Research Article  Open Access
Haidar Raad Shakir, "A ColorImage Encryption Scheme Using a 2D Chaotic System and DNA Coding", Advances in Multimedia, vol. 2019, Article ID 7074264, 13 pages, 2019. https://doi.org/10.1155/2019/7074264
A ColorImage Encryption Scheme Using a 2D Chaotic System and DNA Coding
Abstract
This paper proposes a method of encrypting images with password protection for secure sharing based on deoxyribonucleic acid (DNA) sequence operations and the tangentdelay ellipse reflecting the cavitymap system (TDERCS). The initial values of the TDERCS system are generated from a user’s password, and the TDERCS system is used to scramble the pixel locations of the R, G, and B matrices of the original image. Next, three DNAsequence matrices are generated by encoding the permuted color image such that it can be transformed into three matrices. Then, the TDERCS system is employed to generate three chaotic sequences before encoding the DNA into the three matrices. Thereafter, a DNA exclusive OR (XOR) operation is executed between the DNA sequences of the permuted image and the DNA sequences generated by the TDERCS system to produce three encrypted scrambled matrices. Finally, the matrices of the DNA sequences are decoded, and the R, G, and B channels are recombined to form an encrypted color image. The results of simulation and security tests reveal that the proposed algorithm offers robust encryption and demonstrates the ability to resist exhaustive, statistical, and differential attacks.
1. Introduction
With recent developments in technology and Internetbased activities, computer networks have fundamentally transformed human communication. Individuals can now join a variety of different networks to access and share various types of multimedia and data. However, online networks are not without risks, and due to the open nature of many networks, public concerns regarding the security and safety of data that is exchanged online are now higher than ever [1].
Digital images play a large role in multimedia communication, and thus, it is critical that appropriate mechanisms are in place to protect this information. Traditional block encryption approaches, such as AES, IDEA, and DES, can encrypt images effectively and ensure their safety to an extent. However, they cannot protect against transmission noise, which can be introduced to a digital image during the transmission process [2]. Therefore, research must be conducted to investigate algorithms that can provide increased protection via more comprehensive image encryption.
Developments in the field of chaos theory have created new opportunities for imageencryption techniques. Chaosbased imageencryption algorithms are fast and secure methods that offer many beneficial features, such as ergodicity, mixing, and strong sensitivity to initial conditions and system parameters [3]. Therefore, they represent promising encryption approaches that can potentially provide the protection required to enhance the security of images shared via digital networks.
Since the 1990s, scholars have observed a close correlation between cryptography and chaos [4], and chaos can potentially be employed within the permutationdiffusion architecture proposed by Mao, Guan, and Pareek et al. [5–7]. This architecture has attracted the interest of researchers worldwide and has led to the expansion of chaosbased encryption. Despite the fact that these procedures have demonstrated some advances, chaosbased encryption is still considered to be weak against known/chosen plaintext attacks [8]. A range of chaosbased innovations have emerged in this field, spanning various systems, including novel permutation techniques [9–13], new diffusion approaches [14, 15], hyperchaotic map systems [16, 17], a simultaneous image encryptioncompression scheme [18, 19], and novel transform domains [20, 21].
However, many of these imageencryption schemes have been deciphered without knowing the secret keys. For instance, the chaosbased encryption in [4] is still reported to be weak against known/chosen plaintext attacks [22]. In addition, a cryptographic analysis has been introduced in [23] to break a chaotic encryption scheme that employs autoblocking and electrocardiography, which produces a sequence of random numbers using a logistic map and a 2D Arnold map. Furthermore, another chaotic image cryptanalysis scheme based on image entropy has been proposed in [24]; however, it still retains the insecurity issues of the chaotic image cryptosystem.
One area of particular interest is deoxyribonucleic acid (DNA) codingbased cryptosystem. These revolutionary approaches to encryption exploit the vast storage space, immense parallelism, and ultralow power consumption of DNA computing [25]. Given the significant potential of this area, researchers have studied a range of cryptosystem that combine chaos theory with DNA encoding [26–37]. In [27, 30, 31, 33], a logistic map and its variants were employed as key stream generators, whereas hyperchaotic systems within a DNA coding collaboration are introduced in [26, 28, 29, 32, 35, 37]. The logistic map has some drawbacks for information encryptions, such as small key space, insufficient complexity, and low security, which allow easy decryption of the encryption schemes [38]. Hyperchaotic systems within a DNA coding method have proven to be insecure by proposing a chosen plaintext attack method by Feng and He [39].
