CN105701755B - It is a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate - Google Patents
It is a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate Download PDFInfo
- Publication number
- CN105701755B CN105701755B CN201510514056.3A CN201510514056A CN105701755B CN 105701755 B CN105701755 B CN 105701755B CN 201510514056 A CN201510514056 A CN 201510514056A CN 105701755 B CN105701755 B CN 105701755B
- Authority
- CN
- China
- Prior art keywords
- dna
- matrix
- sequence
- image
- dna sequence
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 108091028043 Nucleic acid sequence Proteins 0.000 title claims abstract description 88
- 238000000034 method Methods 0.000 title claims abstract description 59
- 239000011159 matrix material Substances 0.000 claims abstract description 117
- 108020004414 DNA Proteins 0.000 claims abstract description 58
- 238000013507 mapping Methods 0.000 claims abstract description 22
- 238000003199 nucleic acid amplification method Methods 0.000 claims description 12
- 230000003321 amplification Effects 0.000 claims description 8
- 230000000739 chaotic effect Effects 0.000 claims description 8
- 230000001174 ascending effect Effects 0.000 claims description 4
- 230000009897 systematic effect Effects 0.000 claims description 4
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 239000012141 concentrate Substances 0.000 claims description 2
- 238000004422 calculation algorithm Methods 0.000 abstract description 14
- 238000005191 phase separation Methods 0.000 abstract description 5
- 238000005516 engineering process Methods 0.000 description 10
- 108090000623 proteins and genes Proteins 0.000 description 6
- 230000000295 complement effect Effects 0.000 description 4
- 238000010219 correlation analysis Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- OPTASPLRGRRNAP-UHFFFAOYSA-N cytosine Chemical compound NC=1C=CNC(=O)N=1 OPTASPLRGRRNAP-UHFFFAOYSA-N 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000002474 experimental method Methods 0.000 description 2
- UYTPUPDQBNUYGX-UHFFFAOYSA-N guanine Chemical compound O=C1NC(N)=NC2=C1N=CN2 UYTPUPDQBNUYGX-UHFFFAOYSA-N 0.000 description 2
- 238000007619 statistical method Methods 0.000 description 2
- 229930024421 Adenine Natural products 0.000 description 1
- GFFGJBXGBJISGV-UHFFFAOYSA-N Adenine Chemical compound NC1=NC=NC2=C1N=CN2 GFFGJBXGBJISGV-UHFFFAOYSA-N 0.000 description 1
- 102000053602 DNA Human genes 0.000 description 1
- 102100036263 Glutamyl-tRNA(Gln) amidotransferase subunit C, mitochondrial Human genes 0.000 description 1
- 101001001786 Homo sapiens Glutamyl-tRNA(Gln) amidotransferase subunit C, mitochondrial Proteins 0.000 description 1
- 108020004682 Single-Stranded DNA Proteins 0.000 description 1
- 229960000643 adenine Drugs 0.000 description 1
- 229910002056 binary alloy Inorganic materials 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 229940104302 cytosine Drugs 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000005183 dynamical system Methods 0.000 description 1
- 238000013467 fragmentation Methods 0.000 description 1
- 238000006062 fragmentation reaction Methods 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- RWQNBRDOKXIBIV-UHFFFAOYSA-N thymine Chemical group CC1=CNC(=O)NC1=O RWQNBRDOKXIBIV-UHFFFAOYSA-N 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Landscapes
- Storage Device Security (AREA)
- Complex Calculations (AREA)
Abstract
The invention discloses a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate, including following key step:The scrambling sequence generated first with fractal method is to original image into line shuffle;Then DNA profiling matrix is obtained using natural DNA sequence after amendment;Then the image after scramble is encoded, and result is subjected to DNA sequence dna with DNA profiling matrix and adds operation;The chaos pattern matrix finally generated using Logistic mappings and the matrix phase separation obtained after DNA decodings obtain encrypted image.The present invention has higher safety, and cipher round results are good, and key space is big, can be reasonably resistant to exhaustive attack, statistical attack and differential attack.And algorithm is easily achieved, and cost is relatively low, and encrypted result can be transmitted by internet.
Description
Technical field
The invention belongs to bioinformatics and image encryption field, more particularly to one kind to be based on that shape and DNA sequence dna is divided to operate
Image encryption method.
Background technology
With the fast development of digital technology and computer network, digital picture has become information representation and transmission
One of major way, being widely applied to each field, the people such as politics, economic, military, education can be by network easily
Transmit various image informations.However, since digital information is easily replicated, distort, illegally propagate and calculated attack, people are enjoying
By information transmit it is quick convenient while, more stringent requirements are proposed for the safety also transmitted to information and confidentiality.
Image encryption technology based on chaology is a kind of most popular method in current image encryption field.It
It is that image information to be encrypted is regarded as the data flow encoded in a manner, using chaotic signal come to image data stream
It is encrypted.Since chaos has wide spectrum, randomlikeness, to a system such as extreme sensitivity of systematic parameter and original state
Row property so that such method has many advantages, such as that strong security, randomness are good, key space is big, it is convenient to replace key.However,
Although the image encryption based on chaos has These characteristics and advantage, at present in practical application of the chaology in cryptography
Similarly there is many problems, such as the Discretization of chaos system, finite accuracy problem etc., moreover, as chaos is broken
The continuous development for translating technology, as Short has successively decoded chaotic mask and chaotic modulation by the method for multistep nonlinear prediction
Encipherment scheme.Therefore, the safety of the image encryption technology based on chaos is also by serious threat.
Encryption Algorithm based on DNA cryptographies is that the cryptography occurred in recent years along with the research that DNA is calculated is newly led
Domain, its main feature is that using DNA as information carrier, using modern biotechnology as implementation tool, excavate the intrinsic high storage densities of DNA and
The advantages that high concurrency, realizes the cryptographic functions such as encryption, decryption.It is encrypted in the existing encryption method based on DNA cryptographies
Information is transmitted typically only by the method for physics.And for sender and recipient, it will carry out more multiple
Miscellaneous biological experiment, therefore the cost encrypted and decrypted is very high.
In summary, in conventional images encryption technology, that there are safeties is poor for the image encryption technology based on chaos, is based on
The encryption method of DNA cryptographies haves the shortcomings that cost of implementation is high, transfer mode is single.
Invention content
In view of defect existing for prior art method, the present invention provides a kind of image operated based on point shape and DNA sequence dna
Encryption method, the scrambling sequence generated first with fractal method is to original image into line shuffle;Then natural DNA sequence after correcting is utilized
Obtain DNA profiling matrix;Then the image after scramble is encoded, and result is subjected to DNA sequence dna with DNA profiling matrix and adds operation;
The chaos pattern matrix finally generated using Logistic mappings and the matrix phase separation obtained after DNA decodings obtain encryption figure
Picture solves poor, the of high cost problem of conventional images encryption technology safety.
To achieve the above object, the technical solution adopted in the present invention is a kind of figure operated based on point shape and DNA sequence dna
As encryption method, include the following steps:
(1) 8 gray level image A (m, n) are inputted, m, n are the ranks dimension of image A;
(2) it according to the gray value information of image A, calculates and corrects key k1And k2, according to DNA encoding mapping ruler to k1
And k2It is encoded, obtains correcting key sequence K1And K2;
(3) using the amendment key sequence K after amplification1And K2Correct natural DNA sequence d1And d2, sequence after being corrected
d′1With d '2;
(4) d ' is found out using fractal method1With d '2Corresponding distance sequence I1And I2, then by two distance sequences by liter
Sequence arranges, and obtains two collating sequence I '1With I '2, then by I '1With I '2The value of position where each element replaces former sequence I1
And I2In the element, obtain two new sequence I "1With I "2;
(5) I " is used1With I "2Row address and column address as Scrambling Matrix into line shuffle, set gray value matrix A
Matrix A after unrest1;
(6) according to DNA encoding mapping ruler to A1DNA encoding is carried out, DNA sequence dna matrix D is obtained1;
(7) according to DNA sequence dna matrix multiplication and DNA sequence dna XOR operation, by d '1With d '2Generate DNA profiling matrix
Dtemplate;
(8) by DNA sequence dna matrix D1With DNA profiling matrix DtemplateIt carries out DNA sequence dna and adds operation, DNA after being merged
Matrix D2;
(9) to matrix D2It is operated according to the inverse process of step (6), obtains gray value matrix A2;
(10) by k1And k2Initial value x is calculated0, it is x in initial value using Logistic chaotic maps0, systematic parameter μ
Under conditions of, generate the chaos sequence z that length is m × n1, and be reconstructed to obtain size and matrix A2Identical chaos template square
Battle array Z1;
(11) according to chaos pattern matrix Z1To matrix A2XOR operation is carried out, encrypted gray scale value matrix is obtained, is exported
Image A'.
The present invention is by the scrambling sequence that is generated first with fractal method to original image into line shuffle;Then it utilizes and corrects the day after tomorrow
Right DNA sequence dna obtains DNA profiling matrix;Then the image after scramble is encoded, and result is subjected to DNA sequences with DNA profiling matrix
Row plus operation;The matrix phase separation that the chaos pattern matrix finally generated using Logistic mappings is obtained after being decoded with DNA obtains
To encrypted image.The present invention has higher safety, and cipher round results are good, and key space is big, can be reasonably resistant to exhaustion and attack
It hits, statistical attack and differential attack.And algorithm is easily achieved, cost is relatively low, and encrypted result can by internet into
Row transmits.
