It appears you don't have support to open PDFs in this web browser. To view this file, Open with your PDF reader
Abstract
INTRODUCTION: Color images hold significant information and are widely used in diverse domains. The protection of these images against unauthorized access over the internet is a necessity that relies on encryption techniques. However, traditional encryption methods face challenges with the increasing capability and efficiency of quantum computing to solve complex problems. DNA cryptography is a promising field in information security, utilizing DNA molecules with massive parallelism and vast storage capacity to encode and decode information. While chaotic systems have been widely used in encryption due to their sensitivity to initial conditions and parameter values, resulting in unpredictability and significant variation. Exploiting the characteristics of DNA cryptography and chaotic systems is a promising alternative for securing data. Nevertheless, current methodologies exhibit limitations such as a small key space and weak resistance to differential attacks.
OBJECTIVES: This paper addresses these gaps by proposing an RGB image encryption algorithm based on DNA cryptography and a 1D logistic map.
METHODS: The proposed method randomly generates a DNA encoding/decoding table to generate the row-column permutation of the image. After the permutation of the image, the logistic map is used to generate three keys for RGB channels and seven DNA encoding-decoding rules, three are used to encode the keys into DNA sequence, the second three to encode the image RGB channel, and the last to perform the DNA-XOR operation. Finally, decode the result into integers using the DNA encoding/decoding table and generate the encrypted image.
RESULTS: The analysis of the proposed technique demonstrates significant robustness against various attacks, as evidenced by metrics such as a key space exceeding 2100, an average NPCR of 99.613667%, an average UACI of 50.273742%, an entropy value approaching 8, and a strong key sensitivity.
CONCLUSION: These results validate its capacity to effectively resist differential, brute-force, and statistical attacks.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer




