A preview of this full-text is provided by Springer Nature.
Content available from Multimedia Tools and Applications
This content is subject to copyright. Terms and conditions apply.
https://doi.org/10.1007/s11042-019-08375-6
Color image encryption based on DNA encoding
and pair coupled chaotic maps
Z. Azimi1·S. Ahadpour1
Received: 14 November 2018 / Revised: 26 September 2019 / Accepted: 9 October 2019 /
©Springer Science+Business Media, LLC, part of Springer Nature 2019
Abstract
Information security has become a significant issue in encryption due to the rapid progress
of internet and network. Therefore, the development of the encryption algorithm is a grow-
ing and significant problem. In this study, a new color image encryption was introduced
based on DNA complementary rules and pair coupled chaotic maps. At first, the plain
color image was divided into three components (R, G, B) being converted into three DNA
matrices using DNA encoding rules. Secondly, DNA addition for R, G and B components
was implemented and scrambled the elements position of three DNA sequence via the pair
coupled chaotic maps. Three gray coded images obtained and RGB encrypted image was
achieved by restructuring R, G, B components. The simulation of experimental result and
security analysis showed that this algorithm had larger secret key space and strong secret
key sensitivity and it had excellent ability to resist against statistical and differential attacks.
Keywords Chaos ·Cryptography ·DNA computing ·Pair coupled chaotic maps
1 Introduction
In recent years, with the rapid development of the Internet and computer networks and
communications, large amounts of digital information and multimedia content, for exam-
ple images, sounds and videos, are commonly stored and transmitted over the Internet.
Most of this digital data available on the Internet and public networks are sensitive and
private, and have caused it to be used for malicious purposes. Hence, security and encryp-
tion of digital image is receiving wide attention due to the widespread transmission through
various communication networks and Internet to guarantee and secure confidentiality and
stop unauthorized access to the digital content. One of the most effective ways to secure
enough confidential image information against illegal usage, unauthorized users is image
S. Ahadpour
ahadpour@uma.ac.ir
Z. Azimi
z.azimi@uma.ac.ir
1Department of Physics, University of Mohaghegh Ardabili, Ardabil, Iran
Multimedia Tools andApplications (2020)79:1727–1744
Published online: 2019
November
8
Content courtesy of Springer Nature, terms of use apply. Rights reserved.