A Universal Image Compression Sensing–Encryption Algorithm Based on DNA-Triploid Mutation

With the fast growth of information technology (IT), the safety of image transmission and the storing of images are becoming increasingly important. Traditional image encryption algorithms have certain limitations in transmission and security, so there is an urgent need for a secure and reliable ima...

Full description

Saved in:
Bibliographic Details
Published in:Mathematics (Basel) Vol. 12; no. 13; p. 1990
Main Authors: Cao, Yinghong, Tan, Linlin, Xu, Xianying, Li, Bo
Format: Journal Article
Language:English
Published: Basel MDPI AG 01.07.2024
Subjects:
ISSN:2227-7390, 2227-7390
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:With the fast growth of information technology (IT), the safety of image transmission and the storing of images are becoming increasingly important. Traditional image encryption algorithms have certain limitations in transmission and security, so there is an urgent need for a secure and reliable image encryption algorithm. A universal compression sensing (CS) image encryption (IE) algorithm based on DNA-triploid mutation (DTM) is presented in this paper. Firstly, by using the CS algorithm, an image is compressed while obtaining a range of chaotic sequences by iteration of a chaotic map. Then, DNA sequences are generated by encoding the image and, based on the DTM, new mutant DNA sequences are generated according to specific rules. Next, the chaotic sequences are operated at the DNA level to perform confusion and diffusion operations on the image to ensure the security of the data. Finally, DNA decoding is carried out to obtain the compressed encrypted image. The simulation results show that the algorithm can effectively complete encryption and decryption of images. The performance test results show that the algorithm has a sufficiently large key space of 10587. The information entropy of the cipher image is close to 8. In summary, both simulation experiments and performance tests fully show that a high level of security and reliability for the proposed algorithm in protecting image privacy is achieved.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2227-7390
2227-7390
DOI:10.3390/math12131990