Efficient DNA-Based Logistic Mapping Algorithm for Color Image Encryption

Gardado en:
Detalles Bibliográficos
Publicado en:EAI Endorsed Transactions on Scalable Information Systems vol. 12, no. 2 (Apr 2025)
Autor Principal: Goudjil, Aya
Outros autores: Benyoucef, Aicha, Hamadouche, M'Hamed, Riahla, Mohamed Amine
Publicado:
European Alliance for Innovation (EAI)
Materias:
Acceso en liña:Citation/Abstract
Full Text - PDF
Etiquetas: Engadir etiqueta
Sen Etiquetas, Sexa o primeiro en etiquetar este rexistro!
Descripción
Resumo:INTRODUCTION: Color images hold significant information and are widely used in diverse domains. The protection of these images against unauthorized access over the internet is a necessity that relies on encryption techniques. However, traditional encryption methods face challenges with the increasing capability and efficiency of quantum computing to solve complex problems. DNA cryptography is a promising field in information security, utilizing DNA molecules with massive parallelism and vast storage capacity to encode and decode information. While chaotic systems have been widely used in encryption due to their sensitivity to initial conditions and parameter values, resulting in unpredictability and significant variation. Exploiting the characteristics of DNA cryptography and chaotic systems is a promising alternative for securing data. Nevertheless, current methodologies exhibit limitations such as a small key space and weak resistance to differential attacks.OBJECTIVES: This paper addresses these gaps by proposing an RGB image encryption algorithm based on DNA cryptography and a 1D logistic map.METHODS: The proposed method randomly generates a DNA encoding/decoding table to generate the row-column permutation of the image. After the permutation of the image, the logistic map is used to generate three keys for RGB channels and seven DNA encoding-decoding rules, three are used to encode the keys into DNA sequence, the second three to encode the image RGB channel, and the last to perform the DNA-XOR operation. Finally, decode the result into integers using the DNA encoding/decoding table and generate the encrypted image.RESULTS: The analysis of the proposed technique demonstrates significant robustness against various attacks, as evidenced by metrics such as a key space exceeding 2100, an average NPCR of 99.613667%, an average UACI of 50.273742%, an entropy value approaching 8, and a strong key sensitivity.CONCLUSION: These results validate its capacity to effectively resist differential, brute-force, and statistical attacks.
ISSN:2032-9407
DOI:10.4108/eetsis.6800
Fonte:Advanced Technologies & Aerospace Database