CN101706946A - Digital image encryption method based on DNA sequence and multi-chaotic mapping - Google Patents

Digital image encryption method based on DNA sequence and multi-chaotic mapping Download PDF

Info

Publication number
CN101706946A
CN101706946A CN200910220324A CN200910220324A CN101706946A CN 101706946 A CN101706946 A CN 101706946A CN 200910220324 A CN200910220324 A CN 200910220324A CN 200910220324 A CN200910220324 A CN 200910220324A CN 101706946 A CN101706946 A CN 101706946A
Authority
CN
China
Prior art keywords
dna
sequence
mapping ruler
image
matrix
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN200910220324A
Other languages
Chinese (zh)
Other versions
CN101706946B (en
Inventor
张强
薛香莲
魏小鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dalian University
Original Assignee
Dalian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian University filed Critical Dalian University
Priority to CN2009102203245A priority Critical patent/CN101706946B/en
Publication of CN101706946A publication Critical patent/CN101706946A/en
Application granted granted Critical
Publication of CN101706946B publication Critical patent/CN101706946B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Facsimile Transmission Control (AREA)

Abstract

The invention discloses a novel digital image encryption method belonging to the field of DNA calculation and image encryption, and provides a digital image encryption method based on a DNA sequence and multi-chaotic mapping. The traditional encryption algorithm based on chaos has the defects that a key space is small, a chaos system is easy to analyze and forecast, and the like; and almost of the current encryption systems based on DNA need complex biological operation and are hard to realize. In order to overcome the defects, the invention provides the digital image encryption method based on a DNA sequence and multi-chaotic mapping, comprising the following steps of: firstly, scrambling the positions of pixels of images by utilizing a two-dimension chaotic sequence generated by Cubic mapping and Haar wavelet functions, and then disrobing the pixel values of the images under the action of a chaotic sequence generated by the DNA sequence and the Logistic mapping. The experimental result shows that the algorithm is easy to realize, has better encryption effect on images, large key space and high sensitivity to keys and can effectively resist exhaustive attack and statistical attack.

