Please wait a minute...
Chin. Phys. B, 2019, Vol. 28(4): 040504    DOI: 10.1088/1674-1056/28/4/040504
GENERAL Prev   Next  

New chaotical image encryption algorithm based on Fisher-Yatess scrambling and DNA coding

Xing-Yuan Wang(王兴元)1,2, Jun-Jian Zhang(张钧荐)2, Fu-Chen Zhang(张付臣)3, Guang-Hui Cao(曹光辉)4
1 School of Information Science and Technology, Dalian Maritime University, Dalian 116026, China;
2 Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024, China;
3 College of Mathematics and Statistics, Chongqing Technology and Business University, Chongqing 400067, China;
4 School of Electronics & Information Engineering, Liaoning University of Technology, Jinzhou 121001 China
Abstract  

Based on the Fisher-Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, the SHA-3 algorithm is used to calculate the hash value of the initial password, which is used as the initial value of the chaotic system. Second, the chaotic sequence and Fisher-Yatess scrambling are used to scramble the plaintext, and a sorting scrambling algorithm is used for secondary scrambling. Then, the chaotic sequence and DNA coding rules are used to change the plaintext pixel values, which makes the ciphertext more random and resistant to attacks, and thus ensures that the encrypted ciphertext is more secure. Finally, we add plaintext statistics for pixel-level diffusion to ensure plaintext sensitivity. The experimental results and security analysis show that the new algorithm has a good encryption effect and speed, and can also resist common attacks.

Keywords:  Fisher-Yatess scrambling      chaotic sequence      DNA coding      image encryption  
Received:  29 October 2018      Revised:  10 February 2019      Accepted manuscript online: 
PACS:  05.45.Ac (Low-dimensional chaos)  
  05.45.-a (Nonlinear dynamics and chaos)  
Fund: 

Project supported by the National Natural Science Foundation of China (Grant Nos. 61173183, 61672124, 61370145, and 11501064), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund, China (Grant No. MMJJ20170203), the China Postdoctoral Science Foundation (Grant No. 2016M590850), and the Scientific and Technological Research Program of Chongqing Municipal Education Commission, China (Grant No. KJ1500605).

Corresponding Authors:  Xing-Yuan Wang, Jun-Jian Zhang     E-mail:  wangxy@dlut.edu.cn;463182719@qq.com

Cite this article: 

Xing-Yuan Wang(王兴元), Jun-Jian Zhang(张钧荐), Fu-Chen Zhang(张付臣), Guang-Hui Cao(曹光辉) New chaotical image encryption algorithm based on Fisher-Yatess scrambling and DNA coding 2019 Chin. Phys. B 28 040504

