A Novel One-Dimensional Chaotic System for Image Encryption Through the Three-Strand Structure of DNA

Wedi'i Gadw mewn:
Manylion Llyfryddiaeth
Cyhoeddwyd yn:Entropy vol. 27, no. 8 (2025), p. 776-796
Prif Awdur: Su Yingjie
Awduron Eraill: Han, Xia, Chen, Ziyu, Chen, Han, Huang Linqing
Cyhoeddwyd:
MDPI AG
Pynciau:
Mynediad Ar-lein:Citation/Abstract
Full Text + Graphics
Full Text - PDF
Tagiau: Ychwanegu Tag
Dim Tagiau, Byddwch y cyntaf i dagio'r cofnod hwn!

MARC

LEADER 00000nab a2200000uu 4500
001 3244012967
003 UK-CbPIL
022 |a 1099-4300 
024 7 |a 10.3390/e27080776  |2 doi 
035 |a 3244012967 
045 2 |b d20250101  |b d20251231 
084 |a 231460  |2 nlm 
100 1 |a Su Yingjie  |u School of Advanced Manufacturing, Guangdong University of Technology, Jieyang 522000, China; 3122008941@mail2.gdut.edu.cn (Y.S.); 3122008947@mail2.gdut.edu.cn (H.X.); 3223008668@mail2.gdut.edu.cn (Z.C.) 
245 1 |a A Novel One-Dimensional Chaotic System for Image Encryption Through the Three-Strand Structure of DNA 
260 |b MDPI AG  |c 2025 
513 |a Journal Article 
520 3 |a Digital images have been widely applied in fields such as mobile devices, the Internet of Things, and medical imaging. Although significant progress has been made in image encryption technology, it still faces many challenges, such as attackers using powerful computing resources and advanced algorithms to crack encryption systems. To address these challenges, this paper proposes a novel image encryption algorithm based on one-dimensional sawtooth wave chaotic system (1D-SAW) and the three-strand structure of DNA. Firstly, a new 1D-SAW chaotic system was designed. By introducing nonlinear terms and periodic disturbances, this system is capable of generating chaotic sequences with high randomness and initial value sensitivity. Secondly, a new diffusion rule based on the three-strand structure of DNA is proposed. Compared with the traditional DNA encoding and XOR operation, this rule further enhances the complexity and anti-attack ability of the encryption process. Finally, the security and randomness of the 1D-SAW and image encryption algorithms were verified through various tests. Results show that this method exhibits better performance in resisting statistical attacks and differential attacks. 
653 |a Cryptography 
653 |a Encryption 
653 |a Deoxyribonucleic acid--DNA 
653 |a Randomness 
653 |a Algorithms 
653 |a Data encryption 
653 |a Sequences 
653 |a Internet of Things 
653 |a Hydrogen bonds 
653 |a Chaos theory 
653 |a Medical imaging 
700 1 |a Han, Xia  |u School of Advanced Manufacturing, Guangdong University of Technology, Jieyang 522000, China; 3122008941@mail2.gdut.edu.cn (Y.S.); 3122008947@mail2.gdut.edu.cn (H.X.); 3223008668@mail2.gdut.edu.cn (Z.C.) 
700 1 |a Chen, Ziyu  |u School of Advanced Manufacturing, Guangdong University of Technology, Jieyang 522000, China; 3122008941@mail2.gdut.edu.cn (Y.S.); 3122008947@mail2.gdut.edu.cn (H.X.); 3223008668@mail2.gdut.edu.cn (Z.C.) 
700 1 |a Chen, Han  |u School of Marine Science and Technology, Shanwei Institute of Technology, Shanwei 516600, China; hanchengdut@gmail.com 
700 1 |a Huang Linqing  |u School of Advanced Manufacturing, Guangdong University of Technology, Jieyang 522000, China; 3122008941@mail2.gdut.edu.cn (Y.S.); 3122008947@mail2.gdut.edu.cn (H.X.); 3223008668@mail2.gdut.edu.cn (Z.C.) 
773 0 |t Entropy  |g vol. 27, no. 8 (2025), p. 776-796 
786 0 |d ProQuest  |t Engineering Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3244012967/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text + Graphics  |u https://www.proquest.com/docview/3244012967/fulltextwithgraphics/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3244012967/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch