Skip to main content

Advertisement

Log in

Image encryption through RNA approach assisted with neural key sequences

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, an image encryption algorithm is proposed for the first time, which uses coding deoxyribonucleic acid (DNA) sequences to transcript its complementary messenger ribonucleic acid (mRNA) sequence. A binary associative memory neural network (BAM NN) is trained to produce the required transfer ribonucleic acid (tRNA) sequences to bond with the mRNA sequences to assign the correct amino acids. DNA and mRNA sequences, together with tRNA sequences, provide the permutation and diffusion operations for the pixels in colour digital imaging and communications in medicine images. Then, keys, which are determined by the generated amino acids, are used to encrypt the diffused cipher pixels further. Also key sharing has been carried out using Universal Software Radio Peripheral (USRP), cloud infrastructure and One Time Password (OTP) generation mechanisms.The different sequence formation can also identify any alterations made by the intruder in the amino acid, which results in the wrong set of key generation. Various decryption quality analyses, statistical and differential attack analyses (namely mean square error, unified average changing intensity, peak signal-to-noise ratio, number of pixel changing rate, entropy, mean absolute error, key sensitivity, cropping attacks, and chosen-plaintext attacks), and correlation tests were carried out to confirm the robustness of the proposed algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig.12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19

Similar content being viewed by others

References

  1. Abd-El-Hafiz SK, AbdElHaleem SH, Radwan AG (2016) Novel permutation measures for image encryption algorithms. Opt Lasers Eng 85:72–83

    Article  Google Scholar 

  2. Alam S, Hasan SMR (2017) A gene–protein–miRNA electronic oscillator. IEEE Transactions on Circuits and Systems II: Express Briefs 64(9):1007–1011

    Article  Google Scholar 

  3. Al-Haj A (2015) Providing integrity, authenticity, and confidentiality for header and pixel data of DICOM images. J Digit Imaging 28(2):179–187

    Article  MathSciNet  Google Scholar 

  4. Arumugham S, Rajagopalan S, Rayappan JBB, Amirtharajan R (2018) Networked medical data sharing on secure medium-a web publishing mode for DICOM viewer with three-layer authentication. J Biomed Inform 1:2

    Google Scholar 

  5. Barani MJ, MiladYousefi VPA (2019) A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map. Optik 187:205–222

    Article  Google Scholar 

  6. Chai X, Fu X, Gan Z (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44–62

    Article  Google Scholar 

  7. Chai X, Gan Z, Yuan K, Chen Y, Liu X (2017) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput & Applic:1–19

  8. Chandrasekaran J, Thiruvengadam SJ, Rey D (2017) A Hybrid Chaotic and Number Theoretic Approach for Securing DICOM Images. Secur. Commun. Networks, vol. 2017, no. Article ID 6729896, p. 12 pages.

  9. Chen W (2016) Optical multiple-image encryption using three-dimensional space. Photonics Journal IEEE 8:1–8

    Google Scholar 

  10. Diaconu AV (2016) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf Sci 355:314–327

    Article  Google Scholar 

  11. Ding W, Xie Y, Wang Y (2019) Image authentication and tamper localization based on relative difference between DCT coefficient and its estimated value. Multimed Tools Appl

  12. El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144–157

    Article  Google Scholar 

  13. Fu C, Meng W, Zhan Y, Zhu Z, Lau FCM, Tse CK, Ma H (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43(8):1000–1010

    Article  Google Scholar 

  14. Fu C, Zhang G, Bian O, Lei W, Ma H (2014) A novel medical image protection scheme using a 3-dimensional chaotic system. PLoS One 9:e115773

    Article  Google Scholar 

  15. Higgs PG (2000) RNA secondary structure: physical and computational aspects. Q Rev Biophys 33(3):199–253

    Article  Google Scholar 

  16. Kocabas O, Soyata T, Aktas MK (2016) Emerging Security Mechanisms for Medical Cyber Physical Systems. IEEE/ACM Transactions on Computational Biology and Bioinformatics 13(3):401–416

    Article  Google Scholar 

  17. Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 1:6–21

    Article  Google Scholar 

  18. Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie–Hellman cryptography. Signal Process 125:187–202

    Article  Google Scholar 

  19. Lee SH, Lee EJ, Hwang WJ, Kwon KR (2017) Reversible DNA data hiding using multiple difference expansions for DNA authentication and storage. Multimed Tools Appl 77:1–28

    Article  Google Scholar 

  20. Leier A, Richter C, Banzhaf W, Rauhe H (2000) Cryptography with DNA binary strands. Biosystems 57:13–22

    Article  Google Scholar 

  21. Liu P, Zhang T, Li X (2019) A new color image encryption algorithm based on DNA and spatial chaotic map. Multimed Tools Appl 78:14823–14835

    Article  Google Scholar 

  22. Menezes AJ, Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press

  23. Neveu M, Kim HJ, Benner SA (2013) The "strong" RNA world hypothesis: fifty years old. Astrobiology 13(4):391–403

    Article  Google Scholar 

  24. Patel BH, Percivalle C, Ritson DJ, Duffy CD, Sutherlan JD Common origins of RNA, protein and lipid precursors in a cyanosulfidic protometabolism. Nat Chem 7(4):301–307

  25. Praveenkumar P, Amirtharajan R, Thenmozhi K, Balaguru Rayappan JB (2015) Medical data sheet in safe havens - a tri- layer cryptic solution. Comput Biol Med 62:264–276

    Article  Google Scholar 

  26. Praveenkumar P, Amirtharajan R, Thenmozhi K, Rayappan JBB (2016) Fusion of confusion and diffusion: a novel image encryption approach. Telecommun Syst:1–14

  27. Premkumar R, Anand S (2019) Secured and compound 3-D chaos image encryption using hybrid mutation and crossover operator. Multimed Tools Appl 78:9577–9593

    Article  Google Scholar 

  28. Qiang Z, Xiaopeng W (2013) RGB color image encryption method based on Lorenz chaotic system and DNA computation. IETE Tech Rev 30(5):404–409

    Article  Google Scholar 

  29. Ravichandran D, Praveenkumar P, Balaguru Rayappan JB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170–184

    Article  Google Scholar 

  30. Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R DNA Chaos Blend to Secure Medical Privacy. IEEE Transactions on NanoBioscience 16(8):850–858

  31. Rehman AU, Liao XF, Kulsoom A, Abbas SA (2015) Selective encryption for gray images based on chaos and DNA complementary rules. Multimed Tools Appl 74:4655–4677

    Article  Google Scholar 

  32. Shabash B, Wiese KC (2017) RNA Visualization: Relevance and the Current State-of-the-Art Focusing on Pseudoknots. IEEE/ACM Transactions on Computational Biology and Bioinformatics 14(3):696–712

    Article  Google Scholar 

  33. Singh HV, Agarwal R (2018) Diagnosis of Carious Legions Using Digital Processing of Dental Radiographs. Springer, Cham, pp 864–882

    Google Scholar 

  34. Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl 78:3457–3470

    Article  Google Scholar 

  35. Tinoco I, Bustamante C (1999) How RNA folds. J Mol Biol 293(2):271–281

    Article  Google Scholar 

  36. Wang X, Liu C (2017) A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed Tools Appl 76(5):6229–6245

    Article  Google Scholar 

  37. Wang H, Quigley GJ, Kolpak FJ, Crawford JL, van Boom JH, Van der Marel G, Rich A (1979) Molecular structure of a left-handed double helical DNA fragment at atomic resolution. Nature 282(5740):680–686

    Article  Google Scholar 

  38. Wang X-Y, Zhang Y-Q, Bao X-M (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61

    Article  Google Scholar 

  39. Watson D, Crick FHC A structure for Deoxyribose Nucleic Acid. Nature 171:737–738

  40. Wu Y, Member S, Noonan JP, Member L (2011) NPCR and UACI randomness tests for image encryption. Cyber Journals Multidiscip Journals Sci Technol J Sel Areas Telecommun:31–38

  41. Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci (Ny) 222:323–342

    Article  MathSciNet  Google Scholar 

  42. Zhang S, Gao T, Gao L (2014) A novel encryption frame for medical image with watermark based on hyperchaotic system. Math Probl Eng 2014

  43. Zhang J, Huo D (2019) Image encryption algorithm based on quantum chaotic map and DNA coding. Multimed Tools Appl 78:15605–15621

    Article  Google Scholar 

  44. Zhong C, Andrews J, Zhang S (2012) Discovering non-coding RNA elements in drosophila 3’ untranslated regions. 2012 IEEE 2nd International Conference on Computational Advances in Bio and medical Sciences (ICCABS), Las Vegas, pp. 1–6

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Praveenkumar Padmapriya.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Devi, R.S., Aravind, A.R.N., Vishal, J.C. et al. Image encryption through RNA approach assisted with neural key sequences. Multimed Tools Appl 79, 12093–12124 (2020). https://doi.org/10.1007/s11042-019-08562-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08562-5

Keywords

Navigation