Image Encryption Algorithm Based on Hyperchaotic Maps and Nucleotide Sequences Database

Image encryption technology is one of the main means to ensure the safety of image information. Using the characteristics of chaos, such as randomness, regularity, ergodicity, and initial value sensitiveness, combined with the unique space conformation of DNA molecules and their unique information s...

Full description

Saved in:
Bibliographic Details
Published in:Computational Intelligence and Neuroscience Vol. 2017; no. 2017; pp. 1 - 9
Main Authors: Niu, Ying, Han, Feng, Zhang, Xuncai
Format: Journal Article
Language:English
Published: Cairo, Egypt Hindawi Limiteds 01-01-2017
Hindawi Publishing Corporation
Hindawi
John Wiley & Sons, Inc
Hindawi Limited
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Image encryption technology is one of the main means to ensure the safety of image information. Using the characteristics of chaos, such as randomness, regularity, ergodicity, and initial value sensitiveness, combined with the unique space conformation of DNA molecules and their unique information storage and processing ability, an efficient method for image encryption based on the chaos theory and a DNA sequence database is proposed. In this paper, digital image encryption employs a process of transforming the image pixel gray value by using chaotic sequence scrambling image pixel location and establishing superchaotic mapping, which maps quaternary sequences and DNA sequences, and by combining with the logic of the transformation between DNA sequences. The bases are replaced under the displaced rules by using DNA coding in a certain number of iterations that are based on the enhanced quaternary hyperchaotic sequence; the sequence is generated by Chen chaos. The cipher feedback mode and chaos iteration are employed in the encryption process to enhance the confusion and diffusion properties of the algorithm. Theoretical analysis and experimental results show that the proposed scheme not only demonstrates excellent encryption but also effectively resists chosen-plaintext attack, statistical attack, and differential attack.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
Academic Editor: Reinoud Maex
ISSN:1687-5265
1687-5273
DOI:10.1155/2017/4079793