Skip to main content
Log in

A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A Modified Dual Fusion (MDF) technique of image encryption is proposed in this paper to overcome the limitations that exist in the original research work of Q. Zhang et al. (Optik 124:3596–3600, 2013). A novel technique of DNA encoding is applied through chaotic maps on pixel level and SHA-256 hash of the plain image is used to generate secret keys to avoid chosen-plaintext attack. Also, in the modified scheme, two random images are generated from chaotic maps to fuse with the plain image after permutation in digital and DNA domains using XOR and addition operations respectively. The simulated experimental results and security analysis show that the proposed cryptosystem has fairly good encryption effect than the original fusion scheme but also has the capability to sustain noise which gets add during transmission over noisy channel. Besides, the paramount factor of improved scheme is suitable for the real time applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Adleman LM (1994) Molecular computation of solution of combinatorial problems. Science 266:1021–1024

    Article  Google Scholar 

  2. Ahmad M, Alam MS (2009) A new algorithm of encryption and decryption of images using chaotic mapping. Int J Comput Sci Eng 2(1):46–50

    Google Scholar 

  3. Awad A, Awad D (2010) Efficient image chaotic encryption algorithm with no propagation error. ETRI J 32(5):774–783

    Article  Google Scholar 

  4. Baum EB (1996) DNA sequences useful for computation. In: Proceedings of 2nd DIMACS Workshop on DNA Based Computers, p 122–127

  5. Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons Fractals 35:408–419

    Article  MathSciNet  MATH  Google Scholar 

  6. Biham E (1991) Cryptanalysis of chaotic maps cryptosystem suggested. In: Davis DW (ed) Proc. EUTOCRYPT’91. LNCS, vol 547. Springer, Berlin, pp 532–534

    Google Scholar 

  7. Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. In: Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology. Springer-Verlag

  8. Biham E, Shamir A (1993) Differential cryptanalysis of the Full 16-round DES. In: Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology. Springer-Verlag

  9. Chang WC, Wong KW, Yu H, Zhu ZL (2012) An image encryption scheme using light weight bit level confusion and cascade cross circular diffusion. Opt Commun 285:2343–2354

    Article  Google Scholar 

  10. Chen G, Mao Y, Chui C (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21:749–761

    Article  MathSciNet  MATH  Google Scholar 

  11. Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93

    Article  Google Scholar 

  12. Fournier D, Lopez R (2003) Basin bifurcations in a two-dimensional logistic map, in eprintarXiv: online/0304059

  13. Francois M, Grosges T, Barchiesi D, Erra R (2012) A new image encryption scheme based on a chaotic function. Signal Process Image Commun 27:249–259

    Article  Google Scholar 

  14. Gaborit P, King OD (2005) Linear constructions for DNA codes. Theor Comput Sci 334:99–113

    Article  MathSciNet  MATH  Google Scholar 

  15. Gtz M, Kelber K, Schwarz W (1997) Discrete time chaotic encryption system-part I: statistical design approach. IEEE Trans Circuits Syst-1: Fundam Theory Appl 44(10):963–970

    Article  Google Scholar 

  16. Hongjun L, Xingyuan W (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320–3327

    Article  MathSciNet  MATH  Google Scholar 

  17. Huang X, Ye G. An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed Tools Appl. doi:10.1007/s11042-012-1331-6

  18. King OD, Gaborit P (2007) Binary templates for comma-free DNA codes. Discret Appl Math 155:831–839

    Article  MathSciNet  MATH  Google Scholar 

  19. Kulsoom A, Xiao D, Rehman A, Abbas SA. An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary Rules. Multimed Tools Appl. doi:10.1007/s11042-014-2221-x

  20. Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12:1457–1466

    Article  Google Scholar 

  21. HJ Liu, ZL Zhu, HY Jiang, BL Wang (2009) A novel image encryption algorithm based on improved 3D chaotic cat map, in: The 9th International Conference for Young Computer Scientists, PP- 3016-3021

  22. Pisarchik AN, Flores NJ, Carpio M (2006) Encryption and decryption of images with chaotic map lattices. Chaos 16(3):033118-1/6

    Article  MathSciNet  MATH  Google Scholar 

  23. Rehman A, Liao XF, Kulsoom A, Abbas SA. Selective encryption for gray images based on chaos and DNA complementary rules. Multimed Tools Appl. doi:10.1007/s11042-013-1828-7

  24. Rhouma R, Belghith S (2008) Cryptanalaysis of a new image encryption algorithm based on hyper-chaos. Phys Lett A 372(38):5973–5978

    Article  MATH  Google Scholar 

  25. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715

    Article  MathSciNet  MATH  Google Scholar 

  26. Stojanovski T, Kocarev L (2001) Chaos based random generators-part I: analysis. IEEE Trans Circuits Syst-1: Fundam Theory Appl 48(3):281–288

    Article  MathSciNet  MATH  Google Scholar 

  27. Stojanovski T, Kocarev T (2001) Chaos based random generators-part II: practical realization. IEEE Trans Circuits Syst-1: Fundam Theory Appl 48(3):382–385

    Article  MathSciNet  MATH  Google Scholar 

  28. Wang X, Zhang J (2008) An image scrambling encryption using chaos controlled Poker shuffle operation. In: Proceedings of International Symposium on Biometrics and Security Technologies, p 1–6

  29. Watson JD, Crick FH (1953) A structure of DNA. Nature 171:737–738

    Article  Google Scholar 

  30. Wu Y, Noonan JP, Agaian S (2011) Shannon entropy based randomness measurement and test for image encryption in CoRR abs/1103.5520

  31. Wu Y, Noonan J P, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J: Multidiscip J Sci Technol, J Sel Areas Telecommun (JSAT):31–38

  32. Wu Y, Yang G, Jin H, Noonan JP (2012) Image encryption using the two dimensional logistic chaotic map. J Electron Imaging 21(1):013014

    Article  Google Scholar 

  33. Xiao GZ, Lu MX, Qin L, Lai XJ (2006) New field of cryptography. Chin Sci Bull 51:1413–1420

    MathSciNet  MATH  Google Scholar 

  34. Zhang Q, Guo L, Xue X, Wei X (2009) An image encryption algorithm based on DNA sequence addition operation Fourth International Conference on Bio-Inspired Computing. BIC-TA ’09

  35. Zhang Q, Guo L, Wei X (2013) A novel fusion encryption algorithm based on DNA sequence operation and hyper chaotic system. Optik 124:3596–3600

    Article  Google Scholar 

  36. Zhang Q, Liu L, Wei X (2014) Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps. Int J Electron Commun (AEÜ) 68:186–192

    Article  Google Scholar 

  37. Zhang Y, Wen W, Su M, Li M (2014) Cryptanalyzing a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik 125:1562–1564

    Article  Google Scholar 

Download references

Acknowledgments

National Natural Science Foundation of China Grant Nos. provided financial support for the work described here. (61003247 and 61170249), Computer Science and Engineering Department, Chongqing University, People Republic of China.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aqeel-ur-Rehman.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Aqeel-ur-Rehman, Liao, X., Kulsoom, A. et al. A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps. Multimed Tools Appl 75, 11241–11266 (2016). https://doi.org/10.1007/s11042-015-2851-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2851-7

Keywords

Navigation