Description

Digital image encryption method based on dna sequence dna and many chaotic maps
Technical field
The present invention relates to the field that DNA calculates field and digital image encryption, particularly a kind of digital image encryption method mainly is to utilize the encoding characteristics of dna sequence dna to realize the encryption of digital picture in conjunction with many chaotic maps.
Background technology
In current society, computer network has changed people's communication mode, and people can be transmitted various multimedia messagess easily by network.Because network opening, multi-media information security more and more causes people's attention with maintaining secrecy.Digital picture is the important information carrier in the multimedia communication, thereby how to protect image information to become question of common concern.
Since chaos have class at random, initial value susceptibility and be difficult to characteristic such as prediction, become the focus that researchers pay close attention to.Object according to scramble divides, and can be divided into two classes based on the image encryption method of chaos: location of pixels scramble and pixel value scramble.The characteristics of location of pixels scramble are the encryption efficiency height, and are effective, but the security of algorithm is not high, are difficult to resist statistical attack; The characteristics of pixel value scramble are the algorithm security height, but cipher round results is bad, and efficient is low.In addition, the cryptographic algorithm of traditional pixel value based on chaos all be the chaos sequence that produces with single chaotic maps directly and the gray-scale value of pixel superpose and realize the encryption of image.Shortcomings such as lot of documents points out, the image encryption algorithm that utilizes single chaotic maps to realize has security lower, and chaos sequence is easily decoded and key space is little.
The DNA encryption system is to be accompanied by the research that DNA calculates in recent years and the cryptography frontier that occurs, be characterized in DNA being information carrier, with the modern biotechnology is implementation tool, excavates advantages such as intrinsic high storage density of DNA and high concurrency, realizes cryptographic functions such as encryption, deciphering.The existing algorithm of encrypting based on DNA will be operated with Bioexperiment mostly, because the Bioexperiment apparatus expensive, experimental situation is difficult to control, and shortcomings such as experiment sensitivity height are still theoretical more than practice based on the research that DNA encrypts at present.
Summary of the invention
In order to overcome the shortcoming of above-mentioned encipherment scheme, the present invention proposes a kind of digital image encryption method based on dna sequence dna and many chaotic maps, broken away from the complex biological operation during DNA encrypts, the simple characteristic of utilizing dna encoding also realizes the scramble that location of pixels and pixel are put simultaneously in conjunction with many chaos sequences, and improve digital image encryption algorithm effects and security.This algorithm is better to the cipher round results of image, and key space is big, and is strong to the susceptibility of key, can resist exhaustive attack and statistical attack effectively.
Technical scheme of the present invention is: the location of pixels of the chaos sequence scramble image that this algorithm at first produces by Cubic mapping and wavelet function, utilize then dna sequence dna coding, get the pixel value that chaos sequence that rules combinations such as benefits, decoding shine upon generation by Logistic is upset image.
Accompanying drawing 1 is depicted as algorithm flow chart of the present invention, and it specifically comprises following sport technique segment:
1. the generation of chaos sequence
In the algorithm of the present invention, shine upon with Cubic mapping, wavelet function mapping and Logistic and to realize image encryption.Wherein the characteristic of Cubic mapping and Logistic mapping is that scholars are well-known.Here we highlight the characteristic of wavelet function.
(1) Cubic mapping
The Cubic mapping definition is as follows:
x n-1=μx n 3+(1-μ)x n???????????????(1)
X wherein n∈ [1,1], n=0,1,2 ..., when μ ∈ [3.2,4], produce chaos sequence.
(2) wavelet function mapping
Wavelet function iteration under certain conditions also can produce chaos phenomenon.In the iterative formula (2) that an one dimension wavelet function constitutes:
x n + 1 = k ( 1 - x n 2 ) exp ( - 0.5 ( x n + μ ) 2 ) - - - ( 2 )
Work as k=1.33, x ∈ (0,1), μ ∈ chaos phenomenon can occur when [0.77 ,-0.29].The bifurcation diagram and the Lyapunov index map of wavelet function mapping are seen Fig. 2.
(3) Logistic mapping
The Logistic mapping is a kind of typical chaotic maps, and it is defined as follows:
x n+1=μx n(1-x n)?????????????(3)
μ ∈ [0,4] wherein, x n∈ (0,1), n=0,1,2 ...When 0<μ≤3.569945, this power system produces doubling time from the steady state (SS) bifurcated; When 3.569945<μ≤4, this power system enters chaos state.
Among the present invention,, be directly by initial value x by Cubic mapping and the chaos sequence that wavelet function produces 0, y 0The real number chaos sequence that produces, and, must convert binary sequence to by the chaos sequence that the Logistic mapping produces in order to act on mutually with dna sequence dna.Define a threshold function table f (x) according to all chaos sequence of real numbers that is produced by any initial value, getting threshold value is 0.5, and then f (x) is defined as follows:
f ( x ) = 0 , 0 < x &le; 0.5 ; 1 , 0.5 < x &le; 1 ; - - - ( 4 )
