CN101706946B - Digital image encryption method based on DNA sequence and multi-chaotic mapping - Google Patents

Digital image encryption method based on DNA sequence and multi-chaotic mapping Download PDF

Info

Publication number
CN101706946B
CN101706946B CN2009102203245A CN200910220324A CN101706946B CN 101706946 B CN101706946 B CN 101706946B CN 2009102203245 A CN2009102203245 A CN 2009102203245A CN 200910220324 A CN200910220324 A CN 200910220324A CN 101706946 B CN101706946 B CN 101706946B
Authority
CN
China
Prior art keywords
dna
sequence
image
dna sequence
mapping
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2009102203245A
Other languages
Chinese (zh)
Other versions
CN101706946A (en
Inventor
张强
薛香莲
魏小鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dalian University
Original Assignee
Dalian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian University filed Critical Dalian University
Priority to CN2009102203245A priority Critical patent/CN101706946B/en
Publication of CN101706946A publication Critical patent/CN101706946A/en
Application granted granted Critical
Publication of CN101706946B publication Critical patent/CN101706946B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Facsimile Transmission Control (AREA)

Abstract

The invention discloses a novel digital image encryption method belonging to the field of DNA calculation and image encryption, and provides a digital image encryption method based on a DNA sequence and multi-chaotic mapping. The traditional encryption algorithm based on chaos has the defects that a key space is small, a chaos system is easy to analyze and forecast, and the like; and almost of the current encryption systems based on DNA need complex biological operation and are hard to realize. In order to overcome the defects, the invention provides the digital image encryption method based on a DNA sequence and multi-chaotic mapping, comprising the following steps of: firstly, scrambling the positions of pixels of images by utilizing a two-dimension chaotic sequence generated by Cubic mapping and Haar wavelet functions, and then disrobing the pixel values of the images under the action of a chaotic sequence generated by the DNA sequence and the Logistic mapping. The experimental result shows that the algorithm is easy to realize, has better encryption effect on images, large key space and high sensitivity to keys and can effectively resist exhaustive attack and statistical attack.

