222 results on '"dna coding"'
Search Results
2. Delayed chaotic image encryption algorithm using cross-layer and DNA coding techniques
- Author
-
Zhao, Chaofeng, Zhai, Zhibo, and Zeng, Bo
- Published
- 2025
- Full Text
- View/download PDF
3. Real time hybrid medical image encryption algorithm combining memristor-based chaos with DNA coding
- Author
-
Demirkol, Ahmet Samil, Sahin, Muhammet Emin, Karakaya, Baris, Ulutas, Hasan, Ascoli, Alon, and Tetzlaff, Ronald
- Published
- 2024
- Full Text
- View/download PDF
4. Dynamics analysis of fractional-order extended neuron model under electromagnetic field and application to image encryption.
- Author
-
Meng, Fanqi, Wang, Zuolei, Jiang, Haibo, and Shi, Xuerong
- Abstract
In this paper, a novel five-dimensional fractional-order extended Hindmarsh–Rose neuron model under electromagnetic field (FEHREF) is established. Numerical analysis methods such as time series diagrams, phase diagrams and bifurcation portraits demonstrate that the proposed model can exhibit complex dynamic behaviors such as regular spiking, period bursting and chaotic firing, when the intensity of the external current input and the strength of the magnetic field effect are varied, respectively. Moreover, a gray image encryption algorithm based on the proposed FEHREF combined with extended DNA coding is presented. The extended DNA encoding scheme can add DNA coding rules to improve the security of the image encryption algorithm. Finally, the performance of the designed encryption algorithm is analyzed in detail. The experimental results verify that the proposed algorithm can resist multiple attacks with better performance and higher security. This work provides theoretical guidance and experimental foundation for image-secure communication by combining fractional-order neuron system with extended DNA coding. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
5. A novel color image encryption method based on new three-dimensional chaotic mapping and DNA coding.
- Author
-
Yan, Xiaopeng, Hu, Qing, and Teng, Lin
- Abstract
In recent years, the field of information science has seen a surge in research focused on digital image security. Chaotic systems have emerged as essential tools in the development of image encryption algorithms due to their unpredictability and sensitivity to initial values. In this paper, a novel three-dimensional chaotic system is proposed and its chaotic behavior is validated through an analysis of dissipative properties, phase diagrams, spectral entropy, Lyapunov indices, etc., and more. Leveraging chaotic mapping, a color image encryption algorithm utilizing rotational arithmetic element shuffling and DNA coding is proposed and executed. Validation through simulation experiments and numerical analyses demonstrates the algorithm's reliability and security. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
6. A New Image Encryption Method Combining the DNA Coding and 4D Chaotic Maps.
- Author
-
Allawi, Salah Taha and Alagrash, Yasamin Hamza
- Subjects
IMAGE encryption ,DIGITAL images ,TECHNOLOGICAL progress ,DNA sequencing ,RESEARCH personnel - Abstract
With the tremendous technological progress in many fields, especially in communications, and to protect the information transmitted through communication channels, especially digital images, researchers in this field try to find new methods that provide a high level of security. Combining chaotic maps and DNA encryption provides a high level of security because of their high randomness, complexity, and sensitivity to initial conditions. This study presents a novel technique for protecting images by encrypting their data at three levels. The first level involves redistributing the image points. In contrast, the second level combines a 1D chaotic map (PWLCM) and DNA sequences. In the third level, three keys are produced using three 1D chaotic maps (Logistic maps, Tent maps, and Sine maps). Each key encrypts data of a specific color. The results of the statistical tests showed that the suggested technique provides a good security level compared to the methods, achieving an average Number of Pixels Change Rate (NPCR) of 99.62, a Unified Average Changing Intensity (UACI) of 32.83, and an entropy of 7.9972. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
7. Parallel multi-image encryption based on cross-plane DNA manipulation and a novel 2D chaotic system.
- Author
-
Zhang, Zhibo and Zhang, Jindong
- Subjects
- *
ENTROPY (Information theory) , *GRAYSCALE model , *DNA , *HISTOGRAMS , *ALGORITHMS , *IMAGE encryption - Abstract
In this paper, we propose a novel parallel multi-image encryption algorithm based on cross-plane DNA operations. Firstly, a two-dimensional chaotic system, 2D-SCIM, is constructed. Secondly, for a set of images, whether they are color images, grayscale images, or their combinations, we perform bit-plane decomposition according to the channels without limitations on quantity and arrangement order. Subsequently, the low and high bit planes are paired and encoded into DNA planes using chaotic sequences. Next, the DNA planes undergo two rounds of cross-plane diffusion and cross-plane cyclic shifting in parallel threads, where the chaotic sequence controls the encoding, direction, order, and operations of diffusion and cyclic shifting. Finally, the original image structure is used to combine the bit planes and obtain the encrypted image set. Security analyses, including key sensitivity, histograms, correlations, information entropy, differential attacks, noise attacks, and encryption speed, are conducted on the algorithm. Experimental results demonstrate that the proposed image encryption algorithm effectively withstands various attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Holographic encryption algorithm based on DNA coding and bit-plane decomposition.
- Author
-
Liang, Zheng, Chen, Li, Chen, Kai, Liang, Zhenhui, Wen, Kunhua, Zhu, Jiawei, and Hu, Yihua
- Subjects
PHYSICAL optics ,ARTIFICIAL intelligence ,IMAGE processing ,HOLOGRAPHY ,ALGORITHMS ,IMAGE encryption - Abstract
In recent years, encryption algorithms have undergone rapid development, finding extensive applications across diverse industries. In the pursuit of enhancing the security of image encryption methodologies, this paper introduces a novel computational holographic encryption approach grounded in DNA coding and bit-plane decomposition. The encryption framework employs a Logistic-Sine chaotic mapping system characterized by a substantial key space to control encryption particulars. The plaintext image undergoes encryption through the input–output algorithm of computational holography. This algorithm shifts information from the spatial domain, represented by the greyscale map, to the frequency domain, concealing the distribution of pixel values. The incorporation of DNA coding and bit-plane transformations serves to intensify the chaos within the ciphertext image, thereby maximizing the efficacy of the encryption process. By integrating principles from biology and physical optics into encryption methodologies, this approach amalgamates diverse scientific domains. Simulation results and data analyses substantiate that the proposed encryption algorithm adeptly withstands various attacks, attesting to its security and reliability. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. A novel image encryption algorithm based on new one-dimensional chaos and DNA coding.
- Author
-
Feng, Sijia, Zhao, Maochang, Liu, Zhaobin, and Li, Yuanyu
- Subjects
IMAGE encryption ,LYAPUNOV exponents ,BIFURCATION diagrams ,DNA sequencing ,ALGORITHMS - Abstract
This paper introduces a new one-dimensional chaotic system and a new image encryption algorithm. Firstly, the new chaotic system is analyzed. The bifurcation diagram and Lyapunov exponent show that the system has strong chaotic characteristics and is suitable for the field of image encryption. The chaotic sequence generated by the system is used in image encryption, scrambled according to its sequence value, and several sequences required for DNA coding operation are generated. The encrypted image is obtained by encoding, decoding, and diffusion operation according to the sequence. The initial values and parameters of system are generated by Hash algorithm based on plain image, so it has strong sensitivity and can effectively resist attacks such as selective plaintext attack. Experimental results show that the algorithm has high security and robustness, and can resist common attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Chaotic Video Encryption Based on DNA Coding, Confusion, and Diffusion.
