 10.1007/s00521-017-2993-9

Keywords

Image encryption; DNA encoding; DNA sequence operation; Chaotic system; 2D-LASM

Funding

  1. National Natural Science Foundation of China [41571417, U1604145]
  2. Natural Science Foundation of the United States [CNS-1253424, ECCS-1202225]
  3. Science and Technology Foundation of Henan Province of China [152102210048]
  4. Foundation and Frontier Project of Henan Province of China [162300410196]
  5. China Postdoctoral Science Foundation [2016M602235]
  6. Natural Science Foundation of Educational Committee of Henan Province of China [14A413015]
  7. Research Foundation of Henan University [xxjc20140006]

Ask authors/readers for more resources

In the paper, a novel image encryption algorithm based on DNA sequence operations and chaotic systems is proposed. The encryption architecture of permutation and diffusion is adopted. Firstly, 256-bit hash value of the plain image is gotten to calculate the initial values and system parameters of the 2D Logistic-adjusted-Sine map (2D-LASM) and a new 1D chaotic system; thus, the encryption scheme highly depends on the original image. Next, the chaotic sequences from 2D-LASM are used to produce the DNA encoding/decoding rule matrix, and the plain image is encoded into a DNA matrix according to it. Thirdly, DNA level row permutation and column permutation are performed on the DNA matrix of the original image, inter-DNA-plane permutation and intra-DNA-plane permutation can be attained simultaneously, and then, DNA XOR operation is performed on the permutated DNA matrix using a DNA key matrix, and the key matrix is produced by the combination of two 1D chaotic systems. Finally, after decoding the confused DNA matrix, the cipher image is obtained. Experimental results and security analyses demonstrate that the proposed scheme not only has good encryption effect, but also is secure enough to resist against the known attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available