Chaotic System and DNA Computing operations for Image Encryption Based on Pixels Shuffling
Image encryption is one of the primary approaches which is used to keep image information secure and safe. Recently, image encryption is turning its attention to combination with the field of DNA computing. In the presented study, a novel method of image encryption is suggested and implemented based on the DNA algorithm and Chaos theory, the most important principle in image encryption is breaking the correlation amongst pixels. This algorithm performs well against chosen cipher-text attacks. Furthermore, the proposed approach was implemented and analyzed for the Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI), The performance of the encryption method is analyzed using the histogram, Shannon entropy and key space.
A. K. Farhan, N. M. G. G. Al-Saidi, A. T. Maolood, F. Nazarimehr, and I. Hussain, “Entropy Analysis and Image Encryption Application Based on a New Chaotic System Crossing a Cylinder,” Entropy, vol. 21, no. 10, p. 958, 2019.
A. K. Farhan, M. R. Salman, and others, “Color Image Encryption Depend on DNA Operation and Chaotic System,” in 2019 First International Conference of Computer and Applied Sciences (CAS), 2019, pp. 267–272.
A Kadhim, RM Mohamed ,“Visual cryptography for Image depend on RSA & AlGamal algorithms”, 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA),PP 1-6,May.2016.
Abdul Monem S Rahma, Suhad M Kadhem, Alaa Kadhim Farhan, “Finding the Relevance Degree between an English Text and its Title,” Engineering and Technology Journa, vol. 30, issue 9,pp 1625-1640, 2012.
Alaa Kadhim, Sura Khalaf, “New approach for security chatting in real time,” International Journal of Emerging Trends and Technology in Computer Science (IJETTCS), 2015, Volume 4, Issue 3
A. Gahlaut, A. Bharti, Y. Dogra, and P. Singh, “DNA based cryptography,” in Communications in Computer and Information Science, 2017.
AMS Rahma, SM Kadhem, AK Farhan,”Finding the Relevance Degree between an English Text and its Title”, Engineering and Technology Journal 30 (9), 1625-1640
A. T. Sadiq, A. K. Farhan, and S. A. Hassan, “A proposal to improve RC4 algorithm based on hybrid chaotic maps,” J. Adv. Comput. Sci. Technol. Res., vol. 6, no. 4, pp. 74–81, 2016.Alaa kadhim Farhan .Ekhlas K. Gbashi, Al-Qadisiyah Journal of Pure Science 26, 2(2021) pp. Comp. 1–14 13
A. Kadhim F. and H. Emad M., “Mouse Movement with 3D Chaotic Logistic Maps to Generate Random Numbers,” Diyala J. Pure Sci., vol. 13, no. 3, pp. 24–39, 2017.
A. K. Farhan, N. M. G. Al-Saidi, A. T. Maolood, F. Nazarimehr, and I. Hussain, “Entropy analysis and image encryption application based on a new chaotic system crossing a cylinder,” Entropy, vol. 21, no. 10, pp. 1–14, 2019.
D. Boneh, C. Dunworth, and R. Lipton, “Breaking DES using a molecular computer,” 1996.  Ekhlas K. Gbashi “Text Compression & Encryption Method Based on RNA and MTF”, Journal of science(IJS),university of Baghdad,VOL 58,ISSUE (2C),2017.
Farhan AK, Ali MA. “Database protection system depend on modified hash function. In Conference of Cihan University-Erbil on Communication Engineering and Computer Science 2017 Mar 29 (p. 84).
F. A. Kadhim and H. I. Mhaibes, “Quantum Random Bits Generator based on Phase Noise of Laser,” J. Eng. Appl. Sci., vol. 13, no. 3, pp. 629–633, 2018.
F. A. Kadhim, G. H. A. A. Majeed, and R. S. Ali, “Proposal new s-box depending on DNA computing and mathematical operations,” in 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA), 2016, pp. 1–6.
G. C. Le Goff, L. J. Blum, and C. A. Marquette, “Shrinking hydrogel-DNA spots generates 3D microdots arrays,” Macromol. Biosci., 2013.
H. Rathod, M. S. Sisodia, and S. K. Sharma, “Design and Implementation of Image Encryption Algorithm by using Block Based Symmetric Transformation Algorithm ( Hyper Image Encryption Algorithm ),” vol. 1, no. 3, pp. 7–13.
H. Natiq, N. M. G. Al-Saidi, M. R. M. Said, and A. Kilicman, “A new hyper chaotic map and its application for image encryption,” Eur. Phys. J. Plus, 2018.
H. Natiq, M. R. M. Said, N. M. G. Al-Saidi, and A. Kilicman, “Dynamics and complexity of a new 4D chaotic laser system,” Entropy, 2019.
H. Natiq, S. Banerjee, M. R. K. Ariffin, and M. R. M. Said, “Can hyper chaotic maps with high complexity produce multistability?,” Chaos, 2019.14 Alaa kadhim Farhan .Ekhlas K. Gbashi, Al-Qadisiyah Journal of Pure Science 26, 2(2021) pp. Comp. 1–14
K. Menaka, “Message encryption using DNA sequences,” in Proceedings - 2014 World Congress on Computing and Communication Technologies, WCCCT 2014, 2014.
M. Y. Rhee, Internet security: cryptographic principles, algorithms, and protocols. 2003.
N. K Pareek, “Design and Analysis of a Novel Digital Image Encryption Scheme,” Int. J. Netw. Secur. It’s Appl., vol. 4, no. 2, pp. 95–108, 2012.
R. A. Mollin, An introduction to cryptography, second edition. 2006.
R. Pakshwar, V. Trivedi, and V. Richhariya, “A survey on different image encryption and decryption techniques,” Int. J. Comput. Sci. Inf. Technol., vol. 4, no. 1, pp. 113–116, 2013.
W. Cao, Y. Mao, and Y. Zhou, “Designing a 2D infinite collapse map for image encryption,” Signal Processing, 2020
Copyright (c) 2021 Ekhlas K. Gbashi, Alaa kadhim Farhan
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
It is herein agreed that:
The copyright to the contribution identified above is transferred to QJPS The copyright transfer covers the exclusive right to reproduce and distribute the contribution, including reprints, translations, photographic reproductions, microform, electronic form, or any other reproductions of similar nature. The Author may publish his/her contribution on his/her personal Web page provided that he/she creates a link to the above mentioned volume of QJPS . The Author may not publish his/her contribution anywhere else without the prior written permission of the publisher unless it has been changed substantially. The Author warrants that his/her contribution is original, except for such excerpts from copyrighted works as may be included with the permission of the copyright holder and author thereof, that it contains no libelous statements, and does not infringe on any copyright, trademark, patent, statutory right, or propriety right of others. The Author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors.