Skip to main content
Log in

Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

An innovative image encryption scheme named Two-Fold confusion operation is proposed in the block mode. A gray image is permuted using Logistic map and then Most and Least Significant parts of the image are separated known as MSB and LSB. These LSB and MSB parts are transformed into separate 1-Dimensional arrays and are divided into non-overlapped blocks of fixed size. These blocks are then encoded into DNA bases where each block of LSB and MSB gets a different DNA rule selected dynamically using Chen’s hyper chaotic sequence. The innovation in this scheme is that each selective part of digital image is confused with different operations in DNA algebraic mode: Exclusive-OR for MSB blocks and addition operation for LSB blocks in the first phase. In 2nd phase of confusion, operations are exchanged for LSB and MSB. At last, confused LSB blocks are combined randomly with confused MSB blocks to form blocks of image pixels. These blocks of pixels are decoded back to digital domain by different DNA rules using chaotic pseudo-random numbers. The secret keys for chaotic maps are made dependent on MD5 digest of plain image to avoid launch of chose-plaintext attack. The simulation results show that NPCR score is >99.60%, UACI score > 33.40% and Chi-square is <255, hence proposed system is highly robust against statistical and differential attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Adleman LM (1994) Molecular computation of solutions to combinatorial problems. Science 266(5187):1021–1024

    Article  Google Scholar 

  2. Akhavan A, Samsudin A, Akhshani A (2017) Cryptanalysis of an image encryption algorithm based on DNA encoding. Opt Laser Technol 95:94–99

    Article  Google Scholar 

  3. Aqeel-ur-Rehman X, Liao AK, Ullah S (2016) A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps. Multimed Tools Appl 75(18):11241–11266

    Article  Google Scholar 

  4. Bhatnagar G, Wu QMJ, Raman B (2012) A New Fractional Random Wavelet Transform for Fingerprint Security. IEEE Trans Syst Man, Cybern Part A Syst Humans 42(1):262–275

    Article  Google Scholar 

  5. Bhatnagar G, Wu QMJ, Raman B (2013) Discrete fractional wavelet transform and its application to multiple encryption. Inf Sci (Ny) 223:297–316

    Article  MathSciNet  MATH  Google Scholar 

  6. Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3–72

    Article  MathSciNet  MATH  Google Scholar 

  7. Biham E, Shamir A (1993) Differential Cryptanalysis of the Full 16-round DES BT - Advances in Cryptology — CRYPTO’ 92: 12th Annual International Cryptology Conference Santa Barbara, California, USA August 16–20, 1992 Proceedings,” E. F. Brickell, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 487–496

  8. Blakley GR, Borosh I (1979) Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages. Comput Math with Appl 5(3):169–178

    Article  MathSciNet  MATH  Google Scholar 

  9. Borujeni SE, Eshghi M, Etemadi Borujeni S, Eshghi M (2013) Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommun Syst 52(2):525–537

    MATH  Google Scholar 

  10. Chen TH, Wu CS (2010) Compression-unimpaired batch-image encryption combining vector quantization and index compression. Inf Sci (Ny) 180(9):1690–1701

    Article  Google Scholar 

  11. Cui G, Qin L, Wang Y, Zhang X (2008) An encryption scheme using DNA technology. 2008 3rd Int Conf Bio-Inspired Comput Theor Appl 37–42

  12. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8(6):1259–1284

    Article  MathSciNet  MATH  Google Scholar 

  13. GAO T, CHEN Z, YUAN Z, CHEN G (2006) A hyperchaos generated from chen’s system. Int J Mod Phys C 17(04):471–478

    Article  MATH  Google Scholar 

  14. Huang X, Ye G (2014) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed Tools Appl 72(1):57–70

    Article  Google Scholar 

  15. Kalpana J, Murali P (2015) An improved color image encryption based on multiple DNA sequence operations with DNA synthetic image and chaos. Opt - Int J Light Electron Opt 126(24):5703–5709

    Article  Google Scholar 

  16. Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput & Applic 26(5):1137–1148

    Article  Google Scholar 

  17. Khan M, Shah T, Batool SI (2016) Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comput & Applic 27(3):677–685

    Article  Google Scholar 

  18. Khanzadi H, Eshghi M, Borujeni SE (2014) Image Encryption Using Random Bit Sequence Based on Chaotic Maps. Arab J Sci Eng 39(2):1039–1047

