With the increasing challenges of securing multimedia transmission over the internet, image encryption has emerged as a critical research area. This paper presents a novel image encryption scheme that integrates chaotic substitution, DNA encoding, and random permutation techniques to enhance security. The proposed method exploits the unpredictability of chaotic sequences, the computational benefits of DNA encoding, and the randomness of permutation to strengthen encryption.In this approach, pixel values are initially converted into DNA sequences using a predefined encoding scheme. A high-dimensional Lorenz chaotic map generates chaotic sequences, which are then employed for pixel substitution, effectively scrambling the DNA-encoded pixel values. Furthermore, a random permutation technique known as the Fisher-Yates shuffle is applied to further disrupt the substituted pixel values, increasing the overall complexity of the encryption process.By integrating these techniques, the proposed scheme achieves robust security, making it resistant to various cryptographic attacks. Experimental results validate the effectiveness of this approach, demonstrating high encryption strength while maintaining computational efficiency.
Introduction
1. Importance of Image Encryption
Image encryption is vital for protecting the confidentiality and integrity of digital images in fields like photography, medical imaging, and satellite data. It transforms visual data into unreadable formats using cryptographic algorithms, preventing unauthorized access and tampering. Encryption techniques typically fall into two categories:
Symmetric Key Encryption: Same key for encryption and decryption.
Public Key Encryption: Public key encrypts, private key decrypts—more secure for key sharing.
2. Key Technologies Used
Chaotic Maps:
Mathematical systems that exhibit unpredictable behavior, ideal for encryption. They generate complex key streams and enable secure pixel scrambling due to their sensitivity to initial conditions. Common chaotic systems include Logistic, Lorenz, and Rössler systems.
DNA Encoding:
Data is represented using DNA nucleotides (A, T, C, G). Binary values are mapped to DNA bases, allowing for high-density, stable, and compact data storage. DNA encoding introduces non-linearity and diffusion in encryption.
Random Permutation:
Random rearrangement of image pixels ensures unpredictability. Techniques like the Fisher-Yates shuffle help in uniformly permuting pixel positions, essential for robust encryption.
3. Hybrid Encryption Methodology
A proposed encryption approach combines chaotic maps (Lorenz system), DNA encoding, and Fisher-Yates shuffling. The process includes:
Chaotic Key Generation:
Based on the Lorenz system with user-specific keys derived from a SHA-256 password hash.
Pixel Scrambling:
Fisher-Yates shuffle using chaotic sequences to rearrange pixels.
DNA Encoding & Modification:
Each 8-bit pixel value is encoded into 4-base DNA sequences. Further modification is done using chaotic sequences.
Chaotic XOR Diffusion:
Final encrypted image is generated using an XOR operation with a chaotic sequence, ensuring complete diffusion of pixel changes.
Decryption follows the reverse steps using the same chaotic sequences and keys.
4. Security and Performance Analysis
Histogram Analysis:
Encrypted images exhibit uniform histograms, lacking patterns that attackers could exploit—indicating high security.
Entropy Analysis:
Encrypted images reach entropy values near 8, indicating excellent randomness and resistance to statistical attacks.
Example: For the Baboon image, entropy increases from an average of 7.66 (plain) to 7.999 (encrypted).
Correlation Analysis (not fully included in the provided text):
Encryption significantly reduces the correlation between adjacent pixels, confirming high image randomness and security.
5. Related Research
Prior studies have validated the effectiveness of chaotic maps and DNA encoding:
Low-dimensional chaotic systems (e.g., Logistic map) are simple but less secure.
High-dimensional and hyperchaotic systems (e.g., Lorenz, Chen, Seven-Dimensional systems) offer better security due to complex behavior.
DNA + Chaos hybrid models enhance encryption by adding multiple layers of confusion and diffusion.
Examples include:
Baker Map + DNA operations
2D Sine-Logistic map + DNA rules
Hyperchaotic Lorenz + DNA XOR operations
Conclusion
In this work, we propose a robust image encryption and decryption framework that integrates high-dimensional chaotic sequences, DNA encoding, and the Fisher-Yates shuffle to enhance security. The encryption process utilizes the Lorenz chaotic system to generate pseudo-random sequences, which drive pixel shuffling and DNA-based transformations. Multiple rounds of Fisher-Yates shuffling and chaotic diffusion further strengthen security by ensuring high resistance against statistical and differential attacks.
The decryption process accurately reverses the encryption steps using the same chaotic sequences derived from the password, ensuring precise image reconstruction. DNA encoding introduces an additional layer of complexity, while XOR-based chaotic diffusion increases randomness in pixel values, further enhancing security.
The proposed encryption scheme demonstrates strong security properties, including high key sensitivity, robustness making it resistant to brute-force attacks, and statistical attacks. This conclusion is supported by performance evaluations using key metrics such as entropy, correlation coefficient, chi-square test, histogram analysis, NPCR, and UACI analysis. In all these metrics, the proposed scheme achieved optimal values, outperforming many existing encryption methods.
References
[1] Es-Sabry, Mohammed, Nabil El Akkad, Mostafa Merras, Khalid Satori, Walid El-Shafai, Torki Altameem, and Mostafa M. Fouda. \"Securing images using high dimensional chaotic maps and DNA encoding techniques.\" IEEE Access (2023).