Description of the drawings
Fig. 1:The flow chart of the present invention;
Fig. 2:The flow diagram of image encryption processing;
Fig. 3:Former gray level image;
Fig. 4:Scramble image;
Fig. 5:Encrypted image;
Fig. 6:Decrypted image under correct key;
Fig. 7:Decrypted image a under false key;
Fig. 8:Decrypted image b under false key;
Fig. 9:Matrix D1Part figure;
Figure 10:Pattern matrix DtemplatePart figure;
Figure 11:Matrix D2Part figure;
Figure 12:The grey level histogram of image before encryption;
Figure 13:The grey level histogram of image after encryption;
Figure 14:The correlation analysis figure of original image horizontal direction;
Figure 15:The correlation analysis figure of encrypted image horizontal direction.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
The technical solution adopted by the present invention is:The scrambling sequence generated first with fractal method is to original image into line shuffle;
Then DNA profiling matrix is obtained using natural DNA sequence after amendment;Then the image after scramble is encoded, and by result with DNA moulds
Plate matrix carries out DNA sequence dna and adds operation;The chaos pattern matrix finally generated using Logistic mappings is obtained after being decoded with DNA
Matrix phase separation obtain encrypted image.
Fig. 1 shows the flow of the image encryption method provided in an embodiment of the present invention operated based on point shape and DNA sequence dna
Figure.
In step S101,8 gray level image A (m, n) are inputted, m, n are the ranks dimension of image A;
In step s 102, it according to the gray value information of image A, calculates and corrects key k1And k2, reflected according to DNA encoding
Rule is penetrated to k1And k2It is encoded, obtains correcting key sequence K1And K2;
In step s 103, using the amendment key sequence k after amplification1And k2Correct natural DNA sequence d1And d2, obtain
Sequence d ' after amendment1With d '2;
In step S104, d ' is found out using fractal method1With d '2Corresponding distance sequence I1And I2, then by two away from
It is arranged by ascending order from sequence, obtains two collating sequence I '1With I '2, then by I '1With I '2The value of position where each element is replaced
Change former sequence I1And I2In the element, obtain two new sequence I "1With I "2;
In step S105, with I "1With I "2Row address and column address as Scrambling Matrix set gray value matrix A
Disorderly, matrix A after scramble is obtained1;
In step s 106, according to DNA encoding mapping ruler to A1DNA encoding is carried out, DNA sequence dna matrix D is obtained1;
In step s 107, according to DNA sequence dna matrix multiplication and DNA sequence dna XOR operation, by d '1With d '2Generate DNA
Pattern matrix Dtemplate;
In step S108, by DNA sequence dna matrix D1With DNA profiling matrix DtemplateIt carries out DNA sequence dna and adds operation, obtain
DNA matrix Ds after fusion2;
In step S109, to matrix D2It is operated according to the inverse process of step S106, obtains gray value matrix A2;
In step s 110, by k1And k2Initial value x is calculated0, it is x in initial value using Logistic chaotic maps0, it is
Under conditions of parameter of uniting is μ, the chaos sequence z that length is m × n is generated1, and be reconstructed to obtain size and matrix A2It is identical
Chaos pattern matrix Z1;
In step S111, according to chaos pattern matrix Z1To matrix A2XOR operation is carried out, encrypted gray value is obtained
Matrix, output image A'.
In conjunction with Fig. 1, the realization master provided in an embodiment of the present invention based on the image encryption method for dividing shape and DNA sequence dna to operate
To include following four Some Key Technologies:1 scrambling sequence generated using fractal method is to original image into line shuffle;2 utilize amendment
Natural DNA sequence obtains DNA profiling matrix afterwards;Image after 3 coding scrambles, and result is carried out plus transported with DNA profiling matrix
It calculates;The matrix phase separation obtained after the 4 chaos pattern matrixs generated using Logistic mappings and DNA decodings obtains encryption figure
Picture.
The technology contents of this four parts are described in detail below:
1. the generation of scrambling sequence
The present invention generates scrambling sequence using fractal method and natural DNA sequence.
1) key is corrected
According to the gray value information of image, calculates and correct key k1And k2, see formula (1) and (2).
Wherein aijFor the gray value of coordinate points (i, j).
2) fractal method
DNA sequence dna is converted to 2 in coordinate plane using fractal methodK×2KCoordinate points on region are defined as follows:
Wherein > > 1 indicate to take a minimum , & for binary string;E indicates to take the highest one of binary string.
In embodiments of the present invention, it is worth to by the gray scale of original image and corrects key k1And k2, in order to can effectively correct
Natural DNA sequence, will correct key coding is DNA sequence dna, and is expanded, and amplification rule is, if DNA sequence dna D={ dj, 1
≤ j≤m, dj∈ { A, C, G, T }, then D'={ d 'i, 1≤i≤n, d 'i=dj, j=mod (i, m), as j=0, i=j;It connects
It, the amendment key sequence after amplification is added with natural DNA sequence;N DNA sequence after correcting is found out using fractal method
Then two distance sequences are arranged by ascending order, two new sequences are obtained, then by two new sequences by the corresponding distance sequence of row
The value of the position where each element in row replaces the element in former sequence, obtains two scrambling sequences.
