Image Encryption using DNA Coding and Hyperchaotic System
Image Encryption using DNA Coding and Hyperchaotic System
To cite this article: M. Kar, A. Kumar, D. Nandi & M. K. Mandal (2020) Image Encryption
using DNA Coding and Hyperchaotic System, IETE Technical Review, 37:1, 12-23, DOI:
10.1080/02564602.2018.1544855
ABSTRACT KEYWORDS
The paper proposes a grey scale image encryption scheme using six-dimensional Lorenz chaotic Lorenz system; Chaos;
system. The key generating system uses a 32 character (256 bits) key as input. The system uses Encryption; Decryption; DNA
simple modular arithmetic and bitwise XOR operations followed by coupling a series of Lorenz coding; Information entropy;
six-dimensional systems to generate the key-stream. This generated key stream is used in the NPCR; UACI
encryption and decryption algorithm of the plain image. The basic permutation and diffusion
architecture, using the fundamental properties of modular arithmetic, bitwise XOR operations and
DNA encoding/decoding technique, are executed to confuse the relationship between plain image
and the ciphered image. The experimental results and security tests confirm that the proposed
image encryption algorithm possess high security and can be a good candidate for practical image
encryption.
© 2020 IETE
M. KAR ET AL.: IMAGE ENCRYPTION USING DNA CODING AND HYPERCHAOTIC SYSTEM 13
introduced in reference [4]. It proposes an image encryp- information entropy of the cryptosystem. A spatiotem-
tion algorithm in which the key stream is dependent poral chaos based on coupled map lattice is used in ref.
on the input plain image. Further, the state variables of [12] to generate chaotic sequence and pixel confusion by
the Lorenz system are selected according to the pixel XOR operation. Then DNA encoding followed by posi-
values of the plain image. Reference [5] proposes an tion permutation is done. Then a specific rule based DNA
image encryption technique with orthogonal polyno- decoding is performed to generate the ciphered image.
mial transformation in the frequency domain and bit Other noteworthy algorithms are discussed in references
shuffling using tent map in the spatial domain. In ref- [13–17]. Some of the algorithms stated above do not give
erence [6] an image encryption algorithm employing good results in various security analysis or not technically
Latin rectangle scrambling using 2D chaotic Henon map sound in the view point of computational complexity and
and bi-directional pixel diffusion using piecewise linear execution time.
chaotic map is proposed. The algorithm claims to reach
high security in only two rounds. A novel double image Therefore, the aim of this paper is to propose a new
encryption technique using Blowfish algorithm and cross encryption system that can reduce the complexity of the
chaos map is presented in reference [7]. A dynamical encryption algorithm by considering only one hyper-
image encryption algorithm based on parameter vary- chaotic system for pixel confusion, permutation, DNA
ing logistic chaotic map is presented in reference [8]. encoding, complementing and decoding to achieve the
Reference [9] has presented a new block based image ciphered image with higher security. In this algorithm, a
encryption. It proposes to use cat map as well as logistic six-dimensional chaotic Lorenz system is used to design
map in encryption process. The input image dependent a cryptosystem having reduced complexity and execu-
key stream generated from these maps are used in the tion time compared to the reported work in the literature
diffusion process. The algorithm claims secured enough recently. A key matrix is generated by taking a 32 char-
in practical transmission and reception. A colour image acter secret key as input. The generated key matrix is
encryption algorithm using 4D Lorenz system is reported reshaped into a matrix with the same dimension of the
from our group in an international conference [10]. In input image. The pixel positions of the plain image are
this paper, the colour image is spleet into three R G B randomized using chaotic key matrix. After XOR opera-
channel and they are encrypted by the mechanism of tion between plain image and chaotic key, DNA encod-
pixel diffusion and confusion with the help of chaotic key ing, complement shifting and DNA decoding are applied
generated from 4D Lorenz system. Next pixel permuta- sequentially to execute the encryption process. The rest
tion is done among three colour components with the of the paper is organized as follows: Section 3 outlines
help of chaotic quadratic and cubic maps. In the above the 6D Lorenz chaotic system and its relevant character-
mentioned references, the encryption algorithms have istics. The basic rules for DNA encoding and decoding
involved two round operations and have used double or techniques are illustrated in Section 4 along with suit-
multiple chaotic systems for chaotic key generation. Since able examples. Section 5 presents the grey scale image
a two round encryption takes longer execution time in encryption and decryption algorithms. Section 6 presents
comparison to a single round encryption and the inclu- the experimental results and the security analysis of the
sion of double or multiple chaotic systems increases the proposed cryptosystem and the article is concluded in
system complexity, we need to develop a fast and highly section 7.