- Author
-
Zhi, Li-Xun, Du, Yuan, Zhao, Xi-Jue, Chen, Tao, Cao, Ke-Yin, and Jiang, Dong
- Subjects
PARALLEL programming ,VIDEO coding ,IMAGE encryption ,DNA ,STATISTICS ,THREAD (Textiles) - Abstract
Drawing inspiration from the paradigm of engineering projects, this paper presents a novel real-time chaotic video encryption scheme based on multithreaded parallel computing and multiround confusion–diffusion architecture. It utilizes a contractor thread to retrieve and assign frames to worker threads, which operate concurrently to perform DNA coding, confusion, and diffusion operations on their designated frames for encryption, with the resulting frames processed by a dealer thread. To evaluate the performance of the proposed algorithm, it is implemented on a workstation equipped with an Intel Xeon Gold 6226 @ 2.9 GHz CPU and 64 GB of memory. The statistical and security analyses demonstrate that the proposed strategy exhibits exceptional statistical properties and provides robust resistance against various attacks. The encryption speed evaluations show that the deployed cryptosystem achieves delay-free 5 1 2 × 5 1 2 24 FPS video encryption, with an average encryption time of 34.69 ms, despite the execution of four rounds of DNA coding, five rounds of confusion, and three rounds of diffusion operations on each frame. In comparison to existing real-time chaotic video encryption schemes based on parallel computing, our method attains superior versatility and heightened security by processing each frame with an independent worker thread and incorporating DNA coding technology. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Levy Sooty Tern Optimization Algorithm Builds DNA Storage Coding Sets for Random Access.
- Author
-
Zhang, Jianxia
- Subjects
- *
OPTIMIZATION algorithms , *RANDOM sets , *ERROR rates , *ENERGY consumption , *WAREHOUSES - Abstract
DNA molecules, as a storage medium, possess unique advantages. Not only does DNA storage exhibit significantly higher storage density compared to electromagnetic storage media, but it also features low energy consumption and extremely long storage times. However, the integration of DNA storage into daily life remains distant due to challenges such as low storage density, high latency, and inevitable errors during the storage process. Therefore, this paper proposes constructing a DNA storage coding set based on the Levy Sooty Tern Optimization Algorithm (LSTOA) to achieve an efficient random-access DNA storage system. Firstly, addressing the slow iteration speed and susceptibility to local optima of the Sooty Tern Optimization Algorithm (STOA), this paper introduces Levy flight operations and propose the LSTOA. Secondly, utilizing the LSTOA, this paper constructs a DNA storage encoding set to facilitate random access while meeting combinatorial constraints. To demonstrate the coding performance of the LSTOA, this paper consists of analyses on 13 benchmark test functions, showcasing its superior performance. Furthermore, under the same combinatorial constraints, the LSTOA constructs larger DNA storage coding sets, effectively reducing the read–write latency and error rate of DNA storage. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. Crypto-steganographic model using chaos and coding based in deoxyribonucleic acid.
- Author
-
López Torres, Edison Andrés, Alvarado-Nieto, Deicy, Amaya-Barrera, Isabel, and Suárez Parra, César Augusto
- Subjects
COMPUTER security ,ARTIFICIAL vision ,DNA ,MATHEMATICAL models ,BINARY codes ,IMAGE encryption - Abstract
Given the increase of information circulating through public channels, it is essential to create robust schemes to ensure the security of such information. The results presented here were part of the research project entitled computer security models based on mathematical tools and artificial intelligence. An algorithm focused on the encryption of images carrying steganographed texts is proposed, using chaos, artificial vision and coding based in deoxyribonucleic acid (DNA). The process consists of steganographic and cryptographic steps. In the steganographic stage, a color image was taken, the combined Canny and Sobel filters were applied to achieve its dilated edges, using Chen's chaotic attractor, the positions of the edges were selected, to hide a text in binary ASCII code using the least significant bit technique. In the encryption stage, Chen's chaotic system was used to permute the stego-image and to create a chaotic image used in the diffusion process. These two images were divided into blocks represented in DNA coding, selecting the rule to apply through the three-dimensional Logistics system, and finally applying the XOR operation by layers, obtaining a single encrypted image. To validate the proposed model, safety and performance tests were applied, obtaining comparable indicators with some current scientific references. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Protection of the Image Data by Using Chaotic Maps and DNA Sequence.
- Author
-
Allawi, Salah Taha, Mohialden, Yasmin Makki, and Hussien, Nadia Mahmood
- Subjects
DNA sequencing ,DATA protection ,COLOR codes - Abstract
Transferring data through unsecured communication channels exposes it to the risk of sabotage and theft by unauthorized persons. Therefore, secure and modern methods must be provided to protect this data upon transmission. This study suggests a new way to use deoxyribonucleic acid (DNA) coding and chaotic maps to create two security levels for data protection. The first level includes generating a key using a one-dimensional logistic map and then converting the values to DNA codes. In contrast, the image color data is converted to DNA codes. After that, the XOR operation is applied between key and color codes by using four rules (2, 4, 6, and 8) from the encoding DNA rules. The second level includes generating three keys via a three-dimensional logistic map. After that, an XOR operation is performed between the keys and the result of the first level. Finally, the result is an encrypted image with two levels of security. The proposed method shows a high safety rate, which achieved an Entropy value rate of 7.997 and a Number of Pixels Changing Rate (NPCR) of 100% on the test image group. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. An Analytical Survey of Image Encryption Techniques Used in Various Application Domains
- Author
-
Kotangale, Archana, Rout, Dillip, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Hassanien, Aboul Ella, editor, Castillo, Oscar, editor, Anand, Sameer, editor, and Jaiswal, Ajay, editor
- Published
- 2024
- Full Text
- View/download PDF
15. Efficient DNA Coding Algorithm for Polymerase Chain Reaction Amplification Information Retrieval.
- Author
-
Wang, Qing, Zhang, Shufang, and Li, Yuhui
- Subjects
- *
POLYMERASE chain reaction , *AMPLIFICATION reactions , *DNA primers , *INFORMATION retrieval , *NUCLEOTIDE sequence , *DNA - Abstract
Polymerase Chain Reaction (PCR) amplification is widely used for retrieving information from DNA storage. During the PCR amplification process, nonspecific pairing between the 3' end of the primer and the DNA sequence can cause cross-talk in the amplification reaction, leading to the generation of interfering sequences and reduced amplification accuracy. To address this issue, we propose an efficient coding algorithm for PCR amplification information retrieval (ECA-PCRAIR). This algorithm employs variable-length scanning and pruning optimization to construct a codebook that maximizes storage density while satisfying traditional biological constraints. Subsequently, a codeword search tree is constructed based on the primer library to optimize the codebook, and a variable-length interleaver is used for constraint detection and correction, thereby minimizing the likelihood of nonspecific pairing. Experimental results demonstrate that ECA-PCRAIR can reduce the probability of nonspecific pairing between the 3' end of the primer and the DNA sequence to 2–25%, enhancing the robustness of the DNA sequences. Additionally, ECA-PCRAIR achieves a storage density of 2.14–3.67 bits per nucleotide (bits/nt), significantly improving storage capacity. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Novel chaotic image cryptosystem using dynamic DNA coding.
