A novel DNA tree-based chaotic image encryption algorithm
For confidential transmission of information over open channels, image encryption algorithms offer a vital method to safeguard content. Traditional ciphers often prove inefficient for large, correlated content like digital images. To address this, DNA and digital chaos are utilized in the creation o...
Uložené v:
| Vydané v: | Journal of information security and applications Ročník 83; s. 103791 |
|---|---|
| Hlavný autor: | |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Elsevier Ltd
01.06.2024
|
| Predmet: | |
| ISSN: | 2214-2126 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | For confidential transmission of information over open channels, image encryption algorithms offer a vital method to safeguard content. Traditional ciphers often prove inefficient for large, correlated content like digital images. To address this, DNA and digital chaos are utilized in the creation of numerous image ciphers. Most DNA chaotic image ciphers utilize DNA bases for substitution and chaotic maps for permutation operations. This paper introduces a novel approach wherein the secret key is generated by a DNA tree, providing complete control over all components of the image cipher. A new chaotic state machine map (CSMM) is proposed, incorporating a finite state machine and a one-dimensional (1D) perturbed logistic chaotic map controlled by a DNA state transition table. The CSMM enhances security while maintaining efficient implementation. The DNA tree is employed to generate a DNA table consisting of 256 values representing DNA bases. This table is used to convert digital images into DNA bases and chaotic points into DNA bases. Chaotic DNA bases facilitate permutation operations, while the DNA table is utilized to generate a DNA S-box for substitution operations. The encryption process involves two rounds of permutations and substitutions, coupled with XOR operations, using all DNA bases in the digital image. The resulting cipher effectively encrypts digital images of various sizes and types. Experimental results demonstrate that the proposed cipher generates noise-like images and withstands rigorous security tests, including differential attack analysis and entropy measurements, all accomplished in a short amount of time. |
|---|---|
| AbstractList | For confidential transmission of information over open channels, image encryption algorithms offer a vital method to safeguard content. Traditional ciphers often prove inefficient for large, correlated content like digital images. To address this, DNA and digital chaos are utilized in the creation of numerous image ciphers. Most DNA chaotic image ciphers utilize DNA bases for substitution and chaotic maps for permutation operations. This paper introduces a novel approach wherein the secret key is generated by a DNA tree, providing complete control over all components of the image cipher. A new chaotic state machine map (CSMM) is proposed, incorporating a finite state machine and a one-dimensional (1D) perturbed logistic chaotic map controlled by a DNA state transition table. The CSMM enhances security while maintaining efficient implementation. The DNA tree is employed to generate a DNA table consisting of 256 values representing DNA bases. This table is used to convert digital images into DNA bases and chaotic points into DNA bases. Chaotic DNA bases facilitate permutation operations, while the DNA table is utilized to generate a DNA S-box for substitution operations. The encryption process involves two rounds of permutations and substitutions, coupled with XOR operations, using all DNA bases in the digital image. The resulting cipher effectively encrypts digital images of various sizes and types. Experimental results demonstrate that the proposed cipher generates noise-like images and withstands rigorous security tests, including differential attack analysis and entropy measurements, all accomplished in a short amount of time. |