To overcome this problem, this paper proposes a new imageencryption approach that employs secure image sharing based on DNAsequence operations and tangentdelay ellipse reflecting cavitymap system (TDERCS) maps. The TDERCS system is used as chaotic map for its complexity and has proved to be immune against differential attacks [40]. The preliminary values for the TDERCS system are produced by calculating SHA256 from a user’s password. The encryption approach employs diffusion and confusion. The generated TDERCS system is used to permute the positions of the pixels in the original image, thereby confusing it. Subsequently, the permuted image is DNA encoded before the TDERCS system and DNA encoding are employed to generate a mask image. Next, DNA XOR is performed between the mask image and permuted image to generate the scrambled image. Finally, DNA decoding is applied to the scrambled image to generate an encrypted image and, in doing so, achieve diffusion.
The remainder of this paper is organized as follows: Section 2 provides preliminaries, while Section 3 introduces the encryption scheme. Section 4 presents the experimental results and discussion, and Section 5 concludes the paper.
2. Preliminaries
In this section, a brief discussion of the TDERCS system and DNA sequences is provided.
2.1. TangentDelay Ellipse Reflecting CavityMap System
In 2004, KeHui and ChuanBing developed a novel chaotic system named TDERCS [41]. TDERCS is a special twodimensional map based on a physical model of an elliptical reflecting cavity. The system fulfills certain criteria, such as a maximum Lyapunov exponent greater than zero, zero correlation over the entire field, and unchangeable equiprobability [42]. The TDERCS can be mathematically described as follows [43]:where x_{0}, μ, α, and j are the initial or seed parameters of the TDERCS. The seed parameters in the TDERCS are as follows: μ ∈ [0, 1], x_{0} ∈ [−1, 1], and α ∈ [0, π] and the tangentdelay parameters m (m = 1, 2, 3, 4, 5, 6, …). Figure 1 illustrates the iterations of continuous chaotic systems. The plots are generated by the TDERCS with initial parameters μ = 0.3324, x_{0} = 0.2456, α = 2.143, and m = 2 and with n = 2,500 iterations.
(a)
(b)
(c)
2.2. DNASequence Operations
2.2.1. DNA Encoding and Decoding
DNA is a biological material present in nearly all living organisms. Parents’ DNA is transmitted to a child, thus causing the child to inherit the parents’ features. In humans, DNA is shaped like a twisted ladder and contains four nucleobases: adenine (A), cytosine (C), guanine (G), and thymine (T) [44]. Watson and Crick published an article in 1953 [45] that presented the DNA complementary rule. This rule states that adenine (A) bonds with thymine (T) and that guanine (G) bonds with cytosine (C). Figure 2 illustrates the structure of DNA.
A computer system deals with binary numbers and is composed of two numbers only: 0 and 1 that can be opposite or complementary. For instance, numbers 00 and 11 are complementary, as are 01 and 10. The four DNA bases A, C, G, and T are used to represent a binary sequence of 00, 11, 10, and 01, respectively, in the DNA sequence. Eight coding rules convert the binary sequence into DNA code, as demonstrated in Table 1 [46].

A digital image comprises pixels of intensities in the range of 0 to 255. For an image pixel to be displayed, it is first transformed into a binary sequence of length 8 and then expressed as a DNA sequence of length 4. For instance, if the image pixel value is 89 (binary sequence: 01011001), it can be encoded into a DNA sequence (AATA) according to encoding rule #3.
2.2.2. DNA Exclusive OR Operation
Due to the rapid development of DNA computing, several biological and algebraic operations have been proposed for DNA sequences, such as the XOR operation [47]. This operation is executed for a DNA sequence in the same way as a traditional XOR operation is executed in a binary sequence. Because there are eight DNA encoding rules, there are also eight DNA XOR rules. Table 2 presents the DNA XOR operations [48].

3. Proposed Algorithm
The encryption algorithm in this paper comprises two components: encryption and decryption. The algorithm has a pair of chaotic sequences (x, y) created by employing a TDERCS and three generated chaotic sequences: x, y, and z from a single map. In this study, x and y were used for position scrambling and x, y, and z were used for pixel scrambling via the DNA XOR method. Figure 3 illustrates the proposed encryption and decryption schemes.
3.1. Key Generation
The proposed encryption scheme employs a user's password to generate secret keys. First, SHA256 is used to generate a message digest of 256 bits for the password. The 64 hash values of the message digest are then divided into eight hexadecimal groups: k_{1}, k_{2}, …, k_{8}. Each group contains eight hexadecimal values and is converted into a floating decimal number via the following equation:where j = 1, 2, …, 8. The first set of the TDERCS initial values (μ, x_{0}, α, and m) is computed by
The second set of initial values (μ, x_{0}, α, and m) for the TDERCS system is calculated as
3.2. Image Encryption
The process of encryption involves the following steps: Step 1. Conversion of the original color image to three matrices: R(m, n), G(m, n), and B(m, n). Step 2. Generation of a pair of chaotic sequences, x_{new} = (x_{1}, x_{2}, …, x_{mn}) and y_{new} = (y_{1}, y_{2}, …, y_{mn}), via a TDERCS chaotic map. This uses the starting values μ, x_{0}, α, and m, as described in Section 3.1. Step 3. Use of the method outlined below to prepare the x and y chaotic sequences: where [•, •] = sort, (•) represents the type of index function, fx represents the new series of the X sequence, lx represents the index value of fx, and ly is equal to lx. Step 4. Application of the combination (x_{new}, y_{new}) for scrambling R, G, and B positions using Step 5. Conversion of R_{new}, G_{new}, and B_{new} to binary matrices. DNA encoding is then employed to encode these binary matrices, as detailed in Section 2.1. This results in three remodeled coding matrices: R_{dna}, G_{dna}, and B_{dna}, sized (m, n × 4). Step 6. Generation of three chaotic sequences X_{n} = (x_{1}, x_{2},…, x_{mn}), Y_{n} = (y_{1}, y_{2}, …, y_{mn}), and Z_{n} = (z_{1}, z_{2}, …, z_{mn}) via a TDERCS chaotic map. This uses the starting values of the second set, μ, x_{0}, α, and m, as detailed in Section 3.1. Then, these generated values are converted into a range from 0 to 256 according to where k ranges from 0 to M × N. Thus, the mask image is generated. Step 7. Conversion of X_{e}, Y_{e}, and Z_{e} to binary matrices. DNA encoding is then employed to encode these matrices. This results in three remodeled coding matrices: X_{dna}, Y_{dna}, and Z_{dna}, sized (m, n ×4). Step 8. Execution of the DNA XOR operation among (R_{dna} and X_{dna}), (G_{dna} and Y_{dna}), and (B_{new} and Z_{dna}). This results in three encrypted matrices: R_{c}, G_{c}, and B_{c}. Step 9. Generation of the final encrypted image by performing a DNA decoding operation for R_{c}, G_{c}, and B_{c}. This results in three new matrices with values ranging from 0 to 255: R_{enc}, G_{enc}, and B_{enc}.
3.3. Image Decryption
The image decryption steps are as follows: Step 1. Conversion of encrypted color image to three matrices: R(m, n), G(m, n), and B(m, n). Step 2. Conversion of R, G, and B to binary matrices. DNA encoding is then employed to encode these binary matrices, as detailed in Section 2.1. This results in three remodeled coding matrices: R_{dna}, G_{dna}, and B_{dna}, sized (m, n ×4). Step 3. Generation of three chaotic sequences X_{i} = (x_{1}, x_{2}, …, x_{mn}), Y_{i} = (y_{1}, y_{2}, …, y_{mn}), and Z_{i} = (z_{1}, z_{2}, …, z_{mn}) via a TDERCS chaotic map. This employs the starting values of the second set, μ, x_{0}, α, and m, as discussed in Section 3.1. The generated values are then converted into range of 0 to 256 according to where k ranges from 0 to M × N. Thus, the mask image is generated. Step 4. Conversion of X_{e}, Y_{e}, and Z_{e} to binary matrices. Then, DNA encoding is employed to encode these matrices. This results in three remodeled coding matrices: X_{dna}, Y_{dna}, and Z_{dna}, sized (m, n ×4). Step 5. Execution of the DNA XOR operation among (R_{dna} and X_{dna}), (G_{dna} and Y_{dna}), and (B_{dna} and Z_{dna}). This results in three decrypted matrices: R_{d}, G_{d}, and B_{d}. Step 6. Generation of a pair of chaotic sequences, x_{new} = (x_{1}, x_{2}, …, x_{mn}) and y_{new} = (y_{1}, y_{2}, …, y_{mn}), via a TDERCS chaotic map. This uses the first set of starting values, μ, x_{0}, α, and m, as detailed in Section 3.1. Step 7. Use of the method outlined below to prepare the x and y chaotic sequences: where [•, •] = sort, (•) represents the type of index function, fx represents the new series of the X sequence, lx represents the index value of fx, and ly is equal to lx. Step 8. Application of the combination (x_{new}, y_{new}) for recovering R_{d}, G_{d}, and B_{d} positions using
Then, the final decrypted image is constructed by recombining these three matrices into a color image.
