Image Encryption System Based On Chaotic System And DNA Computing

The misuse and arbitrary tampering of digital images by third parties pose a threat to the security and privacy of human subjects, requiring the development of good encryption techniques to meet the security needs of digital images. In this paper, we focus on the image encryption algorithm based on...

Full description

Saved in:
Bibliographic Details
Published in:2021 2nd International Conference on Computer Engineering and Intelligent Control (ICCEIC) pp. 103 - 106
Main Authors: Li, Yunyi, Xu, Jiangfeng
Format: Conference Proceeding
Language:English
Published: IEEE 01.11.2021
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The misuse and arbitrary tampering of digital images by third parties pose a threat to the security and privacy of human subjects, requiring the development of good encryption techniques to meet the security needs of digital images. In this paper, we focus on the image encryption algorithm based on the combination of hyper chaotic system and DNA operation, which divides the digital image into three two-dimensional matrices by R, G and B channels, encrypts the image in blocks, and the chaotic sequence generated by the chaotic system determines the DNA coding, decoding and operation of each image block in the encryption process. The number of chaotic systems in the algorithm is increased and the encryption process is optimized to address the problems of low key space and inability to resist cropping attacks. The simulation results show that the improved encryption algorithm can resist the exhaustive key attack, the correlation of adjacent elements of the encrypted image is greatly reduced, and the encrypted image is resistant to cropping.
AbstractList The misuse and arbitrary tampering of digital images by third parties pose a threat to the security and privacy of human subjects, requiring the development of good encryption techniques to meet the security needs of digital images. In this paper, we focus on the image encryption algorithm based on the combination of hyper chaotic system and DNA operation, which divides the digital image into three two-dimensional matrices by R, G and B channels, encrypts the image in blocks, and the chaotic sequence generated by the chaotic system determines the DNA coding, decoding and operation of each image block in the encryption process. The number of chaotic systems in the algorithm is increased and the encryption process is optimized to address the problems of low key space and inability to resist cropping attacks. The simulation results show that the improved encryption algorithm can resist the exhaustive key attack, the correlation of adjacent elements of the encrypted image is greatly reduced, and the encrypted image is resistant to cropping.
Author Xu, Jiangfeng
Li, Yunyi
Author_xml – sequence: 1
  givenname: Yunyi
  surname: Li
  fullname: Li, Yunyi
  email: qq315056127@163.com
  organization: Zhengzhou University,School of Information Engineering,Zhengzhou,China
– sequence: 2
  givenname: Jiangfeng
  surname: Xu
  fullname: Xu, Jiangfeng
  email: jfxu@zzu.edu.cn
  organization: Zhengzhou University,School of Information Engineering,Zhengzhou,China
BookMark eNo1jEFOwzAQRY0ECyg9ARLyBRLGY8eJl8EEiFTRBd1Xk2ZSLBEnSsKit6cIWL2vp693Iy7jEFmIewWpUuAeau-r2mcGMU8RUKUAgMWFWLu8UNZm5uwwuxZl3dORZRUP02lcwhDl-2leuJePNHMrt1H6DxqWcPj3ZWzl01sp_dCPX0uIx1tx1dHnzOs_rsTuudr512Szfal9uUmCKVziUANxxk2DmnTTGdUapFzZVhtVMGltARi7Irc_g-h8A2UdcW6MgU6vxN1vNjDzfpxCT9Np76xDUEp_AxRLRcY
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICCEIC54227.2021.00028
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Xplore Digital Library
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781665402125
1665402121
EndPage 106
ExternalDocumentID 9692011
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i489-9230ae5ebb23a3bf41d42a716d3418ea33600e2f876600eaa23a0169ae74440f3
IEDL.DBID RIE
IngestDate Thu Jun 29 18:37:47 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i489-9230ae5ebb23a3bf41d42a716d3418ea33600e2f876600eaa23a0169ae74440f3
PageCount 4
ParticipantIDs ieee_primary_9692011
PublicationCentury 2000
PublicationDate 2021-Nov.
PublicationDateYYYYMMDD 2021-11-01
PublicationDate_xml – month: 11
  year: 2021
  text: 2021-Nov.
PublicationDecade 2020
PublicationTitle 2021 2nd International Conference on Computer Engineering and Intelligent Control (ICCEIC)
PublicationTitleAbbrev ICCEIC
PublicationYear 2021
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.7746387
Snippet The misuse and arbitrary tampering of digital images by third parties pose a threat to the security and privacy of human subjects, requiring the development of...
SourceID ieee
SourceType Publisher
StartPage 103
SubjectTerms chaotic systems
Digital images
DNA
DNA coding and decoding
Image coding
Image color analysis
image encryption
Privacy
Resists
Simulation
Title Image Encryption System Based On Chaotic System And DNA Computing
URI https://ieeexplore.ieee.org/document/9692011
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwIxEG6AePCkBozv9ODRQnfb0u4RV4hckAMHbmS2nY0cXAwCif_etosYEy_emknTZvr6Ztp-M4Tc97m0HhaAGWc5k4lEVoDKmNPccVUoCShjsgk9mZj5PJs2yMOBC4OI8fMZdkMxvuW7ld2Gq7Je1s8CXjVJU-t-zdXak34TnvXGeT4c50qmqfZ-X5p049XRr6wpETRGJ__r7pR0fth3dHrAlTPSwKpNBuM3v_PpsLLrz7jLaR1rnD56GHL0paL5K6z8KviWDypHnyYDWqdt8A11yGw0nOXPbJ_-gC2lyZi3vDigwqJIBYiilImTKXj3xnngMQhCeFsF09IfZ6EA4KuF0CqAWkrJS3FOWtWqwgtCORgAgWVphZIWrfHTxtPSgXaqkNpcknbQfvFeB7hY7BW_-lt8TY7D8NaEvBvS2qy3eEuO7G6z_FjfxVn5ArKyjr0
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED6VggQToBbxxgMjbp3EaZKxhFaNKKFDh27Vxb6IDqSotEj8e-wkFCGxsFkny5af3_nx3Qdw2xNSGVhAHmoluHQk8Qz9iOtAaOFnvkSSpdhEkKbhbBZNGnC35cIQUfn5jDo2Wb7l66Xa2KuybtSLLF7twK5VzqrZWjXt1xFRN4njQRL70nUDc_JznU55efRLN6WEjeHh_yo8gvYP_45NtshyDA0qWtBPXs3aZ4NCrT7Ldc6qaOPs3gCRZs8Fi19waebBt71faPaQ9lkl3GAKasN0OJjGI14LIPCFDCNufC-B5FOWuR56WS4dLV00BxxtoCck9DzjrZCbmw3NJhBNNhtcBSmQUorcO4FmsSzoFJjAENGjPFeeLxWp0AyccHONgfYzGYRn0LKtn79VIS7mdcPP_zbfwP5o-jSej5P08QIObFdX9LxLaK5XG7qCPfWxXryvrssR-gJVIZIG
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2021+2nd+International+Conference+on+Computer+Engineering+and+Intelligent+Control+%28ICCEIC%29&rft.atitle=Image+Encryption+System+Based+On+Chaotic+System+And+DNA+Computing&rft.au=Li%2C+Yunyi&rft.au=Xu%2C+Jiangfeng&rft.date=2021-11-01&rft.pub=IEEE&rft.spage=103&rft.epage=106&rft_id=info:doi/10.1109%2FICCEIC54227.2021.00028&rft.externalDocID=9692011