secured chaotic encryption system with relatively less
system complexity.
3. LORENZ CHAOTIC SYSTEM
Recently, chaos based DNA coding and DNA addition- The proposed image cryptosystem uses a hyperchaotic
subtraction arithmetic are being used in several image six-dimensional Lorenz system [18] as stated below:
encryption algorithms [11–15] to resist the known- ⎫
ẋ = a(y − x) + u ⎪
⎪
ẏ = cx − xz − y + v ⎪
plaintext, brute force, differential and chosen-plaintext ⎪
⎪
⎪
attacks. In reference [11] an image encryption algorithm ⎬
ż = −bz + xy
utilizing chaotic systems, DNA encoding is presented. In (1)
u̇ = du − xz ⎪
⎪
this algorithm, the logistic system is iterated to produce ⎪
⎪
v̇ = −ky ⎪
⎪
the DNA matrix and set of encoding/decoding rules is ⎭
ẇ = hw + ly
framed. DNA addition operation is performed using the
generated DNA matrix and the DNA encoded image. The where x, y, z, u, v, w are the state variables and a, b, c, d, k,
DNA encoded image diffusion is done through the itera- h and l are the parametes. In our algorithm we have taken
tions of the logistic system to increase the sensitivity and a = 10, b = 8/3, c = 28, d = 2, k = 8.4, h = 1 and l = 1
14 M. KAR ET AL.: IMAGE ENCRYPTION USING DNA CODING AND HYPERCHAOTIC SYSTEM
Figure 1: The projections of attractors of 6D Lorentz system. (a) In the x–y space, (b) In the x–z space, (c) In the z–y space.
as the parameter values. The projection of attractors is Table 1: DNA encoding and decoding rules.
shown in Figure 1. The 6D chaotic Lorenz system has Rule-1 Rule-2 Rule-3 Rule-4 Rule-5 Rule-6 Rule-7 Rule-8
been chosen to design the cryptosystem since it exhibits 00-A 00-A 00-T 00-T 00-C 00-C 00-G 00-G
the property of randomness with higher degree of unpre- 01-C 01-G 01-C 01-G 01-A 01-T 01-A 01-T
10-G 10-C 10-G 10-C 10-T 10-A 10-T 10-A
dictability. Its higher chaotic nature has made it better 11-T 11-T 11-A 11-A 11-G 11-G 11-C 11-C
suitable candidate for secure communication applica-
tions. The characteristic properties of this hyperchaotic
system are: (a) it is a six-dimensional autonomous sys- as listed in Table 1. For example, if the decimal value of
tem, (b) It has a simple algebraic structure with complex a pixel is 53, its 8-bit binary representation is 00110101,
dynamical behaviour, (c) The six Lyapunov exponents then it is encoded as a DNA sequence CGAA according to
of the system are, λ1 = −2.667, λ2 = −22.6858, λ3 = rule 5 in Table 1. Inversely, the pixel value can be decoded
0.3260, λ4 = 1, λ5 = 2 and λ6 = 11.3599. Since it has by DNA sequence, for example, DNA sequence TCTC is
four positive Lyapunov exponents and the sum of all the decoded as 10111011 by rule 7 and the corresponding
Lyapunov exponents are less than zero it can produce sta- decimal value is 187.
