Nonlinear Dynamics

, Volume 82, Issue 3, pp 1269–1280 | Cite as

A novel image encryption scheme based on 2-D logistic map and DNA sequence operations

  • Xing-Yuan Wang
  • Ying-Qian Zhang
  • Yuan-Yuan Zhao
Original Paper


This paper proposes a novel image encryption scheme based on DNA sequence operations and chaotic system. Firstly, two-dimensional logistic chaotic map is employed to modify each pixel of the image, and then, the DNA encoding rules are adopted to encode and generate a DNA matrix. Secondly, pseudo-random sequences generated by two-dimensional logistic map are transformed into another DNA matrix. Thirdly, DNA addition, subtraction and complementary rules are used to control the operations between two DNA matrices for obtaining the ciphered results. Finally, the ciphered image is obtained by decoding the DNA matrix formulations into binary formulations. Experimental results and theoretical analysis show that the scheme is extraordinarily high secure to resist various attacks.


Image encryption DNA coding  DNA sequence operation 2-D logistic chaotic map 



This research is supported by the National Natural Science Foundation of China (Nos: 61370145, 61173183 and 60973152), the Doctoral Program Foundation of Institution of Higher Education of China (No: 20070141014), Program for Liaoning Excellent Talents in University (No: LR2012003), the National Natural Science Foundation of Liaoning province (No: 20082165) and the Fundamental Research Funds for the Central Universities (No: DUT12JB06).


