Table of Contents Author Guidelines Submit a Manuscript
Computational Intelligence and Neuroscience
Volume 2017 (2017), Article ID 4079793, 9 pages
https://doi.org/10.1155/2017/4079793
Research Article

Image Encryption Algorithm Based on Hyperchaotic Maps and Nucleotide Sequences Database

College of Electric Information Engineering, Zhengzhou University of Light Industry, Zhengzhou 450002, China

Correspondence should be addressed to Xuncai Zhang

Received 8 January 2017; Accepted 27 February 2017; Published 14 March 2017

Academic Editor: Reinoud Maex

Copyright © 2017 Ying Niu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Behnia, A. Akhshani, H. Mahmodi, and A. Akhavan, “A novel algorithm for image encryption based on mixture of chaotic maps,” Chaos, Solitons and Fractals, vol. 35, no. 2, pp. 408–419, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  2. C. E. Shannon, “Communication theory of secrecy systems,” Bell System Technical Journal, vol. 28, no. 4, pp. 656–715, 1949. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  3. J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic maps,” International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, vol. 8, no. 6, pp. 1259–1284, 1998. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  4. G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749–761, 2004. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  5. X. Wang, X. Wang, J. Zhao, and Z. Zhang, “Chaotic encryption algorithm based on alternant of stream cipher and block cipher,” Nonlinear Dynamics. An International Journal of Nonlinear Dynamics and Chaos in Engineering Systems, vol. 63, no. 4, pp. 587–597, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  6. A. Leier, C. Richter, W. Banzhaf, and H. Rauhe, “Cryptography with DNA binary strands,” BioSystems, vol. 57, no. 1, pp. 13–22, 2000. View at Publisher · View at Google Scholar · View at Scopus
  7. B. Shimanovsky, J. Feng, and M. Potkonjak, “Hiding data in DNA,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 2578, pp. 373–386, 2003. View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  8. W.-L. Chang, M. Guo, and M. S.-H. Ho, “Fast parallel molecular algorithms for DNA-based computation: factoring integers,” IEEE Transactions on NanoBioscience, vol. 4, no. 2, pp. 149–163, 2005. View at Publisher · View at Google Scholar · View at Scopus
  9. B. Dan, C. Dunworth, and R. J. Lipton, “Breaking DES using a molecular computer,” in Proceedings of the DIMACS Workshop, vol. 27 of Series in Discrite Mathematics and Theoretical Computer Science, Princeton University, Princeton, NJ, USA, April 1995.
  10. A. Gehani, T. Labean, and J. Reif, “DNA-based cryptography,” in Proceedings of the DIMACS Workshop, vol. 54 of Series in Discrite Mathematics and Theoretical Computer Science, Massachusetts Institute of Technology, Cambridge, Mass, USA, June 1999. View at Publisher · View at Google Scholar
  11. C. T. Clelland, V. Risca, and C. Bancroft, “Hiding messages in DNA microdots,” Nature, vol. 399, no. 6736, pp. 533–534, 1999. View at Publisher · View at Google Scholar · View at Scopus
  12. G. C. Le Goff, L. J. Blum, and C. A. Marquette, “Shrinking hydrogel-DNA spots generates 3D microdots arrays,” Macromolecular Bioscience, vol. 13, no. 2, pp. 227–233, 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. X. Wu, H. Kan, and J. Kurths, “A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps,” Applied Soft Computing Journal, vol. 37, pp. 24–39, 2015. View at Publisher · View at Google Scholar · View at Scopus
  14. Z. Ignatova, I. Martinez-Perez, and K. Zimmermann, DNA Computing Models, Springer, New York, NY, USA, 2008. View at Publisher · View at Google Scholar
  15. X. Zhang, Y. Niu, C. Shen et al., “Fluorescence resonance energy transfer-based photonic circuits using single-stranded tile self-assembly and DNA strand displacement,” Journal of Nanoscience and Nanotechnology, vol. 17, pp. 1053–1060, 2017. View at Google Scholar
  16. J. P. L. Cox, “Long-term data storage in DNA,” Trends in Biotechnology, vol. 19, no. 7, pp. 247–250, 2001. View at Publisher · View at Google Scholar · View at Scopus
  17. H. J. Shiu, K. L. Ng, J. F. Fang, R. C. Lee, and C. H. Huang, “Data hiding methods based upon DNA sequences,” Information Sciences. An International Journal, vol. 180, no. 11, pp. 2196–2208, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. X. Zhang, Y. Wang, G. Cui, Y. Niu, and J. Xu, “Application of a novel IWO to the design of encoding sequences for DNA computing,” Computers & Mathematics with Applications, vol. 57, no. 11-12, pp. 2001–2008, 2009. View at Publisher · View at Google Scholar · View at Scopus
  19. X. Chai, Y. Chen, and L. Broyde, “A novel chaos-based image encryption algorithm using DNA sequence operations,” Optics & Lasers in Engineering, vol. 88, pp. 197–213, 2017. View at Google Scholar