×

A novel image encryption scheme based on 2-D logistic map and DNA sequence operations. (English) Zbl 1441.94028

Summary: This paper proposes a novel image encryption scheme based on DNA sequence operations and chaotic system. Firstly, two-dimensional logistic chaotic map is employed to modify each pixel of the image, and then, the DNA encoding rules are adopted to encode and generate a DNA matrix. Secondly, pseudo-random sequences generated by two-dimensional logistic map are transformed into another DNA matrix. Thirdly, DNA addition, subtraction and complementary rules are used to control the operations between two DNA matrices for obtaining the ciphered results. Finally, the ciphered image is obtained by decoding the DNA matrix formulations into binary formulations. Experimental results and theoretical analysis show that the scheme is extraordinarily high secure to resist various attacks.

MSC:

94A08 Image processing (compression, reconstruction, etc.) in information and communication theory
92D20 Protein sequences, DNA sequences
Full Text: DOI

References:

[1] Gao, T.G., Chen, Z.Q.: Image encryption based on a new total shuffling algorithm. Chaos Solitons Fractals 38(1), 213-220 (2008) · Zbl 1142.94310 · doi:10.1016/j.chaos.2006.11.009
[2] Pisarchik, A.N., Zanin, M.: Image encryption with chaotically coupled chaotic maps. Phys. Lett. A 237(20), 2645-2652 (2008) · Zbl 1220.94044
[3] Chen, W.M., Lai, C.J., Wang, H.C., Chao, H.C., Lo, C.H.: H.264 video watermarking with secret image sharing. IET Image Process. 5(4), 349-354 (2011) · doi:10.1049/iet-ipr.2009.0362
[4] Liu, H.J., Wang, X.Y.: Triple-image encryption scheme based on one-time key stream generated by chaos and plain image. J. Syst. Softw. 86(3), 826-834 (2013) · doi:10.1016/j.jss.2012.11.026
[5] Gao, H.J., Zhang, Y.S., Liang, S.Y., Li, D.Q.: A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29(2), 393-399 (2006) · Zbl 1096.94006 · doi:10.1016/j.chaos.2005.08.110
[6] Zhang, W., Wong, K.W., Yu, H., Zhu, Z.L.: An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun. Nonlinear Sci. Numer. Simul. 18(8), 2066-2080 (2013) · Zbl 1321.94099 · doi:10.1016/j.cnsns.2012.12.012
[7] Yang, H.Q., Wong, K.W., Liao, X.F., Zhang, W., Wei, P.C.: A fast image encryption and authentication scheme based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 15(11), 3507-3517 (2010) · Zbl 1222.94043 · doi:10.1016/j.cnsns.2010.01.004
[8] Matthes, R.: On the derivation of a Chaotic Encryption algorithm. Cryptologia 13(1), 29-42 (1989) · doi:10.1080/0161-118991863745
[9] Wheeler, D.D.: Problems with chaotic cryptosystems. Cryptologia 7(11), 243-250 (1991)
[10] Bigdeli, N., Farid, Y., Afshar, K.: A novel image encryption/decryption scheme based on chaotic neural networks. Eng. Appl. Artif. Intell. 25(4), 753-765 (2012) · doi:10.1016/j.engappai.2012.01.007
[11] Liao, X.F., Lai, S.Y., Zhou, Q.: A novel image encryption algorithm based on self-adaptive wave transmission. Sig. Process. 90(9), 2714-2722 (2010) · Zbl 1194.94108 · doi:10.1016/j.sigpro.2010.03.022
[12] Ren, X.X., Liao, X.F., Xiong, Y.H, Y.: New image encryption algorithm based on cellular neural network. J. Comput. Appl. 31(6), 1528-1530 (2011)
[13] Wang, X.Y., Yang, L., Liu, R., Kadir, A.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62(3), 615-621 (2010) · Zbl 1209.94015 · doi:10.1007/s11071-010-9749-8
[14] Rhouma, R., Soumaya, M., Safya, B.: CML-based color image encryption. Chaos Solitons Fractals 40(1), 309-318 (2009) · Zbl 1197.94011 · doi:10.1016/j.chaos.2007.07.083
[15] Sahar, M., Amir, M.E.: Color image encryption based on coupled nonlinear chaotic map. Chaos Solitons Fractals 42(3), 1745-1754 (2009) · Zbl 1198.94032 · doi:10.1016/j.chaos.2009.03.084
[16] Liu, H.J., Wang, X.Y.: Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 59(10), 3320-3327 (2010) · Zbl 1198.94109 · doi:10.1016/j.camwa.2010.03.017
[17] Head, T., Rozenberg, G., Bladergroen, R.S., Breek, C.K.D., Lommerse, P.H.M., Spaink, H.P.: Computing with DNA by operating on plasmids. Biosystems 57(2), 87-93 (2000)
[18] Zheng, X.D., Xu, J., Li, W.: DNA arithmetic operation based on n-moduli set. Appl. Math. Comput. 212(1), 177-184 (2009) · Zbl 1168.65343 · doi:10.1016/j.amc.2009.02.011
[19] Zhang, Q., Guo, L., Wei, X.P.: Image encryption using DNA addition combining with chaotic maps. Math. Comput. Model. 52(11-12), 2028-2035 (2010) · Zbl 1207.94068 · doi:10.1016/j.mcm.2010.06.005
[20] Zhang, Q., Wang, Q., Wei, X.P.: A novel image encryption scheme based on DNA coding and multi-chaotic maps. Adv. Sci. Lett. 3(4), 447-451 (2010) · doi:10.1166/asl.2010.1170
[21] Liu, H.J., Wang, X.Y., kadir, A.: Image encryption using DNA complementary rule and chaotic maps. Appl. Soft Comput. 12(5), 1457-1466 (2012) · doi:10.1016/j.asoc.2012.01.016
[22] Wei, X.P., Guo, L., Zhang, Q., Zhang, J.X., Lian, S.G.: A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J. Syst. Softw. 85(2), 290-299 (2012) · doi:10.1016/j.jss.2011.08.017
[23] Zhang, Q., Xue, X.L., Wei, X.P.: A novel image encryption algorithm based on DNA subsequence operation. Sci. World J. 2012, 286741 (2012)
[24] Liu, H.J., Wang, X.Y., Kadir, A.: Image encryption using DNA complementary rule and chaotic maps. Appl. Soft Comput. 12(5), 1457-1466 (2012) · Zbl 1197.94011
[25] SaberiKamarposhti, M., AlBedawi, I., Mohamad, D.: A new hybrid method for image encryption using DNA sequence and chaotic logistic map. Aust. J. Basic Appl. Sci. 2012, 371-380 (2012)
[26] Zhang, X.Q., Zhu, G.L., Ma, S.L.: Remote-sensing image encryption in hybrid domains. Opt. Commun. 285(7), 1736-1743 (2012) · doi:10.1016/j.optcom.2011.12.023
[27] Watson, J.D., Crick, F.H.C.: A structure for deoxyribose nucleic acid. Nature 171(4356), 737-738 (1953) · doi:10.1038/171737a0
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.