Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2012:2012:286741.
doi: 10.1100/2012/286741. Epub 2012 Oct 11.

A novel image encryption algorithm based on DNA subsequence operation

Affiliations

A novel image encryption algorithm based on DNA subsequence operation

Qiang Zhang et al. ScientificWorldJournal. 2012.

Abstract

We present a novel image encryption algorithm based on DNA subsequence operation. Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image. The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.

PubMed Disclaimer

Figures

Figure 1
Figure 1
Elongation and truncation operation of DNA subsequences.
Figure 2
Figure 2
The block diagram of the proposed algorithm. (a) The block diagram of the encryption algorithm. (b) The block diagram of the decryption algorithm.
Figure 3
Figure 3
Encrypted image and decrypted image. (a) The original image. (b) The encrypted image. (c) The decrypted image under the wrong secret keys. (d) The decrypted image under the correct secret keys.
Figure 4
Figure 4
The sensitivity of secret key x 0. (a) The decrypted image with secret key (0.95000000000001,3.2,0.17,0.25,3.3,0.14). (b) The corresponding histogram.
Figure 5
Figure 5
The grey histogram of the original image and the encrypted image. (a) The grey histogram of the original image. (b) The grey histogram of the encrypted image.
Figure 6
Figure 6
Correlation of two horizontally adjacent pixels in the original image and in the encrypted image.
Algorithm 1
Algorithm 1
An image encryption algorithm based on DNA subsequence operation.
Algorithm 2
Algorithm 2
An image decryption algorithm based on DNA subsequence operation.

Similar articles

Cited by

References

    1. Ren H, Shang Z, Wang Y, Zhang J. A chaotic algorithm of image encryption based on dispersion sampling. Proceedings of the 8th International Conference on Electronic Measurement and Instruments (ICEMI '07); August 2007; pp. 836–839.
    1. Fu C, Zhu Z. A chaotic image encryption scheme based on circular bit shift method. Proceedings of the 9th International Conference for Young Computer Scientists (ICYCS '08); November 2008; pp. 3057–3061.
    1. Ren HE, Zhang J, Wang XJ, Shang ZW. Block sampling algorithm of image encryption based on chaotic scrambling. Proceedings of the International Conference on Computational Intelligence and Security Workshops (CIS '07); December 2007; pp. 773–776.
    1. Zhang YH, Kang BS, Zhang XF. Image encryption algorithm based on chaotic sequence. Proceedings of the 16th International Conference on Artificial Reality and Telexistence—Workshops (ICAT '06); December 2006; pp. 221–223.
    1. Lian S. Efficient image or video encryption based on spatiotemporal chaos system. Chaos, Solitons and Fractals. 2009;40(5):2509–2519.

Publication types

LinkOut - more resources