[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Symmetric keys image encryption and decryption using 3D chaotic maps with DNA encoding technique

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In present digital era, multimedia like images, text, documents and videos plays a vital role, therefore due to increase in usage of digital data; there comes high demand of security. Encryption is a technique used to secure and protect the images from unfair means. In cryptography, chaotic maps play an important role in forming strong and effective encryption algorithm. In this paper 3D chaotic logistic map with DNA encoding is used for confusion and diffusion of image pixels. Additionally, three symmetric keys are used to initialize 3D chaos logistic map, which makes the encryption algorithm strong. The symmetric keys used are 32 bit ASCII key, Chebyshev chaotic key and prime key. The algorithm first applies 3D non-linear logistic chaotic map with three symmetric keys in order to generate initial conditions. These conditions are then used in image row and column permutation to create randomness in pixels. The third chaotic sequence generated by 3D map is used to generate key image. Diffusion of these random pixels are done using DNA encoding; further XOR logical operation is applied between DNA encoded input image and key image. Analysis parameters like NPCR, UACI, entropy, histogram, chi-square test and correlation are calculated for proposed algorithm and also compared with different existing encryption methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Abdulredha HH, Nasir Q (2011) Low Complexity High Security Image Encryption Based on Nested PWLCM Chaotic Map. IEEE Internatonal conference for Internet Technology and Secure Transactions, ISBN 978–1–4577-0884-8, pp 220–225

  2. Akter MT, Chowdhury MAM (2018) Observation of Different Behaviors of Logistic Map for Different Control Parameters. International Journal of Applied Mathematics and Theoretical Physics. Vol. 4, No. 3, pp. 84–90

  3. Al-Maadeed S, Al-Ali A, Abdalla T (2012) A new chaos-based image encryption and compression algorithm. J Electr Comput Eng 2012:15

    MathSciNet  MATH  Google Scholar 

  4. Barakat M, Eder C, Hanke T (2018) An Introduction to Cryptography, Timo Hanke at RWTH Aachen University, pp. 1–145

  5. Belazi A, Talha M, Kharbech S (2019) Novel medical image encryption scheme based on Chaos and DNA encoding, 2018 IEEE. Translations, 18576092, Page(s): 36667–36681, ISSN: 2169-3536.

  6. Brindha M (2017) Multiple stage image encryption using chaotic logistic map. 2017 international conference on intelligent sustainable systems (ICISS), ISBN: 978-1-5386-1959-9

  7. Chai XL, Gan ZH, Lu Y, Chen YR, Han DJ (2017) A novel image encryption algorithm based on the chaotic system and DNA computing. Int J Mod Phys C 28:1750069

    Article  MathSciNet  Google Scholar 

  8. Essaid M ; Akharraz I ; Saaidi A ; Mouhib A (2019) A novel image encryption scheme based on permutation/diffusion process using an improved 2D chaotic system”, 2019 international conference on wireless technologies, embedded and intelligent systems (WITS), IEEE

  9. Kamel Faraoun, “Chaos-based key stream generator based on multiple maps combinations and its application to images encryption”. The International Arab Journal of Information Technology, Vol. 7, No. 3, pp231–240, July 2011.

  10. Fridrich J (1997) Image encryption based on chaotic maps, in IEEE Int. Conf. Systems, Man, and Cybernetics, 2, 1105{1110

  11. Hossain MB, Rahman MT, Rahman A, Islam S (2014) A new approach of image encryption using 3d chaotic map to enhance security of multimedia component. In: 2014 international conference on informatics, Electronics & Vision (ICIEV). IEEE, pp. 1–6

  12. D. Huo, D.-f. Zhou, S. Yuan, S. Yi, L. Zhang, and X. Zhou, “Image encryption using exclusive-OR with DNA complementary rules and double random phase encoding,” Physics Letters A, vol. 383, no. 9, pp. 915–922, Feb 28, 2019.

