JHVJHV
JHVJHV
by
2023-2024
Abstract. Images are encoded to prevent unauthorized access to sensitive data. Although chaos-based picture
encryption algorithm is being widely utilized in many industries, the widespread use of low-dimensional chaos
increases questions regarding the security of the encryption. The study suggests a framework for encrypting
pictures that uses DNA Encryption and a 6D high-dimensional chaotic system to handle this. First, random chaos
sequences are used to undergo diffusion and shuffling of the original image sequences, and then there is further
diffusion and shuffling at the DNA level. An encrypted image is then created by combining the encoded
sequences that are generated. The experiments' findings demonstrate that the recommended algorithm
performs better in terms of picture complexity (key space over 2300), pixels correlations and image entropy (close
to 8). Furthermore, in comparison to previous references, the algorithm demonstrates excellent encryption
quality.
SECURE IMAGING IN 6D CHAOS: A DNA-
ENCODED APPROACH FOR ENHANCED
PRIVACY
Submitted in partial fulfilment of the requirements for the
degree of
BACHELOR OF TECHNOLOGY
in
ELECTRONICS AND COMMUNICATION
ENGINEERING
by
Romil Singh (2000970310140)
Shantanu Ranjan (2000970310155)
Shivam Sharma (200097010159)
2023-2024
ii
DECLARATION
We hereby declare that the thesis entitled “Secure Imaging in 6D Chaos: A DNA-
Encoded Approach for Enhanced Privacy” submitted by Romil Singh, Shantanu
Ranjan and Shivam Sharma for the award of the degree of Bachelor of Technology in
Electronics and Communication Engineering to Galgotias College of Engineering and
Technology, Greater Noida affiliated to Dr. A.P.J. Abdul Kalam Technical
University, Lucknow is a record of bonafide work carried out by us under the
supervision of Mr. Deependra Sinha, Assistant Professor.
We further declare that the work reported in this thesis has not been submitted and
will not be submitted, either in part or in full, for the award of any other degree or
diploma in this institute or any other institute or university.
ii
CERTIFICATE
This is to certify that the thesis entitled “Secure Imaging in 6D Chaos: A DNA-
Encoded Approach for Enhanced Privacy” Romil Singh, Shantanu Ranjan and
Shivam Sharma from the Department of Electronics and Communication Engineering,
Galgotias College of Engineering and Technology, Greater Noida affiliated to DR.
A.P.J. Abdul Kalam Technical University (AKTU), Lucknow, for the award of the
degree of Bachelor of Technology in Electronics and Communication Engineering, is
a record of bona fide work carried out by them under my supervision, as per AKTU
code of academic and research ethics.
The contents of this report have not been submitted and will not be submitted, either
in part or in full, for the award of any other degree or diploma in this institute or any
other institute or university. The thesis fulfils the requirements and regulations of the
University and in my opinion meets the necessary standards for submission.
Approved by
ii
ACKNOWLEDGEMENT
First of all, we would like to express our gratitude to our beloved Chairman, Shri.
Suneel Galgotia and CEO, Shri. Dhruv Galgotia for providing necessary facilities
to carry out and finish the project successfully. We are grateful to our Director, Dr.
Mohd. Asim Qadri for his support and encouragement.
Our special thank goes to Head of the Department, Electronics and
Communication Engineering, Dr. R.V. Purohit for providing an environment that
encouraged us in working towards our goal and supported in completion of our
project. This project gave us an opportunity to apply creative and critical thinking
skills.
We would like to present our deep sense of gratitude to our project guide, Deependra
Sinha, Assistant Professor, Department of Electronics and Communication
Engineering who has always been a source of motivation and firm support for
carrying out the project. The supervision and support that he gave truly helped in the
progression of the project. His cooperation is much indeed appreciated. We are highly
obliged to her for her valuable advices and moral support during research period.
Finally, our greatest and special gratitude goes to our family for their love and
support.
ii
ABSTRACT
Images are encoded to prevent unauthorized access to sensitive data. Although chaos-
based picture encryption algorithm is being widely utilized in many industries, the
widespread use of low-dimensional chaos increases questions regarding the security
of the encryption. The study suggests a framework for encrypting pictures that uses
DNA Encryption and a 6D high-dimensional chaotic system to handle this. First,
random chaos sequences are used to undergo diffusion and shuffling of the original
image sequences, and then there is further diffusion and shuffling at the DNA level.
An encrypted image is then created by combining the encoded sequences that are
generated. The experiments' findings demonstrate that the recommended algorithm
performs better in terms of picture complexity (key space over 2300), pixels
correlations and image entropy (close to 8). Furthermore, in comparison to previous
references, the algorithm demonstrates excellent encryption quality.
ii
TABLE OF CONTENTS
Abstract v
Table of Content vi
List of Figure ix
List of Table x
List of Abbreviation xi
1 Introduction 1
2 Literature Review 7
3 Methodology 16
3.1 Proposed Encryption and
Decryption System 16
3.2 Reference Encryption and
Decryption System 21
ii
4.1.5 Information entropy analysis 38
References
Publication Detail
Individual CV
Plagiarism Report
ii
LIST OF FIGURES
No. No.
3.1 Image encryption scheme 17
3.2 Sample Images 21
ii
LIST OF TABLES
No. No.
1.1 Coding Conditions 5
1.2 XOR Conditions 6
4.1 Correlation Index 35
4.2 Encrypted Lena Correlation with Different Algo. 36
4.3 Encrypted Data Entropy 37
4.4 Encrypted Lena Entropy with different Algo. 37
4.5 Quality Results 38
4.6 Reference Correlation Analysis 43
4.7 Reference Quality Analysis 44
ii
LIST OF ABBREVIATION
Abbreviation Meaning
AES Advanced Encryption Standard
IV Initialization Vector
XOR Exclusive OR
ii
CHAPTER 1
INTRODUCTION
In an era of ubiquitous surveillance and data breaches, ensuring the privacy and security
of sensitive information is paramount. One area where these concerns are particularly
acute is in medical imaging, where patient data must be protected from unauthorized
access and potential misuse. To address these challenges, researchers have proposed a
novel approach: Secure Imaging in 6D Chaos, a DNA-encoded method for enhanced
privacy.
The motivation behind this research stems from the need to protect sensitive medical
imaging data, such as MRI or CT scans, from unauthorized access and potential
exploitation. Traditional encryption methods, while effective, can be vulnerable to attacks
as computing power continues to increase. By leveraging the unique properties of DNA
and chaotic systems, this approach aims to provide a more robust and secure method for
encoding and protecting medical images.
One of the key advantages of the DNA-encoded approach is its potential to provide
enhanced privacy protection compared to traditional encryption methods. DNA has a high
information density, allowing for the storage of large amounts of data in a compact form.
Additionally, the use of chaotic systems adds an extra layer of security, as chaotic
systems are highly sensitive to initial conditions, making them difficult to predict or
reverse-engineer.
