International Journal of

ADVANCED AND APPLIED SCIENCES

EISSN: 2313-3724, Print ISSN: 2313-626X

Frequency: 12

line decor
  
line decor

 Volume 11, Issue 6 (June 2024), Pages: 128-138

----------------------------------------------

 Original Research Paper

Toward robust image encryption based on chaos theory and DNA computing

 Author(s): 

 Usman Asghar 1, Shahzad Yousaf 2, Areej Fatima 3, Muhammad Saleem 4, *, Muhammad Ahsan Raza 5, Taher M. Ghazal 6, 7, 8

 Affiliation(s):

 1Department of Computer Science, National College of Business Administration and Economics, Lahore, Pakistan
 2School of Integrated and Social Sciences (SISS), University of Lahore, Lahore, Pakistan
 3Department of Computer Science, Lahore Garrison University, Lahore, Pakistan
 4School of Computer Science, Minhaj University Lahore, Lahore, Pakistan
 5Department of Information Sciences, University of Education, Lahore, Multan Campus 60000, Pakistan
 6Centre for Cyber Physical Systems, Computer Science Department, Khalifa University, Abu Dhabi, United Arab Emirates
 7Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (UKM), 43600 Bangi, Selangor, Malaysia
 8Applied Science Research Center, Applied Science Private University, Amman 11937, Jordan

 Full text

  Full Text - PDF

 * Corresponding Author. 

  Corresponding author's ORCID profile: https://orcid.org/0000-0002-5209-8375

 Digital Object Identifier (DOI)

 https://doi.org/10.21833/ijaas.2024.06.014

 Abstract

Due to the significant importance of image security for various users, there is an ongoing need to develop innovative algorithms to enhance this security. Image security typically involves encryption techniques. This study has tackled the challenge of creating an efficient, secure, and resilient image cipher by using pixel-swapping techniques at both DNA and decimal levels. The swapping methods include four different approaches that involve randomly selecting pixel pairs to swap with adjacent pixels—either left, right, upper, or lower—based on random numbers generated by a chaotic map. Specifically, the 2D Tinkerbell chaotic map was used to generate the necessary random numbers for diffusion and confusion processes in the encryption. Additionally, through careful arithmetic operations, two more random number streams were derived from the main streams produced by the chaotic map. Thorough performance analyses and computer simulations have shown that this image cipher is robust, secure, and resilient against various threats, making it suitable for practical applications. Notably, the cipher achieved a very high information entropy value of 7.9975, indicating its effectiveness in encryption.

 © 2024 The Authors. Published by IASE.

 This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

 Keywords

 Image cipher, Pixel swapping, Chaotic map, Encryption techniques, Information entropy

 Article history

 Received 17 December 2023, Received in revised form 25 April 2024, Accepted 30 May 2024

 Acknowledgment 

No Acknowledgment.

 Compliance with ethical standards

 Conflict of interest: The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.

 Citation:

 Asghar U, Yousaf S, Fatima A, Saleem M, Raza MA, and Ghazal TM (2024). Toward robust image encryption based on chaos theory and DNA computing. International Journal of Advanced and Applied Sciences, 11(6): 128-138

 Permanent Link to this page

 Figures

 Fig. 1 Fig. 2 Fig. 3 Fig. 4 Fig. 5 Fig. 6 Fig. 7 Fig. 8 

 Tables

 Table 1 Table 2 Table 3 Table 4 Table 5 Table 6 Table 7 Table 8 Table 9 Table 10

----------------------------------------------   

 References (38)

  1. Adleman LM (1994). Molecular computation of solutions to combinatorial problems. Science, 266(5187): 1021-1024. https://doi.org/10.1126/science.7973651   [Google Scholar] PMid:7973651
  2. Babaei M (2013). A novel text and image encryption method based on chaos theory and DNA computing. Natural Computing, 12(1): 101-107. https://doi.org/10.1007/s11047-012-9334-9   [Google Scholar]
  3. Batool T, Abbas S, Alhwaiti Y, Saleem M, Ahmad M, Asif M, and Elmitwal NS (2021). Intelligent model of ecosystem for smart cities using artificial neural networks. Intelligent Automation and Soft Computing, 30(2): 513-525. https://doi.org/10.32604/iasc.2021.018770   [Google Scholar]
  4. Chai X, Fu X, Gan Z, Lu Y, and Chen Y (2019). A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Processing, 155: 44-62. https://doi.org/10.1016/j.sigpro.2018.09.029   [Google Scholar]
  5. Chai X, Zheng X, Gan Z, Han D, and Chen Y (2018). An image encryption algorithm based on chaotic system and compressive sensing. Signal Processing, 148: 124-144. https://doi.org/10.1016/j.sigpro.2018.02.007   [Google Scholar]
  6. Enayatifar R, Abdullah AH, and Isnin IF (2014). Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Optics and Lasers in Engineering, 56: 83-93. https://doi.org/10.1016/j.optlaseng.2013.12.003   [Google Scholar]
  7. Guesmi R, Farah MAB, Kachouri A, and Samet M (2016). A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dynamics, 83: 1123-1136. https://doi.org/10.1007/s11071-015-2392-7   [Google Scholar]
  8. Guo Z, and Sun P (2022). Improved reverse zigzag transform and DNA diffusion chaotic image encryption method. Multimedia Tools and Applications, 81(8): 11301-11323. https://doi.org/10.1007/s11042-022-12269-5   [Google Scholar]
  9. Hanif M, Abbas S, Khan MA, Iqbal N, Rehman ZU, Saeed MA, and Mohamed EM (2020). A novel and efficient multiple RGB images cipher based on chaotic system and circular shift operations. IEEE Access, 8: 146408-146427. https://doi.org/10.1109/ACCESS.2020.3015085   [Google Scholar]
  10. Iqbal N, Abbas S, Khan MA, Alyas T, Fatima A, and Ahmad A (2019). An RGB image cipher using chaotic systems, 15-puzzle problem and DNA computing. IEEE Access, 7: 174051-174071. https://doi.org/10.1109/ACCESS.2019.2956389   [Google Scholar]
  11. Iqbal N, Abbas S, Khan MA, Fatima A, Ahmed A, and Anwer N (2020a). Efficient image cipher based on the movement of king on the chessboard and chaotic system. Journal of Electronic Imaging, 29(2): 023025. https://doi.org/10.1117/1.JEI.29.2.023025   [Google Scholar]
  12. Iqbal N, Hanif M, Abbas S, Khan MA, Almotiri SH, and Al Ghamdi MA (2020b). DNA strands level scrambling based color image encryption scheme. IEEE Access, 8: 178167-178182. https://doi.org/10.1109/ACCESS.2020.3025241   [Google Scholar]
  13. Iqbal N, Hanif M, Abbas S, Khan MA, and Rehman ZU (2021a). Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding. Journal of Information Security and Applications, 58: 102809. https://doi.org/10.1016/j.jisa.2021.102809   [Google Scholar]
  14. Iqbal N, Hanif M, Rehman ZU, and Zohaib M (2022). On the novel image encryption based on chaotic system and DNA computing. Multimedia Tools and Applications, 81(6): 8107-8137. https://doi.org/10.1007/s11042-022-11912-5   [Google Scholar]
  15. Iqbal N, Naqvi RA, Atif M, Khan MA, Hanif M, Abbas S, and Hussain D (2021b). On the image encryption algorithm based on the chaotic system, DNA encoding, and castle. IEEE Access, 9: 118253-118270. https://doi.org/10.1109/ACCESS.2021.3106028   [Google Scholar]
  16. Khan AH, Abbas S, Khan MA, Farooq U, Khan WA, Siddiqui SY, and Ahmad A (2022). Intelligent model for brain tumor identification using deep learning. Applied Computational Intelligence and Soft Computing, 2022: 8104054. https://doi.org/10.1155/2022/8104054   [Google Scholar]
  17. Khan MA, Umair M, Saleem MA, Ali MN, and Abbas S (2019). CDE using improved opposite based swarm optimization for MIMO systems. Journal of Intelligent and Fuzzy Systems, 37(1): 687-692. https://doi.org/10.3233/JIFS-181127   [Google Scholar]
  18. Khan MF, Ghazal TM, Said RA, Fatima A, Abbas S, Khan MA, Issa GF, Ahmad M, and Khan MA (2021). An IoMT-enabled smart healthcare model to monitor elderly people using machine learning technique. Computational Intelligence and Neuroscience, 2021: 2487759. https://doi.org/10.1155/2021/2487759   [Google Scholar] PMid:34868288 PMCid:PMC8639263
  19. King OD and Gaborit P (2007). Binary templates for comma-free DNA codes. Discrete Applied Mathematics, 155(6-7): 831-839. https://doi.org/10.1016/j.dam.2005.07.015   [Google Scholar]
