Chaotic image encryption algorithm based on pseudo-random bit sequence and DNA plane

被引:29
|
作者
Wang, Xingyuan [1 ]
Zhao, Hongyu [1 ]
Hou, Yutao [2 ]
Luo, Chao [3 ]
Zhang, Yingqian [4 ]
Wang, Chunpeng [5 ]
机构
[1] Dalian Maritime Univ, Sch Informat Sci & Technol, Dalian 116026, Peoples R China
[2] Dalian Univ Technol, Fac Elect Informat & Elect Engn, Dalian 116024, Peoples R China
[3] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan 250014, Shandong, Peoples R China
[4] Xiamen Univ, Tan Kah Kee Coll, Sch Informat Sci & Technol, Zhangzhou 363105, Peoples R China
[5] Qilu Univ Technol, Shandong Acad Sci, Sch Informat, Jinan 250353, Shandong, Peoples R China
来源
MODERN PHYSICS LETTERS B | 2019年 / 33卷 / 22期
基金
中国国家自然科学基金;
关键词
Image encryption; DNA plane; random bit sequence generator; coupled map lattice; MAP; PERMUTATION; SYSTEM; CML;
D O I
10.1142/S0217984919502634
中图分类号
O59 [应用物理学];
学科分类号
摘要
In this paper, a new chaotic image encryption algorithm based on pseudo-random bit sequence and DNA plane is proposed. The coupled map lattice (CML) is applied to design a pseudo-random bit sequence generation (PBSG) system and use the system to generate the random sequence needed in the encryption process. The initial values and parameters of the system are generated by the SHA-256 hash algorithm combined with given keys. Firstly, the plane image is decomposed into four DNA planes in combination with the DNA encoding rules, and then the four DNA planes are subjected to row circular permutation and column circular permutation. After that, the diffusion operation on each DNA plane is performed. Finally, the four DNA planes are decoded and then combined into a pixel matrix, that is, the final cipher image is obtained. Throughout the encryption process, the choice of DNA encoding and decoding rules is determined by the PBSG system. Simulation results and security analysis show that the algorithm not only has good encryption effect, but also can resist various classic attacks, and has excellent security performance.
引用
收藏
页数:24
相关论文
共 50 条
  • [21] Bit image encryption algorithm based on hyper chaos and DNA sequence
    Liu Y.
    Lin T.
    Wang J.
    Yuan H.-M.
    Journal of Computers (Taiwan), 2018, 29 (03) : 43 - 55
  • [22] A DESIGN OF PSEUDO-RANDOM BIT GENERATOR BASED ON SINGLE CHAOTIC SYSTEM
    Wang, Xing-Yuan
    Xie, Yi-Xin
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2012, 23 (03):
  • [23] A Chaotic-Based Pseudo-Random Bit Generator for Navigation Applications
    Chiang, Yi-Te
    Wang, He-Sheng
    Wang, Yung-Nien
    INFORMATION, COMMUNICATION AND ENGINEERING, 2013, 311 : 99 - +
  • [24] An efficient nested chaotic image encryption algorithm based on DNA sequence
    Ben Slimane, Nabil
    Aouf, Nahed
    Bouallegue, Kais
    Machhout, Mohsen
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2018, 29 (07):
  • [25] Chaotic Image Encryption Algorithm Based on Bit Permutation and Dynamic DNA Encoding
    Zhang, Xuncai
    Han, Feng
    Niu, Ying
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2017, 2017
  • [26] Image Encryption Algorithm Based on Chaotic Sequence
    Chen, Xiaodi
    Wu, Hong
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, CSPS 2018, VOL II: SIGNAL PROCESSING, 2020, 516 : 262 - 265
  • [27] Image encryption algorithm based on chaotic sequence
    Zhang, Yong-Hong
    Kang, Bao-Sheng
    Zhang, Xue-Feng
    ICAT 2006: 16TH INTERNATIONAL CONFERENCE ON ARTIFICIAL REALITY AND TELEXISTENCE - WORSHOPS, PROCEEDINGS, 2006, : 221 - +
  • [28] Image Encryption Using Pseudo Random Number and Chaotic Sequence Generators
    Youssef, M. I.
    Zahara, M.
    Emam, A. E.
    Elghany, M. Abd
    NRSC: 2009 NATIONAL RADIO SCIENCE CONFERENCE: NRSC 2009, VOLS 1 AND 2, 2009, : 650 - 664
  • [29] Altering a pseudo-random bit sequence for scan-based BIST
    Touba, NA
    McCluskey, EJ
    INTERNATIONAL TEST CONFERENCE 1996, PROCEEDINGS, 1996, : 167 - 175
  • [30] A Chaotic Neural Network Based Cryptographic Pseudo-Random Sequence Design
    Singla, Prateek
    Sachdeva, Payal
    Ahmad, Musheer
    2014 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES (ACCT 2014), 2014, : 301 - 306