The primary objective of this research is to develop a secure and efficient method for
encoding medical images using DNA and chaotic systems. Specifically, the research aims
to achieve the following objectives:
1
4. Demonstrate the feasibility of the approach through experimental validation.
The technology involved in this research includes DNA sequencing, chaotic systems
theory, and image processing algorithms. DNA sequencing techniques will be used to
encode the medical images into DNA sequences, taking advantage of the high
information density of DNA. Chaotic systems theory will be applied to enhance the
security of the encoded data, leveraging the unpredictability and complexity of chaotic
dynamics. Image processing algorithms will be used to preprocess the medical images
before encoding and to reconstruct the images from the encoded DNA sequences.
2
to account for permutation and diffusion. In order to enhance the power and safety of the
permutation process, we employ pixel-level and DNA-level permutations, which result in
a substantially reduced correlation between the initial picture and the image that was
encrypted. Without a doubt, both of these permutation processes strengthen the
algorithm's ability. We perform diffusion operations at the pixel and molecular level to
the chaotic pictures after permutation. This paper evaluates the algorithm using key-space
evaluation, key sensitiveness, correlation evaluation, and other techniques. The outcomes
demonstrate that the algorithm we developed performs better than existing methods.
The report include; Chaotic System, DNA Encoding, Proposed Methodology, System
Parameters, Histogram Analysis, Efficiency Measurement, Key space Synthesis,
Correlation, Entropy Analysis and Encryption Quality.
As time passed, the standard Lorenz chaotic system became unable to meet the ever-
increasing communication security needs. This resulted in the proposal. of using higher-
dimensional chaotic systems. The traditional Lorenz system was modified in 2009 to
incorporate both linear and non-linear feedback controllers, which resulted in the
development of the ensuing 5D hyper-chaos system [28].
3
Five-dimensional hyper-chaos system is characterized from control parameters such as σ,
r, k1, B, and k2, where k1 and k2 are both positive. The system develops a hyper-chaotic
attractor featuring 3 positive Lyapunov coefficients alongside one equilibrium. In general,
a system of chaos that has greater hyper-chaotic attractors generally more complicated.
Therefore, it is comprehensible why the functioning of the five-dimensional hyper-chaos
system tends to be more sophisticated compared to standard Lorenz system.
Nonetheless, the desire for safety is relentless. To augment the complication and
unpredictability of in system, concept of six-dimensional hyper-chaos system was
introduced. This work utilizes the six-dimensional hyper-chaos system introduced by
[29]. It is produced by combining a one-dimensional linear system into a five-
dimensional hyper-chaos system stated in formula number 3.
Thirteen terms make 6D hyper-chaotic system that consists of a total of seven different
factors. It also includes 6 system values. Among them, the constant parameters are a, b, c,
and h; the coupling parameter is l; and the two control factors that affect the behavior of
the system and its bifurcations are d and k. In contrast to the hyper-chaotic system in 5D,
there are six Lyapunov exponents in the 6D version. Positive results from four of them
indicate that the six-dimensional hyper-chaos system exceeds the 5D variant with respect
to of complication and unpredictable nature. In Qigui Yang's study [29], the possible
values of the other variables is given, and a, b, c, and h is identified as fixed variables.
4
4 distinct base type i.e. adenine i.e. (A), thymine i.e. (T), cytosine i.e. (C), and guanine
i.e. (G)—and dually parallel to one another strands are involved to make up a typical
DNA molecule. With A connecting solely to T. Also, G is bonding only to C, these
strands/bases show a supportive link. Encryption dependent on the use of DNA is often
referred as biological encryption [30]. Since traditional biological encryption is bound by
expensive prices and tight scientific specifications, pseudo-DNA technology has come to
prominence as a crucial part of cryptography [31]. In Table 1. only eight of the four
pairings of the 24 encodings tries Watson-Crick supplementing criteria.
01 C G G C A T A T
10 G C C G T A T A
11 T T A A C C G G
Several binary operations were performed by DNA nucleoid that are demonstrated in
Table 2. In this research, we apply simply the XOR operation. DNA encoding and
decoding features were adeptly implemented in the encryption and decryption stages. So
as the names of functions imply, DNA encoding converts a given picture data to closest
DNA base, while DNA decoding does the opposite.
5
TABLE 1.2. XOR Conditions
6
CHAPTER 2
LITERATURE REVIEW
7
16 image pixel[1]. Chanil Pak introduced a novel technique for encrypting colored
pictures using a newly developed single-dimensional chaos map[14], Majority of low-
dimensional chaos-based picture encryption methods were Outperformed by superior
outcomes of several picture encryption techniques [15–17].
Followingthe updated Henon map, Writer proposed a color picture encryption method
[19]. In comparison to the previous Henon map, this upgraded version shows richer
chaotic features and a greater degree of complexity, leading to better efficiency during
encryption. Apart from these, numerous other researchers have developed a plethora of
picture encryption techniques rooted on multidimensional chaotic systems [20–22].
Because DNA computing has some advantages over other computer platforms, including
big data spaces, exceptionally minimal energy usage, and massive scale concurrent
processing, encryption techniques centered on hyper-chaos and encoded DNA have
gained popularity in recent years [15–17, 22]. In addition, because of the unique
characteristics involving bit-level permutation, a lot of picture encryption methods
employ it to jumble the association among pixels [19, 23, 24]. In addition, certain
strategies matching a weak chaotic system with other ways can give excellent results.
[25] devised an approach in 2022 that incorporated a complex system with Sub-block
Spiral Scans. They also used Matrix Multiplication. Similarly, [26] put proposed a rapid
picture encryption technique built on one-channel cryptography and chaotic systems.
8
The proposed scheme for encrypting digital images utilizes chaotic logistic maps and an
80-bit external secret key to efficiently enhance security. Here's a breakdown of how the
scheme works and the security analysis it undergoes:
2. An 80-bit external secret key is incorporated into the encryption scheme to provide an
additional layer of security. This secret key serves as a parameter for the chaotic logistic
maps, influencing the encryption process and ensuring that only authorized parties with
knowledge of the key can decrypt the encrypted images. The use of a sufficiently long
secret key helps to strengthen the security of the encryption scheme against brute-force
attacks.
Sensitivity Analysis: Assessing the sensitivity of the encryption scheme with respect to
changes in both the secret key and the plaintext. This analysis helps to ensure that small
modifications to the key or plaintext result in significant changes to the encrypted data,
thereby thwarting potential attacks.
Key Space Analysis: Evaluating the size and complexity of the key space to determine
the scheme's resistance against brute-force attacks. A larger and more complex key space
makes it exponentially more difficult for attackers to decipher the encrypted data through
exhaustive search.
9
4. Dynamic Key Modification: To further enhance the scheme's resistance against attacks,
the secret key is modified after encrypting each block of sixteen pixels. This dynamic key
modification ensures that even if an attacker manages to compromise a portion of the
encrypted data, subsequent blocks remain secure due to the updated key. By periodically
changing the key during the encryption process, the scheme maintains ongoing security
for the encrypted data.
