کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
461826 696637 2012 10 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
پیش نمایش صفحه اول مقاله
A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system
چکیده انگلیسی

A new color image encryption algorithm based on DNA (Deoxyribonucleic acid) sequence addition operation is presented. Firstly, three DNA sequence matrices are obtained by encoding the original color image which can be converted into three matrices R, G and B. Secondly, we use the chaotic sequences generated by Chen's hyper-chaotic maps to scramble the locations of elements from three DNA sequence matrices, and then divide three DNA sequence matrices into some equal blocks respectively. Thirdly, we add these blocks by using DNA sequence addition operation and Chen's hyper-chaotic maps. At last, by decoding the DNA sequence matrices and recombining the three channels R, G and B, we get the encrypted color image. The simulation results and security analysis show that our algorithm not only has good encryption effect, but also has the ability of resisting exhaustive attack, statistical attack and differential attack.


► In this study, three DNA sequence matrices are obtained by encoding the original color image which can be converted into three matrices.
► We use the chaotic sequences generated by Chen's hyper-chaotic maps to scramble the locations of elements from three DNA sequence matrices, and then divide three DNA sequence matrices into some equal blocks respectively.
► We add these blocks by using DNA sequence addition operation and Chen's hyper-chaotic maps.
► By decoding the DNA sequence matrices and recombining the three channels, we get the encrypted color image.
► The simulation results and security analysis show that our algorithm not only has good encryption effect, but also has the ability of resisting exhaustive attack, statistical attack and differential attack.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Journal of Systems and Software - Volume 85, Issue 2, February 2012, Pages 290–299
نویسندگان
, , , , ,