CN105701755B - It is a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate - Google Patents

It is a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate Download PDF

Info

Publication number
CN105701755B
CN105701755B CN201510514056.3A CN201510514056A CN105701755B CN 105701755 B CN105701755 B CN 105701755B CN 201510514056 A CN201510514056 A CN 201510514056A CN 105701755 B CN105701755 B CN 105701755B
Authority
CN
China
Prior art keywords
dna
matrix
sequence
image
dna sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510514056.3A
Other languages
Chinese (zh)
Other versions
CN105701755A (en
Inventor
张强
周士华
魏小鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dalian University
Original Assignee
Dalian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian University filed Critical Dalian University
Priority to CN201510514056.3A priority Critical patent/CN105701755B/en
Publication of CN105701755A publication Critical patent/CN105701755A/en
Application granted granted Critical
Publication of CN105701755B publication Critical patent/CN105701755B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Complex Calculations (AREA)

Abstract

The invention discloses a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate, including following key step:The scrambling sequence generated first with fractal method is to original image into line shuffle;Then DNA profiling matrix is obtained using natural DNA sequence after amendment;Then the image after scramble is encoded, and result is subjected to DNA sequence dna with DNA profiling matrix and adds operation;The chaos pattern matrix finally generated using Logistic mappings and the matrix phase separation obtained after DNA decodings obtain encrypted image.The present invention has higher safety, and cipher round results are good, and key space is big, can be reasonably resistant to exhaustive attack, statistical attack and differential attack.And algorithm is easily achieved, and cost is relatively low, and encrypted result can be transmitted by internet.

