Please wait a minute...
Chin. Phys. B, 2019, Vol. 28(4): 040504    DOI: 10.1088/1674-1056/28/4/040504
GENERAL Prev   Next  

New chaotical image encryption algorithm based on Fisher-Yatess scrambling and DNA coding

Xing-Yuan Wang(王兴元)1,2, Jun-Jian Zhang(张钧荐)2, Fu-Chen Zhang(张付臣)3, Guang-Hui Cao(曹光辉)4
1 School of Information Science and Technology, Dalian Maritime University, Dalian 116026, China;
2 Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024, China;
3 College of Mathematics and Statistics, Chongqing Technology and Business University, Chongqing 400067, China;
4 School of Electronics & Information Engineering, Liaoning University of Technology, Jinzhou 121001 China
Abstract  

Based on the Fisher-Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, the SHA-3 algorithm is used to calculate the hash value of the initial password, which is used as the initial value of the chaotic system. Second, the chaotic sequence and Fisher-Yatess scrambling are used to scramble the plaintext, and a sorting scrambling algorithm is used for secondary scrambling. Then, the chaotic sequence and DNA coding rules are used to change the plaintext pixel values, which makes the ciphertext more random and resistant to attacks, and thus ensures that the encrypted ciphertext is more secure. Finally, we add plaintext statistics for pixel-level diffusion to ensure plaintext sensitivity. The experimental results and security analysis show that the new algorithm has a good encryption effect and speed, and can also resist common attacks.

Keywords:  Fisher-Yatess scrambling      chaotic sequence      DNA coding      image encryption  
Received:  29 October 2018      Revised:  10 February 2019      Published:  05 April 2019
PACS:  05.45.Ac (Low-dimensional chaos)  
  05.45.-a (Nonlinear dynamics and chaos)  
Fund: 

Project supported by the National Natural Science Foundation of China (Grant Nos. 61173183, 61672124, 61370145, and 11501064), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund, China (Grant No. MMJJ20170203), the China Postdoctoral Science Foundation (Grant No. 2016M590850), and the Scientific and Technological Research Program of Chongqing Municipal Education Commission, China (Grant No. KJ1500605).

Corresponding Authors:  Xing-Yuan Wang, Jun-Jian Zhang     E-mail:  wangxy@dlut.edu.cn;463182719@qq.com

Cite this article: 

Xing-Yuan Wang(王兴元), Jun-Jian Zhang(张钧荐), Fu-Chen Zhang(张付臣), Guang-Hui Cao(曹光辉) New chaotical image encryption algorithm based on Fisher-Yatess scrambling and DNA coding 2019 Chin. Phys. B 28 040504

