A novel RGB image encryption algorithm based on DNA sequences and chaos
- PDF / 2,398,304 Bytes
- 25 Pages / 439.37 x 666.142 pts Page_size
- 54 Downloads / 196 Views
A novel RGB image encryption algorithm based on DNA sequences and chaos Xing Zhang 1 & Ruisong Ye 1 Received: 1 November 2019 / Revised: 28 June 2020 / Accepted: 28 July 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract
Based on the deoxyribonucleic acid (DNA) sequence operations and chaotic systems, a novel improved color image encryption algorithm is presented with one-time-pad. Three DNA matrices are obtained by DNA encoding the plain-image firstly. To enhance the proposed algorithm’s robustness of resisting known-plaintext and chosen-plaintext attacks, the key streams, which are used to scramble the positions of the three DNA matrices, are generated from 3D skew tent map (3D-STM) by using the secret keys and the hamming distances between the DNA matrices. Then, we perform the DNA XOR, addition and subtraction operations on the DNA matrices and the key streams to get the cipher-image. At this stage, we also update the initial values of the coupled map lattice (CML) by the circle distance of DNA matrices obtained from the previous step to further enhance the proposed algorithm’s ability of resisting plaintext attack. Finally, we get the encrypted color image by decoding DNA matrices. The simulation and security analysis show that the proposed algorithm has an extraordinary ability to resist plaintext attack, differential attack and statistical attack, etc. Keywords Chaos . Image encryption . DNA sequence . Hamming distance . Circle distance
1 Introduction Thanks to the fascinating development of computer network and multimedia processing technologies, the security in data transmission and storage draws more public attentions. How to protect the multimedia information from unauthorized copying distribution has become an extremely urgent issue [8, 25]. In recent years, the emergence of big data and the rapid growth of cloud computing make privacy protecting with security become the research hotspots [1]. To meet the demand of real-time secure image information transmission,
* Ruisong Ye [email protected]
1
Department of Mathematics, Shantou University, Shantou 515063 Guangdong, China
Multimedia Tools and Applications
techniques like encryption and watermarking are required to provide security functionalities like privacy, integrity, or authentication especially suited for image data. These techniques for providing privacy and confidentiality of multimedia data play an important role in many applications, such as military image databases, confidential video conference, pay TV, health management system, digital rights management, online private photograph album, etc. [2]. At present, efficient image encryption is one of the most commonly used techniques to protect image information. However, the traditional algorithms, such as DEA, IDEA and AES for text encryption, are unsuitable for digital images due to some intrinsic features of images such as bulky data capacity, high adjacent pixel correlation and redundancy [13]. To deal with this issue, many researchers have developed im
Data Loading...