A DNA Computation-Based Image Encryption Scheme for Cloud CCTV Systems

被引:11
作者
Wu, Tsu-Yang [1 ,2 ]
Fan, Xiaoning [3 ]
Wang, King-Hang [4 ]
Lai, Chin-Feng [5 ]
Xiong, Naixue [6 ]
Wu, Jimmy Ming-Tai [7 ]
机构
[1] Fujian Univ Technol, Fujian Prov Key Lab Big Data Min & Applicat, Fuzhou 350118, Peoples R China
[2] Fujian Univ Technol, Natl Demonstrat Ctr Expt Elect Informat & Elect T, Fuzhou 350118, Peoples R China
[3] Huawei Technol Co Ltd, Shenzhen 518129, Peoples R China
[4] Hong Kong Univ Sci & Technol, Dept Comp Sci & Engn, Hong Kong, Peoples R China
[5] Natl Cheng Kung Univ, Dept Engn Sci, Tainan 701, Taiwan
[6] Tianjin Univ, Coll Intelligence & Comp, Tianjin 300350, Peoples R China
[7] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
关键词
IoT; CCTV; image encryption; chaotic map; DNA coding; SEQUENCE OPERATION; ALGORITHM; CHAOS; CRYPTANALYSIS; IMPROVEMENT; STRATEGY; MODEL;
D O I
10.1109/ACCESS.2019.2946890
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of information technology, huge amounts of images stored in cloud-based CCTV systems. How to protect the transmitted image efficiently and reducing the storage cost for the system become to critical research issues. The concept of DNA computing has been intrigued researchers in recent years. It has many potentials, for example, the high density and low cost storage provided by a double stranded DNA; or a realization of low cost parallel computation to solve non-deterministic polynomial time problem using replication of DNA strands. As a result, a vast number of theoretical studies of the application of DNA computing on information security, which require extensive computation power, has been published. In this paper we study DNA computation based image encryption scheme which applies to cloud CCTV system. In many different image encryption research the artifact hyperchaotic map was used. We proposed an image encryption algorithm based on DNA coding and hyperchaotic map which utilizes the chaotic property of the hyperchaotic map on top of DNA computing. Experiment showed that our algorithm is more secure and more computation efficient than some of the recent similar works.
引用
收藏
页码:181434 / 181443
页数:10
相关论文
共 47 条
[11]   Hiding sensitive itemsets with multiple objective optimization [J].
Lin, Jerry Chun-Wei ;
Zhang, Yuyu ;
Zhang, Binbin ;
Fournier-Viger, Philippe ;
Djenouri, Youcef .
SOFT COMPUTING, 2019, 23 (23) :12779-12797
[12]   PPSF: An Open- Source Privacy-Preserving and Security Mining Framework [J].
Lin, Jerry Chun-Wei ;
Fournier-Viger, Philippe ;
Wu, Lintai ;
Gan, Wensheng ;
Djenouri, Youcef ;
Zhang, Ji .
2018 18TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2018, :1459-1463
[13]   Mining of skyline patterns by considering both frequent and utility constraints [J].
Lin, Jerry Chun-Wei ;
Yang, Lu ;
Fournier-Viger, Philippe ;
Hong, Tzung-Pei .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2019, 77 :229-238
[14]   A RGB image encryption algorithm based on DNA encoding and chaos map [J].
Liu, Lili ;
Zhang, Qiang ;
Wei, Xiaopeng .
COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (05) :1240-1248
[15]   Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map [J].
Liu, Yuansheng ;
Tang, Jie ;
Xie, Tao .
OPTICS AND LASER TECHNOLOGY, 2014, 60 :111-115
[16]  
Matthews R., 1989, CRYPTOLOGIA, V13, P29, DOI 10.1080/0161-118991863745
[17]  
Mo Y., IEEE T DEPENDABLE SE
[18]   Colored Image Encryption Algorithm using DNA Code and Chaos Theory [J].
Mokhtar, M. Amr ;
Gobran, Sameh N. ;
El-Badawy, El-Sayed A-M. .
2014 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE), 2014, :12-15
[19]  
Mondal B, 2017, J KING SAUD UNIV-COM, V29, P499, DOI 10.1016/j.jksuci.2016.02.003
[20]   An anonymous entropy-based location privacy protection scheme in mobile social networks [J].
Ni, Lina ;
Tian, Fulong ;
Ni, Qinghang ;
Yan, Yan ;
Zhang, Jinquan .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (1)