A novel chaotic image cryptosystem based on DNA sequence operations and single neuron model

Abstract

In this paper, a novel image cryptosystem based on DNA sequence operations, Single Neuron Model (SNM) and chaotic map is designed. The initial conditions and system parameters of dynamical systems are generated using 512-bit hash value highly dependent to the plain image. We adopted confusion-diffusion as architecture of the algorithm. The 2D Logistic-adjusted-Sine map (2D-LASM) is employed to confuse the pixels of color components simultaneously, while SNM is employed to generate the key stream, otherwise, the hash value of the plain image are injected additionally in diffusion process. Experimental results and relevant security analysis demonstrated that our proposed encryption scheme has the highest security level because it is more sensitive, and it has a key space sufficiently large. The proposed method is compared to other recent image encryption algorithms including different security analysis properties, such as randomness, sensitivity and correlation of the encrypted-images demonstrated that our cryptosystem is efficient, and can overcomes known attacks.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

References

  1. 1.

    Adleman L (1994) Molecular computation of solutions to combinatorial problems. Science 266:1021–1024

    Google Scholar 

  2. 2.

    Ahmad J, Hwang SO (2016) A secure image encryption scheme based on chaotic maps and affine transformation. Multimed Tools Appl 75:13951–13976

    Google Scholar 

  3. 3.

    Belazi A, Khan M, El-Latif AAA et al (2017) Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption. Nonlinear Dyn 87:337–361

    Google Scholar 

  4. 4.

    Borujeni SE, Eshghi M (2009) Chaotic image encryption design using tompkins-paige algorithm. Hindawi Publ Corp Math Probl Eng 200:22

    MATH  Google Scholar 

  5. 5.

    Bouallegue K, Chaari A, Toumi A (2011) Multi-scroll and multi-wing chaotic attractor generated with Julia process fractal. Elsevier Sci 44:79–85

    MathSciNet  Google Scholar 

  6. 6.

    Bouallegue K (2015) Chaotic attractors with separated scrolls. AIP Publ Chaos 25:073108

    MathSciNet  MATH  Google Scholar 

  7. 7.

    Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197–213

    Google Scholar 

  8. 8.

    Chai X, Gan Z, Yang K, Chen Y, Liu X (2017) An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process Image Commun 52:6–19

    Google Scholar 

  9. 9.

    Chai X, Gan Z, Yuan K, Chen Y, Liu X (2017) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput and Applic, https://doi.org/10.1007/s00521-017-2993-9

  10. 10.

    Chen J, Zhou J, Wong K-W (2011) A modified chaos-based joint compression and encryption scheme. IEEE Trans Circ Syst II: Express Briefs 2:110–114

    Google Scholar 

  11. 11.

    Chen G, Mao Y, Charles K (2004) Chui a symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761

    MathSciNet  MATH  Google Scholar 

  12. 12.

    Chen J-x, Zhu Z-l, Fu C, Yu H, Zhang L-b (2015) A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Commun Nonlinear Sci Numer Simul 20:846–860

    Google Scholar 

  13. 13.

    Chen H, Tanougast C, Liu Z, Hao B (2016) Securing color image by using hyperchaotic system in gyrator transform domains. Opt Quant Electron 48(8):396

    Google Scholar 

  14. 14.

    Chen J-x, Zhu Z-l, Fu C, Zhang L-b, Zhang Y (2015) An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Commun Nonlinear Sci Numer Simul 23(1-3):294–310

    MathSciNet  MATH  Google Scholar 

  15. 15.

    El-Latif AA, Li L, Niu X (2014) A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tools Appl 70:1559–1584

    Google Scholar 

  16. 16.

    Elassad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144–157

    Google Scholar 

  17. 17.

    Elgendy F, Sarhan AM, Eltobely TE, El-Zoghdy SF, El-sayed HS, Faragallah OS (2015) Chaos-based model for encryption and decryption of digital images. Multimed Tools Appl 75:11529–11553

    Google Scholar 

  18. 18.

    Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93

    Google Scholar 

  19. 19.

    Enayatifar R, Abdullah AH, Isnin IF, Altameem A (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146–154

    Google Scholar 

  20. 20.

    Federal Information Processing Standards Publication 180-2 (2002) Announcing the Secure Hash Standard, U.S. DoC/NIST

  21. 21.

    Ercan S et al (2010) Cryptanalysis of Fridrich’s Chaotic image Encryption. Int J Bifurcation Chaos 20:1405

    MathSciNet  MATH  Google Scholar 

  22. 22.

