Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2022 Jul 12;17(7):e0267094.
doi: 10.1371/journal.pone.0267094. eCollection 2022.

A double scrambling-DNA row and column closed loop image encryption algorithm based on chaotic system

Affiliations

A double scrambling-DNA row and column closed loop image encryption algorithm based on chaotic system

Weiyu Ran et al. PLoS One. .

Abstract

In this paper, a dynamic update algorithm of double scrambling-DNA row and column closed loop based on chaotic system is proposed. The classical scrambling and diffusion structure are used in the whole process. In the scrambling stage, a new pixel reconstruction method is proposed by combining the Hilbert curve with Knuth-Durstenfeld shuffle algorithm to overcome the shortcoming of nearby storage of Hilbert curve. This method reconstructs the pixel matrix of one-dimensional vector according to the Hilbert curve coding method, and achieves good scrambling effect, while reducing its time complexity and space complexity. In the diffusion stage, combining the plaintext row, the ciphertext row and the key row, and taking advantage of the parallel computing power and high storage density of the DNA encoding, the existing block diffusion operation is improved, and the two-round diffusion of the DNA encoding is proposed. When the last line of ciphertext is generated, the first line of ciphertext is updated and the closed-loop dynamic update of the encryption system is realized. Finally, SHA-256 is used to give the secret key and calculate the initial value of the chaotic system. The simulation results show that the "double scrambling-DNA row and column closed loop dynamic" update algorithm proposed in this paper can effectively improve the efficiency of information transmission and have high security.

PubMed Disclaimer

Conflict of interest statement

The authors have declared that no competing interests exist.

Figures

Fig 1
Fig 1. Attractors of 2D-LICM chaotic system with (a, k) = (0.6, 0.8).
Fig 2
Fig 2. Lyapunov spectrum of 2D-LICM chaotic system with a from 0.5 to 2.5.
Fig 3
Fig 3. Bifurcation diagram of the 2D-LICM chaotic system.
A: Bifurcation diagram of a ∈ [−50, 50] (k = 0.8). B: Bifurcation diagram of a ∈ [0.5, 2.5] (k = 0.8).
Fig 4
Fig 4. Hilbert curve of order 1, 2 and 3.
A: Hilbert curve of order 1. B: Hilbert curve of order 2. C: Hilbert curve of order 3.
Fig 5
Fig 5. Different curves.
A: Continuous raster method. B: Spiral method. C: Diagonal method.
Fig 6
Fig 6. The encryption flow diagram of the proposed scheme.
Fig 7
Fig 7. Numerical example of double scrambling method.
A: Original pixel matrix. B: Matrix with shuffling algorithm. C: The reconstructed matrix with Hilbert curve.
Fig 8
Fig 8. Flowchart of Peppers encryption step (size 256 x 256).
Fig 9
Fig 9. Histogram analysis of original and encrypted images.
A1-D1: Original images of Peppers, Baboon, House and Cameraman. A2-D2: The corresponding original image histograms. A3-D3: The encrypted images of Peppers, Baboon, House and Cameraman. A4-D4: The corresponding encrypted image histograms.
Fig 10
Fig 10. Pixel correlation analysis of plain image Peppers and corresponding encrypted image.
A: Horizontal pixel of plain image. B: Vertical pixel of plain image. C: Diagonal pixel of plain image. D:Horizontal pixel of cipher image. E:Vertical pixel of cipher image. F:Diagonal pixel of cipher image.
Fig 11
Fig 11. Analysis of encryption test results of all black images.
A: Original full black image. B: Encrypted full black image. C: Histogram of encrypted image. D: Horizontal pixel of original image. E: Vertical pixel of original image. F: Diagonal pixel of original image. G: Horizontal pixel of encrypted image. H: Vertical pixel of encrypted image. I: Diagonal pixel of encrypted image.
Fig 12
Fig 12. Analysis of encryption test results of all white images.
A: Original full white image. B: Encrypted full white image. C: Histogram pixel of encrypted image. D: Horizontal pixel of original image. E: Vertical pixel of original image. F: Diagonal pixel of original image. G: Horizontal pixel of encrypted image. H: Vertical pixel of encrypted image. I: Diagonal pixel of encrypted image.
Fig 13
Fig 13. Key sensitivity analysis.
A: Plain image of Peppers. B: Encrypted image C with correct key. C: Encrypted image C1 with key S1 changed by one bit. D: |C1C|. E: Encrypted image C2 with key S2 changed by one bit. F: |C2C|. G: Encrypted image C3 with key S3 changed by one bit. H: |C3C|. I: Encrypted image C4 with key S4 changed by one bit. J: |C4C|. K: Encrypted image C5 with key x0 changed by one bit. L: |C5C|. M: Encrypted image C6 with key y0 changed by one bit. N: |C6C|.
Fig 14
Fig 14. Histogram analysis and entropy analysis of salt-and-pepper noise image and encrypted image.
Fig 15
Fig 15. Histogram analysis and entropy analysis of Gaussian noise image and encrypted image.

Similar articles

Cited by

References

    1. Gong LH, Qiu KD, Deng CZ, Zhou NR. An image compression and encryption algorithm based on chaotic system and compressive sensing. Optics and Laser Technology. 2019. Jul;115(6):257–267. doi: 10.1016/j.optlastec.2019.01.039 - DOI
    1. Song YJ,Zhu ZL,Zhang W, et al.. Joint image compression–encryption scheme using entropy coding and compressive sensing. Nonlinear Dynamics. 2019. Feb;95(3):2235–2261. doi: 10.1007/s11071-018-4689-9 - DOI
    1. Yu SS,Zhou NR, Gong LH, Nie Z. Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system. Optics and Lasers in Engineering. 2020. Jan;124(6):105816–105827. doi: 10.1016/j.optlaseng.2019.105816 - DOI
    1. Farah MB,Guesmi R,Kachouri A, Samet M. A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Optics and Laser Technology. 2020. Jan;121(7):577–589. 10.1016/j.optlastec.2019.105777 - DOI
    1. Xian YJ, Wang XY. Fractal sorting matrix and its application on chaotic image encryption. Information Sciences. 2021. Feb;547(3):1154–1169. doi: 10.1016/j.ins.2020.09.055 - DOI