- Author
-
Zhou, Shuang, Wei, Yi, Zhang, Yingqian, and Teng, Lin
- Subjects
- *
IMAGE encryption , *DNA , *CRYPTOSYSTEMS , *LYAPUNOV exponents , *PUBLIC key cryptography , *DYNAMICAL systems , *PROBLEM solving - Abstract
This study aims to solve the problem of small key space in image cryptosystems based on logistic mapping. First, a new one-dimensional (1D) chaotic system, with a wide continuous chaotic interval, a large Lyapunov exponent and obvious chaotic characteristics are presented. Subsequently, a novel image encryption algorithm based on the new 1D chaotic system and dynamic DNA encoding is designed. Compared with other DNA coding methods, the proposed image encryption algorithm encodes chaotic sequences and ensures that the sequence elements at different positions correspond to different DNA coding schemes. This will help to overcome the fixity of DNA coding and make the proposed dynamic DNA coding easy to operate and implement. Finally, the cipher image is obtained by scrambling and bit XOR operation based on the chaotic sequences. The fixed DNA coding method is compared with other chaotic image encryption schemes, and the experimental results indicate that the image encryption algorithm has higher security and can resist common attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. Image encryption scheme based on double permutation and DNA.
- Author
-
Zhang, Xuncai, Di, Jiali, and Niu, Ying
- Subjects
IMAGE encryption ,HAMMING distance ,DNA ,PERMUTATIONS ,INFORMATION resources management ,PIXELS - Abstract
This paper mainly contributes a bit-level and pixel-level double-permutation image encryption scheme based on DNA coding technology, which can effectively solve the problem that adjacent pixels in an image are difficult to be completely disordered. Firstly, the Hamming distance between image pixel and a value at the same position in a chaotic sequence is calculated and the result is used to be the cyclic shift distance of the pixel to achieve bit-level permutation; secondly, the modified Z curve is used for the first global permutation process, and the image is further permutated by the method of block restructuring to compensate for the shortage of modified Z curve permutation; thirdly, pixel pairs are selected and the pixel pairs are used as information and control positions respectively to DNA encode the image by dynamically selecting the DNA encoding rules, and then diffusing the encoded image following the rules of DNA base manipulation; finally, the diffused image is decoded to complete the image encryption process. We perform simulation experiments on the image encryption algorithm and analyze its security performance, and we could get the conclusion that the encryption algorithm can encrypt images quickly and effectively, the obtained cipher images are highly resistant to noise attacks, cropping attacks, and different attacks, meanwhile, the cipher images have a lower correlation between pixels. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. Multiobjective Optimization of Chaotic Image Encryption Based on ABC Algorithm and DNA Coding.
- Author
-
Yu, Jinwei, Xie, Wei, and Zhang, Langwen
- Subjects
IMAGE encryption ,OPTIMIZATION algorithms ,ALGORITHMS ,DATA privacy ,DNA ,ENTROPY (Information theory) - Abstract
As digital communication and storage continue to expand, the protection of image privacy information becomes increasingly critical. To safeguard sensitive visual information from unauthorized access, this paper proposes a novel image encryption scheme that integrates multiobjective Artificial Bee Colony (ABC) optimization algorithm and DNA coding. Multiple evaluation metrics including correlation relationship, Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI), and information entropy are collaboratively optimized by the ABC algorithm. The proposed method begins with the application of the SHA-256 algorithm to generate keys and random sequences using chaotic systems. These sequences are then employed for shuffling, DNA coding, decoding, and diffusion, generating initial encrypted images. Subsequently, the encrypted images serve as individuals within the ABC algorithm to determine optimal parameters of the chaotic systems and the best ciphertext image. Simulation experiments demonstrate that the ciphertext images achieved excellent results in information entropy, pixel correlation coefficient, NPCR, and UACI. The integration of the multiobjective ABC optimization algorithm with DNA coding in our proposed image encryption scheme results in heightened security, as evidenced by superior performance in various metrics. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. Image encryption algorithm based on hyperchaos and DNA coding
- Author
-
Lizong Li
- Subjects
DNA coding ,hyperchaotic system ,image diffusion ,image encryption ,Photography ,TR1-1050 ,Computer software ,QA76.75-76.765 - Abstract
Abstract A novel image encryption algorithm based on hyperchaos and DNA encoding is proposed in this paper. Unlike the traditional DNA‐based encoding method, a more fine‐grained encryption approach is adopted, which enhances the security of the system. To address the inherent binary arithmetic limitation of traditional DNA computing, the authors develop a novel symmetric and reversible DNA subtraction operation that fully utilizes the encryption advantage of DNA computing. To enhance security, the authors introduce a DNA crossover mechanism based on pixel, which can generate different ciphertexts even for the same pixel values. In the algorithm, the authors propose a diffusion strategy that combines left diffusion, right diffusion, and XOR parameters. This strategy not only ensures the avalanche effect, where even a single pixel change in the plaintext image will cause a drastic change in the ciphertext image, but also greatly enhances the security of the algorithm. Experimental results and performance analysis indicate that the authors’ proposed system has good encryption performance and the ability to resist noise attacks and clipping attacks.
- Published
- 2024
- Full Text
- View/download PDF
20. Revolutionizing Image Encryption: Introducing the Beta Wavelet Map and DNA Coding Paradigm
- Author
-
Amani Fallah, Monia Hamdi, Nazik Alturki, Oumaima Saidani, and Mourad Zaied
- Subjects
Image encryption ,Beta wavelet ,Beta wavelet chaotic map ,DNA coding ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In this groundbreaking study, we introduce a novel and highly advanced approach to image encryption, harnessing the power of chaotic Beta wavelet sequences and DNA coding. Unlike conventional methods, our methodology not only involves the generation of three intricate chaotic beta wavelet sequences but also integrates DNA coding with an XOR operation, ensuring an unprecedented level of security for the encrypted data. The strength of our work lies in the meticulous application of Beta Discrete Wavelet Transform (DWT) to encrypt images in the wavelet domain, adding an extra layer of complexity to the encryption process. This paper not only presents a cutting-edge solution for image security but also establishes a new paradigm in the field of encryption by seamlessly merging chaos theory, DNA coding, and wavelet transforms. The results showcase unparalleled strength in safeguarding sensitive information, making our methodology a pioneering contribution to the realm of image encryption.
- Published
- 2024
- Full Text
- View/download PDF
21. Secure Communication of Military Reconnaissance Images Over UAV-Assisted Relay Networks
- Author
-
Wassim Alexan, Laila Aly, Yousef Korayem, Mohamed Gabr, Dina El-Damak, Abdallah Fathy, and Hany A. A. Mansour
- Subjects
Convolutional codes ,DNA coding ,drones ,genetic algorithm ,LDPC codes ,relays ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
This article presents a novel 2-layer image encryption cryptosystem and transmission protocol designed for secure communication of military reconnaissance images over unmanned aerial vehicle (UAV)-assisted relaying networks. The proposed scheme aims to address the growing need for robust, secure, and efficient transmission of sensitive imagery data across wireless ad-hoc networks, often characterized by unpredictable and hostile environments. The first layer of the proposed cryptosystem employs a Genetic Algorithm (GA) utilizing a Mersenne Twister (MT) key, providing a robust framework for initial image encryption. The second layer further leverages security by employing DNA coding, that is also driven by a MT key. The encrypted images are subsequently transformed into a one-dimensional bit-stream, ready for transmission. The bit-stream is then channel coded using either a convolutional code or a low-density parity-check (LDPC) code, offering flexibility based on the specific network conditions and requirements. The coded data is then BPSK-modulated and transmitted over a multi-hop wireless relay network, with relays mounted on freely-moving UAVs. This scheme optimizes for both security and transmission efficiency, critical for the time-sensitive and mission-critical nature of military operations. Extensive performance evaluation is carried out, presenting bit error rate (BER) curves and various image encryption metrics, demonstrating the robustness, reliability, and security of the proposed scheme. This contribution is expected to significantly enhance the secure communication of military reconnaissance images, paving the way for more advanced, secure, and efficient communication systems in the military sector.