| ArticleNumber | 103791 |
| Author | Alawida, Moatsum |
| Author_xml | – sequence: 1 givenname: Moatsum orcidid: 0000-0001-8146-5843 surname: Alawida fullname: Alawida, Moatsum email: moatsum.alawida@adu.ac.ae organization: Department of Computer Sciences, Abu Dhabi University, Abu Dhabi 59911, United Arab Emirates |
| BookMark | eNp9kMtqwzAQRbVIoWmaH-hKP-BUGkd2BN2E9Amh3bRrocc4kXGsIIlA_r426aqLrC5cOMOce0cmfeiRkAfOFpzx6rFdtD7pBTBYDkVZSz4hUwC-LIBDdUvmKbWMMQ5cCiinRK5pH07Y0efPNc0RsTA6oaN2r0P2lvqD3iHF3sbzMfvQU93tQvR5f7gnN43uEs7_ckZ-Xl--N-_F9uvtY7PeFhZKlgvjuHSiMgYNArdVWbGlGxprhKyhKVdaOCuYaaCpK-OEY7p2rAQjtZAr3ZQzApe7NoaUIjbqGIev4llxpkZn1arRWY3O6uI8QKt_kPVZjwI5at9dR58uKA5SJ49RJeuHAdD5iDYrF_w1_Be0THYL |
| CitedBy_id | crossref_primary_10_1007_s42044_025_00303_2 crossref_primary_10_1007_s44443_025_00108_0 crossref_primary_10_1088_1402_4896_ad7bf5 crossref_primary_10_1007_s00530_024_01449_y crossref_primary_10_1007_s13042_025_02660_7 crossref_primary_10_1117_1_JEI_34_1_013048 crossref_primary_10_1109_ACCESS_2024_3446836 crossref_primary_10_1007_s11128_025_04929_w crossref_primary_10_1007_s11760_025_04739_8 crossref_primary_10_1007_s12524_025_02226_8 crossref_primary_10_1007_s11071_025_11582_6 crossref_primary_10_1088_1402_4896_adab99 |
| Cites_doi | 10.1016/j.jfranklin.2023.10.010 10.1016/j.compeleceng.2022.108426 10.1016/j.ins.2022.11.104 10.1016/j.chaos.2023.114396 10.1109/TCSVT.2023.3237136 10.1007/s11071-019-05311-z 10.1016/j.sigpro.2019.06.013 10.1145/3570165 10.1016/j.image.2021.116246 10.1016/j.eswa.2023.122899 10.1007/s00371-020-01791-y 10.1016/j.ins.2023.02.057 10.1016/j.ins.2016.01.017 10.1002/j.1538-7305.1948.tb01338.x 10.1016/j.sigpro.2018.03.010 10.3390/drones7010038 10.1016/j.ijleo.2021.168416 10.1016/j.ijleo.2023.171253 10.1109/TII.2022.3194590 10.1007/s11128-017-1612-0 10.1016/j.sigpro.2019.02.016 10.1007/s11071-023-09010-8 10.1016/j.ins.2021.12.126 10.1016/j.ins.2022.05.032 10.1016/j.ins.2020.10.048 10.1016/j.ins.2020.03.054 10.1016/j.optlaseng.2018.11.017 |
| ContentType | Journal Article |
| Copyright | 2024 Elsevier Ltd |
| Copyright_xml | – notice: 2024 Elsevier Ltd |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.jisa.2024.103791 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| ExternalDocumentID | 10_1016_j_jisa_2024_103791 S2214212624000942 |
| GroupedDBID | --M .~1 1~. 4.4 457 4G. 5VS 7-5 8P~ AACTN AAEDT AAEDW AAFJI AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABBOA ABMAC ABXDB ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE AEBSH AEKER AFKWA AFTJW AGHFR AGUBO AIALX AIEXJ AIKHN AITUG AJOXV AKRWK ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOMHK AOUOD AVARZ AXJTR BKOJK BLXMC EBS EFJIC EJD FDB FIRID FNPLU FYGXN GBLVA GBOLZ KOM M41 MO0 OAUVE P-8 P-9 PC. PRBVW RIG ROL SPC SPCBC SSB SSO SSV SSZ T5K ~G- AATTM AAXKI AAYWO AAYXX ACLOT ACVFH ADCNI AEIPS AEUPX AFJKZ AFPUW AIGII AIIUN AKBMS AKYEP ANKPU APXCP CITATION EFKBS EFLBG |
| ID | FETCH-LOGICAL-c230t-bd19d56bbebe21c63604d9d5cb5972f38a5dc50bf2f76bd5d0a7d032b9a598af3 |
| ISICitedReferencesCount | 36 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001246928100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2214-2126 |