Description

It is a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate
Technical field
The invention belongs to bioinformatics and image encryption field, more particularly to one kind to be based on that shape and DNA sequence dna is divided to operate Image encryption method.
Background technology
With the fast development of digital technology and computer network, digital picture has become information representation and transmission One of major way, being widely applied to each field, the people such as politics, economic, military, education can be by network easily Transmit various image informations.However, since digital information is easily replicated, distort, illegally propagate and calculated attack, people are enjoying By information transmit it is quick convenient while, more stringent requirements are proposed for the safety also transmitted to information and confidentiality.
Image encryption technology based on chaology is a kind of most popular method in current image encryption field.It It is that image information to be encrypted is regarded as the data flow encoded in a manner, using chaotic signal come to image data stream It is encrypted.Since chaos has wide spectrum, randomlikeness, to a system such as extreme sensitivity of systematic parameter and original state Row property so that such method has many advantages, such as that strong security, randomness are good, key space is big, it is convenient to replace key.However, Although the image encryption based on chaos has These characteristics and advantage, at present in practical application of the chaology in cryptography Similarly there is many problems, such as the Discretization of chaos system, finite accuracy problem etc., moreover, as chaos is broken The continuous development for translating technology, as Short has successively decoded chaotic mask and chaotic modulation by the method for multistep nonlinear prediction Encipherment scheme.Therefore, the safety of the image encryption technology based on chaos is also by serious threat.
Encryption Algorithm based on DNA cryptographies is that the cryptography occurred in recent years along with the research that DNA is calculated is newly led Domain, its main feature is that using DNA as information carrier, using modern biotechnology as implementation tool, excavate the intrinsic high storage densities of DNA and The advantages that high concurrency, realizes the cryptographic functions such as encryption, decryption.It is encrypted in the existing encryption method based on DNA cryptographies Information is transmitted typically only by the method for physics.And for sender and recipient, it will carry out more multiple Miscellaneous biological experiment, therefore the cost encrypted and decrypted is very high.
In summary, in conventional images encryption technology, that there are safeties is poor for the image encryption technology based on chaos, is based on The encryption method of DNA cryptographies haves the shortcomings that cost of implementation is high, transfer mode is single.
Invention content
In view of defect existing for prior art method, the present invention provides a kind of image operated based on point shape and DNA sequence dna Encryption method, the scrambling sequence generated first with fractal method is to original image into line shuffle;Then natural DNA sequence after correcting is utilized Obtain DNA profiling matrix;Then the image after scramble is encoded, and result is subjected to DNA sequence dna with DNA profiling matrix and adds operation; The chaos pattern matrix finally generated using Logistic mappings and the matrix phase separation obtained after DNA decodings obtain encryption figure Picture solves poor, the of high cost problem of conventional images encryption technology safety.
To achieve the above object, the technical solution adopted in the present invention is a kind of figure operated based on point shape and DNA sequence dna As encryption method, include the following steps:
(1) 8 gray level image A (m, n) are inputted, m, n are the ranks dimension of image A;
(2) it according to the gray value information of image A, calculates and corrects key k1And k2, according to DNA encoding mapping ruler to k1 And k2It is encoded, obtains correcting key sequence K1And K2
(3) using the amendment key sequence K after amplification1And K2Correct natural DNA sequence d1And d2, sequence after being corrected d′1With d '2
(4) d ' is found out using fractal method1With d '2Corresponding distance sequence I1And I2, then by two distance sequences by liter Sequence arranges, and obtains two collating sequence I '1With I '2, then by I '1With I '2The value of position where each element replaces former sequence I1 And I2In the element, obtain two new sequence I "1With I "2
(5) I " is used1With I "2Row address and column address as Scrambling Matrix into line shuffle, set gray value matrix A Matrix A after unrest1
(6) according to DNA encoding mapping ruler to A1DNA encoding is carried out, DNA sequence dna matrix D is obtained1
(7) according to DNA sequence dna matrix multiplication and DNA sequence dna XOR operation, by d '1With d '2Generate DNA profiling matrix Dtemplate
