scholarly journals Chaotic System and DNA Computing operations for Image Encryption Based on Pixels Shuffling

2021 ◽  
Vol 26 (2) ◽  
Author(s):  
Ekhlas K. Gbashi ◽  
Alaa kadhim Farhan

Image encryption is one of the primary approaches which is used to keep image information secure and safe. Recently, image encryption is turning its attention to combination with the field of DNA computing. In the presented study, a novel method of image encryption is suggested and implemented based on the DNA algorithm and Chaos theory, the most important principle in image encryption is breaking the correlation amongst pixels. This algorithm performs well against chosen cipher-text attacks. Furthermore, the proposed approach was implemented and analyzed for the Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI), The performance of the encryption method is analyzed using the histogram, Shannon entropy and key space.

2018 ◽  
Vol 2018 ◽  
pp. 1-6 ◽  
Author(s):  
Hui Ren ◽  
Jun Wang ◽  
Qiong-Hua Wang

We introduce an image encryption method based on computer-generated hologram (CGH) and two-dimensional Sine Logistic modulation map (2D-SLMM). We combine CGH and 2D-SLMM to improve encryption security. During the encryption process, the hologram needs to be logistically modulated by 2D-SLMM. This logistic modulation technique can avoid complex algorithms. Simulation results and security analysis demonstrate that the proposed approach has a high security level, good invisibility of image information in ciphertext, large key space, and strong robustness.


PLoS ONE ◽  
2020 ◽  
Vol 15 (11) ◽  
pp. e0242110
Author(s):  
Dejian Fang ◽  
Shuliang Sun

Image encryption is an effective method for protecting private images during communication. In this paper, a novel image encryption method is proposed based on a 5D hyperchaotic system. Since a 5D hyperchaotic system can generate more complex dynamic behavior than a low-dimensional system, it is used in this paper to generate pseudorandom number sequences. The generated sequences are processed to obtain new sequences. The randomness of the new sequences is improved by recombination and rearrangement. The experimental results and theoretical analysis show that the method possesses a large key space and can resist differential attacks, statistical analysis, entropy analysis, clipping attacks and noise attacks. Therefore, it is very secure and can be used for secure communication.


2013 ◽  
Vol 284-287 ◽  
pp. 2992-2997 ◽  
Author(s):  
Xiao Wei Li ◽  
Dong Hwan Kim ◽  
Sung Jin Cho ◽  
Seok Tae Kim

Three dimensional (3-D) images encryption schemes can provide feasible and secure for images encryption due to the 3-D properties of images. In this paper, we present a novel 3-D images encryption algorithm by combining use of integral imaging (II) and maximum-length cellular automata (MLCA) as the secret key ciphering for 3D image encryption technique. In this proposed algorithm, a lenslet array first decomposes the 3-D object into 2-D elemental images (EIs) via the pick-up process of II. We encrypt the 2-D EIs with an encryption method based on linear and complemented MLCA. Decryption process is the opposite of operation encryption process: The 2-D EIs is recovered by the MLCA key, 3-D object is reconstructed by the recovered EIs via computational integral imaging (CII) reconstruction. To verify the usefulness of the proposed algorithm, we carry out the computational experiments and present the experimental results for various attacks. Experimental results show that the proposed algorithm can improve the performance of encryption against various attacks due to large key space in MLCA and 3-D characteristic of data redundancy.


Entropy ◽  
2018 ◽  
Vol 20 (12) ◽  
pp. 901 ◽  
Author(s):  
Dora Ballesteros ◽  
Jimmy Peña ◽  
Diego Renza

Image encryption methods aim to protect content privacy. Typically, they encompass scrambling and diffusion. Every pixel of the image is permuted (scrambling) and its value is transformed according to a key (diffusion). Although several methods have been proposed in the literature, some of them have been cryptanalyzed. In this paper, we present a novel method that deviates the traditional schemes. We use variable length codes based on Collatz conjecture for transforming the content of the image into non-intelligible audio; therefore, scrambling and diffusion processes are performed simultaneously in a non-linear way. With our method, different ciphered audio is obtained every time, and it depends exclusively on the selected key (the size of the key space equal to 8 . 57 × 10 506 ). Several tests were performed in order to analyze randomness of the ciphered audio signals and the sensitivity of the key. Firstly, it was found that entropy and the level of disorder of ciphered audio signals are very close to the maximum value of randomness. Secondly, fractal behavior was detected into scatter plots of adjacent samples, altering completely the behavior of natural images. Finally, if the key was slightly modified, the image could not be recovered. With the above results, it was concluded that our method is very useful in image privacy protection applications.


