吉林大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (3): 801-806.doi: 10.13229/j.cnki.jdxbgxb201403035

• Orignal Article • Previous Articles     Next Articles

Image encryption algorithm based on chaos and dynamic DNA coding

TIAN Hai-jiang1, LEI Peng2,WANG Yong2   

  1. 1.Periodical Office, Chongqing University of Posts and Telecommunications,Chongqing 400065,China;
    2.College of Computer Science and Technology, Chongqing University of Posts and Telecommunications,Chongqing 400065, China
  • Received:2013-02-01 Online:2014-03-01 Published:2014-03-01

Abstract: An image encryption algorithm based on dynamic DNA coding is proposed, which uses the spatiotemporal chaotic model as the core control function. In this algorithm, the indexes are created according to the status values of the coupled map lattices. Then, the DNA coding rules are determined by the indexes. Since the pixels are coded as different DNA bases with variable rules, the security of the encryption algorithm is improved. Moreover, the Cipher-block chaining mode and chaos iteration are employed in the encryption process to enhance the confusion and diffusion of the algorithm. Simulation experiments show that the proposed algorithm has good security and high potential to be applied in image encryption.

Key words: computer application, chaos, image encryption, DNA coding, coupled map lattices

CLC Number: 

  • TP301
[1] 黄润生.混沌及其应用[M].武汉:武汉大学出版社,2000.
[2] Fridrich J. Symmetric cipher based on two dimensional chaotic maps[J]. International Journal of Bifurcation and Chaos,1998, 8 (6): 1259-1284.
[3] Chen G, Mao Y, Chui C K. A symmetric image encryption scheme based on 3D chaotic cat maps[J]. Chaos, Solitons & Fractals, 2004,21(3):749-761.
[4] Wang Yong,Wong Kwok-Wo,Liao Xiao-feng. A chaos-based image encryption algorithm with variable control parameters[J]. Chaos, Solitons & Fractals,2009,41(4): 1773-1783.
[5] Wang Yong,Wong Kwok-Wo,Liao Xiao-feng, et al. A new chaos-based fast image encryption algorithm[J]. Applied Soft Computing,2011,11(1):514-522.
[6] Behnia S,Akshshani A,Mahmodi H,et al.A novel algorithm for image encryption based on mixture of chaotic maps[J].Chaos,Solitons & Fractals,2008(35):408-419.
[7] Zhu He-gui,Zhao Cheng,Zhang Xiang-de.A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem[J].Signal Processing: Image Communication,2013,6(28):670-680.
[8] Adleman L M. Molecular computation of solutions of combinational problems[J].Science, 1994,266(11):1021-1024.
[9] Wasiewicz P, Mulawka J J, Rudnicki W R,et al. Adding numbers with DNA[J]. IEEE International Conference on Systems Man and Cybernetics,2000,21(1):265-270.
[10] King O D, Gaborit P. Binary templates for comma-free DNA codes[J].Discrete Applied Mathematics,2007, 155(5):831-839.
[11] Gehani A, Labean T, Reif J H. DNA-based cryptography[J]. Aspects of Molecular Computing,2004,54(3):167-188.
[12] Wei Xiao-peng,Guo Ling,Zhang Qiang,et al.A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system[J].The Journal of Systems and Software,2012,85(2):290-299.
[13] Zhang Qiang,Guo Ling,Wei Xiao-peng. Image encryption using DNA addition combining with chaotic maps[J]. Mathematical and Computer Modelling, 2010, 52(11-12): 2028-2035.
[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[8] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[9] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[10] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[11] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[14] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[15] HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!