Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2025 Jul 23;27(8):776.
doi: 10.3390/e27080776.

A Novel One-Dimensional Chaotic System for Image Encryption Through the Three-Strand Structure of DNA

Affiliations

A Novel One-Dimensional Chaotic System for Image Encryption Through the Three-Strand Structure of DNA

Yingjie Su et al. Entropy (Basel). .

Abstract

Digital images have been widely applied in fields such as mobile devices, the Internet of Things, and medical imaging. Although significant progress has been made in image encryption technology, it still faces many challenges, such as attackers using powerful computing resources and advanced algorithms to crack encryption systems. To address these challenges, this paper proposes a novel image encryption algorithm based on one-dimensional sawtooth wave chaotic system (1D-SAW) and the three-strand structure of DNA. Firstly, a new 1D-SAW chaotic system was designed. By introducing nonlinear terms and periodic disturbances, this system is capable of generating chaotic sequences with high randomness and initial value sensitivity. Secondly, a new diffusion rule based on the three-strand structure of DNA is proposed. Compared with the traditional DNA encoding and XOR operation, this rule further enhances the complexity and anti-attack ability of the encryption process. Finally, the security and randomness of the 1D-SAW and image encryption algorithms were verified through various tests. Results show that this method exhibits better performance in resisting statistical attacks and differential attacks.

Keywords: SHA-256 hash function; one-dimensional chaotic system; security analysis; three-stranded structure of DNA.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflicts of interest regarding the publication of this paper.

Figures

Figure 1
Figure 1
(A): A DNA three-stranded structure containing two triplet base pairs, C+-G-C and T-A-T, (B): A DNA three-stranded structure containing two triplet base pairs, G-G-C and A-A-T. (created in BioRender. Hisey, J. (2024). https://BioRender.com/f14l364, accessed on 26 November 2024).
Figure 2
Figure 2
The LE values of 1D-SAW, 1-DSP, 1D quadratic chaotic map, 1-DSCM, and 1D-SLCM.
Figure 3
Figure 3
The initial value and parameter perturbation of 1D-SAW.
Figure 4
Figure 4
Bifurcation diagram of 1D-SAW.
Figure 5
Figure 5
The SE values of 1D-SAW, 1-DSP, 1D quadratic chaotic map, 1-DSCM, and 1D-SLCM.
Figure 6
Figure 6
The 0-1 test results of 1D-SAW, 1-DSP, 1D quadratic chaotic map, 1-DSCM and 1D-SLCM.
Figure 7
Figure 7
The visual representation of the proposed method.
Figure 8
Figure 8
Original images and encrypted images.
Figure 9
Figure 9
Histogram analysis of baboon.
Figure 10
Figure 10
Correlation analysis of original and encrypted baboon image in four directions.
Figure 11
Figure 11
Encryption results for all-black and all-white images.
Figure 12
Figure 12
(a) 0.01 Gaussian noise attack, (b,d,f,h,j,l,n,p) the decrypted images, (c) 0.01 Salt & Pepper noise attack, (e) 0.01 speckle noise attack, (g) 0.05 speckle noise attack, (i,k) 10% unilateral cropping attack. (m,o) ≈20% multilateral cropping attack.

Similar articles

References

    1. Shannon C.E. Communication Theory of Secrecy Systems. Bell Syst. Tech. J. 1949;28:656–715. doi: 10.1002/j.1538-7305.1949.tb00928.x. - DOI
    1. Fridrich J. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. Int. J. Bifurc. Chaos. 1998;8:1259–1284. doi: 10.1142/S021812749800098X. - DOI
    1. Liu W., Sun K., Wang H., Li B., Chen Y. Inverse Proportional Chaotification Model for Image Encryption in IoT Scenarios. IEEE Trans. Circuits Syst. I Regul. Pap. 2024;72:254–264. doi: 10.1109/TCSI.2024.3511675. - DOI
    1. Wan H., Zhou L., Chen H., Pang D.M., You Z.Q., Wang C., Wang Y., Huang G. Furniture image protection scheme based on chaotic generating matrix encryption and filter combined with genetic algorithm noise reduction. Phys. Scr. 2025;100:065221. doi: 10.1088/1402-4896/add5a4. - DOI
    1. Erkan U., Toktas A., Memis S., Toktas F., Lai Q., Wen H., Gao S. OSMRD-IE: Octal-Based Shuffling and Multilayer Rotational Diffusing Image Encryption Using 2-D Hybrid Michalewicz–Ackley Map. IEEE Internet Things J. 2024;11:35113–35123. doi: 10.1109/JIOT.2024.3432494. - DOI

LinkOut - more resources