An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions
- PDF / 5,714,592 Bytes
- 30 Pages / 439.642 x 666.49 pts Page_size
- 17 Downloads / 177 Views
An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions Ebrahim Zarei Zefreh1 Received: 5 June 2019 / Revised: 2 March 2020 / Accepted: 27 May 2020 / © Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract In this paper, we propose a novel image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. The significant advantage of the proposed scheme is high efficiency. The proposed scheme consists of the DNA level permutation and diffusion. In the DNA level permutation, a mapping function based on the logistic map is applied on the DNA image to randomly change the position of elements in the DNA image. In the DNA level diffusion, not only we define two new algebraic DNA operators, called the DNA left-circular shift and DNA right-circular shift, but we also use a variety of DNA operators to diffuse the permutated DNA image with the key DNA image. The experimental results and security analyses indicate that the proposed image encryption scheme not only has good encryption effect and able to resist against the known attacks, but also is sufficiently fast for practical applications. The MATLAB source code of the proposed image encryption scheme is publicly available at the URL: https://github.com/EbrahimZarei64/ ImageEncryption. Keywords Image encryption · DNA computing · Chaotic system · Hash function · DNA circular shift
1 Introduction Nowadays, due to the rapid development of information technology and the transition from the PC era to the post-PC era, Social Network has become part of everyday life [24]. This makes media such as videos, images and sounds are increasingly shared on social networks [8, 24]. Since digital images can contain personal, private and confidential information, the unauthorized access and misuse of this information has become a serious challenge [8, 28, 29]. Image encryption is one of the most important methods to provide security and to ensure confidentiality of image information [13, 20, 25]. There exist some classical
Ebrahim Zarei Zefreh
[email protected] 1
Department of Computer Science, University of Khansar, Khansar, Iran
Multimedia Tools and Applications
encryption algorithms such as the Data Encryption Standard (DES), Advanced Encryption Standard (AES), Blowfish and Rivest-Shamir-Adleman (RSA) for textual information. Those methods, however, are not suitable for the image encryption to yield satisfactory results in terms of encryption speed and security due to some inherent intrinsic of images such as bulky data capacity, high correlation among adjacent pixels and high redundancy as well as the large computational time [29, 30, 36]. Many image encryption methods based on chaotic systems, cellular automata, DNA computing, fractional transform etc. have been proposed [4, 9, 21, 29]. In recent year, DNA-based image encryption has attracted lots of attention among researchers due to lots of good characteristics like massive parallelism, huge storage and ultra-low
Data Loading...