A novel image encryption algorithm based on DNA subsequence operation.
Bottom Line:
We present a novel image encryption algorithm based on DNA subsequence operation.Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image.The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.
View Article:
PubMed Central - PubMed
Affiliation: Key Laboratory of Advanced Design and Intelligent Computing, Ministry of Education of Dalian University, Dalian 116622, China. zhangq30@yahoo.com
ABSTRACT
Show MeSH
We present a novel image encryption algorithm based on DNA subsequence operation. Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image. The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack. |
Related In:
Results -
Collection
getmorefigures.php?uid=PMC3475302&req=5
Mentions: The proposed encryption algorithm includes three steps: first, by using the method proposed in the Section 3.1 to produce four groups of DNA sequences P1, P2, P3, and P4, where Pi (i = 1,2, 3,4) is made up of many DNA subsequences. Then, to disturb the position and the value of pixel points from image by combining the logistic map, generate chaotic sequences and DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, transformation, etc.). At last, the encrypted image is obtained by DNA decoding and recombining bit-planes. The block diagram of the proposed algorithm is shown in Figure 2, the block diagram of the encryption algorithm is shown in Figure 2(a), and Figure 2(b) shows the block diagram of the decryption algorithm. We can see that the procedure of image decryption is inverse procedure of image encryption from Figure 2. The detailed procedure of our encryption and decryption algorithms are explained in the following pseudo-codes (Algorithms 1 and 2). |
View Article: PubMed Central - PubMed
Affiliation: Key Laboratory of Advanced Design and Intelligent Computing, Ministry of Education of Dalian University, Dalian 116622, China. zhangq30@yahoo.com