2. DNA encoding and the decoding of image
Single-stranded DNA sequence is by four kinds of base A (adenine), C (cytosine), G (guanine), T (thymine) group
At wherein A is complementary with T, C and G.Binary coding is carried out to four bases in DNA sequence dna respectively with 00,01,10,11, by
Complementary in binary digit 0 and 1, to which 00 and 11 is complementary, 01 and 10 is complementary.Indicate that 00, T indicates that 11, C indicates 01 with A herein,
G indicates 10.Each grey scale pixel value of usual 8 gray level images can be indicated by 8 bits, and this 8 binary systems
Number can be encoded into the DNA sequence dna that length is 4 again.
Conversely, when being decoded to DNA sequence dna, A is indicated with 00,11 indicate T, and 01 indicates C, and 10 indicate G, such DNA sequences
Row can be decoded into binary sequence, then, every 8 bit element be formed one group of carry out decimal system conversion, so that it may be reduced into 0~
A real number between 255.
Such as:Some grey scale pixel value of original image is 177, is converted into binary number Shi [10110001]With above-mentioned
DNA encoding mapping rule is encoded to obtain DNAXu Lie [GTAC];Otherwise it maps 00, T with A and maps 11, C mapping 01, G mappings
10, this DNA sequence dna is decoded, you can obtain Er Jinzhixulie [10110001].
3.DNA series of operations
The present invention relates to DNA sequence dna operation have:DNA sequence dna adds operation, DNA sequence dna to subtract operation, DNA sequence dna exclusive or fortune
Calculation and DNA sequence dna matrix multiplication.The fusion that two images are realized with DNA sequence dna plus operation reaches encrypted with this
Purpose;On the contrary, realizing the recovery of encrypted image using DNA sequence dna subtraction.DNA is realized with DNA sequence dna XOR operation
The generation of matrix element in sequence matrix multiplication.It is realized with DNA sequence dna matrix multiplication and generates one by two DNA sequence dnas
The process of DNA matrixes.Add operation, subtracts operation and XOR operation rule is shown in Table 1, table 2 and table 3.
A+A=A | T+A=T | C+A=C | G+A=G |
A+T=T | T+T=A | C+T=G | G+T=C |
A+C=C | T+C=G | C+C=A | G+C=T |
A+G=G | T+G=C | C+G=T | G+G=A |
Table 1.DNA sequences add operation
A-A=A | A-T=T | A-C=C | A-G=G |
T-A=T | T-T=A | T-C=G | T-G=C |
C-A=C | C-T=G | C-C=A | C-G=T |
G-A=G | G-T=C | G-C=T | G-G=A |
Table 2.DNA sequences subtract operation
Table 3.DNA sequence XOR operation
The matrix multiplication rule of two DNA sequence dnas is shown in formula (5).Then, DNA squares are realized with DNA sequence dna XOR operation
The generation of matrix element, obtains DNA profiling matrix in battle array multiplication.
Such as:Two DNA sequence dna Q1=(ATCG) and Q2=(GATC), then
4. the generating process of chaos pattern matrix
The present invention generates chaos pattern matrix using Logistic mappings.
1) Logistic maps
Logistic mappings are a kind of typical chaotic maps, are defined as follows:
xn+1=μ xn(1-xn) (6)
Wherein μ ∈ [0,4],xn∈ (0,1), n=0,1,2 ....As 0 < μ≤3.569945, the dynamical system is from steady
Determine state bifurcated and generates doubling time;As 3.569945 < μ≤4, which enters chaos state.
2) generating process of initial value
By k1And k2Initial value x is calculated0, see formula (7).
x0=mod ((mod (k1,256)/256+mod(k2,256)/256),1) (7)
In the present invention, the generating process of chaos pattern matrix is:First, by k1And k2Initial value x is calculated0;Then, sharp
The chaos sequence z generated with Logistic mappings1, it is reconstructed into the matrix Z&apos that size is m × n;;Then, according to formula (8)
By Z'It is converted into matrix Z;Then, two matrixes Z rotated carry out XOR operation, obtain chaos pattern matrix
Z1。
Z (i, j)=mod (floor (Z'(i,j)×105),256) (8)
Wherein, the decrypting process of image is encrypted inverse process, only DNA need to add operation be substituted for DNA and subtract operation, here
It repeats no more.
From above-mentioned Algorithm Analysis, attacker must have 6 key parameters, that is, divide sub-sequence length in shape, and two natural
DNA sequence dna and initial position, Logistic map chaos system parameter.Only 6 keys are provided simultaneously with could be smoothly to figure
As being decrypted, the safety of image is substantially increased.
It should be noted that the signified image encryption method operated based on point shape and DNA sequence dna of the present invention is not limited to above-mentioned
Detailed description according to Fig. 1 to the implementation process of the present invention.
