Color image DNA encryption using mRNA properties and non-adjacent coupled map lattices

  • PDF / 1,751,548 Bytes
  • 25 Pages / 439.37 x 666.142 pts Page_size
  • 18 Downloads / 176 Views

DOWNLOAD

REPORT


Color image DNA encryption using mRNA properties and non-adjacent coupled map lattices Hossein Movafegh Ghadirli 1 & Ali Nodehi 1 & Rasul Enayatifar 2 Received: 17 June 2020 / Revised: 18 August 2020 / Accepted: 15 September 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract

This paper proposes a novel algorithm for encrypting color images. The innovation in this study is the use of messenger ribonucleic acid (mRNA) encoding to import into Deoxyribonucleic acid (DNA) encoding. For permutation of the plain image bits, we use Arnold’s Cat Map at the bit-level. Then, using Non-Adjacent Coupled Map Lattices (NCML), we apply diffusion operations to the permuted color channels. We also provide the upgrade of the diffusion phase with DNA encoding. In the proposed algorithm, the choices are random depending on the secret key, which is implemented using a simple logistic map. Hashing the string entered by the user, the secret key, parameters, and initial values are generated by the Double MD5 method. The results of tests and security analysis showed that the results of encryption with this scheme are effective, and the key space is large enough to withstand common attacks. Keywords Image encryption . DNA encoding . NCML . mRNA encoding

1 Introduction The issue of information security is becoming more and more important today with the increasing number of users and the expansion of communications and data exchange in computer networks and cloud spaces. On the Internet or a wireless network, various types of data (i.e. text, image, audio, and multimedia) are constantly exchanging, and images are one of the most common forms of information in everyday life [2]. Images have a variety of applications in personal affairs, social networking, and medical, satellite, and military imaging and it is necessary to keep them secure between the sender and the receiver. One way to keep data secure is encryption, in which the

* Ali Nodehi [email protected]; [email protected]

1

Department of Computer Engineering, Gorgan Branch, Islamic Azad University, Gorgan, Iran

2

Department of Computer Engineering, Firoozkooh Branch, Islamic Azad University, Firoozkooh, Iran

Multimedia Tools and Applications

desired data are converted to undetectable content using secret key(s) [48]. Reviewing color images encryption methods, Ghadirli et al. [26] divided all encryption methods into ten branches, most of which using the two main methods of permutation and diffusion; these methods respectively substitute and permute the pixels [49], which can be used on both gray and color images. Numerous techniques and algorithms have been proposed for image encryption, such as bit plane decomposition [59], fractional wavelet transform [9, 10], vector quantization [16], gray code [86], DNA encoding [4, 31, 51, 73], chaos [3, 6, 7, 11, 20, 29, 55, 58, 60, 72, 84, 87], evolutionary methods [21], and p-Fibonacci transform [85]. One of the most widely used methods in image encryption is the chaotic functions used by many re