| IngestDate | Tue Nov 18 21:04:16 EST 2025 Sat Nov 29 04:06:28 EST 2025 Sat Jul 13 15:31:39 EDT 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Chaotic cipher Logistic chaotic map Image encryption Chaotic map DNA bases |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c230t-bd19d56bbebe21c63604d9d5cb5972f38a5dc50bf2f76bd5d0a7d032b9a598af3 |
| ORCID | 0000-0001-8146-5843 |
| ParticipantIDs | crossref_primary_10_1016_j_jisa_2024_103791 crossref_citationtrail_10_1016_j_jisa_2024_103791 elsevier_sciencedirect_doi_10_1016_j_jisa_2024_103791 |
| PublicationCentury | 2000 |
| PublicationDate | June 2024 2024-06-00 |
| PublicationDateYYYYMMDD | 2024-06-01 |
| PublicationDate_xml | – month: 06 year: 2024 text: June 2024 |
| PublicationDecade | 2020 |
| PublicationTitle | Journal of information security and applications |
| PublicationYear | 2024 |
| Publisher | Elsevier Ltd |
| Publisher_xml | – name: Elsevier Ltd |
| References | Zhang, Zhang (b1) 2023; 111 Alawida, Teh, Samsudin, Alshoura (b19) 2019; 164 Alawida, Samsudin, Teh, Alshoura (b28) 2019; 98 Zhou, Wang, Zhang (b37) 2023; 621 Lone, Mir, Gaffar (b21) 2023; 360 Namasudra (b23) 2022; 104 Enayatifar, Guimarães, Siarry (b26) 2019; 115 Alawida, Teh, Mehmood, Shoufan (b3) 2022; 34 Erkan, Toktas, Toktas, Alenezi (b35) 2022; 589 Bezerra, de Almeida Camargo, Molter (b9) 2021; 151 Alawida (b33) 2023; 35 Ahmed, Rehman, Ahmad, Khan, Boulila, Srivastava, Lin, Buchanan (b24) 2023; 19 Alawida (b27) 2023; 35 Alawida, Teh, Alshoura (b2) 2023; 7 Darani, Yengejeh, Pakmanesh, Navarro (b14) 2024; 179 Talhaoui, Wang (b20) 2021; 550 Yuan, Huang, Huang, Du, Cai, Xiong (b8) 2023; 78 Wu, Zhang, Berretti, Wan (b17) 2022; 19 Azam, Zhu, Hayat, Shurbevski (b34) 2023; 631 Alawida (b16) 2024; 80 An, Liu, Xiong, Zhang, Li (b15) 2024; 243 Mansouri, Wang (b13) 2021; 37 Alawida, Samsudin, Teh, S.Alkhawaldeh (b31) July 2019; 160 Wang, Su (b7) 2021; 95 Shannon (b18) 1948; 27 . Hua, Zhou (b30) 2016; 339 Teng, Wang, Xian (b36) 2022; 605 Rahul, Kuppusamy, Senthilrajan (b5) 2023; 289 Masood, Masood, Zhang, Jamal, Boulila, Rehman, Khan, Ahmad (b10) 2021 Muthu, Murali (b12) 2022; 251 The USC-SIPI image database Wang, Zhang, Zhao (b25) 2023 Abba, Teh, Alawida (b4) 2024 Zhang, Xu, Zhao (b11) 2023 Zhou, Hu, Gong, Li (b6) 2017; 16 Zhang, Chen, Tang, Dang, Wang (b22) 2020; 526 Hua, Jin, Xu, Huang (b32) 2018; 149 Gao, Wu, Wang, Liu, Li, Wang, Tang (b38) 2023 10.1016/j.jisa.2024.103791_b29 Hua (10.1016/j.jisa.2024.103791_b32) 2018; 149 Abba (10.1016/j.jisa.2024.103791_b4) 2024 Shannon (10.1016/j.jisa.2024.103791_b18) 1948; 27 Alawida (10.1016/j.jisa.2024.103791_b31) 2019; 160 Hua (10.1016/j.jisa.2024.103791_b30) 2016; 339 Masood (10.1016/j.jisa.2024.103791_b10) 2021 Alawida (10.1016/j.jisa.2024.103791_b28) 2019; 98 Wang (10.1016/j.jisa.2024.103791_b7) 2021; 95 Alawida (10.1016/j.jisa.2024.103791_b2) 2023; 7 Zhang (10.1016/j.jisa.2024.103791_b22) 2020; 526 Zhou (10.1016/j.jisa.2024.103791_b37) 2023; 621 Namasudra (10.1016/j.jisa.2024.103791_b23) 2022; 104 Enayatifar (10.1016/j.jisa.2024.103791_b26) 2019; 115 Alawida (10.1016/j.jisa.2024.103791_b3) 2022; 34 Gao (10.1016/j.jisa.2024.103791_b38) 2023 Yuan (10.1016/j.jisa.2024.103791_b8) 2023; 78 Teng (10.1016/j.jisa.2024.103791_b36) 2022; 605 Wang (10.1016/j.jisa.2024.103791_b25) 2023 Wu (10.1016/j.jisa.2024.103791_b17) 2022; 19 Erkan (10.1016/j.jisa.2024.103791_b35) 2022; 589 Zhou (10.1016/j.jisa.2024.103791_b6) 2017; 16 Rahul (10.1016/j.jisa.2024.103791_b5) 2023; 289 Alawida (10.1016/j.jisa.2024.103791_b19) 2019; 164 Zhang (10.1016/j.jisa.2024.103791_b1) 2023; 111 Azam (10.1016/j.jisa.2024.103791_b34) 2023; 631 Talhaoui (10.1016/j.jisa.2024.103791_b20) 2021; 550 Mansouri (10.1016/j.jisa.2024.103791_b13) 2021; 37 Alawida (10.1016/j.jisa.2024.103791_b27) 2023; 35 Bezerra (10.1016/j.jisa.2024.103791_b9) 2021; 151 Alawida (10.1016/j.jisa.2024.103791_b16) 2024; 80 Muthu (10.1016/j.jisa.2024.103791_b12) 2022; 251 An (10.1016/j.jisa.2024.103791_b15) 2024; 243 Darani (10.1016/j.jisa.2024.103791_b14) 2024; 179 Lone (10.1016/j.jisa.2024.103791_b21) 2023; 360 Alawida (10.1016/j.jisa.2024.103791_b33) 2023; 35 Zhang (10.1016/j.jisa.2024.103791_b11) 2023 Ahmed (10.1016/j.jisa.2024.103791_b24) 2023; 19 |
| References_xml | – volume: 151 year: 2021 ident: b9 article-title: A new efficient permutation-diffusion encryption algorithm based on a chaotic map publication-title: Chaos Solitons Fractals – volume: 104 year: 2022 ident: b23 article-title: A secure cryptosystem using DNA cryptography and DNA steganography for the cloud-based IoT infrastructure publication-title: Comput Electr Eng – volume: 115 start-page: 131 year: 2019 end-page: 140 ident: b26 article-title: Index-based permutation-diffusion in multiple-image encryption using DNA sequence publication-title: Opt Lasers Eng – volume: 631 start-page: 164 year: 2023 end-page: 184 ident: b34 article-title: Towards provably secure asymmetric image encryption schemes publication-title: Inform Sci – volume: 589 start-page: 770 year: 2022 end-page: 789 ident: b35 article-title: 2D e publication-title: Inform Sci – volume: 34 start-page: 8136 year: 2022 end-page: 8151 ident: b3 article-title: A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations publication-title: J King Saud Univ-Comput Inf Sci – start-page: 1 year: 2023 end-page: 27 ident: b25 article-title: Color image encryption algorithm based on novel 2D hyper-chaotic system and DNA crossover and mutation publication-title: Nonlinear Dynam – volume: 111 start-page: 22645 year: 2023 end-page: 22678 ident: b1 article-title: Image encryption algorithm based on the Matryoshka transform and modular-inverse matrix publication-title: Nonlinear Dynam – volume: 16 year: 2017 ident: b6 article-title: Quantum image encryption scheme with iterative generalized Arnold transforms and quantum image cycle shift operations publication-title: Quantum Inf Process – volume: 95 year: 2021 ident: b7 article-title: Image encryption based on compressed sensing and DNA encoding publication-title: Signal Process, Image Commun – volume: 19 start-page: 1 year: 2023 end-page: 21 ident: b24 article-title: A DNA based colour image encryption scheme using a convolutional autoencoder publication-title: ACM Trans Multimed Comput Commun Appl – volume: 526 start-page: 180 year: 2020 end-page: 202 ident: b22 article-title: Plaintext-related image encryption algorithm based on perceptron-like network publication-title: Inform Sci – volume: 80 year: 2024 ident: b16 article-title: Enhancing logistic chaotic map for improved cryptographic security in random number generation publication-title: J Inf Secur Appl – volume: 19 start-page: 2089 year: 2022 end-page: 2098 ident: b17 article-title: Medical image encryption by content-aware dna computing for secure healthcare publication-title: IEEE Trans Ind Inf – volume: 78 year: 2023 ident: b8 article-title: Safe-LBP: A visually meaningful image encryption scheme based on LBP and compressive sensing publication-title: J Inf Secur Appl – start-page: 1 year: 2024 end-page: 