ble but unpredictable orbits which implies the generation
of chaos. This paper has developed a dynamic DNA coding pro-
cess in which the rules of Table 1 is selected according
to a chaotic matrix, say A. The elements of A are inte-
4. THE DNA ENCODING AND DECODING gers in the range 1–8. The pre-processed image may be
PROCESS represented by another matrix, say B where the elements
The Deoxyribonucleic acid (DNA) is a molecule that of B are integers in the range 1–255 for 8-bits binary rep-
contains the genetic information of all the living organ- resentation of each pixel. The dimension of A and B are
isms. The development and function of the organisms same (say 3 × 3, for an example). Thus, the dimension
depend on the structure of its DNA molecule. A DNA of the DNA encoded matrix (say C) will be 3 × 12, as
structure consists of four nucleic acid bases adenine (A), illustrated below by taking arbitrary values of A and B.
cytosine (C), guanine (G) and thymine (T). According ⎛ ⎞ ⎛ ⎞
to Watson-Crick base pairing rules [11,19], A and T are 3 7 5 78 157 246
complementary and G and C are complementary. In the A = ⎝4 1 8 ⎠ B = ⎝124 42 207 ⎠
binary representation 0 and 1 are complementary, simi- 5 6 2 19 127 213
larly, we can say 00 and 11 are complementary and also 01
⎛ ⎞
and 10 are complementary. By considering the comple- C T A G T A C A G G T C
mentary rule, we may use A, C, G and T to denote 00, 01, C = ⎝G A A T A G G G C G C C ⎠
10 and 11, respectively. This is an example of one possi- C A C G T G G G T G G G
ble representation and other representations are given in
Table 1. An image pixel value (8-bits binary number) may
5. THE PROPOSED CRYPTOSYSTEM
be represented by four binary numbers each consisting of
two bits. These numbers are mapped to their correspond- A grey scale image P(r × c) is taken as input where r and c
ing DNA sequence. Therefore, each pixel of the image is are the number of rows and columns, respectively. Con-
represented by four acid bases. The 8-bit pixel value can ventionally, P(i, j) represents the pixel value at position
be encoded in 24 possible ways using 4 bases but Watson- (i, j). The proposed cryptosystem is divided into the fol-
Crick base pairing rules support only 8 representations lowing major steps: (i) generation of initial conditions
M. KAR ET AL.: IMAGE ENCRYPTION USING DNA CODING AND HYPERCHAOTIC SYSTEM 15
of Lorenz system from 32 character secret input key, (ii) Here, t(x) denotes the element value of matrix t at posi-
Generation of chaotic key matrix R and reshaping the tion x, abs(x) returns the absolute value of the number x,
chaotic key matrix R to S (see step-2), (iii) DNA encoding k(t(x)) denotes the element value of matrix k at position
and decoding. The stepwise image encryption procedure t(x). The operator ⊕ indicates bitwise XOR operation.
is described below: After the completion of the loop we redefine p and q as
p = m0 + p0 and q = n0 + q0. We use the values of p
Step-1: A user defined function takes 32 characters secret and q to construct a one-dimensional matrix, C(1 × 6) =
p q
key and the dimension of the plain image as input and linspace 1000 , 1000 , 6 . Here, linspace(a, b, n) returns a
returns the chaotic key matrix and variables p and q. one-dimensional matrix of n linearly spaced elements
The substeps described below explain the working of the ranging from atob. Initially one dimensional matrix,
function. Initially, we set six variables as m0 = 127, n0 = S0(1 × 6) = [xyzuvw] = IC, defines the six initial con-
127, p0 = 127, q0 = 127, p = 0 and q = 0. the secret key ditions for the Lorenz 6D system.
is converted into a double precision matrix k(1 × 32)
containing the ASCII value of each character. A loop is Step-2: Solve equation (1) by using the initial condition
defined to run for eight times to generate the new val- S0 and differential equation solver ode45. The iterative
ues of the variables m0, n0, p0 and q0. Within the loop process has been executed (n + 100) times and the results
the following operations are done sequentially. A one- are stored in matrix R((n + 100) × 6); where n = r × c.
dimensional matrix t is constructed in which the element To obtain the steady state chaotic solution, we discard
value ranges from 1 to 32. the sequence of first 100 iterations from the matrix R.
The rest part of the R matrix is renamed as S(n × 6).