4. Simulation Results
Twenty color images of 512 × 512 pixels each were selected from the USCSIPI image database (the USCSIPI image database is available at http://sipi.usc.edu/services/database/Database.html) and UCID image database (the UCID image dataset is available at http://homepages.lboro.ac.uk/cogs/datasets/ucid/data/ucid.v2.tar.gz.) for testing. Figure 4 displays the images. The first two rows show the USCSIPI images, and the next two rows show the UCID images. Performance analysis was performed for the proposed encryption scheme in terms of histogram analysis, correlation coefficient analysis, and differential attack resistance using the number of pixels change rate (NPCR) and the unified average changing intensity (UACI). Simulation experiments were performed on a personal computer with Intel Core i76500U, 3.0 GHz, 4 GB using Matlab R2017a and the Windows 10 operating system.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)
(m)
(n)
(o)
(p)
(q)
(r)
(s)
(t)
4.1. Key Space Analysis
For a secure cryptosystem, the key space must be large enough to withstand all kinds of bruteforce attacks. Furthermore, the key space of the proposed encryption scheme is represented by the TDERCS seed parameters. If the precision is set to 10^{−15} for all the parameters, the key space size is 10^{90}. This key space is large enough to resist bruteforce attacks.
4.2. Histogram Analysis
Histograms of an image are used to represent the pixel distribution for each color intensity level. An ideal imageencryption algorithm produces a histogram of the encrypted image with a uniform distribution. The histograms of the original and encrypted image (Lena) are displayed in Figures 5(a)–5(d) for the red, green, and blue components, respectively. It should be noted that the histograms of encrypted images are flat and thus differ from the original images. Therefore, the proposed encryption scheme can resist statistical attacks.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
4.3. MeanSquare Errors and Peak SignaltoNoise Ratio
The peak signaltonoise ratio (PSNR) and meansquare error (MSE) are two error measures that are widely used for comparing image quality. The MSE refers to the cumulative square error between the original image and encrypted image. The higher the value of the MSE, the higher the probability that the encrypted images are distorted and noisy. The MSE can be calculated according towhere x(i, j) refers to the original image, y(i, j) refers to the encrypted image, and (i, j) refers to the coordinates of the image pixels of size M × N.
The PSNR represents the noise ratio between the original image and the encrypted image and is measured in decibels (dB). Low PSNR values indicate that the encryption scheme results in high degradation of the encrypted images. Equation (12) is used to calculate the PSNR:where I_{max} is the maximum intensity of the image. For an 8bit image, I_{max} is set to 255. Table 3 displays the computed MSE and PSNR values for the test images.

These results demonstrate that the proposed encryption scheme can produce ciphered images with high degradation.
4.4. Correlation Coefficient Analysis
Correlation refers to the linear relation between two variables. For images, it is used to indicate the relation between two adjacent pixels. Normally, plain images possess a high correlation between adjacent pixels. Thus, a secure encryption scheme should reduce the correlation between adjacent encrypted image pixels to resist a statistical analysis attack. To evaluate the correlation between two adjacent pixels, 4,000 pairs of neighboring pixels in the vertical, horizontal, and diagonal directions were randomly selected from a plain image and corresponding encrypted image. The correlation coefficient was computed according towhere (r_{xy}) is the correlation coefficient, x and y are the graylevel values of two adjacent pixels, N is the number of pairs (x_{i}, y_{i}), E(x) is the x_{i} mean, and E(y) is the y_{i} mean. Figure 6 illustrates the correlation coefficient for the original image (airplane) and the corresponding encrypted image. The correlation coefficient was computed for all test images vertically, horizontally, and diagonally; Table 4 provides the results. The results reveal that the correlation coefficient of the encrypted images is close to zero or negative. Therefore, there is no correlation between adjacent image pixels.
(a)
(b)
(c)
(d)
(e)
(f)

Along with this analysis, the proposed scheme was compared to two representative methods from other schemes [34, 35, 49, 50]; Table 5 presents the correlation coefficient results for the encrypted Lena image. The proposed scheme obtained results superior to those of the reference methods, as the encrypted image correlation coefficient values were smaller than those obtained by the reference methods.
