Username   Password       Forgot your password?  Forgot your username? 


Image Encryption Method based on Hill Matrix and Dynamic DNA Encoding

Volume 14, Number 8, August 2018, pp. 1804-1814
DOI: 10.23940/ijpe.18.08.p17.18041814

Xuncai Zhang, Zheng Zhou, Yishan Liu, Guangzhao Cui, Ying Niu, and Yanfeng Wang

School of Electrical and Information Engineering, Zhengzhou University of Light Industry, Zhengzhou, 450002, China

(Submitted on May 6, 2018; Revised on June 19, 2018; Accepted on July 21, 2018)


Based on Hill matrix and dynamic DNA encoding, an image encryption method is proposed. First, this method combines an elliptic curve with a hyper-chaos sequence to fabricate the Hill cipher matrix, and the plaintext image is permuted and encrypted. Second, the dynamic DNA encoding technique is applied to diffuse the gray values of this plaintext image. Finally, hyper-chaos sequences are employed to complete the confusion and diffusion of the image. The experimental results show that the presented method can not only defend against brute-force attacks and statistical attacks but also resist plaintext attacks; in addition, the method has the merits of fast encryption speed, good encryption effects, and easy implementation.


References: 24

              1. X. Chai, Y. Chen, and L. Broyde, “A Novel Chaos-based Image Encryption Algorithm using DNA Sequence Operations,” Optics & Lasers in Engineering, Vol. 88, pp. 197-213, 2017
              2. R. Enayatifar, H. J. Sadaei, A. H. Abdullah, M. Lee, and I. F. Isnin, “A Novel Chaotic based Image Encryption using a Hybrid Model of Deoxyribonucleic Acid and Cellular Automata,” Optics & Lasers in Engineering, Vol. 71, pp. 33-41, 2015
              3. X. Wang, J. Zhao, and H. Liu, “A New Image Encryption Algorithm based on Chaos,” Optics Communications, Vol. 285, No. 5, pp. 562-566, 2012
              4. F. Özkaynak and S. Yavuz, “Analysis and Improvement of a Novel Image Fusion Encryption Algorithm based on DNA Sequence Operation and Hyper-chaotic System,” Nonlinear Dynamics, Vol. 78, No. 2, pp. 1311-1320, 2014
              5. L. Kong and L. Li, “A New Image Encryption Algorithm based on Chaos,” in Proceedings of 35th Chinese Control Conference (CCC), pp. 4932-4937, 2016
              6. F. Özkaynak, A. B. Özer, and S. Yavuz, “Security Analysis of an Image Encryption Algorithm based on Chaos and DNA Encoding,” in Proceedings of Signal Processing and Communications Applications Conference (SIU), pp. 1-4, 2013
              7. B. Santhosh and K. Viswanath, “A Novel Public Key Cryptosystem for Medical Images,” in Proceedings of International Conference on Inventive Systems and Control (ICISC), pp. 1-4, 2017
              8. K. Gupta, S. Silakari, R. Gupta, and S. A. Khan, “An Ethical Way of Image Encryption using ECC,” in Proceedings of First International Conference on Computational Intelligence, Communication Systems and Networks (CICSYN), pp. 342-345, 2009
              9. A. Soleymani, J. Nordin, A. N. Hoshyar, Z. M. Ali, and E. Sundararajan, “An Image Encryption Scheme based on Elliptic Curve and a Novel Mapping Method,” International Journal of Digital Content Technology & its Applications, Vol. 7, No. 13, pp. 85, 2013
              10. F. Wang, X. Q. Zhang, and G. L. Zhu, “A Block Image Element Encryption Algorithm based on ECC,” Communications Technology, Vol. 41, No. 3, pp. 82-84, 2008
              11. L. J. Chen and A. D. Shen, “A Novel Public Key Image Cryptosystem based on Elliptic Curve and Arnold Cat Map,” Advanced Materials Research, Vol. 989-994, pp. 4183-4186, 2014
              12. M. Kumar, A. Iqbal, and P. Kumar, “A New RGB Image Encryption Algorithm based on DNA Encoding and Elliptic Curve Diffie–hellman Cryptography,” Signal Processing, Vol. 125, No. C, pp. 187-202, 2016
              13. B. Acharya, S. K. Patra, and G. Panda, “Image Encryption by Novel Cryptosystem using Matrix Transformation,” in Proceedings of International Conference on Emerging Trends in Engineering and Technology, pp. 77-81, 2008
              14. R. Mahendran and K. Mani, “Generation of Key Matrix for Hill Cipher Encryption using Classical Cipher,” in Proceedings of World Congress on Computing and Communication Technologies (WCCCT), pp. 51-54, 2017
              15. K. D. Patel and S. Belani, “Image Encryption using Different Techniques,” International Journal of Emerging Technology and Advanced Engineering, Vol. 1, No. 1, pp. 30-34, 2011
              16. A. A. A. Gutub and F. A. A. Khan, “Hybrid Crypto Hardware Utilizing Symmetric-Key and Public-Key Cryptosystems,” in Proceedings of International Conference on Advanced Computer Science Applications and Technologies, pp. 116-121, 2013
              17. X. Wang and M. Wang, “A Hyperchaos Generated from Lorenz System,” Physica A Statistical Mechanics & its Applications, Vol. 387, No. 14, pp. 3751-3758, 2008
              18. R. Enayatifar, A. H. Abdullah, and I. F. Isnin, “Chaos-based Image Encryption using a Hybrid Genetic Algorithm and a DNA Sequence,” Optics & Lasers in Engineering, Vol. 56, No. 5, pp. 83-93, 2014
              19. H. Liu, X. Wang, and A. Kadir, “Image Encryption using DNA Complementary Rule and Chaotic Maps,” Applied Soft Computing Journal, Vol. 12, No. 5, pp. 1457-1466, 2012
              20. I. I. Cisse, H. Kim, and T. Ha, “A Rule of Seven in Watson-Crick base Pairing of Mismatched Sequences,” Nature Structural & Molecular Biology, Vol. 19, No. 6, pp. 623-627, 2012
              21. R. Guesmi, M. A. B. Farah, A. Kachouri, and M. Samet, “A Novel Chaos-based Image Encryption using DNA Sequence Operation and Secure Hash Algorithm SHA-2,” Nonlinear Dynamics, Vol. 83, No. 3, pp. 1-14, 2015
              22. G. Cui, Y. Liu, X. Zhang, and Z. Zhou, “A New Image Encryption Algorithm based on DNA Dynamic Encoding and Hyper-Chaotic System,” in Proceedings of International Conference on Bio-Inspired Computing: Theories and Applications, pp. 286-303, 2017
              23. B. K. Alese, E. D. Philemon, and S. O. Falaki, “Comparative Analysis of Public-Key Encryption Schemes,” International Journal of Engineering & Technology, Vol. 2, No. 9, pp. 1552-1568, 2012
              24. J. Hoffstein, J. Pipher, and J. H. Silverman, “An Introduction to Mathematical Cryptography,” 2nd Edition, Springer Publishing Company, 2014


                          Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

                          This site uses encryption for transmitting your passwords.