A novel image encryption algorithm using PWLCM map-based CML chaotic system and dynamic DNA encryption

A novel image encryption scheme based on deoxyribonucleic acid (DNA) is proposed utilizing the hash function and coupled map lattices (CML) based on the piecewise linear chaotic map (PWLCM) in this paper. First, the chaotic sequences for the entire encryption process are generated by the PWLCM map-b...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Multimedia tools and applications 2021-09, Vol.80 (21-23), p.32841-32861
Hauptverfasser: Tian, Junfeng, Lu, Yi, Zuo, Xianyu, Liu, Yang, Qiao, Baojun, Fan, Minghu, Ge, Qiang, Fan, Sujuan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:A novel image encryption scheme based on deoxyribonucleic acid (DNA) is proposed utilizing the hash function and coupled map lattices (CML) based on the piecewise linear chaotic map (PWLCM) in this paper. First, the chaotic sequences for the entire encryption process are generated by the PWLCM map-based CML chaotic system, and the external keys and hash value of the plain image are employed to calculate the control parameters and initial values of the CML system and PWLCM map. Especially the f ( x ) sequences generated by PWLCM map are used many times. Second, in accordance with the chaotic sequences produced by CML and PWLCM map, the encryption process is divided into three modules. Module one is to implement pixel-level encryption through sort function and exclusive OR (XOR) operation. Then, the DNA encoding and decoding rules are dynamic selected by chaotic sequences. DNA-level encryption is carried out in module two by cyclic shift function and dynamic DNA permutation rules. Finally, a second diffusion encryption at pixel level is performed in module three through XOR operation to further enhance the utilization of chaotic sequences and security of the image encryption system. The results of experiment and security analyses have certified that the proposed scheme has an outstanding property and can withstand a variety of typical attacks.
ISSN:1380-7501
1573-7721
DOI:10.1007/s11042-021-11218-y