| Literature DB >> 28912802 |
Xuncai Zhang1, Feng Han1, Ying Niu1.
Abstract
With the help of the fact that chaos is sensitive to initial conditions and pseudorandomness, combined with the spatial configurations in the DNA molecule's inherent and unique information processing ability, a novel image encryption algorithm based on bit permutation and dynamic DNA encoding is proposed here. The algorithm first uses Keccak to calculate the hash value for a given DNA sequence as the initial value of a chaotic map; second, it uses a chaotic sequence to scramble the image pixel locations, and the butterfly network is used to implement the bit permutation. Then, the image is coded into a DNA matrix dynamic, and an algebraic operation is performed with the DNA sequence to realize the substitution of the pixels, which further improves the security of the encryption. Finally, the confusion and diffusion properties of the algorithm are further enhanced by the operation of the DNA sequence and the ciphertext feedback. The results of the experiment and security analysis show that the algorithm not only has a large key space and strong sensitivity to the key but can also effectively resist attack operations such as statistical analysis and exhaustive analysis.Entities:
Mesh:
Substances:
Year: 2017 PMID: 28912802 PMCID: PMC5585654 DOI: 10.1155/2017/6919675
Source DB: PubMed Journal: Comput Intell Neurosci
8 encoding rules.
| Rule | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
|---|---|---|---|---|---|---|---|---|
| 00 | A | A | C | G | C | G | T | T |
| 01 | C | G | A | A | T | T | C | G |
| 10 | G | C | T | T | A | A | G | C |
| 11 | T | T | G | C | G | C | A | A |
The XOR operation for DNA sequences.
| XOR | A | C | G | T |
|---|---|---|---|---|
| A | A | C | G | T |
| C | C | A | T | G |
| G | G | T | A | C |
| T | T | G | C | A |
The addition operation for DNA sequences.
| ADD | A | C | G | T |
|---|---|---|---|---|
| A | A | C | G | T |
| C | C | G | T | A |
| G | G | T | A | C |
| T | T | A | C | G |
The subtraction operation for DNA sequences.
| Sub | A | C | G | T |
|---|---|---|---|---|
| A | A | T | G | C |
| C | C | A | T | G |
| G | G | C | A | T |
| T | T | G | C | A |
Figure 1Bit replacement elements.
Figure 2Bit permutation network.
Figure 3Description of the encryption process.
Figure 4Lena image and ciphered Lena.
Figure 5Histogram of the plain Lena image and ciphered Lena image.
Correlation coefficients of the proposed algorithm compared with that of Ye's algorithm, X. Wang and Q. Wang's algorithm, and Liu et al.'s algorithm.
| Original image | Encryption image (the proposed algorithm) | Encryption image (Ye's algorithm) | Encryption image (X. Wang and Q. Wang's algorithm) | Encryption image | |
|---|---|---|---|---|---|
| Horizontal direction | 0.9646 | 0.0082 | 0.0163 | 0.0097 | −0.0152 |
| Vertical direction | 0.9304 | 0.0032 | −0.0029 | 0.0136 | 0.0140 |
| Diagonal direction | 0.9030 | 0.0150 | 0.0309 | 0.0178 | 0.0218 |
Figure 6Correlation Analysis of Lena as a ciphered image in three directions.