Cover
Vol. 18 No. 2 (2022)

Published: December 31, 2022

Pages: 69-74

Original Article

An Efficient Diffusion Approach for Chaos-Based Image Encryption and DNA Sequences

Abstract

Experts and researchers in the field of information security have placed a high value on the security of image data in the last few years. They have presented several image encryption techniques that are more secure. To increase the security level of image encryption algorithms, this article offers an efficient diffusion approach for image encryption methods based on one- dimensional Logistic, three-dimensional Lorenz, DNA encoding and computing, and SHA-256. The encryption test demonstrates that the method has great security and reliability. This article, also, examines the security of encryption methods, such as secret key space analysis, key sensitivity test, histogram analysis, information entropy process, correlation examination, and differential attack. When the image encryption method described in this article is compared to several previous image encryption techniques, the encryption algorithm has higher information entropy and a lower correlation coefficient.

References

  1. R. Chaddha, A. Kumar, K. Sinha, and P. Paul, “Selection on Various Traditional Image Encryption Techniques: A Study,” in International Conference on Nanoelectronics, Circuits and Communication Systems, 2018, pp. 219–228.
  2. H. Arora and J. Jain, “Comparison among RSA, AES and DES,” Int. Res. Journals Eng. Technol. Vol. 06 issue, 2019, doi: 10.14704/WEB/V19I1/WEB19047.
  3. A. A. Abdallah and A. K. Farhan, “A New Image Encryption Algorithm Based on Multi Chaotic System,” Iraqi J. Sci., pp. 324–337, 2022.
  4. A. A. Al-Hussein, “Chaos Phenomenon in Power Systems : A Review,” Iraqi J. Elecrical Electron. Eng., vol. 17, no. 2, 2021, doi: 10.37917/ijeee.17.2.25.
  5. P. Parida, C. Pradhan, X.-Z. Gao, D. S. Roy, and R. K. Barik, “Image Encryption and Authentication With Elliptic Curve Cryptography and Multidimensional Chaotic Maps,” IEEE Access, vol. 9, pp. 76191–76204, 2021.
  6. S. S. Askar, A. A. Karawia, A. Al-Khedhairi, and F. S. Al-Ammar, “An algorithm of image encryption using logistic and two-dimensional chaotic economic maps,” Entropy, vol. 21, no. 1, p. 44, 2019.
  7. P. Liu, T. Zhang, and X. Li, “A new color image encryption algorithm based on DNA and spatial chaotic map,” Multimed. Tools Appl., vol. 78, no. 11, pp. 14823– 14835, 2019.
  8. H. R. Amani and M. Yaghoobi, “A New Approach in Adaptive Encryption Algorithm for Color Images Based on DNA Sequence Operation and Hyper-Chaotic System,” Multimed. Tools Appl., vol. 78, no. 15, pp. 21537–21556, 2019, doi: 10.1007/s11042-018-6989-y.
  9. X. Wu, J. Kurths, and H. Kan, “A robust and lossless DNA encryption scheme for color images,” Multimed. Tools Appl., vol. 77, no. 10, pp. 12349–12376, 2018, doi: 10.1007/s11042-017-4885-5.
  10. X. Y. Wang, P. Li, Y. Q. Zhang, L. Y. Liu, H. Zhang, and X. Wang, “A novel color image encryption scheme using DNA permutation based on the Lorenz system,” Multimed. Tools Appl., vol. 77, no. 5, pp. 6243–6265, 2018, doi: 10.1007/s11042-017-4534-z.
  11. X. Zhang and R. Ye, “A novel RGB image encryption algorithm based on DNA sequences and chaos,” Multimed. Tools Appl., vol. 80, no. 6, pp. 8809–8833, 2021.
  12. H. G. Mohamed, D. H. ElKamchouchi, and K. H. Moussa, “A novel color image encryption algorithm based on hyperchaotic maps and mitochondrial DNA sequences,” Entropy, vol. 22, no. 2, p. 158, 2020.
  13. X. Wu, K. Wang, X. Wang, H. Kan, and J. Kurths, “Color image DNA encryption using NCA map-based CML and one-time keys,” Signal Processing, vol. 148, pp. 272–287, 2018, doi: 10.1016/j.sigpro.2018.02.028.
  14. Q. Liu and L. Liu, “Color Image Encryption Algorithm Based on DNA Coding and Double Chaos System,” IEEE Access, vol. 8, pp. 83596–83610, 2020, doi: 10.1109/ACCESS.2020.2991420.
  15. Z. Liu, C. Wu, J. Wang, and Y. Hu, “A Color Image Encryption Using Dynamic DNA and 4-D Memristive Hyper-Chaos,” IEEE Access, vol. 7, pp. 78367–78378, 2019, doi: 10.1109/ACCESS.2019.2922376.
  16. L. A. Shihab, “Technological Tools for Data Security in the Treatment of Data Reliability in Big Data Environments,” Int. Trans. J. Eng. Manag. Appl. Sci. Technol., vol. 11, no. 9, pp. 1–13, 2020.
  17. G.-C. Wu and D. Baleanu, “Discrete fractional logistic map and its chaos,” Nonlinear Dyn., vol. 75, no. 1, pp. 283–287, 2014.
  18. E. N. Lorenz, “Deterministic nonperiodic flow,” J. Atmos. Sci., vol. 20, no. 2, pp. 130–141, 1963.
  19. T. S. Ali and R. Ali, “A new chaos based color image encryption algorithm using permutation substitution and Boolean operation,” Multimed. Tools Appl., vol. 79, no. 27–28, pp. 19853–19873, 2020, doi: 10.1007/s11042-020- 08850-5.
  20. H. A. Younis, T. Y. Abdalla, and A. Y. Abdalla “Hiding Processing Approaches For Digital Images Encryption Using Wavelet Transform.” Basrah Journal of Engineering science. Volume 8, Issue 1, Pages 1-12, 2008.