0% found this document useful (0 votes)
31 views

Chaos Based Text Encryption Using Image Encryption Algorithm

The document presents a novel DNA-based image encryption algorithm for securing textual data. It transforms plaintext into images, applies DNA encoding to pixel values, and manipulates the DNA sequences using chaotic maps. The research includes applying this encryption process, analyzing its security against attacks, and ensuring the chaotic map's randomness. The algorithm shows robustness against cryptographic attacks, making it a promising solution for text encryption using DNA sequences and chaos theory.

Uploaded by

t23692995
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

Chaos Based Text Encryption Using Image Encryption Algorithm

The document presents a novel DNA-based image encryption algorithm for securing textual data. It transforms plaintext into images, applies DNA encoding to pixel values, and manipulates the DNA sequences using chaotic maps. The research includes applying this encryption process, analyzing its security against attacks, and ensuring the chaotic map's randomness. The algorithm shows robustness against cryptographic attacks, making it a promising solution for text encryption using DNA sequences and chaos theory.

Uploaded by

t23692995
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

The Report is Generated by DrillBit Plagiarism Detection Software

Submission Information

Author Name Utkarsh Bajpai


Title Analysis of DNA-Based Image Encryption Algorithm for Text Encryption
Paper/Submission ID 1208289
Submitted by [email protected]
Submission Date 2023-12-13 14:46:10
Total Pages 18
Document type Thesis

Result Information

Similarity 2%
1 10 20 30 40 50 60 70 80 90

Sources Type Report Content


Quotes
1.26%
Words <
14,
3.47%

Ref/Bib
Journal/ 3.93%
Publicatio
n 2.0%

Exclude Information Database Selection

Quotes Excluded Language English


References/Bibliography Excluded Student Papers Yes
Sources: Less than 14 Words % Excluded Journals & publishers Yes
Excluded Source 0% Internet or Web Yes
Excluded Phrases Excluded Institution Repository Yes

A Unique QR Code use to View/Download/Share Pdf File


DrillBit Similarity Report

A-Satisfactory (0-10%)
B-Upgrade (11-40%)

2 3 A C-Poor (41-60%)
D-Unacceptable (61-100%)
SIMILARITY % MATCHED SOURCES GRADE

LOCATION MATCHED DOMAIN % SOURCE TYPE

1 On the finite sample behavior of adaptive estimators by Dougla-1992 Publication


1

2 Extending sensitivity analysis using regression to effectively disseminate Publication


1
life by D-2019

3 Infeasibility resolution for multi-purpose batch process scheduling by Publication


1
Puranik-2018

EXCLUDED PHRASES

1 birla institute of technology and science, pilani

2 department of civil engineering, birla institute of technology and science, pilani

3 department of chemistry, birla institute of technology and science, pilani

4 department of chemical engineering, birla institute of technology and science, pilani

5 department of biological sciences, birla institute of technology and science, pilani

6 department of physics, birla institute of technology and science, pilani

7 department of pharmacy, birla institute of technology and science, pilani

8 department of mechanical engineering, birla institute of technology and science, pilani

9 department of mathematics, birla institute of technology and science, pilani

10 department of management, birla institute of technology and science, pilani

11 department of humanities and social sciences, birla institute of technology and science, pilani
12 department of electrical and electronics engineering, birla institute of technology and science,
pilani

13 department of economics and finance, birla institute of technology and science, pilani

14 department of computer science and information systems, birla institute of technology and science,
pilani

15 department of biotechnology, birla institute of technology and science, pilani


Analysis of DNA-Based Image
Encryption Algorithm for Text
Encryption
End Semester Report
Submitted in partial fulfillment of the requirements
of BITS F422T

By

Utkarsh Bajpai

2019B5A80552P

With the supervision of

Dr. Rakesh Choubisa


(Professor, Department of Physics, BITS Pilani)

BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE


PILANI, PILANI CAMPUS

December 10, 2023

(AUGUST 2023 - DECEMBER 2023)


Acknowledgements

I would like to extend my heartfelt gratitude to the Department of Physics at BITS


Pilani for providing me with the invaluable opportunity to pursue my research
interests. The stimulating academic environment and state-of-the-art facilities have
been instrumental in shaping my scholarly journey.