4.5. Entropy Information
In information theory, entropy information is defined as the uncertainty of information content and can be used to measure the randomness of a data sequence. It is expressed as follows:where H is the image entropy and p(m_{i}) refers to the probability of symbol m. For digital images with 2^{8} pixels of, the maximum information entropy is 8. The higher the entropy value of the encrypted image, the more uniform the distribution. Table 6 presents the information entropy results. From these results, it is evident that the entropy values of the test images are very close to the ideal value. This indicates that the proposed encryption scheme is secure against an entropy attack. In addition, Table 7 presents an average entropy analysis for the five images for the proposed method and the other reference methods from [36, 37, 43, 51]. The results indicate that the proposed scheme has superior performance, as demonstrated by its higher entropy values.

4.6. Differential Attack
Usually, the p attacker introduces a minor alteration (e.g., changing one pixel) to an unaltered image and, by doing so, creates a pair of cipher images that employ an identical encryption algorithm. The attacker then breaks into the cryptosystem by following the variations of this pair of encrypted images; this is referred to as a differential attack.
To examine what happens to an encrypted image when a single pixel is altered in the original image, the NPCR was calculated, as given in (15) and (16), and the UACI was computed, as given in (13):where M represents the width of the encrypted image, N represents the height, L is the pixel number, and T is the largest allowed pixel value for the image. The cipher images are represented by C_{1} and C_{2}, which differ from the matching plain images by a single pixel. It is clear that if the differential attack is to be repelled via an effective cryptosystem, the UACI and NPCR values should be sizable.
In the numerical experiment that follows, the original image was encrypted. A single pixel was then selected at random from the image, and a small modification was performed. Then, the plain image was reencrypted with modifications employing identical means. The UACI RGB and NPCR RGB values were then calculated using a pair of cipher images. Table 8 presents the relevant data for these experiments. As Table 8 demonstrates, this methodology resulted in sizable UACI and NPCR levels. Thus, the proposed algorithm could detect minuscule alterations to the plaintext and was able to repel a differential attack.

The proposed method was also compared with reference methods [36, 37, 43, 51] for the encrypted Lena image, as presented in Table 9. The NPCR and UACI values for the proposed method are superior, as they are higher than the values obtained using the reference methods.
4.7. Analysis of Noise and Data Loss Attacks
There are several different types of noise existing in public multimedia channels such as Internet and wireless communication networks. Such noise belongs to a kind of attack that has no intentions; they decrease the image quality. Common types of noise include saltandpepper noise and Gaussian noise; they are different kinds of image noise. A wide range of noise is present in open interactive media channels such as wireless communication and the Internet. Such noise is a sort of attack that has no goals; it just distorts the image quality. Saltandpepper noise and Gaussian noise are the two types of imagenoise attack. The experimental results in Figures 7 and 8 show the performance of the proposed algorithm after exposure to a noise attack. The experimental effect is illustrated in Figures 7 and 8; the top row shows the encrypted images after applying saltandpepper noise and Gaussian noise attacks on the test images. The bottom row shows the images reconstructed from the noisy images. Notably, the reconstructed images affected by the noise attack still retain most of the plain image information. These experimental outcomes prove that the proposed algorithm has excellent performance against noise attacks. The original images can be recovered even if the communication channel is noisy.
(a)
(b)
(c)
(d)
(a)
(b)
(c)
(d)
(e)
(f)
The test against a data loss attack is shown in Figure 9. The top rows show the encrypted images after cutting parts of them in different sizes and locations, and the bottom rows show the reconstructed images after cropping. The reconstructed images after the attack obviously contain most of the original image data and can still be recognized.
(a)
(b)
(c)
(d)
(e)
(f)
5. Conclusion
In this paper, a new imageencryption algorithm is proposed using a TDERCS chaotic system, DNAsequence operation, and Secure Hash SHA256. From the above discussion, the positions of the image pixels are permuted by the TDERCS system, and the pixel gray values of the plain image are scrambled using DNAsequence XOR operations. Based on the experimental results and security analysis, the efficiency of the algorithm encryption is found to be good. Furthermore, the proposed algorithm is able to resist most common attacks, such as statistical analysis, exhaustive attacks, differential attacks, and noise attacks. All these features make the algorithm efficient for secure digital image transmission.
Data Availability
The test image data used to support the findings of this study are included within the article.
