Skip to main content
Top

2020 | OriginalPaper | Chapter

Dual-Layer DNA-Encoding–Decoding Operation Based Image Encryption Using One-Dimensional Chaotic Map

Authors : K. Abhimanyu Kumar Patro, M. Prasanth Jagapathi Babu, K. Pavan Kumar, Bibhudendra Acharya

Published in: Advances in Data and Information Sciences

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper describes a technique that encrypts images in the form of DNA sequences using PWLCM system, i.e., Piecewise Linear Chaotic Map. This method has two times DNA-encoding–decoding operations along with DNA-permutation and DNA-diffusion operations to get the cipher image. On comparison with other processes, the advantage of this algorithm is easy to compute but confuses a cryptanalyst a lot. Apart from that dual-layer DNA-encoding–decoding processes in the algorithm result in good encryption outputs. When outputs are subjected to different security analysis to find out the strength of the algorithm, results with encrypted images with higher values of UACI, NPCR, key space, information entropy, and good correlation coefficient. This results in strong resistivity toward widely used attacks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Coppersmith, D. (1994). The data encryption standard (DES) and its strengths against attacks. IBM Journal of Research and Development, 38(3), 243–250.CrossRef Coppersmith, D. (1994). The data encryption standard (DES) and its strengths against attacks. IBM Journal of Research and Development, 38(3), 243–250.CrossRef
2.
go back to reference Pub NF. 197. (2001, November 26). Advanced encryption standard (AES). Federal Information Processing Standards Publication 197, US Department of Commerce/NIST. Pub NF. 197. (2001, November 26). Advanced encryption standard (AES). Federal Information Processing Standards Publication 197, US Department of Commerce/NIST.
3.
go back to reference Gao, H., Zhang, Y., Liang, S., & Li, D. (2006). A new chaotic algorithm for image encryption. Chaos, Solitons & Fractals, 29(2), 393–399.CrossRef Gao, H., Zhang, Y., Liang, S., & Li, D. (2006). A new chaotic algorithm for image encryption. Chaos, Solitons & Fractals, 29(2), 393–399.CrossRef
4.
go back to reference Gupta, A., Thawait, R., Patro, K. A. K., & Acharya, B. (2016). A novel image encryption based on bit-shuffled improved tent map. International Journal of Control Theory and Applications, 9(34), 1–16. Gupta, A., Thawait, R., Patro, K. A. K., & Acharya, B. (2016). A novel image encryption based on bit-shuffled improved tent map. International Journal of Control Theory and Applications, 9(34), 1–16.
5.
go back to reference Samhita, P., Prasad, P., Patro, K. A. K., & Acharya, B. (2016). A secure chaos-based image encryption and decryption using crossover and mutation operator. International Journal of Control Theory and Applications, 9(34), 17–28. Samhita, P., Prasad, P., Patro, K. A. K., & Acharya, B. (2016). A secure chaos-based image encryption and decryption using crossover and mutation operator. International Journal of Control Theory and Applications, 9(34), 17–28.
6.
go back to reference Shadangi, V., Choudhary, S. K., Patro, K. A. K., & Acharya, B. (2017). Novel Arnold scrambling based CBC-AES image encryption. International Journal of Control Theory and Applications, 10(15), 93–105. Shadangi, V., Choudhary, S. K., Patro, K. A. K., & Acharya, B. (2017). Novel Arnold scrambling based CBC-AES image encryption. International Journal of Control Theory and Applications, 10(15), 93–105.
8.
go back to reference Liu, W., Sun, K., & Zhu, C. (2016). A fast image encryption algorithm based on chaotic map. Optics and Lasers in Engineering, 84, 26–36.CrossRef Liu, W., Sun, K., & Zhu, C. (2016). A fast image encryption algorithm based on chaotic map. Optics and Lasers in Engineering, 84, 26–36.CrossRef
9.
go back to reference Rui, L. (2015). New algorithm for color image encryption using improved 1D logistic chaotic map. Open Cybernetics & Systemics Journal, 9(1), 210–216.MathSciNetCrossRef Rui, L. (2015). New algorithm for color image encryption using improved 1D logistic chaotic map. Open Cybernetics & Systemics Journal, 9(1), 210–216.MathSciNetCrossRef
10.
go back to reference Jiang, J., & Yin, Z. (2013). The advantages and disadvantages of DNA password in the contrast to the traditional cryptography and quantum cryptography. In Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (pp. 307–316). Berlin and Heidelberg: Springer. Jiang, J., & Yin, Z. (2013). The advantages and disadvantages of DNA password in the contrast to the traditional cryptography and quantum cryptography. In Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (pp. 307–316). Berlin and Heidelberg: Springer.