I am profoundly grateful to my thesis supervisor, Professor Rakesh Choubisa, for his


unwavering guidance, insightful feedback, and constant encouragement throughout
the course of this thesis. His expertise in the field and commitment to academic
excellence have deeply inspired me and significantly contributed to my growth as a
researcher.
I also wish to express my appreciation to my peers and colleagues in the department
for their collaborative spirit and supportive camaraderie. Their perspectives and
critiques have been immensely beneficial in refining my work.
Finally, I thank the administrative and technical staff at BITS Pilani for their
invaluable support and assistance, which facilitated a conducive research
environment.
Thesis Title : Analysis of DNA-Based Image Encryption Algorithm for Text Encryption

Supervisor : Dr. Rakesh Choubisa

Semester : Second Session : 2023 Name of Student : Utkarsh Bajpai

ID No. : 2019B5A80552P

ABSTRACT :
Embarking on an intellectual quest to redefine the realm of text encryption, this thesis introduces a
pioneering approach that synergizes the intricate mechanisms of DNA sequence operations with the
unpredictability of chaotic maps. This novel methodology is predicated on the notion of
transforming plaintext into images, thereby leveraging the complexities of image encryption to
secure textual data. At the heart of this exploration lies the innovative use of DNA-based encoding,
applied to the pixel values of these images, mirroring the intricate and dense information storage
capabilities found in biological DNA sequences. This process is further augmented by the dynamic
integration of chaotic maps, specifically the logistic map, known for its sensitive dependence on
initial conditions and chaotic behavior.
The research journey entails a meticulous application of this novel encryption process, beginning
with the conversion of text to an image format—a pivotal step that bridges the traditional text
encryption methodologies with advanced image encryption techniques. Following this
transformation, the encryption algorithm embarks on encoding the image's pixel values into DNA
sequences, employing a set of predefined rules that translate the digital information into the
language of nucleotides. These sequences are then intricately manipulated using principles derived
from chaotic maps, infusing an element of unpredictability and complexity into the encrypted data.
Subsequently, the encrypted image undergoes a decryption process, wherein the DNA sequences are
decoded back into their original pixel values, reconstructing the image, which is then adeptly
converted back into plaintext. This entire process not only ensures the secure transmission of the
encrypted text but also maintains the integrity and confidentiality of the data.
A significant facet of this thesis is the comprehensive security analysis underpinning the research.
This analysis delves into the algorithm's resilience against a spectrum of cryptographic attacks,
supplemented by a rigorous statistical evaluation of the encrypted outputs. The behavior of the
logistic map, a cornerstone in the encryption process, is scrutinized to ensure its non-periodicity and
randomness—attributes that are paramount to the efficacy and security of the encryption technique.
The culmination of this research presents a compelling case for the DNA-based image encryption
method, reinforced by chaotic mapping, as a formidable and innovative solution in the
cryptographic landscape. The method’s robustness against conventional and advanced
cryptographic attacks, coupled with its innovative use of DNA sequences and chaos theory,
positions it as a promising avenue for securing sensitive textual data in an increasingly digital
world. This thesis not only contributes significantly to the field of cryptography but also opens new
horizons for future research, advocating for continued exploration into the realms of bio-inspired
cryptography and chaos theory.
1. Introduction
In the ever-evolving digital landscape where data reigns supreme, the art of concealing and
safeguarding textual information has burgeoned into an essential facet of cybersecurity. The advent
of sophisticated cyber threats has rendered traditional cryptographic methodologies increasingly
vulnerable, compelling a paradigm shift toward more intricate and resilient encryption techniques.
This thesis embarks on an intellectual odyssey to explore and refine such a technique, weaving
together the intricate complexities of DNA sequence operations with the unpredictability and
dynamism of chaotic maps to forge a groundbreaking text encryption methodology.
The impetus behind this exploration is the recognition that existing cryptographic methods, while
robust in their own right, are often found lacking in the face of advanced cryptanalytic assaults. In
response, this research delves into the uncharted territories of bio-inspired cryptography and the
enigmatic realms of chaos theory. By harnessing the structural intricacies of DNA – the very
blueprint of life – and the bewildering behavior of chaotic systems, particularly exemplified by the
logistic map, this thesis posits a novel and multifaceted approach to text encryption.
At its heart, the thesis unfolds a meticulously crafted DNA-based text encryption algorithm. This
algorithm transcends conventional boundaries by first transforming plaintext into a visual format –
an image – thus bridging the gap between textual and visual data encryption. The pixels of this
image are then encoded into DNA sequences, drawing inspiration from the vast and complex realm
of biological information storage. The chaotic map, specifically the logistic map known for its
dynamic and sensitive nature, is then employed to infuse a layer of unpredictability into the
encryption process. The interplay of DNA encoding with chaotic mapping not only amplifies the
security levels but also introduces a degree of complexity that challenges even the most
sophisticated cryptanalytic techniques.
This thesis navigates through the conceptualization, implementation, and exhaustive analysis of the
proposed encryption method. It rigorously evaluates the security implications of DNA sequence
operations combined with chaotic maps, probing the depths of their potential to reshape the
cryptographic landscape. Through theoretical exploration and empirical analysis, the research
delineates the algorithm's efficacy in resisting various forms of cryptographic attacks while
maintaining efficiency and computational practicality.
The culmination of this research presents not just a novel method for text encryption but a
significant leap in the field of cryptography. It is a testament to the innovative integration of DNA
computing and chaos theory, heralding a new era in the quest for impenetrable text encryption
methodologies. This thesis, therefore, stands as a pivotal contribution to the domain of information
security, paving the way for future explorations and innovations in cryptographic science.
2. Methodology
2.1 Overview of the Approach
Text Encryption Using DNA Sequence Operations and Chaotic Maps
This research introduces a novel methodology for text encryption, uniquely combining DNA
sequence operations with the principles of chaotic maps. The method is distinguished by its
interdisciplinary approach, leveraging concepts from biology, mathematics, and computer science to
enhance the security and complexity of text encryption.
Methodology Highlights:
1. Text-to-Image Conversion: The journey begins with transforming plaintext messages into
images, a pivotal step that bridges traditional text encryption with our novel approach.
2. DNA Sequence Encoding: Each pixel of the converted image is encoded into a DNA
sequence, emulating biological DNA where information is stored in sequences of
nucleotides.
3. Chaotic Map Integration: Chaotic behavior, inherent in maps like the logistic map, is
harnessed next. This step infuses dynamism and unpredictability into the encryption process.
4. Encryption Process: The manipulated DNA sequences are reformed into pixel values,
crafting an encrypted image that, despite its derivation from text, exhibits heightened
security owing to the DNA sequences' complexity and the chaotic map's unpredictability.
5. Decryption and Text Retrieval: The final act involves reversing the encryption process.
The DNA sequences of the encrypted image are decoded back, reconstructing the original
image, which is then converted back into plaintext.
2.2 Text-to-Image Conversion
Read Text Message into Buffer: The text message is first loaded into a buffer for processing.
1. UTF-8 Encoding of Characters: Each character in the text message is encoded using UTF-
8, which converts them into numbers ranging from 0 to 65535.
1
2. Conversion to Positional System with Base 256: The UTF-8 encoded numbers are then
transformed into a positional system with base 256. This is done by representing each
number ti as ti=ai⋅256+bi, where ai and bi are coefficients.
3. Calculation of Image Size: The dimensions of the image (height and width) are calculated
using a specific formula that considers the length of the transformed text.
4. Padding and Random Value Addition: If necessary, the data is padded with an “End-of-
Text” character and random values to meet the size requirements for the conversion.
5. Formation of Pixel Array: The processed data is then arranged into a three-dimensional
array that represents the pixel values of the image.
6. Saving as PNG File: Finally, this array is treated as an image and saved in PNG format.

2.3 DNA-based Encryption and Chaotic Integration


We start with a 3x3 gray-scale image, represented by the following pixel values:

Using the DNA mapping scheme for binary to nucleotide that converts pixel values to DNA
sequences, the image is encoded as:

00 A
01 C
10 G
11 T

Mapping Scheme
Image after Mapping
A pseudo-random sequence is generated, simulating the output from a chaotic map like the logistic
map. For our example, this sequence is: 1, 3, 2, 0, 1, 2, 3, 1, 0. The DNA sequences are then
changed according to the chaotic sequence. In this example, the manipulation involves shifting the
sequences. The result is the encrypted image represented by the new DNA sequences:

Encrypted Image

The final encrypted image, represented by the altered DNA sequences, significantly differs from the
original image, demonstrating the effectiveness of the encryption.

