Skip to main content
Log in

An efficient hybrid encryption model based on deep convolutional neural networks, deoxyribonucleic acid computing and chaotic system

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this research, we present a substantial image encryption system constructed on deep convolutional neural networks for key generation to reduce processing power, complexity, and time consumption, as well as a creative method of DNA sequence operations and scrambling to encrypt digital images. A two-dimensional Logistic map is used to perform a chaotic scrambling. The results of the experiments, as well as security analysis such as statistical, differential, and key space analysis, demonstrated that the suggested method may achieve a high level of security while remaining efficient. With UACI and NPCR of 33.4 and 99.6, respectively, the method achieves an average entropy of 7.999 and a near-zero correlation. The algorithm’s efficiency is also evaluated to the state of the art in encryption techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Data availability

The authors declare that data supporting the findings of this study are available within the article.

References

  1. Alvarez G, Li S (2003) Cryptographic requirements for chaotic secure communications. Int J Bifurc Chaos Appl Sci Eng 16:2129–2151

    Article  Google Scholar 

  2. Asgari-Chenaghlu M, Balafar MA, Feizi-Derakhshi MR (2019) A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation. Signal Process 157:1–13

    Article  Google Scholar 

  3. Asgari-Chenaghlu M, Feizi-Derakhshi MR, Nikzad-Khasmakhi N, Feizi-Derakhshi AR, Ramezani M, Jahanbakhsh-Nagadeh Z, Rahkar-Farshi T, Zafarani-Moattar E, Ranjbar-Khadivi M, Balafar MA (2021) Cy: chaotic yolo for user intended image encryption and sharing in social media. Inf Sci 542:212–227

    Article  Google Scholar 

  4. Chai X, Gan Z, Yuan K, Chen Y, Liu X (2019) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput Applic 31:219–237

    Article  Google Scholar 

  5. Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44–62

    Article  Google Scholar 

  6. Chai X, Bi J, Gan Z, Liu X, Zhang Y, Chen Y (2020) Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process 176:107684

    Article  Google Scholar 

  7. Chen C, Sun K, He S (2020) An improved image encryption algorithm with finite computing precision. Signal Process 168:107340

    Article  Google Scholar 

  8. Chowdhary CL, Patel PV, Kathrotia KJ, Attique M, Perumal K, Ijaz MF (2020) Analytical study of hybrid techniques for image encryption and decryption. Sensors 20:5162

    Article  Google Scholar 

  9. Erkan U, Toktas A, Enginoğlu S, Karabacak E, Thanh DN (2020) An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN. Multimed Tools Appl 81:7365–7391

    Article  Google Scholar 

  10. Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dyn 83:1123–1136

    Article  MathSciNet  MATH  Google Scholar 

  11. Hanis S, Amutha R (2019) A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure. Nonlinear Dyn 95:421–432

    Article  Google Scholar 

  12. Hu T, Liu Y, Gong LH, Ouyang CJ (2017) An image encryption scheme combining chaos with cycle operation for DNA sequences. Nonlinear Dyn 87:51–66

    Article  Google Scholar 

  13. Jain A, Rajpal N (2016) A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps. Multimed Tools Appl 75:5455–5472

    Article  Google Scholar 

  14. Lan R, He J, Wang S, Gu T, Luo X (2018) Integrated chaotic systems for image encryption. Signal Process 147:133–145

    Article  Google Scholar 

  15. Liu H, Wang X (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12:1457–1466

    Article  Google Scholar 

  16. Liu Y, Tang J, Xie T (2014) Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Opt Laser Technol 60:111–115

    Article  Google Scholar 

  17. Luo Y, Lin J, Liu J, Wei D, Cao L, Zhou R, Cao Y, Ding X (2019) A robust image encryption algorithm based on Chua's circuit and compressive sensing. Signal Process 161:227–247

    Article  Google Scholar 

  18. Matthews R (1989) On the derivation of a “chaotic” encryption algorithm. Cryptologia 13:29–42

    Article  MathSciNet  Google Scholar 

  19. Menezes AJ, Van Oorschot PC, Vanstone SA (2018) Handbook of applied cryptography. CRC Press, Boca Raton

    Book  MATH  Google Scholar 

  20. Mohamed FK (2014) A parallel block-based encryption schema for digital images using reversible cellular automata. Eng Sci Technol an Int 17:85–94

    Article  Google Scholar 

  21. Munir N, Khan M, Hazzazi MM, Aljaedi A, Haj Ismail AAK, Alharbi AR, Hussain I (2021) Cryptanalysis of internet of health things encryption scheme based on chaotic maps. IEEE Access 9:105678–105685

    Article  Google Scholar 

  22. Munir N, Khan M, Hussain I, Amin M (2022) Differential cryptanalysis of diffusion and confusion-based information confidentiality mechanism. Optik 259:168989

    Article  Google Scholar 

  23. Niyat AY, Moattar MH, Torshiz MN (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng 90:225–237

    Article  Google Scholar 

  24. Panduranga HT, Kumar SN (2014) Image encryption based on permutation-substitution using chaotic map and latin square image cipher. Eur Phys J: Spec Top 223:1663–1677

    Google Scholar 

  25. Ping P, Fan J, Mao Y, Xu F, Gao J (2018) A chaos based image encryption scheme using digit-level permutation and block diffusion. IEEE Access 6:67581–67593

    Article  Google Scholar 

  26. Rajput AS, Sharma M (2015) A novel image encryption and authentication scheme using chaotic maps. J Adv Comput Intell 320:277–286

    Google Scholar 

  27. Rehman A, Liao X, Kulsoom A, Abbas S (2015) Selective encryption for gray images based on chaos and DNA complementary rules. Multimed Tools Appl 74:4655–4677

    Article  Google Scholar 

  28. Tamang J, Dieu Nkapkop JD, Ijaz MF, Prasad PK, Tsafack N, Saha A, Kengne J, Son Y (2021) Dynamical properties of ion-acoustic waves in space plasma and its application to image encryption. IEEE Access 9:18762–18782

    Article  Google Scholar 

  29. Toundi CML, Nkapkop JDD, Tsafack N, Ngono JM, Ele P, Wozniak M, Shafi J, Ijaz MF (2022) A novel compound-coupled hyperchaotic map for image encryption. Symmetry 14:493

    Article  Google Scholar 

  30. Wang X, Liu C (2017) A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed Tools Appl 76:6229–6245

    Article  Google Scholar 

  31. Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Laser Technol 73:53–61

    Article  Google Scholar 

  32. Watson JD, Crick FHC (1953) A structure for deoxyribose nucleic acid. Nature 171:737–738

    Article  Google Scholar 

  33. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. J Sel Areas in Telecommun (JSAT) 1:31–38

    Google Scholar 

  34. Wu J, Liao X, Yang B (2018) Image encryption using 2D Hénon-sine map and DNA approach. Signal Process 153:11–23

    Article  Google Scholar 

  35. Yang F, Mou J, Liu J, Ma C, Yan H (2020) Characteristic analysis of the fractional-order hyperchaotic complex system and its image encryption application. Signal Process 169:107373

    Article  Google Scholar 

  36. Yang Y, Wang L, Duan S, Luo L (2021) Dynamical analysis and image encryption application of a novel memristive hyperchaotic system. Opt Laser Technol 133:106553

    Article  Google Scholar 

  37. Zefreh EZ (2020) An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimed Tools Appl 79:24993–25022

    Article  Google Scholar 

  38. Zhan K, Wei D, Shi J, Yu J (2017) Cross-utilizing hyperchaotic and DNA sequences for image encryption. J Electron Imaging 26:013021

    Article  Google Scholar 

  39. Zhang Y, Xiao D, Wen W, Li M (2014) Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Nonlinear Dyn 76:1645–1650

    Article  Google Scholar 

  40. Zhang X, Wang L, Wang Y, Niu Y, Li Y (2020) An image encryption algorithm based on hyperchaotic system and variable-step Josephus problem. Int J Optoelectron 2020:Article ID 6102824

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Majid Khan.

Ethics declarations

Ethics approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Iqbal, N., Khan, M., Khurshid, K. et al. An efficient hybrid encryption model based on deep convolutional neural networks, deoxyribonucleic acid computing and chaotic system. Multimed Tools Appl 82, 13881–13903 (2023). https://doi.org/10.1007/s11042-022-13910-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13910-z

Keywords

Navigation