Loop j To restrict the elements of S in the range 0–255 we have
applied the following operation (2). The matrix S(n × 6)
Z = 9-j; is stated below in equation (3).
t = [(4 ∗ j − 3)(4 ∗ z)(4 ∗ j − 2)(4 ∗ z − 1)]; S = mod((round(abs(S ∗ 105 ))), 256). (2)
by putting them side by side according to equation (9). element of KB is zero then the corresponding element of
DP will remain unchanged but if the element of KB is one
Kr1 = mod(K3 , 64) (5) then the corresponding element of DP will be replaced by
its complement. Finally, the elements of DP are decoded
Kr2 = mod(K4 , 64) (6) according to chaotic sequence K6 to get back the decimal
values of the pixels of the encrypted image EP.
Kr3 = mod((K3 + K4 ), 64) (7)
The decryption process is the reverse process of encryp-
Kr3 = mod(abs(K3 − K4 ), 64) (8) tion. During decryption step-1 to step-3 of encryp-
tion process should be executed sequentially and step-
4 should be executed in reverse order to get back the
Kr = [Kr1 Kr2 Kr3 Kr4 ]. (9)
original plain image.
By using matrix Kr and equation (10) stated below, we get
an binary array KB of dimension (r × 4c). 6. EXPERIMENTAL RESULTS AND SECURITY
ANALYSIS
0, if Kr (i, j) ≥ 32
KB (i, j) = . (10)
0, if Kr (i, j) < 32 The 32 character secret key and different grey scale
plain images of size (r × c) are taken as inputs and
Here, i and j vary from 1 to r and 1 to 4c, respectively. their encryption is done. For example, the plain images
The elements of the remaining two chaotic sequences K5 like, Lena, Barbara, and Cameraman along with their
and K6 are converted into integers in the range 1–8 by the encrypted images, decrypted images with correct key
following Equations (11) and (12), respectively. ()+ < > (7790n,[]&ˆ%$% ∼ tqpd;3b.l@kx and slightly
different key (wrong key)()+ < > (7790n,[]&ˆ%$% ∼
K5 = mod(K5 , 8) + 1. (11)
tqpd;3b.l@ly are shown in Figure 2.
XP(1, 1) = P(1, 1) ⊕ K12 (1, 1) ⊕ Pm , (14) An inherent characteristic of a chaotic system is its high
sensitivity to initial conditions. A slight change in initial
condition may produce an entirely different sequence. In
XP(i, 1) = P(i, 1) ⊕ K12 (i, 1) ⊕ XP(i − 1, c), for i = 1 the present work, a novel use of 6D Lorenz system has
(15) been demonstrated. The 32 bit secret key goes through
a series of modular arithmetic and bitwise-XOR oper-
ations. Only one bit change in the input key produces
XP(i, j) = P(i, j) ⊕ K12 (i, j) ⊕ XP(i, j − 1), for j = 1 an entirely different chaotic sequence. The key space is
(16) 2256 which is sufficiently large to counter the brute force
attack.
In Equations (15) and (16), i and j vary from 1 to r and 1
to c, respectively. By applying DNA encoding rule given
6.2 Key Sensitivity Analysis
in Table 1, encode matrix XP(r, c) according to chaotic
sequence K5 to obtain DP of dimension (r × 4c) with To prove the validity of the proposed algorithm in terms
the DNA elements A, C, G and T. Next the elements of of key sensitivity, we encrypt a plain image of Lena using
DP are complemented according to the array KB . If the two slightly different keys as stated below:
M. KAR ET AL.: IMAGE ENCRYPTION USING DNA CODING AND HYPERCHAOTIC SYSTEM 17
Figure 4: Histogram plot of various plain images and their encrypted version. (a) Plain Lena, (b) Encrypted Lena, (c) Plain Cameraman,
(d) Encrypted Cameraman, (e) Plain Barbara, (f) Encrypted Barbara.