(8) by DNA sequence dna matrix D1With DNA profiling matrix DtemplateIt carries out DNA sequence dna and adds operation, DNA after being merged Matrix D2
(9) to matrix D2It is operated according to the inverse process of step (6), obtains gray value matrix A2
(10) by k1And k2Initial value x is calculated0, it is x in initial value using Logistic chaotic maps0, systematic parameter μ Under conditions of, generate the chaos sequence z that length is m × n1, and be reconstructed to obtain size and matrix A2Identical chaos template square Battle array Z1
(11) according to chaos pattern matrix Z1To matrix A2XOR operation is carried out, encrypted gray scale value matrix is obtained, is exported Image A'.
The present invention is by the scrambling sequence that is generated first with fractal method to original image into line shuffle;Then it utilizes and corrects the day after tomorrow Right DNA sequence dna obtains DNA profiling matrix;Then the image after scramble is encoded, and result is subjected to DNA sequences with DNA profiling matrix Row plus operation;The matrix phase separation that the chaos pattern matrix finally generated using Logistic mappings is obtained after being decoded with DNA obtains To encrypted image.The present invention has higher safety, and cipher round results are good, and key space is big, can be reasonably resistant to exhaustion and attack It hits, statistical attack and differential attack.And algorithm is easily achieved, cost is relatively low, and encrypted result can by internet into Row transmits.
Description of the drawings
Fig. 1:The flow chart of the present invention;
Fig. 2:The flow diagram of image encryption processing;
Fig. 3:Former gray level image;
Fig. 4:Scramble image;
Fig. 5:Encrypted image;
Fig. 6:Decrypted image under correct key;
Fig. 7:Decrypted image a under false key;
Fig. 8:Decrypted image b under false key;
Fig. 9:Matrix D1Part figure;
Figure 10:Pattern matrix DtemplatePart figure;
Figure 11:Matrix D2Part figure;
Figure 12:The grey level histogram of image before encryption;
Figure 13:The grey level histogram of image after encryption;
Figure 14:The correlation analysis figure of original image horizontal direction;
Figure 15:The correlation analysis figure of encrypted image horizontal direction.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
The technical solution adopted by the present invention is:The scrambling sequence generated first with fractal method is to original image into line shuffle; Then DNA profiling matrix is obtained using natural DNA sequence after amendment;Then the image after scramble is encoded, and by result with DNA moulds Plate matrix carries out DNA sequence dna and adds operation;The chaos pattern matrix finally generated using Logistic mappings is obtained after being decoded with DNA Matrix phase separation obtain encrypted image.
Fig. 1 shows the flow of the image encryption method provided in an embodiment of the present invention operated based on point shape and DNA sequence dna Figure.
In step S101,8 gray level image A (m, n) are inputted, m, n are the ranks dimension of image A;
In step s 102, it according to the gray value information of image A, calculates and corrects key k1And k2, reflected according to DNA encoding Rule is penetrated to k1And k2It is encoded, obtains correcting key sequence K1And K2
In step s 103, using the amendment key sequence k after amplification1And k2Correct natural DNA sequence d1And d2, obtain Sequence d ' after amendment1With d '2
In step S104, d ' is found out using fractal method1With d '2Corresponding distance sequence I1And I2, then by two away from It is arranged by ascending order from sequence, obtains two collating sequence I '1With I '2, then by I '1With I '2The value of position where each element is replaced Change former sequence I1And I2In the element, obtain two new sequence I "1With I "2
In step S105, with I "1With I "2Row address and column address as Scrambling Matrix set gray value matrix A Disorderly, matrix A after scramble is obtained1
In step s 106, according to DNA encoding mapping ruler to A1DNA encoding is carried out, DNA sequence dna matrix D is obtained1
In step s 107, according to DNA sequence dna matrix multiplication and DNA sequence dna XOR operation, by d '1With d '2Generate DNA Pattern matrix Dtemplate
In step S108, by DNA sequence dna matrix D1With DNA profiling matrix DtemplateIt carries out DNA sequence dna and adds operation, obtain DNA matrix Ds after fusion2
In step S109, to matrix D2It is operated according to the inverse process of step S106, obtains gray value matrix A2
In step s 110, by k1And k2Initial value x is calculated0, it is x in initial value using Logistic chaotic maps0, it is Under conditions of parameter of uniting is μ, the chaos sequence z that length is m × n is generated1, and be reconstructed to obtain size and matrix A2It is identical Chaos pattern matrix Z1
In step S111, according to chaos pattern matrix Z1To matrix A2XOR operation is carried out, encrypted gray value is obtained Matrix, output image A'.