Description

Digital image encryption method based on dna sequence dna and many chaotic maps
Technical field
The present invention relates to the field of DNA computing field and digital image encryption, particularly a kind of digital image encryption method mainly is to utilize the encoding characteristics of dna sequence dna to combine many chaotic maps to realize the encryption of digital picture.
Background technology
In current society, computer network has changed people's communication mode, and people can be transmitted various multimedia messagess easily through network.Because network opening, multi-media information security more and more causes people's attention with maintaining secrecy.Digital picture is the important information carrier in the multimedia communication, thereby how to protect image information to become question of common concern.
Since chaos type of having at random, initial value sensitiveness and be difficult to characteristic such as prediction, become the focus that researchers pay close attention to.Object according to scramble divides, and can be divided into two types based on the image encryption method of chaos: location of pixels scramble and pixel value scramble.The characteristics of location of pixels scramble are that encryption efficiency is high, effective, but the fail safe of algorithm is not high, is difficult to resist statistical attack; The characteristics of pixel value scramble are that algorithm security property is high, but cipher round results is bad, and efficient is low.In addition, the AES of traditional pixel value based on chaos all be the chaos sequence that produces with single chaotic maps directly and the gray value of pixel superpose and realize the encryption of image.Shortcomings such as lot of documents points out that the image encryption algorithm that utilizes single chaotic maps to realize has fail safe lower, and easy decoding of chaos sequence and key space are little.
The DNA encryption system is to be accompanied by the research that DNA calculates in recent years and the cryptography frontier that occurs; Be characterized in DNA being information carrier; With the modern biotechnology is implementation tool, excavates advantages such as intrinsic high storage density of DNA and high concurrency, realizes cryptographic functions such as encryption, deciphering.The existing algorithm of encrypting based on DNA will be operated with Bioexperiment mostly, because the Bioexperiment apparatus expensive, experimental situation is difficult to control, and shortcomings such as experiment sensitivity height are still theoretical more than practice based on the research that DNA encrypts at present.
Summary of the invention
In order to overcome the shortcoming of above-mentioned encipherment scheme; The present invention proposes a kind of digital image encryption method based on dna sequence dna and many chaotic maps; Broken away from the complex biological operation during DNA encrypts; The simple characteristic of utilizing dna encoding also combines many chaos sequences to realize simultaneously the scramble that location of pixels and pixel are put, and improves digital image encryption algorithm effects and fail safe.This algorithm is better to the cipher round results of image, and key space is big, and is strong to the sensitiveness of key, can resist exhaustive attack and statistical attack effectively.
Technical scheme of the present invention is: the location of pixels of the chaos sequence scramble image that this algorithm at first produces through Cubic mapping and wavelet function, utilize then dna sequence dna coding, get the pixel value that chaos sequence that rules combinations such as benefits, decoding shine upon generation by Logistic is upset image.
Accompanying drawing 1 is depicted as algorithm flow chart of the present invention, and it specifically comprises following sport technique segment:
1. the generation of chaos sequence
In the algorithm of the present invention, shine upon with Cubic mapping, wavelet function mapping and Logistic and to realize image encryption.Wherein the characteristic of Cubic mapping and Logistic mapping is that scholars are well-known.Here we highlight the characteristic of wavelet function.
(1) Cubic mapping
The Cubic mapping definition is following:
x n - 1 = μ x n 3 + ( 1 - μ ) x n - - - ( 1 )
X wherein n∈ [1,1], n=0,1,2 ..., when μ ∈ [3.2,4], produce chaos sequence.
(2) wavelet function mapping
Wavelet function iteration under certain conditions also can produce chaos phenomenon.In the iterative formula (2) that an one dimension wavelet function constitutes:
x n + 1 = k ( 1 - x n 2 ) exp ( - 0.5 ( x n + μ ) 2 ) - - - ( 2 )
Work as k=1.33, x ∈ (0,1), μ ∈ chaos phenomenon can occur when [0.77 ,-0.29].The bifurcation diagram and the Lyapunov index map of wavelet function mapping are seen Fig. 2.
(3) Logistic mapping
The Logistic mapping is a kind of typical chaotic maps, and it defines as follows:
x n+1=μx n(1-x n)(3)
μ ∈ [0,4] wherein, x n∈ (0,1), n=0,1,2 ...When 0<μ≤3.569945, this dynamical system produces doubling time from the stable state bifurcated; When 3.569945<μ≤4, this dynamical system gets into chaos state.
Among the present invention,, be directly through initial value x by Cubic mapping and the chaos sequence that wavelet function produces 0, y 0The real number chaos sequence that produces, and, must convert binary sequence to by the chaos sequence that the Logistic mapping produces in order to act on mutually with dna sequence dna.Chaos sequence of real numbers that is produced by any initial value according to all defines a threshold function table f (x), and getting threshold value is 0.5, and then f (x) definition is as follows:
f ( x ) = 0 , 0 < x &le; 0.5 ; 1 , 0.5 < x &le; 1 ; - - - ( 4 )
Just can convert the chaos sequence of real numbers to binary sequence through f (x).
2.DNA sequential encryption
The single stranded DNA sequence is made up of four kinds of base A (adenine), C (cytosine), G (guanine), T (thymine), and wherein A and T, C and G are complementary.Respectively four bases in the dna sequence dna are carried out binary coding with 00,01,10,11, total 4!=24 kinds of coded combinations.Because binary digit 0 and 1 complementation, thereby 00 and 11 complementations, 01 and 10 complementations so in 24 kinds of digital codings, have 8 kinds of codings to satisfy base complementrity pairing criterion, are seen table 1.
8 kinds of codings of table 1DNA sequence, decoding mapping criterion
1 2 3 4 5 6 7 8
00---A 01---C 10---G 11---T 00---A 01---G 10---C 11---T 00---C 01---A 10---T 11---G 00---C 01---T 10---A 11---G 00---G 01---A 10---T 11---C 00---G 01---T 10---A 11---C 00---T 01---C 10---G 11---A 00---T 01---G 10---C 11---A
At first, these 8 kinds of rules are mapped in 8 sub regions between (0,1), for example: (0,0.125] region representation rule 1, (0.125,0.25] expression rule 2 Then, with two seeds (key1, key2) random number between at random the generation two (0,1) is selected different dna encodings, decoding rule with this, different coding, decoding rule make that the encryption and decryption of image is different; At last, convert original image to binary sequence,, realize the encryption of image according to the coding of selecting, decoding criterion.
Instance: like first pixel value of original image is that [01001011] is encoded with dna encoding mapping criterion 1 and obtained dna sequence dna [CAGT], and above-mentioned dna sequence dna is decoded with DNA decoding mapping criterion 5 obtains binary sequence [11010010] then.
3. based on the image encryption algorithm of dna sequence dna and many chaotic maps
Concrete steps are following:
(1) 8 gray level image A of input (m, n), m, n are the ranks dimension of image A;
(2) utilize Cubic mapping and wavelet function respectively with initial value x 0, y 0, system parameters μ 1, μ 2Produce two chaos sequence { x m, { y n;
(3) these two sequences are arranged by ascending order, obtain two new sequences x ' m, y ' n;
(4) incite somebody to action x ' m, y ' nThe value of position at each element place replaces former sequence { x m, { y nIn this element, obtain two new sequences x " m, y " n;
(5) with these two sequences as the row address and the column address of scramble matrix, with this matrix image pixel positions is carried out scramble, obtain gray level image B (m, n);
(6) image B is changed into the binary sequence M of one dimension, because each pixel value can be by 8 binary representations, so length (M)=m * n * 8;
(7) with sequence M, encode according to the DNA mapping ruler that seed key1 chooses, obtaining length is the dna sequence dna N of m * n * 8/2;
(8) utilizing the Logistic chaotic maps, is z at initial value 0, system parameters is μ 3Condition under, generation length is the chaos sequence z of m * n * 8/2 i
(9) utilize threshold function table f (x) that chaos sequence is changed into binary sequence, work as z i=1 o'clock, the base of this position was got benefit, otherwise constant;
(10) dna sequence dna after will changing carries out decode operation according to the DNA mapping ruler that seed key2 chooses, and is reduced into binary sequence, reconstructed image matrix, the gray level image after obtaining encrypting.
Wherein, step (1)-(5) are the scramble processes of image pixel positions, and step (6)-(10) are that the pixel value of image is upset process.The decrypting process of image is the inverse process of encrypting, and is no longer burdensome here.
Beneficial effect of the present invention: from above-mentioned Algorithm Analysis, the assailant must possess 8 key parameters of four group keys, i.e. Cubic mapping initial value (x 0), system parameters (μ 1), wavelet function initial value (y 0), system parameters (μ 2), Logistic mapping initial value (z 0), chaos system parameter (μ 3), dna encoding key (key1), DNA decoding key (key2), could decipher image smoothly, improved the fail safe of image greatly; With traditional encipherment scheme ratio based on chaos, the present invention has that cipher round results is good, and key space is big, the high and advantages such as anti-exhaustive attack and statistical analysis attack of key sensitivity; With the encipherment scheme ratio based on the DNA cryptographic system, the present invention can encrypt digital picture, and with respect to the biology operation of complicacy, this algorithm is easy to realize and control.
Description of drawings
Fig. 1 algorithm flow chart of the present invention;
The bifurcation diagram of Fig. 2 wavelet function and exponent index map;
Fig. 3 figure as a result of the present invention;
Fig. 4 key sensitivity resolution chart;
The histogram of Fig. 5 original image and encrypted image;
Correlation diagram between Fig. 6 original image and encrypted image horizontal direction pixel.
Embodiment
In conjunction with accompanying drawing implementation process of the present invention is done detailed explanation, but be not limited to present embodiment.
Under the MATLAB7.1 environment, the lena gray level image to 128 * 128 is at x 0=0.3, y 0=0.1, z 0=0.36, μ 1=3.6, μ 2=-0.5, μ 3=3.9, key1=1986 carries out emulation experiment under the condition of key2=1.Experiment flow is as shown in Figure 1.
Step 1: (m n), sees accompanying drawing 3 (a) to input lena gray level image A, and m, n are the ranks dimension of image A, m=128 wherein, n=128.Image A can be expressed as matrix form and see formula (5);