20 ident: b4 article-title: Towards accurate keyspace analysis of chaos-based image ciphers publication-title: Multimedia Tools Appl – volume: 339 start-page: 237 year: 2016 end-page: 253 ident: b30 article-title: Image encryption using 2D Logistic-adjusted-Sine map publication-title: Inform Sci – volume: 605 start-page: 71 year: 2022 end-page: 85 ident: b36 article-title: Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion publication-title: Inform Sci – volume: 35 year: 2023 ident: b33 article-title: A novel chaos-based permutation for image encryption publication-title: J King Saud Univ-Comput Inf Sci – year: 2023 ident: b11 article-title: DNA image encryption algorithm based on serrated spiral scrambling and cross bit plane publication-title: J King Saud Univ-Comput Inf Sci – volume: 27 start-page: 379 year: 1948 end-page: 423 ident: b18 article-title: A mathematical theory of communication publication-title: Bell Syst Tech J – volume: 160 start-page: 45 year: July 2019 end-page: 58 ident: b31 article-title: A new hybrid digital chaotic system with applications in image encryption publication-title: Signal Process – year: 2023 ident: b38 article-title: Asynchronous updating Boolean network encryption algorithm publication-title: IEEE Trans Circuits Syst Video Technol – volume: 621 start-page: 782 year: 2023 end-page: 798 ident: b37 article-title: Novel image encryption scheme based on chaotic signals with finite-precision error publication-title: Inform Sci – volume: 550 start-page: 13 year: 2021 end-page: 26 ident: b20 article-title: A new fractional one dimensional chaotic map and its application in high-speed image encryption publication-title: Inform Sci – start-page: 1 year: 2021 end-page: 17 ident: b10 article-title: A new color image encryption technique using DNA computing and Chaos-based substitution box publication-title: Soft Comput – volume: 251 year: 2022 ident: b12 article-title: A novel DICOM image encryption with JSMP map publication-title: Optik – volume: 149 start-page: 148 year: 2018 end-page: 161 ident: b32 article-title: 2D logistic-Sine-coupling map for image encryption publication-title: Signal Process – volume: 179 year: 2024 ident: b14 article-title: Image encryption algorithm based on a new 3D chaotic system using cellular automata publication-title: Chaos Solitons Fractals – volume: 164 start-page: 249 year: 2019 end-page: 266 ident: b19 article-title: An image encryption scheme based on hybridizing digital chaos and finite state machine publication-title: Signal Process – reference: . – reference: The USC-SIPI image database, – volume: 360 start-page: 13318 year: 2023 end-page: 13338 ident: b21 article-title: Hyperchaotic image encryption using DNA coding and discrete cosine transform publication-title: J Franklin Inst – volume: 35 year: 2023 ident: b27 article-title: A novel chaos-based permutation for image encryption publication-title: J King Saud Univ - Comput Inf Sci – volume: 98 start-page: 2403 year: 2019 end-page: 2421 ident: b28 article-title: Deterministic chaotic finite-state automata publication-title: Nonlinear Dynam – volume: 7 year: 2023 ident: b2 article-title: A new image encryption algorithm based on DNA state machine for UAV data encryption publication-title: Drones – volume: 37 start-page: 189 year: 2021 end-page: 200 ident: b13 article-title: Image encryption using shuffled arnold map and multiple values manipulations publication-title: Vis Comput – volume: 289 year: 2023 ident: b5 article-title: Dynamic DNA cryptography-based image encryption