Color image DNA encryption using NCA map-based CML and one-time keys

被引:241
作者
Wu, Xiangjun [1 ,4 ,5 ]
Wang, Kunshu [2 ]
Wang, Xingyuan [3 ]
Kan, Haibin [4 ]
Kurths, Juergen [5 ,6 ]
机构
[1] Henan Univ, Coll Software, Kaifeng 475004, Peoples R China
[2] Henan Univ, Sch Comp & Informat Engn, Kaifeng 475004, Peoples R China
[3] Dalian Univ Technol, Fac Elect Informat & Elect Engn, Dalian 176024, Peoples R China
[4] Fudan Univ, Sch Comp Sci, Shanghai Key Lab Intelligent Informat Proc, Shanghai 200433, Peoples R China
[5] Humboldt Univ, Dept Phys, D-72489 Berlin, Germany
[6] Potsdam Inst Climate Impact Res PIK, D-74473 Potsdam, Germany
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Color image encryption; SHA-256; NCA map-based CML; DNA sequence operation; HYPER-CHAOTIC SYSTEM; SEQUENCE OPERATION; ALGORITHM; CRYPTANALYSIS; SECURE; DIFFUSION;
D O I
10.1016/j.sigpro.2018.02.028
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we introduce a novel color image encryption algorithm based on DNA sequence operations, one-time keys and the spatiotemporal chaos. Firstly, the key streams are generated by the NCA map-based CML, where the hash function SHA-256 is used to update the system parameters and initial conditions combining with the plain-image and the secret keys. Secondly, decompose the plain-image into the red, green, blue components, and convert them randomly into three DNA matrices by the DNA encoding rules. Further, combine three DNA matrices into a new DNA matrix, and then perform the row wise and column-wise permutations on it. Thirdly, divide the shuffled DNA matrix into three equal blocks and implement the DNA addition, subtraction and XOR operations on these DNA blocks. Finally, transform the DNA matrices into the decimal matrices separately according to the DNA decoding rules. To enhance the security of the cryptosystem, a diffusion process is further carried out by using the key streams. Thus, the resulting cipher-image is attained. Experimental results and security analysis show that the presented encryption algorithm has a good encryption effect and can resist various typical attacks. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:272 / 287
页数:16
相关论文
共 61 条
  • [1] MOLECULAR COMPUTATION OF SOLUTIONS TO COMBINATORIAL PROBLEMS
    ADLEMAN, LM
    [J]. SCIENCE, 1994, 266 (5187) : 1021 - 1024
  • [2] Cryptanalysis of an image encryption algorithm based on DNA encoding
    Akhavan, A.
    Samsudin, A.
    Akhshani, A.
    [J]. OPTICS AND LASER TECHNOLOGY, 2017, 95 : 94 - 99
  • [3] FPGA-based implementation alternatives for the inner loop of the Secure Hash Algorithm SHA-256
    Algredo-Badillo, I.
    Feregrino-Uribe, C.
    Cumplido, R.
    Morales-Sandoval, M.
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2013, 37 (6-7) : 750 - 757
  • [4] An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos
    Aqeel-ur-Rehman
    Liao, Xiaofeng
    Hahsmi, Muntazim Abbas
    Haider, Rizwan
    [J]. OPTIK, 2018, 153 : 117 - 134
  • [5] Cryptanalysis of a one round chaos-based Substitution Permutation Network
    Arroyo, David
    Diaz, Jesus
    Rodriguez, F. B.
    [J]. SIGNAL PROCESSING, 2013, 93 (05) : 1358 - 1364
  • [7] Secure image encryption algorithm design using a novel chaos based S-Box
    Cavusoglu, Unal
    Kacar, Sezgin
    Pehlivan, Ihsan
    Zengin, Ahmet
    [J]. CHAOS SOLITONS & FRACTALS, 2017, 95 : 92 - 101
  • [8] A novel chaos-based image encryption algorithm using DNA sequence operations
    Chai, Xiuli
    Chen, Yiran
    Broyde, Lucie
    [J]. OPTICS AND LASERS IN ENGINEERING, 2017, 88 : 197 - 213
  • [9] Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption
    Chen, Junxin
    Zhu, Zhi-liang
    Zhang, Li-bo
    Zhang, Yushu
    Yang, Ben-Qiang
    [J]. SIGNAL PROCESSING, 2018, 142 : 340 - 353
  • [10] NUMERICAL-METHODS CAN SUPPRESS CHAOS
    CORLESS, RM
    ESSEX, C
    NERENBERG, MAH
    [J]. PHYSICS LETTERS A, 1991, 157 (01) : 27 - 36