Just can convert the chaos sequence of real numbers to binary sequence by f (x).
2.DNA sequential encryption
The single stranded DNA sequence is made up of four kinds of base A (adenine), C (cytosine), G (guanine), T (thymine), wherein A and T, C and G complementation.Respectively four bases in the dna sequence dna are carried out binary coding with 00,01,10,11, total 4!=24 kinds of coded combinations.Because binary digit 0 and 1 complementation, thereby 00 and 11 complementations, 01 and 10 complementations so in 24 kinds of numerical codings, have 8 kinds of codings to satisfy base complementrity pairing criterion, see Table 1.
8 kinds of codings of table 1DNA sequence, decoding mapping criterion
??1 ??2 ??3 ??4 ??5 ??6 ??7 ??8
??00---A??01---C??10---G??11---T ??00---A??01---G??10---C??11---T ??00---C??01---A??10---T??11---G ??00---C??01---T??10---A??11---G ??00---G??01---A??10---T??11---C ??00---G??01---T??10---A??11---C ??00---T??01---C??10---G??11---A ??00---T??01---G??10---C??11---A
At first, these 8 kinds of rules are mapped in 8 sub regions between (0,1), for example: (0,0.125] region representation rule 1, (0.125,0.25] expression rule 2 Then, (key1, the key2) random number between the generation at random two (0,1) are selected different dna encodings, decoding rule with this, and different codings, decoding rule make the encryption and decryption difference of image with two seeds; At last, convert original image to binary sequence,, realize the encryption of image according to the coding of selecting, decoding criterion.
Example: as first pixel value of original image is that [01001011] is encoded with dna encoding mapping criterion 1 and obtained dna sequence dna [CAGT], and above-mentioned dna sequence dna is decoded with DNA decoding mapping criterion 5 obtains binary sequence [11010010] then.
3. based on the image encryption algorithm of dna sequence dna and many chaotic maps
Concrete steps are as follows:
(1) 8 gray level image A of input (m, n), m, n are the ranks dimension of image A;
(2) utilize Cubic mapping and wavelet function respectively with initial value x 0, y 0, systematic parameter μ 1, μ 2Produce two chaos sequence { x m, { y n;
(3) these two sequences are arranged by ascending order, obtain two new sequence { x m', { y n';
(4) with { x m', { y n' value of the position at each element place replaces former sequence { x m, { y nIn this element, obtain two new sequence { x m" }, { y n";
(5) with row address and the column address of these two sequences, image pixel positions is carried out scramble with this matrix as the scramble matrix, obtain gray level image B (m, n);
(6) image B is changed into the binary sequence M of one dimension, because each pixel value can be by 8 binary representations, so length (M)=m * n * 8;
(7) with sequence M, encode according to the DNA mapping ruler that seed key1 chooses, obtaining length is the dna sequence dna N of m * n * 8/2;
(8) utilizing the Logistic chaotic maps, is z at initial value 0, systematic parameter is μ 3Condition under, generation length is the chaos sequence z of m * n * 8/2 i
(9) utilize threshold function table f (x) that chaos sequence is changed into binary sequence, work as z i=1 o'clock, the base of this position was got benefit, otherwise constant;
(10) dna sequence dna after will changing carries out decode operation according to the DNA mapping ruler that seed key2 chooses, and is reduced into binary sequence, reconstructed image matrix, the gray level image after obtaining encrypting.
Wherein, step (1)-(5) are the scramble processes of image pixel positions, and step (6)-(10) are that the pixel value of image is upset process.The decrypting process of image is the inverse process of encrypting, and is no longer burdensome here.
Beneficial effect of the present invention: from above-mentioned Algorithm Analysis, the assailant must possess 8 key parameters of four group keys, i.e. Cubic mapping initial value (x 0), systematic parameter (μ 1), wavelet function initial value (y 0), systematic parameter (μ 2), Logistic mapping initial value (z 0), chaos system parameter (μ 3), dna encoding key (key1), DNA decoding key (key2), could be decrypted image smoothly, improved the security of image greatly; With traditional encipherment scheme ratio based on chaos, the present invention has that cipher round results is good, and key space is big, the high and advantages such as anti-exhaustive attack and statistical study attack of key sensitivity; With the encipherment scheme ratio based on the DNA cryptographic system, the present invention can encrypt digital picture, and with respect to the biology operation of complexity, this algorithm is easy to realize and control.
Description of drawings
Fig. 1 algorithm flow chart of the present invention;
The bifurcation diagram of Fig. 2 wavelet function and exponent index map;
Fig. 3 figure as a result of the present invention;
Fig. 4 key sensitivity test pattern;
The histogram of Fig. 5 original image and encrypted image;
Correlogram between Fig. 6 original image and encrypted image horizontal direction pixel.
Embodiment
In conjunction with the accompanying drawings implementation process of the present invention is done detailed explanation, but be not limited to present embodiment.
Under the MATLAB7.1 environment, the lena gray level image to 128 * 128 is at x 0=0.3, y 0=0.1, z 0=0.36, μ 1=3.6, μ 2=-0.5, μ 3=3.9, key1=1986 carries out emulation experiment under the condition of key2=1.Experiment flow as shown in Figure 1.
Step 1: (m n), sees accompanying drawing 3 (a) to input lena gray level image A, and m, n are the ranks dimension of image A, m=128 wherein, n=128.Image A can be expressed as matrix form and see formula (5);
