Novel chaotic image cryptosystem based on dynamic RNA and DNA computing

In view of the security problems of image encryption algorithms encoded by single DNA or RNA, to increase the randomness of the diffusion process and the uncertainty of the coding rules, we propose a combining dynamic RNA and DNA computing based chaotic image encryption algorithm, which has a more c...

Full description

Saved in:
Bibliographic Details
Published inJournal of applied physics Vol. 136; no. 18
Main Authors Zhou, Shuang, Wei, Yi, Wang, Shiyu, Iu, Herbert Ho-Ching, Zhang, Yingqian
Format Journal Article
LanguageEnglish
Published Melville American Institute of Physics 14.11.2024
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In view of the security problems of image encryption algorithms encoded by single DNA or RNA, to increase the randomness of the diffusion process and the uncertainty of the coding rules, we propose a combining dynamic RNA and DNA computing based chaotic image encryption algorithm, which has a more complicated encryption process for improving the security of the encryption algorithm and increases the difficulty of decoding. First, a new three-dimensional hyperchaotic map is proposed, which exhibits a rich set of dynamic behaviors. Second, the sequences generated by the proposed map are passed to NIST test with good randomness and implemented by digital signal processing hardware, which shows the feasibility of the proposed chaotic map for industrial applications. Second, the K-means algorithm is used to split the plaintext into two parts. Third, the chaotic sequence is used to displace and diffuse the two parts of the plaintext, respectively. Then, chaotic sequences were used to encode using dynamic DNA and RNA of these two parts, respectively. Then, the chaotic sequences were used to compute the dynamic DNA and RNA computing of these two parts, respectively. Finally, the cipher text is decoded accordingly. The experimental results show that compared with some related encryption algorithms, our method has higher security.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0021-8979
1089-7550
DOI:10.1063/5.0235336