2.4 Decryption and Text Retrieval


DNA Sequence Decoding
• Process: The encrypted image represented by altered DNA sequences is first decoded back
into pixel values. This process reverses the DNA encoding scheme, translating each DNA
nucleotide back to its corresponding binary and then to the pixel value.
• Mapping Scheme: We use the inverse of the same mapping scheme to convert nucleotide
back to pixel values

Reversing Chaotic Sequence Manipulation


• Chaotic Map Parameters: Utilize the same parameters and initial conditions of the chaotic
map used in the encryption process.
• Sequence Reversal: Apply the inverse of the manipulations (like shifting, swapping, or
substitution) performed during encryption based on the chaotic sequence.

Image to Text Conversion


• Pixel to Number Conversion: Convert the pixel values of the decrypted image back to their
numerical (e.g., Unicode) representations.
• Reconstructing Text: Translate these numerical values back to characters, forming the
original text message. Ensure that padding and “End-of-Text” characters added during the
text-to-image conversion are properly handled.
3. Cryptanalysis
3.1 Differential Cryptanalysis

The analysis of encrypted imagery, derived from the texts "!Hello, World" and "?Hello, World,"
accentuates the profound impact of a solitary character's metamorphosis. Upon visual scrutiny, the
encrypted incarnations of these texts exhibit stark disparities, a testament to the encryption's
acumen in capturing even the most nuanced of textual variations.

Quantitative Analysis
• Difference Percentage: A quantitative dissection reveals that the disparity between the two
encrypted images is a staggering 837.04% relative to the total image size. This pronounced
deviation, elicited by a mere flicker of change in the plaintext, speaks volumes about the
encryption's ability to transmute minor textual fluctuations into major visual contrasts.
Implications

• High Sensitivity: The encryption algorithm demonstrates high sensitivity to changes in the
input text. A small alteration in the plaintext results in a significantly different encrypted
image, which is a desirable property for encryption algorithms as it enhances security
against differential cryptanalysis.
• Resistance to Differential Attacks: This level of sensitivity suggests that the algorithm
would be resistant to differential cryptanalysis, where an attacker attempts to exploit the
effects of differences in plaintext on the ciphertext.
3.2 Chosen - Plaintext Attack Analysis
We'll choose plain texts with varying lengths and characters to see how they are encrypted
differently.

The encrypted images of various chosen plain texts are displayed above. Each image corresponds to
a different plain text, ranging from short texts to longer ones, including numerical and special
characters.

Observations
• Visual Patterns: There are no immediately discernible patterns or consistencies across the
encrypted images. Each image appears visually distinct, with no obvious correlation to the
length or content of the plaintext.
• Sensitivity to Text Length and Content: The encryption algorithm seems to handle varying
lengths and types of plaintexts without creating recognizable patterns, which is a positive
sign of security.
Implications

• Resistance to Chosen-Plaintext and Known-Plaintext Attacks: The analytical exploration


of the encryption algorithm under scrutiny unveils its resilience to both Chosen-Plaintext
and Known-Plaintext Attacks. This conclusion is drawn from the absence of discernible
patterns or regularities within the encrypted images. Such a characteristic is pivotal, as it
implies a substantial challenge for any adversary attempting to glean insights about the
encryption key or the underlying algorithmic structure from the ciphertext alone.
In essence, the encrypted images emerge as cryptic tapestries, devoid of any traceable patterns that
could potentially betray the secrets of their creation. This obscurity plays a crucial role in fortifying
the algorithm against attempts to unravel it using known pieces of plaintext. Consequently, the
encryption method stands as a bastion of security, adept at masking its mechanisms and thwarting
efforts aimed at cryptographic reverse-engineering through conventional plaintext analysis methods.
• High Sensitivity and Security: The algorithm's high sensitivity to changes in plaintext and
its ability to handle a variety of texts without revealing patterns contribute to its overall
security.