Conflicts of Interest
The authors declare that there are no conflicts of interest.
References
 L. Y. Zhang, Y. Liu, F. Pareschi et al., “On the security of a class of diffusion mechanisms for image encryption,” IEEE Transactions on Cybernetics, vol. 48, no. 4, pp. 1163–1175, 2018. View at: Publisher Site  Google Scholar
 G. Ye, “A block image encryption algorithm based on wave transmission and chaotic systems,” Nonlinear Dynamics, vol. 75, no. 3, pp. 417–427, 2014. View at: Publisher Site  Google Scholar
 Y. Wu, J. P. Noonan, G. Yang, and H. Jin, “Image encryption using the twodimensional logistic chaotic map,” Journal of Electronic Imaging, vol. 21, no. 1, pp. 013014–013016, 2012. View at: Publisher Site  Google Scholar
 J. Fridrich, “Symmetric ciphers based on twodimensional chaotic maps,” International Journal of Bifurcation and Chaos, vol. 08, no. 6, pp. 1259–1284, 1998. View at: Publisher Site  Google Scholar
 Y. Mao, G. Chen, and S. Lian, “A novel fast image encryption scheme based on 3D chaotic baker maps,” International Journal of Bifurcation and Chaos, vol. 14, no. 10, pp. 3613–3624, 2004. View at: Publisher Site  Google Scholar
 Z.H. Guan, F. Huang, and W. Guan, “Chaosbased image encryption algorithm,” Physics Letters A, vol. 346, pp. 153–157, 2005. View at: Google Scholar
 N. K. Pareek, V. Patidar, and K. K. Sud, “Image encryption using chaotic logistic map,” Image and Vision Computing, vol. 24, pp. 926–934, 2006. View at: Google Scholar
 C. Li, Y. Zhang, and E. Y. Xie, “When an attacker meets a cipherimage in 2018: a year in review,” Journal of Information Security and Applications, vol. 48, Article ID 102361, 2019. View at: Publisher Site  Google Scholar
 L. Xu, Z. Li, J. Li, and W. Hua, “A novel bitlevel image encryption algorithm based on chaotic maps,” Optics and Lasers in Engineering, vol. 78, pp. 17–25, 2016. View at: Publisher Site  Google Scholar
 Z.l. Zhu, W. Zhang, K.w. Wong, and H. Yu, “A chaosbased symmetric image encryption scheme using a bitlevel permutation,” Information Sciences, vol. 181, no. 6, pp. 1171–1186, 2011. View at: Publisher Site  Google Scholar
 V. Patidar, N. K. Pareek, G. Purohit, and K. K. Sud, “A robust and secure chaotic standard map based pseudorandom permutationsubstitution scheme for image encryption,” Optics Communications, vol. 284, no. 19, pp. 4331–4339, 2011. View at: Publisher Site  Google Scholar
 Y. Li, C. Wang, and H. Chen, “A hyperchaosbased image encryption algorithm using pixellevel permutation and bitlevel permutation,” Optics and Lasers in Engineering, vol. 90, pp. 238–246, 2017. View at: Publisher Site  Google Scholar
 J.x. Chen, Z.l. Zhu, C. Fu, H. Yu, and L.b. Zhang, “An efficient image encryption scheme using gray code based permutation approach,” Optics and Lasers in Engineering, vol. 67, pp. 191–204, 2015. View at: Publisher Site  Google Scholar
 N. K. Pareek, V. Patidar, and K. K. Sud, “Diffusionsubstitution based gray image encryption scheme,” Digital Signal Processing, vol. 23, no. 3, pp. 894–901, 2013. View at: Publisher Site  Google Scholar
 B. Norouzi, S. Mirzakuchaki, S. M. Seyedzadeh, and M. R. Mosavi, “A simple, sensitive and secure image encryption algorithm based on hyperchaotic system with only one round diffusion process,” Multimedia Tools and Applications, vol. 71, no. 3, pp. 1469–1497, 2014. View at: Publisher Site  Google Scholar
 B. Norouzi and S. Mirzakuchaki, “A fast color image encryption algorithm based on hyperchaotic systems,” Nonlinear Dynamics, vol. 78, no. 2, pp. 995–1015, 2014. View at: Publisher Site  Google Scholar
 H. Liu, A. Kadir, and Y. Li, “Asymmetric color pathological image encryption scheme based on complex hyper chaotic system,” Optik, vol. 127, no. 15, pp. 5812–5819, 2016. View at: Publisher Site  Google Scholar