[1] Wang L D, Xiao L Q, Li Q D and Shu K 2018 Acta Phys. Sin. 67 090502 (in Chinese)
[2] Zhou N R, Pan S M and Cheng S 2016 Opt. Laser Technol. 82 121
[3] Akram B, Ahmed A and Adrian V D 2017 Opt. Lasers Eng. 88 37
[4] Kannammal A and Rani S S 2014 Int. J. Im. Syst. Technol. 24 111
[5] Potlapally N R, Ravi S, Raghunathan A and Jha N K 2006 IEEE Trans. Mob. Comput. 5 128
[6] Tan J T, Luo Y R, Zhou Z and Hai W H 2016 Chin. Phys. Lett. 33 070302
[7] Liu L F and Miao S X 2017 Mult. Tools & Appl. 76 16511
[8] Chai X L, Gan Z H and Yuan K 2017 Chin. Phys. B 26 020504
[9] Liu L F, Miao S X and Hu H P 2016 Sign. Proc. 10 1096
[10] Liu Z Y, Xia T C and Wang J B 2018 Chin. Phys. B 27 030502
[11] Li C B, Wesley J T, Julien C S 2017 Chin. Phys. B 26 120501
[12] Muruga B, Nanjappa G and Ammasai G 2016 Iet Comput. Vis. 10 593
[13] Tang Y X, Abdul J M K, Karthikeyan R, Viet T P, Sajad J and Tian Y 2018 Chin. Phys. B 27 040502
[14] Liu S, Guo C L and Sheridan J T 2014 Opt. Laser Technol. 57 327
[15] Jiang Q L, Zeng W, Ou W H and Xu R H 2016 8th International Conference on Wireless Communications & Signal Processing, October 13-15, 2016, Yangzhou, China, p. 1
[16] Coppersmith D 1994 IBM J. Res. Dev. 38 243
[17] Liu H J and Wang X Y 2011 Opt. Commun. 284 3895
[18] Wang L, Song H and Liu P 2016 Opt. Lasers Eng. 77 118
[19] Erlich Y and Zielinski D 2017 Science 355 950
[20] Leier A, Richter C, Banzhaf W and Rauhe H 2000 Biosystems 57 13
[21] Shimanovsky B, Feng J and Potkonjak M 2008 Lect. Notes Comput. Sci. 2578 373
[22] Wang J S, Long F and Ou W H 2018 International Conference on Security, Pattern Analysis, and Cybernetics, December 15-17, 2017, Shenzhen, China, p. 730
[23] Gehani A and Reif J 1999 Biosystems 52 197
[24] Chen J 2003 Proceedings of the 2003 International Symposium on Circuits and Systems, May 25-28, 2003, Bangkok, Thailand, p. 822
[25] Tanaka K, Okamoto A and Saito I 2005 Biosystems 81 25
[26] Mousa H, Moustafa K, Abdel W and Hadhoud M 2008 Int. Arab. J. Inf. Technol. 8 147
[27] Liu Y, Zang Q and Wie X 2014 Opt. Laser Technol. 60 111
[28] Siavash B S, Mehran M K and Arash R M 2014 IEEE Trans. Comp. Aided. Int. Circ. Syst. 33 1105
[29] Alvarez G and Li S J 2006 Int. J. Bifur. Chaos 16 2129
[30] Rhouma R, Meherzi S and Belghith S 2009 Chaos, Solitons, and Fractals 40 309
[31] Wang X Y, Zhu X Q and Zhang Y Q 2018 IEEE Access 6 23733
[32] Zhang X C, Zhou Z and Niu Y 2018 IEEE Phot. J. 10
[33] Zhu C X and Sun K H 2018 IEEE Access 6 18759
[34] Fu X Q, Liu B C, Xie Y Y, Li W and Liu Y 2018 IEEE Phot. J. 10
[35] Awad A 2010 Etri. J. 32 774
[36] Wu Y 2011 J. Sel. Areas Tel. 2 31
[37] Zhou N R, Wang Y X, Gong L H, Chen X B and Yang Y X 2012 Opt. Laser Technol. 44 2270
[1] Asymmetric image encryption algorithm based ona new three-dimensional improved logistic chaotic map
Guo-Dong Ye(叶国栋), Hui-Shan Wu(吴惠山), Xiao-Ling Huang(黄小玲), and Syh-Yuan Tan. Chin. Phys. B, 2023, 32(3): 030504.
[2] A color image encryption algorithm based on hyperchaotic map and DNA mutation
Xinyu Gao(高昕瑜), Bo Sun(孙博), Yinghong Cao(曹颖鸿), Santo Banerjee, and Jun Mou(牟俊). Chin. Phys. B, 2023, 32(3): 030501.
[3] Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing
Xing-Yuan Wang(王兴元), Xiao-Li Wang(王哓丽), Lin Teng(滕琳), Dong-Hua Jiang(蒋东华), and Yongjin Xian(咸永锦). Chin. Phys. B, 2023, 32(2): 020503.
[4] Synchronously scrambled diffuse image encryption method based on a new cosine chaotic map
Xiaopeng Yan(闫晓鹏), Xingyuan Wang(王兴元), and Yongjin Xian(咸永锦). Chin. Phys. B, 2022, 31(8): 080504.
[5] Exponential sine chaotification model for enhancing chaos and its hardware implementation
Rui Wang(王蕊), Meng-Yang Li(李孟洋), and Hai-Jun Luo(罗海军). Chin. Phys. B, 2022, 31(8): 080508.
[6] Neural-mechanism-driven image block encryption algorithm incorporating a hyperchaotic system and cloud model
Peng-Fei Fang(方鹏飞), Han Liu(刘涵), Cheng-Mao Wu(吴成茂), and Min Liu(刘旻). Chin. Phys. B, 2022, 31(4): 040501.
[7] FPGA implementation and image encryption application of a new PRNG based on a memristive Hopfield neural network with a special activation gradient
Fei Yu(余飞), Zinan Zhang(张梓楠), Hui Shen(沈辉), Yuanyuan Huang(黄园媛), Shuo Cai(蔡烁), and Sichun Du(杜四春). Chin. Phys. B, 2022, 31(2): 020505.
[8] An image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree
Yining Su(苏怡宁), Xingyuan Wang(王兴元), and Shujuan Lin(林淑娟). Chin. Phys. B, 2022, 31(11): 110503.
[9] Finite-time complex projective synchronization of fractional-order complex-valued uncertain multi-link network and its image encryption application
Yong-Bing Hu(胡永兵), Xiao-Min Yang(杨晓敏), Da-Wei Ding(丁大为), and Zong-Li Yang(杨宗立). Chin. Phys. B, 2022, 31(11): 110501.
[10] An image encryption algorithm based on improved baker transformation and chaotic S-box
Xing-Yuan Wang(王兴元), Huai-Huai Sun(孙怀怀), and Hao Gao(高浩). Chin. Phys. B, 2021, 30(6): 060507.
[11] Fractal sorting vector-based least significant bit chaotic permutation for image encryption
Yong-Jin Xian(咸永锦), Xing-Yuan Wang(王兴元), Ying-Qian Zhang(张盈谦), Xiao-Yu Wang(王晓雨), and Xiao-Hui Du(杜晓慧). Chin. Phys. B, 2021, 30(6): 060508.
[12] Ghost imaging-based optical cryptosystem for multiple images using integral property of the Fourier transform
Yi Kang(康祎), Leihong Zhang(张雷洪), Hualong Ye(叶华龙), Dawei Zhang(张大伟), and Songlin Zhuang(庄松林). Chin. Phys. B, 2021, 30(12): 124207.
[13] A secure image protection algorithm by steganography and encryption using the 2D-TSCC
Qi Li(李琦), Xingyuan Wang(王兴元), He Wang(王赫), Xiaolin Ye(叶晓林), Shuang Zhou(周双), Suo Gao(高锁), and Yunqing Shi(施云庆). Chin. Phys. B, 2021, 30(11): 110501.
[14] Memristor-based hyper-chaotic circuit for image encryption
Jiao-Jiao Chen(陈娇娇), Deng-Wei Yan(闫登卫), Shu-Kai Duan(段书凯), and Li-Dan Wang(王丽丹). Chin. Phys. B, 2020, 29(11): 110504.
[15] Phase retrieval algorithm for optical information security
Shi-Qing Wang(王诗晴), Xiang-Feng Meng(孟祥锋), Yu-Rong Wang(王玉荣), Yong-Kai Yin(殷永凯), Xiu-Lun Yang(杨修伦). Chin. Phys. B, 2019, 28(8): 084203.
No Suggested Reading articles found!