Based on the Feistel network and dynamic deoxyribonucleic acid (DNA) encoding technology, an image encryption method is proposed using the "permutation-diffusionscrambling" structure. First, the SHA-3 algorithm is used to calculate the hash value of the plaintext image as the initial value of the hyperchaotic system, and the chaos-generated sequence is used to generate the Hill cipher matrix to replace the image pixel. Second, the DNA sequence operation is used as the F function of the Feistel network. The DNA sequence database is used as the key K of Feistel network, and the image pixel value diffusion is realized by the Feistel network. Finally, further diffusion is carried out through the ciphertext feedback and through the ciphertext confusion and diffusion of three rounds of "chaotic scrambling-DNA encoding-Feistel transformation-DNA decoding," making the ciphertext more random and resistant to attacks and ensuring that the encrypted ciphertext is more secure. The experimental results show that the proposed method can effectively encrypt the image and has prominent characteristics, such as strong plaintext sensitivity, a large key space, and excellent ciphertext statistical properties.
Image encryption is the most direct and effective technical means for protecting the security of image information. Based on the space filling property of the Hilbert curve and the infinite property of the H-geometric fractal, a new image encryption technique is proposed, which combines the pseudorandomness of a hyperchaotic system and the sensitivity to initial values. First, the hash value of a plaintext image is calculated using the secure hash algorithm 3 (SHA-3) as the initial value of the piece-wise linear chaotic map (PWLCM) and Rossler chaotic systems, which associates the key with the plaintext. In addition, the chaotic sequences that are generated by the chaotic systems are used to scramble the global pixel positions and the pixel values of the images, thereby disturbing the distribution of the pixel positions and the pixel values. Second, the Hilbert curve and H-fractal are alternately used to scramble the local pixel positions and diffuse the pixel values twice. Finally, the ciphertext feedback is used to further enhance the confusion and diffusion characteristics of the algorithm in order to achieve higher security. The experimental results and security analysis show that the encryption technique has enough key space to resist exhaustive attacks and can effectively resist statistical attacks, differential attacks, noise attacks, and cropping attacks. It can be used for military, judicial, and other privacy-related digital images secure storage and network security transmissions.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.