Image encryption through RNA approach assisted with neural key sequences

  • R. Santhiya Devi
  • A. R. Nirmal Aravind
  • J. Christopher Vishal
  • D. Amritha
  • K. Thenmozhi
  • John Bosco Balaguru Rayappan
  • Amirtharajan Rengarajan
  • Praveenkumar PadmapriyaEmail author


In this paper, an image encryption algorithm is proposed for the first time, which uses coding deoxyribonucleic acid (DNA) sequences to transcript its complementary messenger ribonucleic acid (mRNA) sequence. A binary associative memory neural network (BAM NN) is trained to produce the required transfer ribonucleic acid (tRNA) sequences to bond with the mRNA sequences to assign the correct amino acids. DNA and mRNA sequences, together with tRNA sequences, provide the permutation and diffusion operations for the pixels in colour digital imaging and communications in medicine images. Then, keys, which are determined by the generated amino acids, are used to encrypt the diffused cipher pixels further. Also key sharing has been carried out using Universal Software Radio Peripheral (USRP), cloud infrastructure and One Time Password (OTP) generation mechanisms.The different sequence formation can also identify any alterations made by the intruder in the amino acid, which results in the wrong set of key generation. Various decryption quality analyses, statistical and differential attack analyses (namely mean square error, unified average changing intensity, peak signal-to-noise ratio, number of pixel changing rate, entropy, mean absolute error, key sensitivity, cropping attacks, and chosen-plaintext attacks), and correlation tests were carried out to confirm the robustness of the proposed algorithm.





