Chaotic image encryption algorithm based on pseudo-random bit sequence and DNA plane

被引:29
|
作者
Wang, Xingyuan [1 ]
Zhao, Hongyu [1 ]
Hou, Yutao [2 ]
Luo, Chao [3 ]
Zhang, Yingqian [4 ]
Wang, Chunpeng [5 ]
机构
[1] Dalian Maritime Univ, Sch Informat Sci & Technol, Dalian 116026, Peoples R China
[2] Dalian Univ Technol, Fac Elect Informat & Elect Engn, Dalian 116024, Peoples R China
[3] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan 250014, Shandong, Peoples R China
[4] Xiamen Univ, Tan Kah Kee Coll, Sch Informat Sci & Technol, Zhangzhou 363105, Peoples R China
[5] Qilu Univ Technol, Shandong Acad Sci, Sch Informat, Jinan 250353, Shandong, Peoples R China
来源
MODERN PHYSICS LETTERS B | 2019年 / 33卷 / 22期
基金
中国国家自然科学基金;
关键词
Image encryption; DNA plane; random bit sequence generator; coupled map lattice; MAP; PERMUTATION; SYSTEM; CML;
D O I
10.1142/S0217984919502634
中图分类号
O59 [应用物理学];
学科分类号
摘要
In this paper, a new chaotic image encryption algorithm based on pseudo-random bit sequence and DNA plane is proposed. The coupled map lattice (CML) is applied to design a pseudo-random bit sequence generation (PBSG) system and use the system to generate the random sequence needed in the encryption process. The initial values and parameters of the system are generated by the SHA-256 hash algorithm combined with given keys. Firstly, the plane image is decomposed into four DNA planes in combination with the DNA encoding rules, and then the four DNA planes are subjected to row circular permutation and column circular permutation. After that, the diffusion operation on each DNA plane is performed. Finally, the four DNA planes are decoded and then combined into a pixel matrix, that is, the final cipher image is obtained. Throughout the encryption process, the choice of DNA encoding and decoding rules is determined by the PBSG system. Simulation results and security analysis show that the algorithm not only has good encryption effect, but also can resist various classic attacks, and has excellent security performance.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] Image encryption based on fractional chaotic pseudo-random number generator and DNA encryption method
    Yang, Chunxiao
    Taralova, Ina
    El Assad, Safwan
    Loiseau, Jean-Jacques
    NONLINEAR DYNAMICS, 2022, 109 (03) : 2103 - 2127
  • [2] Composite chaotic pseudo-random sequence encryption algorithm for compressed video
    Yuan, Chun
    Zhong, Yuzhuo
    Yang, Shiqiang
    Tsinghua Science and Technology, 2004, 9 (02) : 234 - 241
  • [3] Image encryption based on fractional chaotic pseudo-random number generator and DNA encryption method
    Chunxiao Yang
    Ina Taralova
    Safwan El Assad
    Jean-Jacques Loiseau
    Nonlinear Dynamics, 2022, 109 : 2103 - 2127
  • [4] Composite Chaotic Pseudo-Random Sequence Encryption Algorithm for Compressed Video
    袁春
    钟玉琢
    杨士强
    Tsinghua Science and Technology, 2004, (02) : 234 - 241
  • [5] A chaotic image encryption algorithm based on sliding window and pseudo-random stack shuffling
    Cao, Pengfei
    Teng, Lin
    NONLINEAR DYNAMICS, 2024, 112 (15) : 13539 - 13569
  • [6] DNA Image Encryption Scheme Based on a Chaotic LSTM Pseudo-Random Number Generator
    Koubaa, Karama
    Derbel, Nabil
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2023, 33 (06):
  • [7] The Application of the Pseudo Random Bit Index Sequence in the Image Encryption Algorithm
    Li, Zongying
    ADVANCES IN COMPUTER SCIENCE, INTELLIGENT SYSTEM AND ENVIRONMENT, VOL 1, 2011, 104 : 19 - 24
  • [8] The application of the pseudo random bit index sequence in the image encryption algorithm
    Li Z.
    Advances in Intelligent and Soft Computing, 2011, 104 : 19 - 24
  • [9] Text encryption scheme realized with a chaotic pseudo-random bit generator
    Volos, C.K.
    Kyprianidis, I.M.
    Stouboulos, I.N.
    Journal of Engineering Science and Technology Review, 2013, 6 (04) : 9 - 14
  • [10] Image Encryption Using Random Bit Sequence Based on Chaotic Maps
    Himan Khanzadi
    Mohammad Eshghi
    Shahram Etemadi Borujeni
    Arabian Journal for Science and Engineering, 2014, 39 : 1039 - 1047