Skip to main content
Log in

A robust hybrid cryptosystem based on DNA and Hyperchaotic for images encryption

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Most existent DeoxyriboNucleic Acid (DNA) based cryptosystems suffer from low processing capability and need submitting a long key. This article provides a robust cryptosystem which depends on both DNA and Hyperchaotic encryption techniques to solve the drawbacks of using DNA technique. The proposed algorithm uses a hyperchaotic system which hypers between 3D Hénon map and 1D Logistic to generate a greater key space than that generated by using either one. This system has high security and efficiency to produce secret keys for diffusion in the DNA encryption. After that data is encoded exploiting the hypothesis of traditional cryptography, DNA Digital coding, and the advancements of DNA synthesis. Test results prove that the proposed algorithm has large key space (up to 1084) which provides a high resistance against attack of exhaustion, strong sensitivity of encryption key, and good statistical characteristics. Compared to other existing techniques, the proposed algorithm is extremely secure against differential attack and Chosen/Known plaintext attack. Also, the execution time of the proposed cryptosystem is convenient for different applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Abdul Hassan AK (2016) Proposed Hyperchaotic system for image encryption. Int J Advanc Comput Sci Appl (IJACSA) 7(1):37–40. www.ijacsa.thesai.org

    Google Scholar 

  2. Ahmad J, Khan MA, Ahmed F, … Khan JS (2017) A novel image encryption scheme based on orthogonal matrix, skew tent map and XOR operation. Neural Comput & Applic 27:3847–3857

    Google Scholar 

  3. Alvarez G, Li SJ (2006) Some basic cryptographic requirements for chaos-based cryptosystem. Int J Bifurcat Chaos 16:2129–2151

    Article  MathSciNet  MATH  Google Scholar 

  4. Awad A “A New Chaos-Based Cryptosystem for Secure Transmitted Images,” available on: http://arxiv.org/abs/1503.00366 (Accessed Dec. 19, 2019).

  5. Caltech 256 dataset (RGB images dataset) http://www.vision.caltech.edu/Image_Datasets/Caltech101/#Description

  6. Çavuşoğlu Ü, … Pehlivan I (2018) A novel hybrid encryption algorithm based on chaos and S-AES algorithm. Nonlinear Dynamics 92(4):1745–1759

    Article  Google Scholar 

  7. Chai XL, Yang K, Gan ZH (2017) A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimed Tools Appl 76:9907–9927

    Article  Google Scholar 

  8. Chai XL, Gan ZH, Lu Y, Chen YR, Han DJ (2017) A novel image encryption algorithm based on the chaotic system and DNA computing. Int J Mod Phys C 28:1750069

    Article  MathSciNet  Google Scholar 

  9. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solutions and Fractals 21(3):749–761

    Article  MathSciNet  MATH  Google Scholar 

  10. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solut Fractals 21(3):749–761

    Article  MathSciNet  MATH  Google Scholar 

  11. Chen JX, Zhu ZL, Zhang LB, Zhang YS, Yang BQ (2018) Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption. Signal Process. 142:340–353

    Article  Google Scholar 

  12. El-said SA, Hussein KF, Fouad MM (2010) Securing Image Transmission Using In-Compression Encryption Technique. Int J Comput Sci Secur, (IJCSS) 4(5)

  13. El-said SA, Hussein KF, and Fouad MM (2011) “Securing Multimedia Transmission Using Optimized Multiple Huffman Tables Technique,” Int J Signal Process, Image Process Patt Recogn, 4(1)

  14. El-said SA, Hussein KF, and Fouad MM (2011) Confidentiality and Privacy for Videos Storage and Transmission. Int J Advanc Sci. Technol. 28(1):

  15. El-said SA, Hussein KF and Fouad MM (2011) “Securing Multi-Media Transmission over Mobile Communication Channels”. Int. J. Intell Eng. Inform. 1(3/4).

  16. Greyscale Set 2 (Gray Scale Images dataset) http://links.uwaterloo.ca/Repository.html

  17. Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dyn 83:1123–1136

    Article  MathSciNet  MATH  Google Scholar 

  18. Gururaj H, Linganagouda K (2014) A novel approach for image encryption based on parametric mixing chaotic system. Int J Comput Appl 96(11):29–37

    Google Scholar 

  19. Hu T, Liu Y, Gong LH, Guo SF, Yuan HM (2017) Chaotic image cryptosystem using DNA deletion and DNA insertion. Signal Process 134:234–243

    Article  Google Scholar 

  20. Hu T, Liu Y, Gong LH, Ouyang CJ (2017) An image encryption scheme combining chaos with cycle operation for DNA sequences. Nonlinear Dyn 87:51–66

    Article  Google Scholar 

  21. Huang CK et al (2013) Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecomm Syst, Springer 52(2):563–571

    Google Scholar 

  22. Kaggle dataset (CT images dataset) https://www.kaggle.com/kmader/siim-medical-images

  23. Kessler G “An overview of cryptography,” Available on: http://www.garykessler.net/library/crypto.html.

  24. Khan FA et al (2017) A Novel Image Encryption Based on Lorenz Equation, Gingerbreadman chaotic map and S8 permutation. J Intell Fuzzy Syst

  25. Kulsoom A, … Abbas SA (2016) An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimedia Tools Appl 75(1):1–23

    Article  Google Scholar 

  26. Li Y, Ge G (2019) Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security. Multimed Tools Appl 78:17973–17994

    Article  MathSciNet  Google Scholar 

  27. Li Y, Li X, Liu X (2017) A fast and efficient hash function based on generalized chaotic mapping with variable parameters. Neural Comput & Applic 28:1405–1415