- Published
- 2024
- Full Text
- View/download PDF
22. Chaos and DNA coding technique for image cryptography.
- Author
-
Pradhan, Grishan, Dawadi, Babu R., Chaulagain, Abiral, Joshi, Anish Lal, and Vaidya, Prajal Govinda
- Subjects
- *
IMAGE encryption , *SIGNAL-to-noise ratio , *DNA , *GRAYSCALE model - Abstract
In today's cybersphere, cryptography plays a vital role in various fields. Image encryption is an integral part for securing information because of its vast application areas such as military (defense), multimedia, healthcare and so forth. In this article, an image encryption algorithm for both grayscale and color image is proposed based on Tangential Delay‐Ellipse Reflecting Curve System (TD‐ERCS) chaotic map system and deoxyribonucleic acid (DNA) coding. Chaotic map is used to scramble the pixel positions; to achieve confusion and for creation of mask image, and DNA coding is used for changing the pixel values; to achieve diffusion. Upon experimental analysis, proposed work achieved significantly high mean square error and low peak signal to noise ratio, almost zero correlation, high number of pixel change rate and unified averaged changed intensity values, and resistance to noise and data loss attacks. In addition, the decryption is possible without loss in quality of image. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Image encryption algorithm based on hyperchaos and DNA coding.
- Author
-
Li, Lizong
- Abstract
A novel image encryption algorithm based on hyperchaos and DNA encoding is proposed in this paper. Unlike the traditional DNA‐based encoding method, a more fine‐grained encryption approach is adopted, which enhances the security of the system. To address the inherent binary arithmetic limitation of traditional DNA computing, the authors develop a novel symmetric and reversible DNA subtraction operation that fully utilizes the encryption advantage of DNA computing. To enhance security, the authors introduce a DNA crossover mechanism based on pixel, which can generate different ciphertexts even for the same pixel values. In the algorithm, the authors propose a diffusion strategy that combines left diffusion, right diffusion, and XOR parameters. This strategy not only ensures the avalanche effect, where even a single pixel change in the plaintext image will cause a drastic change in the ciphertext image, but also greatly enhances the security of the algorithm. Experimental results and performance analysis indicate that the authors' proposed system has good encryption performance and the ability to resist noise attacks and clipping attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. A novel algorithm based on DNA coding for substitution box generation problem.
- Author
-
Artuğer, Fırat
- Subjects
- *
DNA , *PHILOSOPHICAL literature , *ALGORITHMS - Abstract
Substitution boxes are very important for cryptographic structures. But getting an 8-bit strong s-box is a difficult problem. To address this problem, a new approach is proposed in this study. DNA chains are used in the proposed approach. First of all, a weak s-box is obtained with the help of a chaotic map. Then, a DNA chain is formed with the same chaotic map. In this study, 2000-long DNA chains were produced. Then, two random values consisting of four components are determined from these DNA chains, and these values are addressed to the s-box structure. By changing the places of these values, the s-box structure is improved up to a certain iteration. In this study, 10,000 iterations were examined, and three different strong s-boxes were obtained by using three different DNA chains. The nonlinearity values of these s-box structures were observed as 110.25, 110.5, and 110.75, respectively. The proposed study has proven to work effectively with effective results in three different chains. In addition, it has been proven as a result of the analysis that the proposed s-box structures also have other cryptographic features. The proposed algorithm has surpassed many s-box generation philosophies in the literature. In addition, the proposed algorithm will provide serious gains to cryptographic structures that will be developed in the future. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. A color image encryption scheme based on chaotic mapping, chaotic system, and DNA coding.
- Author
-
Yan, Shaohui, Li, Lin, Gu, Binxian, Sun, Xi, Ren, Yu, and Zhang, Yuyan
- Subjects
IMAGE encryption ,STATISTICS ,LYAPUNOV exponents ,BIFURCATION diagrams ,DNA ,ENTROPY (Information theory) - Abstract
In this paper, an improved two-dimensional chaotic mapping is constructed by introducing a Logistic mapping and a Sine mapping. By studying its Lyapunov and bifurcation diagrams, it is proved that the proposed chaotic mapping has better chaotic properties. A new four-dimensional chaotic system is also proposed, and the richer dynamical behavior of the new system is verified by studying the Lyapunov exponent and bifurcation, SE and C0 complexity, and coexisting attractors of the new system. Then, a new color image encryption algorithm is proposed based on an improved two-dimensional chaotic mapping and a new four-dimensional chaotic system and DNA coding. The improved two-dimensional chaotic mapping and the new four-dimensional chaotic system increase the complexity and randomness of the system, giving the encryption algorithm a higher level of security. In this algorithm, the pixel correlation of the three channels of RGB is first broken by ascending arrangement of disorder, the chaotic sequence generated by the iteration of the four-dimensional chaotic system is applied in the DNA encoding encryption. Finally, a comprehensive evaluation of the algorithm performance is presented. In particular, statistical and information entropy analyses verify that the algorithm in this paper is resistant to statistical attacks based on the frequency of pixel values. The results obtained for the resistance to differential attacks are close to the ideal value, indicating that the algorithm has good resistance to plaintext attacks. By calculating the key space and analysing the key sensitivity, it is verified that the algorithm has a strong resistance to brute-force exhaustive attacks. The decryption algorithm can recover the original image by adding noise to the ciphertext image or cropping part of the region, which proves that the algorithm has strong resistance to interference and strong robustness. Test experiments show that this algorithm has high security and is competitive with other algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
26. On the cryptanalysis of an image encryption algorithm with quantum chaotic map and DNA coding.
- Author
-
Chen, Xin, Yu, Simin, Wang, Qianxue, Guyeux, Christophe, and Wang, Mengjie
- Abstract
An Image Encryption Algorithm with the Quantum logistic and lorenz Chaotic map, and DNA Coding (IEA-QCDC) was proposed. Relying on some empirical analyzes and experimental results, the designers of IEA-QCDC claimed that this strategy can led to a significant enhancement in reliability and security. However, we investigate the essential properties of IEA-QCDC, and then propose an efficient chosen-plaintext attack to crack its equivalent permutation and diffusion key. By analyzing the encryption effect of continuous DNA encryption operations, the mathematical properties of some DNA codes were summarized. In addition, we find out that the iterative sequence obtained by the non-chaotic state is not even resistant to only-ciphertext attacks by analyzing the Lyapunov exponent and bifurcation diagrams of the quantum Logistic map. Aiming at the security vulnerabilities existing in IEA-QCDC, suggestions are put forward to improve the security and practicability of encryption algorithms, which will promote the development of cryptographic design to a certain extent. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
27. A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder.
- Author
-
AHMED, FAWAD, REHMAN, MUNEEB UR, AHMAD, JAWAD, KHAN, MUHAMMAD SHAHBAZ, BOULILA, WADII, SRIVASTAVA, GAUTAM, LIN, JERRY CHUN-WEI, and BUCHANAN, WILLIAM J.
