scholarly journals A New Beta Chaotic Map with DNA Encoding for Color Image Encryption

2020 ◽  
pp. 2371-2384
Author(s):  
Sarab M. Hameed ◽  
Ibtisam A. Taqi

Images hold important information, especially in military and commercial surveillance as well as in industrial inspection and communication. Therefore, the protection of the image from abuse, unauthorized access, and damage became a significant demand. This paper introduces a new Beta chaotic map for encrypting and confusing the color image with Deoxyribonucleic Acid (DNA) sequence. First, the DNA addition operation is used for diffusing each component of the plain image. Then, a new Beta chaotic map is used for shuffling the DNA color image. In addition, two chaotic maps, namely the proposed new Beta and Sine chaotic maps, are used for key generation. Finally, the DNA XOR operation is applied between the generated key and shuffled DNA image to produce the cipher image.  The experimental results prove that the proposed method surpassed the other methods in terms of Mean Square Error (MSE), Peak Signal-To-Noise Ratio (PSNR), entropy, and correlation coefficient.

2017 ◽  
Vol 28 (05) ◽  
pp. 1750069 ◽  
Author(s):  
Xiuli Chai ◽  
Zhihua Gan ◽  
Yang Lu ◽  
Yiran Chen ◽  
Daojun Han

A novel image encryption algorithm using the chaotic system and deoxyribonucleic acid (DNA) computing is presented. Different from the traditional encryption methods, the permutation and diffusion of our method are manipulated on the 3D DNA matrix. Firstly, a 3D DNA matrix is obtained through bit plane splitting, bit plane recombination, DNA encoding of the plain image. Secondly, 3D DNA level permutation based on position sequence group (3DDNALPBPSG) is introduced, and chaotic sequences generated from the chaotic system are employed to permutate the positions of the elements of the 3D DNA matrix. Thirdly, 3D DNA level diffusion (3DDNALD) is given, the confused 3D DNA matrix is split into sub-blocks, and XOR operation by block is manipulated to the sub-DNA matrix and the key DNA matrix from the chaotic system. At last, by decoding the diffused DNA matrix, we get the cipher image. SHA 256 hash of the plain image is employed to calculate the initial values of the chaotic system to avoid chosen plaintext attack. Experimental results and security analyses show that our scheme is secure against several known attacks, and it can effectively protect the security of the images.


2021 ◽  
Author(s):  
Ahmad Pourjabbar Kari ◽  
Ahmad Habibizad Navin ◽  
Amir Massoud Bidgoli ◽  
Mirkamal Mirnia

Abstract This paper introduces a new multi-image cryptosystem based on modified Henon map and nonlinear combination of chaotic seed maps. Based on the degree of correlation between the adjacent pixels of the plain image, a unique weight is assigned to the plain image. First, the coordinates of plain images are disrupted by modified Henon map as confusion phase. In the first step of diffusion phase, the pixels content of images are changed separately by XOR operation between confused images and matrices with suitable nonlinear combination of seed maps sequences. These combination of seed maps are selected depending on the weight of plain images as well as bifurcation properties of mentioned chaotic maps. After concatenating the matrices obtained from the first step of diffusion phase, the bitwise XOR operation is applied between newly developed matrix and the other produced matrix from the chaotic sequences of the Logistic-Tent-Sine hybrid system, as second step of diffusion phase. The encrypted image is obtained after applying shift and exchange operations. The results of the implementation using graphs and histograms show that the proposed scheme, compared to some existing methods, can effectively resist common attacks and can be used as a secure method for encrypting digital images.


2019 ◽  
Vol 2019 ◽  
pp. 1-13
Author(s):  
Haidar Raad Shakir

This paper proposes a method of encrypting images with password protection for secure sharing based on deoxyribonucleic acid (DNA) sequence operations and the tangent-delay ellipse reflecting the cavity-map system (TD-ERCS). The initial values of the TD-ERCS system are generated from a user’s password, and the TD-ERCS system is used to scramble the pixel locations of the R, G, and B matrices of the original image. Next, three DNA-sequence matrices are generated by encoding the permuted color image such that it can be transformed into three matrices. Then, the TD-ERCS system is employed to generate three chaotic sequences before encoding the DNA into the three matrices. Thereafter, a DNA exclusive OR (XOR) operation is executed between the DNA sequences of the permuted image and the DNA sequences generated by the TD-ERCS system to produce three encrypted scrambled matrices. Finally, the matrices of the DNA sequences are decoded, and the R, G, and B channels are recombined to form an encrypted color image. The results of simulation and security tests reveal that the proposed algorithm offers robust encryption and demonstrates the ability to resist exhaustive, statistical, and differential attacks.


2019 ◽  
Vol 29 (08) ◽  
pp. 1950103 ◽  
Author(s):  
Kirtee Panwar ◽  
Ravindra Kumar Purwar ◽  
Anchal Jain

This paper presents cryptanalysis of a color image encryption scheme. DNA encoding and multiple 1D chaotic maps are used in the encryption process which increases its computational speed. The key streams generated in this scheme are dependent on secret keys, updated using the sum of pixel intensities of plain image of size [Formula: see text]. This paper analyzes the security of encryption scheme against the chosen plaintext attack and finds that only [Formula: see text] different key matrices for diffusion are possible, an equivalent version of which can be revealed with [Formula: see text] chosen plain images. Experimental results are presented to prove that equivalent diffusion keys and block permutation sequence can be effectively revealed through the attack. In addition, low sensitivity of keys towards changes in plaintext along with insecure diffusion process involved in encryption process is also reported. Finally, to remedy the shortcomings of the original encryption scheme, an enhanced encryption scheme is generated that can resist chosen/known plaintext attack while maintaining the merits of the original encryption scheme.