In conjunction with Fig. 1, the realization master provided in an embodiment of the present invention based on the image encryption method for dividing shape and DNA sequence dna to operate To include following four Some Key Technologies:1 scrambling sequence generated using fractal method is to original image into line shuffle;2 utilize amendment Natural DNA sequence obtains DNA profiling matrix afterwards;Image after 3 coding scrambles, and result is carried out plus transported with DNA profiling matrix It calculates;The matrix phase separation obtained after the 4 chaos pattern matrixs generated using Logistic mappings and DNA decodings obtains encryption figure Picture.
The technology contents of this four parts are described in detail below:
1. the generation of scrambling sequence
The present invention generates scrambling sequence using fractal method and natural DNA sequence.
1) key is corrected
According to the gray value information of image, calculates and correct key k1And k2, see formula (1) and (2).
Wherein aijFor the gray value of coordinate points (i, j).
2) fractal method
DNA sequence dna is converted to 2 in coordinate plane using fractal methodK×2KCoordinate points on region are defined as follows:
Wherein > > 1 indicate to take a minimum , &amp for binary string;E indicates to take the highest one of binary string.
In embodiments of the present invention, it is worth to by the gray scale of original image and corrects key k1And k2, in order to can effectively correct Natural DNA sequence, will correct key coding is DNA sequence dna, and is expanded, and amplification rule is, if DNA sequence dna D={ dj, 1 ≤ j≤m, dj∈ { A, C, G, T }, then D'={ d 'i, 1≤i≤n, d 'i=dj, j=mod (i, m), as j=0, i=j;It connects It, the amendment key sequence after amplification is added with natural DNA sequence;N DNA sequence after correcting is found out using fractal method Then two distance sequences are arranged by ascending order, two new sequences are obtained, then by two new sequences by the corresponding distance sequence of row The value of the position where each element in row replaces the element in former sequence, obtains two scrambling sequences.
2. DNA encoding and the decoding of image
Single-stranded DNA sequence is by four kinds of base A (adenine), C (cytosine), G (guanine), T (thymine) group At wherein A is complementary with T, C and G.Binary coding is carried out to four bases in DNA sequence dna respectively with 00,01,10,11, by Complementary in binary digit 0 and 1, to which 00 and 11 is complementary, 01 and 10 is complementary.Indicate that 00, T indicates that 11, C indicates 01 with A herein, G indicates 10.Each grey scale pixel value of usual 8 gray level images can be indicated by 8 bits, and this 8 binary systems Number can be encoded into the DNA sequence dna that length is 4 again.
Conversely, when being decoded to DNA sequence dna, A is indicated with 00,11 indicate T, and 01 indicates C, and 10 indicate G, such DNA sequences Row can be decoded into binary sequence, then, every 8 bit element be formed one group of carry out decimal system conversion, so that it may be reduced into 0~ A real number between 255.
Such as:Some grey scale pixel value of original image is 177, is converted into binary number Shi [10110001]With above-mentioned DNA encoding mapping rule is encoded to obtain DNAXu Lie [GTAC];Otherwise it maps 00, T with A and maps 11, C mapping 01, G mappings 10, this DNA sequence dna is decoded, you can obtain Er Jinzhixulie [10110001].
3.DNA series of operations
The present invention relates to DNA sequence dna operation have:DNA sequence dna adds operation, DNA sequence dna to subtract operation, DNA sequence dna exclusive or fortune Calculation and DNA sequence dna matrix multiplication.The fusion that two images are realized with DNA sequence dna plus operation reaches encrypted with this Purpose;On the contrary, realizing the recovery of encrypted image using DNA sequence dna subtraction.DNA is realized with DNA sequence dna XOR operation The generation of matrix element in sequence matrix multiplication.It is realized with DNA sequence dna matrix multiplication and generates one by two DNA sequence dnas The process of DNA matrixes.Add operation, subtracts operation and XOR operation rule is shown in Table 1, table 2 and table 3.
A+A=A T+A=T C+A=C G+A=G
A+T=T T+T=A C+T=G G+T=C
A+C=C T+C=G C+C=A G+C=T
A+G=G T+G=C C+G=T G+G=A
Table 1.DNA sequences add operation
A-A=A A-T=T A-C=C A-G=G
T-A=T T-T=A T-C=G T-G=C
C-A=C C-T=G C-C=A C-G=T
G-A=G G-T=C G-C=T G-G=A
Table 2.DNA sequences subtract operation
Table 3.DNA sequence XOR operation
The matrix multiplication rule of two DNA sequence dnas is shown in formula (5).Then, DNA squares are realized with DNA sequence dna XOR operation The generation of matrix element, obtains DNA profiling matrix in battle array multiplication.
Such as:Two DNA sequence dna Q1=(ATCG) and Q2=(GATC), then
4. the generating process of chaos pattern matrix
The present invention generates chaos pattern matrix using Logistic mappings.
1) Logistic maps
Logistic mappings are a kind of typical chaotic maps, are defined as follows:
xn+1=μ xn(1-xn) (6)
Wherein μ ∈ &#91;0,4&#93;,xn∈ (0,1), n=0,1,2 ....As 0 < μ≤3.569945, the dynamical system is from steady Determine state bifurcated and generates doubling time;As 3.569945 < μ≤4, which enters chaos state.
2) generating process of initial value
By k1And k2Initial value x is calculated0, see formula (7).