3.3 Statistical Analysis


The histograms above represent the distribution of pixel values in three of the encrypted
images. These histograms are crucial for evaluating the resistance of the encryption algorithm to
statistical attacks.
Observations
• Uniform Distribution: The pixel value distributions in the encrypted images appear to be
fairly uniform. This uniformity is a positive indicator as it suggests that no particular pixel
value is overly predominant.
• Lack of Patterns: There are no obvious patterns or regularities in the histograms. The
spread of pixel values seems random, which is a desirable property for encrypted images.

Implications
• Resistance to Statistical Attacks: The uniform and patternless distribution of pixel values
indicates that the encryption algorithm is likely resistant to statistical attacks. In statistical
attacks, attackers look for patterns or biases in the distribution of pixel values to extract
information. The lack of such patterns in these encrypted images suggests that gaining
insights from the distribution alone would be challenging.
• Randomness: The randomness indicated by these distributions is a key aspect of strong
encryption, as it means the encrypted image does not retain any visible characteristics of the
original image or text.

3.4 Efficiency and Key Space Analysis


3
The average time taken for each step in the process, based on the measurements over 10 runs, is as
follows:
1. Text-to-Image Conversion: 0.00020 seconds
2. Image Encryption: 0.00064 seconds
3. Image Decryption: 0.00056 seconds
4. Image-to-Text Conversion: 0.00002 seconds
These results indicate that each step of the process is computationally efficient, with all steps
completing in less than a millisecond on average.
Now, let's conduct the key space analysis for the DNA-based image encryption algorithm:
1. Parameters of Logistic Map:
• r: Range [3.57, 4], a common range for chaotic behavior.
• x: Initial condition, range (0, 1).
2. Precision and Key Space Calculation:
• Assuming a precision of 10-6 (common in floating-point calculations), we can
2
calculate the number of unique values each parameter can take.
• For r: (4−3.57)×106≈430000 unique values.
• For x: 106 unique values (as it ranges from 0 to 1).
• Total Key Space: Approximately 430000×106=430×109 unique keys.
3. Security Implications:
• A key space of 430 billion provides a significant level of security against brute-force
attacks.
• However, the actual security also depends on the predictability and sensitivity of the
logistic map, and the algorithm's resistance to other cryptographic attacks.

The corrected graph above shows the relationship between text length (number of characters) and
the total time required for the entire process, including text-to-image conversion, encryption,
decryption, and image-to-text conversion.

Insights

• Linear Relationship: The relationship between text length and total time appears to be
linear, indicating that the time complexity of the process scales proportionally with the
length of the text.
• Practical Implications: For shorter texts, the process is extremely quick, but for longer
texts, the time increases linearly, which is an important consideration for applications where
time efficiency is critical.
• Algorithm Efficiency: The linear trend also suggests that the algorithms used for each step
of the process have a time complexity that scales linearly with the size of the input data,
which is a desirable property in terms of scalability.
3.5 Key Space Analysis

The plotted sequences above represent the behavior of the logistic map for a range of r values in
the chaotic region and different initial x values.

Observations
• Non-Repeating Nature: The sequences do not show any evident repeating patterns, which
is indicative of non-periodicity. This is a key characteristic of chaos, as it implies
unpredictability and complexity.
• Variation with Parameters: The sequences vary significantly with changes in both the r
and x values. Each combination of r and x produces a distinct sequence, demonstrating the
sensitivity of the chaotic map to its initial conditions.
• Random-like Behavior: The values in each sequence fluctuate irregularly, resembling
random behavior. This lack of predictability is essential for the security of the encryption
algorithm.
Implications