  1. 1.
    Gao, T.G., Chen, Z.Q.: Image encryption based on a new total shuffling algorithm. Chaos Solitons Fractals 38(1), 213–220 (2008)MATHMathSciNetCrossRefGoogle Scholar
  2. 2.
    Pisarchik, A.N., Zanin, M.: Image encryption with chaotically coupled chaotic maps. Phys. Lett. A 237(20), 2645–2652 (2008)MathSciNetGoogle Scholar
  3. 3.
    Chen, W.M., Lai, C.J., Wang, H.C., Chao, H.C., Lo, C.H.: H.264 video watermarking with secret image sharing. IET Image Process. 5(4), 349–354 (2011)CrossRefGoogle Scholar
  4. 4.
    Liu, H.J., Wang, X.Y.: Triple-image encryption scheme based on one-time key stream generated by chaos and plain image. J. Syst. Softw. 86(3), 826–834 (2013)CrossRefGoogle Scholar
  5. 5.
    Gao, H.J., Zhang, Y.S., Liang, S.Y., Li, D.Q.: A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29(2), 393–399 (2006)MATHCrossRefGoogle Scholar
  6. 6.
    Zhang, W., Wong, K.W., Yu, H., Zhu, Z.L.: An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun. Nonlinear Sci. Numer. Simul. 18(8), 2066–2080 (2013)MATHMathSciNetCrossRefGoogle Scholar
  7. 7.
    Yang, H.Q., Wong, K.W., Liao, X.F., Zhang, W., Wei, P.C.: A fast image encryption and authentication scheme based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 15(11), 3507–3517 (2010)MATHCrossRefGoogle Scholar
  8. 8.
    Matthes, R.: On the derivation of a Chaotic Encryption algorithm. Cryptologia 13(1), 29–42 (1989)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Wheeler, D.D.: Problems with chaotic cryptosystems. Cryptologia 7(11), 243–250 (1991)Google Scholar
  10. 10.
    Bigdeli, N., Farid, Y., Afshar, K.: A novel image encryption/decryption scheme based on chaotic neural networks. Eng. Appl. Artif. Intell. 25(4), 753–765 (2012)CrossRefGoogle Scholar
  11. 11.
    Liao, X.F., Lai, S.Y., Zhou, Q.: A novel image encryption algorithm based on self-adaptive wave transmission. Sig. Process. 90(9), 2714–2722 (2010)MATHCrossRefGoogle Scholar
  12. 12.
    Ren, X.X., Liao, X.F., Xiong, Y.H, Y.: New image encryption algorithm based on cellular neural network. J. Comput. Appl. 31(6), 1528–1530 (2011)Google Scholar
  13. 13.
    Wang, X.Y., Yang, L., Liu, R., Kadir, A.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62(3), 615–621 (2010)MATHCrossRefGoogle Scholar
  14. 14.
    Rhouma, R., Soumaya, M., Safya, B.: CML-based color image encryption. Chaos Solitons Fractals 40(1), 309–318 (2009)MATHCrossRefGoogle Scholar
  15. 15.
    Sahar, M., Amir, M.E.: Color image encryption based on coupled nonlinear chaotic map. Chaos Solitons Fractals 42(3), 1745–1754 (2009)MATHCrossRefGoogle Scholar
  16. 16.
    Liu, H.J., Wang, X.Y.: Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 59(10), 3320–3327 (2010)MATHMathSciNetCrossRefGoogle Scholar
  17. 17.
    Head, T., Rozenberg, G., Bladergroen, R.S., Breek, C.K.D., Lommerse, P.H.M., Spaink, H.P.: Computing with DNA by operating on plasmids. Biosystems 57(2), 87–93 (2000)Google Scholar
  18. 18.
    Zheng, X.D., Xu, J., Li, W.: DNA arithmetic operation based on n-moduli set. Appl. Math. Comput. 212(1), 177–184 (2009)MATHMathSciNetCrossRefGoogle Scholar
  19. 19.
    Zhang, Q., Guo, L., Wei, X.P.: Image encryption using DNA addition combining with chaotic maps. Math. Comput. Model. 52(11–12), 2028–2035 (2010)MATHMathSciNetCrossRefGoogle Scholar
  20. 20.
    Zhang, Q., Wang, Q., Wei, X.P.: A novel image encryption scheme based on DNA coding and multi-chaotic maps. Adv. Sci. Lett. 3(4), 447–451 (2010)CrossRefGoogle Scholar
  21. 21.
    Liu, H.J., Wang, X.Y., kadir, A.: Image encryption using DNA complementary rule and chaotic maps. Appl. Soft Comput. 12(5), 1457–1466 (2012)CrossRefGoogle Scholar
  22. 22.
    Wei, X.P., Guo, L., Zhang, Q., Zhang, J.X., Lian, S.G.: A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J. Syst. Softw. 85(2), 290–299 (2012)CrossRefGoogle Scholar
  23. 23.
    Zhang, Q., Xue, X.L., Wei, X.P.: A novel image encryption algorithm based on DNA subsequence operation. Sci. World J. 2012, 286741 (2012)Google Scholar
  24. 24.
    Liu, H.J., Wang, X.Y., Kadir, A.: Image encryption using DNA complementary rule and chaotic maps. Appl. Soft Comput. 12(5), 1457–1466 (2012)Google Scholar
  25. 25.
    SaberiKamarposhti, M., AlBedawi, I., Mohamad, D.: A new hybrid method for image encryption using DNA sequence and chaotic logistic map. Aust. J. Basic Appl. Sci. 2012, 371–380 (2012)Google Scholar
  26. 26.
    Zhang, X.Q., Zhu, G.L., Ma, S.L.: Remote-sensing image encryption in hybrid domains. Opt. Commun. 285(7), 1736–1743 (2012)CrossRefGoogle Scholar
  27. 27.
    Watson, J.D., Crick, F.H.C.: A structure for deoxyribose nucleic acid. Nature 171(4356), 737–738 (1953)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2015

Authors and Affiliations

  • Xing-Yuan Wang
    • 1
  • Ying-Qian Zhang
    • 2
  • Yuan-Yuan Zhao
    • 1
  1. 1.Faculty of Electronic Information and Electrical EngineeringDalian University of TechnologyDalianChina
  2. 2.City InstituteDalian University of TechnologyDalianChina

Personalised recommendations