Symmetric keys image encryption and decryption using 3D chaotic maps with DNA encoding technique

2020 ◽  
Vol 79 (43-44) ◽  
pp. 31739-31757
Author(s):  
Sakshi Patel ◽  
Bharath K P ◽  
Rajesh Kumar M
Author(s):  
K. Abhimanyu Kumar Patro ◽  
Shashwat Soni ◽  
V. K. Sharma ◽  
Bibhudendra Acharya

2019 ◽  
Vol 29 (08) ◽  
pp. 1950103 ◽  
Author(s):  
Kirtee Panwar ◽  
Ravindra Kumar Purwar ◽  
Anchal Jain

This paper presents cryptanalysis of a color image encryption scheme. DNA encoding and multiple 1D chaotic maps are used in the encryption process which increases its computational speed. The key streams generated in this scheme are dependent on secret keys, updated using the sum of pixel intensities of plain image of size [Formula: see text]. This paper analyzes the security of encryption scheme against the chosen plaintext attack and finds that only [Formula: see text] different key matrices for diffusion are possible, an equivalent version of which can be revealed with [Formula: see text] chosen plain images. Experimental results are presented to prove that equivalent diffusion keys and block permutation sequence can be effectively revealed through the attack. In addition, low sensitivity of keys towards changes in plaintext along with insecure diffusion process involved in encryption process is also reported. Finally, to remedy the shortcomings of the original encryption scheme, an enhanced encryption scheme is generated that can resist chosen/known plaintext attack while maintaining the merits of the original encryption scheme.


2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Jian Zhang ◽  
DongXin Fang ◽  
Honge Ren

We propose a new image encryption algorithm based on DNA sequences combined with chaotic maps. This algorithm has two innovations: (1) it diffuses the pixels by transforming the nucleotides into corresponding base pairs a random number of times and (2) it confuses the pixels by a chaotic index based on a chaotic map. For any size of the original grayscale image, the rows and columns are fist exchanged by the arrays generated by a logistic chaotic map. Secondly, each pixel that has been confused is encoded into four nucleotides according to the DNA coding. Thirdly, each nucleotide is transformed into the corresponding base pair a random number of time(s) by a series of iterative computations based on Chebyshev’s chaotic map. Experimental results indicate that the key account of this algorithm is 1.536 × 10127, the correlation coefficient of a 256 × 256 Lena image between, before, and after the encryption processes was 0.0028, and the information entropy of the encrypted image was 7.9854. These simulation results and security analysis show that the proposed algorithm not only has good encryption effect, but also has the ability to repel exhaustive, statistical, differential, and noise attacks.


Author(s):  
K Aditya ◽  
Ashish K Mohanty ◽  
G Aravinth Ragav ◽  
V Thanikaiselvan ◽  
R Amirtharajan

2021 ◽  
pp. 1-17
Author(s):  
P. Alli ◽  
J. Dinesh Peter

The day-to-day progress in communication plays a vital role in transmitting millions and trillions of data through the unsecured network channels. It creates a way where the user’s data becomes the victim of various security threats. Among those users’ data, images act as primary data, and its encryption security methodologies are fascinating. The conventional encryption techniques don’t work well against the various other hidden security threats but require substantial computational time and cost with poor permutation performance. Hence to deal with this, an auto-encoder induced DNA (Deoxyribonucleic acid) sequence via chaotic image encryption framework is designed in our proposed work. It integrates the properties of DNA encoding and the chaotic maps to handle the data losses effectively and resist several attacks such as statistical attacks, chosen-plaintext attacks, etc. Moreover, an auto-encoder is used to control the data noises, thereby ensuring a better encryption performance. Here, the auto-encoder is activated to generate a permuted image with less time complexity and noise. A secret key is then initialized with the aid of SHA-256. Finally, image encryption and decryption are achieved, followed by the successful transmission of data over a digital network. The performance of the proposed work is analyzed with varied metrics to strengthen its efficiency over the prior techniques.


Sign in / Sign up

Export Citation Format

Share Document