In order to better illustrate the present invention, one is provided in the example that running environment is MATLAB7.1, specially to a width
128 × 128 normal grayscale image carries out emulation experiment, encryption key be key=8,3043,6,55245,11, μ=
3.91}。
Fig. 2 shows the schematic diagrames of the example image encryption, and the diagram shows utilize to be based on dividing shape and DNA sequences
The image encryption method of row operation is treated the conversion process and data shape of data in journey.
A) input Lena gray level image A (m, n) are shown in that attached drawing 3, m, n are the ranks dimension of image A, wherein m=128, n=
128, it is as follows that image A can be expressed as matrix form:
b):According to the gray value information of image A, calculates and correct key k1=961164 and k2=712916, it is corrected
Key sequence K1=TGGGGGGATA and K2=GGTGAATCCA;
c):Key sequence K is corrected in amplification1And K2, with key sequence TGGGGGGA...ATATGGGG after amplification and
GGTGAATC...TCCAGGTG corrects natural DNA sequence d1And d2, wherein d1For gene I/D be 3043 gene since the 6th
The sequence that length is 1024, d2The gene sequence that length is 1024 since the 11st for being 55245 for gene I/D, can be
http:The gene corresponding to ID is found in //www.ncbi.nlm.nih.gov/, sequence d ' after being corrected1=
{ GAGCGA...CTTCAG } and d '2={ TAAACC...AGGAAT };
d):D ' is found out using fractal method1With d '2Corresponding coordinate point set is respectively { (228,1) ... (104,128) }
{ (241,2) ... (231,24) }, find out d '1With d '2Corresponding coordinate points concentrate each coordinate points to initial point distance, obtain one
The distance sequence I that length is 1281={ 228.0022 ..., 164.9242 } and a length are similarly 128 distance sequence I2
Then two distance sequences are arranged by ascending order, obtain two new sequence I ' by={ 241.0083 ..., 232.2434 }1With I '2,
Then by I '1With I '2The value of position where each element replaces former sequence I1And I2In the element, obtain two new sequences
I″1=110,87 ..., 100,93 } and I "2=111,21 ..., 23,90 };
e):With I "1With I "2Row address and column address as Scrambling Matrix into line shuffle, set gray value matrix A
Matrix A after unrest1, scramble image is shown in attached drawing 4;
f):By matrix A1It is converted to two values matrix, DNA encoding is carried out according to DNA encoding mapping ruler, obtains DNA sequence dna
Matrix D1, the part figure of matrix is shown in attached drawing 9;
g):Take d '1First 128 and d '2Anteposition 128 × 4 generate DNA profiling square according to formula above (5) and table 3
Battle array Dtemplate, the part figure of matrix is shown in attached drawing 10;
h):Matrix D1With DNA profiling matrix DtemplateIt carries out DNA sequence dna and adds operation, obtain matrix D2, the part figure of matrix
See attached drawing 11;
i):To matrix D2It is operated according to the inverse process of step S106 in Fig. 1, obtains gray value matrix A2;
j):By k1And k2Initial value x is calculated0=0.37500000000000, using Logistic chaotic maps, first
Value is x0, systematic parameter is the chaos sequence z that under conditions of μ=3.91, generation length is 128 × 1281, and be reconstructed to obtain
Size and matrix A2Identical chaos pattern matrix Z1;
k):According to chaos pattern matrix Z1To matrix A2XOR operation is carried out, encrypted gray scale value matrix is obtained, is exported
Image A', encrypted image is shown in attached drawing 5.
Image decryption is encrypted inverse process, and decryption figure is shown in attached drawing 6.In addition, Fig. 7, Fig. 8 are shown using under false key
Decrypted image, Fig. 7, Fig. 8 are difficult to recognize original image, it is seen that inventive algorithm have preferable cipher round results.
In the following, respectively to providing the image encryption method operated based on point shape and DNA sequence dna according to embodiments of the present invention
Obtained key space, grey level histogram, pixel interdependence and differential attack etc. are analyzed, to better illustrate
The safety of the Encryption Algorithm.
1. key space is analyzed
In the methods of the invention, 6 key parameters are shared, wherein most distinctive is using natural DNA sequence as close
Key uses.In nature, the type of natural DNA sequence is diversified, even same DNA sequence dna, due to starting
The difference of position, obtained DNA fragmentation are also different.Moreover, with the continuous discovery of technique for gene engineering, the mankind
Known DNA sequence dna is continuously increased, that is to say, that it is random that natural DNA sequence set is considered a natural one-time pad
Code book.Therefore, this method is a kind of improved one-time pad encryption method, is attacked with sufficiently large key space to resist exhaustion
It hits.
2. intensity histogram map analysis
We are by the comparison of histogram, to analyze the change of the front and back image statistics of encryption.From attached drawing 12, Tu13Zhong
As can be seen that larger variation has occurred in the histogram of the front and back image of encryption.Image pixel before encrypting compares concentration, and encrypts
Image pixel distribution afterwards is relatively uniform, and two images similarity is relatively low, and the statistics that attacker is difficult with grey scale pixel value is special
Property restore original image.It can be seen that the algorithm can effectively resist statistical analysis.
