| Literature DB >> 28392799 |
Ying Niu1, Xuncai Zhang1, Feng Han1.
Abstract
Image encryption technology is one of the main means to ensure the safety of image information. Using the characteristics of chaos, such as randomness, regularity, ergodicity, and initial value sensitiveness, combined with the unique space conformation of DNA molecules and their unique information storage and processing ability, an efficient method for image encryption based on the chaos theory and a DNA sequence database is proposed. In this paper, digital image encryption employs a process of transforming the image pixel gray value by using chaotic sequence scrambling image pixel location and establishing superchaotic mapping, which maps quaternary sequences and DNA sequences, and by combining with the logic of the transformation between DNA sequences. The bases are replaced under the displaced rules by using DNA coding in a certain number of iterations that are based on the enhanced quaternary hyperchaotic sequence; the sequence is generated by Chen chaos. The cipher feedback mode and chaos iteration are employed in the encryption process to enhance the confusion and diffusion properties of the algorithm. Theoretical analysis and experimental results show that the proposed scheme not only demonstrates excellent encryption but also effectively resists chosen-plaintext attack, statistical attack, and differential attack.Entities:
Mesh:
Year: 2017 PMID: 28392799 PMCID: PMC5368421 DOI: 10.1155/2017/4079793
Source DB: PubMed Journal: Comput Intell Neurosci
Figure 1The attractor of the Chen chaotic system.
The XOR operation for DNA sequences.
| XOR | A | C | G | T |
|---|---|---|---|---|
| A | A | C | G | T |
| C | C | A | T | G |
| G | G | T | A | C |
| T | T | G | C | A |
The addition operation for DNA sequences.
| ADD | A | C | G | T |
|---|---|---|---|---|
| A | A | C | G | T |
| C | C | G | T | A |
| G | G | T | A | C |
| T | T | A | C | G |
The subtraction operation for DNA sequences.
| Sub | A | C | G | T |
|---|---|---|---|---|
| A | A | T | G | C |
| C | C | A | T | G |
| G | G | C | A | T |
| T | T | G | C | A |
Base substitution rule.
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
Figure 2DNA sequence ID in GenBank for AJ276502.
Figure 3Description of the encryption process.
Figure 4Lena image and ciphered Lena.
Figure 5Failure of decryption of Lena.
Figure 6Histogram of the plain Lena image and ciphered Lena image.
Adjacent pixels correlation comparison.
| Original image | Encryption image | |
|---|---|---|
| Horizontal direction | 0.9700 | −0.0207 |
| Vertical direction | 0.9384 | −0.0176 |
| Diagonal direction | 0.9176 | 0.0168 |
Figure 7Correlation analysis of Lena as a ciphered image in three directions.