- Subjects
IMAGE encryption ,PERCEPTUAL illusions ,COLOR ,IMAGE reconstruction ,DIGITAL images ,DNA ,IMAGING systems - Abstract
With the advancement in technology, digital images can easily be transmitted and stored over the Internet. Encryption is used to avoid illegal interception of digital images. Encrypting large-sized colour images in their original dimension generally results in low encryption/decryption speed along with exerting a burden on the limited bandwidth of the transmission channel. To address the aforementioned issues, a new encryption scheme for colour images employing convolutional autoencoder, DNA and chaos is presented in this paper. The proposed scheme has two main modules, the dimensionality conversion module using the proposed convolutional autoencoder, and the encryption/decryption module using DNA and chaos. The dimension of the input colour image is first reduced from N ×M ×3 to P×Q gray-scale image using the encoder. Encryption and decryption are then performed in the reduced dimension space. The decrypted gray-scale image is upsampled to obtain the original colour image having dimension N × M × 3. The training and validation accuracy of the proposed autoencoder is 97% and 95%, respectively. Once the autoencoder is trained, it can be used to reduce and subsequently increase the dimension of any arbitrary input colour image. The efficacy of the designed autoencoder has been demonstrated by the successful reconstruction of the compressed image into the original colour image with negligible perceptual distortion. The second major contribution presented in this paper is an image encryption scheme using DNA along with multiple chaotic sequences and substitution boxes. The security of the proposed image encryption algorithm has been gauged using several evaluation parameters, such as histogram of the cipher image, entropy, NPCR, UACI, key sensitivity, contrast, and so on. The experimental results of the proposed scheme demonstrate its effectiveness to perform colour image encryption. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
28. Color Image Cryptosystem Based on Sine Chaotic Map, 4D Chen Hyperchaotic Map of Fractional-Order and Hybrid DNA Coding
- Author
-
Wassim Alexan, Mohamed Gabr, Eyad Mamdouh, Rimon Elias, and Amr Aboshousha
- Subjects
Chaos theory ,chen hyperchaotic map ,DNA coding ,fractional-order ,image cryptosystem ,image encryption ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
With advancements in computer and communication technologies, the production, utilization and applications of digital images is at an unprecedented rate. Recent applications include military communications, remote sensing, novel engineering designs storage and communications, as well as medical imaging. In most cases, such images convey highly sensitive or confidential information, which creates a strong need for the design of secure and robust color image cryptosystems. Recent literature has shown that fractional-order functions exhibit improved performance over their corresponding integer-order versions. This is especially true in their use in image processing applications. In this research work, we make use of a four-dimensional (4D) hyperchaotic Chen map of fractional-order, in conjunction with a sine chaotic map and a novel hybrid DNA coding algorithm. A thorough numerical analysis is presented, showcasing the security performance and efficiency of the proposed color image cryptosystem. Performance is gauged in terms of resilience against visual, histogram, statistical, entropy, differential, as well as brute-force attacks. Mean values of the metrics computed are as follows. MSE of 9396, PSNR of 8.27 dB, information entropy of 7.997, adjacent pixel correlation coefficient of 0, NPCR of 99.62%, UACI of 33, MAE of 80.57, and a very large key space of 2744. The proposed image cryptosystem exhibits low computational complexity, as it encrypts images at a rate of 4.369 Mbps. Furthermore, it passes the NIST SP 800 suite of tests successfully. Comparison of the computed metrics of the proposed image cryptosystem against those reported in the state-of-the-art by counterpart algorithms show that the proposed cryptosystem exhibits comparable or superior values.
- Published
- 2023
- Full Text
- View/download PDF
29. Stable Image Encryption Algorithm Based on Expanded One-Dimensional Chaotic Jumping and Parallel Encoding Operation Grouping
- Author
-
Tianshuo Zhang and Yiqun Ma
- Subjects
Image encryption algorithms ,chaotic system ,DNA coding ,image processing ,privacy protection schemes ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The current algorithm of encrypting images uses low-dimensional chaotic systems with a limited key space and poor security, while high-dimensional chaotic systems are difficult to implement and inefficient. Additionally, if image encryption algorithms use fixed DNA encoding rules, they could be cracked; dynamic coding can easily deviate from optimal solutions, thus causing algorithm instability. Based on this, a novel technique for image encryption is presented in this article. It is possible to avoid linear correlation of the chaotic sequence by randomly jumping on two uncorrelated one-dimensional chaoses. Meanwhile, numerous encryption results are generated in parallel by randomly grouping DNA encoding groups and encoding operations, and the optimal solution is then selected based on the encryption results, thereby minimizing ciphertext image instability to some extent. According to the experimental results, this algorithm produces high-security, plaintext-sensitive, and non-cracking encrypted images. Furthermore, this algorithm produces excellent encryption results both on color and sized images, and is applicable to a wide variety of applications.
- Published
- 2023
- Full Text
- View/download PDF
30. Design of a new four-dimensional chaotic system and its application to color image encryption.
- Author
-
Yan, Shaohui, Li, Lin, Zhao, Weilong, and Gu, Binxian
- Abstract
In this paper, a new four-dimensional chaotic system is constructed. Then, the dynamics of the phase diagram, Lyapunov exponent, bifurcation, and complexity of the system are investigated, and the simulation circuit of the system is designed and the trajectory simulation of the system is implemented using a field programmable gate array. National Institute of Standards and Technology tests have verified the randomness of the output of the chaotic sequence by the system. Finally, a new color image encryption algorithm is designed based on this system. In the proposed algorithm, the plaintext information is used to generate the initial value of the system through a hashing algorithm, and the plaintext information is applied to the algorithm, reflecting the idea of algorithmic adaption. The bit-plane decomposition row dislocation breaks the strong correlation between pixels, and finally, the DNA encoding is combined with the diffusion method to complete the complete encryption process. Multiple security analysis methods show that the scheme has a good encryption effect. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
31. An Image Encryption Algorithm Based on Improved Hilbert Curve Scrambling and Dynamic DNA Coding.
- Author
-
Geng, Shengtao, Li, Jiahao, Zhang, Xuncai, and Wang, Yanfeng
- Subjects
- *
IMAGE encryption , *DISCRETE wavelet transforms , *ALGORITHMS , *DNA - Abstract
As an effective method for image security protection, image encryption is widely used in data hiding and content protection. This paper proposes an image encryption algorithm based on an improved Hilbert curve with DNA coding. Firstly, the discrete wavelet transform (DWT) decomposes the plaintext image by three-level DWT to obtain the high-frequency and low-frequency components. Secondly, different modes of the Hilbert curve are selected to scramble the high-frequency and low-frequency components. Then, the high-frequency and low-frequency components are reconstructed separately using the inverse discrete wavelet transform (IDWT). Then, the bit matrix of the image pixels is scrambled, changing the pixel value while changing the pixel position and weakening the strong correlation between adjacent pixels to a more significant correlation. Finally, combining dynamic DNA coding and ciphertext feedback to diffuse the pixel values improves the encryption effect. The encryption algorithm performs the scrambling and diffusion in alternating transformations of space, frequency, and spatial domains, breaking the limitations of conventional scrambling. The experimental simulation results and security analysis show that the encryption algorithm can effectively resist statistical attacks and differential attacks with good security and robustness. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
32. An efficient image encryption algorithm based on S-box and DNA code
- Author
-
Jian Zhang, Jifeng Guo, and Donglei Lu
- Subjects
DNA coding ,S-box ,Image encryption ,Chaotic map ,Electric apparatus and materials. Electric circuits. Electric networks ,TK452-454.4 - Abstract
In order to ensure the security of image information transmission, a new image encryption algorithm is proposed based on S-box and DNA coding theory. Through the construction of the dynamic S-box, the key space of the encryption algorithm is enlarged, and the encryption process is more flexible. The flexibility of DNA encoding allows for a larger key volume and higher security in image encryption. Experimental results show that the encrypted image gray level distribution is uniform, the correlation between adjacent pixels is lower, the encryption effect is good, and it has good security.