  20. Kolivand H, Hamood SF, Asadianfam S, and Rahim MS (2024). Image encryption techniques: A comprehensive review. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-023-17896-0   [Google Scholar]
  21. Liu L, Hao S, Lin J, Wang Z, Hu X, and Miao S (2018). Image block encryption algorithm based on chaotic maps. IET Signal Processing, 12(1): 22-30. https://doi.org/10.1049/iet-spr.2016.0584   [Google Scholar]
  22. Liu L, Zhang Q, and Wei X (2012). A RGB image encryption algorithm based on DNA encoding and chaos map. Computers and Electrical Engineering, 38(5): 1240-1248. https://doi.org/10.1016/j.compeleceng.2012.02.007   [Google Scholar]
  23. Ma Y, Li C, and Ou B (2020). Cryptanalysis of an image block encryption algorithm based on chaotic maps. Journal of Information Security and Applications, 54: 102566. https://doi.org/10.1016/j.jisa.2020.102566   [Google Scholar]
  24. Malhotra P, Singh Y, Anand P, Bangotra DK, Singh PK, and Hong WC (2021). Internet of things: Evolution, concerns and security challenges. Sensors, 21(5): 1809. https://doi.org/10.3390/s21051809   [Google Scholar] PMid:33807724 PMCid:PMC7962037
  25. Mohamad Zulkufli NL, Turaev S, Mohd Tamrin MI, and Messikh A (2019). Watson-Crick linear grammars. In: Abawajy J, Othman M, Ghazali R, Deris M, Mahdin H, and Herawan T (Eds.), Proceedings of the International Conference on Data Engineering 2015 (DaEng-2015). Lecture Notes in Electrical Engineering, 520: 403-412. Springer, Singapore, Singapore. https://doi.org/10.1007/978-981-13-1799-6_42   [Google Scholar]
  26. Özkaynak F, Özer AB, and Yavuz S (2013). Security analysis of an image encryption algorithm based on chaos and DNA encoding. In the 21st Signal Processing and Communications Applications Conference, IEEE. Haspolat, Turkey: 1-4. https://doi.org/10.1109/SIU.2013.6531597   [Google Scholar]
  27. Popli M (2019). DNA cryptography: A novel approach for data security using flower pollination algorithm. In the Proceedings of International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM), Amity University Rajasthan, Jaipur, India.   [Google Scholar]
  28. Shannon CE (1949). Communication theory of secrecy systems. The Bell System Technical Journal, 28(4): 656-715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x   [Google Scholar]
  29. Siddiqui SY, Khan MA, Abbas S, and Khan F (2022). Smart occupancy detection for road traffic parking using deep extreme learning machine. Journal of King Saud University-Computer and Information Sciences, 34(3): 727-733. https://doi.org/10.1016/j.jksuci.2020.01.016   [Google Scholar]
  30. Sun S, Guo Y, and Wu R (2019). A novel image encryption scheme based on 7D hyperchaotic system and row-column simultaneous swapping. IEEE Access, 7: 28539-28547. https://doi.org/10.1109/ACCESS.2019.2901870   [Google Scholar]
  31. Wang X, Wang Y, Zhu X, and Luo C (2020). A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level. Optics and Lasers in Engineering, 125: 105851. https://doi.org/10.1016/j.optlaseng.2019.105851   [Google Scholar]
  32. Wei X, Guo L, Zhang Q, Zhang J, and Lian S (2012). A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. Journal of Systems and Software, 85(2): 290-299. https://doi.org/10.1016/j.jss.2011.08.017   [Google Scholar]
  33. Wu X, Wang K, Wang X, Kan H, and Kurths J (2018). Color image DNA encryption using NCA map-based CML and one-time keys. Signal Processing, 148: 272-287. https://doi.org/10.1016/j.sigpro.2018.02.028   [Google Scholar]
  34. Xiong Z, Wu Y, Ye C, Zhang X, and Xu F (2019). Color image chaos encryption algorithm combining CRC and nine palace map. Multimedia Tools and Applications, 78(22): 31035-31055. https://doi.org/10.1007/s11042-018-7081-3   [Google Scholar]
  35. Zhang Q, Guo L, and Wei X (2010). Image encryption using DNA addition combining with chaotic maps. Mathematical and Computer Modelling, 52(11-12): 2028-2035. https://doi.org/10.1016/j.mcm.2010.06.005   [Google Scholar]
  36. Zhang Q, Guo L, and Wei X (2013). A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik-International Journal for Light and Electron Optics, 124(18): 3596-3600. https://doi.org/10.1016/j.ijleo.2012.11.018   [Google Scholar]
  37. Zhen P, Zhao G, Min L, and Jin X (2016). Chaos-based image encryption scheme combining DNA coding and entropy. Multimedia Tools and Applications, 75: 6303-6319. https://doi.org/10.1007/s11042-015-2573-x   [Google Scholar]
  38. Zhou Y, Bao L, and Chen CP (2014). A new 1D chaotic system for image encryption. Signal Processing, 97: 172-182. https://doi.org/10.1016/j.sigpro.2013.10.034   [Google Scholar]