  13. Pawan N. Khade and Prof. Manish Narnaware, “3D Chaotic Functions for Image Encryption", International Journal of Computer Science Issues, Vol. 9, Issue 3, No 1, PP. 323–328, May 2012.

  14. Li H, He F, Liang Y, Quan Q (2019) A dividing-based many-objective evolutionary algorithm for large-scale feature selection. Soft Comput 1–20

  15. Liu H, Wang X (2010) Color image encryption based on onetime keys and robust chaotic maps. Computers & Mathematics with Applications 59(10):3320–3327

    Article  MathSciNet  Google Scholar 

  16. Maddodi G, Awad A, Awad D, Awad M, Lee B (2018) A new image encryption algorithm based on heterogeneous chaotic neural network generator and DNA encoding. Multimed Tools Appl 77(19):24701–24725

    Article  Google Scholar 

  17. Masmoudi A, Bouhlel MS, Puech W (2010) A New Image Cryptosystem Based On Chaotic Map And Continued Fractions 18th European Signal Processing Conference (EUSIPCO-2010),Aalborg, Denmark, pp 1504–1508

  18. Ratinder Kaur VK (2012) Banga “Image Security using Encryption based Algorithm”: International Conference on Trends in Electrical, Electronics and Power Engineering (ICTEEP'2012) July 15–16, Singapore

  19. Saffari RM, Mirzakuchaki S (2016) A Novel Image Encryption Algorithm Based on Discrete Wavelet Transform Using Two dimensional Logistic Map ,” 24th Iranian Conference on Electrical Engineering (ICEE), IEEE

  20. Safi HW, Maghari AY (2017, October) Image encryption using double chaotic logistic map. In promising electronic technologies (ICPET), 2017 international conference on (pp. 66-70). IEEE

  21. Abhinav Srivastava, "A survey report on Different Techniques of Image Encryption", International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 6, June 2012, pages: 163–167.

  22. Tang Z, Yang Y, Xu S, Yu C, Zhang X (2019) Image encryption with double spiral scans and chaotic maps. Security and Communication Networks 2019:1–15

    Google Scholar 

  23. Wang XY, Shi QJ (2005) New Type Crisis, Hysteresisand Fractal in Coupled Logistic Map, Chinese Journal of Applied Mechanics, pp. 501–506

  24. Wu Y, Yang G, Jin H, Noonan JP (2012) Image encryption using the two dimensional logistic chaotic map. J Electron Imaging 21(1):013014–013011

  25. Yu H, He F, Pan Y (2020) A scalable region-based level set method using adaptive bilateral filter for noisy image segmentation. Multimed Tools Appl 79(9):5743–5765

    Article  Google Scholar 

  26. Zhang S, He F (2019) DRCDN: learning deep residual convolutional dehazing networks. Vis Comput 1–12

  27. Zhang Q, Wei X (2013) A novel couple images encryption algorithm based on DNA subsequence operation and chaotic system. Optik 124(23):6276–6281

    Article  Google Scholar 

  28. Zhang J, Fang D, Ren H (2014) Image encryption algorithm based on DNA encoding and chaotic maps. Math Probl Eng 2014:917147

    Google Scholar 

  29. Zhang Z, Wang H, Gao Y (2015) 2015/10/01, Chebyshev chaotic map-based authentication protocol for RFID applications, personal and ubiquitous computing, SN - 1617-4917.

  30. Zhang J, He F, Chen Y (2020) A new haze removal approach for sky/river alike scenes based on external and internal clues. Multimed Tools Appl 79(3):2085–2107

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajesh Kumar M.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Patel, S., Bharath K P & Rajesh Kumar M Symmetric keys image encryption and decryption using 3D chaotic maps with DNA encoding technique. Multimed Tools Appl 79, 31739–31757 (2020). https://doi.org/10.1007/s11042-020-09551-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09551-9

Keywords

Navigation