[ X &prime; , X &prime; &prime; ] = Sort ( X ) [ Y &prime; , Y &prime; &prime; ] = Sort ( Y ) - - - ( 5 )
Step 2: utilize Cubic mapping and wavelet function respectively with initial value x 0=0.3, y 0=0.1, systematic parameter μ 1=3.6, μ 2=-0.5, produce two chaos sequence X=x 1x 2X m, Y=y 1y 2Y n
Step 3: utilize formula (6) to sequence X, Y carries out ascending order and arranges;
A = 101 107 . . . 203 100 106 . . . 202 . . . . . . . . . . . . 66 57 . . . 129 mn - - - ( 6 )
Function S ort () is the index order function, and X ', Y ' are sequence X, the new sequence that obtains after the Y ascending order, X ", Y " is its corresponding index value;
Step 4: come the position of scramble image A with formula (7), (m n), sees accompanying drawing 3 (b) to obtain image B behind the scramble;
A ( i , j ) &LeftRightArrow; A ( X &prime; &prime; ( i ) , Y &prime; &prime; ( j ) ) - - - ( 7 )
I=1 wherein, 2 ... m, j=1,2 ... n;
Step 5: convert image B the binary sequence M of one dimension to, the length of M is m * n * 8;
Step 6: the DNA mapping ruler of being chosen by seed key1=1986 is a rule 7, and 7 couples of sequence M carry out dna encoding with rule, obtain dna sequence dna N, length (N)=m * n * 4;
Step 7: utilizing the Logistic chaotic maps, is z at initial value 0=0.36, systematic parameter is μ 3Under=3.9 the condition, generation length is the chaos sequence Z={z of m * n * 8/2 1z 2Z M * n * 4;
Step 8: utilize threshold function table f (x) that chaos sequence is changed into binary sequence, work as z i=1 o'clock, the base of N (i) was got benefit, otherwise N (i) is constant;
Step 9: the dna sequence dna after will changing, the DNA mapping ruler of choosing according to seed key2=1 6 carries out decode operation, is reduced into binary sequence, the reconstructed image matrix, the gray level image after obtaining encrypting is seen accompanying drawing 3 (c).
The image deciphering is the inverse process of encrypting, and deciphering figure sees accompanying drawing 3 (d).
For the better security of this cryptographic algorithm of explanation, the present invention is respectively to key space, the sensitivity of key, and the correlativity between grey level histogram and the pixel etc. is analyzed.
1. key space analysis
In the present invention, having 8 keys, is respectively x 0, μ 1, y 0, μ 2, z 0, μ 3, key1, key2, wherein x 0∈ [1 ,-1], μ 1∈ [3.2,4], y 0∈ [0,1], μ 2∈ [0.77 ,-0.29], z 0∈ [0,1], μ 3∈ [3.569945,4], key1, key2 are random numbers.If computational accuracy is 10 -14, calculating the key space of removing outside the random number is 10 14* 10 14* 10 14* 10 14* 10 14* 10 14=10 84, as seen this algorithm has enough big key space and resists exhaustive attack.
2. key sensitivity analysis
For the sensitivity of test key, use the key of fine difference to be decrypted, accompanying drawing 4 is the result after deciphering.Fig. 4 (a) represents x 0=0.30000000000001, the deciphering figure that other key is constant; The same with Fig. 4 (a), Fig. 4 (b), Fig. 4 (c) represent y respectively 0=0.10000000000001, z 0=0.36000000000001, the deciphering figure that other key is constant; Deciphering figure under the wrong DNA mapping ruler of Fig. 4 (d) expression.Fig. 4 (a) and (b), (c) can illustrate, as long as have small difference in the key, all can not recover original image.As seen, this algorithm has stronger key sensitivity, can effectively resist exhaustive attack.
3. grey level histogram analysis
We analyze the change of image statistics characteristic before and after encrypting by histogrammic comparison.From accompanying drawing 5 (a) and (b) as can be seen, bigger variation has taken place in the histogram of image before and after the encryption.Image pixel before encrypting is more concentrated, promptly distributes fewer at the two ends of (0,255) pixel, and intermediate distribution is more, and the distribution of the image pixel after encrypting is more even, and two image similarities are lower, and the assailant is difficult to utilize the statistical property of grey scale pixel value to recover original image.This shows that this algorithm has well resists the statistical study ability.
4. correlation analysis
Correlativity between original image pixels is very high, in order to destroy statistical attack, must reduce the correlativity of encrypted image.Our being chosen at horizontal direction, vertical direction and, utilizing the correlativity between formula (8)-(11) calculating pixel then at random from original image and encrypted image to 3000 pairs of neighbor pixels on the angular direction.
r xy = cov ( x , y ) D ( x ) &times; D ( y ) - - - ( 8 )
E ( x ) = 1 N &Sigma; i = 1 N x i - - - ( 9 )
D ( x ) = 1 N &Sigma; i = 1 N ( x i - E ( x ) ) 2 - - - ( 10 )
cov ( x , y ) = 1 N &Sigma; i = 1 N ( x i - E ( x ) ) ( y i - E ( y ) ) - - - ( 11 )
Wherein x and y are the gray-scale values between two adjacent pixels.
Original image Encrypted image
Horizontal direction ??0.9248 ??0.0023
Vertical direction ??0.9547 ??-0.0161
Original image Encrypted image
To the angular direction ??0.8886 ??0.0015
The related coefficient of two adjacent pixels in table 2. original image and the encrypted image
The correlativity of original image and encrypted image horizontal direction is seen accompanying drawing 6 (a) and (b), related coefficient be respectively 0.9248 and the related coefficient of other direction of 0.0023. see Table 2.Correlativity between the pixel of encrypted image is very low as can be seen from Fig. 6 (b) and table 2, almost near 0, and explanation once more, this algorithm has very strong anti-statistical attack ability.
Data in this example are the process of cryptographic algorithm for convenience of description only, and this working of an invention and cipher round results do not rely on concrete numerical value.

