Skip to main content
Log in

HIDE: hyperchaotic image encryption using DNA computing

  • Original Research Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

Digital images are encrypted to prevent malicious attempts by unauthorized users from accessing the sensitive information. Recently, a number of chaotic image encryption schemes are cryptanalyzed using known/chosen plaintext attacks (KPA/CPA) and internal state leakage due to less correlation between the plaintext and key stream inherent by design. In this paper, we propose an efficient and secure image encryption scheme HIDE based on a four dimensional Hyperchaotic Rabinovich system and Deoxyribo Nucleic Acid (DNA) computing. To resist against the KPA/CPA attacks, we introduce a sandwich permutation diffusion architecture that consists of DNA-based arithmetic diffusion to uniformly diffuse the plain image. The symmetric diffusion structure counteracts the computational redundancy and powerful cryptanalytic attacks. The key stream is made sufficiently complex and non-linear by dynamically generating and selecting the keystream. HIDE introduces many improvements towards design of robust image encryption scheme that has resulted in increased key space to resist against brute force attack, preventing leakage of the internal state of the hyper chaotic system, the sandwich permutation architecture and the plaintext-related dynamic key generation and selection based on DNA computing can resist KPA/CPA attacks. The standard empirical statistical security tests conducted extensively shows that the proposed method passes all statistical security and performance benchmarks to guarantee security and operational efficiency that are required of a robust and secure encryption scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Zhang, Y.: Test and verification of AES used for image encryption. 3D Res. 9(1), 1–27 (2018)

    Article  Google Scholar 

  2. Gayathri, J., Subashini, S.: An efficient spatiotemporal chaotic image cipher with an improved scrambling algorithm driven by dynamic diffusion phase. Inf. Sci. 489, 227–254 (2019). https://doi.org/10.1016/j.ins.2019.01.082

    Article  MATH  Google Scholar 

  3. Xiangjun, W., Kurths, J., Kan, H.: A robust and lossless dna encryption scheme for color images. Multimed. Tools Appl. 77(10), 12349–12376 (2018). https://doi.org/10.1007/s11042-017-4885-5

    Article  Google Scholar 

  4. Zhang, X., Zhang, H., Chungen, X.: Reverse iterative image encryption scheme using 8-layer cellular automata. KSII Trans. Internet Inf. Syst. 10(7), 3397–3413 (2016). https://doi.org/10.3837/tiis.2016.07.029

    Article  Google Scholar 

  5. Gayathri, J., Subashini, S.: A survey on security and efficiency issues in chaotic image encryption. Int. J. Inf. Comput. Secur. 8(4), 347–381 (2016). https://doi.org/10.1504/IJICS.2016.080427

    Article  Google Scholar 

  6. Watson, J.D., Crick, F.H.C.: Molecular structure of nucleic acids: a structure for deoxyribose nucleic acid. Nature 171(4356), 737–738 (1953)

    Article  Google Scholar 

  7. Chen, J., Zhu, Z., Chong, F., Hai, Yu., Zhang, Y.: Reusing the permutation matrix dynamically for efficient image cryptographic algorithm. Sig. Process. 111, 294–307 (2015). https://doi.org/10.1016/j.sigpro.2015.01.003

    Article  Google Scholar 

  8. Wen, W., Zhang, Y., Fang, Y., Fang, Z.: Image salient regions encryption for generating visually meaningful ciphertext image. Neural Comput. Appl. 29(3), 653–663 (2018). https://doi.org/10.1007/s00521-016-2490-6

    Article  Google Scholar 

  9. Zhang, W., Hai, Yu., Zhao, Y., Zhu, Z.: Image encryption based on three-dimensional bit matrix permutation. Sig. Process. 118, 36–50 (2016). https://doi.org/10.1016/j.sigpro.2015.06.008

    Article  Google Scholar 

  10. Zhang, W., Wong, K., Hai, Yu., Zhu, Z.: A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun. Nonlinear Sci. Numer. Simul. 18(3), 584–600 (2013). https://doi.org/10.1016/j.cnsns.2012.08.010

    Article  MathSciNet  MATH  Google Scholar 

  11. Lu, X., Li, Z., Li, J., Hua, W.: A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 78, 17–25 (2016). https://doi.org/10.1016/j.optlaseng.2015.09.007