[1] Wang L D, Xiao L Q, Li Q D and Shu K 2018 Acta Phys. Sin. 67 090502 (in Chinese)
[2] Zhou N R, Pan S M and Cheng S 2016 Opt. Laser Technol. 82 121
[3] Akram B, Ahmed A and Adrian V D 2017 Opt. Lasers Eng. 88 37
[4] Kannammal A and Rani S S 2014 Int. J. Im. Syst. Technol. 24 111
[5] Potlapally N R, Ravi S, Raghunathan A and Jha N K 2006 IEEE Trans. Mob. Comput. 5 128
[6] Tan J T, Luo Y R, Zhou Z and Hai W H 2016 Chin. Phys. Lett. 33 070302
[7] Liu L F and Miao S X 2017 Mult. Tools & Appl. 76 16511
[8] Chai X L, Gan Z H and Yuan K 2017 Chin. Phys. B 26 020504
[9] Liu L F, Miao S X and Hu H P 2016 Sign. Proc. 10 1096
[10] Liu Z Y, Xia T C and Wang J B 2018 Chin. Phys. B 27 030502
[11] Li C B, Wesley J T, Julien C S 2017 Chin. Phys. B 26 120501
[12] Muruga B, Nanjappa G and Ammasai G 2016 Iet Comput. Vis. 10 593
[13] Tang Y X, Abdul J M K, Karthikeyan R, Viet T P, Sajad J and Tian Y 2018 Chin. Phys. B 27 040502
[14] Liu S, Guo C L and Sheridan J T 2014 Opt. Laser Technol. 57 327
[15] Jiang Q L, Zeng W, Ou W H and Xu R H 2016 8th International Conference on Wireless Communications & Signal Processing, October 13-15, 2016, Yangzhou, China, p. 1
[16] Coppersmith D 1994 IBM J. Res. Dev. 38 243
[17] Liu H J and Wang X Y 2011 Opt. Commun. 284 3895
[18] Wang L, Song H and Liu P 2016 Opt. Lasers Eng. 77 118
[19] Erlich Y and Zielinski D 2017 Science 355 950
[20] Leier A, Richter C, Banzhaf W and Rauhe H 2000 Biosystems 57 13
[21] Shimanovsky B, Feng J and Potkonjak M 2008 Lect. Notes Comput. Sci. 2578 373
[22] Wang J S, Long F and Ou W H 2018 International Conference on Security, Pattern Analysis, and Cybernetics, December 15-17, 2017, Shenzhen, China, p. 730
[23] Gehani A and Reif J 1999 Biosystems 52 197
[24] Chen J 2003 Proceedings of the 2003 International Symposium on Circuits and Systems, May 25-28, 2003, Bangkok, Thailand, p. 822
[25] Tanaka K, Okamoto A and Saito I 2005 Biosystems 81 25
[26] Mousa H, Moustafa K, Abdel W and Hadhoud M 2008 Int. Arab. J. Inf. Technol. 8 147
[27] Liu Y, Zang Q and Wie X 2014 Opt. Laser Technol. 60 111
[28] Siavash B S, Mehran M K and Arash R M 2014 IEEE Trans. Comp. Aided. Int. Circ. Syst. 33 1105
[29] Alvarez G and Li S J 2006 Int. J. Bifur. Chaos 16 2129
[30] Rhouma R, Meherzi S and Belghith S 2009 Chaos, Solitons, and Fractals 40 309
[31] Wang X Y, Zhu X Q and Zhang Y Q 2018 IEEE Access 6 23733
[32] Zhang X C, Zhou Z and Niu Y 2018 IEEE Phot. J. 10
[33] Zhu C X and Sun K H 2018 IEEE Access 6 18759
[34] Fu X Q, Liu B C, Xie Y Y, Li W and Liu Y 2018 IEEE Phot. J. 10
[35] Awad A 2010 Etri. J. 32 774
[36] Wu Y 2011 J. Sel. Areas Tel. 2 31
[37] Zhou N R, Wang Y X, Gong L H, Chen X B and Yang Y X 2012 Opt. Laser Technol. 44 2270
[1] Memristor-based hyper-chaotic circuit for image encryption
Jiao-Jiao Chen(陈娇娇), Deng-Wei Yan(闫登卫), Shu-Kai Duan(段书凯), Li-Dan Wang(王丽丹). Chin. Phys. B, 2020, 29(11): 110504.
[2] Phase retrieval algorithm for optical information security
Shi-Qing Wang(王诗晴), Xiang-Feng Meng(孟祥锋), Yu-Rong Wang(王玉荣), Yong-Kai Yin(殷永凯), Xiu-Lun Yang(杨修伦). Chin. Phys. B, 2019, 28(8): 084203.
[3] Efficient image encryption scheme with synchronous substitution and diffusion based on double S-boxes
Xuan-Ping Zhang(张选平), Rui Guo(郭瑞), Heng-Wei Chen(陈恒伟), Zhong-Meng Zhao(赵仲孟), Jia-Yin Wang(王嘉寅). Chin. Phys. B, 2018, 27(8): 080701.
[4] Multiple-image encryption by two-step phase-shifting interferometry and spatial multiplexing of smooth compressed signal
Xue Zhang(张学), Xiangfeng Meng(孟祥锋), Yurong Wang(王玉荣), Xiulun Yang(杨修伦), Yongkai Yin(殷永凯). Chin. Phys. B, 2018, 27(7): 074205.
[5] Image encryption technique based on new two-dimensional fractional-order discrete chaotic map and Menezes-Vanstone elliptic curve cryptosystem
Zeyu Liu(刘泽宇), Tiecheng Xia(夏铁成), Jinbo Wang(王金波). Chin. Phys. B, 2018, 27(3): 030502.
[6] A novel pseudo-random coupled LP spatiotemporal chaos and its application in image encryption
Xingyuan Wang(王兴元), Yu Wang(王宇), Siwei Wang(王思伟), Yingqian Zhang(张盈谦), Xiangjun Wu(武相军). Chin. Phys. B, 2018, 27(11): 110502.
[7] An image encryption scheme based on three-dimensional Brownian motion and chaotic system
Xiu-Li Chai(柴秀丽), Zhi-Hua Gan(甘志华), Ke Yuan(袁科), Yang Lu(路杨), Yi-Ran Chen(陈怡然). Chin. Phys. B, 2017, 26(2): 020504.
[8] A novel color image encryption scheme using fractional-order hyperchaotic system and DNA sequence operations
Li-Min Zhang(张立民), Ke-Hui Sun(孙克辉), Wen-Hao Liu(刘文浩), Shao-Bo He(贺少波). Chin. Phys. B, 2017, 26(10): 100504.
[9] A self-cited pixel summation based image encryption algorithm
Guo-Dong Ye(叶国栋), Xiao-Ling Huang(黄小玲), Leo Yu Zhang(张愉), Zheng-Xia Wang(王政霞). Chin. Phys. B, 2017, 26(1): 010501.
[10] Image encryption using random sequence generated from generalized information domain
Xia-Yan Zhang(张夏衍), Guo-Ji Zhang(张国基), Xuan Li(李璇), Ya-Zhou Ren(任亚洲), Jie-Hua Wu(伍杰华). Chin. Phys. B, 2016, 25(5): 054201.
[11] A novel color image encryption algorithm based on genetic recombination and the four-dimensional memristive hyperchaotic system
Xiu-Li Chai(柴秀丽), Zhi-Hua Gan(甘志华), Yang Lu(路杨), Miao-Hui Zhang(张苗辉), Yi-Ran Chen(陈怡然). Chin. Phys. B, 2016, 25(10): 100503.
[12] A fast image encryption algorithm based on only blocks in cipher text
Wang Xing-Yuan, Wang Qian. Chin. Phys. B, 2014, 23(3): 030503.
[13] A self-adapting image encryption algorithm based on spatiotemporal chaos and ergodic matrix
Luo Yu-Ling, Du Ming-Hui. Chin. Phys. B, 2013, 22(8): 080503.
[14] A novel image block cryptosystem based on spatiotemporal chaotic system and chaotic neural network
Wang Xing-Yuan, Bao Xue-Mei. Chin. Phys. B, 2013, 22(5): 050508.
[15] Cryptanalysis and improvement of a digital image encryption method with chaotic map lattices
Wang Xing-Yuan, Liu Lin-Tao. Chin. Phys. B, 2013, 22(5): 050503.
No Suggested Reading articles found!