    Article  Google Scholar 

  28. Liu H, … kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466

    Article  Google Scholar 

  29. Liu H, Xu Y, Ma C (2020) Chaos based image hybrid encryption algorithm using key stretching and hash feedback. Optik 164925

  30. Liu L, Zhang Q, Wei X (2012) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Elect Eng 38(5):1240–1248

    Article  Google Scholar 

  31. Maniyath SR, and Kaiselvan T , (2016) “A Novel DNA based Encryption Algorithm for Multimedia information”. Int J Advanc Comput Technol. 5 (1):

  32. Menezes AJ, Oorschot PCV, Vanstone S (1996) Handbook of applied cryptography. CRC Press Boca Raton, USA

    MATH  Google Scholar 

  33. NFBS database (MRI dataset) http://preprocessed-connectomes-project.org/NFB_skullstripped/

  34. Nichat SP, Sikchi SS (2013) Image encryption using hybrid genetic algorithm. Int J Advanc Res Comput Sci Software Eng 3(1):421–431

    Google Scholar 

  35. Ning K (2009) “A Pseudo DNA Cryptography Method,” arXiv preprint. arXiv:0903.2693,

  36. Norouzi B, Mirzakuchaki S (2017) An image encryption algorithm based on DNA sequence operations and cellular neural network. Multimed Tools Appl 76:13681–13701

    Article  Google Scholar 

  37. Rakheja P, Vig R, Singh P (2019) Asymmetric hybrid encryption scheme based on modified equal modulus decomposition in hybrid multi-resolution wavelet domain. J Mod Opt 66(7):799–811

    Article  MathSciNet  Google Scholar 

  38. Rehman A et al (2015) Selective encryption for gray images based on chaos and DNA complementary rules. Multimedia Tools Appl 74(13):4655–4677

    Article  Google Scholar 

  39. Sajay K, Babu SS, Vijayalakshmi Y (2019) Enhancing the security of cloud data using hybrid encryption algorithm. J Ambient Intell Humaniz Comput:1–10

  40. Sam S et al (2012) A novel image cipher based on mixed transformed logistic maps. Multimedia Tools Appl Int J: Springer 56(2):315–330

    Article  Google Scholar 

  41. Savi MA (2007) Effects of Randomness on Chaos and Order of Coupled Logistic Maps”. 19th Int Congress Mech Eng. 389–395

  42. Sher KJ, Ali KM, Jawad A, Oun HS, Waqas A (2018) An improved image encryption scheme based on a non-linear chaotic algorithm and substitution boxes. Informatica J 28(4):629–649

    Google Scholar 

  43. Tornea O (2013) “Contributions to DNA cryptography: applications to text and image secure transmission,” Université Nice Sophia Antipolis; Technical University of Cluj-Napoca (Romania)

  44. Wang X, Liu C (2017) A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimedia Tools Appl.:1–17

  45. Wei X, … Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Software 85(2):290–299

    Article  Google Scholar 

  46. Wu XJ, Wang KS, Wang XY, Kan HB, Kurths J (2018) Color image DNA encryption using NCA mapbased CML and one-time keys. Signal Process 148:272–287

    Article  Google Scholar 

  47. Ye G (2010) Image scrambling encryption algorithm of pixel bit based on chaos map. Patt Recogn Lett, Elsevier 31(5):347–354

    Article  Google Scholar 

  48. Z. Yin et al (2013) “The Advantages and Disadvantages of DNA Password in the Contrast to the Traditional Cryptography and Quantum Cryptography,” Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA). Advanc Intell Syst Comput 212, https://doi.org/10.1007/978-3-642-37502-6_38

  49. Yoon JW, Kim H (2010) An image encryption scheme with a pseudorandom permutation based on chaotic maps. Commun Nonlinear Sci Numer Simulat 15:3998–4006

    Article  MathSciNet  MATH  Google Scholar 

  50. Zhan K, Wei D, Shi J, Yu J (2017) Cross-utilizing hyperchaotic and DNA sequences for image encryption. J Electronic Imaging 26(1):013–021. https://doi.org/10.1117/1.JEI.26.1.013021

    Article  Google Scholar 

  51. Zhang G, Liu Q (2011) A novel image encryption method based on Total shuffling scheme. Opt Commun 284(12):2775–2780

    Article  Google Scholar 

  52. Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52(11):2028–2035

    Article  MathSciNet  MATH  Google Scholar 

  53. Zhou Y, … Chen CLP (2013) Image encryption using a new parametric switching chaotic system. Signal Processing, Elsevier 93(11):3039–3052

    Article  Google Scholar 

  54. Zhu C, Gan Z, Lu Y, … Chai X (2020) An image encryption algorithm based on 3-D DNA level permutation and substitution scheme. Multimed Tools Appl 79:7227–7258

    Article  Google Scholar 

Download references

Acknowledgements

This work was funded by the Deanship of scientific research at Princess Nourah bint Abdulrahman University, through the Research Groups Program Grant no. (RGP-1440-0013).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shaimaa Ahmed Elsaid.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analysis, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Elsaid, S.A., Alotaibi, E.R. & Alsaleh, S. A robust hybrid cryptosystem based on DNA and Hyperchaotic for images encryption. Multimed Tools Appl 82, 1995–2019 (2023). https://doi.org/10.1007/s11042-022-12641-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12641-5

Keywords

Navigation