An efficient block-level image encryption scheme based on multi-chaotic maps with DNA encoding

被引:28
作者
Naskar, Prabir Kumar [1 ]
Bhattacharyya, Surojit [2 ]
Mahatab, Kailash Chandra [2 ]
Dhal, Krishna Gopal [3 ]
Chaudhuri, Atal [4 ]
机构
[1] Govt Coll Engn & Text Technol, Dept Comp Sci & Engn, Hooghly, W Bengal, India
[2] MCKV Inst Engn, Dept Comp Sci & Engn, Howrah, W Bengal, India
[3] Midnapore Coll, Dept Comp Sci & Applicat, Paschim Medinipur, W Bengal, India
[4] Jadavpur Univ, Dept Comp Sci & Engn, Kolkata, W Bengal, India
关键词
Image encryption; Sine logistic modulation map; Logistic chaotic map; DNA encoding; Security analyses; NIST test; BROWNIAN-MOTION; HYPER-CHAOS; ALGORITHM; PERMUTATION; SYSTEM; TRANSFORM; DIFFUSION; BREAKING;
D O I
10.1007/s11071-021-06761-0
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
This paper presents an efficient image encryption scheme based on permutation followed by diffusion, where both of these phases use 2-d Sine logistic modulation map (SLMM) with different initial values. In addition, diffusion uses another map as 1-d Logistic chaotic map (LCM). The initial values of these chaotic maps are obtained from an external key of 64 bytes along with 32-byte hash value from the corresponding plain-image to incorporate plain-text sensitivity. Initially, confusion of the plain-image is implemented by applying row-level and column-level permutations. Then, this permuted image is used for subsequent diffusion, applied on block-level considering block size of 64 bytes. This diffusion process is accomplished by overlaying with chaotic matrix derived from LCM, followed by substitution of those overlaid bytes by DNA encoding along with SLMM to attain an encrypted image with an entropy nearly 8. Furthermore, all the chaotic values generated from the aforementioned maps are highly sensitive on the key as well as on the plain-image. This scheme is thoroughly verified on different sized plain-images with modern statistical analyses to prove the robustness of this scheme. Eventually, comparison with other schemes reinforces its competence and suitability to implement it in real-time system.
引用
收藏
页码:3673 / 3698
页数:26
相关论文
共 83 条
[1]   Analysis of a new simple one dimensional chaotic map [J].
Alpar, Orcan .
NONLINEAR DYNAMICS, 2014, 78 (02) :771-778
[2]  
[Anonymous], 1999, NATL I STD TECHNOL, V25, P1
[3]   Robust chaotic key stream generator for real-time images encryption [J].
Azzaz, M. S. ;
Tanougast, C. ;
Sadoudi, S. ;
Dandache, A. .
JOURNAL OF REAL-TIME IMAGE PROCESSING, 2013, 8 (03) :297-306
[4]   An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations [J].
Chai, Xiuli ;
Gan, Zhihua ;
Yang, Kang ;
Chen, Yiran ;
Liu, Xianxing .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2017, 52 :6-19
[5]  
Chaudhuri A., 2011, INT C CISIM, V245, P289
[6]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[7]   CANONICAL REALIZATION OF CHUA CIRCUIT FAMILY [J].
CHUA, LO ;
LIN, GN .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS, 1990, 37 (07) :885-902
[8]   Index-based permutation-diffusion in multiple-image encryption using DNA sequence [J].
Enayatifar, Rasul ;
Guimaraes, Frederico Gadelha ;
Siarry, Patrick .
OPTICS AND LASERS IN ENGINEERING, 2019, 115 :131-140
[9]   Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence [J].
Enayatifar, Rasul ;
Abdullah, Abdul Hanan ;
Isnin, Ismail Fauzi .
OPTICS AND LASERS IN ENGINEERING, 2014, 56 :83-93
[10]  
Fips-Pub NIST., 2001, FEDERAL INF PROCESS, V197