11.
go back to reference Zhang, J., Fang, D., Ren, H. (2014). Image encryption algorithm based on DNA encoding and chaotic maps. Mathematical Problems in Engineering. Zhang, J., Fang, D., Ren, H. (2014). Image encryption algorithm based on DNA encoding and chaotic maps. Mathematical Problems in Engineering.
12.
go back to reference Xue, X., Zhang, Q., Wei, X., Guo, L., & Wang, Q. (2010). An image fusion encryption algorithm based on DNA sequence and multi-chaotic maps. Journal of Computational and Theoretical Nanoscience, 7(2), 397–403.CrossRef Xue, X., Zhang, Q., Wei, X., Guo, L., & Wang, Q. (2010). An image fusion encryption algorithm based on DNA sequence and multi-chaotic maps. Journal of Computational and Theoretical Nanoscience, 7(2), 397–403.CrossRef
13.
go back to reference Liu, L., Zhang, Q., & Wei, X. (2012). A RGB image encryption algorithm based on DNA encoding and chaos map. Computers & Electrical Engineering, 38(5), 1240–1248.CrossRef Liu, L., Zhang, Q., & Wei, X. (2012). A RGB image encryption algorithm based on DNA encoding and chaos map. Computers & Electrical Engineering, 38(5), 1240–1248.CrossRef
14.
go back to reference Jain, A., & Rajpal, N. (2016). A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps. Multimedia Tools and Applications, 75(10), 5455–5472.CrossRef Jain, A., & Rajpal, N. (2016). A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps. Multimedia Tools and Applications, 75(10), 5455–5472.CrossRef
15.
go back to reference Xiang, T., Liao, X., & Wong, K. W. (2007). An improved particle swarm optimization algorithm combined with piecewise linear chaotic map. Applied Math and Computation, 190(2), 1637–1645.MathSciNetCrossRef Xiang, T., Liao, X., & Wong, K. W. (2007). An improved particle swarm optimization algorithm combined with piecewise linear chaotic map. Applied Math and Computation, 190(2), 1637–1645.MathSciNetCrossRef
16.
go back to reference Zhang, X., & Wang, X. (2017). Multiple-image encryption algorithm based on mixed image element and permutation. Optics and Lasers in Engineering, 92, 6–16.CrossRef Zhang, X., & Wang, X. (2017). Multiple-image encryption algorithm based on mixed image element and permutation. Optics and Lasers in Engineering, 92, 6–16.CrossRef
17.
go back to reference Patro, K. A. K., & Acharya, B. (2018). Secure multi–level permutation operation based multiple colour image encryption. Journal of Information Security and Applications, 40, 111–133.CrossRef Patro, K. A. K., & Acharya, B. (2018). Secure multi–level permutation operation based multiple colour image encryption. Journal of Information Security and Applications, 40, 111–133.CrossRef
18.
go back to reference Patro, K. A. K., Acharya, B., & Nath, V. (2018). A secure multi-stage one-round bit-plane permutation operation based chaotic image encryption. Microsystem Technologies, 1–8. Patro, K. A. K., Acharya, B., & Nath, V. (2018). A secure multi-stage one-round bit-plane permutation operation based chaotic image encryption. Microsystem Technologies, 1–8.
19.
go back to reference Patro, K. A. K., Banerjee, A., & Acharya, B. (2017). A simple, secure and time efficient multi-way rotational permutation and diffusion based image encryption by using multiple 1-D chaotic maps. In International Conference on Next Generation Computing Technologies (pp. 396–418). Singapore: Springer. Patro, K. A. K., Banerjee, A., & Acharya, B. (2017). A simple, secure and time efficient multi-way rotational permutation and diffusion based image encryption by using multiple 1-D chaotic maps. In International Conference on Next Generation Computing Technologies (pp. 396–418). Singapore: Springer.
20.
go back to reference Naskar, P. K., & Chaudhuri, A. (2016). Secured secret sharing technique based on chaotic map and DNA encoding with application on secret image. Imaging Science Journal, 64(8), 460–470.CrossRef Naskar, P. K., & Chaudhuri, A. (2016). Secured secret sharing technique based on chaotic map and DNA encoding with application on secret image. Imaging Science Journal, 64(8), 460–470.CrossRef
21.
go back to reference Patro, K. A. K., & Acharya, B. (2018). Novel data encryption scheme using DNA computing. In Advances of DNA computing in cryptography (pp. 69–110). Chapman and Hall/CRC. Patro, K. A. K., & Acharya, B. (2018). Novel data encryption scheme using DNA computing. In Advances of DNA computing in cryptography (pp. 69–110). Chapman and Hall/CRC.
23.
go back to reference Floating-point Working Group. (1985). IEEE standard for binary floating-point arithmetic. ANSI, IEEE Std. (pp. 754–1985). Floating-point Working Group. (1985). IEEE standard for binary floating-point arithmetic. ANSI, IEEE Std. (pp. 754–1985).
24.
go back to reference Kulsoom, A., Xiao, D., & Abbas, S. A. (2016). An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimedia Tools and Applications, 75, 1–23.CrossRef Kulsoom, A., Xiao, D., & Abbas, S. A. (2016). An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimedia Tools and Applications, 75, 1–23.CrossRef
25.
go back to reference El-latif, A. A. A., Li, L., Zhang, T., Wang, N., Song, X., & Niu, X. (2012). Digital image encryption scheme based on multiple chaotic systems. Sensing and Imaging, 13, 67–88.CrossRef El-latif, A. A. A., Li, L., Zhang, T., Wang, N., Song, X., & Niu, X. (2012). Digital image encryption scheme based on multiple chaotic systems. Sensing and Imaging, 13, 67–88.CrossRef
26.
go back to reference Guesmi, R., Farah, M. A. B., Kachouri, A., & Samet, M. (2016). A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dynamics, 83(3), 1123–1136.MathSciNetCrossRef Guesmi, R., Farah, M. A. B., Kachouri, A., & Samet, M. (2016). A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dynamics, 83(3), 1123–1136.MathSciNetCrossRef
27.
go back to reference Wang, X., & Zhang, H. L. (2016). A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dynamics, 83(1–2), 333–346.MathSciNetCrossRef Wang, X., & Zhang, H. L. (2016). A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dynamics, 83(1–2), 333–346.MathSciNetCrossRef
28.
go back to reference Mohanty, S., Shende, A., Patro, K. A. K., & Acharya, B. (2017). A DNA based chaotic image fusion encryption scheme using LEA–256 and SHA–256. Indian Journal of Scientific Research, 14(2), 190–201. Mohanty, S., Shende, A., Patro, K. A. K., & Acharya, B. (2017). A DNA based chaotic image fusion encryption scheme using LEA–256 and SHA–256. Indian Journal of Scientific Research, 14(2), 190–201.
29.
go back to reference Sravanthi, D., Patro, K. A. K., Acharya, B., & Majumder, S. (2019). A secure chaotic image encryption based on bit-plane operation. In Soft Computing in Data Analytics (pp. 717–726). Singapore: Springer. Sravanthi, D., Patro, K. A. K., Acharya, B., & Majumder, S. (2019). A secure chaotic image encryption based on bit-plane operation. In Soft Computing in Data Analytics (pp. 717–726). Singapore: Springer.
30.
go back to reference Zhu, Z., Zhang, W., Wong, K., & Yu, H. (2011). A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences (Ny), 181(6), 1171–1186.CrossRef Zhu, Z., Zhang, W., Wong, K., & Yu, H. (2011). A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences (Ny), 181(6), 1171–1186.CrossRef
31.
go back to reference Zhang, Y.-Q., & Wang, X.-Y. (2014). A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Information Sciences (Ny), 273, 329–351.CrossRef Zhang, Y.-Q., & Wang, X.-Y. (2014). A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Information Sciences (Ny), 273, 329–351.CrossRef
32.
go back to reference Huang, C. K., & Nien, H. H. (2009). Multi chaotic systems based pixel shuffle for image encryption. Optics Communication, 282(11), 2123–2127.CrossRef Huang, C. K., & Nien, H. H. (2009). Multi chaotic systems based pixel shuffle for image encryption. Optics Communication, 282(11), 2123–2127.CrossRef
33.
go back to reference Chai, X. (2017). An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimedia Tools and Applications, 76(1), 1159–1175.CrossRef Chai, X. (2017). An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimedia Tools and Applications, 76(1), 1159–1175.CrossRef
34.
go back to reference Brindha, M., & Ammasai Gounden, N. (2016). A chaos based image encryption and lossless compression algorithm using hash table and Chinese remainder theorem. Applied Soft Computing Journal, 40, 379–390.CrossRef Brindha, M., & Ammasai Gounden, N. (2016). A chaos based image encryption and lossless compression algorithm using hash table and Chinese remainder theorem. Applied Soft Computing Journal, 40, 379–390.CrossRef
35.
go back to reference Wu, X., Kurths, J., & Kan, H. (2017). A robust and lossless DNA encryption scheme for color images. Multimedia Tools and Applications. Wu, X., Kurths, J., & Kan, H. (2017). A robust and lossless DNA encryption scheme for color images. Multimedia Tools and Applications.
Metadata
Title
Dual-Layer DNA-Encoding–Decoding Operation Based Image Encryption Using One-Dimensional Chaotic Map
Authors
K. Abhimanyu Kumar Patro
M. Prasanth Jagapathi Babu
K. Pavan Kumar
Bibhudendra Acharya
Copyright Year
2020
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-0694-9_8