503 research outputs found
A novel conservative chaos driven dynamic DNA coding for image encryption
In this paper, we propose a novel conservative chaotic standard map-driven
dynamic DNA coding (encoding, addition, subtraction and decoding) for the image
encryption. The proposed image encryption algorithm is a dynamic DNA coding
algorithm i.e., for the encryption of each pixel different rules for encoding,
addition/subtraction, decoding etc. are randomly selected based on the
pseudorandom sequences generated with the help of the conservative chaotic
standard map. We propose a novel way to generate pseudo-random sequences
through the conservative chaotic standard map and also test them rigorously
through the most stringent test suite of pseudo-randomness, the NIST test
suite, before using them in the proposed image encryption algorithm. Our image
encryption algorithm incorporates a unique feed-forward and feedback mechanisms
to generate and modify the dynamic one-time pixels that are further used for
the encryption of each pixel of the plain image, therefore, bringing in the
desired sensitivity on plaintext as well as ciphertext. All the controlling
pseudorandom sequences used in the algorithm are generated for a different
value of the parameter (part of the secret key) with inter-dependency through
the iterates of the chaotic map (in the generation process) and therefore
possess extreme key sensitivity too. The performance and security analysis has
been executed extensively through histogram analysis, correlation analysis,
information entropy analysis, DNA sequence-based analysis, perceptual quality
analysis, key sensitivity analysis, plaintext sensitivity analysis, etc., The
results are promising and prove the robustness of the algorithm against various
common cryptanalytic attacks.Comment: 29 pages, 5 figures, 15 table
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and decryption
Insecure communication in digital image security and image storing are considered as important challenges. Moreover, the existing approaches face problems related to improper security at the time of image encryption and decryption. In this research work, a wavelet environment is obtained by transforming the cover image utilizing integer wavelet transform (IWT) and hybrid discrete cosine transform (DCT) to completely prevent false errors. Then the proposed hybrid chaotic map with L-shaped fractal Tromino offers better security to maintain image secrecy by means of encryption and decryption. The proposed work uses fractal encryption with the combination of L-shaped Tromino theorem for enhancement of information hiding. The regions of L-shaped fractal Tromino are sensitive to variations, thus are embedded in the watermark based on a visual watermarking technique known as reversible watermarking. The experimental results showed that the proposed method obtained peak signal-to-noise ratio (PSNR) value of 56.82dB which is comparatively higher than the existing methods that are, Beddington, free, and Lawton (BFL) map with PSNR value of 8.10 dB, permutation substitution, and Boolean operation with PSNR value of 21.19 dB and deoxyribonucleic acid (DNA) level permutation-based logistic map with PSNR value of 21.27 dB
A new four-dimensional hyper-chaotic system for image encryption
Currently, images are very important with the rapid growth of communication networks. Therefore, image encryption is a process to provide security for private information and prevent unwanted access to sensitive data by unauthorized individuals. Chaos systems provide an important role for key generation, with high randomization properties and accurate performance. In this study, a new four-dimensional hyper-chaotic system has been suggested that is used in the keys generation, which are utilized in the image encryption process to achieve permutation and substitution operations. Firstly, color bands are permuted using the index of the chaotic sequences to remove the high correlation among neighboring pixels. Secondly, dynamic S-boxes achieve the principle of substitution, which are utilized to diffuse the pixel values of the color image. The efficiency of the proposed method is tested by the key space, histogram, and so on. Security analysis shows that the proposed method for encrypting images is secure and resistant to different attacks. It contains a big key space of (2627) and a high sensitivity to a slight change in the secret key, a fairly uniform histogram, and entropy values nearby to the best value of 8. Moreover, it consumes a very short time for encryption and decryption
Color Image Encryption Using LFSR, DNA, and 3D Chaotic Maps
One of the most important challenges facing researchers is to find new methods to protect data sent over the Internet and prevent unauthorized access to it. In this paper, we present a new method for encrypting image data divided into two stages. The first stage requires redistributing the positions of the pixels by using a key of random numbers generated by linear feedback shift registers and then encrypting the data using deoxyribonucleic acid rules. The data generated in the previous stage is encrypted again using chaotic maps to increase the level of security in the second stage. Several statistical tests were implemented to verify the efficiency of the proposed method and compare the results with the work of other researchers. The results of the tests proved a reasonable safety rate compared to other techniques
- …