  1. 1.
    Abd-El-Hafiz SK, AbdElHaleem SH, Radwan AG (2016) Novel permutation measures for image encryption algorithms. Opt Lasers Eng 85:72–83CrossRefGoogle Scholar
  2. 2.
    Alam S, Hasan SMR (2017) A gene–protein–miRNA electronic oscillator. IEEE Transactions on Circuits and Systems II: Express Briefs 64(9):1007–1011CrossRefGoogle Scholar
  3. 3.
    Al-Haj A (2015) Providing integrity, authenticity, and confidentiality for header and pixel data of DICOM images. J Digit Imaging 28(2):179–187MathSciNetCrossRefGoogle Scholar
  4. 4.
    Arumugham S, Rajagopalan S, Rayappan JBB, Amirtharajan R (2018) Networked medical data sharing on secure medium-a web publishing mode for DICOM viewer with three-layer authentication. J Biomed Inform 1:2Google Scholar
  5. 5.
    Barani MJ, MiladYousefi VPA (2019) A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map. Optik 187:205–222CrossRefGoogle Scholar
  6. 6.
    Chai X, Fu X, Gan Z (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44–62CrossRefGoogle Scholar
  7. 7.
    Chai X, Gan Z, Yuan K, Chen Y, Liu X (2017) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput & Applic:1–19Google Scholar
  8. 8.
    Chandrasekaran J, Thiruvengadam SJ, Rey D (2017) A Hybrid Chaotic and Number Theoretic Approach for Securing DICOM Images. Secur. Commun. Networks, vol. 2017, no. Article ID 6729896, p. 12 pages.CrossRefGoogle Scholar
  9. 9.
    Chen W (2016) Optical multiple-image encryption using three-dimensional space. Photonics Journal IEEE 8:1–8Google Scholar
  10. 10.
    Diaconu AV (2016) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf Sci 355:314–327CrossRefGoogle Scholar
  11. 11.
    Ding W, Xie Y, Wang Y (2019) Image authentication and tamper localization based on relative difference between DCT coefficient and its estimated value. Multimed Tools ApplGoogle Scholar
  12. 12.
    El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144–157CrossRefGoogle Scholar
  13. 13.
    Fu C, Meng W, Zhan Y, Zhu Z, Lau FCM, Tse CK, Ma H (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43(8):1000–1010CrossRefGoogle Scholar
  14. 14.
    Fu C, Zhang G, Bian O, Lei W, Ma H (2014) A novel medical image protection scheme using a 3-dimensional chaotic system. PLoS One 9:e115773CrossRefGoogle Scholar
  15. 15.
    Higgs PG (2000) RNA secondary structure: physical and computational aspects. Q Rev Biophys 33(3):199–253CrossRefGoogle Scholar
  16. 16.
    Kocabas O, Soyata T, Aktas MK (2016) Emerging Security Mechanisms for Medical Cyber Physical Systems. IEEE/ACM Transactions on Computational Biology and Bioinformatics 13(3):401–416CrossRefGoogle Scholar
  17. 17.
    Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 1:6–21CrossRefGoogle Scholar
  18. 18.
    Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie–Hellman cryptography. Signal Process 125:187–202CrossRefGoogle Scholar
  19. 19.
    Lee SH, Lee EJ, Hwang WJ, Kwon KR (2017) Reversible DNA data hiding using multiple difference expansions for DNA authentication and storage. Multimed Tools Appl 77:1–28CrossRefGoogle Scholar
  20. 20.
    Leier A, Richter C, Banzhaf W, Rauhe H (2000) Cryptography with DNA binary strands. Biosystems 57:13–22CrossRefGoogle Scholar
  21. 21.
    Liu P, Zhang T, Li X (2019) A new color image encryption algorithm based on DNA and spatial chaotic map. Multimed Tools Appl 78:14823–14835CrossRefGoogle Scholar
  22. 22.
    Menezes AJ, Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC PressGoogle Scholar
  23. 23.
    Neveu M, Kim HJ, Benner SA (2013) The "strong" RNA world hypothesis: fifty years old. Astrobiology 13(4):391–403CrossRefGoogle Scholar
  24. 24.
    Patel BH, Percivalle C, Ritson DJ, Duffy CD, Sutherlan JD Common origins of RNA, protein and lipid precursors in a cyanosulfidic protometabolism. Nat Chem 7(4):301–307CrossRefGoogle Scholar
  25. 25.
    Praveenkumar P, Amirtharajan R, Thenmozhi K, Balaguru Rayappan JB (2015) Medical data sheet in safe havens - a tri- layer cryptic solution. Comput Biol Med 62:264–276CrossRefGoogle Scholar
  26. 26.
    Praveenkumar P, Amirtharajan R, Thenmozhi K, Rayappan JBB (2016) Fusion of confusion and diffusion: a novel image encryption approach. Telecommun Syst:1–14Google Scholar
  27. 27.
    Premkumar R, Anand S (2019) Secured and compound 3-D chaos image encryption using hybrid mutation and crossover operator. Multimed Tools Appl 78:9577–9593CrossRefGoogle Scholar
  28. 28.
    Qiang Z, Xiaopeng W (2013) RGB color image encryption method based on Lorenz chaotic system and DNA computation. IETE Tech Rev 30(5):404–409CrossRefGoogle Scholar
  29. 29.
    Ravichandran D, Praveenkumar P, Balaguru Rayappan JB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170–184CrossRefGoogle Scholar
  30. 30.
    Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R DNA Chaos Blend to Secure Medical Privacy. IEEE Transactions on NanoBioscience 16(8):850–858CrossRefGoogle Scholar
  31. 31.
    Rehman AU, Liao XF, Kulsoom A, Abbas SA (2015) Selective encryption for gray images based on chaos and DNA complementary rules. Multimed Tools Appl 74:4655–4677CrossRefGoogle Scholar
  32. 32.
    Shabash B, Wiese KC (2017) RNA Visualization: Relevance and the Current State-of-the-Art Focusing on Pseudoknots. IEEE/ACM Transactions on Computational Biology and Bioinformatics 14(3):696–712CrossRefGoogle Scholar
  33. 33.
    Singh HV, Agarwal R (2018) Diagnosis of Carious Legions Using Digital Processing of Dental Radiographs. Springer, Cham, pp 864–882Google Scholar
  34. 34.
    Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl 78:3457–3470CrossRefGoogle Scholar
  35. 35.
    Tinoco I, Bustamante C (1999) How RNA folds. J Mol Biol 293(2):271–281CrossRefGoogle Scholar
  36. 36.
    Wang X, Liu C (2017) A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed Tools Appl 76(5):6229–6245CrossRefGoogle Scholar
  37. 37.
    Wang H, Quigley GJ, Kolpak FJ, Crawford JL, van Boom JH, Van der Marel G, Rich A (1979) Molecular structure of a left-handed double helical DNA fragment at atomic resolution. Nature 282(5740):680–686CrossRefGoogle Scholar
  38. 38.
    Wang X-Y, Zhang Y-Q, Bao X-M (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61CrossRefGoogle Scholar
  39. 39.
    Watson D, Crick FHC A structure for Deoxyribose Nucleic Acid. Nature 171:737–738Google Scholar
  40. 40.
    Wu Y, Member S, Noonan JP, Member L (2011) NPCR and UACI randomness tests for image encryption. Cyber Journals Multidiscip Journals Sci Technol J Sel Areas Telecommun:31–38Google Scholar
  41. 41.
    Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci (Ny) 222:323–342MathSciNetCrossRefGoogle Scholar
  42. 42.
    Zhang S, Gao T, Gao L (2014) A novel encryption frame for medical image with watermark based on hyperchaotic system. Math Probl Eng 2014Google Scholar
  43. 43.
    Zhang J, Huo D (2019) Image encryption algorithm based on quantum chaotic map and DNA coding. Multimed Tools Appl 78:15605–15621CrossRefGoogle Scholar
  44. 44.
    Zhong C, Andrews J, Zhang S (2012) Discovering non-coding RNA elements in drosophila 3’ untranslated regions. 2012 IEEE 2nd International Conference on Computational Advances in Bio and medical Sciences (ICCABS), Las Vegas, pp. 1–6Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2020

Authors and Affiliations

  • R. Santhiya Devi
    • 1
  • A. R. Nirmal Aravind
    • 1
  • J. Christopher Vishal
    • 1
  • D. Amritha
    • 1
  • K. Thenmozhi
    • 1
  • John Bosco Balaguru Rayappan
    • 1
  • Amirtharajan Rengarajan
    • 1
  • Praveenkumar Padmapriya
    • 1
    Email author
  1. 1.School of Electrical & Electronics EngineeringSASTRA Deemed UniversityThanjavurIndia

Personalised recommendations