 H. Zhu, C. Zhao, and X. Zhang, “A novel image encryptioncompression scheme using hyperchaos and Chinese remainder theorem,” Signal Processing: Image Communication, vol. 28, no. 6, pp. 670–680, 2013. View at: Publisher Site  Google Scholar
 T. Zhang, S. Li, R. Ge, M. Yuan, and Y. Ma, “A novel 1D hybrid chaotic mapbased image compression and encryption using compressed sensing and fibonaccilucas transform,” Mathematical Problems in Engineering, vol. 2016, Article ID 7683687, 15 pages, 2016. View at: Publisher Site  Google Scholar
 S. Liansheng, Z. Bei, N. Xiaojuan, and T. Ailing, “Optical multipleimage encryption based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain,” Optics Express, vol. 24, no. 1, pp. 499–515, 2016. View at: Publisher Site  Google Scholar
 J. Lang, “Color image encryption based on color blend and chaos permutation in the realitypreserving multipleparameter fractional fourier transform domain,” Optics Communications, vol. 338, pp. 181–192, 2015. View at: Publisher Site  Google Scholar
 E. Y. Xie, C. Li, S. Yu, and J. Lü, “On the cryptanalysis of Fridrich’s chaotic image encryption scheme,” Signal Processing, vol. 132, pp. 150–154, 2017. View at: Publisher Site  Google Scholar
 C. Li, D. Lin, J. Lü, and F. Hao, “Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography,” IEEE MultiMedia, vol. 25, pp. 46–56, 2018. View at: Publisher Site  Google Scholar
 C. Li, D. Lin, B. Feng, J. Lu, and F. Hao, “Cryptanalysis of a chaotic image encryption algorithm based on information entropy,” IEEE Access, vol. 6, pp. 75834–75842, 2018. View at: Publisher Site  Google Scholar
 X. Zheng, J. Xu, and W. Li, “Parallel DNA arithmetic operation based on nmoduli set,” Applied Mathematics and Computation, vol. 212, no. 1, pp. 177–184, 2009. View at: Publisher Site  Google Scholar
 X. Wei, L. Guo, Q. Zhang, J. Zhang, and S. Lian, “A novel color image encryption algorithm based on DNA sequence operation and hyperchaotic system,” Journal of Systems and Software, vol. 85, no. 2, pp. 290–299, 2012. View at: Publisher Site  Google Scholar
 M. Babaei, “A novel text and image encryption method based on chaos theory and DNA computing,” Natural Computing, vol. 12, no. 1, pp. 101–107, 2013. View at: Publisher Site  Google Scholar
 A. u. Rehman, X. Liao, R. Ashraf, S. Ullah, and H. Wang, “A color image encryption technique using exclusiveOR with DNA complementary rules based on chaos theory and SHA2,” Optik, vol. 159, pp. 348–367, 2018. View at: Publisher Site  Google Scholar
 X. Chai, Z. Gan, Y. Lu, Y. Chen, and D. Han, “A novel image encryption algorithm based on the chaotic system and DNA computing,” International Journal of Modern Physics C, vol. 28, no. 5, Article ID 1750069, 2017. View at: Publisher Site  Google Scholar
 A. Kulsoom, D. Xiao, A.u. Rehman, and S. A. Abbas, “An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules,” Multimedia Tools and Applications, vol. 75, no. 1, pp. 1–23, 2016. View at: Publisher Site  Google Scholar
 X. Wu, H. Kan, and J. Kurths, “A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps,” Applied Soft Computing, vol. 37, pp. 24–39, 2015. View at: Publisher Site  Google Scholar
 J. Kalpana and P. Murali, “An improved color image encryption based on multiple DNA sequence operations with DNA synthetic image and chaos,” Optik, vol. 126, no. 24, pp. 5703–5709, 2015. View at: Publisher Site  Google Scholar
 M. T. Suryadi, Y. Satria, and M. Fauzi, “Implementation of digital image encryption algorithm using logistic function and DNA encoding,” Journal of Physics: Conference Series, vol. 974, Article ID 012028, 2018. View at: Google Scholar
 L. Guo, J. Chen, and J. Li, “ChaosBased color image encryption and compression scheme using DNA complementary rule and Chinese remainder theorem,” in Proceedings of the 2016 13th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), pp. 208–212, Chengdu, China, December 2016. View at: Publisher Site  Google Scholar