Claims (4)

1. based on the digital image encryption method of dna sequence dna and many chaotic maps, it is characterized in that this method comprises the steps:
(1) 8 gray level image A of input (m, n), m, n are the ranks dimension of image A;
(2) utilize Cubic mapping and wavelet function respectively with initial value x 0, y 0, systematic parameter μ 1, μ 2Produce two chaos sequence { x m, { y n;
(3) these two sequences are arranged by ascending order, obtain two new sequence { x m', { y n';
(4) with { x m', { y n' value of the position at each element place replaces former sequence { x m, { y nIn this element, obtain two new sequence { x m" }, { y n";
(5) with row address and the column address of these two sequences, image pixel positions is carried out scramble with this matrix as the scramble matrix, obtain gray level image B (m, n);
(6) image B is changed into the binary sequence M of one dimension, each pixel value is by 8 binary representations, length (M)=m * n * 8;
(7) with sequence M, encode according to the DNA mapping ruler that seed key1 chooses, obtaining length is the dna sequence dna N of m * n * 8/2;
(8) utilizing the Logistic chaotic maps, is z at initial value 0, systematic parameter is μ 3Condition under, generation length is the chaos sequence z of m * n * 8/2 i
(9) utilize threshold function table f (x) that chaos sequence is changed into binary sequence, work as z i=1 o'clock, the base of this position was got benefit, otherwise constant;
(10) dna sequence dna after will changing carries out decode operation according to the DNA mapping ruler that seed key2 chooses, and is reduced into binary sequence, reconstructed image matrix, the gray level image after obtaining encrypting.
2. the digital image encryption method based on dna sequence dna and many chaotic maps according to claim 1 is characterized in that, the DNA mapping ruler of choosing according to seed key1 in the described step (7) carries out Methods for Coding and is:
At first, set up the dna encoding, the decoding mapping ruler that satisfy the base complementrity pair principle, see Table 1;
8 kinds of codings of table 1 dna sequence dna, decoding mapping ruler
??1 ??2 ??3 ??4 ??5 ??6 ??7 ??8 ??00---A??01---C??10---G??11---T ??00---A??01---G??10---C??11---T ??00---C??01---A??10---T??11---G ??00---C??01---T??10---A??11---G ??00---G??01---A??10---T??11---C ??00---G??01---T??10---A??11---C ??00---T??01---C??10---G??11---A ??00---T??01---G??10---C??11---A
Secondly, be 8 sub regions with (0,1) area dividing, the corresponding a kind of mapping ruler of each subregion:
(0,0.125] mapping ruler 1
(0.125,0.25] mapping ruler 2
(0.25,0.375] mapping ruler 3
(0.375,0.5] mapping ruler 4
(0.5,0.625] mapping ruler 5
(0.625,0.75] mapping ruler 6
(0.75,0.875] mapping ruler 7
(0.875,1] mapping ruler 8
Once more, utilize random function to produce a random number between (0,1) as seed, choose corresponding DNA mapping ruler with this random number again with integer k ey1;
At last, with the DNA mapping ruler of choosing the image that step (6) obtains being encoded, at first is the binary matrix of one dimension with image transitions during coding, utilizes the DNA mapping ruler of choosing to encode then and obtains the dna sequence dna matrix N.
3. the digital image encryption method based on dna sequence dna and many chaotic maps according to claim 1 is characterized in that, the method that the middle base of described step (9) is got benefit is:
At first, with the chaos sequence { z that produces in the step (8) i, i=1,2 ... m * n * 8/2 changes into binary sequence according to threshold function table f (x), sees formula (a):
f ( x ) = 0 , 0 < x &le; 0.5 ; 1 , 0.5 < x &le; 1 ; - - - ( a )
Then, judge z iWhether equal 1, if equal 1 then to N i, i=1,2 ... benefit is got in m * n * 8/2, otherwise N iConstant, the benefit of A is T here, and the benefit of C is G, and vice versa;
At last, obtain getting dna sequence dna matrix after the benefit.
4. the digital image encryption method based on dna sequence dna and many chaotic maps according to claim 1 is characterized in that, the method that the DNA mapping ruler of choosing according to seed key2 in the described step (10) carries out decode operation is:
At first, described according to claim 2, utilize random function to produce a random number between (0,1) with integer k ey2 as seed;
Secondly, described according to claim 2, choose the DNA mapping ruler according to the random number that produces;
At last, according to the DNA mapping ruler of choosing the sequence matrix that step (9) obtains is decoded, obtain a binary one dimension matrix, be converted into the matrix of size again, this matrix is carried out obtaining the big or small (m * n that is after the decimal system conversion for (m * n, 8), 1) matrix, obtain encrypted image by matrix reconstruct, its size be (m, n).
CN2009102203245A 2009-11-26 2009-11-26 Digital image encryption method based on DNA sequence and multi-chaotic mapping Active CN101706946B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009102203245A CN101706946B (en) 2009-11-26 2009-11-26 Digital image encryption method based on DNA sequence and multi-chaotic mapping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009102203245A CN101706946B (en) 2009-11-26 2009-11-26 Digital image encryption method based on DNA sequence and multi-chaotic mapping