scheme using multiple chaotic maps and SHA-256 hash function publication-title: Optik – volume: 243 year: 2024 ident: b15 article-title: Mixed gray-color images encryption algorithm based on a memristor chaotic system and 2D compression sensing publication-title: Expert Syst Appl – volume: 35 issue: 6 year: 2023 ident: 10.1016/j.jisa.2024.103791_b33 article-title: A novel chaos-based permutation for image encryption publication-title: J King Saud Univ-Comput Inf Sci – volume: 360 start-page: 13318 issue: 17 year: 2023 ident: 10.1016/j.jisa.2024.103791_b21 article-title: Hyperchaotic image encryption using DNA coding and discrete cosine transform publication-title: J Franklin Inst doi: 10.1016/j.jfranklin.2023.10.010 – volume: 104 year: 2022 ident: 10.1016/j.jisa.2024.103791_b23 article-title: A secure cryptosystem using DNA cryptography and DNA steganography for the cloud-based IoT infrastructure publication-title: Comput Electr Eng doi: 10.1016/j.compeleceng.2022.108426 – volume: 621 start-page: 782 year: 2023 ident: 10.1016/j.jisa.2024.103791_b37 article-title: Novel image encryption scheme based on chaotic signals with finite-precision error publication-title: Inform Sci doi: 10.1016/j.ins.2022.11.104 – volume: 179 year: 2024 ident: 10.1016/j.jisa.2024.103791_b14 article-title: Image encryption algorithm based on a new 3D chaotic system using cellular automata publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2023.114396 – year: 2023 ident: 10.1016/j.jisa.2024.103791_b38 article-title: Asynchronous updating Boolean network encryption algorithm publication-title: IEEE Trans Circuits Syst Video Technol doi: 10.1109/TCSVT.2023.3237136 – volume: 98 start-page: 2403 issue: 3 year: 2019 ident: 10.1016/j.jisa.2024.103791_b28 article-title: Deterministic chaotic finite-state automata publication-title: Nonlinear Dynam doi: 10.1007/s11071-019-05311-z – volume: 164 start-page: 249 year: 2019 ident: 10.1016/j.jisa.2024.103791_b19 article-title: An image encryption scheme based on hybridizing digital chaos and finite state machine publication-title: Signal Process doi: 10.1016/j.sigpro.2019.06.013 – volume: 19 start-page: 1 issue: 3s year: 2023 ident: 10.1016/j.jisa.2024.103791_b24 article-title: A DNA based colour image encryption scheme using a convolutional autoencoder publication-title: ACM Trans Multimed Comput Commun Appl doi: 10.1145/3570165 – volume: 95 year: 2021 ident: 10.1016/j.jisa.2024.103791_b7 article-title: Image encryption based on compressed sensing and DNA encoding publication-title: Signal Process, Image Commun doi: 10.1016/j.image.2021.116246 – year: 2023 ident: 10.1016/j.jisa.2024.103791_b11 article-title: DNA image encryption algorithm based on serrated spiral scrambling and cross bit plane publication-title: J King Saud Univ-Comput Inf Sci – volume: 243 year: 2024 ident: 10.1016/j.jisa.2024.103791_b15 article-title: Mixed gray-color images encryption algorithm based on a memristor chaotic system and 2D compression sensing publication-title: Expert Syst Appl doi: 10.1016/j.eswa.2023.122899 – volume: 151 year: 2021 ident: 10.1016/j.jisa.2024.103791_b9 article-title: A new efficient permutation-diffusion encryption algorithm based on a chaotic map publication-title: Chaos Solitons Fractals – volume: 37 start-page: 189 issue: 1 year: 2021 ident: 10.1016/j.jisa.2024.103791_b13 article-title: Image encryption using shuffled arnold map and multiple values manipulations publication-title: Vis Comput doi: 10.1007/s00371-020-01791-y – volume: 631 start-page: 164 year: 2023 ident: 