A Novel One-Dimensional Chaotic System for Image Encryption Through the Three-Strand Structure of DNA
Wedi'i Gadw mewn:
| Cyhoeddwyd yn: | Entropy vol. 27, no. 8 (2025), p. 776-796 |
|---|---|
| Prif Awdur: | |
| Awduron Eraill: | , , , |
| Cyhoeddwyd: |
MDPI AG
|
| Pynciau: | |
| Mynediad Ar-lein: | Citation/Abstract Full Text + Graphics Full Text - PDF |
| Tagiau: |
Dim Tagiau, Byddwch y cyntaf i dagio'r cofnod hwn!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3244012967 | ||
| 003 | UK-CbPIL | ||
| 022 | |a 1099-4300 | ||
| 024 | 7 | |a 10.3390/e27080776 |2 doi | |
| 035 | |a 3244012967 | ||
| 045 | 2 | |b d20250101 |b d20251231 | |
| 084 | |a 231460 |2 nlm | ||
| 100 | 1 | |a Su Yingjie |u School of Advanced Manufacturing, Guangdong University of Technology, Jieyang 522000, China; 3122008941@mail2.gdut.edu.cn (Y.S.); 3122008947@mail2.gdut.edu.cn (H.X.); 3223008668@mail2.gdut.edu.cn (Z.C.) | |
| 245 | 1 | |a A Novel One-Dimensional Chaotic System for Image Encryption Through the Three-Strand Structure of DNA | |
| 260 | |b MDPI AG |c 2025 | ||
| 513 | |a Journal Article | ||
| 520 | 3 | |a Digital images have been widely applied in fields such as mobile devices, the Internet of Things, and medical imaging. Although significant progress has been made in image encryption technology, it still faces many challenges, such as attackers using powerful computing resources and advanced algorithms to crack encryption systems. To address these challenges, this paper proposes a novel image encryption algorithm based on one-dimensional sawtooth wave chaotic system (1D-SAW) and the three-strand structure of DNA. Firstly, a new 1D-SAW chaotic system was designed. By introducing nonlinear terms and periodic disturbances, this system is capable of generating chaotic sequences with high randomness and initial value sensitivity. Secondly, a new diffusion rule based on the three-strand structure of DNA is proposed. Compared with the traditional DNA encoding and XOR operation, this rule further enhances the complexity and anti-attack ability of the encryption process. Finally, the security and randomness of the 1D-SAW and image encryption algorithms were verified through various tests. Results show that this method exhibits better performance in resisting statistical attacks and differential attacks. | |
| 653 | |a Cryptography | ||
| 653 | |a Encryption | ||
| 653 | |a Deoxyribonucleic acid--DNA | ||
| 653 | |a Randomness | ||
| 653 | |a Algorithms | ||
| 653 | |a Data encryption | ||
| 653 | |a Sequences | ||
| 653 | |a Internet of Things | ||
| 653 | |a Hydrogen bonds | ||
| 653 | |a Chaos theory | ||
| 653 | |a Medical imaging | ||
| 700 | 1 | |a Han, Xia |u School of Advanced Manufacturing, Guangdong University of Technology, Jieyang 522000, China; 3122008941@mail2.gdut.edu.cn (Y.S.); 3122008947@mail2.gdut.edu.cn (H.X.); 3223008668@mail2.gdut.edu.cn (Z.C.) | |
| 700 | 1 | |a Chen, Ziyu |u School of Advanced Manufacturing, Guangdong University of Technology, Jieyang 522000, China; 3122008941@mail2.gdut.edu.cn (Y.S.); 3122008947@mail2.gdut.edu.cn (H.X.); 3223008668@mail2.gdut.edu.cn (Z.C.) | |
| 700 | 1 | |a Chen, Han |u School of Marine Science and Technology, Shanwei Institute of Technology, Shanwei 516600, China; hanchengdut@gmail.com | |
| 700 | 1 | |a Huang Linqing |u School of Advanced Manufacturing, Guangdong University of Technology, Jieyang 522000, China; 3122008941@mail2.gdut.edu.cn (Y.S.); 3122008947@mail2.gdut.edu.cn (H.X.); 3223008668@mail2.gdut.edu.cn (Z.C.) | |
| 773 | 0 | |t Entropy |g vol. 27, no. 8 (2025), p. 776-796 | |
| 786 | 0 | |d ProQuest |t Engineering Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3244012967/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text + Graphics |u https://www.proquest.com/docview/3244012967/fulltextwithgraphics/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3244012967/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |