Advertisement

Multimedia Tools and Applications

, Volume 77, Issue 20, pp 27017–27039 | Cite as

A RGB image encryption technique using Lorenz and Rossler chaotic system on DNA sequences

  • Ashish Girdhar
  • Vijay Kumar
Article

Abstract

In this paper, a robust color image encryption system using Lorenz-Rossler chaotic map is proposed. The proposed encryption system uses hybrid of two chaotic systems namely Lorenz and Rossler to generate the random sequence. These generated sequences are used for encryption of red, green and blue channels of color image. Rules of DNA cryptosystem are used to encode the plain image in proposed approach. Cross channel operation is proposed to increase randomness in plain image. The proposed encryption approach is tested over different well-known images that are taken from USC-SIPI image dataset. Its performance is compared with recently developed eight image encryption techniques. The experimental results reveal that the proposed approach performs better than the existing techniques in terms of correlation coefficient. The security analyses such as statistical analysis and key sensitivity analysis are performed to validate the security of proposed encryption approach. The key space of proposed approach is large enough to resist against brute force attacks.

Keywords

Image encryption Chaotic systems DNA cryptography Lorenz-Rossler chaotic system 

References

  1. 1.
    Ahmad J, Ahmed F (2012) Efficiency analysis and security evaluation of image encryption schemes. Int J Video Image Processd Netw Secur 12(04):18–31Google Scholar
  2. 2.
    Alsafasfeh Q, Al-Arni M (2011) A new chaotic behavior from Lorenz and Rossler systems and its electronic circuit implementation. Circ Syst 02(02):101–105CrossRefGoogle Scholar
  3. 3.
    Arnold VI, Avez A (1968) Ergodic problems of classical mechanics. Mathematical physics monograph series. W.A. Benjamin, New YorkGoogle Scholar
  4. 4.
    Bashir Z, Rashid T, Zafar S (2016) Hyperchaotic dynamical system based image encryption scheme with time-varying delays. Pac Sci Rev A Nat Sci Eng 18(3):254–260, ISSN 2405-8823Google Scholar
  5. 5.
    Cao YY, Fu C (2008) An image encryption scheme based on high dimension chaos system. International conference on intelligent computation technology and automation vol. 1, pp 104-108, Changsha, Hunan, China October, 2008Google Scholar
  6. 6.
    Enayatifar R, Abdullah A, Isnin I (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93CrossRefGoogle Scholar
  7. 7.
    Gaborit P, King O (2005) Linear constructions for DNA codes. Theor Comput Sci 334(1–3):99–113MathSciNetCrossRefzbMATHGoogle Scholar
  8. 8.
    Gao T, Chen Z, Yuan Z, Chen G (2006) A hyperchaos generated from Chen's system. Int J Mod Phys C 17(04):471–478CrossRefzbMATHGoogle Scholar
  9. 9.
    Guan Z, Huang F, Guan W (2005) Chaos-based image encryption algorithm. Phys Lett A 346(1–3):153–157CrossRefzbMATHGoogle Scholar
  10. 10.
    Gupta R, Jain A (2014) A new image encryption algorithm based on DNA approach. Int J Comput Appl 85(18):27–31Google Scholar
  11. 11.
    Gupta S, Jain A (2015) Efficient image encryption algorithm using DNA approach. International conference on computing for sustainable global development (INDIACom), ISSN: 1511–0054, pp 726–731Google Scholar
  12. 12.
    IEEE Standard for Floating-Point Arithmetic-IEEE Xplore Document (2017) Ieeexplore.ieee.org, 2017. [Online]. Available: http://ieeexplore.ieee.org/document/4610935/. Accessed 06 Jan 2017
  13. 13.
    Jolfaei A, Wu X, Muthukkumarasamy V (Feb. 2016) On the security of permutation-only image encryption schemes. IEEE Trans Inf Forensics Secur 11(2):235–246CrossRefGoogle Scholar
  14. 14.
    Kadhim F, Majeed G, Ali R (2016) Proposal new s-box depending on DNA computing and mathematical operations. In Multidisciplinary in IT and communication science and applications (AIC-MITCSA), pp 1–6Google Scholar
  15. 15.
    Kong T, Zhang D (2004) A new anti-Arnold transformation algorithm. J Softw 15(10):1558–1564zbMATHGoogle Scholar
  16. 16.
    Kumar M, Powduri P, Reddy A (2015) An RGB image encryption using diffusion process associated with chaotic map. J Inf Secur Appl 21:20–30Google Scholar
  17. 17.
    Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie–Hellman cryptography. Signal Process 125:187–202CrossRefGoogle Scholar
  18. 18.
    Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320–3327MathSciNetCrossRefzbMATHGoogle Scholar
  19. 19.
    Liu X, Zhang J, Zhang J, He X (2008) Image scrambling algorithm based on chaos theory and sorting transformation. Int J Comput Sci Netw Secur 8(1):64–68Google Scholar
  20. 20.
    Liu L, Zhang Q, Wei X (2012) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38(5):1240–1248CrossRefGoogle Scholar
  21. 21.
    Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466CrossRefGoogle Scholar
  22. 22.
    Liu Y, Nie L, Han L, Zhang L, Rosenblum D (2015) Action2Activity: recognizing complex activities from sensor data. In Proceedings of international joint conference on artificial intelligence, pp 1617–1623Google Scholar
  23. 23.
    Liu Y, Zheng Y, Liu S, Rosenblum D (2016) Urban water quality prediction based on multi-task multi-view learning. Proceedings of the twenty-fifth international joint conference on artificial intelligence, pp 2576–2582Google Scholar
  24. 24.
    Liu L, Cheng L, Jia Y, Rosenblum D (2016) Recognizing complex activities by a probabilistic interval-based model. Proceedings of the thirtieth AAAI conference on artificial intelligence, pp 1266–1272Google Scholar
  25. 25.
    Liu Y, Liqiang N, Liu L, Rosenblum D (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108–115 ISSN 0925-2312CrossRefGoogle Scholar
  26. 26.
    Liu Y, Zhang L, Nie Y, Rosenblum D (2016) Fortune teller: predicting your career path. Proceedings of the thirtieth AAAI conference on artificial intelligence, pp 201–207Google Scholar
  27. 27.
    Lorenz EN (1963) Deterministic nonperiodic flow. J Atmos Sci 20(2):130–141CrossRefzbMATHGoogle Scholar
  28. 28.
    Mills AP, Yurke B, Platzman PM (1999) Article for analog vector algebra computation. Biosystems 52(1):175–180CrossRefzbMATHGoogle Scholar
  29. 29.
    Mishra D, Sharma R, Kumar M, Kumar K (2014) Security of color image data designed by public-key cryptosystem associated with 2D-DWT. Fractals 22(04):1450011MathSciNetCrossRefGoogle Scholar
  30. 30.
    Murillo-Escobar M, Cruz-Hernández C, Abundiz-Pérez F, López-Gutiérrez R, Acosta Del Campo O (2015) A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process 109:119–131CrossRefGoogle Scholar
  31. 31.
    Ni Z, Kang X, Wang L (2016) A novel image encryption algorithm based on bit-level improved Arnold transform and hyper chaotic map. In IEEE International Conference on Signal and Image Processing (ICSIP), Beijing, China, pp 156–160Google Scholar
  32. 32.
    Niu Y, Zhang X, Han F (2017) Image encryption algorithm based on Hyperchaotic maps and nucleotide sequences database. Comput Intell Neurosci 2017:1–9Google Scholar
  33. 33.
    Niyat A, HeiHei R, Vafaei Jahan M (2015) A RGB image encryption algorithm based on DNA sequence operation and hyper-chaotic system. Proceedings of International Congress on Technology, Communication and Knowledge, IranGoogle Scholar
  34. 34.
    Pareek N, Patidar V, Sud K (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934CrossRefGoogle Scholar
  35. 35.
    Pietro D, Liu Y, Hopkins D, Ungar L (2017) Beyond binary labels: political ideology prediction of twitter users. Proceedings of the 55th annual meeting of the association for computational linguistics Vol. 1, pp 729–740Google Scholar
  36. 36.
    Ping P, Mao Y, Lv X, Xu F, Xu G (2015) An image scrambling algorithm using discrete Henon map. IEEE, Lijiang, pp 429–432Google Scholar
  37. 37.
    Qi D, Zou J, Han X (2000) A new class of scrambling transformation and its application in the image information covering. Sci China Ser E Technol Sci 43(3):304–312MathSciNetCrossRefzbMATHGoogle Scholar
  38. 38.
    Rossler OE (1976) An equation for continuous chaos. Phys Lett A 57(5):397–398, 1976CrossRefzbMATHGoogle Scholar
  39. 39.
    Saranya MR, Mohan AK, Anusudha K (2014) A composite image cipher using DNA sequence and genetic algorithm. IEEE, Mysore, pp 1022–1026Google Scholar
  40. 40.
    Saranya MR, Mohan AK, Anusudha K (2015) Algorithm for enhanced image security using DNA and genetic algorithm. IEEE, Kozhikode, pp 1–5Google Scholar
  41. 41.
    SIPI Image Database–Misc (2017) Sipi.usc.edu, 2017. [Online]. Available: http://sipi.usc.edu/database/database.php?volume=misc. Accessed 20 Jul 2017
  42. 42.
    Srividhya N, Vino T (2016) Genome based highly secured image using DNA cryptography and trellis algorithm. International conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp 1–6Google Scholar
  43. 43.
    Wang Y, Wong K, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514–522CrossRefGoogle Scholar
  44. 44.
    Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108MathSciNetCrossRefGoogle Scholar
  45. 45.
    Watson J, Crick F (1953) Molecular structure of nucleic acids: a structure for deoxyribose nucleic acid. Nature 171(4356):737–738CrossRefGoogle Scholar
  46. 46.
    Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299CrossRefGoogle Scholar
  47. 47.
    Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. J Sel Areas Telecommun (JSAT) 4:31–38Google Scholar
  48. 48.
    Xiang T, Wong K, Liao X (2007) Selective image encryption using a spatiotemporal chaotic system. Chaos Interdisciplinary J Nonlinear Sci 17(2):023115CrossRefzbMATHGoogle Scholar
  49. 49.
    Xu L, Gou X, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt Lasers Eng 91:41–52CrossRefGoogle Scholar
  50. 50.
    Yanling W(2009) Image scrambling method based on chaotic sequences and mapping. Proceedings of the first international workshop on education technology and computer science, March 2009Google Scholar
  51. 51.
    Ye G (2010) Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn Lett 31(5):347–354CrossRefGoogle Scholar
  52. 52.
    Zhang Q, Wei X (2013) RGB color image encryption method based on Lorenz chaotic system and DNA computation. IETE Tech Rev 30(5):404MathSciNetCrossRefGoogle Scholar
  53. 53.
    Zhang Y, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simul 19:74–82CrossRefzbMATHGoogle Scholar
  54. 54.
    Zhou Y, Bao L, Chen CLP (Apr. 2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182CrossRefGoogle Scholar
  55. 55.
    Zou J, Ward RK, Qi D (2004) A new digital scrambling method based on Fibonacci numbers. Circuits and systems, 2004. ISCAS apos. Proceedings of the 2004 international symposium, volume 3, issue 23–26, pp III -965-968Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Computer Science and Engineering DepartmentThapar Institute of Engineering and TechnologyPatialaIndia

Personalised recommendations