Efficient DNA-Based Logistic Mapping Algorithm for Color Image Encryption
DOI:
https://doi.org/10.4108/eetsis.6800Keywords:
Cryptography, DNA cryptography, Encoding, Decoding, Image Security, Image encryption, Color images, Digital chaotic map, Logistic mapAbstract
INTRODUCTION: Color images hold significant information and are widely used in diverse domains. The protection of these images against unauthorized access over the internet is a necessity that relies on encryption techniques. However, traditional encryption methods face challenges with the increasing capability and efficiency of quantum computing to solve complex problems. DNA cryptography is a promising field in information security, utilizing DNA molecules with massive parallelism and vast storage capacity to encode and decode information. While chaotic systems have been widely used in encryption due to their sensitivity to initial conditions and parameter values, resulting in unpredictability and significant variation. Exploiting the characteristics of DNA cryptography and chaotic systems is a promising alternative for securing data. Nevertheless, current methodologies exhibit limitations such as a small key space and weak resistance to differential attacks.
OBJECTIVES: This paper addresses these gaps by proposing an RGB image encryption algorithm based on DNA cryptography and a 1D logistic map.
METHODS: The proposed method randomly generates a DNA encoding/decoding table to generate the row-column permutation of the image. After the permutation of the image, the logistic map is used to generate three keys for RGB channels and seven DNA encoding-decoding rules, three are used to encode the keys into DNA sequence, the second three to encode the image RGB channel, and the last to perform the DNA-XOR operation. Finally, decode the result into integers using the DNA encoding/decoding table and generate the encrypted image.
RESULTS: The analysis of the proposed technique demonstrates significant robustness against various attacks, as evidenced by metrics such as a key space exceeding 2100, an average NPCR of 99.613667%, an average UACI of 50.273742%, an entropy value approaching 8, and a strong key sensitivity.
CONCLUSION: These results validate its capacity to effectively resist differential, brute-force, and statistical attacks.
References
[1] Dixit, P., Gupta, A.K., Trivedi, M.C., Yadav, V.K.: Traditional and hybrid encryption techniques: a survey. In: Networking Communication and Data Knowledge Engineering: Volume 2, pp. 239-248 (2018). Springer. https://doi.org/10.1007/978-981-10-4600-1_22
[2] Liu, H., Zhao, B., Huang, L.: A remote-sensing image encryption scheme using dna bases probability and twodimensional logistic map. IEEE Access 7, 65450-65459 (2019). https://doi.org/10.1109/access.2019.2917498
[3] Huang, L., Wang, S., Xiang, J., Sun, Y.: Chaotic color image encryption scheme using deoxyribonucleic acid (dna) coding calculations and arithmetic over the galois field. Mathematical Problems in Engineering 2020(1), 3965281 (2020). https://doi.org/10.1155/2020/3965281
[4] Zheng, J., Liu, L.: Novel image encryption by combining dynamic dna sequence encryption and the improved 2d logistic sine map. IET image processing 14(11), 2310-2320 (2020). https://doi.org/10.1049/iet-ipr.2019.1340
[5] Allawi, S.T., Alshibani, D.R.: Color image encryption using lfsr, dna, and 3d chaotic maps. International journal of electrical and computer engineering systems 13(10), 885-893 (2022). https://doi.org/10.32985/ijeces.13.10.4
[6] Gabr, M., Younis, H., Ibrahim, M., Alajmy, S., Khalid, I., Azab, E., Elias, R., Alexan, W.: Application of dna coding, the lorenz differential equations and a variation of the logistic map in a multistage cryptosystem. Symmetry 14(12), 2559 (2022). https://doi.org/10.3390/sym14122559
[7] Wang, Q., Zhang, X., Zhao, X.: Color image encryption algorithm based on bidirectional spiral transformation and dna coding. Physica Scripta 98(2), 025211 (2023). https://doi.org/10.1088/1402-4896/acb322
[8] Shraida, G., Younis, H., Al-Amiedy, T., Anbar, M., Younis, H., Hasbullah, I.: An efficient color-image encryption method using dna sequence and chaos cipher. Comput. Mater. Contin 75, 2641-2654 (2023). https://doi.org/10.32604/cmc.2023.035793
[9] Alrubaie, A.H., Khodher, M.A.A., Abdulameer, A.T.: Image encryption based on 2dna encoding and chaotic 2d logistic map. Journal of Engineering and Applied Science 70(1), 60 (2023). https://doi.org/10.1186/s44147-023-00228-2
[10] Wang, Q., Zhang, X., Zhao, X.: Color image encryption algorithm based on novel 2d hyperchaotic system and dna crossover and mutation. Nonlinear Dynamics 111(24), 22679-22705 (2023). https://doi.org/10.1007/s11071-023-09020-6
[11] Yan, S., Li, L., Gu, B., Sun, X., Ren, Y., Zhang, Y.: A color image encryption scheme based on chaotic mapping, chaotic system, and dna coding. Applied Intelligence 53(24), 31181-31206 (2023). https://doi.org/10.1007/s10489-023-04759-2
[12] Arroyo, D., Alvarez, G., Fernandez, V.: On the inadequacy of the logistic map for cryptographic applications. arXiv preprint arXiv:0805.4355 (2008). https://doi.org/10.48550/arXiv.0805.4355
[13] Watson, J.D., Crick, F.H.: The structure of dna. In: Cold Spring Harbor Symposia on Quantitative Biology, vol. 18, pp. 123-131 (1953). Cold Spring Harbor Laboratory Press
[14] Mahjabin, T., Olteanu, A., Xiao, Y., Han, W., Li, T., Sun, W.: A survey on dna-based cryptography and steganography. IEEE Access (2023). https://doi.org/10.1109/ACCESS.2023.3324875
[15] Henderi, H., Wahyuningsih, T., Rahwanto, E.: Comparison of min-max normal- ization and z-score normalization in the k-nearest neighbor (knn) algorithm to test the accuracy of types of breast cancer. International Journal of Informatics and Information Systems 4(1), 13-20 (2021). https://doi.org/10.47738/ijiis.v4i1.73
[16] Baoxian Zhou, April 25, 2024, "Brain MRI Segmentation", IEEE Dataport, doi: https://dx.doi.org/10.21227/pv7k-b062.
[17] Fowler, D.: The factorial function: Stirling’s formula. The Mathematical Gazette 84(499), 42-50 (2000). https://doi.org/10.2307/3621473
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Aya Goudjil, Aicha Benyoucef, M'Hamed Hamadouche, Mohamed Amine Riahla

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This is an open access article distributed under the terms of the CC BY-NC-SA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.