In summary, the proposed encryption scheme combines chaotic logistic maps, an 80-bit
external secret key, and dynamic key modification to efficiently encrypt digital images
while undergoing thorough security analysis to ensure its effectiveness and resilience
against potential attacks.
10
helps preserve the integrity of the data throughout the encryption-decryption process,
ensuring that reconstructed 3D images maintain high quality and accuracy.
11
3. Multilevel Discretization Method for Key Matrices: The generated chaotic sequences
are then used in conjunction with a multilevel discretization method to generate key
matrices for encryption. Discretization involves dividing continuous chaotic sequences
into discrete values, which are then used to construct key matrices. This process ensures
that the key matrices are sufficiently randomized and provide a robust foundation for
encryption. By incorporating a multilevel discretization method, the approach enhances
the randomness and complexity of the key matrices, further strengthening the security of
the encryption scheme.
12
encryption. This complexity enhances encryption strength and resistance against
decryption attacks.
Hybrid encryption algorithms combine spatial domain encryption for fidelity and
frequency domain encryption for efficiency. They provide a balanced approach, ensuring
robust security and efficient processing. The use of the improved 2D-ICHM strengthens
these algorithms by offering a more complex and unpredictable chaotic map for key
generation, ensuring the integrity and confidentiality of encrypted image data.
Block-based encryption schemes involve dividing the image into smaller blocks of pixels
for encryption. This approach offers several advantages, including ease of
implementation and the ability to apply encryption techniques specifically tailored to
blocks of pixels. Here's an explanation of the key aspects of block-based encryption
schemes and their significance:
1. Pixel Block Encryption: In block-based encryption schemes, pixels are grouped into
blocks, typically of fixed sizes such as 8x8 or 16x16 pixels. This block-based approach
allows for the application of encryption techniques to individual blocks, rather than the
entire image at once. By encrypting smaller blocks, the encryption process becomes more
manageable and efficient.
2. Techniques for Block Encryption: Various techniques are utilized within block-based
encryption schemes to ensure effective encryption of the pixel blocks. For example,
rotating blocks involves rotating the pixels within each block by a certain angle before
applying encryption algorithms. This rotation introduces additional complexity and
randomness, enhancing the security of the encryption process. Additionally, XOR
operations may be applied to pixel blocks, where each pixel value is XORed with a
corresponding value from a generated key. XOR operations provide a simple yet effective
method for introducing randomness into the encrypted data.
13
schemes with repetitive instructions that can be executed in parallel, the encryption
process can be accelerated, leading to faster encryption and decryption times. This is
particularly beneficial for handling large images or real-time encryption requirements.
The initial step in encrypting the color image involves creating pseudo-random key
streams with two hyper-chaotic systems, known for their highly complex and
unpredictable behavior. Here's how it works:
14
Incorporating the secret key into the systems' initialization process enhances
encryption security and unpredictability.
4. In summary, the first step of color image encryption involves generating
pseudo-random key streams with two hyper-chaotic systems, using a 256-bit
external secret key to initialize them through algebraic transformations. This
process leverages the chaotic nature of hyper-chaotic systems and the security
features of the external secret key to achieve robust encryption.
15
CHAPTER 3
METHODOLOGY
This paper introduces a new color image encryption algorithm to overcome the
limitations of prior methods. Existing approaches either use low-dimensional chaotic
systems, which are not complex enough, or rely on DNA coding, which is vulnerable to
cracking. In contrast, the proposed algorithm is based on a 6D hyper-chaotic system and
DNA encoding, offering a more secure and complex encryption method.
The key contributions and innovations of this work are outlined as follows. Firstly, we
employ a more intricate 6D hyper-chaotic system to generate six distinct chaotic streams
using the image characteristics and a key. Subsequently, the algorithm divides these
streams into two groups for permutation and diffusion operations. To ensure efficient and
secure permutation, we implement both pixel-level and DNA-level permutations,
ensuring a weak relationship between pixels in the original and encrypted images. These
permutation processes effectively safeguard the algorithm against shear attacks.
Furthermore, since permutation operations do not alter pixel distributions,After
permuting chaotic images, we apply diffusion at both the pixel level and the DNA level.
To validate the algorithm, we analyze key space, key intensity, histograms, and
correlations. The results demonstrate that our algorithm outperforms existing methods.
16
Figure 3.1 Image encryption scheme
17
3.1.1 ENCRYPTION AND DECRYPTION ALGORITHM SYSTEM
18
6. Decimal Permutation Operation (Step 6): Perform decimal permutation
operations on matrix A1 using chaotic matrix S1. This operation involves
segmenting S1 into three parts (S11, S12, and S13) to perform scrambling
operations on each dimension (R, G, B) of the plain matrix A1.
7. Decimal Diffusion Operation (Step 7): Apply decimal diffusion by carrying out
bit XOR operation in the matrix A2 and chaotic matrix S2.
8. DNA Encoding (Step 8): Encode the diffused matrix A3 into a DNA matrix A4
using predefined coding rules from Table 1.
10. DNA Diffusion (Step 10): Conduct DNA level diffusion between matrix A5 and
DNA diffusion sequence S4, applying defined XOR rules from Table 2.
19
11. Decoding (Step 11): Transform the distributed DNA matrix A6 into A using the
decoding criterion and the decimal matrix generated by the chaotic sequence w.
The encrypted picture is represented as Take C, where wi stands for the eight rules
of permissible combinations. In the end, the function yields the encrypted image's
decrypted decimal sequence or matrix.
The phases of the procedure for encryption are mirrored in the decryption process. To
create chaotic sequences, the key is first fed into the hyperchaotic system. The decimal
matrix is then created by encoding the cypher image into a DNA sequence using
diffusion, permutation, and decoding operations. The plain image P is then recovered by
performing the inverse operations known as decimal diffusion and decimal permutation.
3.1.2SYSTEM PARAMETERS
We have chosen the following crucial parameters, which have undergone thorough
experimental validation: Key: [x = four y = four z = three u = four v = five w = -2, a =
ten b = 8/3, c = twenty-eight, d = two, h = 8.8]. .Furthermore, the level of interference
has been set to 0.02, the initial number is 982451653, and the cutoff value is set to 700.
Fig. 2 shows both the decryption and encryption procedures for colour images that are
512 By 512 pixels in size.
20
FIGURE 3.2. a). Baboon (Plain& Cipher), b). Black (Plain &
Cipher), c). Lena (Plain & Cipher), d). Peppers (Plain & Cipher), e).
White (Plain & Cipher).
