A novel conservative chaos driven dynamic DNA coding for image encryption

被引:7
作者
Patidar, Vinod [1 ]
Kaur, Gurpreet [2 ]
机构
[1] Sir Padampat Singhania Univ, Udaipur, Rajasthan, India
[2] Amity Univ, Amity Inst Informat Technol, Noida, Uttar Pradesh, India
关键词
images encryption; conservative chaos; chaotic standard map; DNA coding; chaos-based image encryption; DNA encryption; OPTICAL ENCRYPTION; ALGORITHM; PERMUTATION; SEQUENCE; SCHEME; DIFFUSION; SECURE; CRYPTOSYSTEM; OPERATION; STANDARD;
D O I
10.3389/fams.2022.1100839
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Recently, many image encryption algorithms based on hybrid DNA and chaos have been developed. Most of these algorithms utilize chaotic systems exhibiting dissipative dynamics and periodic windows/patterns in the bifurcation diagrams along with co-existing attractors in the neighborhoods of parameter space. Therefore, such algorithms generate several weak keys, thereby making them prone to various chaos- specific attacks. In this paper, we propose a novel conservative chaotic standard map-driven dynamic DNA coding (encoding, addition, subtraction and decoding) for image encryption. It is the first hybrid DNA and conservative chaos-based image encryption algorithm having effectively infinite key space. The proposed image encryption algorithm is a dynamic DNA coding algorithm i.e., for the encryption of each pixel different rules for encoding, addition/subtraction, decoding etc. are randomly selected based on the pseudorandom sequences generated with the help of the conservative chaotic standard map. We propose a novel way to generate pseudo-random sequences through the conservative chaotic standard map and also test them rigorously through the most stringent test suite of pseudo-randomness, the NIST test suite, before using them in the proposed image encryption algorithm. Our image encryption algorithm incorporates unique feed-forward and feedback mechanisms to generate and modify the dynamic one-time pixels that are further used for the encryption of each pixel of the plain image, therefore, bringing in the desired sensitivity on plaintext as well as ciphertext. All the controlling pseudorandom sequences used in the algorithm are generated for a different value of the parameter (part of the secret key) with inter-dependency through the iterates of the chaotic map (in the generation process) and therefore possess extreme key sensitivity too. The performance and security analysis has been executed extensively through histogram analysis, correlation analysis, information entropy analysis, DNA sequence-based analysis, perceptual quality analysis, key sensitivity analysis, plaintext sensitivity analysis, classical attack analysis, etc. The results are promising and prove the robustness of the algorithm against various common cryptanalytic attacks.
引用
收藏
页数:21
相关论文
共 63 条
[1]   MOLECULAR COMPUTATION OF SOLUTIONS TO COMBINATORIAL PROBLEMS [J].
ADLEMAN, LM .
SCIENCE, 1994, 266 (5187) :1021-1024
[2]   Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption [J].
Alvarez, G. ;
Li, Shujun .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2009, 14 (11) :3743-3749
[4]  
Bassham L., 2010, NIST SP
[5]   Novel Medical Image Encryption Scheme Based on Chaos a DNA Encoding [J].
Belazi, Akram ;
Talha, Muhammad ;
Kharbech, Sofiane ;
Xiang, Wei .
IEEE ACCESS, 2019, 7 :36667-36681
[6]   A color image cryptosystem based on dynamic DNA encryption and chaos [J].
Chai, Xiuli ;
Fu, Xianglong ;
Gan, Zhihua ;
Lu, Yang ;
Chen, Yiran .
SIGNAL PROCESSING, 2019, 155 :44-62
[7]   A novel chaos-based image encryption algorithm using DNA sequence operations [J].
Chai, Xiuli ;
Chen, Yiran ;
Broyde, Lucie .
OPTICS AND LASERS IN ENGINEERING, 2017, 88 :197-213
[8]   Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption [J].
Chen, Junxin ;
Zhu, Zhi-liang ;
Zhang, Li-bo ;
Zhang, Yushu ;
Yang, Ben-Qiang .
SIGNAL PROCESSING, 2018, 142 :340-353
[9]   Hiding messages in DNA microdots [J].
Clelland, CT ;
Risca, V ;
Bancroft, C .
NATURE, 1999, 399 (6736) :533-534
[10]  
Dagadu J.C., 2019, INT J NETW SECUR, V21, P83