x0=mod ((mod (k1,256)/256+mod(k2,256)/256),1) (7)
In the present invention, the generating process of chaos pattern matrix is:First, by k1And k2Initial value x is calculated0;Then, sharp The chaos sequence z generated with Logistic mappings1, it is reconstructed into the matrix Z&apos that size is m × n;;Then, according to formula (8) By Z'It is converted into matrix Z;Then, two matrixes Z rotated carry out XOR operation, obtain chaos pattern matrix Z1
Z (i, j)=mod (floor (Z'(i,j)×105),256) (8)
Wherein, the decrypting process of image is encrypted inverse process, only DNA need to add operation be substituted for DNA and subtract operation, here It repeats no more.
From above-mentioned Algorithm Analysis, attacker must have 6 key parameters, that is, divide sub-sequence length in shape, and two natural DNA sequence dna and initial position, Logistic map chaos system parameter.Only 6 keys are provided simultaneously with could be smoothly to figure As being decrypted, the safety of image is substantially increased.
It should be noted that the signified image encryption method operated based on point shape and DNA sequence dna of the present invention is not limited to above-mentioned Detailed description according to Fig. 1 to the implementation process of the present invention.
In order to better illustrate the present invention, one is provided in the example that running environment is MATLAB7.1, specially to a width 128 × 128 normal grayscale image carries out emulation experiment, encryption key be key=8,3043,6,55245,11, μ= 3.91}。
Fig. 2 shows the schematic diagrames of the example image encryption, and the diagram shows utilize to be based on dividing shape and DNA sequences The image encryption method of row operation is treated the conversion process and data shape of data in journey.
A) input Lena gray level image A (m, n) are shown in that attached drawing 3, m, n are the ranks dimension of image A, wherein m=128, n= 128, it is as follows that image A can be expressed as matrix form:
b):According to the gray value information of image A, calculates and correct key k1=961164 and k2=712916, it is corrected Key sequence K1=TGGGGGGATA and K2=GGTGAATCCA;
c):Key sequence K is corrected in amplification1And K2, with key sequence TGGGGGGA...ATATGGGG after amplification and GGTGAATC...TCCAGGTG corrects natural DNA sequence d1And d2, wherein d1For gene I/D be 3043 gene since the 6th The sequence that length is 1024, d2The gene sequence that length is 1024 since the 11st for being 55245 for gene I/D, can be http:The gene corresponding to ID is found in //www.ncbi.nlm.nih.gov/, sequence d ' after being corrected1= { GAGCGA...CTTCAG } and d '2={ TAAACC...AGGAAT };
d):D ' is found out using fractal method1With d '2Corresponding coordinate point set is respectively { (228,1) ... (104,128) } { (241,2) ... (231,24) }, find out d '1With d '2Corresponding coordinate points concentrate each coordinate points to initial point distance, obtain one The distance sequence I that length is 1281={ 228.0022 ..., 164.9242 } and a length are similarly 128 distance sequence I2 Then two distance sequences are arranged by ascending order, obtain two new sequence I ' by={ 241.0083 ..., 232.2434 }1With I '2, Then by I '1With I '2The value of position where each element replaces former sequence I1And I2In the element, obtain two new sequences I″1=110,87 ..., 100,93 } and I "2=111,21 ..., 23,90 };
e):With I "1With I "2Row address and column address as Scrambling Matrix into line shuffle, set gray value matrix A Matrix A after unrest1, scramble image is shown in attached drawing 4;
f):By matrix A1It is converted to two values matrix, DNA encoding is carried out according to DNA encoding mapping ruler, obtains DNA sequence dna Matrix D1, the part figure of matrix is shown in attached drawing 9;
g):Take d '1First 128 and d '2Anteposition 128 × 4 generate DNA profiling square according to formula above (5) and table 3 Battle array Dtemplate, the part figure of matrix is shown in attached drawing 10;
h):Matrix D1With DNA profiling matrix DtemplateIt carries out DNA sequence dna and adds operation, obtain matrix D2, the part figure of matrix See attached drawing 11;
i):To matrix D2It is operated according to the inverse process of step S106 in Fig. 1, obtains gray value matrix A2
j):By k1And k2Initial value x is calculated0=0.37500000000000, using Logistic chaotic maps, first Value is x0, systematic parameter is the chaos sequence z that under conditions of μ=3.91, generation length is 128 × 1281, and be reconstructed to obtain Size and matrix A2Identical chaos pattern matrix Z1
k):According to chaos pattern matrix Z1To matrix A2XOR operation is carried out, encrypted gray scale value matrix is obtained, is exported Image A', encrypted image is shown in attached drawing 5.
Image decryption is encrypted inverse process, and decryption figure is shown in attached drawing 6.In addition, Fig. 7, Fig. 8 are shown using under false key Decrypted image, Fig. 7, Fig. 8 are difficult to recognize original image, it is seen that inventive algorithm have preferable cipher round results.