These results confirm that the encryption algorithm is Table 2: Correlation coefficients of various test images and
highly secure against histogram matching and analysis their encrypted counterparts.
based attack. Images Horizontal Vertical Diagonal
Plain Lena 0.9400 0.9693 0.9179
Encrypted Lena 0.0023 0.0013 –0.0067
Plain Cameraman 0.9335 0.9592 0.9087
6.4 Correlation Analysis Encrypted Cameraman 0.0069 0.0003 0.0052
Plain Barbara 0.9029 0.9400 0.8848
Another tool for measuring the security performance Encrypted Barbara 0.0031 0.0014 –0.0016
of a cryptosystem is correlation analysis. It is obvious
that the pixel correlation of plain image is high and this
analysis of correlation coefficients obtained from our pro-
value decreases sharply for encrypted images. To find out
posed method with other methods reported in the recent
pixel correlation, we take two adjacent pixels (in hori-
literature.
zontal, vertical and diagonal directions) from different
1
places of the plain and encrypted images randomly. Then N
the pixel correlations are measured in these three direc- Ex = xi , (17)
N i=1
tions. In this experiment, we have taken 3500 pairs of
adjacent pixels randomly in horizontal, vertical and diag-
1
N
onal directions from different positions of both the plain Dx = (xi − E(x))2 , (18)
and encrypted images. The computed values of the cor- N i=1
relation coefficient applying the formulas stated below
1
N
are given in Table 2. The corresponding scattered plots cov(x, y) = (xi − E(x))(yi − E(y)). (19)
are shown in Figure 5. Table 3 presents a comparative N i=1
M. KAR ET AL.: IMAGE ENCRYPTION USING DNA CODING AND HYPERCHAOTIC SYSTEM 19
Figure 5: Correlation among two adjacent pixels. (a) Plain Lena in horizontal direction, (b) Plain Lena in vertical direction, (c) Plain Lena
in diagonal direction, (d) Encrypted Lena in horizontal direction, (e) Encrypted Lena in vertical direction, (f) Encrypted Lena in diagonal
direction.
Table 4: Information entropy of plain and encrypted images. Table 6: NPCR and UACI values for one pixel difference in a
Images Plain image Encrypted image plain image.
Lena 7.5690 7.9975 Images Pixel positions Changed value of pixel NPCR UACI
Cameraman 7.0097 7.9974 Lena (1,1) 137 → 138 99.63 33.42
Barbara 7.3975 7.9972 (17, 243) 21 → 22 99.62 33.52
(100,200) 25 → 26 99.63 33.56
(130,11) 56 → 55 99.60 33.46
Table 5: Comparative studies of information entropy. (200,210) 73 → 74 99.63 33.39
(256,256) 72 → 73 99.66 33.24
Encryption algorithm Encrypted Lena Encrypted Cameraman
Mean value 99.63 33.43
Ref. [3] 7.989020 –
Ref. [9] 7.9970 7.9967 Cameraman (1,1) 156 → 157 99.60 33.34
Ref. [12] 7.9970 7.9972 (17, 243) 155 → 156 99.60 33.50
Ref. [14] 7.9895 – (100,200) 162 → 163 99.60 33.61
Ref. [20] 7.9974 – (130,11) 180 → 181 99.60 33.52
Ref. [21] 7.9826 7.9637 (200,210) 133 → 134 99.64 33.46
Proposed algorithm 7.9975 7.9974 (256,256) 113 → 114 99.56 33.47
Mean value 99.60 33.48
Barbara (1,1) 85 → 86 99.60 33.58
(17, 243) 10 → 11 99.60 33.41
6.6 Differential Attack Analysis (100,200) 120 → 121 99.60 33.38
(130,11) 184 → 185 99.61 33.50
The differential attack is a technique of finding the rela- (200,210) 27 → 28 99.57 33.45
tion between two encrypted images making a small vari- (256,256) 89 → 88 99.62 33.48
Mean value 99.60 33.47
ation in the plain image. For a good cryptosystem, a
small variation in input image should generate a totally
different encrypted image. Two metrics: Number of Pix- Table 7: Comparison of NPCR and UACI for encrypted Lena.