    Article  Google Scholar 

  12. Chen, J., Zhu, Z., Chong, F., Zhang, L., Zhang, Y.: An efficient image encryption scheme using lookup table-based confusion and diffusion. Nonlinear Dyn. 81(3), 1151–1166 (2015). https://doi.org/10.1007/s11071-015-2057-6

    Article  Google Scholar 

  13. Chen, J., Zhu, Z., Chong, F., Hai, Yu., Zhang, L.: A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Commun. Nonlinear Sci. Numer. Simul. 20(3), 846–860 (2015). https://doi.org/10.1016/j.cnsns.2014.06.032

    Article  Google Scholar 

  14. Li, M., Guo, Y., Huang, J., Li, Y.: Cryptanalysis of a chaotic image encryption scheme based on permutation-diffusion structure. Sig. Process. Image Commun. 62, 164–172 (2018). https://doi.org/10.1016/j.image.2018.01.002

    Article  Google Scholar 

  15. Hoang, T.M., Thanh, H.X.: Cryptanalysis and security improvement for a symmetric color image encryption algorithm. Optik 155, 366–383 (2018). https://doi.org/10.1016/j.ijleo.2017.10.072

    Article  Google Scholar 

  16. Li, M., Dandan, L., Xiang, Y., Zhang, Y., Ren, H.: Cryptanalysis and improvement in a chaotic image cipher using two-round permutation and diffusion. Nonlinear Dyn. 96(1), 31–47 (2019). https://doi.org/10.1007/s11071-019-04771-7

    Article  MATH  Google Scholar 

  17. Yang, Y., Wang, L., Duan, S., Luo, L.: Dynamical analysis and image encryption application of a novel memristive hyperchaotic system. Opt. Laser Technol. 133, 106553 (2021)

    Article  Google Scholar 

  18. Zhou, K., Minghui, X., Luo, J., Fan, H., Li, M.: Cryptanalyzing an image encryption based on a modified Henon map using hybrid chaotic shift transform. Digit. Signal Proc. 93, 115–127 (2019). https://doi.org/10.1016/j.dsp.2019.07.013

    Article  Google Scholar 

  19. Chen, Y., Tang, C., Ye, R.: Cryptanalysis and improvement of medical image encryption using high-speed scrambling and pixel adaptive diffusion. Sig. Process. 167, 107286 (2020). https://doi.org/10.1016/j.sigpro.2019.107286

    Article  Google Scholar 

  20. Diab, H., El-semary, A.M.: Cryptanalysis and improvement of the image cryptosystem reusing permutation matrix dynamically. Sig. Process. 148, 172–192 (2018). https://doi.org/10.1016/j.sigpro.2018.02.011

    Article  Google Scholar 

  21. Jiahui, W., Liao, X., Yang, B.: Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Sig. Process. 142, 292–300 (2018). https://doi.org/10.1016/j.sigpro.2017.06.014

    Article  Google Scholar 

  22. Sheela, S.J., Suresh, K.V., Tandur, D.: Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimed. Tools Appl. 77(19), 25223–25251 (2018). https://doi.org/10.1007/s11042-018-5782-2

    Article  Google Scholar 

  23. Hua, Z., Yi, S., Zhou, Y.: Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Sig. Process. 144, 134–144 (2018). https://doi.org/10.1016/j.sigpro.2017.10.004

    Article  Google Scholar 

  24. Murillo-Escobar, M.A., Cruz-Hernández, C., Abundiz-Pérez, F., López-Gutiérrez, R.M., Del Campo, O.R.A.: A RGB image encryption algorithm based on total plain image characteristics and chaos. Sig. Process. 109, 119–131 (2015). https://doi.org/10.1016/j.sigpro.2014.10.033

    Article  Google Scholar 

  25. Fan, H., Li, M., Liu, D., An, K.: Cryptanalysis of a plaintext-related chaotic rgb image encryption scheme using total plain image characteristics. Multimed. Tools Appl. 77(15), 20103–20127 (2018). https://doi.org/10.1007/s11042-017-5437

    Article  Google Scholar 

  26. Lan, R., He, J., Wang, S., Tianlong, G., Luo, X.: Integrated chaotic systems for image encryption. Sig. Process. 147, 133–145 (2018). https://doi.org/10.1016/j.sigpro.2018.01.026

    Article  Google Scholar 

  27. Feng, W., He, Y.-G., Li, H.-M., Li, C.-L.: Cryptanalysis of the integrated chaotic systems based image encryption algorithm. Optik 186, 449–457 (2019). https://doi.org/10.1016/j.ijleo.2018.12.103

