Chaotic System and DNA Computing operations for Image Encryption Based on Pixels Shuffling

  • Ekhlas K. Gbashi university of technoobgy
  • Alaa kadhim Farhan
Keywords: image encryption, chaotic

Abstract

Image encryption is one of the primary approaches which is used to keep image information secure and safe. Recently, image encryption is turning its attention to combination with the field of DNA computing. In the presented study, a novel method of image encryption is suggested and implemented based on the DNA algorithm and Chaos theory, the most important principle in image encryption is breaking the correlation amongst pixels. This algorithm performs well against chosen cipher-text attacks. Furthermore, the proposed approach was implemented and analyzed for the Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI), The performance of the encryption method is analyzed using the histogram, Shannon entropy and key space.

Downloads

Download data is not yet available.

References

A. K. Farhan, N. M. G. G. Al-Saidi, A. T. Maolood, F. Nazarimehr, and I. Hussain, “Entropy Analysis and Image Encryption Application Based on a New Chaotic System Crossing a Cylinder,” Entropy, vol. 21, no. 10, p. 958, 2019.

A. K. Farhan, M. R. Salman, and others, “Color Image Encryption Depend on DNA Operation and Chaotic System,” in 2019 First International Conference of Computer and Applied Sciences (CAS), 2019, pp. 267–272.

A Kadhim, RM Mohamed ,“Visual cryptography for Image depend on RSA & AlGamal algorithms”, 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA),PP 1-6,May.2016.

Abdul Monem S Rahma, Suhad M Kadhem, Alaa Kadhim Farhan, “Finding the Relevance Degree between an English Text and its Title,” Engineering and Technology Journa, vol. 30, issue 9,pp 1625-1640, 2012.

Alaa Kadhim, Sura Khalaf, “New approach for security chatting in real time,” International Journal of Emerging Trends and Technology in Computer Science (IJETTCS), 2015, Volume 4, Issue 3

A. Gahlaut, A. Bharti, Y. Dogra, and P. Singh, “DNA based cryptography,” in Communications in Computer and Information Science, 2017.

AMS Rahma, SM Kadhem, AK Farhan,”Finding the Relevance Degree between an English Text and its Title”, Engineering and Technology Journal 30 (9), 1625-1640

A. T. Sadiq, A. K. Farhan, and S. A. Hassan, “A proposal to improve RC4 algorithm based on hybrid chaotic maps,” J. Adv. Comput. Sci. Technol. Res., vol. 6, no. 4, pp. 74–81, 2016.Alaa kadhim Farhan .Ekhlas K. Gbashi, Al-Qadisiyah Journal of Pure Science 26, 2(2021) pp. Comp. 1–14 13

A. Kadhim F. and H. Emad M., “Mouse Movement with 3D Chaotic Logistic Maps to Generate Random Numbers,” Diyala J. Pure Sci., vol. 13, no. 3, pp. 24–39, 2017.

A. K. Farhan, N. M. G. Al-Saidi, A. T. Maolood, F. Nazarimehr, and I. Hussain, “Entropy analysis and image encryption application based on a new chaotic system crossing a cylinder,” Entropy, vol. 21, no. 10, pp. 1–14, 2019.

D. Boneh, C. Dunworth, and R. Lipton, “Breaking DES using a molecular computer,” 1996. [12] Ekhlas K. Gbashi “Text Compression & Encryption Method Based on RNA and MTF”, Journal of science(IJS),university of Baghdad,VOL 58,ISSUE (2C),2017.

Farhan AK, Ali MA. “Database protection system depend on modified hash function. In Conference of Cihan University-Erbil on Communication Engineering and Computer Science 2017 Mar 29 (p. 84).

F. A. Kadhim and H. I. Mhaibes, “Quantum Random Bits Generator based on Phase Noise of Laser,” J. Eng. Appl. Sci., vol. 13, no. 3, pp. 629–633, 2018.

F. A. Kadhim, G. H. A. A. Majeed, and R. S. Ali, “Proposal new s-box depending on DNA computing and mathematical operations,” in 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA), 2016, pp. 1–6.

G. C. Le Goff, L. J. Blum, and C. A. Marquette, “Shrinking hydrogel-DNA spots generates 3D microdots arrays,” Macromol. Biosci., 2013.

H. Rathod, M. S. Sisodia, and S. K. Sharma, “Design and Implementation of Image Encryption Algorithm by using Block Based Symmetric Transformation Algorithm ( Hyper Image Encryption Algorithm ),” vol. 1, no. 3, pp. 7–13.

H. Natiq, N. M. G. Al-Saidi, M. R. M. Said, and A. Kilicman, “A new hyper chaotic map and its application for image encryption,” Eur. Phys. J. Plus, 2018.

H. Natiq, M. R. M. Said, N. M. G. Al-Saidi, and A. Kilicman, “Dynamics and complexity of a new 4D chaotic laser system,” Entropy, 2019.

H. Natiq, S. Banerjee, M. R. K. Ariffin, and M. R. M. Said, “Can hyper chaotic maps with high complexity produce multistability?,” Chaos, 2019.14 Alaa kadhim Farhan .Ekhlas K. Gbashi, Al-Qadisiyah Journal of Pure Science 26, 2(2021) pp. Comp. 1–14

K. Menaka, “Message encryption using DNA sequences,” in Proceedings - 2014 World Congress on Computing and Communication Technologies, WCCCT 2014, 2014.

M. Y. Rhee, Internet security: cryptographic principles, algorithms, and protocols. 2003.

N. K Pareek, “Design and Analysis of a Novel Digital Image Encryption Scheme,” Int. J. Netw. Secur. It’s Appl., vol. 4, no. 2, pp. 95–108, 2012.

R. A. Mollin, An introduction to cryptography, second edition. 2006.

R. Pakshwar, V. Trivedi, and V. Richhariya, “A survey on different image encryption and decryption techniques,” Int. J. Comput. Sci. Inf. Technol., vol. 4, no. 1, pp. 113–116, 2013.

W. Cao, Y. Mao, and Y. Zhou, “Designing a 2D infinite collapse map for image encryption,” Signal Processing, 2020

Published
2021-02-19
How to Cite
K. Gbashi, E., & Alaa kadhim Farhan. (2021). Chaotic System and DNA Computing operations for Image Encryption Based on Pixels Shuffling. Al-Qadisiyah Journal of Pure Science, 26(2), Comp. 1-. https://doi.org/10.29350/qjps.2021.26.2.1265
Section
Computer