    Furhtand B, Kirovski D (2005) Multimedia security handbook. CRC Press, Boca Raton

    Google Scholar 

  23. 23.

    Ghebleh M, Kanso A, Stevanović D (2017) A novel image encryption algorithm based on piecewise linear chaotic maps and least squares approximation. Multimed Tools Appl 77:7305–7326

    Google Scholar 

  24. 24.

    Girdhar A, Kumar V (2018) A RGB image encryption technique using Lorenz and Rossler chaotic system on DNA sequences. Multimedia Tools and Applications, https://doi.org/10.1007/s11042-018-5902-z

  25. 25.

    Gong L, Liu X, Zheng F, Zhou N (2013) Flexible multiple-image encryption algorithm based on logpolar transform and double random phase encoding technique. J Mod Opt 60(13):1074–1082

    Google Scholar 

  26. 26.

    Gu G, Ling J (2014) A fast image encryption method by using chaotic 3D cat maps. Optik- Int J Light Electron Opt 125:4700–5

    Google Scholar 

  27. 27.

    Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2. Nonlinear Dyn 83:1123–1136

    MathSciNet  MATH  Google Scholar 

  28. 28.

    Hua ZY, Zhou YC (2016) Image encryption using 2D Logistic adjusted-Sine map. Inf Sci 339:237–253

    Google Scholar 

  29. 29.

    Huang R, Rhee K, Uchida S (2014) A parallel image encryption method based on compressive sensing. Multimed Tools Appl 72:71–93

    Google Scholar 

  30. 30.

    Hui-lizhang XW (2015) A color image encryption with heterogeneous bit-permutation and correlated chaos. Opt Commun 342:51–60

    Google Scholar 

  31. 31.

    Jain A, Rajpal N (2016) A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps. Multimed Tools Appl 75:5455–5472

    Google Scholar 

  32. 32.

    Jiri F (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(6):1259–1284

    MathSciNet  MATH  Google Scholar 

  33. 33.

    Kanso A, Ghebleh M (2015) An efficient and robust image encryption scheme for medical applications. Commun Nonlinear Sci Numer Simul 24(1-3):98–116

    MathSciNet  MATH  Google Scholar 

  34. 34.

    Kwok HS, Tang WK (2007) A fast image encryption system based on chaotic maps with finite Precision representation. Chaos Solitons Fractals 32:1518–1529

    MathSciNet  MATH  Google Scholar 

  35. 35.

    Li C, Cheni G (2005) Coexisting chaotic attractors in a single neuron model with adapting feedback synapse. Elsevier 23:599–1604

    MathSciNet  Google Scholar 

  36. 36.

    Li XSW, Hu H (2016) Cryptanalysis of a chaos-based image encryption scheme combining DNA coding and entropy. Multimed Tools Appl 75:6303–6319

    Google Scholar 

  37. 37.

    Li B, Liao X, Jiang Y (2017) A novel image encryption scheme based on logistic map and dynatomic modular curve. Multimedia Tools and Applications, https://doi.org/10.1007/s11042-017-4786-7

  38. 38.

    Lian S, Sun J, Wang Z (2005) Security analysis of a chaos-based image encryption algorithm. Physica A: Stat Mech Appl 351(1-3):645–661

    Google Scholar 

  39. 39.

    Liu L, Zhang Q, Wei X (2012) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38:1240–1248

    Google Scholar 

  40. 40.

    Liu H, Wang X (2013) Triple-image encryption scheme based on one-time key stream generated by chaos and plain images. J Syst Softw 86(3):826–834

    Google Scholar 

  41. 41.

    Liu Y, Tang J, Xie T (2014) Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Opt Laser Technol 60:111–115

    Google Scholar 

  42. 42.

    Lu P, Xu Z, Lu X, Liu X (2013) Digital image information encryption based on compressive sensing and double random-phase encoding technique. Optik 124(16):2514–2518

    Google Scholar 

  43. 43.

    Martn del Rey A, Rodríguez Sánchez G, de la Villa Cuenca A (2015) A protocol to encrypt digital images using chaotic maps and memory cellular automata. Log J IGPL 23:485–494

    MathSciNet  MATH  Google Scholar 

  44. 44.

    Norouzi B, Mirzakuchaki S (2015) Breaking a novel image encryption scheme based on an improper fractional order chaotic system. Multimed Tools Appl 76:1817–1826

    Google Scholar 

  45. 45.