In the following, respectively to providing the image encryption method operated based on point shape and DNA sequence dna according to embodiments of the present invention Obtained key space, grey level histogram, pixel interdependence and differential attack etc. are analyzed, to better illustrate The safety of the Encryption Algorithm.
1. key space is analyzed
In the methods of the invention, 6 key parameters are shared, wherein most distinctive is using natural DNA sequence as close Key uses.In nature, the type of natural DNA sequence is diversified, even same DNA sequence dna, due to starting The difference of position, obtained DNA fragmentation are also different.Moreover, with the continuous discovery of technique for gene engineering, the mankind Known DNA sequence dna is continuously increased, that is to say, that it is random that natural DNA sequence set is considered a natural one-time pad Code book.Therefore, this method is a kind of improved one-time pad encryption method, is attacked with sufficiently large key space to resist exhaustion It hits.
2. intensity histogram map analysis
We are by the comparison of histogram, to analyze the change of the front and back image statistics of encryption.From attached drawing 12, Tu13Zhong As can be seen that larger variation has occurred in the histogram of the front and back image of encryption.Image pixel before encrypting compares concentration, and encrypts Image pixel distribution afterwards is relatively uniform, and two images similarity is relatively low, and the statistics that attacker is difficult with grey scale pixel value is special Property restore original image.It can be seen that the algorithm can effectively resist statistical analysis.
3. correlation analysis
Correlation between original image pixel is very high, and in order to effectively resist statistical attack, encrypted image must have Lower correlation.We from original image and encrypted image in the horizontal direction, vertical direction and diagonally opposed random 3000 pairs of neighbor pixels are chosen, then formula (9)-(12) are utilized to calculate the correlation between pixel.
Wherein x and y is the gray value between two adjacent pixels.
Original image Encrypted image
Horizontal direction 0.9530 0.0021
Vertical direction 0.9711 0.0114
It is diagonally opposed 0.9492 -0.0057
The related coefficient of two adjacent pixels in 4. original image of table and encrypted image
The correlation of original image and encrypted image horizontal direction is shown in that attached drawing 14, Figure 15, related coefficient are 0.9530 He respectively 0.0021, the related coefficient in other directions is shown in Table 4.From Figure 14, Figure 15 to table 4 it can be seen that related between the pixel of encrypted image Property be far below original image correlation.Illustrate again, this algorithm has very strong anti-statistical attack ability.
4. differential attack is analyzed
So-called differential attack is exactly that original image is made subtle change by attacker, then encrypts original image according to Encryption Algorithm With the image after change.By comparing two width encrypted images, attacker can find being associated with for original image and encrypted image.Artwork The encrypted image of picture is referred to as " test1 ", the gray value of first pixel of original image is changed, the image quilt obtained after encryption Referred to as " test2 ".Researcher comes whether measure algorithm resists differential attack usually using NPCR and UACI as two standards, sees Formula (13)-(15).
Wherein M, N are respectively the height and width of image, T1(i,j),T2(i, j) is respectively that " test1 " and " test2 " exists Gray value at coordinate (i, j).By calculating, the NPCR=99.62% of this algorithm, UACI=33.36%.It can by result of calculation Know, this algorithm can effectively resist differential attack.
Data in this example only process of Encryption Algorithm for convenience of description, the implementation of the invention and cipher round results do not depend on In concrete numerical value.
The present invention has higher safety, and cipher round results are good, and key space is big, can be reasonably resistant to exhaustive attack, Statistical attack and differential attack.And algorithm is easily achieved, and cost is relatively low, and encrypted result can be passed by internet It passs.
Compared with prior art, the present invention has the following advantages:
One) with traditional encipherment scheme ratio based on chaos, the present invention is good with cipher round results, and key space is big, and The advantages that anti-exhaustive attack, Statistical Analysis Attacks and differential attack.
Two) and the Image Encryption Scheme ratio of traditional one-time pad, the present invention utilize Free website http:// Www.ncbi.nlm.nih.gov/ solves the problems, such as One-time pad preservation, while inheriting one-time pad encryption side The advantages of method.
Three) with the encipherment scheme ratio based on DNA cryptographies, digital picture can be encrypted in the present invention, relative to complexity Biological operation, this method is easily achieved and controls, and encrypted result can be transmitted by internet.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Any one skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (4)