Publications (2)

Publication Number Publication Date
CN101706946A true CN101706946A (en) 2010-05-12
CN101706946B CN101706946B (en) 2012-06-13

Family

ID=42377168

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009102203245A Active CN101706946B (en) 2009-11-26 2009-11-26 Digital image encryption method based on DNA sequence and multi-chaotic mapping

Country Status (1)

Country Link
CN (1) CN101706946B (en)

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102360488A (en) * 2011-09-29 2012-02-22 付冲 Digital image encryption method based on chaotic orbit perturbation
CN102644419A (en) * 2012-02-23 2012-08-22 杭州电子科技大学 Dynamic password remote control lock based on chaos technology
CN103049779A (en) * 2012-12-31 2013-04-17 郑莹娜 Method for generating and recognizing food safety liability insurance electronic policy two-dimensional code voucher
CN103258313A (en) * 2013-04-11 2013-08-21 苏州经贸职业技术学院 Image encryption method based on Henon mapping and magic cube transformation
CN103281504A (en) * 2013-05-30 2013-09-04 东北大学 Chaotic image encryption method with double-direction diffusion mechanism
CN103310157A (en) * 2012-03-14 2013-09-18 大连大学 Reverse transcriptase-deoxyribose nucleic acid (RT-DNA) cellular automaton-based image encryption method
CN103473733A (en) * 2013-09-12 2013-12-25 东北林业大学 Image encryption algorithm based on DNA encoding and chaotic mapping
CN104751016A (en) * 2015-04-16 2015-07-01 大连大学 Variable neighborhood search based DNA label structuring method
CN105119717A (en) * 2015-07-21 2015-12-02 郑州轻工业学院 DNA coding based encryption system and encryption method
CN105550570A (en) * 2015-12-02 2016-05-04 深圳市同创国芯电子有限公司 Encryption and decryption method and device applied to programmable device
CN105704500A (en) * 2016-03-17 2016-06-22 哈尔滨工业大学(威海) Novel chaos-based image lossless compression encryption joint algorithm
CN106817218A (en) * 2015-12-01 2017-06-09 国基电子(上海)有限公司 Encryption method based on DNA technique
CN107437266A (en) * 2017-07-11 2017-12-05 大连大学 Image encryption method based on chaos system Yu DNA chain displacement model
CN107798219A (en) * 2016-08-30 2018-03-13 清华大学 Data are subjected to biometric storage and the method reduced
CN109242751A (en) * 2018-08-16 2019-01-18 电子科技大学 A kind of image encryption method based on chaos tent maps and DNA decoding
CN109951282A (en) * 2019-03-28 2019-06-28 重庆邮电大学 A kind of pseudo-random series producing method based on segmentation CUBIC chaotic maps
CN110113618A (en) * 2019-06-11 2019-08-09 苏州泓迅生物科技股份有限公司 A kind of image storage method, read method, storage device and reading device
CN111400731A (en) * 2020-03-11 2020-07-10 大连大学 DNACNott-based quantum image encryption method
CN111614864A (en) * 2020-05-23 2020-09-01 南京南大智慧城市规划设计股份有限公司 SVD and CBC mode combination-based image compression encryption transmission method
WO2020181803A1 (en) * 2019-03-13 2020-09-17 苏州泓迅生物科技股份有限公司 Image encoding method and image decoding method, and encoding apparatus and decoding apparatus
CN111832052A (en) * 2020-07-13 2020-10-27 江西财经大学 Non-peer image encryption method based on significance detection
CN113938573A (en) * 2021-09-16 2022-01-14 四川大学 Computational ghost imaging image encryption method based on chaotic mapping and DNA coding
CN115277977A (en) * 2022-07-25 2022-11-01 重庆邮电大学 Hybrid chaotic image encryption method capable of configuring floating point precision based on FPGA
CN115633129A (en) * 2022-10-13 2023-01-20 同济大学 Stack type sparse self-encoder and GAN chaotic sequence image encryption method and device
CN115834788A (en) * 2022-11-16 2023-03-21 安阳师范学院 Color image encryption method for visualized DNA fulcrum-mediated strand displacement reaction
CN116226891A (en) * 2023-05-08 2023-06-06 宁波财经学院 Face image data encryption method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105913370B (en) * 2016-04-08 2019-03-22 重庆邮电大学 A kind of resume image being layered and combine chaos based on small echo

