A new color image encryption technique using DNA computing and Chaos-based substitution box

被引:35
|
作者
Masood, Fawad [1 ,9 ]
Masood, Junaid [2 ]
Zhang, Lejun [1 ]
Jamal, Sajjad Shaukat [3 ]
Boulila, Wadii [4 ,5 ]
Rehman, Sadaqat Ur [6 ]
Khan, Fadia Ali [7 ,8 ]
Ahmad, Jawad [9 ]
机构
[1] Yangzhou Univ, Coll Informat Engn, Yangzhou 225009, Jiangsu, Peoples R China
[2] IQRA Natl Univ Peshawar, Dept Comp Sci, Peshawar, Pakistan
[3] King Khalid Univ, Coll Sci, Dept Math, Abha, Saudi Arabia
[4] Prince Sultan Univ, Robot & Internet Things Lab, Riyadh, Saudi Arabia
[5] Univ Manouba, RIADI Lab, Manouba 2010, Tunisia
[6] Namal Inst, Dept Comp Sci, Mianwali, Pakistan
[7] Univ Wah, Wah Engn Coll, Dept Mechatron Engn, Wah, Pakistan
[8] Riphah Int Univ, Dept Elect Engn, Islamabad, Pakistan
[9] Edinburgh Napier Univ, Sch Comp, Edinburgh, Midlothian, Scotland
关键词
Privacy-preserving visual recognition; Image encryption; DNA sequence; Arnold transform; Chaotic system; Nonlinear component; S-box; S-BOXES; PERMUTATION-DIFFUSION; ALGORITHM; CRYPTOSYSTEM; SCHEME; SECURE; MAP;
D O I
10.1007/s00500-021-06459-w
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In many cases, images contain sensitive information and patterns that require secure processing to avoid risk. It can be accessed by unauthorized users who can illegally exploit them to threaten the safety of people's life and property. Protecting the privacies of the images has quickly become one of the biggest obstacles that prevent further exploration of image data. In this paper, we propose a novel privacy-preserving scheme to protect sensitive information within images. The proposed approach combines deoxyribonucleic acid (DNA) sequencing code, Arnold transformation (AT), and a chaotic dynamical system to construct an initial S-box. Various tests have been conducted to validate the randomness of this newly constructed S-box. These tests include National Institute of Standards and Technology (NIST) analysis, histogram analysis (HA), nonlinearity analysis (NL), strict avalanche criterion (SAC), bit independence criterion (BIC), bit independence criterion strict avalanche criterion (BIC-SAC), bit independence criterion nonlinearity (BIC-NL), equiprobable input/output XOR distribution, and linear approximation probability (LP). The proposed scheme possesses higher security wit NL = 103.75, SAC approximate to 0.5 and LP = 0.1560. Other tests such as BIC-SAC and BIC-NL calculated values are 0.4960 and 112.35, respectively. The results show that the proposed scheme has a strong ability to resist many attacks. Furthermore, the achieved results are compared to existing state-of-the-art methods. The comparison results further demonstrate the effectiveness of the proposed algorithm.
引用
收藏
页码:7461 / 7477
页数:17
相关论文
共 50 条
  • [1] A new color image encryption technique using DNA computing and Chaos-based substitution box
    Fawad Masood
    Junaid Masood
    Lejun Zhang
    Sajjad Shaukat Jamal
    Wadii Boulila
    Sadaqat Ur Rehman
    Fadia Ali Khan
    Jawad Ahmad
    Soft Computing, 2022, 26 : 7461 - 7477
  • [2] A new chaos-based encryption method for color image
    He, Xiping
    Zhu, Qingsheng
    Gu, Ping
    ROUGH SETS AND KNOWLEDGE TECHNOLOGY, PROCEEDINGS, 2006, 4062 : 671 - 678
  • [3] Chaos-based color image block encryption scheme using S-box
    Liu, Hongjun
    Kadir, Abdurahman
    Niu, Yujun
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2014, 68 (07) : 676 - 686
  • [4] Efficient Chaos-Based Substitution-Box and Its Application to Image Encryption
    El-Latif, Ahmed A. Abd
    Abd-El-Atty, Bassem
    Belazi, Akram
    Iliyasu, Abdullah M.
    ELECTRONICS, 2021, 10 (12)
  • [5] A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy
    Fu, Chong
    Zhang, Gao-yuan
    Zhu, Mai
    Chen, Zhe
    Lei, Wei-min
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [6] A Chaos-based Color Image Encryption Algorithm
    Yu, Gan
    Shen, Yongjun
    Zhang, Guidong
    Yang, Yanhua
    2013 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2013, : 92 - 95
  • [7] A New Chaos-Based Secure Image Encryption Scheme Using Multiple Substitution Boxes
    Khan, Jan Sher
    ur Rehman, Atique
    Ahmad, Jawad
    Habib, Zeeshan
    2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 16 - 21
  • [8] Mayfly optimization with chaos-based image encryption technique for cloud computing environment
    Justin, Sheela
    Karuppusamy, Sathesh Kumar
    JOURNAL OF ELECTRONIC IMAGING, 2023, 32 (05)
  • [9] A New Chaos-Based Image Encryption Algorithm
    Xu, Ming
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (03) : 493 - 498
  • [10] A new chaos-based image encryption system
    El Assad, Safwan
    Farajallah, Mousa
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2016, 41 : 144 - 157