1. a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate, which is characterized in that this approach includes the following steps:
(1) the gray scale value matrix P (m, n) of 8 gray level images is inputted, m, n are the ranks dimension of image P;
(2) it according to the gray value information of image P, calculates and corrects key k1And k2, according to DNA encoding mapping ruler to k1And k2Into Row coding obtains correcting key sequence K1And K2
(3) using the amendment key sequence K after amplification1And K2Correct natural DNA sequence d1And d2, sequence d ' after being corrected1With d′2
(4) d ' is found out using fractal method1With d '2Corresponding distance sequence I1And I2, then two distance sequences are arranged by ascending order Row, obtain two collating sequence I '1With I '2, then by I '1With I '2The value of position where each element replaces former sequence I1And I2 In the element, obtain two new sequence I "1With I "2
(5) I " is used1With I "2Row address and column address as Scrambling Matrix to gray scale value matrix P into line shuffle, after obtaining scramble Matrix A1
(6) according to DNA encoding mapping ruler to A1DNA encoding is carried out, DNA sequence dna matrix D is obtained1
(7) according to DNA sequence dna matrix multiplication and DNA sequence dna XOR operation, by d '1With d '2Generate DNA profiling matrix Dtemplate
(8) by DNA sequence dna matrix D1With DNA profiling matrix DtemplateIt carries out DNA sequence dna and adds operation, DNA matrixes after being merged D2
(9) to matrix D2It is operated according to the inverse process of step (6), obtains gray value matrix A2
(10) by k1And k2Initial value x is calculated0, it is x in initial value using Logistic chaotic maps0, systematic parameter is the item of μ Under part, the chaos sequence z that length is m × n is generated1, and be reconstructed to obtain size and matrix A2Identical chaos pattern matrix Z1
(11) according to chaos pattern matrix Z1To matrix A2XOR operation is carried out, encrypted gray scale value matrix is obtained, exports image A';
It obtains correcting key sequence K in the step (2)1And K2Specially:
The DNA encoding mapping ruler for meeting base pair complementarity principle is established, DNA encoding mapping ruler is with 00,01,10,11 Binary coding is carried out to four bases in DNA sequence dna respectively, indicates that 00, C indicates that 01, G indicates that 10, T indicates 11 with A;Root According to the gray value information of image P, calculates and correct key k1And k2
By k1And k2It is converted into binary sequence, obtained binary sequence is encoded according to DNA encoding mapping ruler, is obtained To amendment key sequence K1And K2
Sequence d ' after being corrected in the step (3)1With d '2Specially:
DNA sequence dna, which is established, according to binary plus operation rule adds operation rule;
By K1And K2It is expanded according to amplification rule, amplification rule is, if DNA sequence dna to be amplified is Q={ qj, 1≤j≤ lq, qj∈ { A, C, G, T }, the then DNA sequence dna after expanding are Q'={ q 'i, 1≤i≤l', q 'i=qj, j=mod (i, lq), work as j When=0, i=j, wherein lqAnd l'The length of sequence after the length of sequence respectively to be amplified and amplification;
Two after amplification are corrected into the same d of key sequence1It is added according to DNA sequence dna plus operation rule, then by two after amplification Item corrects the same d of key sequence2It is added, sequence d ' after being corrected1With d '2
Size and matrix A are obtained in the step (10)2Identical chaos pattern matrix Z1Specially:
By k1And k2Initial value x is calculated0
x0=mod ((mod (k1,256)/256+mod(k2,256)/256),1)
The chaos sequence z generated using Logistic mappings1, it is reconstructed into the matrix Z&apos that size is m × n;;
By matrix Z'It is converted into matrix Z:
Z (i, j)=mod (floor (Z'(i,j)×105),256);
Two matrixes that Z is rotated carry out XOR operation, obtain chaos pattern matrix Z1
2. according to claim 1 a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate, which is characterized in that D ' is found out in the step (4)1With d '2Corresponding distance sequence I1And I2The step of be specially:D ' is found out using fractal method1 With d '2Corresponding coordinate point set:
Wherein , >>1 indicates to take a minimum , &amp for binary string;E indicates to take the highest one of binary string;
Find out d '1With d '2Corresponding coordinate points concentrate each coordinate points to initial point distance, obtain the distance sequence that a length is m I1With the distance sequence I that a length is n2
3. according to claim 1 a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate, which is characterized in that By d ' in the step (7)1With d '2Generate DNA profiling matrix DtemplateSpecially:
S1, DNA sequence dna XOR operation rule is first established;
S2, the matrix multiplication rule for re-defining arbitrary two DNA sequence dnas are:
S3, then, by two DNA sequence dna matrix d '1With d '2Multiplication is carried out according to the matrix multiplication rule in S2, then will be multiplied Result after operation is converted according to the DNA sequence dna XOR operation rule in S1, obtains DNA profiling matrix Dtemplate
4. according to claim 1 a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate, which is characterized in that Gray value matrix A is obtained in the step (9)2It is the inverse process of step (6), i.e., to D2The decoded processes of DNA are carried out, in DNA It decodes in mapping ruler, indicates A with 00,01 indicates C, and 10 indicate G, and 11 indicate T, to D2Decoding obtains a binary matrix, Its size is m × (n × 8), and gray value matrix A is obtained after carrying out decimal system conversion to this matrix2, size is m × n.
CN201510514056.3A 2015-08-20 2015-08-20 It is a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate Active CN105701755B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510514056.3A CN105701755B (en) 2015-08-20 2015-08-20 It is a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510514056.3A CN105701755B (en) 2015-08-20 2015-08-20 It is a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate

Publications (2)

Publication Number Publication Date
CN105701755A CN105701755A (en) 2016-06-22
CN105701755B true CN105701755B (en) 2018-10-23

Family

ID=56227991

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510514056.3A Active CN105701755B (en) 2015-08-20 2015-08-20 It is a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate

Country Status (1)

Country Link
CN (1) CN105701755B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107451948B (en) * 2017-08-09 2020-09-29 山东师范大学 Image encryption and decryption method and system based on chaos and DNA dynamic plane operation
CN109920015B (en) * 2019-03-05 2022-11-29 重庆工程学院 Image visual meaningful encryption method based on fractal graph generation
CN111263027B (en) * 2020-01-17 2021-11-12 广东电网有限责任公司 Key generation method based on nameplate image characteristics
CN111400731B (en) * 2020-03-11 2024-01-26 大连大学 Quantum image encryption method based on DNACNot
CN111832052B (en) * 2020-07-13 2024-02-20 江西财经大学 Unequal image encryption method based on significance detection
CN111988144B (en) * 2020-08-18 2023-05-26 大连大学 DNA one-time pad image encryption method based on multiple keys
CN112436933B (en) * 2020-11-09 2022-06-10 杭州电子科技大学 DNA image encryption system based on optical chaos
CN112700819B (en) * 2020-12-31 2021-11-30 云舟生物科技(广州)有限公司 Gene sequence processing method, computer storage medium and electronic device
CN114374775B (en) * 2022-01-12 2023-06-23 安徽师范大学 Image encryption method based on Julia set and DNA coding
CN115037845B (en) * 2022-05-11 2023-02-24 南开大学 Color image reversible hiding method based on Hachimoji DNA and Julia fractal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004088585A2 (en) * 2003-03-31 2004-10-14 Council Of Scientific And Industrial Research A method for storing information in dna
CN101706947A (en) * 2009-11-26 2010-05-12 大连大学 Image fusion encryption method based on DNA sequences and multiple chaotic mappings
CN103310157A (en) * 2012-03-14 2013-09-18 大连大学 Reverse transcriptase-deoxyribose nucleic acid (RT-DNA) cellular automaton-based image encryption method
CN104766350A (en) * 2015-04-16 2015-07-08 大连大学 Image encryption method based on splicing model and hyper-chaotic system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004088585A2 (en) * 2003-03-31 2004-10-14 Council Of Scientific And Industrial Research A method for storing information in dna
CN101706947A (en) * 2009-11-26 2010-05-12 大连大学 Image fusion encryption method based on DNA sequences and multiple chaotic mappings
CN103310157A (en) * 2012-03-14 2013-09-18 大连大学 Reverse transcriptase-deoxyribose nucleic acid (RT-DNA) cellular automaton-based image encryption method
CN104766350A (en) * 2015-04-16 2015-07-08 大连大学 Image encryption method based on splicing model and hyper-chaotic system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于DNA序列和自组装的图像加密研究;周士华;《中国博士学位论文全文数据库 信息科技辑》;20130815;第2013卷(第08期);第1-103页 *

Also Published As

Publication number Publication date
CN105701755A (en) 2016-06-22

Similar Documents

Publication Publication Date Title
CN105701755B (en) It is a kind of based on the image encryption method for dividing shape and DNA sequence dna to operate
Wang et al. A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level
Liu et al. Color image encryption algorithm based on DNA coding and double chaos system
Chen et al. Exploiting self-adaptive permutation–diffusion and DNA random encoding for secure and efficient image encryption
Jain et al. A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps
Wang et al. A novel color image encryption scheme using DNA permutation based on the Lorenz system
Huang et al. An image encryption algorithm based on hyper-chaos and DNA sequence
Yaghouti Niyat et al. Color image encryption based on hybrid chaotic system and DNA sequences
Li et al. A Novel Image Encryption Algorithm Based on a Fractional‐Order Hyperchaotic System and DNA Computing
CN101702240B (en) Image encryption method based on DNA sub-sequence operation
CN108366181B (en) A kind of image encryption method based on hyperchaotic system and multistage scramble
Chai et al. A novel image encryption algorithm based on the chaotic system and DNA computing
CN101706947B (en) Image fusion encryption method based on DNA sequences and multiple chaotic mappings
CN101706946B (en) Digital image encryption method based on DNA sequence and multi-chaotic mapping
Zhang et al. A novel image encryption scheme based on DNA coding and multi-chaotic maps
Li et al. A novel image encryption scheme based on non-adjacent parallelable permutation and dynamic DNA-level two-way diffusion
Huang et al. Chaotic color image encryption scheme using Deoxyribonucleic Acid (DNA) coding calculations and arithmetic over the galois field
Sivakumar et al. A New Image Encryption Method Based on Knight's Travel Path and True Random Number.
Zhang et al. A novel chaotic image encryption algorithm based on latin square and random shift
Zhou A quantum image encryption method based on DNACNot
CN113129196A (en) Image encryption method based on DNA sequence and memristor chaos
CN103310157B (en) Based on the image encryption method of RT-DNA cellular automaton
CN114374775A (en) Image encryption method based on Julia set and DNA coding
Akkasaligar et al. Medical image encryption with integrity using DNA and chaotic map
CN112769545A (en) Image encryption method based on adjacent pixel Joseph transformation and Mealy state machine

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
OL01 Intention to license declared
OL01 Intention to license declared