els Change Rate (NPCR) and Unified Average Changing Encryption algorithm NPCR UACI
Intensity (UACI) are used to analyse the strength of an Ref. [4] 99.61 33.46
Ref. [5] 99.62 27.38
encryption algorithm against differential attack. NPCR Ref. [8] 99.63 33.71
is defined as the percentage of the number of differ- Ref. [11] 99.60 33.44
Ref. [14] 99.65 33.34
ent pixels at the same positions between two encrypted Ref. [15] 99.62 33.06
images whose plane images are of only one pixel differ- Ref. [16] 99.62 33.51
ence. UACI indicates the average intensity of differences Ref. [17] 99.61 33.50
Ref. [20] 99.62 33.51
between two encrypted images with one pixel change in Ref. [21] 99.61 33.33
their plane images. Let us consider two encrypted images Proposed method 99.64 33.56
E1 and E2 and their corresponding plain images differ
only by one pixel. Let E1 (i, j) and E2 (i, j) are the pixel and UACI [22,23] for two true random images may be
values at location (i, j) of E1 and E2 , respectively. Now, expressed by the Equations of (25) and (26). For N = 8,
we construct a bipolar array D with elements 0 or 1 NPCRexpd = 99.609% and UACIexpd = 33.464%.
using equation (22). The dimension of D is same as the
dimensions of E1 and E2 . 1
NPCRexpd = 1 − N × 100% (25)
2
1, if E1 (i, j) = E2 (i, j)
D(i, j) = . (22)
0, Otherwise 2N −1
1 i=1 i(i + 1)
The NPCR and UACI are computed by applying the UACIexpd = × 100%. (26)
22N 2N −1
following formulas (23)–(24).
i,j D(i, j) 6.7 Randomness Test
NPCR = × 100%, (23)
r×c
The verification of randomness of a set of digital numbers
i,j |E1 (i, j) − E2 (i, j)|
1 is essential for demanding it as a chaotic sequence. The
UACI = × 100%. (24) National Institute of Standards and Technology (NIST)
r×c 2N − 1
Commission has released the random and pseudo-
NPCR and UACI metrics are computed on various plain random sequence test standard SP 800–22 on April 2010
images and the results are tabulated in Table 6. A com- [24]. This test standard consists of 16 different tests and
parative study of different recent encryption systems has each test will produce a p-value as the result. If the
been displayed in Table 7 based on the values of NPCR p-value ≥ α (In SP 800–22 test α = 0.01) then we can say
and UACI. The theoretically expected values of NPCR that the digital sequence passed the randomness test. A
M. KAR ET AL.: IMAGE ENCRYPTION USING DNA CODING AND HYPERCHAOTIC SYSTEM 21
Table 8: SP 800–22 random and pseudo-random sequence Table 9: Encryption time of various test images.
test. Test image Dimension Encryption time
Test name Chaotic key Cipher image Lena 256 × 256 0.1641 s
Cameraman 256 × 256 0.1745 s
p-Value Remarks p-Value Remarks
Barbara 256 × 256 0.1631 s
Frequency 0.3154 Success 0.3845 Success
Block frequency 0.5113 Success 0.4615 Success
(M = 128)
Runs 0.3523 Success 0.4529 Success 7. CONCLUSION
Longest runs of 0.7632 Success 0.2615 Success
one (M = 128,
N = 49, K = 5)
A novel image encryption algorithm using 6D hyper-
Rank 0.4224 Success 0.3745 Success chaotic Lorenz system and DNA encoding/decoding
Spectral DFT 0.4253 Success 0.7381 Success technique is presented in this paper. The proposed
Non overlapping 0.5527 Success 0.6642 Success
templates encryption system is fast and highly secured. The secu-
(m = 9, rity against different attacks is analysed. It is seen that
B = 101000111)
Overlapping 0.1637 Success 0.3427 Success the ciphered image is purely dependent on the plain
templates image pixel, previous ciphered pixel, chaotic key and
(M = 1032,
N = 508)
DNA encoding/decoding rule. A single bit change in
Universal (L = 6, 0.8932 Success 0.9115 Success the key or the plain image produces an entirely dif-
Q = 640, ferent encrypted image. The time taken for encryption
K = 86741)
Linear complexity 0.7328 Success 0.6917 Success is less than one second which is good enough. The
(M = 500) results obtained from different security tests are also very
Serial (m = 10) p-Value 1 0.8632 Success 0.8825 Success
p-Value 2 0.8315 Success 0.8937 Success good and detailed comparison with other algorithms
Approximate 0.6652 Success 0.7268 Success reported in the literature is also done. The proposed cryp-
entropy
(m = 10) tosystem can be implemented for practical encryption
Cumulative sums Forward 0.3526 Success 0.3647 Success applications.