3. correlation analysis
Correlation between original image pixel is very high, and in order to effectively resist statistical attack, encrypted image must have
Lower correlation.We from original image and encrypted image in the horizontal direction, vertical direction and diagonally opposed random
3000 pairs of neighbor pixels are chosen, then formula (9)-(12) are utilized to calculate the correlation between pixel.
Wherein x and y is the gray value between two adjacent pixels.
Original image | Encrypted image | |
Horizontal direction | 0.9530 | 0.0021 |
Vertical direction | 0.9711 | 0.0114 |
It is diagonally opposed | 0.9492 | -0.0057 |
The related coefficient of two adjacent pixels in 4. original image of table and encrypted image
The correlation of original image and encrypted image horizontal direction is shown in that attached drawing 14, Figure 15, related coefficient are 0.9530 He respectively
0.0021, the related coefficient in other directions is shown in Table 4.From Figure 14, Figure 15 to table 4 it can be seen that related between the pixel of encrypted image
Property be far below original image correlation.Illustrate again, this algorithm has very strong anti-statistical attack ability.
4. differential attack is analyzed
So-called differential attack is exactly that original image is made subtle change by attacker, then encrypts original image according to Encryption Algorithm
With the image after change.By comparing two width encrypted images, attacker can find being associated with for original image and encrypted image.Artwork
The encrypted image of picture is referred to as " test1 ", the gray value of first pixel of original image is changed, the image quilt obtained after encryption
Referred to as " test2 ".Researcher comes whether measure algorithm resists differential attack usually using NPCR and UACI as two standards, sees
Formula (13)-(15).
Wherein M, N are respectively the height and width of image, T1(i,j),T2(i, j) is respectively that " test1 " and " test2 " exists
Gray value at coordinate (i, j).By calculating, the NPCR=99.62% of this algorithm, UACI=33.36%.It can by result of calculation
Know, this algorithm can effectively resist differential attack.
Data in this example only process of Encryption Algorithm for convenience of description, the implementation of the invention and cipher round results do not depend on
In concrete numerical value.
The present invention has higher safety, and cipher round results are good, and key space is big, can be reasonably resistant to exhaustive attack,
Statistical attack and differential attack.And algorithm is easily achieved, and cost is relatively low, and encrypted result can be passed by internet
It passs.
Compared with prior art, the present invention has the following advantages:
One) with traditional encipherment scheme ratio based on chaos, the present invention is good with cipher round results, and key space is big, and
The advantages that anti-exhaustive attack, Statistical Analysis Attacks and differential attack.
Two) and the Image Encryption Scheme ratio of traditional one-time pad, the present invention utilize Free website http://
Www.ncbi.nlm.nih.gov/ solves the problems, such as One-time pad preservation, while inheriting one-time pad encryption side
The advantages of method.
Three) with the encipherment scheme ratio based on DNA cryptographies, digital picture can be encrypted in the present invention, relative to complexity
Biological operation, this method is easily achieved and controls, and encrypted result can be transmitted by internet.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Any one skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its
Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.
Claims (4)
1. a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate, which is characterized in that this approach includes the following steps:
(1) the gray scale value matrix P (m, n) of 8 gray level images is inputted, m, n are the ranks dimension of image P;
(2) it according to the gray value information of image P, calculates and corrects key k1And k2, according to DNA encoding mapping ruler to k1And k2Into
Row coding obtains correcting key sequence K1And K2;
(3) using the amendment key sequence K after amplification1And K2Correct natural DNA sequence d1And d2, sequence d ' after being corrected1With
d′2;
(4) d ' is found out using fractal method1With d '2Corresponding distance sequence I1And I2, then two distance sequences are arranged by ascending order
Row, obtain two collating sequence I '1With I '2, then by I '1With I '2The value of position where each element replaces former sequence I1And I2
In the element, obtain two new sequence I "1With I "2;
(5) I " is used1With I "2Row address and column address as Scrambling Matrix to gray scale value matrix P into line shuffle, after obtaining scramble
Matrix A1;
(6) according to DNA encoding mapping ruler to A1DNA encoding is carried out, DNA sequence dna matrix D is obtained1;
(7) according to DNA sequence dna matrix multiplication and DNA sequence dna XOR operation, by d '1With d '2Generate DNA profiling matrix Dtemplate;
(8) by DNA sequence dna matrix D1With DNA profiling matrix DtemplateIt carries out DNA sequence dna and adds operation, DNA matrixes after being merged
