EconPapers    
Economics at your fingertips  
 

An efficient nested chaotic image encryption algorithm based on DNA sequence

Nabil Ben Slimane, Nahed Aouf (), Kais Bouallegue () and Mohsen Machhout ()
Additional contact information
Nabil Ben Slimane: Physic Department, Faculty of Sciences of Monastir, Electronics and Micro-Electronic Laboratory, University of Monastir, Tunisia
Nahed Aouf: Physic Department, Faculty of Sciences of Monastir, Electronics and Micro-Electronic Laboratory, University of Monastir, Tunisia
Kais Bouallegue: Physic Department, Faculty of Sciences of Monastir, Electronics and Micro-Electronic Laboratory, University of Monastir, Tunisia
Mohsen Machhout: Physic Department, Faculty of Sciences of Monastir, Electronics and Micro-Electronic Laboratory, University of Monastir, Tunisia

International Journal of Modern Physics C (IJMPC), 2018, vol. 29, issue 07, 1-27

Abstract: In this paper, an efficient scheme for image encryption based on the nested chaotic map and deoxyribonucleic acid (DNA) is introduced. In order to generate the initial condition values of the nested chaotic system, the Secure Hash Algorithm SHA-256 is used. The algorithm consists of two main layers: confusion and diffusion. In the first layer, the nested chaotic map is employed to create the scrambled image. The scrambled image is obtained through the ascending sorting of the first component of the nested chaotic index sequence. To ensure higher sensitivity, higher complexity and higher security, DNA sequence and DNA operator are employed additionally with the nested chaotic map and hash algorithm to modify the pixel values. The important advantages of our algorithm are the improvement of Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI) and entropy, which improve resistivity against several attacks. Experimental results and relevant security analysis demonstrated that our proposed encryption scheme has the highest security level because it is more complicated, and it has a sufficiently large key space. The proposed method is compared to other recent image encryption schemes using different security analysis factors, including NPCR, UACI, correlation coefficients (CCs), encryption quality (EQ) and entropy. It is also resistant to noise (Salt and Pepper, Gaussian and speckle) and data loss attacks. The illustrated results demonstrated that the proposed image encryption scheme is efficient, and can be adopted for image encryption and transmission.

Keywords: Image encryption scheme; DNA sequence operations; SHA-2; nested chaotic map; Julia’s fractal process; confusion; diffusion (search for similar items in EconPapers)
Date: 2018
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
http://www.worldscientific.com/doi/abs/10.1142/S0129183118500584
Access to full text is restricted to subscribers

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:wsi:ijmpcx:v:29:y:2018:i:07:n:s0129183118500584

Ordering information: This journal article can be ordered from

DOI: 10.1142/S0129183118500584

Access Statistics for this article

International Journal of Modern Physics C (IJMPC) is currently edited by H. J. Herrmann

More articles in International Journal of Modern Physics C (IJMPC) from World Scientific Publishing Co. Pte. Ltd.
Bibliographic data for series maintained by Tai Tone Lim ().

 
Page updated 2025-03-20
Handle: RePEc:wsi:ijmpcx:v:29:y:2018:i:07:n:s0129183118500584