Limits...
A novel image encryption algorithm based on DNA subsequence operation.

Zhang Q, Xue X, Wei X - ScientificWorldJournal (2012)

Bottom Line: We present a novel image encryption algorithm based on DNA subsequence operation.Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image.The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.

View Article: PubMed Central - PubMed

Affiliation: Key Laboratory of Advanced Design and Intelligent Computing, Ministry of Education of Dalian University, Dalian 116622, China. zhangq30@yahoo.com

ABSTRACT
We present a novel image encryption algorithm based on DNA subsequence operation. Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image. The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.

Show MeSH
Encrypted image and decrypted image. (a) The original image. (b) The encrypted image. (c) The decrypted image under the wrong secret keys. (d) The decrypted image under the correct secret keys.
© Copyright Policy - open-access
Related In: Results  -  Collection


getmorefigures.php?uid=PMC3475302&req=5

fig3: Encrypted image and decrypted image. (a) The original image. (b) The encrypted image. (c) The decrypted image under the wrong secret keys. (d) The decrypted image under the correct secret keys.

Mentions: In this paper, for standard 256 × 256 gray image Lena, we use Matlab 7.1 to simulate experiment. In our experiment, we set x0 = 0.95, μ1 = 3.2, γ1 = 0.17, y0 = 0.25, μ1 = 3.3, γ2 = 0.14. The original image is shown in Figure 3(a), Figure 3(b) shows encrypted image, and Figure 3(b) points out that it is difficult to recognize the original image. Figures 3(c) and 3(d) show the decrypted image under the wrong secret keys and the right secret keys, respectively. From Figure 3(c), we know that it has not any connection with the original image, but Figure 3(d) is as same as the original image.


A novel image encryption algorithm based on DNA subsequence operation.

Zhang Q, Xue X, Wei X - ScientificWorldJournal (2012)

Encrypted image and decrypted image. (a) The original image. (b) The encrypted image. (c) The decrypted image under the wrong secret keys. (d) The decrypted image under the correct secret keys.
© Copyright Policy - open-access
Related In: Results  -  Collection

Show All Figures
getmorefigures.php?uid=PMC3475302&req=5

fig3: Encrypted image and decrypted image. (a) The original image. (b) The encrypted image. (c) The decrypted image under the wrong secret keys. (d) The decrypted image under the correct secret keys.
Mentions: In this paper, for standard 256 × 256 gray image Lena, we use Matlab 7.1 to simulate experiment. In our experiment, we set x0 = 0.95, μ1 = 3.2, γ1 = 0.17, y0 = 0.25, μ1 = 3.3, γ2 = 0.14. The original image is shown in Figure 3(a), Figure 3(b) shows encrypted image, and Figure 3(b) points out that it is difficult to recognize the original image. Figures 3(c) and 3(d) show the decrypted image under the wrong secret keys and the right secret keys, respectively. From Figure 3(c), we know that it has not any connection with the original image, but Figure 3(d) is as same as the original image.

Bottom Line: We present a novel image encryption algorithm based on DNA subsequence operation.Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image.The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.

View Article: PubMed Central - PubMed

Affiliation: Key Laboratory of Advanced Design and Intelligent Computing, Ministry of Education of Dalian University, Dalian 116622, China. zhangq30@yahoo.com

ABSTRACT
We present a novel image encryption algorithm based on DNA subsequence operation. Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image. The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.

Show MeSH