    Article  Google Scholar 

  28. Li, T., Shi, J., Li, X., Jiang, W., Pan, F.: Image encryption based on pixel-level diffusion with dynamic filtering and dna-level permutation with 3d latin cubes. Entropy 21(3), 319 (2019). https://doi.org/10.3390/e21030319

    Article  MathSciNet  Google Scholar 

  29. Wang, T., Wang, M.: Hyperchaotic image encryption algorithm based on bit-level permutation and dna encoding. Opt. Laser Technol. 132, 106355 (2020). https://doi.org/10.1016/j.optlastec.2020.106355

    Article  Google Scholar 

  30. Zhou, M., Wang, C.: A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks. Sig. Process. 171, 107484 (2020). https://doi.org/10.1016/j.sigpro.2020.107484

    Article  Google Scholar 

  31. Jiahui, W., Liao, X., Yang, B.: Image encryption using 2d hénon-sine map and dna approach. Sig. Process. 153, 11–23 (2018)

    Article  Google Scholar 

  32. Pak, C., Huang, L.: A new color image encryption using combination of the 1d chaotic map. Sig. Process. 138, 129–137 (2017)

    Article  Google Scholar 

  33. Chen, J., Han, F., Qian, W., Yao, Y.-D., Zhu, Z.: Cryptanalysis and improvement in an image encryption scheme using combination of the 1d chaotic map. Nonlinear Dyn. 93(4), 2399–2413 (2018)

    Article  Google Scholar 

  34. Liu, Y., Yang, Q., Pang, G.: A hyperchaotic system from the rabinovich system. J. Comput. Appl. Math. 234(1), 101–113 (2010). https://doi.org/10.1016/j.cam.2009.12.008

    Article  MathSciNet  MATH  Google Scholar 

  35. Zhang, W., Hai, Yu., Zhu, Z., et al.: An image encryption scheme using self-adaptive selective permutation and inter-intra-block feedback diffusion. Sig. Process. 151, 130–143 (2018). https://doi.org/10.1016/j.sigpro.2018.05.008

    Article  Google Scholar 

  36. Weber, A.G.: The USC-SIPI image database version 5. USC-SIPI Rep. 315, 1 (1997)

    Google Scholar 

  37. Song, C.-Y., Qiao, Y.-L., Zhang, X.-Z.: An image encryption scheme based on new spatiotemporal chaos. Opt. Int. J. Light Electron Opt. 124(18), 3329–3334 (2013). https://doi.org/10.1016/j.ijleo.2012.11.002

    Article  Google Scholar 

  38. Zhu, H., Zhao, C., Zhang, X., Yang, L.: An image encryption scheme using generalized arnold map and affine cipher. Optik 125(22), 6672–6677 (2014). https://doi.org/10.1016/j.ijleo.2014.06.149

    Article  Google Scholar 

  39. Wu, Y., Zhou, Y., Saveriades, G., Agaian, S., Noonan, J.P., Natarajan, P.: Local shannon entropy measure with statistical tests for image randomness. Inf. Sci. 222, 323–342 (2013). https://doi.org/10.1016/j.ins.2012.07.049

    Article  MathSciNet  MATH  Google Scholar 

  40. Xue, H., Juan, D., Li, S., Ma, W.: Region of interest encryption for color images based on a hyperchaotic system with three positive lyapunov exponets. Opt. Laser Technol. 106, 506–516 (2018). https://doi.org/10.1016/j.optlastec.2018.04.030

    Article  Google Scholar 

  41. Diaconu, A.-V.: Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf. Sci. 355, 314–327 (2016). https://doi.org/10.1016/j.ins.2015.10.027

    Article  Google Scholar 

  42. Stalin, S., Maheshwary, P., Shukla, P.K., Maheshwari, M., Gour, B., Khare, A.: Fast and secure medical image encryption based on non linear 4d logistic map and dna sequences (nl4dlm_dna). J. Med. Syst. 43(8), 267 (2019). https://doi.org/10.1007/s10916-019-1389-z

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. John Prakash.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Elizabeth, B.L., Gayathri, J., Subashini, S. et al. HIDE: hyperchaotic image encryption using DNA computing. J Real-Time Image Proc 19, 429–443 (2022). https://doi.org/10.1007/s11554-021-01194-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-021-01194-9

Keywords

Navigation