This section looks at encryption schemes that are similar to the reference scheme. These
schemes are divided into three main classes: (1) schemes that use multidimensional
chaotic systems on colour image data; (2) schemes that combine SHA and digital DNA
operations with high-dimensional chaotic systems; and (3) schemes that use s-boxes in
conjunction with either of the two previous classes. Numerous areas, including biology,
ecology, robotics, cryptography, and communication systems, use chaotic systems. It is
important to confirm the chaotic behaviour of a higher-dimensional nonlinear system
before using it for data encryption. Non-linear conventional equations with temporal
derivatives, pseudo-randomness, aperiodicity, ergodicity, and sensitive reliance on
starting states are characteristics of chaotic systems. Hyperchaotic systems, on the other
hand, have bigger key spaces, more unpredictability, and more complicated dynamical
behaviour. Lyapunov exponents (LEs) may be used to mathematically differentiate
between chaotic and hyperchaotic systems. If there is just one positive LE in a non-linear
differential equation, it is deemed chaotic; if there are two or more positive LEs, the
system is deemed hyperchaotic. The exponential separation rate for 2 adjacent trajectories
of a dynamical system is represented by LE, which is computed using equation (1).
21
(3.11)
Another encryption system, which has a bigger key space, quicker encryption speed, and
an entropy value closer to 8, resists statistical and differential assaults by permuting and
diffusing the pixels of the R, G, and B components. This scheme is based on hyperchaotic
sequences. However, when used on grayscale photos, this technique could be vulnerable.
A four-dimensional hyperchaotic system, external keys, dynamic DNA encodings, and
SHA-384 hashing of the plain picture are utilised to improve security and lower hazards
in low-dimensional chaotic systems. This technique has high key sensitivity and is
resistant to brute-force assaults, but it takes longer since it needs extra formatting
operations during the encoding and decoding processes.
22
Following the traditional chaos-based design, many enhancements have been made to
permutation-substitution and permutation-only structures. Chaotic or hyperchaotic
systems are used by encryption designs such as substitution-permutation networks
(SPNs) to create encryption keys. Confusion and diffusion are key concepts in a strong
method for encrypting both colour and grayscale images, which is essential for data
security.
23
We present bDCE (S-box based DNA and Chaotic Encryption), a computationally
feasible encryption technique intended to improve information security. The four primary
parts of the algorithm are as follows:
1. Key, Chaos Picture, and S-box Generation: In this stage, the initial chaotic image, S-
box, and key needed for encryption are created.
2. Actual and Chaos Picture Division: For further processing, the initially captured and
chaos pictures are split up into n sub-blocks.
3. DNA-Based Operations, Decoding, and Dynamic DNA Encodings: This section
improves encryption via the use of flexible DNA encoded information, DNA-based
processes, and decoding methods.
4. S-box Configuration: Certain techniques are used in the S-box's implementation to
enhance encryption performance.
An encrypted picture is decrypted using the SbDCD decryption method, yielding the
decrypted image. Equation (2) describes a four-dimensional hyperchaotic system that is
used in the encryption process to increase security.
(3.12)
Hyperchaotic behaviour with two positive Lyapunov exponents is shown by system (2)
when the control parameters a = 21.7, b = 7.3, c = 6.6, d = -2, r = 0.1 and k = -9.5 are
used with the starting circumstances x; y; z and w. We calculate the starting conditions in
section III-A. Given in (3), the logistic map is also related to the encryption procedure:
(3.13)
When variables x(i) and y(i) are limited and coefficients c1, c2, c3, and c4 lie between
certain ranges, the Logistic map displays chaotic behaviour. With the help of these
24
coefficients and beginning values, pseudo-random sequences—which are essential for
both picture encryption and decryption—are produced with an accuracy of 10^-15 for
every step.
The following stages are involved in the encryption process:
1. Hash Synthesis and Chaos Picture Production: SHA-512 is used to create a hash, and
the Logistic map is used to generate key ko in order to build a chaotic image (Ic). The
size of Ic and the simple image (Ip) are same. SHA-512 hashing Ic results in k1. Another
key, kI, is created by concatenating keys ko and k1 and running them through SHA-512.
This key is utilised to find the seeds and starting conditions.
2. Construction of RGB S-boxes: Equation (1) is the basis for the creation of RGB S-
boxes.
3. Sub-block Decomposition: n sub-blocks are formed from the breakdown of Ip and Ic.
4. Encryption: To create the first-stage encrypted picture, sub-blocks go through
dynamical DNA encoded DNA processes, DNA decoding, and reshaping. The values of
the Logistic map dictate the DNA encoding and processing.
5. Final Substitution: To create the final encrypted colour picture, RGB S-boxes are used
to replace the first stage encrypted image.
1. Take the plain image (IP) and hash it with SHA-512 to generate the original
key ko.
(3.14)
2. Set r1= D 3.99. Initial parameter x1 of the (3) can be computed as:
25
(3.15)
where sum (R,G) is the sum of pixel values of red and green channel, pmaxis
the maximum pixel value and size(I p) is the size of plain image.
3. Generate the fake image ( Ic) by using (3). The size of ( Ic) is kept equal to the
size of ( I p) . By hashing ( Ic) with SHA-512 we get k1.
(3.16)
4. Now combine the koand k1and hash it with SHA-512 again to get initial key
(k1).
(3.17)
5. Next, derive the initial parameters for Equation (2) [57] using Equation (7).
Begin by dividing the 512 bits of kI into 64 blocks (b0, b1 ... b63), each
consisting of 8 bits. Then, further divide these blocks into 16 groups (g0, g1 ...
g15), with each group containing 4 blocks. For instance, g0 = {b0, b1, b2,
b3}, g1 = {b4, b5, b6, b7} ... g15 = {b60, b61, b62, b63}. Calculate 16
random seeds from these 16 groups. For example, seed 1 (s1) can be
calculated as
(3.18)
Here, PC represents the 128-bit passcode obtained from true random noise or
entered by the user. The remaining seeds s2, s3 ... s16 can be calculated using
the same passcode. These seeds are used to generate the initial parameters x1,
y1, z1, and w1 for the 4D hyperchaotic system (2). The initial parameters are
computed as follows: x1 = s1 + s2 + s3 + s4, y1 = s5 + s6 + s7 + s8, z1 = s9 +
s10 + s11 + s12, and w1 = s13 + s14 + s15 + s16.
26
1. In this step three S-boxes (Red, Green and Blue)are generated. Following are the
steps of S-box generation: Set S-box (K)=k; k ∈[0-255]. Here, S-box,denotes the
substitution box.(2) is iterated 300 times by using the initialconditions computed
with a =21.7, b =7.3,c =6.6, d =-2, r =0.1 and k =-9.5 to obtain fourdouble
300 300 300
precision sequences i.e., 𝑋𝑋 = �𝑥𝑥𝑗𝑗 �𝑗𝑗=1, 𝑌𝑌 = �𝑦𝑦𝑗𝑗 �𝑗𝑗=1, 𝑍𝑍 = �𝑧𝑧𝑗𝑗 �𝑗𝑗=1 𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎 =
300
�𝑤𝑤𝑗𝑗 �𝑗𝑗=1.