Reverse 0.3862 Success 0.2973 Success
Random excursions 0.9581 Success 0.8385 Success
(x = 1)
Random excursions 0.7029 Success 0.6572 Success ACKNOWLEDGEMENTS
variant (x = 1) Authors are very thankful to the anonymous reviewers for their
valuable comments and suggestions. Authors also thank the
editor-in-chief for his smooth coordination.
chaotic sequence has good randomness if it passes all the
tests. Table 8 shows the results of SP 800–22 test for the DISCLOSURE STATEMENT
chaotic key and the encrypted image. The total number of
No potential conflict of interest was reported by the
bits of this system are 524288 by considering a 256 × 256 authors.
image in grey scale representation.
REFERENCES
6.8 Speed Analysis 1. L. Hong, B. Ming, and H. Hui, “New image encryption
algorithm based on logistic map and hyper-chaos,” in Pro-
The encryption time is also considered as a perfor-
ceedings of the IEEE International Conference on Com-
mance parameter of a cryptosystem. The cryptosystem putational and Information Sciences, Shiyang China, 2013,
should be as quick as possible in encrypting and decrypt- pp. 713–16.
ing images. Our cryptosystem basically consists of XOR
operations, modular operations and arithmetic opera- 2. L. Min, K. Hu, L. Zhang, and Y. Zhang, “Study on pseudo
tions like multiplication, addition, subtraction to reduce randomness of some pseudorandom number generators
with application,” in Proceedings of the IEEE International
the execution time as far as possible. The algorithm has Conference on Computational Intelligence and Security,
been tested and designed in MATLAB R2009a running Emeishan China, 2013, pp. 569–74.
on an Intel(R) Core(TM) i3–5010U CPU @ 2.10GHz,
4GB memory with Windows 10 Home Single Language 3. Z. Lin, and H. Wang, “Efficient image encryption using a
64-bit operating system. Table 9 lists the encryption times chaos-based PWL memristor,” IETE Tech. Rev., Vol. 27, no.
4, pp. 318–25, Aug. 2010.
taken by our cryptosystem tested on various plain images.
The encryption algorithm is run 10 times for each image 4. C. Fu, W. Li, Z. Meng, T. Wang, and P. Li, “A Symmetric
and the mean execution time is calculated and given in Image Encryption Scheme Using Chaotic Baker map and
Table 9. Lorenz System,” in Proceedings of the IEEE International
22 M. KAR ET AL.: IMAGE ENCRYPTION USING DNA CODING AND HYPERCHAOTIC SYSTEM
Conference on Computational Intelligence and Security, 14. X. L. Huang, and G. D. Ye, “An image encryption algorithm
Emeishan China, 2013, pp. 724–8. based on hyper-chaos and DNA sequence,” Multimed.
Tools. Appl., Vol. 72, no. 1, pp. 57–70, Sep. 2014.
5. R. Krishnamoorthi, and P. Murali, “Chaos based image
encryption with orthogonal polynomials model and bit 15. J. Anchal, and R. Navin, “A robust image encryption
shuffling,” in Proceedings of the IEEE International Con- algorithm resistant to attacks using DNA and chaotic logis-
ference on Signal Processing and Integrated Networks, tic maps,” Multimed. Tools. Appl., Vol. 75, no. 10, pp.
Noida India, 2014, pp. 107–12. 5455–72, May 2016.