Cited By (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102360488B (en) * 2011-09-29 2013-02-13 付冲 Digital image encryption method based on chaotic orbit perturbation
CN102360488A (en) * 2011-09-29 2012-02-22 付冲 Digital image encryption method based on chaotic orbit perturbation
CN102644419A (en) * 2012-02-23 2012-08-22 杭州电子科技大学 Dynamic password remote control lock based on chaos technology
CN102644419B (en) * 2012-02-23 2014-07-09 杭州电子科技大学 Dynamic password remote control lock based on chaos technology
CN103310157A (en) * 2012-03-14 2013-09-18 大连大学 Reverse transcriptase-deoxyribose nucleic acid (RT-DNA) cellular automaton-based image encryption method
CN103310157B (en) * 2012-03-14 2015-11-18 大连大学 Based on the image encryption method of RT-DNA cellular automaton
CN103049779B (en) * 2012-12-31 2016-12-28 郑莹娜 The generation of food safety liability insurance electronic insurance policy two-dimension code credential and recognition methods
CN103049779A (en) * 2012-12-31 2013-04-17 郑莹娜 Method for generating and recognizing food safety liability insurance electronic policy two-dimensional code voucher
CN103258313A (en) * 2013-04-11 2013-08-21 苏州经贸职业技术学院 Image encryption method based on Henon mapping and magic cube transformation
CN103281504A (en) * 2013-05-30 2013-09-04 东北大学 Chaotic image encryption method with double-direction diffusion mechanism
CN103473733A (en) * 2013-09-12 2013-12-25 东北林业大学 Image encryption algorithm based on DNA encoding and chaotic mapping
CN103473733B (en) * 2013-09-12 2016-08-10 东北林业大学 Based on DNA encoding and the resume image of chaotic maps
CN104751016A (en) * 2015-04-16 2015-07-01 大连大学 Variable neighborhood search based DNA label structuring method
CN104751016B (en) * 2015-04-16 2018-03-27 大连大学 Building method based on the DNA labels for becoming neighborhood search
CN105119717A (en) * 2015-07-21 2015-12-02 郑州轻工业学院 DNA coding based encryption system and encryption method
CN106817218A (en) * 2015-12-01 2017-06-09 国基电子(上海)有限公司 Encryption method based on DNA technique
CN105550570A (en) * 2015-12-02 2016-05-04 深圳市同创国芯电子有限公司 Encryption and decryption method and device applied to programmable device
CN105704500A (en) * 2016-03-17 2016-06-22 哈尔滨工业大学(威海) Novel chaos-based image lossless compression encryption joint algorithm
CN105704500B (en) * 2016-03-17 2019-01-22 哈尔滨工业大学(威海) A kind of new Lossless Image Compression Algorithm encryption integrated processes based on chaos
CN107798219B (en) * 2016-08-30 2021-07-13 清华大学 Method for biologically storing and restoring data
CN107798219A (en) * 2016-08-30 2018-03-13 清华大学 Data are subjected to biometric storage and the method reduced
CN107437266A (en) * 2017-07-11 2017-12-05 大连大学 Image encryption method based on chaos system Yu DNA chain displacement model
CN109242751A (en) * 2018-08-16 2019-01-18 电子科技大学 A kind of image encryption method based on chaos tent maps and DNA decoding
CN109242751B (en) * 2018-08-16 2020-06-30 电子科技大学 Image encryption method based on chaotic tent mapping and DNA decoding
WO2020181803A1 (en) * 2019-03-13 2020-09-17 苏州泓迅生物科技股份有限公司 Image encoding method and image decoding method, and encoding apparatus and decoding apparatus
CN109951282A (en) * 2019-03-28 2019-06-28 重庆邮电大学 A kind of pseudo-random series producing method based on segmentation CUBIC chaotic maps
CN109951282B (en) * 2019-03-28 2022-04-01 重庆邮电大学 Pseudo-random sequence generation method based on segmented CUBIC chaotic mapping
CN110113618B (en) * 2019-06-11 2021-09-03 苏州泓迅生物科技股份有限公司 Image storage method, reading method, storage device and reading device
CN110113618A (en) * 2019-06-11 2019-08-09 苏州泓迅生物科技股份有限公司 A kind of image storage method, read method, storage device and reading device
CN111400731B (en) * 2020-03-11 2024-01-26 大连大学 Quantum image encryption method based on DNACNot
CN111400731A (en) * 2020-03-11 2020-07-10 大连大学 DNACNott-based quantum image encryption method
CN111614864A (en) * 2020-05-23 2020-09-01 南京南大智慧城市规划设计股份有限公司 SVD and CBC mode combination-based image compression encryption transmission method
CN111832052A (en) * 2020-07-13 2020-10-27 江西财经大学 Non-peer image encryption method based on significance detection
CN111832052B (en) * 2020-07-13 2024-02-20 江西财经大学 Unequal image encryption method based on significance detection
CN113938573A (en) * 2021-09-16 2022-01-14 四川大学 Computational ghost imaging image encryption method based on chaotic mapping and DNA coding
CN115277977B (en) * 2022-07-25 2023-11-10 重庆邮电大学 Hybrid chaotic image encryption method based on FPGA (field programmable Gate array) configurable floating point precision
CN115277977A (en) * 2022-07-25 2022-11-01 重庆邮电大学 Hybrid chaotic image encryption method capable of configuring floating point precision based on FPGA
CN115633129A (en) * 2022-10-13 2023-01-20 同济大学 Stack type sparse self-encoder and GAN chaotic sequence image encryption method and device
CN115633129B (en) * 2022-10-13 2024-03-05 同济大学 Stacked sparse self-encoder and GAN chaotic sequence image encryption method and device
CN115834788A (en) * 2022-11-16 2023-03-21 安阳师范学院 Color image encryption method for visualized DNA fulcrum-mediated strand displacement reaction
CN116226891A (en) * 2023-05-08 2023-06-06 宁波财经学院 Face image data encryption method
CN116226891B (en) * 2023-05-08 2023-09-01 宁波财经学院 Face image data encryption method