(3.19)
where, g represents gain factor. The gain factor g ∈ {1014; 1015; 1016} is used
to get best randomness performance.
i = 256 , j = 0
while i≥ 2
j=j+1
if mod(tss , i)≠ 0
swap (s – box (i) , s – box (mod (tssj , i )))
i = i -1
end
end
Above mentioned pseudo-code is repeated by using differentinitial conditions of (2) to
generate 3 s-boxes (red, green, and blue) each of size 16 *16. Refer to (8), input the
different 128-bit PC for modifying the initial conditions.
27
1. Divide Ip and Ic into n sub-blocks, each with a size divisible by n to ensure the
total number of pixels in all sub-blocks matches the total number of pixels in Ip or
Ic.
2. Convert all sub-blocks of Ip and Ic into DNA sequences based on Table 1. Use a
Logistic map to transform a random sequence into integers from 1 to 8, which are
then used to select DNA mapping rules for encoding.
3. Apply DNA operations on the sub-blocks of Ip and Ic, selecting operations based
on the Logistic map.
4. Decode DNA sequences using the same rules as in encoding.
5. Reshape the decoded sub-blocks to obtain the stage 1 encrypted image (Ie1).
C. S-BOX IMPLEMENTATION
1. Decompose the stage 1 encrypted image Ie1 into its red, green, and blue channels.
2. Perform S-box substitution as follows: Select a pixel value from each channel,
convert it to binary, and use the first 7 bits as the row number. Left shift the pixel
value by 2 bits and use the first 7 bits of the result as the column number.
Substitute the pixel value in the S-box using the generated row and column
numbers. Repeat this process for each channel to obtain the encrypted Red (eR),
Green (eG), and Blue (eB) channels.
3. Combine the encrypted Red, Green, and Blue channels (eR, eG, eB) to obtain the
final encrypted image (Ie). The proposed S-box exhibits an average non-linearity
and strict avalanche criterion of 111.83 and 0.4978, respectively, which is
considered superior.
D. DECRYPTION PROCEDURE
In order to retrieve back the plain image the steps of SbDCE i.e., 3.2.1 C, B, A. are
executed from bottom to top in the reverse order.
28
12MB L3 cache, 4 cores), and Intel Iris Xe Graphics. Standard test images like Lena,
Peppers, Baboon, and Female are utilized in the simulations.
CHAPTER 4
EXPERIMENTAL RESULTS AND ANALYSIS
29
4. 1. PROPOSED RESULT AND ANALYSIS
The cypher picture's graphical representation shows the variation of pixel information,
that constitutes an essential way to ascertain if the method for encryption is capable of
withstanding an attempt of statistical evaluation. A threat utilising statistical evaluation is
one in which the attacker uses statistical evaluation to obtain the statistical features of
encrypted pictures. It is the statistics of unique information that enable the chosen
ciphertext attack. The three smoother histogram elements (R, G, and B) of the cypher
picture in Fig. 5 indicate that it’s unlikely for an intruder to decipher the data of the
encrypted picture. Consequently, this makes the cypher picture less vulnerable to
statistical attacks and more homogeneous. Three unique photos—"Lena," "Baboon," and
"Pepper"—were chosen by the paper to be encrypted. Figure 5 illustrates the
experimental findings. Taking into account the results, it is clear that each plain photo's
initial histogram is erratic prior to encryption, as well as the related histogram illustrating
the encrypted picture appears planar.
(a)
30
(b)
(c)
FIGURE 4.1.(a) RGB histograms for plain and Cipher picture Lena, (b) RGB histograms
for plain andcipher PictureBaboon, (c) RGB histograms for plain and cipher picture
Peppers.
4.1.2 PERFORMANCEANALYSIS
indicate that the data transfer rates for the proposed technique are 117.028 and 193.502
kilobytes per second (KB/s) correspondingly. The cost of the suggested approach on
picture arrays of size 512x512 is 149.304 KB/s. Given the complexity of the technique
presented in this study, together with other objective criteria such as computer setup, it is
very unlikely that the approach can consistently yield a significant improvement in image
security. The algorithm's speed demonstrates its ability to achieve an appropriate
equilibrium between safety and effectiveness.
31
4.1.3 KEY SPACESYNTHESIS
The term "key space" said to be a collection of valid and unique keys used in a certain
encryption system. The level of security provided by an encryption system is closely
correlated with the key space's size. An attacker attempting to forcibly unlock the data
with every possible combination of keys will find it more difficult to compromise a
monitored interaction with a larger value. The key space consists of all possible secret
key combinations. There are six initial settings and seven system parameters in the
concealed key of the picture encryption system. Since there are 10–15 details using a
dependable laptop, equation (14) represents the first key space.
𝑘𝑘𝑘𝑘𝑘𝑘𝑘𝑘𝑘𝑘𝑘𝑘𝑘𝑘𝑘𝑘 = ∏13 15
𝑡𝑡=1 10𝑡𝑡 (4.1)
The outcome of equation (14) is 10195, meaning it's substantially bigger than 2300. Its key
space is sufficient for picture encryption approach, and it is more effective than several
methods [19, 33, 34], namely 2160, 2256, and 1070. Hence, the recommended approach's
key space is sufficient to repel a thorough attack.
Each of the pixels in a picture have a significant connection, and this relationship causes
a picture to be simpler to break. More precisely, when adjacent pixels are correlated, it
means that there is a connection. It should be imperative that the encrypted picture
disrupt the relationship between neighbouring pixels in the original picture. Although it's
not usually possible, in an ideal scenario there would be zero correlation within the
encrypted image.
Random selections were made among 10,000 pairs of adjacent pixels for this purpose. We
picked all 3 orientations and acquired encrypted photos. The mathematical equation is
used to compute the coefficient of correlation in the following manner:
1
𝑐𝑐𝑐𝑐𝑐𝑐(𝑥𝑥, 𝑦𝑦) = 𝑁𝑁 ∑𝑁𝑁
𝑖𝑖=1(𝑥𝑥𝑖𝑖 − 𝐸𝐸(𝑥𝑥))(𝑦𝑦𝑖𝑖 − 𝐸𝐸(𝑦𝑦)) (4.2)
𝑐𝑐𝑐𝑐𝑐𝑐(𝑋𝑋,𝑌𝑌) 𝐸𝐸[(𝑋𝑋−𝛽𝛽𝛽𝛽)(𝑌𝑌−𝛽𝛽𝛽𝛽)]
𝜌𝜌𝜌𝜌, 𝑌𝑌 = 𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐(𝑋𝑋, 𝑌𝑌) = 𝜃𝜃𝜃𝜃𝜃𝜃𝜃𝜃
= 𝜃𝜃𝜃𝜃𝜃𝜃𝜃𝜃
(4.3)
32
1
𝐸𝐸(𝑥𝑥) = 𝑁𝑁 ∑𝑁𝑁
𝑖𝑖=1 𝑥𝑥𝑖𝑖 (4.4)
1
𝐷𝐷(𝑥𝑥) = 𝑁𝑁 ∑𝑁𝑁
𝑖𝑖=1(𝑥𝑥𝑖𝑖 − 𝐸𝐸(𝑥𝑥))
2
(4.5)
1
𝑐𝑐𝑐𝑐𝑐𝑐(𝑥𝑥, 𝑦𝑦) = 𝑁𝑁 ∑𝑁𝑁
𝑖𝑖=1(𝑥𝑥𝑖𝑖 − 𝐸𝐸(𝑥𝑥))(𝑦𝑦𝑖𝑖 − 𝐸𝐸(𝑦𝑦)) (4.6)
Fig. 6 demonstrate the relationship in the plain photo pattern & the encrypted photo
pattern. The correlation coefficient values between the two adjacent pixels are shown in
Table 3. indicating that there is almost no association between the pixels that are adjacent
to one another.