[ X &prime; , X &prime; &prime; ] = Sort ( X ) [ Y &prime; , Y &prime; &prime; ] = Sort ( Y ) - - - ( 5 )
Step 2: utilize Cubic mapping and wavelet function respectively with initial value x 0=0.3, y 0=0.1, system parameters μ 1=3.6, μ 2=-0.5, produce two chaos sequence X=x 1x 2X m, Y=y 1y 2Y n
Step 3: utilize formula (6) to sequence X, Y carries out ascending order and arranges;
A = 101 107 . . . 203 100 106 . . . 202 . . . . . . . . . . . . 66 57 . . . 129 mm - - - ( 6 )
Function S ort () is the index order function, and X ', Y ' are sequence X, the new sequence that obtains after the Y ascending order, X ", Y " is its corresponding index value;
Step 4: come the position of scramble image A with formula (7), (m n), sees accompanying drawing 3 (b) to obtain image B behind the scramble;
A ( i , j ) &LeftRightArrow; A ( X &prime; &prime; ( i ) , Y &prime; &prime; ( j ) ) - - - ( 7 )
Tool first i=1,2 ... M, j=1,2 ... N;
Step 5: convert image B the binary sequence M of one dimension to, the length of M is m * n * 8;
Step 6: the DNA mapping ruler of being chosen by seed key1=1986 is a rule 7, and 7 couples of sequence M carry out dna encoding with rule, obtain dna sequence dna N, length (N)=m * n * 4;
Step 7: utilizing the Logistic chaotic maps, is z at initial value 0=0.36, system parameters is μ 3Under=3.9 the condition, generation length is the chaos sequence Z={z of m * n * 8/2 1z 2Z M * n * 4;
Step 8: utilize threshold function table f (x) that chaos sequence is changed into binary sequence, work as z i=1 o'clock, the base of N (i) was got benefit, otherwise N (i) is constant;
Step 9: the dna sequence dna after will changing, the DNA mapping ruler of choosing according to seed key2=1 6 carries out decode operation, is reduced into binary sequence, the reconstructed image matrix, the gray level image after obtaining encrypting is seen accompanying drawing 3 (c).
The image deciphering is the inverse process of encrypting, and deciphering figure sees accompanying drawing 3 (d).
For the better fail safe of this AES of explanation, the present invention is respectively to key space, the sensitivity of key, and the correlation between grey level histogram and the pixel etc. is analyzed.
1. key space analysis
In the present invention, having 8 keys, is respectively x 0, μ 1, y 0, μ 2, z 0, μ 3, key1, key2, wherein x 0∈ [1 ,-1], μ 1∈ [3.2,4], y 0∈ [0,1], μ 2∈ [0.77 ,-0.29], z 0∈ [0,1], μ 3∈ [3.569945,4], key1, key2 are random numbers.If computational accuracy is 10 -14, calculating the key space of removing outside the random number is 10 14* 10 14* 10 14* 10 14* 10 14* 10 14=10 84, visible this algorithm has enough big key space and resists exhaustive attack.
2. key sensitivity analysis
For the sensitivity of test key, use the key of fine difference to decipher, accompanying drawing 4 is the result after deciphering.Fig. 4 (a) representes x 0=0.30000000000001, the deciphering figure that other key is constant; The same with Fig. 4 (a), Fig. 4 (b), Fig. 4 (c) represent y respectively 0=0~0000000000001, z 0=0.36000000000001, the deciphering figure that other key is constant; Deciphering figure under the wrong DNA mapping ruler of Fig. 4 (d) expression.Fig. 4 (a) and (b), (c) can explain, as long as have small difference in the key, all can not recover original image.It is thus clear that this algorithm has stronger key sensitivity, can effectively resist exhaustive attack.
3. grey level histogram analysis
We analyze the change of image statistics characteristic before and after encrypting through histogrammic comparison.Can find out that from accompanying drawing 5 (a) and (b) bigger variation has taken place the histogram of image before and after encrypting.Image pixel before encrypting is more concentrated, and promptly pixel distributes fewer at the two ends of (0,255); And intermediate distribution is more; And the distribution of the image pixel after encrypting is more even, and two image similarities are lower, and the assailant is difficult to utilize the statistical property of grey scale pixel value to recover original image.This shows that this algorithm has well resists the statistical analysis ability.
4. correlation analysis
Correlation between original image pixels is very high, in order to destroy statistical attack, must reduce the correlation of encrypted image.We from original image and encrypted image at random be chosen at 3000 pairs of neighbor pixels on horizontal direction, vertical direction and the diagonal, utilize the correlation between formula (8)-(11) calculating pixel then.
r xy = cov ( x , y ) D ( x ) &times; D ( y ) - - - ( 8 )
E ( x ) = 1 N &Sigma; i = 1 N x i - - - ( 9 )
D ( x ) = 1 N &Sigma; i = 1 N ( x i - E ( x ) ) 2 - - - ( 10 )
cov ( x , y ) = 1 N &Sigma; i = 1 N ( x i - E ( x ) ) ( y i - E ( y ) ) - - - ( 11 )
Wherein x and y are the gray values between two neighbors.
Original image Encrypted image
Horizontal direction 0.9248 0.0023
Vertical direction 0.9547 -0.0161
Diagonal 0.8886 0.0015
The coefficient correlation of two neighbors in table 2. original image and the encrypted image
The correlation of original image and encrypted image horizontal direction is seen accompanying drawing 6 (a) and (b), and coefficient correlation is respectively 0.9248 to see table 2 with the coefficient correlation of other direction of 0.0023..Can find out that from Fig. 6 (b) and table 2 correlation between the pixel of encrypted image is very low, almost near 0, explanation once more, this algorithm has very strong anti-statistical attack ability.
Data in this instance only are the process of convenient explanation AES, and this working of an invention and cipher round results do not rely on concrete numerical value.