Also Published As

Publication number Publication date
CN101706946B (en) 2012-06-13

Similar Documents

Publication Publication Date Title
CN101706946B (en) Digital image encryption method based on DNA sequence and multi-chaotic mapping
CN101706947B (en) Image fusion encryption method based on DNA sequences and multiple chaotic mappings
Wang et al. Chaotic color image encryption based on 4D chaotic maps and DNA sequence
CN112422268B (en) Image encryption method based on block scrambling and state conversion
Xingyuan et al. An image encryption algorithm based on ZigZag transform and LL compound chaotic system
CN101702240B (en) Image encryption method based on DNA sub-sequence operation
CN112637441B (en) Color image compression encryption method based on compressed sensing
Ahmad et al. A new algorithm of encryption and decryption of images using chaotic mapping
Zhang et al. Image encryption using DNA addition combining with chaotic maps
CN103473733A (en) Image encryption algorithm based on DNA encoding and chaotic mapping
CN101719908A (en) Image encryption method based on chaos theory and DNA splice model
CN102523365B (en) Method for encrypting and decrypting image based on cellular automata
CN105701755A (en) Image encryption method based on fractal and DNA sequence operation
CN112202545B (en) Image encryption method based on Y-type filling curve and variable-step Joseph traversal
Sha et al. An image encryption scheme based on IAVL permutation scheme and DNA operations
Zhang et al. A new algorithm of image compression and encryption based on spatiotemporal cross chaotic system
CN113691362B (en) Bit plane image compression encryption method based on hyperchaotic system and DNA coding
Zheng et al. An image encryption algorithm based on multichaotic system and DNA coding
Roy et al. A robust image encryption method using chaotic skew-tent map
Wang et al. Image encryption algorithm based on bit-level permutation and dynamic overlap diffusion
CN115311118A (en) Remote sensing image encryption method based on two-dimensional discrete memristor hyperchaotic mapping
Xiao et al. Image lossless encoding and encryption method of EBCOT Tier1 based on 4D hyperchaos
CN113300827B (en) Latin square-based chaotic image encryption method
CN103310157B (en) Based on the image encryption method of RT-DNA cellular automaton
CN106934755B (en) A kind of image encrypting and decrypting method based on m-sequence

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20100512

Assignee: Dalian Panyue Biotechnology Co.,Ltd.

Assignor: DALIAN University

Contract record no.: X2023210000035

Denomination of invention: A Digital Image Encryption Method Based on DNA Sequence and Multi Chaos Mapping

Granted publication date: 20120613

License type: Exclusive License

Record date: 20230515

EE01 Entry into force of recordation of patent licensing contract