4.6 Article

A novel image encryption scheme based on DNA sequence operations and chaotic systems

期刊

NEURAL COMPUTING & APPLICATIONS
卷 31, 期 1, 页码 219-237

出版社

SPRINGER LONDON LTD
DOI: 10.1007/s00521-017-2993-9

关键词

Image encryption; DNA encoding; DNA sequence operation; Chaotic system; 2D-LASM

资金

  1. National Natural Science Foundation of China [41571417, U1604145]
  2. Natural Science Foundation of the United States [CNS-1253424, ECCS-1202225]
  3. Science and Technology Foundation of Henan Province of China [152102210048]
  4. Foundation and Frontier Project of Henan Province of China [162300410196]
  5. China Postdoctoral Science Foundation [2016M602235]
  6. Natural Science Foundation of Educational Committee of Henan Province of China [14A413015]
  7. Research Foundation of Henan University [xxjc20140006]

向作者/读者索取更多资源

In the paper, a novel image encryption algorithm based on DNA sequence operations and chaotic systems is proposed. The encryption architecture of permutation and diffusion is adopted. Firstly, 256-bit hash value of the plain image is gotten to calculate the initial values and system parameters of the 2D Logistic-adjusted-Sine map (2D-LASM) and a new 1D chaotic system; thus, the encryption scheme highly depends on the original image. Next, the chaotic sequences from 2D-LASM are used to produce the DNA encoding/decoding rule matrix, and the plain image is encoded into a DNA matrix according to it. Thirdly, DNA level row permutation and column permutation are performed on the DNA matrix of the original image, inter-DNA-plane permutation and intra-DNA-plane permutation can be attained simultaneously, and then, DNA XOR operation is performed on the permutated DNA matrix using a DNA key matrix, and the key matrix is produced by the combination of two 1D chaotic systems. Finally, after decoding the confused DNA matrix, the cipher image is obtained. Experimental results and security analyses demonstrate that the proposed scheme not only has good encryption effect, but also is secure enough to resist against the known attacks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据