- Published
- 2023
- Full Text
- View/download PDF
33. A Novel Data Encryption Technique Based on DNA Sequence
- Author
-
Deb, Abritti, Banik, Satakshi, Debbarma, Pankaj, Dey, Piyali, Biswas, Ankur, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Giri, Debasis, editor, Mandal, Jyotsna Kumar, editor, Sakurai, Kouichi, editor, and De, Debashis, editor
- Published
- 2022
- Full Text
- View/download PDF
34. Cryptanalyzing an image cipher using multiple chaos and DNA operations
- Author
-
Heping Wen and Yiting Lin
- Subjects
Image encryption ,Chaos ,DNA coding ,Cryptanalysis ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Recently, an improved color image cipher (ICIC-DNA) based on multiple deoxyribonucleic acid (DNA) sequence operations with DNA synthetic image and chaos was proposed. ICIC-DNA features the use of multiple chaotic systems and diverse DNA operations. However, after our careful cryptanalysis, we found that ICIC-DNA has several fatal security flaws. First, despite the use of multiple chaotic systems, the corresponding encryption sequences are independent of the plaintext, such that equivalent keys exist. Second, the diverse DNA operation is essentially a 2-bit data substitution process, and thus can be equivalently simplified. Third, ICIC-DNA includes substitution and permutation of DNA domains, and based on the equivalent simplification operation, the substitution and permutation can be attacked separately. Based on these, we propose a chosen-plaintext attack method to attack ICIC-DNA. Differential analysis is firstly adopted to break the DNA-base permutation process, and then the DNA domain encryption is eliminated, and finally the equivalent key is used to achieve complete cracking. Theoretical analysis and experimental results show that the proposed attack method is effective and has low computational complexity and data complexity.
- Published
- 2023
- Full Text
- View/download PDF
35. A novel image encryption scheme based on 2D SILM and improved permutation-confusion-diffusion operations.
- Author
-
Liu, Xinkang, Sun, Kehui, and Wang, Huihai
- Subjects
IMAGE encryption ,LYAPUNOV exponents ,DIGITAL images ,DNA sequencing ,PIXELS ,ALGORITHMS - Abstract
Security issues of digital images have rapidly become a frontier research focus in the past decades. When a chaotic system is applied to encrypt image, it usually requires large parameter space, high ergodicity and easy implementation. In this paper, taking Sine and ICMIC map as seed maps, a novel 2D hyperchaotic Logistic map (2D-SILM) is designed based on the 2D parameter modulation model (PMM). Its dynamics are analyzed by means of attractor diagrams, Lyapunov exponent spectrum (LEs) and complexity diagrams. The results along with NIST SP-800 test prove the feasibility of 2D-SILM. Based on 2D-SILM and DNA coding, a reliable image encryption scheme is proposed with two-round improved permutation-confusion-diffusion operations. SHA-512 function is introduced in the generation of the secret key. After applying the effective permutation process called chaotic grouping shuffle (CGS) on pixels position, DNA sequences procedures varied from different rounds are used to confuse the image pixels value. Finally, a novel diffusion method containing row and column operation is designed. Simulation results of some indexes validate the security and efficiency of the proposed algorithm. It also shows better resistance to typical attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
36. Quantum Image Encryption Based on Quantum DNA Codec and Pixel-Level Scrambling.
- Author
-
Gao, Jie, Wang, Yinuo, Song, Zhaoyang, and Wang, Shumei
- Subjects
- *
IMAGE encryption , *DNA , *ENTROPY (Information theory) , *OPTICAL images - Abstract
In order to increase the security and robustness of quantum images, this study combined the quantum DNA codec with quantum Hilbert scrambling to offer an enhanced quantum image encryption technique. Initially, to accomplish pixel-level diffusion and create enough key space for the picture, a quantum DNA codec was created to encode and decode the pixel color information of the quantum image using its special biological properties. Second, we used quantum Hilbert scrambling to muddle the image position data in order to double the encryption effect. In order to enhance the encryption effect, the altered picture was then employed as a key matrix in a quantum XOR operation with the original image. The inverse transformation of the encryption procedure may be used to decrypt the picture since all the quantum operations employed in this research are reversible. The two-dimensional optical image encryption technique presented in this study may significantly strengthen the anti-attack of quantum picture, according to experimental simulation and result analysis. The correlation chart demonstrates that the average information entropy of the RGB three channels is more than 7.999, the average NPCR and UACI are respectively 99.61% and 33.42%, and the peak value of the ciphertext picture histogram is uniform. It offers more security and robustness than earlier algorithms and can withstand statistical analysis and differential assaults. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
37. Construction of high-dimensional cyclic symmetric chaotic map with one-dimensional chaotic map and its security application.
- Author
-
Zhang, Yingpeng, Xiang, Hongyue, Zhang, Shijie, and Liu, Lingfeng
- Subjects
IMAGE encryption ,DNA sequencing - Abstract
Classical one-dimensional chaotic map has many ideal characteristics which is quite suitable for many different kinds of scientific fields, especially cryptography. In this paper, we propose an idea of constructing high-dimensional (HD) cyclic symmetric chaotic maps by using one-dimensional (1D) chaotic map. Two constructed 3D cyclic symmetric chaotic maps are taken as the examples, named three-dimensional cyclic symmetric logistic map (3D-CSLM) and three-dimensional cyclic symmetric Chebyshev map (3D-CSCM), respectively. Numerical experiments show that the new maps possesses better dynamical performances, and their parameters have a wider range, compared with the original map. Furthermore, to verify its effect in image encryption, a novel image encryption algorithm based on 3D-CSLM and DNA coding is proposed. DNA method for image encryption can improve the efficiency of permutation and diffusion. Firstly, the algorithm uses 3D-CSLM to generate chaotic sequences for DNA operation rule selection and pixel permutation. Then through the DNA XOR operation to achieve diffusion, and finally form an encrypted image. Several simulation tests results indicate that the proposal has a promising security performance and strong anti-attack ability. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
38. Research on Improved DNA Coding and Multidirectional Diffusion Image Encryption Algorithm.
- Author
-
Liu, Jia, Chang, Haiping, Ran, Weiyu, and Wang, Erfu
- Subjects
- *
IMAGE encryption , *ALGORITHMS , *DNA - Abstract
In order to make the security and operating efficiency of an image encryption algorithm coexist, this study proposed a color image encryption algorithm with improved DNA coding and rapid diffusion. During the stage of improving DNA coding, the chaotic sequence was used to form a look-up table to complete the base substitutions. In the replacement process, several encoding methods were combined and interspersed to make the randomness higher, thereby improving the security performance of the algorithm. In the diffusion stage, three-dimensional and six-directional diffusion was performed on the three channels of the color image by taking the matrix and the vector as the diffusion unit successively. This method not only ensures the security performance of the algorithm, but also improves the operating efficiency in the diffusion stage. From the simulation experiments and performance analysis, it was shown that the algorithm has good encryption and decryption effects, large key space, high key sensitivity, and strong security. The algorithm can effectively resist differential attacks and statistical attacks, and has good robustness. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
39. 一种动态密钥与 DNA 交错编码的多图像加密算法.
