scholarly journals A Novel Lossless Image Encryption Method using DNA Substitution and Chaotic Logistic Map

2016 ◽  
Vol 10 (2) ◽  
pp. 205-216 ◽  
Author(s):  
Shouvik Chakraborty ◽  
Arindrajit Seal ◽  
Mousomi Roy ◽  
Kalyani Mali
2018 ◽  
Vol 11 (1) ◽  
pp. 15-25
Author(s):  
Jakub Oravec ◽  
Ján Turán ◽  
Ľuboš Ovseník

Abstract This paper proposes an image encryption algorithm which uses four scans of an image during the diffusion stage in order to achieve total diffusion between intensities of image pixels. The condition of total diffusion is fulfilled by a suitable combination of techniques of ciphertext chaining and plaintext related diffusion. The proposed encryption algorithm uses two stages which utilize chaotic logistic map for generation of pseudo-random sequences. The paper also briefly analyzes approaches described by other researchers and evaluates experimental results of the proposed solution by means of commonly used measures. Properties of our proposal regarding modifications of plain images prior to encryption or modifications of encrypted images prior to decryption are illustrated by two additional experiments. The obtained numeric results are compared with those achieved by other proposals and briefly discussed.


2012 ◽  
Vol 241-244 ◽  
pp. 2728-2731
Author(s):  
Yong Zhang

Some chaos-based image encryption schemes using plain-images independent secret code streams have weak encryption security and are vulnerable to chosen plaintext and chosen cipher-text attacks. This paper proposed a two-level secret key image encryption method, where the first-level secret key is the private symmetric secret key, and the second-level secret key is derived from both the first-level secret key and the plain image by iterating piecewise linear map and Logistic map. Even though the first-level key is identical, the different plain images will produce different second-level secret keys and different secret code streams. The results show that the proposed has high encryption speed, and also can effectively resist chosen/known plaintext attacks.


Author(s):  
Kamal Jadidy Aval ◽  
Morteza Sabery Kamarposhty ◽  
Masumeh Damrudi

2012 ◽  
Vol 29 (5) ◽  
pp. 395 ◽  
Author(s):  
MrinalKanti Mandal ◽  
Debashis Nandi ◽  
GourabDutta Banik ◽  
Debasish Chattopadhyay

2006 ◽  
Vol 24 (9) ◽  
pp. 926-934 ◽  
Author(s):  
N.K. Pareek ◽  
Vinod Patidar ◽  
K.K. Sud

Sign in / Sign up

Export Citation Format

Share Document