 X. Zhang, F. Han, and Y. Niu, “Chaotic image encryption algorithm based on bit permutation and dynamic DNA encoding,” Computational Intelligence and Neuroscience, vol. 2017, Article ID 6919675, 11 pages, 2017. View at: Publisher Site  Google Scholar
 C. Song and Y. Qiao, “A novel image encryption algorithm based on DNA encoding and spatiotemporal chaos,” Entropy, vol. 17, no. 12, pp. 6954–6968, 2015. View at: Publisher Site  Google Scholar
 S. Sun, “Chaotic image encryption scheme using twobytwo deoxyribonucleic acid complementary rules,” Optical Engineering, vol. 56, Article ID 116117, 2017. View at: Publisher Site  Google Scholar
 C. Han, “An image encryption algorithm based on modified logistic chaotic map,” Optik, vol. 181, pp. 779–785, 2019. View at: Publisher Site  Google Scholar
 W. Feng and Y.G. He, “Cryptanalysis and improvement of the hyperchaotic image encryption scheme based on DNA encoding and scrambling,” IEEE Photonics Journal, vol. 10, no. 6, pp. 1–15, 2018. View at: Publisher Site  Google Scholar
 Y.Y. Xiao, L.Y. Sheng, J. Wen, and L.L. Cao, “Differential cryptanalysis of TDERCS chaos,” Acta Physica Sinica, vol. 56, pp. 78–83, 2007. View at: Google Scholar
 S. L.Y. S. KeHui and L. ChuanBing, “Study of a discrete chaotic system based on tangentdelay for elliptic reflecting cavity and its properties,” Acta Physica Sinica, vol. 9, p. 11, 2004. View at: Google Scholar
 I. Hussain, T. Shah, M. A. Gondal, and H. Mahmood, “A novel image encryption algorithm based on chaotic maps and GF(28) exponent transformation,” Nonlinear Dynamics, vol. 72, no. 12, pp. 399–406, 2013. View at: Publisher Site  Google Scholar
 J. S. Khan, J. Ahmad, and M. A. Khan, “Tdercs mapbased confusion and diffusion of autocorrelated data,” Nonlinear Dynamics, vol. 87, no. 1, pp. 93–107, 2017. View at: Publisher Site  Google Scholar
 S. Zhou, Q. Zhang, X. Wei, and C. Zhou, “A summarization on image encryption,” IETE Technical Review, vol. 27, no. 6, pp. 503–510, 2010. View at: Publisher Site  Google Scholar
 J. D. Watson and F. H. C. Crick, “The structure of DNA,” in Cold Spring Harbor Symposia on Quantitative Biology, pp. 123–131, Cold Spring Harbor Laboratory Press, Cold Spring Harbor, NY, USA, 1953. View at: Google Scholar
 S. Som, A. Kotal, A. Chatterjee, S. Dey, and S. Palit, “A colour image encryption based on DNA coding and chaotic sequences,” in Proceeding of the 2013 1st International Conference on Emerging Trends and Applications in Computer Science, pp. 108–114, Shillong, India, September 2013. View at: Publisher Site  Google Scholar
 A. ur Rehman, X. Liao, A. Kulsoom, and S. A. Abbas, “Selective encryption for gray images based on chaos and DNA complementary rules,” Multimedia Tools and Applications, vol. 74, no. 13, pp. 4655–4677, 2015. View at: Publisher Site  Google Scholar
 R. Enayatifar, A. H. Abdullah, and I. F. Isnin, “Chaosbased image encryption using a hybrid genetic algorithm and a DNA sequence,” Optics and Lasers in Engineering, vol. 56, pp. 83–93, 2014. View at: Publisher Site  Google Scholar
 H. Fengying and Z. Congxu, “An novel chaotic image encryption algorithm based on tangentdelay ellipse reflecting cavity map system,” Procedia Engineering, vol. 23, pp. 186–191, 2011. View at: Publisher Site  Google Scholar
 Y. Niu, X. Zhang, and F. Han, “Image encryption algorithm based on hyperchaotic maps and nucleotide sequences database,” Computational Intelligence and Neuroscience, vol. 2017, Article ID 4079793, 9 pages, 2017. View at: Publisher Site  Google Scholar
 L.M. Zhang, K.H. Sun, W.H. Liu, and S.B. He, “A novel color image encryption scheme using fractionalorder hyperchaotic system and DNA sequence operations,” Chinese Physics B, vol. 26, no. 10, Article ID 100504, 2017. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2019 Haidar Raad Shakir. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.