An efficient image encryption algorithm based on multi chaotic system and random DAN coding

This paper presents a digital image encryption scheme based on multi chaotic system and random DNA coding. Firstly, the initial values and parameter values of 2D Logistic-adjusted-Sine mapping (2D-LASM) and Logistic-Sine system (LSS) are obtained from SHA256 hash values of the original image. In the...

Full description

Saved in:
Bibliographic Details
Published inMultimedia tools and applications Vol. 79; no. 39-40; pp. 29901 - 29921
Main Authors Zheng, Jiming, Luo, Zheng, Zeng, Qingxia
Format Journal Article
LanguageEnglish
Published New York Springer US 01.10.2020
Subjects
Online AccessGet full text
ISSN1380-7501
1573-7721
DOI10.1007/s11042-020-09454-9

Cover

More Information
Summary:This paper presents a digital image encryption scheme based on multi chaotic system and random DNA coding. Firstly, the initial values and parameter values of 2D Logistic-adjusted-Sine mapping (2D-LASM) and Logistic-Sine system (LSS) are obtained from SHA256 hash values of the original image. In the scrambling stage, the chaotic sequences generated by 2D-LASM are used to get two column scrambling matrices and row scrambling matrix, respectively. The elements of the second column scrambling matrix and row scrambling matrix are used as row and column coordinates in the scrambling process. Then apply it to scrambling the DNA encoded image, which can complete the row and column scrambling at the same time. In the diffusion stage, we proposed a new diffusion method. Through the chaotic sequence generated by the LSS, a DNA coding sequence is obtained. DNA XOR operation is carried out on the central point and horizontal line of the image, and then spread from the central line to the upper and lower directions of the matrix to achieve the purpose of multi-directional diffusion and improve the encryption efficiency. Experimental results and security analysis show that the algorithm executes fast and has strong security. It can resist many attacks, such as statistical attacks, brute attacks, plaintext / select plaintext attacks, etc.
ISSN:1380-7501
1573-7721
DOI:10.1007/s11042-020-09454-9