- Author
-
陈善学, 杜文正, and 任丽丹
- Subjects
NUCLEOTIDE sequence ,IMAGE encryption ,DNA sequencing ,ENTROPY (Information theory) ,DNA - Abstract
Copyright of Telecommunication Engineering is the property of Telecommunication Engineering and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
40. DESIGN AND ANALYSIS OF DNA BASED CIPHER FOR IMAGE USING DUAL CHAOTIC MAP.
- Author
-
Singh, Ajit and Singh, Bijendra
- Subjects
DNA analysis ,IMAGE encryption ,NUCLEOTIDE sequence ,ADDITION (Mathematics) ,DNA sequencing - Abstract
Design and analysis of an image encryption technique using DNA computation and chaos function has been emphasized in the present paper. The plain image was scrambled using Henon map followed by the implementation of a DNA sequence addition operation over the scrambled image with the DNA sequence-based key generated by the Logistic map. Thereafter, the generated sequence was subjected to exclusive-or operation with partial key and modulo of sum of all the pixel values. The experimental and safety analysis highlighted that the proposed encryption technique was not only invertible and computationally efficient, but also had a large key space, was extremely sensitive to secret key credentials, had a high NPCR value and a low correlation coefficient, rendering the system efficient and secure against brute-force, statistical and differential attack. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
41. An adaptive approach for securing patient data in intellectual disability care with 8D Hyperchaotic DNA encryption and IWT.
- Author
-
Anisha, J.R. and Arul Teen, Y.P.
- Subjects
DATA privacy ,BIOMEDICAL signal processing ,DATA encryption ,DATA security ,NUCLEOTIDE sequence - Abstract
[Display omitted] • Intellectual Disability (ID) requires secure storage and sharing of sensitive data. • An Adaptive Encryption Algorithm combines block scrambling, 8D hyperchaotic system and DNA coding to resist plain text, differential, brute force and cropping attacks. • Integrating Integer Wavelet Transform and DNA sequences enhances both security and computational efficiency. • Strong potential in biomedical security, medical imaging, financial transactions, and confidential communications. Intellectual disability (ID) is a neurodevelopmental disease characterized by significant intellectual and adaptive functioning impairments. Continuous monitoring and data collection are crucial for managing this condition. To collect patient's skin temperature data, doctors and caretakers often use thermal IR imaging, and they must securely share this information. To address privacy concerns and ensure robust encryption during data transmission, this study introduces an adaptive encryption algorithm that operates in both frequency and spatial domains. The algorithm counteracts various security threats, including plain text attacks, differential attacks, brute force attacks, and cropping attacks. The core of this research is the 8D Hyperchaotic DNA Encryption Algorithm, which enhances security by combining block scrambling with DNA coding. Security is further optimized through integrating the Integer Wavelet Transform (IWT) in the frequency domain and a DNA sequence in the spatial domain. The encryption process aims to balance security and computational efficiency, ensuring reliable performance. Extensive testing and validation against multiple types of attacks show the algorithm's effectiveness and reliability in practical applications. Experimental results show that the proposed system significantly enhances security against various attacks, thus setting a higher standard for encryption in biomedical image and signal processing. This algorithm shows potential for broader applications beyond intellectual disability care, including secure data transmission in medical imaging, financial transactions, and confidential communications, because of its robust encryption capabilities and adaptability to different data types. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
42. One-Dimensional Quadratic Chaotic System and Splicing Model for Image Encryption.
- Author
-
Chen, Chen, Zhu, Donglin, Wang, Xiao, and Zeng, Lijun
- Subjects
IMAGE encryption ,DIGITAL communications ,IMAGE transmission ,IMAGE analysis - Abstract
Digital image transmission plays a very significant role in information transmission, so it is very important to protect the security of image transmission. Based on the analysis of existing image encryption algorithms, this article proposes a new digital image encryption algorithm based on the splicing model and 1D secondary chaotic system. Step one is the algorithm of this article divides the plain image into four sub-parts by using quaternary coding, and these four sub-parts can be coded separately. Only by acquiring all the sub-parts at one time can the attacker recover the useful plain image. Therefore, the algorithm has high security. Additionally, the image encryption scheme in this article used a 1D quadratic chaotic system, which makes the key space big enough to resist exhaustive attacks. The experimental data show that the image encryption algorithm has high security and a good encryption effect. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
43. A Novel Image Encryption Algorithm Based on Multiple Random DNA Coding and Annealing.
- Author
-
Zhang, Tianshuo, Zhu, Bingbing, Ma, Yiqun, and Zhou, Xiaoyi
- Subjects
IMAGE encryption ,SIMULATED annealing ,DNA ,ALGORITHMS ,ENTROPY (Information theory) ,MATHEMATICAL optimization - Abstract
Improved encryption devices place higher demands on the randomness and security of encrypted images. Existing image encryption optimization methods based on single- or multi-objectives concentrate on selecting keys and parameters, resulting in relatively fixed parameters and keys that are susceptible to leakage and cracking. Despite the possibility of increasing security, the DNA coding encryption method does not fully take into account the large capacity of image data and the difference between pixels, resulting in a limited level of randomness. To overcome the problems above, this paper proposes a method for generating complex texture features in images using random variation of pixels. With an annealing algorithm that can find an optimal solution in a large search space, the image is optimally optimized in terms of information entropy, pixel correlation, and value of x
2 . Each iteration involves selecting one of 25632 combinations of DNA coding and operation. In comparison with current encryption algorithms based on optimization algorithms and DNA coding, this method is more secure and unbreakable. [ABSTRACT FROM AUTHOR]- Published
- 2023
- Full Text
- View/download PDF
44. Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding.
- Author
-
Zhu, Shenli, Deng, Xiaoheng, Zhang, Wendong, and Zhu, Congxu
- Subjects
- *
IMAGE encryption , *MAP design , *DNA , *PARALLEL programming , *PARALLEL algorithms - Abstract
In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map. The mathematical model of the new chaotic system combines a sine map and a fraction operation. Compared with some traditional one-dimensional chaotic systems, the new chaotic system has a larger range of chaotic parameters and better chaotic characteristics, which makes it more suitable for applications in information encryption. In addition, an image encryption algorithm based on parallel DNA coding is proposed, which overcomes the shortcoming of common DNA coding-based image encryption algorithms. Parallel computing significantly increases the speed of encryption and decryption algorithms. The initial key of the cryptosystem is designed to be related to the SHA-3 hash value of the plaintext image so that the algorithm can resist a chosen-plaintext attack. Simulation experiments and security analysis results show that the proposed image encryption scheme has good encryption performance and less time overhead, and has strong robustness to noise and data loss attacks, which indicates that the proposed image encryption scheme has good application potential in secure communication applications. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