(a)
33
(b)
(c)
FIGURE 4.2.(a) Correlation graph for Plain and Cipher Lena, (b) Correlational graph for
Plain and Cipher Baboon, (c) Correlation graph for Plain and Cipher Pepper
34
TABLE 4.1 Secured Images Correlation Index
The correlation scores between different encryption techniques for "Lena" photographs
are displayed in Table 4. Prior to applying encryption, the pixel correlation of every
image is readily apparent, as Table 3 shows in Fig. 4. However, after encryption is
applied, the result is almost equal to 0. This illustrates that our method of encryption
drastically breaks the link between pixels. Table4. shows that the values obtained with
our method have a higher median than the values produced from [18, 35, 36],
demonstrating that our strategy is more reliable. Particularly at horizontal green portion
as well as diagonal red part, the suggested technique possesses the greatest effectiveness
in upsetting the pixel correlation. As a result, the outcome suggests the low similarity in
the next-to pixels in the cypher picture across the horizontal plane.
35
Positions Primary [18] [19] [35] [36] Our
Color Result
Horizontal Red 0.0063 0.0007 0.0060 -0.0052 -0.0015
Green 0.0110 -0.0035 0.0060 -0.0052 -0.0011
Blue 0.0104 0.0015 0.0060 -0.0052 -0.0054
Vertical Red 0.0004 -0.0004 -0.0209 0.0086 0.0011
Green -0.0064 0.0023 -0.0209 0.0086 -0.0095
Blue 0.003 0.0028 -0.0209 0.0086 0.0063
Diagonal Red -0.0020 0.0039 0.0055 -0.0020 -0.0018
Green 0.0166 -0.0079 0.0055 -0.0020 -0.0047
Blue 0.0049 0.0010 0.0055 -0.0020 -0.0045
2 −1 𝑁𝑁
𝐻𝐻(𝑚𝑚) = − ∑𝑖𝑖=0 𝑝𝑝(𝑚𝑚𝑖𝑖 log 2 (𝑝𝑝(𝑚𝑚𝑖𝑖 ))) (4.7)
The entropy of simple pictures is provided in Table 5. Table 6 shows Encrypted Lena
Entropy Comparison with various Methods.
36
RedChannel 7.994 7.999 7.993 7.994 7.994
Naturally, via calculation of data entropy, the mean value for the data entropy readings of
these 6 picked RGB photos is extremely near to the perfect 8. Thus, the suggested
technique is resistant towards the entropy exploit. The value of the final cypher picture,
as shown in Table 5, is 7.999, meaning it's greater than [23, 35, 36].
Modifications made to the input image are immediately reflected in the cipher picture,
making the plain and cipher versions of the picture clearly correlated. This sensitivity
guarantees that harm in the plaintext result in observable variations in the ciphertext,
making differential attacks ineffective. The differentiation of a 1-pixel shift on the
encrypted picture is evaluated using two widely-used metrics: the Number of Pixel
Change Rate (NPCR) & Unified Average Change in Intensity (UACI). These values help
37
to quantify the degree to which encryption algorithms distribute changes throughout the
ciphertext, thereby strengthening their defenses against attacks.
Figure4.3. Shear attacks were conducted on the encrypted image, cutting 15%, 25%, and
50% of the image, as well as on the original image for comparison.
38
The encryption algorithm's ability to withstand noise attacks is vital. Salt and Pepper
noise of different intensities was introduced to the encrypted image, which was
subsequently decrypted to reconstruct the original image. The results, depicted in Fig. 8,
indicate that the proposed encryption algorithm successfully withstands noise attacks, as
the original image can be largely recovered from the decrypted cipher image.
Figure 4.4. Noisy attack analysis: Decrypted images for noise densities of 0.1, 0.2, and
0.3 added to the original Lena image are displayed from left to right in (a), (b), and (c).
Likewise, (d), (e), and (f) show decrypted images after adding noise densities of 0.1, 0.2,
and 0.3 to the original White image.
Encryption was applied to four color images, rendering them visually unrecognizable to
the human visual system. Table 4 displays the Peak Signal-to-Noise Ratios (PSNRs) for
decrypted images, showing no discernible differences between the decrypted and original
images when no noise is present. The PSNR between the original plain image (M x N)
and the encrypted image (M x N) [64] can be calculated as follows.
𝑀𝑀𝑀𝑀𝑀𝑀 2
𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃 = 10 log10 �𝑀𝑀𝑀𝑀𝑀𝑀(𝐼𝐼𝑃𝑃 ,𝐼𝐼𝐷𝐷)� (4.8)
39
Here, m and n stand for the width and height of a colour picture, and MAX is the highest
intensity value that a pixel in the plain colour image IP may have. The decrypted picture
with noise is called Id, and the mean squared error is represented by MSE.
With an acceptable bit count of 2100, SbDCE has a large keyspace that is resistant to
brute force assaults. The starting inputs of the four-dimensional hyperchaotic system, x1,
y1, z1, and w1, coefficient r1, and the starting state x1, all with floating-point accuracy of
10^-15, make up the hidden keys for SbDCE-SbDCD. To further prevent brute force
assaults, a 128-bit passcode is also used, yielding an overall keyspace of (10^15)^6 =
10^90 ≈ 2^300.2128 = 2^428, effectively.
The histogram of the cipher image provides insight into the distribution of pixel values,
crucial for assessing an encryption algorithm's resilience against statistical analysis
attacks. These attacks involve attackers analyzing encrypted images statistically to
perform selective ciphertext attacks. Comparing the histograms of the R, G, and B
components of the cipher images before and after encryption reveals a smoother
distribution after encryption. This indicates that the encrypted image's characteristics are
harder for attackers to discern, resulting in greater uniformity and resistance to statistical
attacks. Three images, "Lena," "White," and "Pepper," were chosen for encryption. The
results show that the histograms of the original images are uneven before encryption,
whereas those of the encrypted images become more uniform.
40
41
Figure 4.5. Histograms are displayed for the three primary colors of the original Lena
image (a, b, c) and its encrypted counterpart (d, e, f), as well as for the original White
image (j, h, k) and its encrypted version (g, k, l). The histograms for the original Pepper
image (m, n, o) and its encrypted form (p, q, r) are also shown.