[2] Allawi, Salah Taha, Yasmin Makki Mohialden, and Nadia Mahmood Hussien. \"Protection of the Image Data by Using Chaotic Maps and DNA Sequence.\" International Journal of Intelligent Engineering & Systems 17.4 (2024).
[3] Zhu, Jianjun, and Zhao Jian’E. \"A novel four-dimensional hyperchaotic system and DNA encoding method for image encryption.\" Int. J. Netw. Secur. 26.1 (2024): 43-50.
[4] Peng, Jun, et al. \"Research on a novel image encryption algorithm based on the hybrid of chaotic maps and DNA encoding.\" 2013 IEEE 12th International Conference on Cognitive Informatics and Cognitive Computing. IEEE, 2013.
[5] Amani, Hamid Reza, and Mahdi Yaghoobi. \"A new approach in adaptive encryption algorithm for color images based on DNA sequence operation and hyper-chaotic system.\" Multimedia Tools and Applications 78 (2019): 21537-21556.
[6] Zhang, Chaoxia, et al. \"Double image encryption algorithm based on parallel compressed sensing and chaotic system.\" IEEE Access (2024).
[7] He, Qiji, Peiya Li, and Yanyixiao Wang. \"A Color Image Encryption Algorithm Based on Compressive Sensing and Block-based DNA Coding.\" IEEE Access (2024).
[8] Zhu, Shenli, Xiaoheng Deng, Wendong Zhang, and Congxu Zhu. \"Image encryption scheme based on newly designed chaotic map and parallel DNA coding.\" Mathematics 11, 1 (2023): 231.
[9] Bencherqui, Ahmed, Mohamed Amine Tahiri, Hicham Karmouni, Mohammed Alfidi, Saad Motahhir, Mohamed Abouhawwash, S. S. Askar, Shuhuan Wen, Hassan Qjidaa, and Mhamed Sayyouri. \"Optimal algorithm for color medical encryption and compression images based on DNA coding and a hyperchaotic system in the moments.\" Engineering Science and Technology, an International Journal 50 (2024): 101612.
[10] Cao, Guanghui, et al. \"Image Encryption Based on a Coined Chaotic System and High-intensity Encryption Primitives.\" IEEE Access (2024).
[11] Alexan, Wassim, Dina El-Damak, and Mohamed Gabr. \"Image encryption based on fourier-DNA coding for hyperchaotic chen system, chen-based binary quantization S-box, and variable-base modulo operation.\" IEEE Access (2024).
[12] Girdhar, Ashish, Himani Kapur, and Vijay Kumar. \"A novel grayscale image encryption approach based on chaotic maps and image blocks.\" Applied Physics B 127 (2021): 1-12.
[13] Zang, Hongyan, Mengdan Tai, and Xinyuan Wei. \"Image encryption schemes based on a class of uniformly distributed chaotic systems.\" Mathematics 10.7 (2022): 1027.
[14] Zhu, Congxu. \"A novel image encryption scheme based on improved hyperchaotic sequences.\" Optics communications 285.1 (2012): 29-37.
[15] Yang, Na, et al. \"Medical image encryption based on josephus traversing and hyperchaotic lorenz system.\" Journal of Shanghai Jiaotong University (Science) 29.1 (2024): 91-108.
[16] Li, Chengqing, Shujun Li, Guanrong Chen, and Wolfgang A. Halang. \"Cryptanalysis of an image encryption scheme based on a compound chaotic sequence.\" Image and Vision Computing 27, 8 (2009): 1035-1039.
[17] Zhao, Jingbo, Tian Zhang, Jianwei Jiang, Tong Fang, and Hongyang Ma. \"Color image encryption scheme based on alternate quantum walk and controlled Rubik’s Cube.\" Scientific Reports 12, 1 (2022): 14253.
[18] Mfungo, Dani Elias, Xianping Fu, Xingyuan Wang, and Yongjin Xian. \"Enhancing image encryption with the Kronecker Xor product, the Hill Cipher, and the Sigmoid Logistic Map.\" Applied Sciences 13, 6 (2023): 4034.
[19] Elazzaby, Fouzia, and Nabil EL Akkad. \"Advanced encryption of image based on S-box and chaos 2D (LSMCL).\" 2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET). IEEE, 2020.
[20] Es-Sabry, Mohammed, Nabil El Akkad, Mostafa Merras, Abderrahim Saaidi, and Khalid Satori. \"A new color image encryption algorithm using multiple chaotic maps with the intersecting planes method.\" Scientific African 16 (2022): e01217.
[21] Es-Sabry, Mohammed, Nabil El Akkad, Mostafa Merras, Abderrahim Saaidi, and Khalid Satori. \"A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators.\" Soft Computing 24 (2020): 3829-3848.
[22] ]Neamah, Ammar Ali. \"An image encryption scheme based on a seven-dimensional hyperchaotic system and Pascal\'s matrix.\" Journal of King Saud University-Computer and Information Sciences 35, no. 3 (2023): 238-248.
[23] Yan, Shaohui, Lin Li, Binxian Gu, Yu Cui, Jianjian Wang, and Jincai Song. \"Design of hyperchaotic system based on multi-scroll and its encryption algorithm in color image.\" Integration 88 (2023)