10.1016/j.jisa.2024.103791_b34 article-title: Towards provably secure asymmetric image encryption schemes publication-title: Inform Sci doi: 10.1016/j.ins.2023.02.057 – start-page: 1 year: 2023 ident: 10.1016/j.jisa.2024.103791_b25 article-title: Color image encryption algorithm based on novel 2D hyper-chaotic system and DNA crossover and mutation publication-title: Nonlinear Dynam – volume: 339 start-page: 237 year: 2016 ident: 10.1016/j.jisa.2024.103791_b30 article-title: Image encryption using 2D Logistic-adjusted-Sine map publication-title: Inform Sci doi: 10.1016/j.ins.2016.01.017 – ident: 10.1016/j.jisa.2024.103791_b29 – volume: 35 issue: 6 year: 2023 ident: 10.1016/j.jisa.2024.103791_b27 article-title: A novel chaos-based permutation for image encryption publication-title: J King Saud Univ - Comput Inf Sci – volume: 80 year: 2024 ident: 10.1016/j.jisa.2024.103791_b16 article-title: Enhancing logistic chaotic map for improved cryptographic security in random number generation publication-title: J Inf Secur Appl – volume: 27 start-page: 379 issue: 3 year: 1948 ident: 10.1016/j.jisa.2024.103791_b18 article-title: A mathematical theory of communication publication-title: Bell Syst Tech J doi: 10.1002/j.1538-7305.1948.tb01338.x – volume: 149 start-page: 148 year: 2018 ident: 10.1016/j.jisa.2024.103791_b32 article-title: 2D logistic-Sine-coupling map for image encryption publication-title: Signal Process doi: 10.1016/j.sigpro.2018.03.010 – volume: 7 issue: 1 year: 2023 ident: 10.1016/j.jisa.2024.103791_b2 article-title: A new image encryption algorithm based on DNA state machine for UAV data encryption publication-title: Drones doi: 10.3390/drones7010038 – volume: 251 year: 2022 ident: 10.1016/j.jisa.2024.103791_b12 article-title: A novel DICOM image encryption with JSMP map publication-title: Optik doi: 10.1016/j.ijleo.2021.168416 – volume: 289 year: 2023 ident: 10.1016/j.jisa.2024.103791_b5 article-title: Dynamic DNA cryptography-based image encryption scheme using multiple chaotic maps and SHA-256 hash function publication-title: Optik doi: 10.1016/j.ijleo.2023.171253 – volume: 78 year: 2023 ident: 10.1016/j.jisa.2024.103791_b8 article-title: Safe-LBP: A visually meaningful image encryption scheme based on LBP and compressive sensing publication-title: J Inf Secur Appl – volume: 19 start-page: 2089 issue: 2 year: 2022 ident: 10.1016/j.jisa.2024.103791_b17 article-title: Medical image encryption by content-aware dna computing for secure healthcare publication-title: IEEE Trans Ind Inf doi: 10.1109/TII.2022.3194590 – start-page: 1 year: 2024 ident: 10.1016/j.jisa.2024.103791_b4 article-title: Towards accurate keyspace analysis of chaos-based image ciphers publication-title: Multimedia Tools Appl – start-page: 1 year: 2021 ident: 10.1016/j.jisa.2024.103791_b10 article-title: A new color image encryption technique using DNA computing and Chaos-based substitution box publication-title: Soft Comput – volume: 16 issue: 6 year: 2017 ident: 10.1016/j.jisa.2024.103791_b6 article-title: Quantum image encryption scheme with iterative generalized Arnold transforms and quantum image cycle shift operations publication-title: Quantum Inf Process doi: 10.1007/s11128-017-1612-0 – volume: 160 start-page: 45 year: 2019 ident: 10.1016/j.jisa.2024.103791_b31 article-title: A new hybrid digital chaotic system with applications in image encryption publication-title: Signal Process doi: 10.1016/j.sigpro.2019.02.016 – volume: 111 start-page: 22645 issue: 24 year: 2023 ident: 10.1016/j.jisa.2024.103791_b1 article-title: Image encryption algorithm based on the Matryoshka transform and modular-inverse matrix publication-title: Nonlinear Dynam doi: 10.1007/s11071-023-09010-8 – volume: 589 start-page: 770 year: 2022 ident: 10.1016/j.jisa.2024.103791_b35 article-title: 2D eπ-map for image encryption publication-title: Inform Sci doi: 10.1016/j.ins.2021.12.126 – volume: 605 start-page: 71 year: 2022 ident: 10.1016/j.jisa.2024.103791_b36 article-title: Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion publication-title: Inform Sci doi: 10.1016/j.ins.2022.05.032 – volume: 34 start-page: 8136 issue: 10 year: 2022 ident: 10.1016/j.jisa.2024.103791_b3 article-title: A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations publication-title: J King Saud Univ-Comput Inf Sci – volume: 550 start-page: 13 year: 2021 ident: 10.1016/j.jisa.2024.103791_b20 article-title: A new fractional one dimensional chaotic map and its application in high-speed image encryption publication-title: Inform Sci doi: 10.1016/j.ins.2020.10.048 – volume: 526 start-page: 180 year: 2020 ident: 10.1016/j.jisa.2024.103791_b22 article-title: Plaintext-related image encryption algorithm based on perceptron-like network publication-title: Inform Sci doi: 10.1016/j.ins.2020.03.054 – volume: 115 start-page: 131 year: 2019 ident: 10.1016/j.jisa.2024.103791_b26 article-title: Index-based permutation-diffusion in multiple-image encryption using DNA sequence publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2018.11.017 |
| SSID | ssj0001219523 |
| Score | 2.4744096 |
| Snippet | For confidential transmission of information over open channels, image encryption algorithms offer a vital method to safeguard content. Traditional ciphers... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 103791 |
| SubjectTerms | Chaotic cipher Chaotic map DNA bases Image encryption Logistic chaotic map |
| Title | A novel DNA tree-based chaotic image encryption algorithm |
| URI | https://dx.doi.org/10.1016/j.jisa.2024.103791 |
| Volume | 83 |
| WOSCitedRecordID | wos001246928100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 issn: 2214-2126 databaseCode: AIEXJ dateStart: 20130701 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: false ssIdentifier: ssj0001219523 providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3PS-QwFA4yetiLru6K7g_JwZt0adOmaY5FFFd0EHRhbqVpknWGmVZmuur-9740aTvorqjgJZSQpOV9yctL-t77ENpnSawjzbnHQhZ6kYJC8LjwNBW6YELkoW6QPmPDYTIa8QtHgrdo6ARYWSb39_zmXaGGOgDbhM6-Au5uUKiAZwAdSoAdyhcBnx6U1a0CZTZMjRu58sxGJU2Eb2WSs45nxksHPnj-12qLfPq7mo_r69l_7FSXWrVpu3BsdzbF69K_727eTPO7sWwM0vMqrxcu0YO7ViBR7_5k77raeJfeuQhUEiFB5MFmFy_rT0tE80QV21uByY-J-Slv3tDE91tqrkcpri_NuGZY49AK503YUlcJozwZoNX059HodOnWLOC04ezrPsVFQlmnvccv-7e1sWRBXH1E606kOLWQbaIVVW6hjZZWAzst-wnxFDcIYkAQ9whihyBuEMQ9grhD8DP6dXx0dXjiOYYLr4CjX-0JGXBJYyFgKZGgMLnbIgk1hYBzHtFhklNZUF9oolksJJV-zqQfEsFzkE6uw200KKtS7SAsWCCIH2k4oMaRD10VD0RMuUpUBOsx2EVBK4mscOnfDQvJNGv9_CaZkV5mpJdZ6e2ig67PjU1-8mxr2go4c-abNcsymBLP9Pvyxn5f0Yd-4n5Dg3r-R31Ha8VtPV7M99zMeQAJV2lP |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+novel+DNA+tree-based+chaotic+image+encryption+algorithm&rft.jtitle=Journal+of+information+security+and+applications&rft.au=Alawida%2C+Moatsum&rft.date=2024-06-01&rft.pub=Elsevier+Ltd&rft.issn=2214-2126&rft.volume=83&rft_id=info:doi/10.1016%2Fj.jisa.2024.103791&rft.externalDocID=S2214212624000942 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2214-2126&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2214-2126&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2214-2126&client=summon |