6. S. Chapaneri, and R. Chapaneri, “Chaos based image 16. J. Chen, Z. Zhu, C. Fu, H. Yu, and L. Zhang, “An efficient
encryption using Latin rectangle scrambling,” in Proceed- image encryption scheme using gray code based permuta-
ings of the Annual IEEE India Conference (INDICON), tion approach,” Opt. Lasers Eng., Vol. 67, pp. 191–204, Apr.
Pune India, 2014, pp. 1–6. 2015.
7. S. Bora, P. Sen, and C. Pradhan, “Novel color image encryp- 17. W. Zhang, H. Yu, Y. Zhao, and Z. Zhu, “Image encryp-
tion technique using Blowfish and Cross Chaos map,” tion based on three-dimensional bit matrix permutation,”
in Proceedings of the IEEE International Conference on Signal. Processing., Vol. 118, pp. 36–50, Jan. 2016.
Communications and Signal Processing, Melmaruvathur
India, 2015, pp. 879–83. 18. Q. Yang, W. M. Osman, and C. Chen, “A New 6D hyper
chaotic system with four positive lyapunov exponents
8. L. Liu, and S. Miao, “A new image encryption algorithm coined,” Intl. Journal. Bifur. Chaos, Vol. 25, no. 4, pp. 1–18,
based on logistic chaotic map with varying parameter,” Apr. 2015.
Springer Plus, Vol. 289, pp. 1–12, Mar. 2016.
19. J. D. Watson, and F. H. C. Crick, “Molecular structure of
9. X. Wang, L. Liu, and Y. Zhang, “A novel chaotic block nucleic acids: A structure for deoxyribose nucleic acid,”
image encryption algorithm based on dynamic random Nature, Vol. 171, pp. 737–8, 1953.
growth technique,” Opt. Lasers Eng., Vol. 66, pp. 10–18,
Mar. 2015. 20. L. Xu, Z. Li, J. Li, and W. Hua, “A novel bit-level image
encryption algorithm based on chaotic maps,” Opt. Lasers
10. M. Kar, M. K. Mandal, and D. Nandi, “RGB image encryp- Eng., Vol. 78, pp. 17–25, Mar. 2016.
tion using hyper chaotic system”, Third International Con-
ference on Research in Computational Intelligence and 21. Y. Luo, M. Du, and J. Liu, “A symmetrical image encryption
Communication Networks (ICRCICN), Kolkata, 2017, pp. scheme in wavelet and time domain,” Commun. Nonlinear
354–9. https://ieeexplore.ieee.org/document/8234534 Sci. Numer. Simulat, Vol. 20, no. 2, pp. 447–60, Feb. 2015.
11. P. Zhen, G. Zhao, L. Min, and X. Jin, “Chaos-based image 22. C. Fu, J. Chen, H. Zou, W. Meng, Y. Zhan, and Y. Yu,
encryption scheme combining DNA coding and entropy,” “A chaos-based digital image encryption scheme with an
Multimed. Tools. Appl., Vol. 75, no. 11, pp. 6303–19, June improved diffusion strategy,” Opt. Express, Vol. 20, no. 3,
2016. pp. 2363, Jan. 2012.
12. X. Wang, Y. Zhang, and X. Bao, “A novel chaotic image 23. M. Kar, M. K. Mandal, D. Nandi, A. Kumar, and S. Banik,
encryption scheme using DNA sequence operations,” Opt. “Bit-plane encrypted image cryptosystem using chaotic
Lasers Eng., Vol. 73, pp. 53–61, October 2015. quadratic and cubic maps,” IETE Tech. Rev., Vol. 33, pp.
651–61, Feb. 2016.
13. R. Enayatifar, H. J. Sadaei, A. H. Abdullah, M. Lee, and I.
F. Isnin, “A novel chaotic based image encryption using 24. NIST, Guide to the Statistical Tests, April 2010. http://nvl
a hybrid model of deoxyribonucleic acid and cellular pubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication
automata,” Opt. Lasers Eng., Vol. 71, pp. 33–41, Aug. 2015. 800-22r1a.pdf
M. KAR ET AL.: IMAGE ENCRYPTION USING DNA CODING AND HYPERCHAOTIC SYSTEM 23