|
|
New chaotical image encryption algorithm based on Fisher-Yatess scrambling and DNA coding |
Xing-Yuan Wang(王兴元)1,2, Jun-Jian Zhang(张钧荐)2, Fu-Chen Zhang(张付臣)3, Guang-Hui Cao(曹光辉)4 |
1 School of Information Science and Technology, Dalian Maritime University, Dalian 116026, China;
2 Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024, China;
3 College of Mathematics and Statistics, Chongqing Technology and Business University, Chongqing 400067, China;
4 School of Electronics & Information Engineering, Liaoning University of Technology, Jinzhou 121001 China |
|
|
Abstract Based on the Fisher-Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, the SHA-3 algorithm is used to calculate the hash value of the initial password, which is used as the initial value of the chaotic system. Second, the chaotic sequence and Fisher-Yatess scrambling are used to scramble the plaintext, and a sorting scrambling algorithm is used for secondary scrambling. Then, the chaotic sequence and DNA coding rules are used to change the plaintext pixel values, which makes the ciphertext more random and resistant to attacks, and thus ensures that the encrypted ciphertext is more secure. Finally, we add plaintext statistics for pixel-level diffusion to ensure plaintext sensitivity. The experimental results and security analysis show that the new algorithm has a good encryption effect and speed, and can also resist common attacks.
|
Received: 29 October 2018
Revised: 10 February 2019
Accepted manuscript online:
|
PACS:
|
05.45.Ac
|
(Low-dimensional chaos)
|
|
05.45.-a
|
(Nonlinear dynamics and chaos)
|
|
Fund: Project supported by the National Natural Science Foundation of China (Grant Nos. 61173183, 61672124, 61370145, and 11501064), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund, China (Grant No. MMJJ20170203), the China Postdoctoral Science Foundation (Grant No. 2016M590850), and the Scientific and Technological Research Program of Chongqing Municipal Education Commission, China (Grant No. KJ1500605). |
Corresponding Authors:
Xing-Yuan Wang, Jun-Jian Zhang
E-mail: wangxy@dlut.edu.cn;463182719@qq.com
|
Cite this article:
Xing-Yuan Wang(王兴元), Jun-Jian Zhang(张钧荐), Fu-Chen Zhang(张付臣), Guang-Hui Cao(曹光辉) New chaotical image encryption algorithm based on Fisher-Yatess scrambling and DNA coding 2019 Chin. Phys. B 28 040504
|
[1] |
Wang L D, Xiao L Q, Li Q D and Shu K 2018 Acta Phys. Sin. 67 090502 (in Chinese)
|
[2] |
Zhou N R, Pan S M and Cheng S 2016 Opt. Laser Technol. 82 121
|
[3] |
Akram B, Ahmed A and Adrian V D 2017 Opt. Lasers Eng. 88 37
|
[4] |
Kannammal A and Rani S S 2014 Int. J. Im. Syst. Technol. 24 111
|
[5] |
Potlapally N R, Ravi S, Raghunathan A and Jha N K 2006 IEEE Trans. Mob. Comput. 5 128
|
[6] |
Tan J T, Luo Y R, Zhou Z and Hai W H 2016 Chin. Phys. Lett. 33 070302
|
[7] |
Liu L F and Miao S X 2017 Mult. Tools & Appl. 76 16511
|
[8] |
Chai X L, Gan Z H and Yuan K 2017 Chin. Phys. B 26 020504
|
[9] |
Liu L F, Miao S X and Hu H P 2016 Sign. Proc. 10 1096
|
[10] |
Liu Z Y, Xia T C and Wang J B 2018 Chin. Phys. B 27 030502
|
[11] |
Li C B, Wesley J T, Julien C S 2017 Chin. Phys. B 26 120501
|
[12] |
Muruga B, Nanjappa G and Ammasai G 2016 Iet Comput. Vis. 10 593
|
[13] |
Tang Y X, Abdul J M K, Karthikeyan R, Viet T P, Sajad J and Tian Y 2018 Chin. Phys. B 27 040502
|
[14] |
Liu S, Guo C L and Sheridan J T 2014 Opt. Laser Technol. 57 327
|
[15] |
Jiang Q L, Zeng W, Ou W H and Xu R H 2016 8th International Conference on Wireless Communications & Signal Processing, October 13-15, 2016, Yangzhou, China, p. 1
|
[16] |
Coppersmith D 1994 IBM J. Res. Dev. 38 243
|
[17] |
Liu H J and Wang X Y 2011 Opt. Commun. 284 3895
|
[18] |
Wang L, Song H and Liu P 2016 Opt. Lasers Eng. 77 118
|
[19] |
Erlich Y and Zielinski D 2017 Science 355 950
|
[20] |
Leier A, Richter C, Banzhaf W and Rauhe H 2000 Biosystems 57 13
|
[21] |
Shimanovsky B, Feng J and Potkonjak M 2008 Lect. Notes Comput. Sci. 2578 373
|
[22] |
Wang J S, Long F and Ou W H 2018 International Conference on Security, Pattern Analysis, and Cybernetics, December 15-17, 2017, Shenzhen, China, p. 730
|
[23] |
Gehani A and Reif J 1999 Biosystems 52 197
|
[24] |
Chen J 2003 Proceedings of the 2003 International Symposium on Circuits and Systems, May 25-28, 2003, Bangkok, Thailand, p. 822
|
[25] |
Tanaka K, Okamoto A and Saito I 2005 Biosystems 81 25
|
[26] |
Mousa H, Moustafa K, Abdel W and Hadhoud M 2008 Int. Arab. J. Inf. Technol. 8 147
|
[27] |
Liu Y, Zang Q and Wie X 2014 Opt. Laser Technol. 60 111
|
[28] |
Siavash B S, Mehran M K and Arash R M 2014 IEEE Trans. Comp. Aided. Int. Circ. Syst. 33 1105
|
[29] |
Alvarez G and Li S J 2006 Int. J. Bifur. Chaos 16 2129
|
[30] |
Rhouma R, Meherzi S and Belghith S 2009 Chaos, Solitons, and Fractals 40 309
|
[31] |
Wang X Y, Zhu X Q and Zhang Y Q 2018 IEEE Access 6 23733
|
[32] |
Zhang X C, Zhou Z and Niu Y 2018 IEEE Phot. J. 10
|
[33] |
Zhu C X and Sun K H 2018 IEEE Access 6 18759
|
[34] |
Fu X Q, Liu B C, Xie Y Y, Li W and Liu Y 2018 IEEE Phot. J. 10
|
[35] |
Awad A 2010 Etri. J. 32 774
|
[36] |
Wu Y 2011 J. Sel. Areas Tel. 2 31
|
[37] |
Zhou N R, Wang Y X, Gong L H, Chen X B and Yang Y X 2012 Opt. Laser Technol. 44 2270
|
No Suggested Reading articles found! |
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
Altmetric
|
blogs
Facebook pages
Wikipedia page
Google+ users
|
Online attention
Altmetric calculates a score based on the online attention an article receives. Each coloured thread in the circle represents a different type of online attention. The number in the centre is the Altmetric score. Social media and mainstream news media are the main sources that calculate the score. Reference managers such as Mendeley are also tracked but do not contribute to the score. Older articles often score higher because they have had more time to get noticed. To account for this, Altmetric has included the context data for other articles of a similar age.
View more on Altmetrics
|
|
|