D2;
(9) to matrix D2It is operated according to the inverse process of step (6), obtains gray value matrix A2;
(10) by k1And k2Initial value x is calculated0, it is x in initial value using Logistic chaotic maps0, systematic parameter is the item of μ
Under part, the chaos sequence z that length is m × n is generated1, and be reconstructed to obtain size and matrix A2Identical chaos pattern matrix
Z1;
(11) according to chaos pattern matrix Z1To matrix A2XOR operation is carried out, encrypted gray scale value matrix is obtained, exports image
A';
It obtains correcting key sequence K in the step (2)1And K2Specially:
The DNA encoding mapping ruler for meeting base pair complementarity principle is established, DNA encoding mapping ruler is with 00,01,10,11
Binary coding is carried out to four bases in DNA sequence dna respectively, indicates that 00, C indicates that 01, G indicates that 10, T indicates 11 with A;Root
According to the gray value information of image P, calculates and correct key k1And k2:
By k1And k2It is converted into binary sequence, obtained binary sequence is encoded according to DNA encoding mapping ruler, is obtained
To amendment key sequence K1And K2;
Sequence d ' after being corrected in the step (3)1With d '2Specially:
DNA sequence dna, which is established, according to binary plus operation rule adds operation rule;
By K1And K2It is expanded according to amplification rule, amplification rule is, if DNA sequence dna to be amplified is Q={ qj, 1≤j≤
lq, qj∈ { A, C, G, T }, the then DNA sequence dna after expanding are Q'={ q 'i, 1≤i≤l', q 'i=qj, j=mod (i, lq), work as j
When=0, i=j, wherein lqAnd l'The length of sequence after the length of sequence respectively to be amplified and amplification;
Two after amplification are corrected into the same d of key sequence1It is added according to DNA sequence dna plus operation rule, then by two after amplification
Item corrects the same d of key sequence2It is added, sequence d ' after being corrected1With d '2;
Size and matrix A are obtained in the step (10)2Identical chaos pattern matrix Z1Specially:
By k1And k2Initial value x is calculated0:
x0=mod ((mod (k1,256)/256+mod(k2,256)/256),1)
The chaos sequence z generated using Logistic mappings1, it is reconstructed into the matrix Z&apos that size is m × n;;
By matrix Z'It is converted into matrix Z:
Z (i, j)=mod (floor (Z'(i,j)×105),256);
Two matrixes that Z is rotated carry out XOR operation, obtain chaos pattern matrix Z1。
2. according to claim 1 a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate, which is characterized in that
D ' is found out in the step (4)1With d '2Corresponding distance sequence I1And I2The step of be specially:D ' is found out using fractal method1
With d '2Corresponding coordinate point set:
Wherein , >>1 indicates to take a minimum , & for binary string;E indicates to take the highest one of binary string;
Find out d '1With d '2Corresponding coordinate points concentrate each coordinate points to initial point distance, obtain the distance sequence that a length is m
I1With the distance sequence I that a length is n2。
3. according to claim 1 a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate, which is characterized in that
By d ' in the step (7)1With d '2Generate DNA profiling matrix DtemplateSpecially:
S1, DNA sequence dna XOR operation rule is first established;
S2, the matrix multiplication rule for re-defining arbitrary two DNA sequence dnas are:
S3, then, by two DNA sequence dna matrix d '1With d '2Multiplication is carried out according to the matrix multiplication rule in S2, then will be multiplied
Result after operation is converted according to the DNA sequence dna XOR operation rule in S1, obtains DNA profiling matrix Dtemplate。
4. according to claim 1 a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate, which is characterized in that
Gray value matrix A is obtained in the step (9)2It is the inverse process of step (6), i.e., to D2The decoded processes of DNA are carried out, in DNA
It decodes in mapping ruler, indicates A with 00,01 indicates C, and 10 indicate G, and 11 indicate T, to D2Decoding obtains a binary matrix,
Its size is m × (n × 8), and gray value matrix A is obtained after carrying out decimal system conversion to this matrix2, size is m × n.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510514056.3A CN105701755B (en) | 2015-08-20 | 2015-08-20 | It is a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510514056.3A CN105701755B (en) | 2015-08-20 | 2015-08-20 | It is a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105701755A CN105701755A (en) | 2016-06-22 |
CN105701755B true CN105701755B (en) | 2018-10-23 |
Family
ID=56227991
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510514056.3A Active CN105701755B (en) | 2015-08-20 | 2015-08-20 | It is a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105701755B (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107451948B (en) * | 2017-08-09 | 2020-09-29 | 山东师范大学 | Image encryption and decryption method and system based on chaos and DNA dynamic plane operation |