    Article  MATH  Google Scholar 

  19. A. Kulsoom, D. Xiao, Aqeel-ur-Rehman, and S. A. Abbas, “An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules,” Multimed Tools Appl, vol. 75, no. 1, pp. 1–23, 2016

    Article  Google Scholar 

  20. Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography. Signal Process 125:187–202

    Article  Google Scholar 

  21. Li CC et al (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87(1):127–133

    Article  Google Scholar 

  22. Liu Y, Tang J, Xie T (2014) Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Opt Laser Technol 60(5):111–115

    Article  Google Scholar 

  23. Liu L, Zhang Q, Wei X (2012) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38(5):1240–1248

    Article  Google Scholar 

  24. Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2013) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed Tools Appl 74(3):781–811

    Article  Google Scholar 

  25. Ozkaynak F, Ozer AB, Yavuz S (2013) Security analysis of an image encryption algorithm based on chaos and DNA encoding. 2013 21st Signal Process Commun Appl Conf 127(l):1–4

    Google Scholar 

  26. Öztürk İ, Soğukpınar İ (2004) Analysis and comparison of image encryption algorithms. Int J Inf Technol 1(2):108–111

    Google Scholar 

  27. Parvin Z, Seyedarabi H, Shamsi M (2016) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed Tools Appl 75(17):10631–10648

    Article  Google Scholar 

  28. Ur Rehman A, Liao X, Hahsmi MA, Haider R (2018) An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos. Opt - Int J Light Electron Opt 153:117–134

    Article  Google Scholar 

  29. ur Rehman A, Liao X, Kulsoom A, Abbas SA (Jul. 2015) Selective encryption for gray images based on chaos and DNA complementary rules. Multimed Tools Appl 74(13):4655–4677

    Article  Google Scholar 

  30. Wang X, Wang Q (2014) A novel image encryption algorithm based on dynamic S-boxes constructed by chaos. Nonlinear Dyn 75(3):567–576

    Article  Google Scholar 

  31. Wang X, Xu D (2014) Image encryption using genetic operators and intertwining logistic map. Nonlinear Dyn 78(4):2975–2984

    Article  MathSciNet  Google Scholar 

  32. Watson JD, Crick FHC (1953) A Structure for Deoxyribose Nucleic Acid. Nature 171:737–738

    Article  Google Scholar 

  33. Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299

    Article  Google Scholar 

  34. Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput J 37:24–39

    Article  Google Scholar 

  35. Xie T, Liu Y, Jie T (2014) Breaking a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Opt - Int J Light Electron Opt 125(24):7166–7169

    Article  Google Scholar 

  36. Xu M (2017) Cryptanalysis of an Image Encryption Algorithm Based on DNA Sequence Operation and Hyper-chaotic System. 3D Res 8(2):15

    Article  Google Scholar 

  37. Zhang Q, Guo L, Wei X (2013) A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Opt - Int J Light Electron Opt 124(18):3596–3600

    Article  Google Scholar 

  38. Zhang Y, Tang Y (2017) A plaintext-related image encryption algorithm based on chaos. Multimedia Tools and Applications 1–23

  39. Zhang Y, Wen W, Su M, Li M (2014) Cryptanalyzing a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Opt - Int J Light Electron Opt 125(4):7166–7169

    Article  Google Scholar 

  40. Zhen P, Zhao G, Min L, Jin X (2016) Chaos-based image encryption scheme combining DNA coding and entropy. Multimed Tools Appl 75(11):6303–6319

    Article  Google Scholar 

  41. Zhou Y, Panetta K, Agaian S, Chen CLLPP (2012) Image encryption using P-Fibonacci transform and decomposition. Opt Commun 285(5):594–608

    Article  Google Scholar 

  42. Zhou Y, Panetta K, Agaian S, Chen CLP (2013) (n, k, p)-Gray code for image systems. IEEE Trans Cybern 43(2):515–529

    Article  Google Scholar 

  43. Zhu CX (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29–37

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aqeel ur Rehman.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

ur Rehman, A., Xiao, D., Kulsoom, A. et al. Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules. Multimed Tools Appl 78, 9355–9382 (2019). https://doi.org/10.1007/s11042-018-6516-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6516-1

Keywords

Navigation