| Literature DB >> 33285955 |
Dalia H ElKamchouchi1,2, Heba G Mohamed2,3, Karim H Moussa4.
Abstract
Modern multimedia communications technology requirements have raised security standards, which allows for enormous development in security standards. This article presents an innovative symmetric cryptosystem that depends on the hybrid chaotic Lorenz diffusion stage and DNA confusion stage. It involves two identical encryption and decryption algorithms, which simplifies the implementation of transmitting and receiving schemes of images securely as a bijective system. Both schemes utilize two distinctive non-consecutive chaotic diffusion stages and one DNA scrambling stage in between. The generation of the coded secret bit stream employs a hybrid chaotic system, which is employed to encrypt or decrypt the transmitted image and is utilized in the diffusion process to dissipate the redundancy in the original transmitted image statistics. The transmitted image is divided into eight scrambled matrices according to the position of the pixel in every splitting matrix. Each binary matrix is converted using a different conversion rule in the Watson-Crick rules. The DNA confusion stage is applied to increase the complexity of the correlation between the transmitted image and the utilized key. These stages allow the proposed image encryption scheme to be more robust against chosen/known plaintext attacks, differential attacks, cipher image attacks, and information entropy. The system was revealed to be more sensitive against minimal change in the generated secret key. The analysis proves that the system has superior statistical properties, bulkier key space, better plain text sensitivity, and improved key sensitivity compared with former schemes.Entities:
Keywords: DNA; communications; decryption; encryption; hybrid chaotic; image; secured
Year: 2020 PMID: 33285955 PMCID: PMC7516607 DOI: 10.3390/e22020180
Source DB: PubMed Journal: Entropy (Basel) ISSN: 1099-4300 Impact factor: 2.524
Watson–Crick rubrics.
| A | T | C | G | |
|---|---|---|---|---|
| R 01 | 0 0 | 1 1 | 1 0 | 0 1 |
| R 02 | 0 0 | 1 1 | 0 1 | 1 0 |
| R 03 | 1 1 | 0 0 | 1 0 | 0 1 |
| R 04 | 1 1 | 0 0 | 0 1 | 1 0 |
| R 05 | 1 0 | 0 1 | 0 0 | 1 1 |
| R 06 | 0 1 | 1 0 | 0 0 | 1 1 |
| R 07 | 1 0 | 0 1 | 1 1 | 0 0 |
| R 08 | 0 1 | 1 0 | 1 1 | 0 0 |
Figure 1An example of image securing scheme that depends on a chaotic map: (a) traditional encryption, (b) traditional decryption.
Figure 2The proposed securing system for images: (a) encryption process, (b) decryption process.
Figure 3The effect of applying the first three steps of the DNA mutation scrambling stage on a 10 × 10 matrix.
DNA mutation rules.
| DNA | Mutate | DNA | Mutate | DNA | Mutate | DNA | Mutate |
|---|---|---|---|---|---|---|---|
| A A | T A | C A | G A | G A | C A | T A | A A |
| A C | T C | C C | G C | G C | C C | T C | A C |
| A G | T G | C G | G G | G G | C G | T G | A G |
| A T | T T | C T | G T | G T | C T | T T | A T |
Figure 4Simulation results. (a) plain images, (b) Generated cipher images of (a), (c) Recovered image from (b).
Figure 5Histograms analysis. (a) Histograms of plain images, (b) Histograms of cipher images.
Calculated correlation coefficients.
| Correlation | Plain Image | Cipher Image | ||||
|---|---|---|---|---|---|---|
| Horizontal | Vertical | Diagonal | Horizontal | Vertical | Diagonal | |
| Lena | 0.9650 | 0.9144 | 0.9056 | 0.0082 | −0.0032 | −0.0025 |
| Cameraman | 0.9560 | 0.9140 | 0.9077 | 0.0074 | −0.0029 | −0.0019 |
| Circuit | 0.9580 | 0.9230 | 0.9118 | 0.0078 | −0.0034 | −0.0021 |
Figure 6Correlation analysis plot. (a) Horizontal direction correlation for plain images Lena, Cameraman, and Circuit, (b) Horizontal correlation for their cipher images respectively.
Histogram chi-square test.
| Image | |||
|---|---|---|---|
| Score |
| ||
| Lena | 246.804687 | 0.6834 | Accepted |
| Cameraman | 246.817237 | 0.6670 | Accepted |
| Circuit | 246.794528 | 0.6754 | Accepted |
Key sensitivity tests results (%).
| Theoretical Values | ||||
|---|---|---|---|---|
| Lena | 99.6225 | 33.3962 | 99.6250 | 28.3191 |
| Cameraman | 99.6122 | 33.3876 | 99.6299 | 28.3245 |
| Circuit | 66.6179 | 33.3471 | 99.6134 | 28.3770 |
Number of pixel change rat (NPCR) test analysis (%).
| Algorithms | NPCR (%) | NPCR Critical Values | ||
|---|---|---|---|---|
|
|
|
| ||
| Proposed | 99.6150 | Successful | Successful | Successful |
| CCAES [ | 99.5697 | Successful | Successful | Successful |
| CDCP [ | 100 | Successful | Successful | Successful |
| CHC [ | 99.6605 | Successful | Successful | Successful |
| C-DNA [ |
| NA | NA | NA |
| HC-DNA [ | 59.7406 | NA | NA | NA |
Unified average changing intensity (UACI) test analysis (%).
| Algorithms | UACI (%) | UACI Critical Values | ||
|---|---|---|---|---|
| Proposed | 33.4205 | Successful | Successful | Successful |
| CCAES [ | 33.4767 | Successful | Successful | Successful |
| CDCP [ | 33.5752 | Successful | Successful | Successful |
| CHC [ | 33.4263 | Successful | Successful | Successful |
| C-DNA [ |
| NA | NA | NA |
| HC-DNA [ | 25.0487 | NA | NA | NA |
Information entropy.
| Average Performance | Proposed System | CCAES [ | CDCP [ | CHC [ | C-DNA [ | HC-DNA [ | ||
|---|---|---|---|---|---|---|---|---|
| Lena | Cameraman | Circuit | ||||||
|
|
|
|
|
| 7.438 | 7.441 | 7.428 | 7.431 |
| Cipher | 7.988 | 7.997 | 7.995 | 7.997 | 7.966 | 7.997 | 7.996 | 7.996 |
Local Shannon entropy.
| Image | Proposed System | [ | [ | [ | [ |
|---|---|---|---|---|---|
| Lena | 7.903462 | 7.902838 | 7.900975 | 7.904512 | 7.904671 |
Encryption/Decryption time.
| Algorithms | Proposed System | CCAES [ | CDCP [ | CHC [ | C-DNA [ | HC-DNA [ |
|---|---|---|---|---|---|---|
| Time | 0.19253 | 2.9 | 2.70264 | 3.17265 | 2.15572 | 0.27783 |