    Ozkaynak F, Ozer A, Yavuz S (2013) Security analysis of an image encryption algorithm based on chaos and DNA encoding. In: Signal processing and communications applications conference (SIU), pp 1–4

  46. 46.

    Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129–137

    Google Scholar 

  47. 47.

    Pareschi F, Rovatti R, Setti G (2012) On statistical tests for randomness included in the NIST SP800-22 test suite and based on the binomial distribution. IEEE Trans Inf Forensic Secur 7:491–505

    Google Scholar 

  48. 48.

    Shannon CE (1949) Communication theory of secrecy system. Bell Syst Technol J 28:656–715

    MathSciNet  MATH  Google Scholar 

  49. 49.

    Sheela SJ, Suresh KV, Tandur D (2018) Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimedia Tools and Application, https://doi.org/10.1007/s11042-018-5782-2

  50. 50.

    Slimane NB, Bouallegue K, Machhout M (2017) Designing a multi-scroll chaotic system by operating Logistic map with fractal process. Nonlinear Dyn 88:1655–1675

    Google Scholar 

  51. 51.

    Stinson DR (2002) Cryptography, theory and practice CRC press series on discrete mathematics and its applications, 2nd edn. Chapman & Hall/CRC, Boca Raton

    Google Scholar 

  52. 52.

    Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92:1101–1108

    Google Scholar 

  53. 53.

    Watson JD, Crick FH (1953) A structure for deoxyribose nucleic acid. Nature 421(6921):397–3988

    Google Scholar 

  54. 54.

    Wong KW, Kwok BS-H, Law WS (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372:2645–2652

    MATH  Google Scholar 

  55. 55.

    Wu Y, Zhou YC, George S, Sos A, Noonan Joseph P, Premkumar N (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci 222:323–342

    MathSciNet  MATH  Google Scholar 

  56. 56.

    Xiang T, Wong KW, Liao X (2007) Selective image encryption using a spatiotemporal chaotic system. Chaos 17:023115–1-12

    MATH  Google Scholar 

  57. 57.

    Xu L, Xu G, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt Lasers Eng 91:41–52

    Google Scholar 

  58. 58.

    Xue X, Zhang Q, Wei X, Guo L, Wang Q (2010) A digital image encryption algorithm based on DNA sequence and multi-chaotic maps. Neural Network World

  59. 59.

    Zhang Q, Guo L, Wei X (2013) A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik Int J Light Electron Opt 124:3596–600

    Google Scholar 

  60. 60.

    Zhang Y, Di X, Wen W, Li M (2014) Cryptanalyzing a novel image cipher based on mixed transformed logistic maps. Multimed Tools Appl 73:1885–1896

    Google Scholar 

  61. 61.

    Zhang Y-Q, Wang X-Y (2014) A symmetric image encryption algorithm based on mixed linearnonlinear coupled map lattice. Inf Sci 273:329–351

    Google Scholar 

  62. 62.

    Zhang Q, Liu L, Wei X (2014) Improved algorithm for image encryption based onDNAencoding andmulti-chaotic maps. AEU-Int J Electron Commun 68:186–192

    Google Scholar 

  63. 63.

    Zhang Y (2015) Cryptanalysis of a novel image fusion encryption algorithm based on DNA sequence operation and hyperchaotic system. Optik-Int J Light Electron Opt 126:223–229

    Google Scholar 

  64. 64.

    Zhen P, Zhao G, Jin LM (2016) Chaos-based image encryption scheme combining DNA coding and entropy. Multimed Tools Appl 75:6303–6319

    Google Scholar 

  65. 65.

    Zhen P, Zhao G, Min L, Jin X (2016) Chaos-based image encryption scheme combining DNA coding and entropy. Multimed Tools Appl 75:6303–6319

    Google Scholar 

  66. 66.

    Zhou N, Li H, Wang D, Pan S, Zhou Z (2015) Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun 343:10–21

    Google Scholar 

Download references

Acknowledgment

This research is supported by ministry of higher education and scientific research of Tunisia.

Author information

Affiliations

Authors

Corresponding author

Correspondence to Nabil Ben Slimane.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Ben Slimane, N., Aouf, N., Bouallegue, K. et al. A novel chaotic image cryptosystem based on DNA sequence operations and single neuron model. Multimed Tools Appl 77, 30993–31019 (2018). https://doi.org/10.1007/s11042-018-6145-8

Download citation

Keywords

  • Logistic-adjusted-Sine map
  • Single neuron model
  • Cryptosystem
  • DNA sequence operations
  • Extended confusion
  • DNA diffusion
  • SHA-512