CN109920015B (en) * | 2019-03-05 | 2022-11-29 | 重庆工程学院 | Image visual meaningful encryption method based on fractal graph generation |
CN111263027B (en) * | 2020-01-17 | 2021-11-12 | 广东电网有限责任公司 | Key generation method based on nameplate image characteristics |
CN111400731B (en) * | 2020-03-11 | 2024-01-26 | 大连大学 | Quantum image encryption method based on DNACNot |
CN111832052B (en) * | 2020-07-13 | 2024-02-20 | 江西财经大学 | Unequal image encryption method based on significance detection |
CN111988144B (en) * | 2020-08-18 | 2023-05-26 | 大连大学 | DNA one-time pad image encryption method based on multiple keys |
CN112436933B (en) * | 2020-11-09 | 2022-06-10 | 杭州电子科技大学 | DNA image encryption system based on optical chaos |
CN112700819B (en) * | 2020-12-31 | 2021-11-30 | 云舟生物科技(广州)有限公司 | Gene sequence processing method, computer storage medium and electronic device |
CN114374775B (en) * | 2022-01-12 | 2023-06-23 | 安徽师范大学 | Image encryption method based on Julia set and DNA coding |
CN115037845B (en) * | 2022-05-11 | 2023-02-24 | 南开大学 | Color image reversible hiding method based on Hachimoji DNA and Julia fractal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004088585A2 (en) * | 2003-03-31 | 2004-10-14 | Council Of Scientific And Industrial Research | A method for storing information in dna |
CN101706947A (en) * | 2009-11-26 | 2010-05-12 | 大连大学 | Image fusion encryption method based on DNA sequences and multiple chaotic mappings |
CN103310157A (en) * | 2012-03-14 | 2013-09-18 | 大连大学 | Reverse transcriptase-deoxyribose nucleic acid (RT-DNA) cellular automaton-based image encryption method |
CN104766350A (en) * | 2015-04-16 | 2015-07-08 | 大连大学 | Image encryption method based on splicing model and hyper-chaotic system |
-
2015
- 2015-08-20 CN CN201510514056.3A patent/CN105701755B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004088585A2 (en) * | 2003-03-31 | 2004-10-14 | Council Of Scientific And Industrial Research | A method for storing information in dna |
CN101706947A (en) * | 2009-11-26 | 2010-05-12 | 大连大学 | Image fusion encryption method based on DNA sequences and multiple chaotic mappings |
CN103310157A (en) * | 2012-03-14 | 2013-09-18 | 大连大学 | Reverse transcriptase-deoxyribose nucleic acid (RT-DNA) cellular automaton-based image encryption method |
CN104766350A (en) * | 2015-04-16 | 2015-07-08 | 大连大学 | Image encryption method based on splicing model and hyper-chaotic system |
Non-Patent Citations (1)
Title |
---|
基于DNA序列和自组装的图像加密研究;周士华;《中国博士学位论文全文数据库 信息科技辑》;20130815;第2013卷(第08期);第1-103页 * |
Also Published As
Publication number | Publication date |
---|---|
CN105701755A (en) | 2016-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105701755B (en) | It is a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate | |
Wang et al. | A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level | |
Liu et al. | Color image encryption algorithm based on DNA coding and double chaos system | |
Chen et al. | Exploiting self-adaptive permutation–diffusion and DNA random encoding for secure and efficient image encryption | |
Jain et al. | A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps | |
Wang et al. | A novel color image encryption scheme using DNA permutation based on the Lorenz system | |
Huang et al. | An image encryption algorithm based on hyper-chaos and DNA sequence | |
Yaghouti Niyat et al. | Color image encryption based on hybrid chaotic system and DNA sequences | |
Li et al. | A Novel Image Encryption Algorithm Based on a Fractional‐Order Hyperchaotic System and DNA Computing | |
CN101702240B (en) | Image encryption method based on DNA sub-sequence operation | |
CN108366181B (en) | A kind of image encryption method based on hyperchaotic system and multistage scramble | |
Chai et al. | A novel image encryption algorithm based on the chaotic system and DNA computing | |
CN101706947B (en) | Image fusion encryption method based on DNA sequences and multiple chaotic mappings | |
CN101706946B (en) | Digital image encryption method based on DNA sequence and multi-chaotic mapping | |
Zhang et al. | A novel image encryption scheme based on DNA coding and multi-chaotic maps | |
Li et al. | A novel image encryption scheme based on non-adjacent parallelable permutation and dynamic DNA-level two-way diffusion | |
Huang et al. | Chaotic color image encryption scheme using Deoxyribonucleic Acid (DNA) coding calculations and arithmetic over the galois field | |
Sivakumar et al. | A New Image Encryption Method Based on Knight's Travel Path and True Random Number. | |
Zhang et al. | A novel chaotic image encryption algorithm based on latin square and random shift | |
Zhou | A quantum image encryption method based on DNACNot | |
CN113129196A (en) | Image encryption method based on DNA sequence and memristor chaos | |
CN103310157B (en) | Based on the image encryption method of RT-DNA cellular automaton | |
CN114374775A (en) | Image encryption method based on Julia set and DNA coding | |
Akkasaligar et al. | Medical image encryption with integrity using DNA and chaotic map | |
CN112769545A (en) | Image encryption method based on adjacent pixel Joseph transformation and Mealy state machine |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
OL01 | Intention to license declared | ||
OL01 | Intention to license declared |