Claims (3)

1. based on the digital image encryption method of dna sequence dna and many chaotic maps, it is characterized in that this method comprises the steps:
(1) 8 gray level image A of input (m, n), m, n are the ranks dimension of image A;
(2) utilize Cubic mapping and wavelet function respectively with initial value x 0, y 0, system parameters μ 1, μ 2Produce two chaos sequence { x m, { y n;
(3) these two sequences are arranged by ascending order, obtain two new sequence { x m', { y n';
(4) with { x m' { y n' value of the position at each element place replaces former sequence { x m, { y nIn this element, obtain two new sequence { x m" }, { y n";
(5) with { x m" }, { y n" } carried out scramble with this matrix to image pixel positions as the row address and the column address of scramble matrix, obtain gray level image B (m, n);
(6) image B is changed into the binary sequence M of one dimension, each pixel value is by 8 binary representations, length (M)=m * n * 8;
(7) with sequence M, encode according to the DNA mapping ruler that seed key1 chooses, obtaining length is the dna sequence dna N of m * n * 8/2, method is:
At first, set up the dna encoding, the decoding mapping ruler that satisfy the base complementrity pair principle, see table 1;
8 kinds of codings of table 1DNA sequence, decoding mapping ruler
Figure FSB00000593032200011
Secondly, be 8 sub regions with (0,1) area dividing, the corresponding a kind of mapping ruler of each subregion:
Figure FSB00000593032200012
Figure FSB00000593032200021
Once more, utilize random function to produce a random number between (0,1) as seed, choose corresponding DNA mapping ruler with this random number again with integer k ey1;
At last, the sequence M that with the DNA mapping ruler of choosing step (6) is obtained encodes and obtains the dna sequence dna matrix N;
(8) utilizing the Logistic chaotic maps, is z at initial value 0, system parameters is μ 3Condition under, generation length is the chaos sequence { z of m * n * 8/2 i;
(9) utilize threshold function table f (x) with chaos sequence { z iChange into binary sequence, then, work as z i=1 o'clock, the base of this position of dna sequence dna N was got benefit, otherwise this invariant position of dna sequence dna N;
(10) dna sequence dna after will changing carries out decode operation according to the DNA mapping ruler that seed key2 chooses, and is reduced into binary sequence, reconstructed image matrix, the gray level image after obtaining encrypting.
2. the digital image encryption method based on dna sequence dna and many chaotic maps according to claim 1 is characterized in that, the method that the middle base of described step (9) is got benefit is:
At first, with the chaos sequence { z that produces in the step (8) i, i=1,2 ... M * n * 8/2 changes into binary sequence according to threshold function table f (x), sees formula (a):
Then, judge z iWhether equal 1, if equal 1 then to the position i of dna sequence dna N, i=1,2 ... Benefit is got in m * n * 8/2, otherwise the position i of dna sequence dna N is constant, and the benefit of A is T here, and the benefit of C is G, and vice versa;
At last, the dna sequence dna after obtaining changing.
3. the digital image encryption method based on dna sequence dna and many chaotic maps according to claim 2 is characterized in that, the method that the DNA mapping ruler of choosing according to seed key2 in the described step (10) carries out decode operation is:
At first, utilize random function to produce a random number between (0,1) with integer k ey2 as seed;
Secondly, choose the DNA mapping ruler according to the random number that produces;
At last, the dna sequence dna that step (9) obtains is decoded, obtain a binary one-dimensional sequence according to the DNA mapping ruler of choosing; Be converted into the matrix of size again, this matrix is carried out obtaining the big or small (m * n that is after the decimal system conversion for (m * n, 8); 1) matrix; Obtain encrypted image through matrix reconstruct, its size be (m, n).
CN2009102203245A 2009-11-26 2009-11-26 Digital image encryption method based on DNA sequence and multi-chaotic mapping Active CN101706946B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009102203245A CN101706946B (en) 2009-11-26 2009-11-26 Digital image encryption method based on DNA sequence and multi-chaotic mapping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009102203245A CN101706946B (en) 2009-11-26 2009-11-26 Digital image encryption method based on DNA sequence and multi-chaotic mapping

