Limits...
A novel image encryption algorithm based on DNA subsequence operation.

Zhang Q, Xue X, Wei X - ScientificWorldJournal (2012)

Bottom Line: We present a novel image encryption algorithm based on DNA subsequence operation.Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image.The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.

View Article: PubMed Central - PubMed

Affiliation: Key Laboratory of Advanced Design and Intelligent Computing, Ministry of Education of Dalian University, Dalian 116622, China. zhangq30@yahoo.com

ABSTRACT
We present a novel image encryption algorithm based on DNA subsequence operation. Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image. The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.

Show MeSH
The block diagram of the proposed algorithm. (a) The block diagram of the encryption algorithm. (b) The block diagram of the decryption algorithm.
© Copyright Policy - open-access
Related In: Results  -  Collection


getmorefigures.php?uid=PMC3475302&req=5

fig2: The block diagram of the proposed algorithm. (a) The block diagram of the encryption algorithm. (b) The block diagram of the decryption algorithm.

Mentions: The proposed encryption algorithm includes three steps: first, by using the method proposed in the Section 3.1 to produce four groups of DNA sequences P1, P2, P3, and P4, where Pi  (i = 1,2, 3,4) is made up of many DNA subsequences. Then, to disturb the position and the value of pixel points from image by combining the logistic map, generate chaotic sequences and DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, transformation, etc.). At last, the encrypted image is obtained by DNA decoding and recombining bit-planes. The block diagram of the proposed algorithm is shown in Figure 2, the block diagram of the encryption algorithm is shown in Figure 2(a), and Figure 2(b) shows the block diagram of the decryption algorithm. We can see that the procedure of image decryption is inverse procedure of image encryption from Figure 2. The detailed procedure of our encryption and decryption algorithms are explained in the following pseudo-codes (Algorithms 1 and 2).


A novel image encryption algorithm based on DNA subsequence operation.

Zhang Q, Xue X, Wei X - ScientificWorldJournal (2012)

The block diagram of the proposed algorithm. (a) The block diagram of the encryption algorithm. (b) The block diagram of the decryption algorithm.
© Copyright Policy - open-access
Related In: Results  -  Collection

Show All Figures
getmorefigures.php?uid=PMC3475302&req=5

fig2: The block diagram of the proposed algorithm. (a) The block diagram of the encryption algorithm. (b) The block diagram of the decryption algorithm.
Mentions: The proposed encryption algorithm includes three steps: first, by using the method proposed in the Section 3.1 to produce four groups of DNA sequences P1, P2, P3, and P4, where Pi  (i = 1,2, 3,4) is made up of many DNA subsequences. Then, to disturb the position and the value of pixel points from image by combining the logistic map, generate chaotic sequences and DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, transformation, etc.). At last, the encrypted image is obtained by DNA decoding and recombining bit-planes. The block diagram of the proposed algorithm is shown in Figure 2, the block diagram of the encryption algorithm is shown in Figure 2(a), and Figure 2(b) shows the block diagram of the decryption algorithm. We can see that the procedure of image decryption is inverse procedure of image encryption from Figure 2. The detailed procedure of our encryption and decryption algorithms are explained in the following pseudo-codes (Algorithms 1 and 2).

Bottom Line: We present a novel image encryption algorithm based on DNA subsequence operation.Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image.The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.

View Article: PubMed Central - PubMed

Affiliation: Key Laboratory of Advanced Design and Intelligent Computing, Ministry of Education of Dalian University, Dalian 116622, China. zhangq30@yahoo.com

ABSTRACT
We present a novel image encryption algorithm based on DNA subsequence operation. Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image. The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.

Show MeSH