Limits...
A novel image encryption algorithm based on DNA subsequence operation.

Zhang Q, Xue X, Wei X - ScientificWorldJournal (2012)

Bottom Line: We present a novel image encryption algorithm based on DNA subsequence operation.Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image.The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.

View Article: PubMed Central - PubMed

Affiliation: Key Laboratory of Advanced Design and Intelligent Computing, Ministry of Education of Dalian University, Dalian 116622, China. zhangq30@yahoo.com

ABSTRACT
We present a novel image encryption algorithm based on DNA subsequence operation. Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image. The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.

Show MeSH
The grey histogram of the original image and the encrypted image. (a) The grey histogram of the original image. (b) The grey histogram of the encrypted image.
© Copyright Policy - open-access
Related In: Results  -  Collection


getmorefigures.php?uid=PMC3475302&req=5

fig5: The grey histogram of the original image and the encrypted image. (a) The grey histogram of the original image. (b) The grey histogram of the encrypted image.

Mentions: We compare the grey histogram of the image before and after encryption to analyze the statistical performance. Figure 5(a) shows the grey histogram of the original image and Figure 5(b) shows the grey histogram of the encrypted image. From the two figures, we can see that the original pixel grey values are concentrated on some value, but the pixel grey values after the encryption are scattering in the entire pixel value space, namely, two images have lower similarity. Clearly, it is difficult to use the statistical performance of the pixel grey value to recover the original image. Thereby, our algorithm has strong ability of resisting statistical attack.


A novel image encryption algorithm based on DNA subsequence operation.

Zhang Q, Xue X, Wei X - ScientificWorldJournal (2012)

The grey histogram of the original image and the encrypted image. (a) The grey histogram of the original image. (b) The grey histogram of the encrypted image.
© Copyright Policy - open-access
Related In: Results  -  Collection

Show All Figures
getmorefigures.php?uid=PMC3475302&req=5

fig5: The grey histogram of the original image and the encrypted image. (a) The grey histogram of the original image. (b) The grey histogram of the encrypted image.
Mentions: We compare the grey histogram of the image before and after encryption to analyze the statistical performance. Figure 5(a) shows the grey histogram of the original image and Figure 5(b) shows the grey histogram of the encrypted image. From the two figures, we can see that the original pixel grey values are concentrated on some value, but the pixel grey values after the encryption are scattering in the entire pixel value space, namely, two images have lower similarity. Clearly, it is difficult to use the statistical performance of the pixel grey value to recover the original image. Thereby, our algorithm has strong ability of resisting statistical attack.

Bottom Line: We present a novel image encryption algorithm based on DNA subsequence operation.Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image.The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.

View Article: PubMed Central - PubMed

Affiliation: Key Laboratory of Advanced Design and Intelligent Computing, Ministry of Education of Dalian University, Dalian 116622, China. zhangq30@yahoo.com

ABSTRACT
We present a novel image encryption algorithm based on DNA subsequence operation. Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image. The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.

Show MeSH