• Robustness Against Prediction: The non-repeating and irregular nature of these sequences
contributes to the robustness of the encryption algorithm against prediction and analysis. An
attacker would find it challenging to predict future values of the sequence or to reverse-
engineer the initial conditions or the parameters.
• Sensitivity to Initial Conditions: The significant variation in sequences with different
initial conditions underscores the importance of securely choosing and managing the initial
parameters (r and x) in the encryption process.
4. Results and Discussions
The core innovation of the thesis rests upon the unique text-to-image conversion, followed by
DNA-based encryption using chaotic maps, resulting in a robust encryption technique. The research
meticulously evaluates the DNA sequence operations in tandem with the chaotic behavior of
logistic maps, offering a comprehensive analysis of security and efficiency aspects of text
encryption.
• Differential Cryptanalysis
• Significant Sensitivity: The differential cryptanalysis revealed that a minor
alteration in the plaintext led to an 837.04% difference in the encrypted images
compared to the original. This substantial change highlights the algorithm's high
sensitivity, which is crucial for cryptographic security.
• Resistance to Differential Attacks: The substantial alteration in encrypted images
due to minor changes in plaintext underscores the algorithm's resistance to
differential attacks, a critical attribute in cryptographic security.
• Chosen-Plaintext and Known-Plaintext Attack Analysis
• No Patterns Detected: The analyses for both chosen-plaintext and known-plaintext
attacks indicated no discernible patterns across encrypted images, affirming the
method's capability to manage varying text lengths and contents without security
compromise.
• Complexity and Unpredictability: The absence of patterns in encrypted images
enhances the method's resistance to such attacks, suggesting the encryption's inherent
complexity and unpredictability.
• Statistical Analysis
• Uniform and Patternless Distribution: The statistical analysis of pixel value
distribution in encrypted images showed a uniform and patternless spread. This
indicates strong resistance to statistical attacks.
• Randomness Ensured: The random-like behavior of pixel values in encrypted
images ensures that they do not retain characteristics of the original text or image,
contributing to the encryption's effectiveness.
• Efficiency and Key Space Analysis
• Computational Efficiency: The process demonstrated remarkable computational
efficiency, with each step, including text-to-image conversion (0.00020 seconds),
image encryption (0.00064 seconds), image decryption (0.00056 seconds), and
image-to-text conversion (0.00002 seconds), completing in less than a millisecond.
• Substantial Key Space: The key space analysis revealed a substantial key space of
approximately 430 billion, implying significant security against brute-force attacks.
• Management of Initial Conditions: The analysis also highlighted the importance of
managing initial conditions to prevent predictability, reinforcing the encryption's
overall security.
• Logistic Map Behavior in Key Space Analysis
• Non-Repeating and Sensitive Nature: The logistic map's behavior was explored,
emphasizing its non-repeating and sensitive nature to initial conditions. This aspect is
crucial for the encryption's robustness.
• Importance of Secure Parameter Selection: The sensitivity to initial conditions
underscores the significance of secure parameter selection in the encryption process,
further reinforcing its security.

5. Future Scope of Work


The research outcomes present a compelling case for the proposed DNA-based image
encryption technique, emphasizing its potential as a secure method for protecting
sensitive visual data. The integration of DNA sequence operations with chaotic maps
not only fortifies the encryption against conventional attacks but also innovates
within the cryptographic domain.

This thorough investigation contributes substantially to the field of information


security, opening new avenues for the encryption of textual information in an
increasingly digital age. The study sets a precedent for future research in the
encryption landscape, advocating for continued exploration into bio-inspired
cryptography and chaos theory.
6. References
1. Lawnik, M., Moysis, L., & Volos, C., "Chaos-Based Cryptography: Text Encryption Using
Image Algorithms", Advances in Science, Technology and Engineering Systems Journal,
2023.
2. Baptista, M.S., "Cryptography with chaos", Institute for Physical Science and Technology,
University of Maryland, College Park, MD, 20742, USA.
3. Baptista, M.S., "Encryption using the ergodic property of chaos", Elsevier Science B.V.,
1998. PACS: 05.45.+b. Keywords: Chaos; Cryptography; Message; Security.
4. Li, T.Y., & Yorke, J.A., "Period Three Implies Chaos", American Mathematical Monthly, 82,
985, 1975.
5. Pecora, L.M., & Carroll, T.L., "Synchronization in Chaotic Systems", Physical Review
Letters, 64, 821, 1990.
6. Hayes, S., Grebogi, C., Ott, E., & Mark, A., "Experimental Control of Chaos for
Communication", Physical Review Letters, 73, 1781, 1994.
7. Menezes, A.J., van Oorschot, P.C., & Vanstone, S.A., "Handbook of Applied Cryptography",
CRC Press, New York, 1996.
8. Ott, E., "Chaos in Dynamical Systems", Cambridge University Press, New York, 1993.

You might also like