2016
DOI: 10.1155/2016/5408529
|View full text |Cite
|
Sign up to set email alerts
|

An Image Encryption Scheme Based on DNA Computing and Cellular Automata

Abstract: Networks have developed very quickly, allowing the speedy transfer of image information through Internet. However, the openness of these networks poses a serious threat to the security of image information. The field of image encryption has drawn attention for this reason. In this paper, the concepts of 1-dimensional DNA cellular automata and T-DNA cellular automata are defined, and the concept of reversible T-DNA cellular automata is introduced. An efficient approach to encryption involving reversible T-DNA c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…Jeyaram [11] et al proposed a new cellular automata-based image cipher that uses a radius-2, class-III CA to scramble pixels. A cellular automata and DNA computing-based image encryption method was presented by Zhou et al [45]. Their scheme introduces the Thymine DNA cellular automata and T-DNA-CA for encryption.…”
Section: Related Workmentioning
confidence: 99%
“…Jeyaram [11] et al proposed a new cellular automata-based image cipher that uses a radius-2, class-III CA to scramble pixels. A cellular automata and DNA computing-based image encryption method was presented by Zhou et al [45]. Their scheme introduces the Thymine DNA cellular automata and T-DNA-CA for encryption.…”
Section: Related Workmentioning
confidence: 99%
“…For a comprehensive comparison, we use the logistic chaotic sequence under the same parameter to act on the operation of the DNA sequence. Additionally, histogram, information entropy [ 49 ], rate of base distribution, hamming distance [ 50 ], fixed point ratio [ 51 ], histogram variance [ 52 ], correlation coefficient, and the number of pixel change rate (NPCR) and unified average changing intensity (UACI) are used as the evaluation indexes. The relevant theories of these evaluation indexes are given by the following Eqs ( 3 )–( 16 ).…”
Section: Theoretical Basis Of This Studymentioning
confidence: 99%
“…In addition, some of them ( Dagadu et al, 2019a ; Hossein et al, 2020 ) could not resist CPA. In terms of the DNA operations, dynamic addition operation ( Zhang J. et al, 2016 ) and complement operation ( Belazi et al, 2019 ), and cellular automata operation ( Zhou et al, 2016 ; Chai et al, 2017 ) were proposed. Their encryption effects were better but the algorithms were more complex.…”
Section: Introductionmentioning
confidence: 99%