(4.9)
where x and y are rgb-scale values of two adjacent pixels in the image. The following
(4.10)
Figure 4.6 shows the correlation distributions of the plain and encrypted images, with
Table 5 presenting the correlation coefficient values between adjacent pixels, indicating
42
nearly zero correlation. Table 6 displays the correlation values of "Lena" images
encrypted using different algorithms.
43
4.2.5. ENCRYPTION QUALITY ANALYSIS
(4.11)
44
CHAPTER 5
CONCLUSION AND FUTURE WORK
In the past few years, several picture encryption techniques utilizing chaos systems have
been presented. Simultaneously, the pseudo-DNA innovation has been advancing rapidly
in the field of cryptosystems. However, the bulk of these models depend upon low-
dimensional chaos system, that fails to meet the needs in unpredictability and resilience.
The research proposes a digital colour picture encryption technique that utilizes a six-
dimensional hyper-chaos system with encoded DNA technique to tackle this issue. The
six-dimensional hyper chaos system demonstrates hyper chaos solution characterized by
4 positive Lyapunov coefficients throughout a broad range of values for k. This
encryption technique is achieved by means of DNA-level permutation and pixel-level
diffusion. By applying permutations at both the pixel level along with DNA level, the
original picture's location is scattered. Additionally, through a process known as
diffusion, the connection between the initial picture and the encrypted version becomes
extremely faint. This study conducts a variety of tests to evaluate the encryption method,
including analysing the size and complexity of the key space, assessing the uniformity of
key distribution, measuring the randomness of encrypted data, examining frequency
distributions, checking for correlations between input and output, testing encryption
quality and evaluating overall performance. The experimental outcomes reveal that the
proposed method for encrypting coloured images demonstrates strong performance.
Additionally, chaotic systems exhibit impressive capabilities in analysing bifurcation and
assessing stability. In essence, the six-dimensional hyper chaos proves to be well-suited
for integration into cryptographic systems.
This study introduces a novel approach to encrypting digital colour images, leveraging a
six-dimensional hyper-chaos system alongside DNA encoding. While the proposed
encryption system finds applicability across diverse domains, there remains scope for
enhancing the efficiency of the six-dimensional hyper-chaotic algorithm within
cryptographic contexts. Due to limitations in hardware resources and MATLAB
45
efficiency, the encryption process currently lacks optimization for speed. Current efforts
are focused on improving the algorithm's speed and intricacy.
Future research will prioritize the development of efficient techniques to counter attacks
from supercomputers and quantum computers, as well as optimizing algorithmic
performance.
Of course! Let's delve deeper into the key components and implications of your research
on digital image encryption using a six-dimensional hyper-chaos system and DNA
encoding.
Traditional chaos systems have been used in encryption for their sensitivity to initial
conditions, making them unpredictable. However, your research introduces a more
complex six-dimensional hyper-chaos system. This system offers even greater
unpredictability due to its higher dimensionality and hyper-chaotic behavior,
characterized by multiple positive Lyapunov coefficients. This complexity makes it
particularly suitable for cryptographic applications, where robustness against attacks is
essential.
Diffusion is vital in spreading the influence of each pixel across the entire image, greatly
reducing the discernible relationship between the original and encrypted images. This
mixing process effectively eliminates any localized changes or patterns in the original
image, thereby enhancing the security and resilience of the encryption scheme.
46
output correlations, testing encryption quality, and overall performance evaluation. This
rigorous evaluation ensures that the proposed encryption method meets the required
security standards and performs effectively across various scenarios.
While the proposed encryption technique demonstrates strong performance, there is room
for optimization, particularly in terms of speed and efficiency. Optimizing the algorithm's
performance would enhance its practical applicability in real-world scenarios.
Additionally, future research will focus on developing efficient techniques to counter
potential attacks from supercomputers and quantum computers, ensuring the continued
security of encrypted data in the face of evolving computational capabilities.
By combining advanced chaos theory, DNA encoding, and rigorous evaluation, our
research contributes significantly to the advancement of digital image encryption
techniques, addressing the growing need for robust security measures in an increasingly
digital world.
The image encryption system presented in this paper has wide applicability but requires
enhancements in the performance of the 6D hyper-chaotic system to improve
cryptographic operations. The current encryption speed is suboptimal due to hardware
limitations and MATLAB performance constraints. Our current focus is on enhancing the
algorithm's speed and complexity. Future efforts will include optimizing the algorithm to
improve its overall performance and researching effective methods to defend against
attacks from supercomputers or quantum computers. Acknowledging the need for further
improvement demonstrates our commitment to enhancing the encryption technique's
effectiveness and efficiency.
Optimizing the algorithm to improve its performance is a crucial step in ensuring its
practical applicability. By enhancing the efficiency of the algorithm, you'll not only make
the encryption process faster but also increase its overall effectiveness in securing digital
data.
Furthermore, your focus on researching effective methods to resist potential attacks from
supercomputers or quantum computers reflects a forward-looking approach to
cybersecurity. As these computational capabilities continue to advance, it's essential to
47
stay ahead in terms of encryption techniques and countermeasures to safeguard against
emerging threats.
48
REFERENCES
1. Pareek, Narendra & Patidar, Vinod & Sud, K.K.. (2006). Image encryption using
chaotic logistic map. Image and Vision Computing. 24. 926-934.
10.1016/j.imavis.2006.02.021.
2. Chen, Guanrong& Mao, Ybin& Chui, Charles. (2004). A symmetric image
encryption based on 3D chaotic cat maps. Chaos, Solitons & Fractals. 21. 749-
761. 10.1016/j.chaos.2003.12.022.
3. Furht, B., &Kirovski, D. (Eds.). (2004). Multimedia Security Handbook (1st ed.).
CRC Press. https://doi.org/10.1201/9781420038262
4. Digital image steganography: Survey and analysis of current methods, Signal
Processing, Volume 90, Issue 3, 2010, Pages 727-752, ISSN 0165-1684,
https://doi.org/10.1016/j.sigpro.2009.08.010.
5. HUSSAIN, U. Noorul; CHITHRALEKHA, T. Review of DNA Cryptology.
Networking and Communication Engineering, [S.l.], v. 3, n. 13, p. 843-849, Oct.
2011. ISSN 0974 – 9616
6. Henry Ker-Chang Chang, Jiang-Long Liu,A linear quadtree compression scheme
for image encryption,Signal Processing: ImageCommunication,Volume 10, Issue
4, 1997, Pages 279-290, ISSN 0923-5965,https://doi.org/10.1016/S0923-
5965(96)00025-2.
7. Chen, Guanrong& Ueta, Tetsushi. (1999). Yet Another Chaotic Attractor.
International Journal of Bifurcation and Chaos - IJBC. 9. 1465-1466.
10.1142/S0218127499001024.
8. Bourbakis, Nikolaos G. and Christos Alexopoulos. “Picture data encryption using
scan patterns.” Pattern Recognit. 25 (1992): 567-581.