Molecules ◽  
2018 ◽  
Vol 23 (8) ◽  
pp. 1878 ◽  
Author(s):  
Bin Wang ◽  
Yingjie Xie ◽  
Shihua Zhou ◽  
Xuedong Zheng ◽  
Changjun Zhou

As a primary method, image encryption is widely used to protect the security of image information. In recent years, image encryption pays attention to the combination with DNA computing. In this work, we propose a novel method to correct errors in image encryption, which results from the uncertainty of DNA computing. DNA coding is the key step for DNA computing that could decrease the similarity of DNA sequences in DNA computing as well as correct errors from the process of image encryption and decryption. The experimental results show our method could be used to correct errors in image encryption based on DNA coding.


2016 ◽  
Vol 2016 ◽  
pp. 1-9 ◽  
Author(s):  
Shihua Zhou ◽  
Bin Wang ◽  
Xuedong Zheng ◽  
Changjun Zhou

Networks have developed very quickly, allowing the speedy transfer of image information through Internet. However, the openness of these networks poses a serious threat to the security of image information. The field of image encryption has drawn attention for this reason. In this paper, the concepts of 1-dimensional DNA cellular automata and T-DNA cellular automata are defined, and the concept of reversible T-DNA cellular automata is introduced. An efficient approach to encryption involving reversible T-DNA cellular automata as an encryption tool and natural DNA sequences as the main keys is here proposed. The results of a simulation experiment, performance analysis, and comparison to other encryption algorithms showed this algorithm to be capable of resisting brute force attacks, statistical attacks, and differential attacks. It also enlarged the key space enormously. It meets the criteria for one-time pad and resolves the problem that one-time pad is difficult to save.


2020 ◽  
Vol 8 (5) ◽  
pp. 1690-1697

The fast and wide development in information technology and data handling has made researchers to be interested in the data confidentiality and to think about finding new and complex methods in data encryption. In this paper, a novel method for encryption is introduced. The idea beyond this proposed method is to take the advantages of the DNA computing and merged it with the concept of the classical transposition cipher by applying the random permutation in order to design this novel encryption method. The emerging DNA computing with the random numbers for transposition produced a highly complex ciphertext that make the task of cryptanalysis more sophisticated and difficult to analyze and break it.


2011 ◽  
Vol 467-469 ◽  
pp. 231-235
Author(s):  
Hong Ye Zhang

An image encryption algorithm based on self-adaptive and chaos theory is presented. The scrambling transformation is completed with Logistic chaos and S-box first. Then self-adaptive image encryption scheme is used to deal with gray transformation for each pixel and image encryption is finished at last. Theoretical analyses and simulated experiment show that the proposed image encryption algorithm provides perfect results, larger key space, simple and easy to be implemented and fast running speed, so this encryption algorithm has excellent performance against many kinds of attacks and has strong practicality.


Entropy ◽  
2020 ◽  
Vol 22 (11) ◽  
pp. 1276
Author(s):  
Khushbu Khalid Butt ◽  
Guohui Li ◽  
Fawad Masood ◽  
Sajid Khan

Several secure image encryption systems have been researched and formed by chaotic mechanisms in current decades. This work recommends an innovative quantum color image encryption method focused on the Lucas series-based substitution box to enhance the competence of encryption. The suggested encryption technique has more excellent key space and significant confidentiality. The chaotic system, along with the substitution box, exhibits additional complicated dynamical behavior, sufficient arbitrariness, and uncertainty than all others focused on just chaotic models. Theoretical and simulation assessments show that the offered image encryption performs admirably, its traditional equivalents in terms by efficiency in terms of statistical analysis.


Sign in / Sign up

Export Citation Format

Share Document