Publications (2)

Publication Number Publication Date
CN101706946A CN101706946A (en) 2010-05-12
CN101706946B true CN101706946B (en) 2012-06-13

Family

ID=42377168

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009102203245A Active CN101706946B (en) 2009-11-26 2009-11-26 Digital image encryption method based on DNA sequence and multi-chaotic mapping

Country Status (1)

Country Link
CN (1) CN101706946B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105913370A (en) * 2016-04-08 2016-08-31 重庆邮电大学 Wavelet layering and combining chaos-based image encryption algorithm

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102360488B (en) * 2011-09-29 2013-02-13 付冲 Digital image encryption method based on chaotic orbit perturbation
CN102644419B (en) * 2012-02-23 2014-07-09 杭州电子科技大学 Dynamic password remote control lock based on chaos technology
CN103310157B (en) * 2012-03-14 2015-11-18 大连大学 Based on the image encryption method of RT-DNA cellular automaton
CN103049779B (en) * 2012-12-31 2016-12-28 郑莹娜 The generation of food safety liability insurance electronic insurance policy two-dimension code credential and recognition methods
CN103258313A (en) * 2013-04-11 2013-08-21 苏州经贸职业技术学院 Image encryption method based on Henon mapping and magic cube transformation
CN103281504A (en) * 2013-05-30 2013-09-04 东北大学 Chaotic image encryption method with double-direction diffusion mechanism
CN103473733B (en) * 2013-09-12 2016-08-10 东北林业大学 Based on DNA encoding and the resume image of chaotic maps
CN104751016B (en) * 2015-04-16 2018-03-27 大连大学 Building method based on the DNA labels for becoming neighborhood search
CN105119717A (en) * 2015-07-21 2015-12-02 郑州轻工业学院 DNA coding based encryption system and encryption method
CN106817218A (en) * 2015-12-01 2017-06-09 国基电子(上海)有限公司 Encryption method based on DNA technique
CN105550570A (en) * 2015-12-02 2016-05-04 深圳市同创国芯电子有限公司 Encryption and decryption method and device applied to programmable device
CN105704500B (en) * 2016-03-17 2019-01-22 哈尔滨工业大学(威海) A kind of new Lossless Image Compression Algorithm encryption integrated processes based on chaos
CN107798219B (en) * 2016-08-30 2021-07-13 清华大学 Method for biologically storing and restoring data
CN107437266A (en) * 2017-07-11 2017-12-05 大连大学 Image encryption method based on chaos system Yu DNA chain displacement model
CN109242751B (en) * 2018-08-16 2020-06-30 电子科技大学 Image encryption method based on chaotic tent mapping and DNA decoding
CN109803148B (en) * 2019-03-13 2020-09-22 苏州泓迅生物科技股份有限公司 Image coding method, decoding method, coding device and decoding device
CN109951282B (en) * 2019-03-28 2022-04-01 重庆邮电大学 Pseudo-random sequence generation method based on segmented CUBIC chaotic mapping
CN110113618B (en) * 2019-06-11 2021-09-03 苏州泓迅生物科技股份有限公司 Image storage method, reading method, storage device and reading device
CN111400731B (en) * 2020-03-11 2024-01-26 大连大学 Quantum image encryption method based on DNACNot
CN111614864B (en) * 2020-05-23 2022-04-12 南京南大智慧城市规划设计股份有限公司 SVD and CBC mode combination-based image compression encryption transmission method
CN111832052B (en) * 2020-07-13 2024-02-20 江西财经大学 Unequal image encryption method based on significance detection
CN113938573A (en) * 2021-09-16 2022-01-14 四川大学 Computational ghost imaging image encryption method based on chaotic mapping and DNA coding
CN115277977B (en) * 2022-07-25 2023-11-10 重庆邮电大学 Hybrid chaotic image encryption method based on FPGA (field programmable Gate array) configurable floating point precision
CN115633129B (en) * 2022-10-13 2024-03-05 同济大学 Stacked sparse self-encoder and GAN chaotic sequence image encryption method and device
CN115834788B (en) * 2022-11-16 2023-06-09 安阳师范学院 Color image encryption method for visualized DNA pivot point-mediated strand displacement reaction
CN116226891B (en) * 2023-05-08 2023-09-01 宁波财经学院 Face image data encryption method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105913370A (en) * 2016-04-08 2016-08-31 重庆邮电大学 Wavelet layering and combining chaos-based image encryption algorithm
CN105913370B (en) * 2016-04-08 2019-03-22 重庆邮电大学 A kind of resume image being layered and combine chaos based on small echo

