A DNA Computation-Based Image Encryption Scheme for Cloud CCTV Systems

被引:9
作者
Wu, Tsu-Yang [1 ,2 ]
Fan, Xiaoning [3 ]
Wang, King-Hang [4 ]
Lai, Chin-Feng [5 ]
Xiong, Naixue [6 ]
Wu, Jimmy Ming-Tai [7 ]
机构
[1] Fujian Univ Technol, Fujian Prov Key Lab Big Data Min & Applicat, Fuzhou 350118, Peoples R China
[2] Fujian Univ Technol, Natl Demonstrat Ctr Expt Elect Informat & Elect T, Fuzhou 350118, Peoples R China
[3] Huawei Technol Co Ltd, Shenzhen 518129, Peoples R China
[4] Hong Kong Univ Sci & Technol, Dept Comp Sci & Engn, Hong Kong, Peoples R China
[5] Natl Cheng Kung Univ, Dept Engn Sci, Tainan 701, Taiwan
[6] Tianjin Univ, Coll Intelligence & Comp, Tianjin 300350, Peoples R China
[7] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
关键词
IoT; CCTV; image encryption; chaotic map; DNA coding; SEQUENCE OPERATION; ALGORITHM; CHAOS; CRYPTANALYSIS; IMPROVEMENT; STRATEGY; MODEL;
D O I
10.1109/ACCESS.2019.2946890
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of information technology, huge amounts of images stored in cloud-based CCTV systems. How to protect the transmitted image efficiently and reducing the storage cost for the system become to critical research issues. The concept of DNA computing has been intrigued researchers in recent years. It has many potentials, for example, the high density and low cost storage provided by a double stranded DNA; or a realization of low cost parallel computation to solve non-deterministic polynomial time problem using replication of DNA strands. As a result, a vast number of theoretical studies of the application of DNA computing on information security, which require extensive computation power, has been published. In this paper we study DNA computation based image encryption scheme which applies to cloud CCTV system. In many different image encryption research the artifact hyperchaotic map was used. We proposed an image encryption algorithm based on DNA coding and hyperchaotic map which utilizes the chaotic property of the hyperchaotic map on top of DNA computing. Experiment showed that our algorithm is more secure and more computation efficient than some of the recent similar works.
引用
收藏
页码:181434 / 181443
页数:10
相关论文
共 47 条
  • [1] MOLECULAR COMPUTATION OF SOLUTIONS TO COMBINATORIAL PROBLEMS
    ADLEMAN, LM
    [J]. SCIENCE, 1994, 266 (5187) : 1021 - 1024
  • [2] [Anonymous], IEEE T CYBERN
  • [3] Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
    Chen, Chien-Ming
    Wang, King-Hang
    Yeh, Kuo-Hui
    Xiang, Bin
    Wu, Tsu-Yang
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (08) : 3133 - 3142
  • [4] A Secure Authentication Protocol for Internet of Vehicles
    Chen, Chien-Ming
    Xiang, Bin
    Liu, Yining
    Wang, King-Hang
    [J]. IEEE ACCESS, 2019, 7 : 12047 - 12057
  • [5] Gehani A, 2004, LECT NOTES COMPUT SC, V2950, P167
  • [6] A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2
    Guesmi, R.
    Farah, M. A. B.
    Kachouri, A.
    Samet, M.
    [J]. NONLINEAR DYNAMICS, 2016, 83 (03) : 1123 - 1136
  • [7] An image encryption scheme combining chaos with cycle operation for DNA sequences
    Hu, Ting
    Liu, Ye
    Gong, Li-Hua
    Ouyang, Chun-Juan
    [J]. NONLINEAR DYNAMICS, 2017, 87 (01) : 51 - 66
  • [8] An efficient image encryption algorithm based on S8 S-box transformation and NCA map
    Hussain, Iqtadar
    Shah, Tariq
    Gondal, Muhammad Asif
    [J]. OPTICS COMMUNICATIONS, 2012, 285 (24) : 4887 - 4890
  • [9] Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes
    Jeng, Fuh-Gwo
    Huang, Wei-Lun
    Chen, Tzung-Her
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2015, 34 : 45 - 51
  • [10] Kocarev L., 2001, IEEE Circuits and Systems Magazine, V1, P6, DOI 10.1109/7384.963463