9. Subbiah, Geetha &Punithavathi, P &Infanteena, A & Sindhu, Sivatha. (2018). A
Literature Review on Image Encryption Techniques. International Journal of
Information Security and Privacy. 12. 42-83. 10.4018/IJISP.2018070104.
10. Mao, Y., Chen, G. (2005). Chaos-Based Image Encryption. In: Handbook of
Geometric Computing. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-
540-28247-5_8
11. Habutsu, Toshiki & Nishio, Yoshifumi & Sasase, I. & Mori, Shinsaku. (1991). A
Secret Key Cryptosystem by Iterating a Chaotic Map. LNCS. 547. 127-140.
10.1007/3-540-46416-6_11.
12. Hua, Zhongyun& Jin, Fan & Xu, Binxuan& Huang, Hejiao. (2018). 2D Logistic-
Sine-Coupling Map for Image Encryption. Signal Processing. 149.
10.1016/j.sigpro.2018.03.010.
13. Murillo-Escobar MA, Meranza-Castillón MO, López-Gutiérrez RM, Cruz-
Hernández C. Suggested Integral Analysis for Chaos-Based Image
Cryptosystems. Entropy. 2019; 21(8):815. https://doi.org/10.3390/e21080815
14. Babaei, Majid. (2013). A novel text and image encryption method based on chaos
theory and DNA computing. Natural Computing. 12. 10.1007/s11047-012-9334-
9.
15. Jain, Anchal & Rajpal, Navin. (2015). A robust image encryption algorithm
resistant to attacks using DNA and chaotic logistic maps. Multimedia Tools and
49
Applications. 29. 10.1007/s11042-015-2515-7.
16. Zhang, Qiang & Liu, Lili & Wei, Xiaopeng. (2014). Improved algorithm for
image encryption based on DNA encoding and multi-chaotic maps. AEU -
International Journal of Electronics and Communications. 68. 186–192.
10.1016/j.aeue.2013.08.007.
17. Diaconu, Adrian-Viorel & Costea, Alexandru & Costea, Marius Aurel. (2014).
Color Image Scrambling Technique Based on Transposition of Pixels between
RGB Channels Using Knight’s Moving Rules and Digital Chaotic Map.
Mathematical Problems in Engineering. 2014. 10.1155/2014/932875.
18. Gao, Xiaohong. (2021). A color image encryption algorithm based on an
improved Hénon map. Physica Scripta. 96. 10.1088/1402-4896/abed7d.
19. Zhang, Wei & Yu, Hai & Zhao, Yu-li & Zhu, Zhi-liang. (2016). Image encryption
based on three-dimensional bit matrix permutation. Signal Processing. 118.
10.1016/j.sigpro.2015.06.008.
20. Li, Xiao & Cho, Sung & Kim, Seok. (2014). A 3D image encryption technique
using computer-generated integral imaging and cellular automata transform.
Optik - International Journal for Light and Electron Optics. 125.
10.1016/j.ijleo.2013.12.036.
21. Zhu Z-L, Zhang W, Wong K-w, Yu H (2011) A chaos-based symmetric image
encryption scheme usinga bit-level permutation. Inf Sci 181(6):1171–1186
22. Liu, Hongjun& Wang, Xingyuan. (2011). Color image encryption using spatial
bit-level permutation and high-dimension chaotic system. Optics
Communications. 284. 3895-3903. 10.1016/j.optcom.2011.04.001.
23. Pyle I (1967) Format effectors in iso7 and ascii. Commun ACM 10(3):137
24. Xian, Yongjin& Wang, Xingyuan& Wang, Xiaoyu & Li, Qi & Ma, Bin. (2022).
A Chaotic Image Encryption Algorithm Based on Sub-block Spiral Scans and
Matrix Multiplication. 10.1007/978-3-031-06791-4_25.
25. Gao, Xinyu & Mou, Jun & Xiong, Li & Sha, Yuwen & Yan, Huizhen & Cao,
Yinghong. (2022). A fast and efficient multiple images encryption based on
single-channel encryption and chaotic system. Nonlinear Dynamics. 108.
10.1007/s11071-021-07192-7.
26. Lorenz, E. N., 1963: Deterministic Nonperiodic Flow. J. Atmos. Sci., 20, 130–
141, https://doi.org/10.1175/1520-0469(1963)020<0130:DNF>2.0.CO;2.
27. Hu, Guosi. (2009). GENERATING HYPERCHAOTIC ATTRACTORS WITH
THREE POSITIVE LYAPUNOV EXPONENTS VIA STATE FEEDBACK
CONTROL. International Journal of Bifurcation and Chaos. 19. 651-660.
28. Yang, Qigui& Osman, Waleed & Chen, Chuntao. (2015). A New 6D
Hyperchaotic System with Four Positive Lyapunov Exponents Coined.
International Journal of Bifurcation and Chaos. 25. 1550060.
10.1142/S0218127415500601.
29. Shalon D, Smith SJ, Brown PO. A DNA microarray system for analyzing
complex DNA samples using two-color fluorescent probe hybridization. Genome
Res. 1996 Jul;6(7):639-45. doi: 10.1101/gr.6.7.639. PMID: 8796352.
30. A.K. Verma, M. Dave, and R.C. Joshi, Journal of Discrete Mathematical Sciences
and Cryptography 11, 393 (2008).
31. Wu, Y., Agaian, S. S., & Noo0.000, J. P. (2012). Sudoku associated two
50
dimensional bijections for image scrambling. arXiv preprint arXiv:1207.5856.
32. Seyedzadeh, Seyed Mohammad &Mirzakuchaki, Sattar. (2012). A fast color
image encryption algorithm based on coupled two-dimensional piecewise chaotic
map. Signal Processing. 92. 1202-1215. 10.1016/j.sigpro.2011.11.004.
33. Liang Z, Qin Q, Zhou C, Wang N, Xu Y, Zhou W. Medical image encryption
algorithm based on a new five-dimensional three-leaf chaotic system and genetic
operation. PLoS One. 2021 Nov 29;16(11):e0260014. doi:
10.1371/journal.pone.0260014. PMID: 34843485; PMCID: PMC8629275.
34. Shakiba, Ali. (2019). A Randomized CPA-Secure Asymmetric-Key Chaotic
Color Image Encryption Scheme based on the Chebyshev Mappings and One-
Time Pad. Journal of King Saud University - Computer and Information Sciences.
33. 10.1016/j.jksuci.2019.03.003.
35. Iqbal, Nadeem & Hanif, Muhammad & Abbas, Sagheer & Khan, Muhammad &
Rehman, Zia. (2021). Dynamic 3D scrambled image based RGB image
encryption scheme using hyperchaotic system and DNA encoding. Journal of
Information Security and Applications. 58. 102809. 10.1016/j.jisa.2021.102809.
51
PUBLICATION DETAILS
52
53
INDIVIDUAL CV
54
PLAGIARISM REPORT
55