Also Published As

Publication number Publication date
CN101706946A (en) 2010-05-12

Similar Documents

Publication Publication Date Title
CN101706946B (en) Digital image encryption method based on DNA sequence and multi-chaotic mapping
CN101706947B (en) Image fusion encryption method based on DNA sequences and multiple chaotic mappings
CN101702240B (en) Image encryption method based on DNA sub-sequence operation
CN112422268B (en) Image encryption method based on block scrambling and state conversion
CN112637441B (en) Color image compression encryption method based on compressed sensing
Patro et al. A novel multi-dimensional multiple image encryption technique
Zhang et al. Image encryption using DNA addition combining with chaotic maps
Ahmad et al. A new algorithm of encryption and decryption of images using chaotic mapping
Amani et al. A new approach in adaptive encryption algorithm for color images based on DNA sequence operation and hyper-chaotic system
CN103473733A (en) Image encryption algorithm based on DNA encoding and chaotic mapping
CN107094072B (en) Mixed chaotic encryption method based on generalized Henon mapping
CN105701755A (en) Image encryption method based on fractal and DNA sequence operation
CN112202545B (en) Image encryption method based on Y-type filling curve and variable-step Joseph traversal
CN113691362B (en) Bit plane image compression encryption method based on hyperchaotic system and DNA coding
Roy et al. A dual layer image encryption using polymerase chain reaction amplification and dna encryption
Zheng et al. An image encryption algorithm based on multichaotic system and DNA coding
CN115311118A (en) Remote sensing image encryption method based on two-dimensional discrete memristor hyperchaotic mapping
Roy et al. A robust image encryption method using chaotic skew-tent map
CN113300827B (en) Latin square-based chaotic image encryption method
Xiao et al. Image lossless encoding and encryption method of EBCOT Tier1 based on 4D hyperchaos
CN103310157B (en) Based on the image encryption method of RT-DNA cellular automaton
CN106934755B (en) A kind of image encrypting and decrypting method based on m-sequence
Jain et al. Adaptive key length based encryption algorithm using DNA approach
CN113344762B (en) Double scrambling image encryption method based on AFD adaptive decomposition
Zeng et al. Secure Analysis for IIOT Systems Using Hyperchaotic Image Encryption

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20100512

Assignee: Dalian Panyue Biotechnology Co.,Ltd.

Assignor: DALIAN University

Contract record no.: X2023210000035

Denomination of invention: A Digital Image Encryption Method Based on DNA Sequence and Multi Chaos Mapping

Granted publication date: 20120613

License type: Exclusive License

Record date: 20230515

EE01 Entry into force of recordation of patent licensing contract