Color image DNA encryption using NCA map-based CML and one-time keys

被引:223
|
作者
Wu, Xiangjun [1 ,4 ,5 ]
Wang, Kunshu [2 ]
Wang, Xingyuan [3 ]
Kan, Haibin [4 ]
Kurths, Juergen [5 ,6 ]
机构
[1] Henan Univ, Coll Software, Kaifeng 475004, Peoples R China
[2] Henan Univ, Sch Comp & Informat Engn, Kaifeng 475004, Peoples R China
[3] Dalian Univ Technol, Fac Elect Informat & Elect Engn, Dalian 176024, Peoples R China
[4] Fudan Univ, Sch Comp Sci, Shanghai Key Lab Intelligent Informat Proc, Shanghai 200433, Peoples R China
[5] Humboldt Univ, Dept Phys, D-72489 Berlin, Germany
[6] Potsdam Inst Climate Impact Res PIK, D-74473 Potsdam, Germany
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Color image encryption; SHA-256; NCA map-based CML; DNA sequence operation; HYPER-CHAOTIC SYSTEM; SEQUENCE OPERATION; ALGORITHM; CRYPTANALYSIS; SECURE; DIFFUSION;
D O I
10.1016/j.sigpro.2018.02.028
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we introduce a novel color image encryption algorithm based on DNA sequence operations, one-time keys and the spatiotemporal chaos. Firstly, the key streams are generated by the NCA map-based CML, where the hash function SHA-256 is used to update the system parameters and initial conditions combining with the plain-image and the secret keys. Secondly, decompose the plain-image into the red, green, blue components, and convert them randomly into three DNA matrices by the DNA encoding rules. Further, combine three DNA matrices into a new DNA matrix, and then perform the row wise and column-wise permutations on it. Thirdly, divide the shuffled DNA matrix into three equal blocks and implement the DNA addition, subtraction and XOR operations on these DNA blocks. Finally, transform the DNA matrices into the decimal matrices separately according to the DNA decoding rules. To enhance the security of the cryptosystem, a diffusion process is further carried out by using the key streams. Thus, the resulting cipher-image is attained. Experimental results and security analysis show that the presented encryption algorithm has a good encryption effect and can resist various typical attacks. (C) 2018 Elsevier B.V. All rights reserved.
引用
下载
收藏
页码:272 / 287
页数:16
相关论文
共 50 条
  • [31] Medical Image Encryption Using Hybrid Adaptive Elliptic Curve Cryptography and Logistic Map-based DNA Sequence in IoT Environment
    Hanchate, Rohini
    Anandan, R.
    IETE JOURNAL OF RESEARCH, 2023, 70 (06) : 5734 - 5749
  • [32] A New Image Encryption Algorithm Based on CML and DNA Seqauence
    Wang, Xingyuan
    Hou, Yutao
    Wang, Shibing
    Li, Rui
    IEEE ACCESS, 2018, 6 : 62272 - 62285
  • [33] One-time pad image encryption based on physical random numbers from chaotic laser
    Jianzhong Zhang
    Changkun Feng
    Mingjiang Zhang
    Yi Liu
    Optical Review, 2018, 25 : 540 - 548
  • [34] Radix Trie improved Nahrain chaotic map-based image encryption model for effective image encryption process
    Abas F.S.
    Arulmurugan R.
    International Journal of Intelligent Networks, 2022, 3 : 102 - 108
  • [35] One-time pad image encryption based on physical random numbers from chaotic laser
    Zhang, Jianzhong
    Feng, Changkun
    Zhang, Mingjiang
    Liu, Yi
    OPTICAL REVIEW, 2018, 25 (05) : 540 - 548
  • [36] A one-time pad encryption method combining full-phase image encryption and hiding
    Li, Jiaosheng
    Xiong, Jiaxiang
    Zhang, Qinnan
    Zhong, Liyun
    Zhou, Yunfei
    Li, Jun
    Lu, Xiaoxu
    JOURNAL OF OPTICS, 2017, 19 (08)
  • [37] New Encryption Scheme of One-Time Pad Based on KDC
    Xie, Xin
    Chen, Honglei
    Wu, Ying
    Zhang, Heng
    Wu, Peng
    INTELLIGENT COMPUTING AND INFORMATION SCIENCE, PT I, 2011, 134 (0I): : 51 - 55
  • [38] Generalized double-humped logistic map-based medical image encryption
    Ismail, Samar M.
    Said, Lobna A.
    Radwan, Ahmed G.
    Madian, Ahmed H.
    Abu-Elyazeed, Mohamed F.
    JOURNAL OF ADVANCED RESEARCH, 2018, 10 : 85 - 98
  • [39] Password Authentication Using One-Time Key-Based Signature and Homomorphic Encryption
    Im, Jong-Hyuk
    Lee, Mun-Kyu
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 467 - 474
  • [40] A Simple Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and Diffusion
    Huang, Linqing
    Cai, Shuting
    Xiao, Mingqing
    Xiong, Xiaoming
    ENTROPY, 2018, 20 (07):