Image Encryption Method based on Hill Matrix and Dynamic DNA Encoding
Volume 14, Number 8, August 2018, pp. 1804-1814 DOI: 10.23940/ijpe.18.08.p17.18041814
Xuncai Zhang, Zheng Zhou, Yishan Liu, Guangzhao Cui, Ying Niu, and Yanfeng Wang
School of Electrical and Information Engineering, Zhengzhou University of Light Industry, Zhengzhou, 450002, China
(Submitted on May 6, 2018; Revised on June 19, 2018; Accepted on July 21, 2018)
Abstract:
Based on Hill matrix and dynamic DNA encoding, an image encryption method is proposed. First, this method combines an elliptic curve with a hyper-chaos sequence to fabricate the Hill cipher matrix, and the plaintext image is permuted and encrypted. Second, the dynamic DNA encoding technique is applied to diffuse the gray values of this plaintext image. Finally, hyper-chaos sequences are employed to complete the confusion and diffusion of the image. The experimental results show that the presented method can not only defend against brute-force attacks and statistical attacks but also resist plaintext attacks; in addition, the method has the merits of fast encryption speed, good encryption effects, and easy implementation.
References: 24
- X. Chai, Y. Chen, and L. Broyde, “A Novel Chaos-based Image Encryption Algorithm using DNA Sequence Operations,” Optics & Lasers in Engineering, Vol. 88, pp. 197-213, 2017
- R. Enayatifar, H. J. Sadaei, A. H. Abdullah, M. Lee, and I. F. Isnin, “A Novel Chaotic based Image Encryption using a Hybrid Model of Deoxyribonucleic Acid and Cellular Automata,” Optics & Lasers in Engineering, Vol. 71, pp. 33-41, 2015
- X. Wang, J. Zhao, and H. Liu, “A New Image Encryption Algorithm based on Chaos,” Optics Communications, Vol. 285, No. 5, pp. 562-566, 2012
- F. Özkaynak and S. Yavuz, “Analysis and Improvement of a Novel Image Fusion Encryption Algorithm based on DNA Sequence Operation and Hyper-chaotic System,” Nonlinear Dynamics, Vol. 78, No. 2, pp. 1311-1320, 2014
- L. Kong and L. Li, “A New Image Encryption Algorithm based on Chaos,” in Proceedings of 35th Chinese Control Conference (CCC), pp. 4932-4937, 2016
- F. Özkaynak, A. B. Özer, and S. Yavuz, “Security Analysis of an Image Encryption Algorithm based on Chaos and DNA Encoding,” in Proceedings of Signal Processing and Communications Applications Conference (SIU), pp. 1-4, 2013
- B. Santhosh and K. Viswanath, “A Novel Public Key Cryptosystem for Medical Images,” in Proceedings of International Conference on Inventive Systems and Control (ICISC), pp. 1-4, 2017
- K. Gupta, S. Silakari, R. Gupta, and S. A. Khan, “An Ethical Way of Image Encryption using ECC,” in Proceedings of First International Conference on Computational Intelligence, Communication Systems and Networks (CICSYN), pp. 342-345, 2009
- A. Soleymani, J. Nordin, A. N. Hoshyar, Z. M. Ali, and E. Sundararajan, “An Image Encryption Scheme based on Elliptic Curve and a Novel Mapping Method,” International Journal of Digital Content Technology & its Applications, Vol. 7, No. 13, pp. 85, 2013
- F. Wang, X. Q. Zhang, and G. L. Zhu, “A Block Image Element Encryption Algorithm based on ECC,” Communications Technology, Vol. 41, No. 3, pp. 82-84, 2008
- L. J. Chen and A. D. Shen, “A Novel Public Key Image Cryptosystem based on Elliptic Curve and Arnold Cat Map,” Advanced Materials Research, Vol. 989-994, pp. 4183-4186, 2014
- M. Kumar, A. Iqbal, and P. Kumar, “A New RGB Image Encryption Algorithm based on DNA Encoding and Elliptic Curve Diffie–hellman Cryptography,” Signal Processing, Vol. 125, No. C, pp. 187-202, 2016
- B. Acharya, S. K. Patra, and G. Panda, “Image Encryption by Novel Cryptosystem using Matrix Transformation,” in Proceedings of International Conference on Emerging Trends in Engineering and Technology, pp. 77-81, 2008
- R. Mahendran and K. Mani, “Generation of Key Matrix for Hill Cipher Encryption using Classical Cipher,” in Proceedings of World Congress on Computing and Communication Technologies (WCCCT), pp. 51-54, 2017
- K. D. Patel and S. Belani, “Image Encryption using Different Techniques,” International Journal of Emerging Technology and Advanced Engineering, Vol. 1, No. 1, pp. 30-34, 2011
- A. A. A. Gutub and F. A. A. Khan, “Hybrid Crypto Hardware Utilizing Symmetric-Key and Public-Key Cryptosystems,” in Proceedings of International Conference on Advanced Computer Science Applications and Technologies, pp. 116-121, 2013
- X. Wang and M. Wang, “A Hyperchaos Generated from Lorenz System,” Physica A Statistical Mechanics & its Applications, Vol. 387, No. 14, pp. 3751-3758, 2008
- R. Enayatifar, A. H. Abdullah, and I. F. Isnin, “Chaos-based Image Encryption using a Hybrid Genetic Algorithm and a DNA Sequence,” Optics & Lasers in Engineering, Vol. 56, No. 5, pp. 83-93, 2014
- H. Liu, X. Wang, and A. Kadir, “Image Encryption using DNA Complementary Rule and Chaotic Maps,” Applied Soft Computing Journal, Vol. 12, No. 5, pp. 1457-1466, 2012
- I. I. Cisse, H. Kim, and T. Ha, “A Rule of Seven in Watson-Crick base Pairing of Mismatched Sequences,” Nature Structural & Molecular Biology, Vol. 19, No. 6, pp. 623-627, 2012
- R. Guesmi, M. A. B. Farah, A. Kachouri, and M. Samet, “A Novel Chaos-based Image Encryption using DNA Sequence Operation and Secure Hash Algorithm SHA-2,” Nonlinear Dynamics, Vol. 83, No. 3, pp. 1-14, 2015
- G. Cui, Y. Liu, X. Zhang, and Z. Zhou, “A New Image Encryption Algorithm based on DNA Dynamic Encoding and Hyper-Chaotic System,” in Proceedings of International Conference on Bio-Inspired Computing: Theories and Applications, pp. 286-303, 2017
- B. K. Alese, E. D. Philemon, and S. O. Falaki, “Comparative Analysis of Public-Key Encryption Schemes,” International Journal of Engineering & Technology, Vol. 2, No. 9, pp. 1552-1568, 2012
- J. Hoffstein, J. Pipher, and J. H. Silverman, “An Introduction to Mathematical Cryptography,” 2nd Edition, Springer Publishing Company, 2014
Please note : You will need Adobe Acrobat viewer to view the full articles.
Attachments:
17-IJPE-08-17.pdf | [Image Encryption Method based on Hill Matrix and Dynamic DNA Encoding] | 1232 Kb |
|