45. Memristor-Based Hyperchaotic System and DNA Encoding Based Image Encryption Application on LabVIEW.
- Author
-
Şahin, Muhammet Emin
- Abstract
The growth of multimedia and communication tools has sped up the data transfer thanks to technological advancements, and ensuring image security has become a crucial doubt, particularly during the transmission and storage of the images. So, when images are sent via a public network, they should be encrypted before being sent to the receiving part. In this study, a memristor-based encryption system with Deoxyribonucleic acid (DNA) coding is proposed on the LabVIEW platform to ensure information security. Firstly, memrsitor based hyperchaotic system is used for chaotic sequence. The images are encrypted using the DNA and XOR arithmetic process on the LabVIEW platform. A memristor-based hyperchaotic system and the combination of techniques used aim to encrypt the image securely. Additionally, security tests; histogram analysis, correlation analysis, differential attack, and entropy analysis, are performed on the proposed system and the results are presented. The aforementioned methods are thoroughly examined and tested to determine their efficacy. It has been determined that the proposed encryption schemes are effective and can therefore be used in real-time applications. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
46. Improved Particle Swarm Based on Elastic Collision for DNA Coding Optimization Design
- Author
-
Donglin Zhu, Zuwei Huang, Linpeng Xie, and Changjun Zhou
- Subjects
DNA computing ,DNA coding ,improved particle swarm of elastic collisions ,sparrow search algorithm ,harmony search algorithm ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In DNA computing, the design of DNA coding sequences is an important factor affecting the reliability of DNA computing. In different DNA sequence designs, suitable constraints should be selected and the sequence design should be rationalized according to these constraints. In this paper, an improved particle swarm optimization algorithm based on elastic collision strategy (EC-PSO) is used to optimize the design of DNA sequences by using an adaptation function that satisfies multiple constraints. EC-PSO uses the idea of elastic collision to improve the optimal and worst positions within the population, introduces the flight means of the sparrow search algorithm (SSA) to enhance the search capability of the algorithm and increase the diversity of the population; then introduces the harmony search algorithm to the population is then fine-tuned to improve the quality of the solution. The effectiveness of the algorithm was verified by comparing it with the other six algorithms in eight test functions. Finally, the sequence designed was more reasonable in the DNA optimal design experiment.
- Published
- 2022
- Full Text
- View/download PDF
47. A novel conservative chaos driven dynamic DNA coding for image encryption
- Author
-
Vinod Patidar and Gurpreet Kaur
- Subjects
images encryption ,conservative chaos ,chaotic standard map ,DNA coding ,chaos-based image encryption ,DNA encryption ,Applied mathematics. Quantitative methods ,T57-57.97 ,Probabilities. Mathematical statistics ,QA273-280 - Abstract
Recently, many image encryption algorithms based on hybrid DNA and chaos have been developed. Most of these algorithms utilize chaotic systems exhibiting dissipative dynamics and periodic windows/patterns in the bifurcation diagrams along with co-existing attractors in the neighborhoods of parameter space. Therefore, such algorithms generate several weak keys, thereby making them prone to various chaos- specific attacks. In this paper, we propose a novel conservative chaotic standard map-driven dynamic DNA coding (encoding, addition, subtraction and decoding) for image encryption. It is the first hybrid DNA and conservative chaos-based image encryption algorithm having effectively infinite key space. The proposed image encryption algorithm is a dynamic DNA coding algorithm i.e., for the encryption of each pixel different rules for encoding, addition/subtraction, decoding etc. are randomly selected based on the pseudorandom sequences generated with the help of the conservative chaotic standard map. We propose a novel way to generate pseudo-random sequences through the conservative chaotic standard map and also test them rigorously through the most stringent test suite of pseudo-randomness, the NIST test suite, before using them in the proposed image encryption algorithm. Our image encryption algorithm incorporates unique feed-forward and feedback mechanisms to generate and modify the dynamic one-time pixels that are further used for the encryption of each pixel of the plain image, therefore, bringing in the desired sensitivity on plaintext as well as ciphertext. All the controlling pseudorandom sequences used in the algorithm are generated for a different value of the parameter (part of the secret key) with inter-dependency through the iterates of the chaotic map (in the generation process) and therefore possess extreme key sensitivity too. The performance and security analysis has been executed extensively through histogram analysis, correlation analysis, information entropy analysis, DNA sequence-based analysis, perceptual quality analysis, key sensitivity analysis, plaintext sensitivity analysis, classical attack analysis, etc. The results are promising and prove the robustness of the algorithm against various common cryptanalytic attacks.
- Published
- 2023
- Full Text
- View/download PDF
48. Image encryption scheme based on double permutation and DNA
- Author
-
Zhang, Xuncai, Di, Jiali, and Niu, Ying
- Published
- 2023
- Full Text
- View/download PDF
49. DMAV: Enhanced MAV Link Protocol Using Dynamic DNA Coding for Unmanned Aerial Vehicles.
- Author
-
Kassim, Ghada Emad and Hashem, Soukaena Hassan
- Subjects
DRONE aircraft ,PUBLIC key cryptography ,DNA ,DATA encryption ,DATA transmission systems - Abstract
In the modern era, new and innovative ways of securing data and communications are continuously developing. One such recent development is using the concept of DNA as a means of data encryption. In this work, we propose a new approach to encrypt data and communications on the MAVLink protocol for unmanned aerial vehicles (UAVs) using a lightweight GIFT algorithm and dynamic DNA coding (with binary bits). MAVLink is a communication protocol for UAVs, which is currently unencrypted and can easily be intercepted by anyone. As such, a secure MAVLink protocol has long been needed in the UAV industry. We describe a novel secure communication protocol for UAVs using dynamic DNA coding to encrypt MAVLink packets, which we call DMAV. Experimental results show that this novel means of securing the MAVLink protocol performs better than the traditional method (i.e., using public and private key cryptography). Therefore, the proposed approach could potentially change the way secure communications are conducted between UAVs in the future. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
50. A Novel Color Image Encryption Scheme Based on Hyperchaos and Hopfield Chaotic Neural Network.
- Author
-
Wu, Yanan, Zeng, Jian, Dong, Wenjie, Li, Xinyu, Qin, Danyang, and Ding, Qun
- Subjects
- *
IMAGE encryption , *PROBLEM solving , *COLOR - Abstract
Problems such as insufficient key space, lack of a one-time pad, and a simple encryption structure may emerge in existing encryption schemes. To solve these problems, and keep sensitive information safe, this paper proposes a plaintext-related color image encryption scheme. Firstly, a new five-dimensional hyperchaotic system is constructed in this paper, and its performance is analyzed. Secondly, this paper applies the Hopfield chaotic neural network together with the novel hyperchaotic system to propose a new encryption algorithm. The plaintext-related keys are generated by image chunking. The pseudo-random sequences iterated by the aforementioned systems are used as key streams. Therefore, the proposed pixel-level scrambling can be completed. Then the chaotic sequences are utilized to dynamically select the rules of DNA operations to complete the diffusion encryption. This paper also presents a series of security analyses of the proposed encryption scheme and compares it with other schemes to evaluate its performance. The results show that the key streams generated by the constructed hyperchaotic system and the Hopfield chaotic neural network improve the key space. The proposed encryption scheme provides a satisfying visual hiding result. Furthermore, it is resistant to a series of attacks and the problem of structural degradation caused by the simplicity of the encryption system's structure. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.