2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Jian Zhang ◽  
DongXin Fang ◽  
Honge Ren

We propose a new image encryption algorithm based on DNA sequences combined with chaotic maps. This algorithm has two innovations: (1) it diffuses the pixels by transforming the nucleotides into corresponding base pairs a random number of times and (2) it confuses the pixels by a chaotic index based on a chaotic map. For any size of the original grayscale image, the rows and columns are fist exchanged by the arrays generated by a logistic chaotic map. Secondly, each pixel that has been confused is encoded into four nucleotides according to the DNA coding. Thirdly, each nucleotide is transformed into the corresponding base pair a random number of time(s) by a series of iterative computations based on Chebyshev’s chaotic map. Experimental results indicate that the key account of this algorithm is 1.536 × 10127, the correlation coefficient of a 256 × 256 Lena image between, before, and after the encryption processes was 0.0028, and the information entropy of the encrypted image was 7.9854. These simulation results and security analysis show that the proposed algorithm not only has good encryption effect, but also has the ability to repel exhaustive, statistical, differential, and noise attacks.


2014 ◽  
Vol 65 (2) ◽  
pp. 90-96 ◽  
Author(s):  
Xiaopeng Wei ◽  
Bin Wang ◽  
Qiang Zhang ◽  
Chao Che

Abstract In recent years, there has been growing interesting in image encryption based on chaotic maps and wavelet transform. In this paper, a novel scheme for image encryption based on chaotic maps and reversible integer wavelet transform is proposed. Firstly, the cipher key which is related to plain-image is used to generate different parameters and initial values of chaotic maps. Then the plain-image is permuted by the order from chaotic maps, and processed by integer wavelet transform. A part of transform coefficient is diffused by the orbits of chaotic maps. Finally, the cipher image is obtained by inverse integer wavelet transform based on the diffused coefficient. Numerical experimental results and comparing with previous works show that the proposed scheme possesses higher security than previous works, which is suitable for protecting the image information.


2019 ◽  
Vol 9 (22) ◽  
pp. 4854
Author(s):  
Li-Lian Huang ◽  
Shi-Ming Wang ◽  
Jian-Hong Xiang

This paper proposes a novel tweak-cube color image encryption scheme jointly manipulated by chaos and hyper-chaos. One-dimensional (1D) chaotic maps are effortless to operate, but the key space is relatively small. The hyperchaotic system has complex dynamics properties, which are capable of compensating for the defects of 1D chaotic maps. Thus, we first raise an improved 1D chaotic map with an increased key space. Then, we associate it with a four-dimensional (4D) hyperchaotic system to generate the key streams and further rotate and shift the rows and columns of each component of Red (R), Green (G), and Blue (B) for the color image. The permuting mode is to disturb the original position of the pixels by mimicking the way of twisting the Rubik’s cube. Moreover, the key stream updated by the plain images is also utilized for diffusion and scramble at the bit level. As a consequence, our cryptosystem enhances the security without at the expense of increasing time cost.


2019 ◽  
Vol 14 (2) ◽  
pp. 152-157 ◽  
Author(s):  
Majdi Al-qdah

Background: This paper presents an image security system by combining bit rotation with block based chaotic maps cryptography. Methods: The system uses permutation technique that divides the image into blocks before applying right/left rotation of bits to the pixel values based on a randomly generated key. Then, the image blocks are fused together. A scrambling operation followed by chaotic map is applied on the rotated image to diffuse the image pixels using another randomly generated key. The chaotic map scatters all the pixel positions in the image. The decryption is the complete reversal operation of the encryption process. Results & Conclusion: The performance of the proposed technique is evaluated using several metrics: Histograms of both original and cipher images, correlation of adjacent pixels and correlation between the original and cipher images, Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI), Mean Square Error (MSE), and Peak Signal to Noise Ratio (PSNR). The results indicate a very secure technique to protect all types of images.


2019 ◽  
Vol 8 (4) ◽  
pp. 1615-1629

Document imaging is one of the most important technology used to preserve, retrieve and to transmit old documents over the internet. Since open network threatens the security of such documents from being intercepted, the proposed scheme intends to provide enhanced security for such documents. The proposed hybrid algorithm includes Elliptic Curve Cryptography (ECC), and mixed chaotic system. The ECC encrypts the plain image based on the elliptic points generated by selecting a prime number. The mixed chaotic map includes twodimensional logistic map and three-dimensional Lorenz map. The 2D logistic map is used for confusing the ECC encrypted image and 3D Lorenz map is used for diffusing the confused image. The two levels of confusion, first with byte level and second with bit level are introduced. The two levels of diffusion, first level with Lorenz map and second level with Fibonacci sequences are introduced. Better net pixel change rate and unified average change intensity with flat histogram and low correlation are achieved in this method. The key Sensitivity, Entropy, Mean Square Error, and Peak Signal to Noise Ratio analysis reveal that the proposed method is resistant to any external invasion. The encryption and decryption speed is increased by using programming techniques. The robustness of the algorithm is also checked and found to be robust against noise and loss of information.


Sign in / Sign up

Export Citation Format

Share Document