论文标题

新型保守性混乱驱动的动态DNA编码图像加密

A novel conservative chaos driven dynamic DNA coding for image encryption

论文作者

Patidar, Vinod, Kaur, Gurpreet

论文摘要

在本文中,我们为图像加密提出了一种新型保守的混沌标准MAP驱动的动态DNA编码(编码,加法,减法和解码)。所提出的图像加密算法是一种动态DNA编码算法,即,对于每个像素的加密不同的规则,用于编码,加法/减法,解码等的不同规则是基于伪随机序列而随机选择的,该序列是在保守的混乱标准映射的帮助下生成的。我们提出了一种新颖的方式,可以通过保守的混沌标准图生成伪随机序列,并在最严格的伪随机测试套件(NIST测试套件)中进行严格的测试,然后再在建议的图像加密算法中使用它们。我们的图像加密算法结合了独特的进纸和反馈机制,以生成和修改动态的一次性像素,这些像素进一步用于加密普通图像的每个像素,因此,在明文上以及ciphertext上引起了所需的灵敏度。该算法中使用的所有控制伪序序列都是针对通过混乱图的迭代(在生成过程中)的迭代物相互依赖的参数的不同值(秘密键的一部分)生成的,因此也具有极端的密钥灵敏度。性能和安全性分析已通过直方图分析,相关分析,信息熵分析,基于DNA序列的分析,感知质量分析,关键灵敏度分析,宣传敏感性分析等进行了广泛的执行,结果是有希望的,并证明了算法对各种常见的密码攻击的鲁棒性。

In this paper, we propose a novel conservative chaotic standard map-driven dynamic DNA coding (encoding, addition, subtraction and decoding) for the image encryption. The proposed image encryption algorithm is a dynamic DNA coding algorithm i.e., for the encryption of each pixel different rules for encoding, addition/subtraction, decoding etc. are randomly selected based on the pseudorandom sequences generated with the help of the conservative chaotic standard map. We propose a novel way to generate pseudo-random sequences through the conservative chaotic standard map and also test them rigorously through the most stringent test suite of pseudo-randomness, the NIST test suite, before using them in the proposed image encryption algorithm. Our image encryption algorithm incorporates a unique feed-forward and feedback mechanisms to generate and modify the dynamic one-time pixels that are further used for the encryption of each pixel of the plain image, therefore, bringing in the desired sensitivity on plaintext as well as ciphertext. All the controlling pseudorandom sequences used in the algorithm are generated for a different value of the parameter (part of the secret key) with inter-dependency through the iterates of the chaotic map (in the generation process) and therefore possess extreme key sensitivity too. The performance and security analysis has been executed extensively through histogram analysis, correlation analysis, information entropy analysis, DNA sequence-based analysis, perceptual quality analysis, key sensitivity analysis, plaintext sensitivity analysis, etc., The results are promising and prove the robustness of the algorithm against various common cryptanalytic attacks.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源